TECHNOLOGY companies must allow the security services access to messages in times of emergency, Home Secretary Amber Rudd has said. It follows reports that Khalid Masood, the man responsible for the terrorist attack in London on Wednesday, used the WhatsApp service to send someone a message just three minutes before he mowed down 40 people on Westminster Bridge. The inbuilt encryption of WhatsApp means police and MI5 have reportedly not seen the contents of that message.
Doing the rounds on the Sunday morning political TV shows, the Home Secretary said technology firms must build in back doors to allow security services to eavesdrop.
Rudd also insisted WordPress, and Google, who run YouTube, must realise that they are now publishers rather than simply technology companies, and so should do more to tackle extremist videos and blogs.
Although the Home Secretary said she would like companies to do this voluntarily and independently, she refused to rule out changing the law to force their hand.
Rudd told BBC One s Andrew Marr Show: It is completely unacceptable, there should be no place for terrorists to hide.
We need to make sure that organisations like WhatsApp, and there are plenty of others like that, don t provide a secret place for terrorists to communicate with each other.
It used to be that people would steam-open envelopes or just listen in on phones when they wanted to find out what people were doing, legally, through warrantry.
But on this situation we need to make sure that our intelligence services have the ability to get into situations like encrypted WhatsApp.
Asked if she opposed end-to-end encryption on Sky News s Sophy Ridge on Sunday, Rudd said: End-to-end encryption has a place, cyber security is really important and getting it wrong costs the economy and costs people money.
So I support end-to-end encryption, it has its place to play.
But we also need to have a system whereby when the police have an investigation, where the security services have put forward a warrant signed off by the Home Secretary, we can get that information when a terrorist is involved.
She denied what she was describing was incompatible with end-to-end encryption, adding: You can have a system whereby they can build it so that we can have access to it when it is absolutely necessary.
Rudd said she was calling in a fairly long list of relevant organisations for a meeting on the issue on Thursday, including social media platforms.
I would rather get a situation where we get all these people around the table agreeing to do it, she told Marr.
I know it sounds a bit like we re stepping away from legislation but we re not.
What I m saying is the best people who understand the technology, who understand the necessary hashtags to stop this stuff even being put up, not just taking it down, but stopping it being put up in the first place are going to be them.
Fresh calls have been made for Westminster security to be ‘stepped up’ in the wake of Wednesday’s terror attack. Former Met Police commissioner Lord Blair told BBC Radio 4’s Today programme “there will have to be changes” following the attack and a review of the “outer soft ring” around the Houses of Parliament should be expected. Ex-House of Commons deputy speaker Nigel Evans also added to the call for enhanced security after revealing “lots” of MPs locked in the Commons chamber during and after the attack were already discussing how to boost security in certain areas.
Some experts predict there will be a global shortage of two million cyber security professionals by 2019.
Behind every new hack or data breach, there s a company scrambling to put out the fire . That s good news for job seekers with cyber security skills . Employers can t hire them fast enough.
The ISACA, a non-profit information security advocacy group, predicts there will be a global shortage of two million cyber security professionals by 2019 . Every year in the U.S., 40,000 jobs for information security analysts go unfilled, and employers are struggling to fill 200,000 other cyber-security related roles, according to cyber security data tool CyberSeek . And for every ten cyber security job ads that appear on careers site Indeed3, only seven people even click on one of the ads, let alone apply. 12
It s easy to see why these jobs are in demand . I know I ve lost count of major data breaches, and the stakes for companies are high. Recent research by Cisco showed that 29% of breached organizations lost revenue . And breaches can impact companies of all types, from large corporations to small hospitals . On the black market, health care records reportedly sell for $5 apiece. 456
One of the most in-demand cyber security roles is security analyst, says Bill Bonifacic, who leads the cyber security practice at staffing firm Bluestone Recruiting . Security analysts work to prevent and mitigate breaches on the ground .
Another hot job is security manager, says Bonifacic . Security managers develop and implement overarching processes to keep information private .
Often you ll need a professional certification to be considered for such a role, like a CISM (Certified Information Security Manager) or CISSP (Certified Information Systems Security Professional).
Compensation for the most senior roles in cyber security, like chief information security officer, can reach $400,000, says Bonifacic . Cyber security jobs commanded a $6,500 premium over other IT jobs in a 2015 study by analytics firm Burning Glass. 10
If you re interested in a cyber security career, where should you look ? Large health care, financial and global manufacturing firms need armies of cyber security professionals, according to Bonifacic, as do professional services firms like Deloitte and EY.
And what type of experience stands out on a resume ?
If you re coming from a large company that hasn t been in the news for a data breach, that bodes well . Abbott, a health care firm with 75,000 employees that makes medical devices and pharmaceuticals, falls into this category . Bonifacic says, If you were running security at Abbott, you re going to do very well.
- ^ two million (image-store.slidesharecdn.com)
- ^ CyberSeek (cyberseek.org)
- ^ Indeed (www.indeed.com)
- ^ major data breaches (www.informationisbeautiful.net)
- ^ Recent research (b2me.cisco.com)
- ^ sell for $5 (www.wsbtv.com)
- ^ Bluestone Recruiting (bluestonerecruiting.com)
- ^ 72,670 (www.bls.gov)
- ^ 88,880 (www.bls.gov)
- ^ $6,500 premium (burning-glass.com)
- ^ @JeffKauflin (www.twitter.com)