The author has written 29 technical books and is Managing Partner of Ascent Solutions, which provides marketing services to tech sector companies In the aftermath of the Paris attacks, one of the memes being perpetuated by “security professionals” is that the terrorists used encrypted communications, enabling them to plan and coordinate their activities without raising suspicion among the intelligence community.Now there is a knee-jerk reaction among politicians in Washington to force encryption providers to build “backdoors” into their software that would allow government agencies to easily decode communications in their effort to identify potential terrorists. They say this is essential to keeping us all safe and that we must stop crying about the loss of personal privacy.Left unsaid in all this clueless scare-mongering is that once a backdoor is built into encryption software anyone can enter, not just intelligence agencies. A backdoor would make it easier for hackers everywhere to wreak even more havoc on financial, healthcare and retail sectors. They can use the backdoor to breach government, military and law enforcement agencies. They can tinker with our utility grid and shut down critical parts of our communications infrastructure, including vast chunks of the Internet.Skilled hackers worldwide have already demonstrated that they can do all this and more, so imagine what they and dedicated terrorist organizations can do once our government mandates that all encryption providers equip their software with a backdoor. It is just a matter of finding the backdoor they know is already there and employing brute force methods to gain entry. The power of today’s computer networks makes this a sure thing. Perhaps the most asinine aspect of this discussion about backdoors is that the terrorists already use the strongest encryption and they are not about to “upgrade” it with a broken version that includes a backdoor.If the tech sector is forced to equip their products with backdoors, how does this solve anything? Terrorists and criminals can turn to alternative methods to hide their communications, as they have already done with social gaming networks. Another alternative is steganography, which encrypts messages that can be hidden within images of puppies, kittens and bunnies posted in plain sight on the Internet – all innocuous enough to avoid the scrutiny of law enforcement agencies. If you think the world is a bit too chaotic, you haven’t seen anything yet. Under a backdoor mandate, computer systems, networks and devices will be rendered totally insecure, making all of us more vulnerable to the whims of criminals and terrorists.There is ample reason for Americans to value their privacy. They do not like the idea of risking their bank accounts, credit cards and retirement funds to cyber-looters. They do not want their identities stolen, and then putting their lives on hiatus while they painstakingly sort it all out. They do not want to become bombarded with yet more scams, or become targets of new social engineering schemes that trick them out of their money.The strong encryption currently employed in backend systems and on networks everywhere goes a long way to keeping criminals and terrorists out of our daily lives. A caution to our representatives in Congress: Know what the heck you are doing before deciding that backdoors will solve our national security problems. You may be opening the proverbial Pandora’s Box – unleashing more chaos on the American public than you can possibly imagine.Contact Muller at nmuller@ascent-llc.com Related content opinion Cybersecurity professional job-satisfaction realities for National Cybersecurity Awareness Month Half of all cybersecurity pros are considering a job change, and 30% might leave the profession entirely. CISOs and other C-level execs should reflect on this for National Cybersecurity Awareness Month. By Jon Oltsik Oct 03, 2023 4 mins CSO and CISO CSO and CISO C-Suite feature The value of threat intelligence — and challenges CISOs face in using it effectively Knowing the who, what, when, and how of bad actors and their methods is a boon to security, but experts say many teams are not always using such intel to their best advantage. By Mary K. Pratt Oct 03, 2023 10 mins CSO and CISO CSO and CISO CSO and CISO news CIISec secures government funding to expand CyberEPQ program The funding will support places for 400 students with a focus on attracting a diverse pool of UK cybersecurity talent. By Michael Hill Oct 03, 2023 3 mins IT Training Careers Security news Multibillion-dollar cybersecurity training market fails to fix the supply-demand imbalance Despite money pouring into programs around the world, training organizations have not managed to ensure employment for professionals, while entry-level professionals are finding it hard to land a job By Samira Sarraf Oct 02, 2023 6 mins CSO and CISO Technology Industry IT Training Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe