Intersys Logo
Menu

Managed IT Support

A Reasonable, Fixed Monthly Fee for All Your IT Needs
Managed IT Support Provider

Consulting Services

The High Level IT Consulting Services You Need to Transform Your Business
Get IT Consulting Services

Cyber Security

A Comprehensive Range of Cyber Security Services for Robust, Industry-Leading Protection
Get Cyber Security Services

IT Solutions

Whatever your IT needs, we'll create a tailormade solution for you
Get IT Solutions

This is What a Cyber Security Expert Thinks About the New Government Contact Tracing App

[Article updated 18th May 2020 following a government announcement that suggested the contact tracing app rollout would be delayed until June.]

Some people collect stamps, coins or comics. Matthew Geyman, MD of IT support business Intersys, meanwhile, collects stories about cyber security failures. Some of these are of such Laurel and Hardy level ineptitude they would provoke laughterโ€‰โ€”โ€‰if they werenโ€™t so serious. And didnโ€™t see private citizensโ€™ data spilling all over the internet or, worse, surreptitiously falling into criminalsโ€™ inboxes.

โ€˜NHS coding error sees details of 150,000 patients shared online.โ€™ Matthewโ€™s got that one.

โ€˜Fraudsters withdraw cash from 20,000 Tesco Bank current accounts.โ€™ Heโ€™s got that one too.

You get the idea. Itโ€™s part of his job to collect this stuff. After all, cyber security is a core part of his service and he and his team have written about data security extensively. So when the government unveiled plans for a centrally managed contact tracing app to help deal with the coronavirus pandemic, he was interested. To put it mildly.

Contract tracing apps are a great idea. They record details of our movements and alert us if we have been in sustained contact with someone who later self declares Covid-19 symptoms. Then, we can protect others by self-isolating.

There are two types: centralised apps save our data to a central system. Decentralised apps, such as the Exposure Notification API developed in a joint project from Apple and Google, will alert users directly without storing information on a central server.

The former centralised type is, according to Matthew and others in the industry, a problem from a cybersecurity and government surveillance point of view. A big problem.

The government may rethink its centrally managed model. At the date we put this story together (15 May 2020) there were rumours they may be entertaining a different approach. However the story unfolds, the decisions the government makes now are likely to have ramificationsโ€‰โ€”โ€‰in terms of the publicโ€™s trust in the governmentโ€™s use, or potential misuse, of dataโ€‰โ€”โ€‰for years to come.

Hereโ€™s the interview.

Matthew Geyman, MD of IT consultancy services company Intersys

Matthew Geyman believes that collecting data centrally could compromise usersโ€™ privacy.

Matthew, can you explain why the government collecting mass data in this centralised way is such a concern for you?

First off, there are some advantages to a centralised modelโ€‰โ€”โ€‰for example the ability to analyse a greater amount of detailed and granular data. But itโ€™s the justifiable fears around centralised data collection that is on many peopleโ€™s minds.

There are many, many examples of ineptitude at the highest level. To give you a recent one: Sheffield City Councilโ€™s automatic number-plate recognition (ANPR) system was inadvertently exposed to the internet. Millions of road journeys, involving thousands of people, were published for the world to see.

So youโ€™re saying something similar could happen with our data in the contact tracing app?

Yes, and itโ€™s not just me. One hundred and seventy five UK academics wrote to the government recently criticising a design choice that centrally stores sensitive health and travel data. Itโ€™s a hugely valuable target for hackers. The academics also suggested the information could lead to government surveillance.

But isnโ€™t this all just shop talk from academics? Will the public really care?

The decision to use a big data model, relying on a vast centralised data store, rather than via distributed or mesh models, will put quite a few peopleโ€™s โ€˜Big Brotherโ€™ antennas up. If overall uptake is in any way correlated with the responses Iโ€™ve seen on social media, there will be a significant portion of the population who refuse to run the app, on principle. Although this scepticism has come from non-technical users, who are less able to scrutinise its data protection principles, it will set the tone of the discussion.

And technical users?

The scepticism from technical users about the scope creep of this app is, if anything, even greater.

What are the consequences of this scepticism, from technical and non-technical people?

Considering the government is asking us to โ€˜do our dutyโ€™ and download the app (Health Secretary Matt Hancockโ€™s words) they must be very cautious about a long term loss of faith in public data protection, especially considered against some previous examples of poor public data protection.

What could the government do to make the situation better?

If the contact tracing appโ€™s encryption algorithms and methods used for data anonymisation and pseudonymisation are made public and found to be trusted within the security and cryptography community (meaning that re-identification and de-anonymisation are impossible), it may go a long way to assuaging the security and privacy concerns of technical and therefore non-technical users.

Itโ€™s worth noting that anonymisation is irreversible, which makes the possibility of re-identification impossible; however pseudonymisation (typically through data masking) does allow some reversal.

However, being this app is associated with โ€˜Big Brotherโ€™, concerns will naturally remain that someone else may have slurped or accessed the data prior to its anonymisation.

A blurred couple in the street walking away from the camera to depict contact tracing app surveillance.

Word on the street: both technical experts and many members of the public are said to be deeply sceptical about the app.

You mention โ€˜assuaging  the security and privacy concerns of technical and therefore non-technical usersโ€™. Do you mean that if we get the former on board, the latter will naturally follow?

Yes, but this scenario is a moot point โ€“ at least right now. Thereโ€™s not much sign of transparency in its design just yet. Even if that changes, it may not be enough to persuade enough people, if the seeds of mistrust have already germinated.

GCHQโ€™s words arenโ€™t exactly reassuring โ€˜The back end is built to be as secure as is practical, but remember it holds only anonymous data and communicates out to other NHS systems through privacy preserving gateways, so data in the app data canโ€™t be linked to other data the NHS holds.โ€™

Weโ€™re guessing itโ€™s the โ€˜secure as practicalโ€™ bit that is worrying you? What could that even mean?

The contact tracing app can only truly work when location data and identifying information is combined in a centralised place. There are commercial organisations whose business is to gather immense amounts of, seemingly innocuous, data fragments, which they can combine to identify people and to infer things about them.

The governmentโ€™s National Cyber Security Centre says โ€˜The app asks the user [for] the first part of their postcode (LS1 or SW1A, for example, for NHS resource planning, mainly)โ€™ as well as a unique ID and your phoneโ€™s model. It also says that  the random elliptic curve key pair encrypts your ID โ€˜in a way that only the NHS server can recoverโ€™. Well, thereโ€™s some linguistic sleight of hand and ambiguity here which raises concern. We know that commercial organisations arenโ€™t beyond using illegally harvested information and that there are hackers whoโ€™d sell it to them.

This is also pertinent when we know that the USAโ€™s National Security Agency (NSA) has previously โ€˜hamstrungโ€™ the mathematical integrity of the iPhoneโ€™s Dual Elliptic Curve Deterministic Random Bit Generator. This is important, because cryptographically secure pseudorandom random number generation is critical to non-reversible encryption. However, the NSA managed to introduce a flaw which allowed them to later decrypt it. Whatโ€™s more, as revealed by Edward Snowdenโ€™s whistleblowing, the NSA even paid $10m to the security company responsible for the encryption products.

Furthermore, we know from Parliamentโ€™s Human Rights Committee that the data may never be deleted and will remain the property of GCHQ (the security services). We must simply trust that it will not be misused.

To put you on the spot now: given your own concerns, will you be downloading the contact tracing app and would you recommend others to?

Yes, with huge reservations, because it feels like the right thing to do, if we are to tackle and defeat coronavirus.

But many people will have a far greater scepticism and suspicion than I do. Given that there are prominent people who ascribe Covid-19 to 5G masts and who also donโ€™t accept that one of mankindโ€™s overwhelming achievements over the past 50 years is those millions of lives saved through mass vaccination, the challenge of getting people to trust the app may be greater than expected. Making the app compulsory would be a travesty for everyone, when a different approach to design could make it willingly accepted by the majority of the UKโ€™s population.

Meanwhile, there are reports that the government is considering using the Apple/Google approach after all. Bear in mind Australia, which originally planned to use a centralised system, is switching to a decentralised one after technical problems.

To sum up, this is an utterly fascinating technical and anthropological challenge. It has the potential to do great good and, if misused or abused, to do great harm โ€“ in terms of efficacy in fighting coronavirus and to the UK publicโ€™s relationship with its system of government.

[Postscript: On 18 May, the UK government announced the phone app would appear only โ€˜in the coming weeksโ€™, which many believe is later than originally suggested. This followed reports the previous day that one of the private sector companies looking after recruitment for track and trace trackers had sent emails, โ€˜that said the process was on hold while the government considered an alternative appโ€™.]

As an experienced IT consultant, Matt can offer you direct advice about developing your business IT to make it more efficient, profitable and compliant. Find out more about our IT governance and compliance services, consulting services from Intersys, and our virtual CTO and VCISO services. Or get in touch with Intersys today to start a conversation.

 

 

Stay up to date with IT Industry news

Subscribe to our newsletter

Please enable JavaScript in your browser to complete this form.

Subscribe to our newsletter

Please enable JavaScript in your browser to complete this form.

In other news

December 4, 2023

A Haven of Hope

linkedin facebook pinterest youtube rss twitter instagram facebook-blank rss-blank linkedin-blank pinterest youtube twitter instagram