The Times Real Estate


.

  • Written by Susan Landau, Professor of Computer Science, Law and Diplomacy and Cybersecurity, Tufts University
Encrypted smartphones secure your identity, not just your data

Smartphones store your email, your photos and your calendar. They provide access to online social media sites like Facebook and Twitter, and even your bank and credit card accounts. And they’re keys to something even more private and precious – your digital identity.

Through their role in two-factor authentication systems[1], the most commonly used secure digital identity protection method[2], smartphones have become essential to identifying people both online and off. If data and apps on smartphones are not secure, that is a threat to people’s identities, potentially allowing intruders to pose as their targets on social networks, email, workplace communications and other online accounts.

As recently as 2012, the FBI recommended the public protect their smartphones’ data[3] by encrypting it. More recently, though, the agency[4] has asked phone makers[5] to provide a way to get into encrypted devices[6], what police call “exceptional access[7].” The debate so far has focused on data privacy, but that leaves out a vital aspect of smartphone encryption: its ability to secure people’s personal online identities.

As I wrote in my recent book, “Listening In: Cybersecurity in an Insecure Age[8],” doing what the FBI wants – making phones easier to unlock – necessarily decreases users’ security. A recent National Academies of Sciences, Engineering and Medicine study[9], in which I participated, also warns that making phones easier to unlock potentially weakens this key element of securing people’s online identities.

Gathering evidence or weakening security?

In recent years, police have sought access to suspects’ smartphones as part of criminal investigations, and technology companies have resisted. The most prominent of these situations arose in the wake of the 2015 San Bernardino mass shooting[10]. Before the attackers themselves were killed in a shootout, they were able to destroy their computers and phones – except one, a locked iPhone. The FBI wanted the phone decrypted[11], but worried that failed attempts to crack Apple’s security mechanisms could cause the phone to delete all its data[12].

The agency took Apple to court[13], seeking to force the company to write special software to avoid the phone’s built-in protections. Apple resisted, arguing that the FBI’s effort was government overreach that, if successful, would decrease all iPhone users’ safety[14] – and, by extension, that of all smartphone users.

The conflict was resolved when the FBI paid a cybersecurity firm to break into the phone[15] – and found nothing of relevance[16] to the investigation. But the bureau remained steadfast that investigators should have what they called “exceptional access[17],” and what others called a “back door[18]”: built-in software allowing police to decrypt locked phones.

The importance of two-factor authentication

The situation is not as simple as the FBI suggests[19]. Secure phones do provide barriers to police investigations, but they are also an excellent component of strong cybersecurity. And given the frequency of cyberattacks and the diversity of their targets, that’s extremely important.

In July 2015, U.S. officials announced that cyberthieves had stolen[20] the Social Security numbers, health and financial information and other private data of 21.5 million people[21] who had applied for federal security clearances from the U.S. Office of Personnel Management. In December 2015, a cyberattack at three electricity companies in Ukraine left a quarter of a million people without power for six hours[22]. In March 2016, countless emails were stolen[23] from the personal Gmail account[24] of John Podesta, chairman of Hillary Clinton’s presidential campaign.

In each of these cases, and many more around the world since[25], a poor security practice – securing accounts solely through passwords – let bad guys do serious damage. When login credentials are easy to crack, intruders get in quickly – and can go unnoticed for months[26].

The technology to secure online accounts lies in people’s pockets. Using a smartphone to run a piece of software called two-factor (or second-factor) authentication[27] makes logging into online accounts far harder for the bad guys. Software on the smartphone generates an additional piece of information that a user must supply, beyond a username and password, before being allowed to login.

At present, many smartphone owners use text messages as a second factor, but that’s not good enough. The U.S. National Institute of Standards and Technology warns that texting is far less secure[28] than authentication apps: Attackers can intercept texts[29] or even convince a mobile company to forward the SMS message to another phone. (It’s happened to Russian activists[30], Black Lives Matter activist DeRay Mckesson[31], and others[32].)

A safer version is a specialized app, like Google Authenticator[33] or Authy[34], which generates what are called time-based one-time passwords. When a user wants to login to a service, she provides a username and password, and then gets a prompt for the app’s code. Opening the app reveals a six-digit code that changes every 30 seconds. Only upon typing that in is the user actually logged in. A Michigan startup called Duo[35] makes this even easier: After a user types in a username and password, the system pings the Duo app on her phone, allowing her to tap the screen to confirm the login.

However, these apps are only as secure as the phone itself is. If a smartphone has weak security, someone who has possession of it can gain access to a person’s digital accounts, even locking the owner out. Indeed, not long after the iPhone debuted in 2007, hackers developed techniques[36] for hacking into lost and stolen phones[37]. Apple responded[38] by building better security[39] for the data on its phones[40]; these are the same set of protections that law enforcement is now seeking to undo.

Avoiding disaster

Using a phone as a second factor in authentication is convenient: Most people carry their phones all the time, and the apps are easy to use. And it’s secure: Users notice if their phone is missing, which they don’t if a password is lifted. Phones as second-factor authenticators offer a vast increase in security beyond just usernames and passwords.

Had the Office of Personnel Management been using second-factor authentication, those personnel records wouldn’t have been so easy to lift. Had the Ukrainian power companies been using second-factor authentication for access to the internal networks controlling power distribution, the hackers would have found it much harder to disrupt the power grid itself. And had John Podesta been using second-factor authentication, Russian hackers would not have been able to get into his Gmail account, even with his password.

The FBI contradicts itself on this important issue. The agency has suggested the public use two-factor authentication[41] and requires it[42] when police officers want to connect to federal criminal justice database systems[43] from an insecure location such as a coffee shop or even a police car. But then the bureau wants to make smartphones easier to unlock, weakening its own system’s protections.

Yes, phones that are difficult to unlock impede investigations. But that misses a larger story. Online crime is sharply increasing, and attacks are growing more sophisticated. Making phones easy for investigators to unlock will undermine the best way there is for ordinary people to secure their online accounts. It’s a mistake for the FBI to be pursuing this policy.

References

  1. ^ two-factor authentication systems (theconversation.com)
  2. ^ secure digital identity protection method (pages.nist.gov)
  3. ^ recommended the public protect their smartphones’ data (www.ic3.gov)
  4. ^ the agency (www.cnn.com)
  5. ^ asked phone makers (www.reuters.com)
  6. ^ get into encrypted devices (www.brookings.edu)
  7. ^ exceptional access (theconversation.com)
  8. ^ Listening In: Cybersecurity in an Insecure Age (yalebooks.yale.edu)
  9. ^ National Academies of Sciences, Engineering and Medicine study (www.nap.edu)
  10. ^ 2015 San Bernardino mass shooting (www.nytimes.com)
  11. ^ wanted the phone decrypted (www.nytimes.com)
  12. ^ delete all its data (www.wired.com)
  13. ^ took Apple to court (cryptome.org)
  14. ^ decrease all iPhone users’ safety (cryptome.org)
  15. ^ paid a cybersecurity firm to break into the phone (www.theguardian.com)
  16. ^ nothing of relevance (fortune.com)
  17. ^ exceptional access (www.cnn.com)
  18. ^ back door (www.hrw.org)
  19. ^ not as simple as the FBI suggests (www.reuters.com)
  20. ^ cyberthieves had stolen (www.nytimes.com)
  21. ^ 21.5 million people (www.nytimes.com)
  22. ^ a quarter of a million people without power for six hours (www.wired.com)
  23. ^ countless emails were stolen (www.newyorker.com)
  24. ^ personal Gmail account (theconversation.com)
  25. ^ many more around the world since (theconversation.com)
  26. ^ go unnoticed for months (www.wired.com)
  27. ^ two-factor (or second-factor) authentication (theconversation.com)
  28. ^ warns that texting is far less secure (fortune.com)
  29. ^ intercept texts (www.theverge.com)
  30. ^ Russian activists (fortune.com)
  31. ^ Black Lives Matter activist DeRay Mckesson (www.baltimoresun.com)
  32. ^ others (www.nytimes.com)
  33. ^ Google Authenticator (support.google.com)
  34. ^ Authy (authy.com)
  35. ^ Duo (duo.com)
  36. ^ hackers developed techniques (www.lawfareblog.com)
  37. ^ hacking into lost and stolen phones (www.nytimes.com)
  38. ^ Apple responded (www.intego.com)
  39. ^ building better security (www.technologyreview.com)
  40. ^ data on its phones (www.slate.com)
  41. ^ suggested the public use two-factor authentication (www.fbi.gov)
  42. ^ requires it (authanvil.com)
  43. ^ federal criminal justice database systems (www.fbi.gov)

Authors: Susan Landau, Professor of Computer Science, Law and Diplomacy and Cybersecurity, Tufts University

Read more http://theconversation.com/encrypted-smartphones-secure-your-identity-not-just-your-data-91715

Metropolitan republishes selected articles from The Conversation USA with permission

Visit The Conversation to see more