247 Detectives

Please Call NOW 0845 520 4121 / 07017 411 007

Please Call NOW 0845 520 4121 / 07017 411 007

Content Area 1

1st Call Detectives Blog

Get the latest information & news from the industry...

Archive +

Tags

Archive by Date

GCHQ has developed phone encryption - and it could be used to spy on you

by Josef Kafka

GCHQ, the heart of the UK’s intelligence service, has developed its own encryption protocol, which it intends to incorporate into a wide range of products. The protocol is designed for use in VoIP (Voice over Internet Protocol) phone calls. Unfortunately, there’s a major problem with this encryption protocol: it has a significant flaw in its security that could be used as a backdoor. This backdoor could be used by third parties to listen in on conversations and other communications that utilise the encryption protocol.

The flaw in the protocol was discovered by Doctor Steven Murdoch, who works at University College London. Murdoch has stated that the flaw is “actively harmful for security” in almost all conceivable circumstances. More importantly, Murdoch has expressed the belief that the flaw was deliberately introduced in order to allow security services to carry out “undetectable and unauditable mass surveillance”. Murdoch’s suspicions are well-grounded; it is difficult to conceive of any other reason for GCHQ making their encryption protocol so insecure. 

GCHQ intends for its protocol to become widely-used in products that ordinary members of the public use. However, this has not happened yet. In fact, Doctor Steven Murdoch’s exposure of the potential backdoor may ensure that the encryption protocol is never widely adopted. However, if the protocol is eventually incorporated into commercial products, the impact on ordinary people would be significant.

If you’re passionate about privacy, widespread adoption of GCHQ’s encryption protocol could potentially be catastrophic for you, as it would mean that many internet-based phone communication options would no longer be secure and could theoretically be used by the security services to gather information on you. Of course, online communication services would still be available that don’t use GCHQ’s protocol, but you may have to check what encryption each service uses before utilising it.

GCHQ’s development of an encryption protocol with a potential backdoor could benefit security services, but its widespread use would be a blow against personal privacy. Perhaps it is best that the flaw was discovered before the protocol came into common use. The debate is certain to rage on. Do you believe GCHQ were taking a sensible security precaution by building a backdoor into their protocol, or were they violating civil liberties? 

Leave a comment
Areas & Postcodes We Cover
  • NW7, NW9, NW4, NW11, NW2, NW10, NW6, NW3, NW8, NW5, NW1, N20, N12, N3, N2, N10, N6, N8, N19, N7, N1, N5, N4, N16, N15, N17, N18, N11, N14, N21, N9, N13, N22 
  • E4, E17, E18, E5, E10, E11, E8, E9, E2, E1, E14, E3, E16, E6, E13, E15, E7, E12, SW6, SW10, SW5, SW7, SW3, SW1, SW14, SW13, SW15, SW20, SW19, SW18, SW17, SW16, SW12, SW2, SW9, SW8, SW11, SW4
  • EC4, EC1, EC2, EC3, SE1, SE11, SE17, SE16, SE5, SE15, SE14, SE8, SE24, SE22, SE4, SE21, SE23, SE26, SE20, SE25, SE19, SE6, SE12, SE9, SE18, SE2, SE28, SE7, SE10, SE3, SE13 
  • W1P W1M W1N W1R W1S W1T W1U W1V W1W W1X W1Y W1K W1J W1H W1A W1B W1C W1D W1F W1G W2 W3 W4 W5 W6 W7 W8 W9 W10 W11 W12 W13 W14
     
  • © All rights reserved 2014 '1st Call Detectives'
  • /
  • Website designed & devloped by evokeu