Page 3,015«..1020..3,0143,0153,0163,017..3,0203,030..»

The Encryption Debate in the European Union: 2021 Update – Carnegie Endowment for International Peace

Introduction

The encryption debate in the European Union (EU) continues to evolve, with new drivers, stronger tools, and increasingly higher stakes. The debate among policymakers and experts is maturing, but there is a widening knowledge gap between political elites and the public around encryption. In Europe, encryption is perceived in two conflicting ways. It is a tool for privacy and security and therefore is an essential component of Europes open societies and markets; but it is also argued to be a shroud for criminal activity and therefore an obstacle to law enforcement. Efforts to weaken or break encryption to combat crime also undermines European privacy and security.

Europes recent encryption debate was sparked in 2016 by a string of terror attacks that exposed flaws in Europes collective ability to counter terrorism. In the wake of these attacks, Europol and national law enforcement authorities pointed to encryption as a key threat and serious impediment to the detection, investigation, and prosecution of such criminal activity.1 With this, member states demanded a European policy solution to encryption,2 igniting the current EU-wide encryption debate.3

In 2017, the EU responded with a series of provisional, non-legislative measures to study the issue and expand training and resources for law enforcement. The measures focused on data at restdata stored on encrypted devicesbut also included informal discussions on end-to-end encryption with experts from law enforcement and the judiciary, academia, nongovernmental organizations (NGOs), over-the-top service providers, telecommunication providers, and the security industry.4

Maria Koomen leads the Open Governance Network for Europe, a joint initiative of the Open Government Partnership and Democratic Society.

Since then, an increase in reported child sexual abuse online has fueled and conflated the EU encryption debate, further driving political support for legislation to get around encryption. With this new driver, the current EU debate departs from previous iterations in the sophistication of its technical proposals, which go beyond previous law enforcement calls for mere backdoors and may set a dangerous precedent for other global debates to include technical solutions.

The European Commission, which began its current leadership term in 2019, has embarked on an ambitious set of priorities,5 including to create a Europe fit for the digital age. Its priorities focus on strengthening the right to privacy and connectivity, improving the free flow of data, and bolstering cybersecurity in Europeall of which are built upon strong encryption. So how can the EU balance political calls for legislation to break encryption with its priority to protect strong encryption?

Reports of online child sexual abuse have dramatically increased in the last decade. According to the U.S. National Center for Missing and Exploited Children, global reports of child abuse have risen from 23,000 in 2010 to over 725,000 in 2019.6 The EU has become the largest geographical hub of child sexual abuse material (CSAM) globally, with almost nine in ten reported URLs hosted in Europe.7

Of those reported, over 94 percent of cases were on Facebook and its platformsMessenger, Instagram, and WhatsAppusing content filtration technology.8 In the same year, Facebook announced its vision for a privacy-focused social network, including deployment of end-to-end encryption (E2EE) across its services.9 This would effectively render 70 percent of the CSAM cases on Facebook undetectable to both law enforcement and Facebook itself.

Facebooks announcement alarmed law enforcement and child protection organizations, whose response entrenched online child abuse as a key driver in Europes encryption debate. In response, European Commissioner for Home Affairs Ylva Johansson called for a technical solution to the problem of encryption.10 This language is reminiscent of that used by EU member states around encryption as an obstacle to antiterrorism in 2016,11 which effectively sparked the current encryption debate.

Reports of online child abuse, and the subsequent calls for lawful access to encrypted data for investigation, have continued to increase during the coronavirus pandemic as government-enforced lockdowns left children at home with minimal supervision.12 According to Europols 2020 Internet Organised Crime Threat Assessment,13 there was a sharp spike in reported CSAM, often on peer-to-peer networks like Facebook Messenger, although the report does not provide evidence to explain this spike. With more offenders isolated at home, the crisis also increased demand for CSAM by as much as 25 percent in some EU member states.14 Tragically, so long as the pandemic persists, offenders producing CSAM for a profit are expected to increase supply to meet the growing demand.15

In response, in July 2020, the European Commission launched two important strategiesone for combating child sexual abuse specifically, and another for updating the EUs Security Union Strategy more broadlywhich both pointed to encryption from a public safety and security standpoint as means for perpetrators to mask their identity and hide their actions from law enforcement.16 Specifically, the Strategy to Combat Child Sexual Abuse laid out a comprehensive plan including sector-specific regulations, operational efforts, and technical solutions, which highlight the role of the private sector and call on companies to detect and report child sexual abuse in E2EE communications. The updated EU Security Union Strategy confirmed that the EU will explore and support balanced technical, operational and legal solutions to these so-called challenges imposed by encryption and promote an approach which both maintains the effectiveness of encryption in protecting privacy and security of communications, while providing an effective response to crime and terrorism.

Later that summer, a leaked draft discussion paper revealed details behind the European Commissions thinking about technical solutions to detect CSAM in E2EE communications. The analysis of technical solutions presented in the draft was more technically nuanced than past rhetoric in EU encryption debates because it focused on the client side, or technology provider side, and the detection of CSAM. Unsurprisingly, however, the draft did not identify a silver bullet solution. Instead, as Mallory Knodel, chief technology officer at the Center for Democracy and Technology, pointed out, the draft made available a least bad option, which could be a persuasive, albeit manipulative, tactic. In fact, a new Global Encryption Coalition of privacy and free expression advocates argued that, although the discussion paper suggested some solutions may be less risky than others, each would put the privacy, safety, and security of billions of users worldwide at risk, ultimately making everyone including the children we are trying to protect more vulnerable to the crimes we collectively are trying to prevent.17

Meanwhile, an unintended legislative knotthe combination of gridlock over updates to privacy legislation, dubbed the ePrivacy Directive, and the sunset of the European Electronic Communications Codecreated legal ambiguity about whether it was lawful for technology platforms in the EU to filter electronic communications services for the detection of CSAM. Alarmed by the potential new challenge of scale in combating online child abuse, the European Commission proposed a so-called e-privacy derogation from the safeguards of the ePrivacy Directive to make it mandatory for companies to (continue to) filter content, encrypted or not, for CSAM. Negotiations among EU lawmakers stalled in December, with the European Parliament arguing that the proposal did not live up to EU privacy rules. While regulators all over the worlddemocratic and undemocraticare pushing for technology-based solutions to encryption, this debate showcases the complexity and conflicting interests involved.

Despite these conflicting interests, the German presidency of the Council of the European Union pressed ahead with a proposed council declaration on encryption. The proposal called for the creation of a balance between security through encryption and despite encryption.18 The proposal called on EU member states to join forces with the tech industry to jointly create this balance, and to define and establish a regulatory framework as well as innovative approaches and best practice to respond to these challenges.

Such political calls for exceptional access to encrypted content by EU member state justice ministers and international counterparts are being met with calls for stronger encryption to become the norm, from other government and institutional entities, as well as from civil society, academia, and industry.19 But can the EU really create such a balance to provide security through and despite encryption?

Legally, no. Existing EU-wide legislation identifies encryption as a possible measure to ensure an appropriate level of security for the protection of fundamental rights and data, and to strengthen cybersecurity.20 Considering the scale of the CSAM problem in Europe, though, the case could be made for an EU-level exception to either regulate against the use of encryption in certain circumstances or to warrant government access to encrypted data in the name of CSAM investigation and prosecution. However, as outlined in the May 2019 brief,21 even if EU legislation were to be passed, data access policies and capabilities differ among member states so problems with encryption in criminal investigations vary from one member state to another.22 This variation across member states, coupled with qualms of insufficient mutual legal assistance treaties (MLATs), was the problem that initially pushed the encryption debate to the EU level. In this framework, EU legislation would be ineffective as it would rely on existing member state capabilitiesor lack thereoffor enforcement.

Technically, no, not without effectively breaking or undermining encryption. As the European Commission outlined in its working document, there is no single technological solution to provide law enforcement access to encrypted data and rather several different solutions with varying degrees of effectiveness, feasibility, privacy, security, and transparency. However, these recommended solutions de facto break end-to-end encryption as they pre-filter messages before they are encrypted and sent.23 As digital rights watchdog Diego Naranjo argues, this undermines the crucial technological safeguard of encryption.24 Finally, even if the EU decided to adopt one of these technical models, it would have to rely on private industry actors for implementation.

In addition to legal and technical complexities, there are several risks of scanning and filtering encrypted communication for illegal content. For example, considering the universal condemnation of child abuse, CSAM may be the most feasible entry point to discuss encrypted communications. But in the context of combating terrorism and other harmful content, it is far more complex due to legal ambiguities of such content and the violations any scanning system could impose on users fundamental freedoms. Such technology would need to be paired with a robust legal framework with safeguards and accountability measures, or it would be up to industry alone to choose which technology to use in what circumstancesa choice that may come down to cost and feasibility to deploy. On the other hand, such technology could also be deployed to filter and target speech for the suppression of political dissidents, journalists, or human rights defenders.

Beyond filtration technologies, theres a range of cryptographic functionalities being developed for communication services that hand privacy and security controls over to platforms, third parties, or even users. One expert, Seny Kamara at Brown University, noted that companies are making it possible for users to verify or deny, or even anonymize different types of encryption settings when using communications services.25 This means that, if a user receives illegal content, they could unencrypt the conversation for reporting to law enforcement. However, even if these features became available to users, European governments and institutions would need to create clear, secure, and reliable paths for users to report such content to law enforcement, as well as awareness and redress mechanisms for those being reported.

Considering there are arguably no legal or technical recipes for such a balance between security through and despite encryption, the EU must create a political solution to its political question. Despite this and the legal complexities and technical risks involved the EUs calling on tech companies to create that balance confirms that a political solution isnt enough. As one critical observer tweeted, it is a clever political solution by the commission to solve the impossible problem of law enforcement agencies access without mandating encryption backdoors: put companies in charge of weakening the security of their own communication services!26 Further, any political solution would undermine previous calls for safeguarding communication that helps keep Europes online society and economy running.27

On encryption in general, the European Council adopted a resolution on encryption in November 2020, signaling EU member states readiness to join forces with industry, create said balance between security despite and through encryption, design a regulatory framework, and innovate investigative capabilities around encryption.28

In the meantime, the European Commission folded discussions about CSAM and encryption into the annual EU Internet Forum ministerial meeting on terrorism. In this years ministerial, which convened EU member states, online platforms,Europol,and academia, the commission presented the outcomes of its expert consultation processthe final version of its leaked working paperand in response, participants recognized the need to find technology solutions to challenges created by technology.29 Further, Home Affairs Commissioner Ylva Johansson urged council and parliament negotiators to come to an agreement on the e-Privacy Derogation, and revealed that the commission is working on permanent legislation on CSAM that makes it obligatory for tech companies to report and remove child sexual abuse, encrypted or not.30

Boldly, the European Parliament Intergroup on Childrens Rights warned that, without this legislation, the EU would become a safe haven for pedophiles.31 Diego Naranjo pointed out similar claims mixing encryption and scanning of private communications with riots and child abuse in the Guardian,32 the New York Times,33 and Fortune,34 warning that posing scanning of private communications as a dilemma between child protection and privacy is a false dichotomy, as children and activists, too, require privacy.35

With the continuation of such high-level political support for technical solutions, Europes encryption debate is further entrenched in debates around child sexual abuse and terrorismor, more broadly, criminality.

Looking forward, the European Commission is expected to communicate its ambition and strategy for achieving such solutions in spring 2021. What shape and direction they will take remains to be seen, but one can look to the commissions working document for a hint. The resolution is a step toward needed legal reform and a constructivealbeit vaguestart to necessary risk assessment and public consultation for a more nuanced debate around encryption in Europe.

However, despite the EU signaling readiness to proceed with a regulatory framework on encryption, and the EUs progress on forthcoming legislation to fight against CSAM online, much is still at stake for fundamental rights, rule of law, and democratic principles in the European debate around encryption.

European and international civil society organizations and industry players have coalesced around the topics and brought the European encryption debate from behind closed doors into the public domain. The European Digital Rights (EDRi) association addressed a series of open letters from civil society to the EU highlighting five fundamental rights problems of these pursuits as: (1) lacking clarity of services covered and the legal basis for current practices; (2) lacking impact assessment and key public consultations; (3) risking the normalization of exceptional measures; (4) empowering big tech companies, putting private companies in charge of surveillance and censorship mechanisms that, because of their impact on fundamental rights, should be the responsibility of public authorities; and (5) potentially attacking encryption.36

In a recent letter to the president of the European Commission, EDRi and signatories called for open consultation and public dialogue on the proposal to legislate encryption in the fight against CSAM. It also called on the European data protection supervisor and the Fundamental Rights Agency to work together with the EU institutions, civil society, and industry to find democratic solutions and acceptable legal framework for shared problems.37

Beyond these open letters and calls to action for stronger encryption, privacy and human rights advocates caution against using politically charged issues like terrorism and child abuse to justify weakening encryption for law enforcement because such rhetoric narrows the debate and fuels misunderstanding about encryptions larger role in the prevention and investigation of crime. These fundamental rights advocates are joined by wider civil society and some industry actors to argue against legislation that mandates law enforcement access to encrypted data because the benefit of strong widespread encryption to the public outweighs the relatively small obstacle it poses to law enforcement. The Center for Democracy and Technology, Global Partners Digital, and the Internet Society, plus more than thirty other civil society organizations have formed the above-mentioned Global Encryption Coalition to pool research and advocacy efforts toward stronger encryption worldwide. In the private sector, a tech alliance of small and medium-sized enterprises has formed under the name Encryption Europe, with a joint position for stronger encryption, zero backdoors, and transparency with regard to encryption algorithms.38

Looking ahead, considering the complexity of the debates around encryption and the essential role it plays in Europes open societies and markets, it is important that the EU takes next steps in close cooperation not only with industry but also with civil society in order to ensure public access to, deliberation on, and understanding of the issues and their implications as well as accountability.

1 The Internet Organised Crime Threat Assessment, Europol, September 28, 2016, https://www.europol.europa.eu/activities-services/main-reports/internet-organised-crime-threat-assessment-iocta-2016.

2 German-French Letter Concerning Cooperation Between Law Enforcement Agencies and Electronic Communication Service Providers, Council of the European Union, November 7, 2016, http://data.consilium.europa.eu/doc/document/ST-14001-2016-INIT/en/pdf.

3 Catherine Stupp, Give Member States Want EU-Wide Laws on Encryption, Euractiv, November 22, 2016, https://www.euractiv.com/section/social-europe-jobs/news/five-member-states-want-eu-wide-laws-on-encryption.

4 Maria Koomen, The Encryption Debate in the European Union, Carnegie Endowment for International Peace, May 30, 2019, https://carnegieendowment.org/2019/05/30/encryption-debate-in-european-union-pub-79220.

5 2021 Commission Work Programme From Strategy to Delivery, press release, European Commission, October 19, 2020, https://ec.europa.eu/commission/presscorner/detail/en/ip_20_1940.

6 National Center for Missing and Exploited Children, website, accessed March 13, 2021: https://www.missingkids.org/gethelpnow/cybertipline.

7 IWF 2019 Annual Report | Zero Tolerance, Internet Watch Foundation, April 27, 2020, https://www.iwf.org.uk/what-we-do/who-we-are/annual-reports.

8 2019 Reports by Electronic Service Providers (ESP), National Center for Missing and Exploited Children, 2019, https://www.missingkids.org/content/dam/missingkids/gethelp/2019-reports-by-esp.pdf.

9 Mark Zuckerberg, A Privacy-Focused Vision for Social Networking, Facebook, 2019, https://www.facebook.com/notes/mark-zuckerberg/a-privacy-focused-vision-for-social-networking/10156700570096634/.

10 Ylva Yohansson, Speech by Commissioner Johansson at Webinar on Preventing and Combating Child Sexual Abuse and Exploitation: Towards an EU Response, European Commission, June 9, 2020, https://ec.europa.eu/commission/commissioners/2019-2024/johansson/announcements/speech-commissioner-johansson-webinar-preventing-and-combating-child-sexual-abuse-exploitation_en.

11 Lucie Krahulcova, EU Ministers Are Targeting Encryption. We Need to Know More., Access Now, November 8, 2016, https://www.accessnow.org/eu-ministers-targeting-encryption-need-know.

12 Alasdair Sandford, Coronavirus: Half of Humanity Now on Lockdown as 90 Countries Call for Confinement, Euronews, April 2, 2020, https://www.euronews.com/2020/04/02/coronavirus-in-europe-spain-s-death-toll-hits-10-000-after-record-950-new-deaths-in-24-hou.

13 Exploiting Isolation: Offenders and Victims of Online Child Sexual Abuse During the COVID-19 Pandemic, Europol, June 19, 2020, https://www.europol.europa.eu/publications-documents/exploiting-isolation-offenders-and-victims-of-online-child-sexual-abuse-during-covid-19-pandemic; and Europol, Internet Organised Crime Threat Assessment, October 5, 2020, https://www.europol.europa.eu/activities-services/main-reports/internet-organised-crime-threat-assessment-iocta-2020.

14 Ibid.

15 Ibid.

16 Communication from the Commission on the EU Security Union Strategy, European Commission, July 24, 2020, https://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:52020DC0605&from=EN; and Communication from the Commission on the EU Strategy for a More Effective Fight Against Child Sexual Abuse, European Commission, July 24, 2020, https://ec.europa.eu/home-affairs/sites/homeaffairs/files/what-we-do/policies/european-agenda-security/20200724_com-2020-607-commission-communication_en.pdf.

17 Breaking Encryption Myths, Global Encryption Coalition, November 19, 2020, https://www.globalencryption.org/2020/11/breaking-encryption-myths/.

18 Draft Council Declaration on Encryption Security Through Encryption and Security Despite Encryption, Council of the European Union, October 21, 2020, https://data.consilium.europa.eu/doc/document/ST-12143-2020-INIT/en/pdf.

19 Statewatch, Germany Asks What Should the EU Do About Encryption for Law Enforcement?, European Digital Rights (EDRi), October 14, 2020, https://edri.org/our-work/germany-asks-what-should-the-eu-do-about-encryption-for-law-enforcement/.

20 Article 32(1a), 34(3a), 6(4e), recital (83) of Regulation (EU) 2016/679 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC; recital (60), article 31(3a) of the Law Enforcement Directive; recital (20) in conjunction with article 4 of the ePrivacy Directive 2002/58/EC; recital (40) of Regulation (EU) 2019/881 (Cybersecurity Act).

21 Koomen, The Encryption Debate in the European Union.

22 Europol and Eurojust, Second Report of the Observatory Function on Encryption, Europol, February 18, 2020, https://www.europol.europa.eu/publications-documents/second-report-of-observatory-function-encryption

23 Patrick Beuth, Verschlsselung bitte nur fr gute Menschen, Spiegel Netzwelt, September 8, 2020, https://www.spiegel.de/netzwelt/netzpolitik/eu-kommission-gegen-kindesmissbrauch-verschluesselung-bitte-nur-fuer-gute-menschen-a-8db88bf2-29c8-495c-83e9-818bf05d7d85.

24 Diego Naranjo, Open Letter: Civil Society Views on Defending Privacy While Preventing Criminal Acts, European Digital Rights, October 27, 2020, https://edri.org/wp-content/uploads/2020/10/20201020-EDRi-Open-letter-CSAM-and-encryption-FINAL.pdf.

25 Seny Kamara, Content Moderation in E2EE Systems: What Is Actually Possible?, online event, Center for Democracy and Technology, December 9, 2020, https://www.youtube.com/watch?v=khqdw6-9B7Q&ab_channel=CenterforDemocracy%26Technology.

26 Jesper Lund on Twitter, September 24, 2020, https://twitter.com/je5perl/status/1309099006505750529.

27 Cybersecurity, European Commission, accessed March 16, 2021: https://ec.europa.eu/digital-single-market/en/cybersecurity.

28 Council Resolution on Encryption Security Through Encryption and Security Despite Encryption, Council of the European Union, November 24, 2020, https://data.consilium.europa.eu/doc/document/ST-13084-2020-REV-1/en/pdf.

29 EU Internet Forum Ministerial: Towards a Coordinated Response to Curbing Terrorist and Child Sexual Abuse Content on the Internet, European Commission, January 26, 2021, https://ec.europa.eu/home-affairs/news/eu-internet-forum-ministerial-towards-coordinated-response-curbing-terrorist-and-child-sexual_en.

30 Commissioner Ylva Johansson, Commissioner Johanssons speech at the EU Internet Forum Ministerial Meeting, European Commission, January 25, 2021, https://ec.europa.eu/commission/commissioners/2019-2024/johansson/announcements/commissioner-johanssons-speech-eu-internet-forum-ministerial-meeting_en.

31 Co-chairs of the Intergroup on Childrens Rights, We Cannot Risk That the EU Becomes a Safe Haven for Paedophiles, Vote for Children, January 22, 2021, https://www.childrightsmanifesto.eu/we-cannot-allow-the-eu-to-become-a-safe-haven-for-paedophiles-and-sexual-predators-online/.

32 Vikram Dodd, Facebooks Encryption Plans Could Help Child Abusers Escape Justice, NCA Warns, Guardian, November 23, 2020, https://www.theguardian.com/uk-news/2020/nov/23/facebooks-encryption-plans-could-help-child-abusers-escape-justice-nca-warns.

33 Brian X. Chen and Kevin Roose, Are Private Messaging Apps the Next Misinformation Hot Spot?, New York Times, February 3, 2021, https://www.nytimes.com/2021/02/03/technology/personaltech/telegram-signal-misinformation.html.

34 Jonathan Vanian, Private Messaging Apps Signal and Telegram Are Red Hot After the Capitol Riots, Fortune, January 14, 2021, https://fortune.com/2021/01/13/messaging-apps-signal-telegram-capitol-riots/.

35 Diego Naranjo, Wiretapping Childrens Private Communications: Four Sets of Fundamental Rights Problems for Children (and Everyone Else), European Digital Rights, February 10, 2021, https://edri.org/our-work/children-private-communications-csam-fundamental-rights-issues/.

36 Statewatch, Germany Asks What Should the EU Do About Encryption for Law Enforcement?, European Digital Rights (EDRi), October 14, 2020, https://edri.org/our-work/germany-asks-what-should-the-eu-do-about-encryption-for-law-enforcement/.

37 Naranjo, Open Letter.

38 Position Paper: An Introduction to Encryption in Europe, Encryption Europe, January 2021, https://encryptioneurope.eu/positionpaper/.

Go here to see the original:
The Encryption Debate in the European Union: 2021 Update - Carnegie Endowment for International Peace

Read More..

Email Encryption Market worth $11.8 billion by 2026 – Exclusive Report by MarketsandMarkets – PRNewswire

CHICAGO, April 2, 2021 /PRNewswire/ -- According to the new market research report "Email Encryption Marketby Component (Solutions & Services), Type (End-To-End, Gateway, Hybrid, and Client Plugins), Deployment Mode (On-premises & Cloud), Organization Size, Vertical (BFSI, IT & ITeS, and Telecom), and Region - Global Forecast to 2026", published by MarketsandMarkets, the global Email Encryption Market size is projected to grow from USD 3.4 billion in 2020 to USD 11.8 billion by 2026, at a Compound Annual Growth Rate (CAGR) of 23.1% during the forecast period. Major driving factors for the market include rise in BEC scams and spear phishing, growing number of email users globally, high demand for cloud-based email encryption services, and mandate to comply with data protection directives.

Browse in-depth TOC on"Email Encryption Market"

349 Tables79 Figures317 Pages

Download PDF Brochure: https://www.marketsandmarkets.com/pdfdownloadNew.asp?id=182623205

By component, the services segment to register the highest growth rate during the forecast period

The services segment includes various services that are required to deploy, execute, and maintain the email encryption platform in an organization. As the adoption of the email encryption platform increases, the demand for these services is also expected to increase. Email encryption can be provided through Managed Security Services (MSS) analysts who provide remote assistance and incident response to clients in case of suspicious activities. These services include training and education, and support and maintenance. As the adoption of the email encryption platform increases, the demand for these services is also expected to soar. Email encryption services ensure 24/7 protection against increasing sophisticated architectures, SOCs manned by security experts, and quick incident response services. Email encryption vendors offer customized subscriptions and professional services for threat intelligence, threat prevention, detection, and response to assist end users in easy planning and deployment of email encryption platform.

Based on vertical, the healthcare segmentto grow at the highest CAGR during the forecast period

The healthcare industry comprises a global infrastructure that deals with continuous health-related data exchange. There has been an increase in the number of cyberattacks, such as ransomware and misinformation campaigns on healthcare organizations with electronic protected health information (ePHI), personally identifiable information (PII), and electronic health records (EHR) with the COVID-19 outbreak. Email phishing attacks have spiked due to COVID-19, more so, across the healthcare sector. The American Marketing Association (AMA) and the American Health Association (AHA) have partnered on COVID-19 cyber threats guidance for hospitals and physicians, including recommendations regarding VPNs and cloud-based services, COVID-19-themed phishing emails, telehealth deployments, and medical-device security. The healthcare industry remains one of the most highly targeted for cyberattacks. With the adoption of technologies such as BYOD and centralized patient information, the vertical has become highly susceptible to cyber-attacks. The email encryption technology has emerged as a valid solution to address issues, such as data security, patient safety, and enhanced productivity, to accelerate the overall process.

Request Sample Pages: https://www.marketsandmarkets.com/requestsampleNew.asp?id=182623205

North America to hold the largest market shareduring the forecast period.

North America has several prominent market players delivering email encryption solutions to all end-users in the region. The US and Canada both have strong economic conditions and are expected to be major contributors to the Email Encryption Markets growth. The geographical presence, significant Research and Development (R & D) activities, partnerships, and acquisitions and mergers are the major factors for deploying email encryption and services.

Market Players:

Key and innovative vendors in the Email Encryption Market include Micro Focus (UK), Broadcom (US), Cisco (US), Trend Micro (Japan), Sophos (UK), Proofpoint (US), BAE Systems (UK), Zix (US), Entrust Datacard (US), Mimecast (UK), Egress Software (UK), ProtonMail (Switzerland), Trustifi (US), Barracuda Networks (US), Intemedia (US), Clearswift (UK), Virtru (US), Echoworx (Canada), NeoCertified (US), Deltagon (Finland), DeliverySlip (US), Hornetsecurity (Germany), Datamotion (US), Virtru (US), Smarsh (US), Retarus (Germany), Lux Sci (US), Cryptzone (US), SecureAge Technology (Singapore), Paubox (US), Sendinc (US), and Frama (Denmark).

Browse Adjacent Markets:Information Security Market ResearchReports & Consulting

Related Reports:

Messaging Security Marketby Solution (Content Filtering, Email Encryption, Data Loss Prevention, Antispam and Antimalware), Service, Mode of Communication (Email Messaging, Instant Messaging), Deployment Mode, Vertical, and Region - Global Forecast to 2022

https://www.marketsandmarkets.com/Market-Reports/messaging-security-market-41963086.html

Encryption Software Marketby Component (Software and Services), Application (Disk Encryption, File/Folder Encryption, Communication Encryption, Cloud Encryption), Deployment Mode, Enterprise Size, Vertical, and Region - Global Forecast to 2025

https://www.marketsandmarkets.com/Market-Reports/encryption-software-market-227254588.html

About MarketsandMarkets

MarketsandMarkets provides quantified B2B research on 30,000 high growth niche opportunities/threats which will impact 70% to 80% of worldwide companies' revenues. Currently servicing 7500 customers worldwide including 80% of global Fortune 1000 companies as clients. Almost 75,000 top officers across eight industries worldwide approach MarketsandMarkets for their painpoints around revenues decisions.

Our 850 fulltime analyst and SMEs at MarketsandMarkets are tracking global high growth markets following the "Growth Engagement Model GEM". The GEM aims at proactive collaboration with the clients to identify new opportunities, identify most important customers, write "Attack, avoid and defend" strategies, identify sources of incremental revenues for both the company and its competitors. MarketsandMarkets now coming up with 1,500 MicroQuadrants (Positioning top players across leaders, emerging companies, innovators, strategic players) annually in high growth emerging segments. MarketsandMarkets is determined to benefit more than 10,000 companies this year for their revenue planning and help them take their innovations/disruptions early to the market by providing them research ahead of the curve.

MarketsandMarkets' flagship competitive intelligence and market research platform, "Knowledge Store" connects over 200,000 markets and entire value chains for deeper understanding of the unmet insights along with market sizing and forecasts of niche markets.

Contact:Mr. Aashish MehraMarketsandMarkets INC.630 Dundee RoadSuite 430Northbrook, IL 60062USA: +1-888-600-6441Email: [emailprotected]Research Insight:https://www.marketsandmarkets.com/ResearchInsight/email-encryption-market.aspVisit Our Website: https://www.marketsandmarkets.com/Content Source: https://www.marketsandmarkets.com/PressReleases/email-encryption.asp

SOURCE MarketsandMarkets

Read more:
Email Encryption Market worth $11.8 billion by 2026 - Exclusive Report by MarketsandMarkets - PRNewswire

Read More..

UK Child Welfare Charity Latest To Claim Encryption Does Nothing But Protect Criminals – Techdirt

from the recoil-in-terror-as-mustachioed-Mr.-Encryption-ties-another-child-to-the-train-t dept

Once again, it's time to end encryption... for the children. That's the message being put out by the UK's National Society for the Prevention of Cruelty to Children (NSPCC). And that message is largely regurgitated word-for-word by Sky News:

In what it is calling the "biggest threat to children online", the NSPCC (National Society for the Prevention of Cruelty to Children) says safeguards need to be introduced so police can access the data if needed.

"The proposals to extend end-to-end encryption on messaging platforms mean they are essentially putting a blindfold on itself" says Andy Burrows, head of the NSPCC's child safety online policy.

"No longer will the social network be able to identify child abuse images that are being shared on its site, or grooming that's taking place on its site.

"Because abusers know they will be able to operate with impunity, therefore it means that not only will current levels of abuse go largely undetected, but it's highly likely that we'll see more child abuse."

Is it the "biggest threat?" That doesn't seem likely, especially when others who are concerned about the welfare of children say encryption is actually good for kids.

Here's ConnectSafely, a nonprofit headed by Larry Magid, who is on the board National Center for Missing and Exploited Children (NCMEC), which operates a clearinghouse for child porn images that helps law enforcement track down violators and rescue exploited children:

Some worry that encryption will make it harder for law enforcement to keep us safe, but I worry that a lack of encryption will make it harder for everyone, including children, to stay safe.

Phones and other digital devices can contain a great deal of personal information, including your current and previous locations, home address, your contacts, records of your calls and your texts, email messages and web searches. Such information, in the hands of a criminal, can not only lead to a violation of you or your childs privacy, but safety as well. Thats why its important to have a strong passcode on your phone as well as a strong password on any cloud backup services But even devices with strong passwords arent necessarily hacker proof, which is why its important that they be encrypted.

And here's UNICEF, which has long been involved with protecting children around the world:

There is no equivocating that child sexual abuse can and is facilitated by the internet and that endto-end encryption of digital communication platforms appears to have significant drawbacks for the global effort to end the sexual abuse and exploitation of children. This includes making it more difficult to identify, investigate and prosecute such offences. Children have a right to be protected from sexual abuse and exploitation wherever it occurs, including online, and states have a duty to take steps to ensure effective protection and an effective response, including support to recover and justice.

At the same time, end-to-end encryption by default on Facebook Messenger and other digital communication platforms means that every single person, whether child or adult, will be provided with a technological shield against violations of their right to privacy and freedom of expression.

Despite this being far more nuanced than the NSPCC is willing to admit, it's helping push legislation in the UK which would result in less child safety, rather than more. The Online Safety Bill would place burdens on communication services to prove they're making every effort to prevent child exploitation. And "everything" means stripping all users of end-to-end encryption because this protective measure means no one but the sender and receiver can see their communications.

The bill would make tech companies responsible for "failing" to police child porn -- with "failure" determined by "aggravating factors" like, you guessed it, offering end-to-end encrypted communications.

The following questions will help ascertain key risk aggravating factors (this is not an exhaustive list). Do your services:

allow users to create, share, promote, repost or share sentiment on any type of content?

offer private messaging spaces (both in access-controlled groups and as 1-to-1 messages)?

offer ephemeral, encrypted or self-deleting content?

use end-to-end encryption to place user content out of reach of provider moderation systems?

offer features that enable exchange of rich media including video (stored and livestreamed), audio, images, link sharing (including via URL shortening services), virtual reality, location sharing and contact details on other platforms or services?

offer user profiles that facilitate adults finding and contacting children and that may enable real-world identification of vulnerable people, including children?

This legislation -- and the cheerleading from entities like the NSPCC -- doesn't really do anything but turn tech companies into handy villains that are far easier (and far more lucrative) to punish. There's not going to be an influx of child porn just because communications are now encrypted. As critics of encryption have pointed out again and again, Facebook reports thousands of illegal images a year. So, a lack of encryption wasn't preventing the distribution of illicit images. Adding encryption to the mix is unlikely to change anything but how much is reported by Facebook.

We all use encryption. (I mean, hopefully.) Having access to encrypted communications hasn't nudged most people into engaging in criminal activity. That the same tech that protects innocent people is utilized by criminals doesn't make the tech inherently evil. It's the people that are evil.

As for law enforcement, it will still have plenty of options. Plenty of images will still be detected because lots of people are lazy or ignorant and use whatever's convenient, rather than what's actually secure. Encryption won't exponentially increase the amount of illicit content circulating the internet. If the FBI (and others) can successfully seize and operate dark web child porn sites, it's safe to say law enforcement will still find ways to arrest suspects and rescue children, even if encryption may make it slightly more difficult to do so.

Thank you for reading this Techdirt post. With so many things competing for everyones attention these days, we really appreciate you giving us your time. We work hard every day to put quality content out there for our community.

Techdirt is one of the few remaining truly independent media outlets. We do not have a giant corporation behind us, and we rely heavily on our community to support us, in an age when advertisers are increasingly uninterested in sponsoring small, independent sites especially a site like ours that is unwilling to pull punches in its reporting and analysis.

While other websites have resorted to paywalls, registration requirements, and increasingly annoying/intrusive advertising, we have always kept Techdirt open and available to anyone. But in order to continue doing so, we need your support. We offer a variety of ways for our readers to support us, from direct donations to special subscriptions and cool merchandise and every little bit helps. Thank you.

The Techdirt Team

Filed Under: children's charity, encryption, going dark, think of the children, ukCompanies: nspcc

View post:
UK Child Welfare Charity Latest To Claim Encryption Does Nothing But Protect Criminals - Techdirt

Read More..

The Home Office is preparing another attack on encryption – Wired.co.uk

The UK is planning a new attack on end-to-end encryption, with the Home Office set to spearhead efforts designed to discourage Facebook from further rolling out the technology to its messaging apps.

Home Secretary Priti Patel is planning to deliver a keynote speech at a child protection charitys event focused on exposing the perceived ills of end-to-end encryption and asking for stricter regulation of the technology. At the same time a new report will say that technology companies need to do more to protect children online.

Patel will headline an April 19 roundtable organised by the National Society for the Prevention of Cruelty to Children (NSPCC), according to a draft invitation seen by WIRED. The event is set to be deeply critical of the encryption standard, which makes it harder for investigators and technology companies to monitor communications between people and detect child grooming or illicit content, including terror or child abuse imagery.

End-to-end encryption works by securing communications between those involved in them only the sender and receiver of messages can see what they say and platforms providing the technology cannot access the content of messages. The tech has been increasingly made standard in recent years with WhatsApp and Signal using end-to-end encryption by default to protect peoples privacy.

The Home Office's move comes as Facebook plans to roll out end-to-end encryption across all its messaging platforms including Messenger and Instagram which has sparked a fierce debate in the UK and elsewhere over the supposed risks the technology poses to children.

During the event, the NSPCC will unveil a report on end-to-end encryption by PA Consulting, a UK firm that has advised the UKs Department for Digital Culture Media and Sport (DCMS) on the forthcoming Online Safety regulation. An early draft of the report, seen by WIRED, says that increased usage of end-to-end encryption would protect adults privacy at the expense of childrens safety, and that any strategy adopted by technology companies to mitigate the effect of end-to-end encryption will almost certainly be less effective than the current ability to scan for harmful content.

The report also suggests that the government devise regulation expressly targeting encryption, in order to prevent technology companies from engineer[ing] away their ability to police illegal communications. It recommends that the upcoming Online Safety Bill which will impose a duty of care on online platforms make it compulsory for tech companies to share data about online child abuse, as opposed to voluntary.

The Online Safety Bill is expected to require companies whose services use end-to-end encryption to show how effectively they are tackling the spread of harmful content on their platforms or risk being slapped with fines by communication authority Ofcom, which will be in charge of enforcing the rules. As a last resort, Ofcom could demand that a company use automated systems to winnow out illegal content from their services.

The NSPCC says that this set-up does not go far enough in reining in encryption: in a statement released last week, the charity urged the digital secretary, Oliver Dowden, to strengthen the proposed regulation, preventing platforms from rolling out end-to-end encryption until they can demonstrate that they can safeguard childrens safety. Facebook currently tackles the circulation of child sex abuse content on WhatsApp by removing accounts displaying forbidden images in their profile pictures, or groups whose names suggest an illegal activity. WhatsApp says it bans more than 300,000 accounts per month that it suspects of sharing child sexual abuse material.

Ofcom will have to meet a series of tests before it could take action on a regulated platform, says Andy Burrows, NSPCCs head of child safety online policy. That is about being able to require evidence of serious and sustained abuse, which is going to be practically very difficult to do because of end-to-end encryption will take away a significant amount of the reporting flow.

Burrows declined to comment directly about the event with the Home Secretary, and whether any policy announcement will be made then. In an email, a Home Office spokesperson wrote that end-to-end encryption poses an unacceptable risk to user safety and society. It would prevent any access to messaging content and severely erode tech companies ability to tackle the most serious illegal content on their own platforms, including child abuse and terrorism.

The Home Secretary has been clear that industry must step-up to meet the evolving threat, the spokesperson says.

Since Facebooks announcement on the extension of end-to-end encryption in 2019, Patel has grown increasingly impatient and vocal about the dangers of the technology publicly calling on Facebook to halt plans for end-to-end encryption, and bringing up the subjectin meetings with her US counterparts and the Five Eyes intelligence alliance of English-speaking countries.

While Dowden is working jointly with the Home Office taking part in conversations with Facebook on the matter in an online press conference on March 10 he said that end-to-end encryption will not be dealt with in the Online Safety Bill.

The comment has caused concern among observers. According to a person familiar with policy discussions, technology companies are now increasingly worried that the Home Office could issue a Technical Capability Notice (TCN) against Facebook that is: an injunction forbidding the company from switching to end-to-end encryption.

A TCN would allow investigators with a warrant to keep obtaining decrypted conversations on Instagram and Facebook Messenger, the platforms of main concern because they potentially allow unsolicited messaging between adults and children. In December last year, Sky News reported, quoting Home Office policy advisors, that a TCN would have become an option if the Online Safety Bill did not demand that Facebook kept its ability to spot child abuse a scenario that would arguably materialise if Facebook had its way with encryption.

Jim Killock, executive director at digital rights organisation Open Rights Group, says he is worried that the Home Office will be considering using a secret order (TCN) to force Facebook to limit or circumvent their encryption.

Facebook would be gagged from saying anything, Killock adds. Although the action would be targeted to Facebook only, he thinks that such a move would set a precedent.

One industry source who has spoken with government figures is sceptical that such a radical scenario will come to pass, pointing out that encryption has routinely been in the Home Offices crosshairs since Theresa Mays tenure as home secretary started in 2010, but that the technical difficulty and the unpopularity of outlawing encryption eventually always prevailed over the rhetorical posturing.

In a statement, a Facebook company spokesperson said that end-to-end encryption is already the leading security technology used by many services to keep people safe from having their private information hacked and stolen. Company executives have previously admitted that the increased rollout of end-to-end encryption will reduce the amount of child abuse reports it makes to industry monitoring groups.

Its full rollout on our messaging services is a long-term project and we are building strong safety measures into our plans, the spokesperson added.

Gian Volpicelli is a senior editor at WIRED. He tweets from @Gmvolpi

A dying child, a mothers love and the drug that changed medicine

Coronavirus vaccines are making some long Covid sufferers feel better

Upgrading your headphones on a budget? We tested all of Amazons cheapest sets

Listen to The WIRED Podcast, the week in science, technology and culture, delivered every Friday

Follow WIRED on Twitter, Instagram, Facebook and LinkedIn

Get WIRED Daily, your no-nonsense briefing on all the biggest stories in technology, business and science. In your inbox every weekday at 12pm UK time.

by entering your email address, you agree to our privacy policy

Thank You. You have successfully subscribed to our newsletter. You will hear from us shortly.

Sorry, you have entered an invalid email. Please refresh and try again.

Excerpt from:
The Home Office is preparing another attack on encryption - Wired.co.uk

Read More..

The use of VPNs and Encryption – General Security – BleepingComputer

I agree. Using a VPN for social media or reading emails is self defeating as your true identity is revealed anyways. No need for those. Daily web browsing does not need a VPN as there is no need for anonymity on the known internet. Need for a secure connections is normally supported by secure https connections, so using wifi hot spot the HTTPS still provides encryption such as for logins or emails.

What else is left over for some users to use a VPN other than illegal torrenting or something else illegal?

There are some people who need anonymity such as journalists or reports and perhaps gov't branches, but this group of people most likely use the TOR web. Or use both TOR and a VPN.

The VPN original purpose was for having company personnel to safely connect to company servers when away from the office and stayed secure. And this original purpose still exists for these people.

VPN marketing is snake oil. Pure and simple. Never used it and never needed it.

As for needing encrypted files or folders, either this is used for business/extreme security or something illegal.

The web is split off, saved and examined and probably unencrypted by the three letter groups anyways, so is there true privacy when using a VPN anyways? Probably not. Room 641 is just one example of splitting the internet and scanning it...https://en.wikipedia.org/wiki/Room_641A

Edited by 0lds0d, 31 March 2021 - 09:31 AM.

The rest is here:
The use of VPNs and Encryption - General Security - BleepingComputer

Read More..

EncroChat hearings delayed as lawyers seek disclosure on police hacking – ComputerWeekly.com

Court hearings into the EncroChat encrypted phone network compromised by French police have been delayed after lawyers requested prosecutors to disclose further evidence on law enforcements capabilities to decrypt communications.

The National Crime Agency (NCA) has made more than 1,550 arrests under Operation Venetic after the French Gendarmerie harvested millions of supposedly secure messages from the EncroChat cryptophone network, which police say was used by criminal groups.

Defence lawyers have argued that the disclosure of evidence has been made more difficult because disclosure officers do not understand the technical detail in documents relating to police hacking of the EncroChat encrypted phone network.

The courts are preparing to hear up to a dozen preparatory hearings that will decide on the lawfulness, admissibility and reliability of material retrieved from the EncroChat network the decisions in which will be binding on future prosecutions.

The NCA has not disclosed details of how many people have been charged under Operation Ventetic, the UKs response to the takedown of EncroChat, but it is understood that around 450 defendants are contesting their prosecutions across the UK.

Jonathan Kinnear QC is overseeing the national strategy for all 250 prosecution cases in the UK including dealing with legal challenges to the admissibility of EncroChat evidence for the Crown Prosecutions Organised Crime Division.

Speaking at a preparatory hearing, he said prosecution lawyers were working to process requests for discovery from defence lawyers.

He told a court that defence lawyers had submitted documents from public websites, some of which were marked top secret or top secret strap one in evidence.

We have been working on a response to defence disclosure requests and re-reviewing the disclosure position over the course of last week and this weekend, he said.

Given the complexity of the issues, including the technical nature of them and the sheer volume of the material involved, we have not yet completed that review. These are important issues that have an impact not just on this case, but on a significant number of other cases.

Defence lawyers raised new questions about the capabilities of law enforcement to decrypt live communications after Belgian and Dutch police announced they had infiltrated a second secure cryptophone network, Sky ECC.

Belgian and Dutch police disclosed during a press conference on 10 March 2021 that they had intercepted more than one billion encrypted messages from the Sky Cryptophone network, and had decrypted half of them.

Defence lawyers have raised questions over whether the joint operation between the UK, France and Holland had the ability to decrypt messages from EncroChat. If true, they argue, that would undermine facts presented in earlier court hearings.

If it turns out there have been investigations with the NCA or other British agencies, and that involves decryption of messages whilst in transmission, this is clearly disclosable and goes to the heart of the case, one defence lawyer told a judge the day after the announcement.

Experts are divided over how the French Gendarmerie obtained the decrypted messages, notes and photographs from the EncroChat network.

Classified documents leaked by former CIA whistleblower Edward Snowden show that the US and the UK have invested heavily in highly sensitive programmes to break the encryption of online communications.

The NSA and GCHQ developed capabilities to break the encryption web mail, encrypted chat, encrypted voice over IP (VoIP), virtual private networks (VPNs) and the encryption used by 4G mobile phone services.

Snowden documents reveal that theNSAs mission was to weaken encryption technologies by influencing encryption standards, forming partnerships with telecommunications companies and inserting vulnerabilities into commercial encryption systems.

Both EncroChat and Sky ECC phones use a form of encryption known as elliptical curve cryptography (ECC), which is suited to mobile applications as it offers small faster and more secure cryptographic keys than other forms of encryption.

Secure encryption relies on the ability of software to generate secret prime numbers randomly, often using pseudo-random number generators, to calculate encryption keys which are difficult for intelligence agencies to predict.

Internal NSA memos reported byThe New York Times suggest that the NSA had compromised at least one random number generator, called the Dual EC ERBG, which was adopted by the US National Institute of Standards and Technology and the International Standard Organisation.

Security company RSA, which used Dual EC ERBG by default in some of its security products, subsequently advised its customers to switch to alternative pseudo-random number generators.

A judgment by the Court of Appeal on 5 February 2021, however, found that French police had been able to use a software implant to access messages from phone handsets before they had been encrypted. They were automatically forwarded to a server set up by the French digital crime unit, C3N.

Defence lawyers said in a preliminary hearing that they suspected that disclosure officers do not understand a lot of the technical details in documents related to Operation Venetic.

There is far more likely to be a reliable disclosure exercise if there is an expert assisting a disclosure officer or even an expert appointed as a disclosure officer who can understand the significance of the material, one lawyer said.

The lawyer said the defence team had requested prosecution disclosure in November last year, but that it was making further reactive requests for disclosure following the takedown of Sky ECC in Belgium.

French investigators broke the supposedly secure EncroChat encrypted mobile phone network, used by 50,000 people worldwide, including 9,000 in the UK, in April 2020, after gaining access to the EncroChat servers discovered in a datacentre run by OVH in Roubaix.

Investigators installed software implants on tens of thousands of mobile phone handsets which, according to the court of appeal, retrieved supposedly secure messages, photographs and notes from the phones before they were encrypted.

The French have refused to disclose any details to the courts in the UK and European countries bringing prosecutions against EncroChat users about how the implants work, citing national defence reasons.

Further hearings have been put back to late April or early May.

More here:
EncroChat hearings delayed as lawyers seek disclosure on police hacking - ComputerWeekly.com

Read More..

Database Encryption Market 2021 Industry Size, Growth, Revenue, Global Statistics and Forecast to 2025 KSU | The Sentinel Newspaper – KSU | The…

The extensive usage of mobile devices, social media, and virtual storage among organizations and consumers has generated huge data which is vulnerable to loss. Such sensitive information is stored in the form of database and is warehoused in data centers or in virtual storages. Furthermore, companies store these databases in heterogeneous environments, ranging from business networks to diverse type of clouds. However, this vast and sensitive information is vulnerable to loss and breaches with the rising number of cyber-attacks. Thus, this encourages organizations to adopt robust database encryption software that offers multilevel encryption, regardless of the heterogeneous environment.

Recently Added a New Report by Big Market Research2021studies theGlobal Database Encryption Marketwith many aspects of the industry like the market size, market status, market trends, and forecast, the report also provides brief information of the competitors and the specific growth opportunities with key market drivers. Market segmentation by companies, region, and type forms an integral part of this report. Historical data available in the report supports the Database Encryption Market development on national, regional and international levels. This is an informative study covering the Database Encryption Market with in-depth analysis and portraying the current state of affairs in the industry.

Ask for a Sample PDF Copy of Database Encryption Market with Figures, Graphs and Tocs:https://www.bigmarketresearch.com/request-sample/2778861?utm_source=KSU&utm_medium=MWA

The core objective of the business intelligence report 2021 on theDatabase EncryptionMarket is to predict the industrys performance in the upcoming years and aid stakeholders in making well-informed decisions. The study stresses on the key trends and how those can be exploited to create future opportunities. The Database Encryption Market is also aids in developing counter approaches for major challenges faced by the industry. In the end, we examine some inside and outside variables that drive or breaking point of the Database Encryption Market.

NOTE:Our report highlights the major issues and hazards that companies might come across due to the unprecedented outbreak of COVID-19.

Market players have been discussed and profiles of leading players including Top Key Companies:

International Business Machines Corporation

Symantec Corporation

Intel Security (Mcafee)

Microsoft Corporation

Oracle Corporation

Netapp, Inc.

Hewlett-Packard Company

Vormetric

Sophos Ltd

Gemalto

Key questions answered in this report:

Talk to our Analyst / Ask for a discount on Database Encryption Market and Get More Information Related to This Report:https://www.bigmarketresearch.com/request-for-discount/2778861?utm_source=KSU&utm_medium=MWA

The Database Encryption Market is also characterized by a highly complex value chain involving product manufacturers, material suppliers, technology developers, and manufacturing equipment developers. Partnerships between research organizations and the industry players help in streamlining the path from the lab to commercialization. In order to also leverage the first mover benefit, companies need to collaborate with each other so as to develop products and technologies that are unique, innovative and cost effective.

How will this Market Intelligence Report Benefit You?

Get Access of Complete Copy of This Report and Avail Instant 10% Discount New Year Offerby Using Coupon Code [ORG123WA]:https://www.bigmarketresearch.com/checkout/sales/41069

The report includes the region-wise segmentation North America (United States, Canada and Mexico), Europe (Germany, France, UK, Russia and Italy), Asia-Pacific (China, Japan, Korea, India and Southeast Asia), South America (Brazil, Argentina, Colombia etc.), Middle East and Africa (Saudi Arabia, UAE, Egypt, Nigeria and South Africa) of the market. In the regional segmentation, the regions dominating the Database Encryption market are included along with the regions where the growth of the market is slow.

By the product type, the Database Encryption Market is primarily split into 2020-2025:

Transparent Encryption

Column-level Encryption

File-system Encryption

Application- Level Encryption

Key Management

By the end-users/application, the Database Encryption Market report covers the following segments 2020-2025:

SMBs

Enterprises

Conclusively, this report is a one stop reference point for the industrial stakeholders to get Database Encryption market forecast of till 2025. This report helps to know the estimated market size, market status, future development, growth opportunity, challenges, and growth drivers of by analyzing the historical overall data of the considered market segments.

You May Also Like Our Other Top Trending Reports:

For More Information Regarding Other Similar Trending Report Click on The Given Link:https://ksusentinel.com/2021/02/08/dispensary-software-market-2021-global-industry-forecasts-analysis-competitive-landscape-and-key-regions-analysis/

Contact us:Mr. Abhishek Paliwal5933 NE Win Sivers Drive, #205, Portland,OR 97220 United StatesDirect:+1-971-202-1575Toll Free:+1-800-910-6452E-mail:[emailprotected]

See the rest here:
Database Encryption Market 2021 Industry Size, Growth, Revenue, Global Statistics and Forecast to 2025 KSU | The Sentinel Newspaper - KSU | The...

Read More..

Ring Floodlight Cam now packs end-to-end encryption at $200 (Save 20%) – 9to5Toys

Amazon is currently offering the Ring Floodlight Camera for $199.99 shipped. Normally fetching $250, todays offer amounts to 20% in savings, marks the best weve seen since November, and comes within $10 of the all-time low. Rings Floodlight Camera brings 1080p feeds to your smart home alongside a pair of integrated floodlights. The 1,800-lumen output will automatically be triggered when motion is detected, which also pings your smartphone with an alert. Plus, Ring also rolled out end-to-end encryption on its Floodlight camera here for some added peace of mind. Rated 4.6/5 stars from over 26,000 customers.

Alternatively you could go with Rings Solar Floodlight kit at $110, but youd be ditching the built-in camera features noted above. This offering will still illuminate your driveway and the like with 1,200-lumens of brightness and even comes backed by a solar panel so you dont have to worry about charging batteries or running any wiring. Theres also a 4.5/5 star rating from over 1,600 customers to complete the package.

Today saw a 22% price cut go live on Aqaras 1080p camera which arrives with HomeKit Secure Video support at $55, but youll find plenty of other offers in our smart home guide. Thats alongside this collection of ongoingAnker eufy HomeKit camera deals which start at $29.

This bundle includes the Ring Floodlight Cam and an Echo Dot (3rd Gen).Alexa, talk to the front door. Talk to visitors through your Echo Dot when you connect your Ring camera with Alexa.Lets you see, hear and speak to visitors from your phone, tablet and PC.Sends alerts as soon as motion is detected.

FTC: We use income earning auto affiliate links. More.

Subscribe to the 9to5Toys YouTube Channel for all of the latest videos, reviews, and more!

Original post:
Ring Floodlight Cam now packs end-to-end encryption at $200 (Save 20%) - 9to5Toys

Read More..

IRONCLAD ENCRYPTION CORP : Bankruptcy or Receivership, Other Events, Financial Statements and Exhibits (form 8-K) – marketscreener.com

Item 1.03 Bankruptcy or Receivership.

Chapter 11 Reorganization Background and Developments

Background. On August 28, 2020, IronClad Encryption Corporation ("IronClad" orthe "Company") filed a voluntary petition for reorganization under Chapter 11 ofthe United States Bankruptcy Code, case number 20-34332 (the "Chapter 11 Case")in the United States Bankruptcy Court for the Southern District of Texas,Houston Division (the "Bankruptcy Court").

The bankruptcy petition and other subsequent documents filed by IronClad asdebtor and other parties-in-interest are available at the court's Internet homepage http://www.txs.uscourts.gov/ or at the Clerk's Office, United StatesBankruptcy Court, P. O. Box 61010, Houston, Texas 77208. If attempting toaccess the court's records, one will need to have a PACER subscription.

Recent developments. On March 17, 2021, at a hearing conducted by theBankruptcy Court, IronClad's Second Amended Combined Plan of Reorganization andDisclosure Statement (the "Plan"), as modified, was confirmed by order of theBankruptcy Court with a scheduled effective date of April 1, 2021. The courtorder confirming the Plan and a copy of the Plan are presented in full detail inExhibits 2.1 and 2.2 and are incorporated by reference into this Item 1.03.

Summary points. Features of the Plan provide for the treatment of six classesfor the claims and interests of creditors and equity holders. The pointssummarized below are not intended to be and are not a complete description ofthe Plan, and it is qualified in its entirety by reference to the full text ofthe Plan and related documents in the Exhibits.

Class 1: The Internal Revenue Service

oClaim to be paid in cash if allowed.

Class 2: Unsecured Creditors, Convenience Class

oClaims to be paid as allowed.

Class 3: General Class of Unsecured Claims

oClaims to be paid by promissory note as allowed (see discussion below).

Class 4: Allowed Unsecured Claims of the Lerner Class

oClaim to be paid in cash and promissory note (see below).

Class 5: Allowed Interests of Holders of Classes A and B of Common Stock

oShareholder interests and stock certificates are cancelled (see below).

Class 6: Allowed Interests of Holders of Preferred Stock, Series A

oShareholder interest and stock certificates are cancelled (see below).

Claims are deemed to be allowed unless a party-in-interest files an objection toa particular claim in which case a court order would be necessary to allow theclaim.

Class 3. Each creditor shall receive a Class 3 Plan Note (the "Note"; see formof the note in Exhibit 10.1). The principal amount of each Note will be 50% ofthe amount of the underlying claim and as allowed by a final court order (the"Principal").

Each Note is non-interest bearing, unsecured, and payable in quarterlyinstallments of 1/20th of the original Principal with the first quarterlypayment due on the first business day of the thirteenth month after the date ofthe Note. At its option, IronClad may prepay each Note and by so electing would

--------------------------------------------------------------------------------

be entitled to take advantage of defined prepayment discounts ranging from 50%to 10% depending on the timing and election of any prepayment by IronClad.

Class 4. Proofs of claims were filed by a set of individuals referred to as theLerner Parties. IronClad and the Lerner Parties mediated several disputes thatwere settled by a Mediated Settlement Agreement dated February 11, 2021 (a copyof which is included as Exhibit 9 within the Plan).

In exchange for assigning to IronClad the portfolio of patents granted andapplied for since its inception, the Lerner Parties will receive $500,000 incash and a note payable in the amount of $242,000 (the "Lerner Note"). TheLerner Note is secured by the patent portfolio, has an interest rate of zeropercent, and is payable in twelve monthly installments beginning on the last dayof the first month following the closing date of the Plan. IronClad, at itssole election, has the option to pay $142,000 of the loan Lerner Note withinninety days of the date of the note resulting in a waiver of any future paymentsand the loan deemed and marked as "paid in full".

Class 5. The interests of holders of IronClad's Class A and Class B CommonStock (which includes stock holdings, holdings of options and warrants, et al.)will be deemed cancelled. The Class A Common Stock will no longer exist andthus no longer be registered with the Securities and Exchange Commission ortradable on any stock exchange.

Class 6. The interests of the holder of IronClad's Preferred Stock, Series Awill be deemed cancelled.

Important. On the effective date of the Plan, all rights and interests of theholders of any common or preferred stock will be terminated and those holderswill not receive or retain any property or interest in property based on theirholding of any common or preferred stock.

On the effective date, IronClad will become a private company and will no longermaintain an obligation to be registered with the Securities and ExchangeCommission or to list the equity interest of the reorganized Company with anysecurities exchange.

Item 8.01 Other Events

Cautionary Note about Trading in IronClad's Common Stock

The Company has previously cautioned and continues to caution that trading inits securities during the pendency of the Bankruptcy Petitions is highlyspeculative and poses substantial risks.

IronClad's equity holders will experience a complete loss of the value of theirinvestment due to the complete cancellation of IronClad's Classes A and B of itsCommon Stock.

--------------------------------------------------------------------------------

Item 9.01 Financial Statements and Exhibits.

(d) Exhibits

Exhibit No. Description

2.1 * Order Confirming Second Amended Plan of Reorganization andApproving Disclosure as filed, heard and confirmed by the court onMarch 17, 2021 in the United States Bankruptcy Court for theSouthern District of Texas, Houston Division, Case Number 20-34332,Document 72 (including its Exhibits A, B and C; total pages: 69)2.2 * Second Amended Combined Plan of Reorganization and DisclosureStatement filed on February 15, 2021 in the United StatesBankruptcy Court for the Southern District of Texas, HoustonDivision, Case Number 20-34332, Document 44 (total pages: 231)2.3 * Order Granting Debtor's Motion to Approve Compromise ofControversies with Lerner Parties as filed and confirmed March 17,2017 in the United States Bankruptcy Court for the Southern Districtof Texas, Houston Division, Case Number 20-34332, Document 73(including its Exhibit 1 with sub-Exhibits A, B, C, and D; totalpages: 42)2.4 * Debtor IronClad Encryption Corporation's Motion to ApproveCompromise of Controversies with Lerner Parties , dated February11, 2021, and filed February 15, 2021 with The United StatesBankruptcy Court for the Southern District of Texas, HoustonDivision, Case Number 20-34332, Document 45 and eventually approvedby the court on March 17, 2021 (total pages: 56)10.1 * Form of Promissory Note to be issued to creditors in Class 3 .General Class of Allowed Unsecured Claims

* Filed with this Form 8-K.

Edgar Online, source Glimpses

Read the original post:
IRONCLAD ENCRYPTION CORP : Bankruptcy or Receivership, Other Events, Financial Statements and Exhibits (form 8-K) - marketscreener.com

Read More..

Opinion: Police scanners and Civil Rights – The Daily Post

OPINION

BY DAVE PRICEDaily Post Editor

Police scanners played an important role in the Civil Rights and anti-Vietnam War movements, according to Mountain View City Councilwoman Sally Lieber.

And this historic form of police transparency shouldnt be thrown into the dust bin of history, Lieber told her colleagues on council March 23.

I know a number of us recently had the occasion to attend the memorial service for Fred Hirsch from the plumbers union, Lieber said of the South Bay labor activist who died in December at age 87. He talked about his long involvement in the UFW (United Farm Workers union) and the Civil Rights movement, and how important scanners were as a tool for those movements, as well as the anti-war movement.

It was a primary tool for stopping and slowing racial injustices, Lieber said.

Not only did the police scanners allow protesters to know where the cops were, but they allowed the public to keep track of protests. And police tend to behave when they know the public is observing them.

Last summer, during the Black Lives Matter protests, the website Broadcastify, which rebroadcasts police radio transmissions, reports that it had record audience levels.

Lieber asked the other six members of council to put on their agenda the encryption question on a future council agenda.

Who is in charge of the police?

Mountain View Police Chief Chris Hsiung decided on his own without any public hearings or consultations with council to encrypt his departments radio communications. Chiefs in Palo Alto and Los Altos made the same decision. Menlo Park and Atherton are moving in that direction too.

Ive received a lot of comments from the community that the police department makes its own policy and the city council has no involvement in that, Lieber said.

If you ask me, the police shouldnt be making their own policies. They should be invited to provide their opinions about proposed policies, but the final decision should be that of the council members. Thats why we elect council members to set policy.

Its now up to the other council members to decide if they want to provide oversight of the police department. Palo Altos city council will discuss this on April 5. But Mountain View? Well see.

Lieber should be commended for trying to assert councils proper role of providing oversight when it comes to police.

Securing personal information

In the past two months since police switched to encrypted radios, and the public has been debating the issue, a myth has popped up: That the encryption of all police radio frequencies is the only way to protect the personal information of residents.

Thats never been the issue.

Nobody is arguing that police should disclose personal information over the air.

The issue is whether police departments should be allowed to take the extreme step of encrypting all transmissions, or take a more transparent approach that only cloaks confidential information but allows the public to hear the remaining police radio activity.

An October memo from the California Department of Justice gives cities two alternatives:

1. full encryption or

2. a system where broadcasts remain accessible to the public, but officers switch to a different frequency thats encrypted to discuss confidential information. They could also use their phones to discuss such information with dispatchers, as they have done for many years.

Other departments have figured out how to have public frequencies and separate encrypted channels for confidential information. The best known is the Chicago Police Department, the nations second largest metropolitan police force.

A June 2, 2020 article in the Chicago Sun-Times (paragraphs 14-17) points out that while the department has some encrypted frequencies, most officers use radios that arent encrypted. One advantage of this approach is that it allows other law enforcement agencies to listen to Chicago cops to improve coordination.

The (Chicago Police Departments Office of Emergency Management and Coordination) recognizes the benefits of unencrypted radio systems as it relates to both transparency and collaboration with other jurisdictions, the head of that office, Dan Casey, told the tech website Builtin.com in a June 23, 2020 article.

I firmly believe that the local police departments, with guidance from their city councils, can find a balanced approach that keeps transmissions public with the exception of confidential information. The most extreme alternative isnt always the best choice.

Editor Dave Prices column appears on Mondays. His email address is price@padailypost.com.

Previous stories about the encryption of police radios

Jan. 6, Police cut off their radio transmissions to the public

Jan. 8, Editorial, Police decision to encrypt police radio transmissions reduces transparency

Jan. 11, Mayor says that encrypting police radio signals was a mistake

Jan. 11, Palo Alto Council will discuss police radio encryption, Mountain View will follow Palo Altos lead

Feb. 14, Opinion, Encryption isnt a mandate, its a choice

March 29, Police chief willing to consider alternatives to full encryption but lacks examples

April 1, One city is reluctant to switch to encrypted police radio

Excerpt from:
Opinion: Police scanners and Civil Rights - The Daily Post

Read More..