This past weekend, the Department of Justice joined law enforcement from six other countries in issuing their hopes for the future of encryption.
The letter was signed by U.S. Attorney General William Barr and his counterparts from the United Kingdom, Australia, New Zealand and Canada, with support from India and Japan.
The group started things off in the right direction. The letter goes over just how critical encryption is to our rapidly developing society. They pointed to the crucial role it plays in protecting personal data, privacy, intellectual property, trade secrets and cyber security.
But its a lot deeper than credit card numbers. The letter went further into the impact that encryption has for those living under repressive regimes. Encryption is a life or death thing for a lot of journalists, human rights defenders and other marginalized vulnerable populations.
After setting this bar for how important encryption is to a high-tech society moving forward, the tone starts to change a bit. The letter takes on a new direction that starts by addressing the challenges encryption creates, particularly when it comes to protecting the safety of sexually exploited children.
We urge industry to address our serious concerns where encryption is applied in a way that wholly precludes any legal access to content, the letter read. We call on technology companies to work with governments to take the following steps, focused on reasonable, technically feasible solutions.
First off, the international consortium of law enforcement wants companies to embed the safety of the public in the systems they are designing. The letter argues this will enable companies to act against illegal content and activity effectively with no reduction to safety.
The two most direct ways to look at this is its either a clean-your-own-house reference with the idea of embedding a willingness in company cultures to take more intrusive steps to find offenders on their platforms, or its a demand for a backdoor. Their definition of embedding safety includes facilitating the investigations and prosecutions, so its a safe bet its leaning more toward the backdoor perspective.
The letter wants the tech industry to, Enable law enforcement access to content in a readable and usable format where an authorization is lawfully issued, is necessary and proportionate, and is subject to strong safeguards and oversight, and, Engage in consultation with governments and other stakeholders to facilitate legal access in a way that is substantive and genuinely influences design decisions. The various law enforcement agencies want to be assured they are as deeply embedded in the development process as possible around the globe as encryption continues to develop.
Law enforcement argues that the companies have a responsibility to provide themselves a mechanism to protect the public and stated:
End-to-end encryption that precludes lawful access to the content of communications in any circumstances directly impacts these responsibilities, creating severe risks to public safety in two ways:
By severely undermining a companys own ability to identify and respond to violations of their terms of service. This includes responding to the most serious illegal content and activity on its platform, including child sexual exploitation and abuse, violent crime, terrorist propaganda and attack planning; and
By precluding the ability of law enforcement agencies to access content in limited circumstances where necessary and proportionate to investigate serious crimes and protect national security, where there is lawful authority to do so.
The letter said in light of the threats created by these secure communications, there is increasing consensus across governments and international institutions that something must be done. But they dont provide how these new backdoors might impact the journalists, human rights defenders and vulnerable populations.
While encryption is vital and privacy and cyber security must be protected, that should not come at the expense of wholly precluding law enforcement, and the tech industry itself, from being able to act against the most serious illegal content and activity online, the letter reads.
Law enforcement believe these mechanisms that would only give the few a window into peoples online lives wouldnt impact data protection or peoples privacy rights. Specifically saying, However, we challenge the assertion that public safety cannot be protected without compromising privacy or cyber security. We strongly believe that approaches protecting each of these important values are possible and strive to work with industry to collaborate on mutually agreeable solutions.
The fundamental argument is about being able to maintain the level of data security since this whole letter is about encryption. How could you possibly do that if youre talking about building your window? That window in the structure in itself makes it less secure.
Think of a steel pole with two people talking to each other through it. But Billy wants to cut a hole in and listen. In the process of bringing Billys dream to life theres no way to keep the same integrity of privacy in the conversation. If someone walked up to Billys hole how would we know? Does Billy even know how to tell if someone is standing there next to him looking? The list of variables goes on.
We asked the American Civil Liberties Union for its take on the letter.
End-to-end encryption enables free speech no matter how the Department of Justice tries to spin its longstanding attempts to force technology companies to build government backdoors into our encrypted communications, theres a reason their arguments have been consistently rejected, Kate Oh, policy counsel with the ACLU, told L.A. Weekly.
Oh argues encryption is our strongest defense against repressive governments, hackers and organized crime.
Encryption also enables journalists, dissidents, whistleblowers and human-rights defenders to freely express themselves, organize and expose governmental abuse without fear of retribution, Oh said. Instead of trying to break encryption, which would compromise everybodys communications, the U.S. government should focus on using the substantial powers it already has to investigate crime and protect national security, within the bounds of our Constitution.
Karen Gullo, senior media relations specialist and analyst with the Electronic Frontier Foundation, told L.A. Weekly the plan is more of the same terrible ideas weve heard from the DOJ and the FBI about backdoors to encryption.
Neither agency is credible on this issue, Gullo said. They have a long track record of exaggeration and even false statements in support of their position. The AG has claimed that the tech sector will design a backdoor for law enforcement that will stand up to any unauthorized access, ignoring the broad technical and academic consensus in the field that this risk is unavoidable.
Gullo argues encryption mechanisms that would include law enforcement requests simply arent encryption. Encryption with special access for select entities is just broken encryption security backdoors for law enforcement will be used by oppressive regimes and criminal syndicates, putting everyones security at risk, she said.
Another point is why do we need to lower security around our all data if law enforcement is already finding ways to target the specific people using encryption tools like Tor for nefarious purposes? Last month, the DOJs Joint Criminal Opioid and Darknet Enforcement team joined Europol in a victory lap to announce the results of Operation DisrupTor. The action led to the seizure of 274 kilograms of drugs that included fentanyl, oxycodone, hydrocodone, methamphetamine, heroin, cocaine, ecstasy, MDMA, and medicine containing addictive substances in the United States. It was more than half of the global take on the operation.
The 21st century has ushered in a tidal wave of technological advances that have changed the way we live, said DEA Acting Administrator Timothy J. Shea at the time. But as technology has evolved, so too have the tactics of drug traffickers. Riding the wave of technological advances, criminals attempt to further hide their activities within the dark web through virtual private networks and tails, presenting new challenges to law enforcement in the enduring battle against illegal drugs. Operation DisrupTor demonstrates the ability of DEA and our partners to outpace these digital criminals in this ever-changing domain, by implementing innovative ways to identify traffickers attempting to operate anonymously and disrupt these criminal enterprises.
The DEA said Operation DisrupTor led to 121 arrests in the United States, two in Canada, 42 in Germany, eight in the Netherlands, four in the United Kingdom, three in Austria, and one in Sweden. Plus theyre still working to identify the individuals behind a number of dark web accounts.
This raises the question that if efforts are currently finding success in the age of encryption, why should we destabilize the security of all data period? The name Operation DisrupTor is a pun referencing the Tor operating system. The node-based secure anonymity network is popular with spies, activists, drug dealers and everyone in between on the wrong side of their local ruling classes around the world. The principle the system uses was developed by the United States Naval Research Laboratory, but Tor itself is open source.
These law enforcement entities are waving their victory flags across multiple time zones while theyre asking for more access to our secure data.
See original here:
ACLU and EFF Call DOJ's Encryption Dream a Nightmare - L.A. Weekly
- What Is the Signal Encryption Protocol? - WIRED - November 30th, 2020
- Data Protection | The Pros and Cons of End-to-End Encryption - DIGIT.FYI - November 30th, 2020
- Encryption Software Market Overview, Growth, Types, Applications, Dynamics, Companies, Regions, & Forecast to 2026 - The Haitian-Caribbean News... - November 30th, 2020
- Encryption Software Market to Witness Astonishing Growth by 2027 | Dell , Eset , Gemalto and more - Cheshire Media - November 30th, 2020
- EU targets end-to-end encryption tools after rise in terror attacks - DIGIT.FYI - November 30th, 2020
- European Legislators Move to Eliminate End-to-End Encryption in Messaging Services Following Terror Attacks - Digital Information World - November 30th, 2020
- Facebook urged to end encryption to help cops stop paedophiles using app - The Sun - November 30th, 2020
- Inside the French governments mission to develop an encrypted messaging platform - NS Tech - November 30th, 2020
- Hardware-based Full Disk Encryption Market Size, Key Manufacturers, Demand, Application And Opportunities By 2027 - The Haitian-Caribbean News Network - November 30th, 2020
- The tech and security backends that keep your data safe - Business MattersBusiness Matters - November 30th, 2020
- Encryption Software Market Expected to Boost the Global Industry Growth in the Near Future - Cheshire Media - November 30th, 2020
- Commercial Encryption Software Market Will Generate Record Revenue by 2025 - The Haitian-Caribbean News Network - November 30th, 2020
- Symmetric Encryption Algorithms: Live Long & Encrypt - Hashed Out by The SSL Store - Hashed Out by The SSL Store - November 24th, 2020
- Google plans to test end-to-end encryption in Android messages - TechCrunch - November 24th, 2020
- Google Messages Set to Roll Out End-to-End Encryption - Infosecurity Magazine - November 24th, 2020
- Did they crack the code? The importance of encryption for protest movements - OpenGlobalRights - November 24th, 2020
- The EU's muddled approach to encryption - The Spectator US - November 24th, 2020
- AES Encryption Software Market 2020 Global Industry Size, Demand, Growth Analysis, Share, Revenue and Forecast 2022 - The Think Curiouser - November 24th, 2020
- How to recover data from a Mac with T2 or FileVault encryption and without a password - Macworld - November 24th, 2020
- Security flaws in smart doorbells may open the door to hackers - We Live Security - November 24th, 2020
- Document Encryption Software Market 2020 - Impact of COVID-19 Pandemic, Future Development, Top Manufacturers Analysis, Trends and Demand discussed in... - November 24th, 2020
- U.S. Hardware Encryption Market is expected to reach $259.12 billion by 2026 | CAGR 32.4% - WhaTech - November 24th, 2020
- Data Encryption Market: Global Industry Analysis, Size, Share, Trends, Growth and Forecast 2020 2026 - The Think Curiouser - November 24th, 2020
- Arrests and raids in Essex as police crackdown on encrypted criminal networks - Gazette - November 24th, 2020
- 2020 and Beyond: Homomorphic Encryption Market Trends and Outlook Study to 2027 - The Haitian-Caribbean News Network - November 24th, 2020
- US Department of Justice reignites the Battle to Break Encryption - Naked Security - October 17th, 2020
- Five Eyes Call for Tech World to Weaken Encryption - ClearanceJobs - ClearanceJobs - October 17th, 2020
- Zoom Begins Rollout of End-To-End Encryption - My TechDecisions - TechDecisions - October 17th, 2020
- Could homomorphic encryption be the solution to big data's problem? - Siliconrepublic.com - October 17th, 2020
- U.S., UK and other countries warn tech firms that encryption creates 'severe risks' to public safety - CNBC - October 17th, 2020
- Is Signal secure? How the messaging app protects privacy - Business Insider - Business Insider - October 17th, 2020
- AeroVironment and Viasat to aim to improve radio encryption for Puma AE - Flightglobal - October 17th, 2020
- Encryption Backdoor? The Trump Administration Wants It. - The National Interest - October 17th, 2020
- How to use private conversations on Skype to send encrypted calls and messages - Business Insider India - October 17th, 2020
- AES Encryption Software Industry Market 2020: Potential growth, attractive valuation make it is a long-term investment | Know the COVID19 Impact | Top... - October 17th, 2020
- Trustifi Named Overall Encryption Solution Provider of the Year in 2020 CyberSecurity Breakthrough Awards Program - GlobeNewswire - October 17th, 2020
- Global Database Encryption Market Expected to reach highest CAGR in forecast period : International Business Machines Corporation, Symantec... - October 17th, 2020
- Feds, 'Five Eyes' Allies Take Another Swing at Encryption Policy Changes - MeriTalk - October 13th, 2020
- Homomorphic encryption tools find their niche - CSO Online - October 13th, 2020
- Mission Impossible: 7 Countries Tell Facebook To Break Encryption - Forbes - October 13th, 2020
- Dutton pushes against encryption yet again but oversight at home is slow - ZDNet - October 13th, 2020
- Western governments double down efforts to curtail end-to-end encryption - The Daily Swig - October 13th, 2020
- Fuse Analytics integration with StrongSalt offers Enterprise Information Archiving with GDPR protections - PR Web - October 13th, 2020
- Is Signal Safe? What to Know About the New Encrypted Messaging App - Parentology - October 13th, 2020
- Five Eyes alliance warning: 'Encryption creates severe risks to public safety' - New Zealand Herald - October 13th, 2020
- Privateness or youngster safety? 7 governments, together with US & UK, argue Fb's new encryption plan would profit PEDOPHILES - Editorials 360 - October 13th, 2020
- Optical Encryption Market Analysis And Demand With Forecast Overview To 2025 - Express Journal - October 13th, 2020
- Encrypted messages don't always stay private. Here's what that means for you - CNET - October 11th, 2020
- EARN IT Act a Dire Threat to Encryption, Speech Online, Critics Say - Decrypt - October 11th, 2020
- Analyzing Impacts of Covid-19 on Cloud Encryption Software Market Effects, Aftermath, Global Industry Challenges, Business Overview and Forecast To... - October 11th, 2020
- Parts of the Election System Are Ripe for Hacking: 'Encryption? We Don't Do That' - Josh Kurtz - October 6th, 2020
- WikiLeaks led the way for newsrooms to use encryption to protect sources, says Italian journalist - ComputerWeekly.com - October 6th, 2020
- Global Encryption Software Market 2020 Industry Size, Shares and Upcoming Trends 2025 - Reported Times - October 6th, 2020
- Encryption Software Market 2020 2027: Recent Trends, Growth Opportunities and Business Development Strategies By IBM, Trend Micro, Symantec, McaFee,... - October 6th, 2020
- Encryption Key Management Market Research By Growth, Competitive Methods And Forecast To 2026 - The Daily Chronicle - October 6th, 2020
- Global Hardware-based Full Disk Encryption Market Size, Share, Trends, CAGR by Technology, Key Players, Regions, Cost, Revenue and Forecast 2020 to... - October 6th, 2020
- Global Encryption Software Market 2020 | Know the Companies List Could Potentially Benefit or Loose out From the Impact of COVID-19 | Top Companies:... - October 6th, 2020
- Stay Tuned with the Epic Battle in the Encryption Key Management Market - The Daily Chronicle - October 6th, 2020
- Hardware-based Full Disk Encryption Market To Drive Highest Growth By 2027 With Leading Key Players: Seagate Technology PLC, Western Digital Corp,... - October 6th, 2020
- Encrypted USB flash drive you can unlock with your smartphone (or Apple Watch) - ZDNet - October 6th, 2020
- Global Mobile Encryption Market is slated to grow rapidly in the coming years: McAfee(Intel Corporation), Blackberry, T-Systems International, ESET,... - October 6th, 2020
- Cloud Encryption Software Market Potential Growth, Size, Share, Demand and Analysis of Key Players Research Forecasts to 2026 - The Daily Chronicle - October 6th, 2020
- Best Encryption Software in 2020 - Latest Quadrant Ranking Released by 360Quadrants - PRNewswire - September 30th, 2020
- 4 Reasons Why Encryption Is a Must for Data Protection - CIOReview - September 30th, 2020
- Prospective Node Operators Stake $125M in ETH to Participate in NuCypher Encryption Network - CoinDesk - Coindesk - September 30th, 2020
- Fortanix Partners with VMware to Enable Cloud Service Providers to Deliver Data Security as a Service - GlobeNewswire - September 30th, 2020
- SanDisks latest portable SSDs have boosted speed and security - The Verge - September 30th, 2020
- What Facebook users need to know about end-to-end encryption - Fast Company - September 30th, 2020
- Whats really up with your secure WhatsApp chats - Mint - September 30th, 2020
- Hardware Encryption Technology Market Trends Together With Growth Forecast To 2026 - The Daily Chronicle - September 30th, 2020
- Global Cloud Encryption Market- Industry Analysis and forecast 2020 2027: By Industrial verticals, Services, and Region. - Unica News - September 30th, 2020
- Global Hardware-based Full Disk Encryption (FDE) Market to Witness a Pronounce Growth During 2020-2026 - The Daily Chronicle - September 30th, 2020
- Global Cloud Encryption Technology Market with (Covid-19) Impact Analysis: Growth, Latest Trend Analysis and Forecast 2026 - The Daily Chronicle - September 30th, 2020
- Global Email Encryption Software Market Report 2020-2027: Production Capacity and Consumption Analysis by Regions and Country Wise - Crypto Daily - September 30th, 2020
- Cloud Encryption Service Market 2020 | Detailed Analysis, Growth, Research and Forecast - The Daily Chronicle - September 30th, 2020
- Database Encryption Market Potential Growth, Size, Share, Demand and Analysis of Key Players Research Forecasts to 2027 - The Daily Chronicle - September 30th, 2020
- Optical Encryption Industry 2020 Includes The Major Application Segments And Size In The Global Market To 2026 - The Daily Chronicle - September 30th, 2020
- Hardware Based Encryption Market Projected to Be Resilient During 2020-2025 - The Market Records - September 30th, 2020
- Hardware Encryption Market (2020-2026) | Where Should Participant Focus To Gain Maximum ROI | Exclusive Report By DataIntelo - Crypto Daily - September 30th, 2020
- Ring plans to offer end-to-end encryption by the end of the year - The Verge - September 29th, 2020