August 15, 2017 By Shane Schick 2 min read

Encryption may make terrorist activity more difficult to track, but the trade-offs in improved cybersecurity protection are worth it, according to the former head of Britain’s MI5 service.

Cybersecurity Risks

In a recent interview with BBC Radio 4, Jonathan Evans said that recent attacks by militants in the U.K. are not a reason to increase risks by weakening encryption systems. As cybercriminals use more sophisticated techniques to penetrate government and private sector organizations, he argued, it’s important to remember the variety of threats facing the public and use whatever measures necessary to ward them off. Evans was chief of the British spy operations for six years and spent 33 years with the organization before he left in 2013.

As Business Insider reported, Evans has no illusions about the dangers technology can introduce. He said that the Dark Web, where online activity is more private, has allowed child abuse, leaks of sensitive government information and other criminal activity to take place more easily. Evans also predicted that cybersecurity attacks will continue to come from a variety of places — including the Internet of Things (IoT), which he suggested needs greater protection.

Weakening Encryption

To some extent, The Guardian suggested, Evans’ comments may be in reaction to British Home Secretary Amber Rudd. She has been criticizing encryption in messaging apps as a tool to hide militant activity.

But as Reuters pointed out, Evans is not the only one who is concerned about the impact of weakened encryption on cybersecurity threats. A senior official with the U.K.’s intelligence agency GCHQ, for example, suggested that law enforcement officials could work more collaboratively with technology firms who maintain communication systems. That way, officials would be able to intercept communications by malicious actors, rather than reduce the strength of the underlying systems.

In any case, Evans believes that foiling militants will take at least 30 years — which means that weakening encryption could be a short-term and premature move.

More from

When ransomware kills: Attacks on healthcare facilities

4 min read - As ransomware attacks continue to escalate, their toll is often measured in data loss and financial strain. But what about the loss of human life? Nowhere is the ransomware threat more acute than in the healthcare sector, where patients’ lives are literally on the line.Since 2015, there has been a staggering increase in ransomware attacks on healthcare facilities. And the impacts are severe: Diverted emergency services, delayed critical treatments and even fatalities. Meanwhile, the pledge some ransomware groups made during…

AI and cloud vulnerabilities aren’t the only threats facing CISOs today

6 min read - With cloud infrastructure and, more recently, artificial intelligence (AI) systems becoming prime targets for attackers, security leaders are laser-focused on defending these high-profile areas. They’re right to do so, too, as cyber criminals turn to new and emerging technologies to launch and scale ever more sophisticated attacks.However, this heightened attention to emerging threats makes it easy to overlook traditional attack vectors, such as human-driven social engineering and vulnerabilities in physical security.As adversaries exploit an ever-wider range of potential entry points…

4 trends in software supply chain security

4 min read - Some of the biggest and most infamous cyberattacks of the past decade were caused by a security breakdown in the software supply chain. SolarWinds was probably the most well-known, but it was not alone. Incidents against companies like Equifax and tools like MOVEit also wreaked havoc for organizations and customers whose sensitive information was compromised.Expect to see more software supply chain attacks moving forward. According to ReversingLabs' The State of Software Supply Chain Security 2024 study, attacks against the software…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today