Thycotics Joseph Carson: Government & Encryption Issues Will Be Huge

  /     /     /  
Publicated : 22/11/2024   Category : security


Thycotics Joseph Carson: Government & Encryption Issues Will Be Huge


In the second part of his Q&A with Security Now, Thycotic Chief Security Scientist Joseph Carson talks about encryption and the role that governments play in security.



Security Now contributor Simon Marshall recently sat down with Joseph Carson, chief security scientist at Washington, DC-based Thycotic, a privileged account security firm. This is a second part of a two-part Q&A session Carson did with Security Now.
Carson holds several security certifications and he is a cybersecurity advisor to several governments around the world. In the first part of the interview, Carson spoke about personal privacy -- an area of particular interest to him. (See
Thycotics Joseph Carson: Hackers Will Soon Read Your Mind
.)
In this second part, Carson offers his thoughts about encryption at a national level, government security concerns and the growing threat of ransomware.
Simon Marshall for Security Now
: So, encryption and government bodies are two things that you believe are at loggerheads. Why is that?
Joseph Carson
: This issue is going to be huge. The problem we have is that governments have one hammer, and they treat all cybercrime with that same hammer, even though it involves different cyber attack models, different people, across different borders and in different locations. Theyre trying to use the same hammer to solve a multitude of very different problems.
Joseph Carson, chief security scientist at Thycotic

(Source:
Thycotic
)
SN
: There have been declarations from a few governments seemingly centered on whether they think encryption is a help or a hindrance, right? Banning is seen as exercising the hammer?
JC
: Most cybercrime is committed across borders. Were in a much safer world today than we were 20 years ago. But if you get rid of the good things that encryption provides versus the few unfortunate events that slip through, youre making a mistake. For example, when I hear the
Australian prime minister come out and say
we have to ban encryption, Im deeply concerned.
Russia banned the use of encryption -- that is, using a VPN to access prohibited websites. But they knew they couldnt prohibit encryption itself, so they banned the act of encrypting. Which I think is an interesting approach, because it shows where we can all be much more flexible.
In my world of digital forensics, I look at two things. I look at the attack motive and I follow the money. What we should be criminalizing is the motive -- the criminal activity rather than the solution thats being used to protect against it; someone may drive while theyre shooting off weapons, but lets not ban driving itself.
SN
: So, whats your solution?
JC
: There are certain things we can do, and I think the motives and actions should be punished, not the tool that in itself acts as a solution. And this is where the industry will come head-to-head with governments, because governments need to understand they should be focused on discovering the illegal activities, rather than coming down on encryption controls.
SN
: Do governments understand enough about encryption to even know if their actions are going to benefit cybersecurity?
JC
: Well, theres a need to have better government intelligence and better ways of gathering it. However, theres a lack of understanding about encryption at that level. Encryption is not the problem, its a solution. Ultimately what happens is that if someone bans encryption in their own country, theyre harming themselves.
The opposite position is a challenge too. What if all intellectual property, healthcare records, and personal financial information are open to the world? Where are the boundaries for that? Its a ridiculous idea to believe that a society can be completely open. Would governments choose to keep their own information encrypted, but not the data of its citizens? Governments really dont understand encryption or even the use cases. They dont understand the challenges that encryption solves.
SN
: Is there a tipping point that exemplifies this sort of situation?
JC
: The tipping point was when the FBI went to Apple and tried to get
backdoor access to iPhones
, and that failed through the court system. When you have a government going directly to a private company, or another state, or even another country outside of the US, and theyre privately paying to unlock a phone, we see one country paying another to gain access to a device But that implies that the solution could be sold to everyone else too. If we go further, into political or presidential election outcomes, it implies we may have hacking groups who can work both hands.
SN
: I really worry about the trading of stolen consumer or governmental data for financial gain. A good example is ransomware. There were reportedly very poor returns in ransom fees for WannaCry. What do you think about that?
JC
: Well, look at who had the motive to do this, and where the money went. The thing with ransomware is that it has multiple impacts. One is that data can be destroyed, another is that theres a financial reward for the criminals. But in other cases Ive been tracking, depending on the cryptocurrency the demand is in, ransomware can cause currency manipulation by misdirection. I actually believe that WannaCry was one of the biggest currency manipulations in history.
SN
: How so?
JC
: Hackers today are very smart. They want to make money legally versus illegally. WannaCry was not one single actor, but multiple actors. One set of people created a distraction. One set created the payload and delivered it. The group who executed it were not interested in the financial ransom result, they were interested in misdirection from the fact they were manipulating the valuation of the coin.
SN
: How did you come to that conclusion?
JC
: If you look at actual transactions in Bitcoin at the time, there was a significant transaction to buy Bitcoins. Then, about two weeks after the WannaCry hit, someone exited Bitcoin with a half a million-dollar transaction, at a steep profit. The person executing the manipulation part was smart compared to the person who did the payload delivery, who didnt get the anticipated financial ransom return.
SN
: Misdirection is troubling -- does the concept apply elsewhere?
JC
: Well, lets just say that if you hack a company, and you want to get away without being caught, you can misdirect from certain actions, and that allows you the window to destroy or corrupt the log and history of your digital footprints. If the target company is overly focused on getting up and running again, they might not notice that they have been subject to insider trading.
Related posts:
A New Fence: The Software-Defined Perimeter
The 5 Nightmare (Breaches) Before Halloween
Risk & Reality Take Different Paths in Cybersecurity
— Simon Marshall, Technology Journalist, special to Security Now

Last News

▸ There are plenty of online tools for reporting bugs. ◂
Discovered: 23/12/2024
Category: security

▸ 27 Million South Koreans Hit by Online Gaming Theft. ◂
Discovered: 23/12/2024
Category: security

▸ Homeland Security Background Checks Breach Raises Concerns. ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Thycotics Joseph Carson: Government & Encryption Issues Will Be Huge