Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Wednesday, 7 June, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

David Davis MP – Phone tap stories will lead to more P2P phone lines

by The Gurus
February 9, 2015
in Editor's News
Share on FacebookShare on Twitter

Distrust of phone networks will lead to more secure lines and peer-to-peer phone connections.
 
Speaking to IT Security Guru, David Davis MP said that he suspected that eventually we will have direct peer-to-peer phone networks where, if we are not far away from each other, secure calls will be possible.
 
“Where there is not an exchange, it will come because it is cheaper and more efficient than having massive networks with huge volumes,” he said.
 
Mike Janke, chairman of Silent Circle, told IT Security Guru that he had heard this sort of comment before, and usually from Government types in the US, UK and Europe.
 
He said: “Although it sounds good, the reality is that it presents enormous challenges. The ideas being floated around do not include device-to-device encryption like Silent Circle, but rather device-to-server encryption.
 
“Although this would stop several forms of simple eavesdropping, it also opens up all communication to a single point of failure – the main servers. This is much like public key cryptography. I can guarantee you that other nation states, hackers, criminal gangs and others will attack this single point of failure.”
 
Janke admitted that the trust factor is a difficult area to overcome, as Governments will have the ability to wire tap at the server, but he asked if Government’s can be trusted to build and host a system that will keep out other nations, hackers and criminals?
 
“The answer is no,” he said. “So in the end, it sounds like a better solution than what currently exists, but it is fraught with security and trust issues as well.”
 
Davis said that the whole structure of western Government is not very bright on a technical and a strategic level, and the inevitable result is that people will react as people do not like the state poking their nose in and it goes up to Angela Merkel, right through to the lowly citizen to commercial concerns.
 
“All those problems, that is a strategic one in terms of effectiveness,” he said. “If you tell an entire nation that they are being spied on then the entire nation will respond and that will create a place where the terrorists can hide and that is the agency’s fault.”
 
Asked if he felt that the concept of secure P2P networks was possible, mobile analyst Alan Goode said that anyone that is thinking of using any radio spectrum or offering telephony services in the UK needs a license to operate and this is heavily regulated and controlled (and under the control of HMG).
 
“If a company is using secure telephony then a Government may require that the tech company or service provider offers the capability of ‘lawful intercept’ by Government services,” he said. “Senior execs of international companies are usually well advised as to say and what to use when using telephony services.”
 
In an email to IT Security Guru, Goode did say that organisations can (and do) create their own cellular networks using technology such as WiMAX or Pico cells or install IP telephony networks that are managed by either themselves or through a service provider, and then use standard mobile phones to then switch intelligently between the various networks at different locations.

FacebookTweetLinkedIn
Tags: GCHQGovernmentphoneSuveillance
ShareTweet
Previous Post

Chipotle Twitter and website captured by miscreants

Next Post

Place GCHQ under judicial regulation, claims MP

Recent News

large open office, bright.

Employees Feel 10 Times Calmer in an Environmentally Friendly Office Space

June 7, 2023
Blue Logo OUTPOST24

Outpost24 Acquires EASM Provider Sweepatic

June 7, 2023
Standard post, logos of brands, headshot.

J Brand: The Challenges of Putting Mental Health First in an Unfamiliar Industry

June 6, 2023
iPad with Anxiety written on it in capitals.

Half of UK Employees Suffer From “Sunday Scaries”

June 6, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information