{"id":10352,"date":"2017-11-02T03:24:31","date_gmt":"2017-11-02T03:24:31","guid":{"rendered":"http:\/\/www.lifeandnews.com\/articles\/?p=10352"},"modified":"2017-11-02T03:24:31","modified_gmt":"2017-11-02T03:24:31","slug":"real-security-requires-strong-encryption-even-if-investigators-get-blocked","status":"publish","type":"post","link":"https:\/\/www.lifeandnews.com\/articles\/real-security-requires-strong-encryption-even-if-investigators-get-blocked\/","title":{"rendered":"Real security requires strong encryption \u2013 even if investigators get blocked"},"content":{"rendered":"<p><span><a href=\"https:\/\/theconversation.com\/profiles\/susan-landau-409193\">Susan Landau<\/a>, <em><a href=\"http:\/\/theconversation.com\/institutions\/tufts-university-1024\">Tufts University<\/a><\/em><\/span><\/p>\n<p>The FBI and the U.S. Department of Justice have been <a href=\"http:\/\/thehill.com\/policy\/cybersecurity\/353858-deputy-ag-rosenstein-raises-alarm-over-warrant-proof-encryption\">fighting against<\/a> easy, widespread public access to <a href=\"https:\/\/www.justice.gov\/opa\/speech\/deputy-attorney-general-rod-j-rosenstein-delivers-remarks-encryption-united-states-naval\">encryption technologies<\/a> <a href=\"https:\/\/www.brookings.edu\/blog\/techtank\/2016\/04\/19\/a-brief-history-of-u-s-encryption-policy\/\">for 25 years<\/a>. Since the <a href=\"https:\/\/www.nytimes.com\/interactive\/2016\/03\/03\/technology\/apple-iphone-fbi-fight-explained.html\">bureau\u2019s dispute with Apple in 2016<\/a> over <a href=\"https:\/\/theconversation.com\/us\/topics\/apple-vs-fbi-25241\">access to the encrypted iPhone<\/a> of one of the two people who <a href=\"https:\/\/www.nytimes.com\/2015\/12\/03\/us\/san-bernardino-shooting.html\">shot 14 victims in San Bernardino, California<\/a>, this battle has become <a href=\"https:\/\/www.cbsnews.com\/news\/cbs-news-poll-americans-split-on-unlocking-san-bernardino-shooters-iphone\/\">more pitched<\/a>. <\/p>\n<p>This dispute is not about whether regular people can or should use encryption: The U.S. government is in favor of <a href=\"https:\/\/www.cio.gov\/2017\/01\/19\/automatic-https-enforcement-new-executive-branch-gov-domains\/\">using encryption<\/a> to secure data. Rather, it\u2019s about the <a href=\"https:\/\/www.technologyreview.com\/s\/603534\/the-next-big-encryption-fight\/\">FBI\u2019s demand<\/a> that encryption systems include \u201c<a href=\"http:\/\/www.cnn.com\/2015\/11\/18\/opinions\/bellovin-encryption-debate\/index.html\">exceptional access<\/a>,\u201d enabling police who get a warrant to <a href=\"https:\/\/www.brookings.edu\/blog\/brookings-now\/2014\/10\/16\/watch-fbi-director-james-comey-on-technology-law-enforcement-and-going-dark\/\">circumvent the encryption<\/a> on a device or on an encrypted call. <\/p>\n<p>Nearly every element of American society is a potential target for sophisticated hackers. That makes the conflict complicated; giving law enforcement officers a way into secure systems makes <a href=\"https:\/\/academic.oup.com\/cybersecurity\/article\/1\/1\/69\/2367066\/Keys-under-doormats-mandating-insecurity-by\">breaking in easier for others as well<\/a>. In 2016, I <a href=\"https:\/\/judiciary.house.gov\/wp-content\/uploads\/2016\/02\/Landau-Written-Testimony.pdf\">testified before Congress<\/a> in support of Apple and against the FBI position; and as I explain in my forthcoming book, \u201c<a href=\"https:\/\/yalebooks.yale.edu\/book\/9780300227444\/listening\">Listening In: Cybersecurity in an Insecure Age<\/a>,\u201d the FBI\u2019s stance would make people, and society, less secure, not more so.<\/p>\n<h2>A new battle in an old war<\/h2>\n<figure class=\"align-left zoomable\">\n            <a href=\"https:\/\/images.theconversation.com\/files\/187652\/original\/file-20170926-10403-1mrrry9.jpg?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=1000&amp;fit=clip\"><img alt=\"\" src=\"https:\/\/images.theconversation.com\/files\/187652\/original\/file-20170926-10403-1mrrry9.jpg?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=237&amp;fit=clip\"><\/a><figcaption>\n              <span class=\"caption\">An export-restricted encryption algorithm was printed on a T-shirt as a form of protest in the 1990s.<\/span><br \/>\n              <span class=\"attribution\"><a class=\"source\" href=\"https:\/\/commons.wikimedia.org\/wiki\/File%3AMunitions_T-shirt_(front).jpg\">Adam Back<\/a><\/span><br \/>\n            <\/figcaption><\/figure>\n<p>Today, the American public is engaged in the second round of what have been called the \u201c<a href=\"http:\/\/www.cabinetmagazine.org\/issues\/1\/worthington.php\">encryption wars<\/a>.\u201d During the 1990s, the U.S. had restrictions on encryption software and algorithms, allowing their use within the country, but preventing them from being exported to other countries. As a result, U.S. software companies faced a choice between creating two versions of every program \u2013 a strong system for U.S. customers and a weak system for everyone else \u2013 or providing only the weak version. Most chose the latter. That limited the availability of encryption software in the U.S., so export control worked well for both the NSA\u2019s intelligence gatherers and the FBI\u2019s investigators.<\/p>\n<p>But in 2000, the two agencies\u2019 interests split. The <a href=\"http:\/\/dodcio.defense.gov\/Portals\/0\/Documents\/ciodesrefvolone.pdf\">Clinger-Cohen Act<\/a> required the U.S. Department of Defense to buy commercially available communications and computer equipment \u2013 and the agency wanted encryption built in. To boost the strength of cryptography in the marketplace, the NSA supported loosening the export controls.<\/p>\n<p>This was a time when NSA itself was facing a new reality. Encrypted communications had become the norm in government work \u2013  and <a href=\"https:\/\/www.newyorker.com\/magazine\/1999\/12\/06\/the-intelligence-gap\">not just for technologically sophisticated nations<\/a>. NSA adapted. Details are shrouded in secrecy, but we know that just like hackers, <a href=\"http:\/\/www.spiegel.de\/international\/world\/catalog-reveals-nsa-has-back-doors-for-numerous-devices-a-940994.html\">NSA takes advantage of unpatched vulnerabilities<\/a> to break in to targets. NSA also <a href=\"http:\/\/www.businessinsider.com\/nsa-document-metadata-2016-12\">relies heavily on communications metadata<\/a>, the when, where, how long \u2013 and sometimes who \u2013 of a communication. And NSA apparently uses stealthy techniques, such as <a href=\"https:\/\/arstechnica.com\/tech-policy\/2014\/05\/photos-of-an-nsa-upgrade-factory-show-cisco-router-getting-implant\/\">intercepting communication equipment<\/a> while being shipped, to install eavesdropping tools. The result? Despite widespread use of encryption by its targets, NSA is largely able to obtain the information it seeks.<\/p>\n<h2>Adapting to an encrypted world<\/h2>\n<p>Today, the FBI is facing a similar situation to the NSA\u2019s two decades ago. Consumer products and apps like WhatsApp <a href=\"https:\/\/www.wired.com\/2016\/07\/secret-conversations-end-end-encryption-facebook-messenger-arrived\/\">regularly use strong encryption<\/a> to protect communications and devices. And sometimes that prevents investigators from viewing potential evidence \u2013 as it did in San Bernardino, <a href=\"https:\/\/www.theguardian.com\/technology\/2016\/mar\/21\/fbi-apple-court-hearing-postpone-unlock-terrorist-iphone\">for a time<\/a>. The bureau can keep fighting the battle to weaken encryption, which it has been losing for decades, or it can <a href=\"https:\/\/theconversation.com\/bypassing-encryption-lawful-hacking-is-the-next-frontier-of-law-enforcement-technology-74122\">follow the NSA\u2019s lead<\/a> and adapt.<\/p>\n<p><a href=\"http:\/\/www.chron.com\/business\/technology\/article\/FBI-couldn-t-access-nearly-7K-devices-because-of-12297546.php\">Police without a back door<\/a> into encryption systems have several options. Since at least the early 2000s, the FBI has been getting <a href=\"https:\/\/www.nytimes.com\/2016\/04\/14\/technology\/fbi-tried-to-defeat-encryption-10-years-ago-files-show.html\">court orders letting agents hack into criminals\u2019 computer and communication systems<\/a> to install recording and surveillance software. But that\u2019s not the only possibility for investigators.<\/p>\n<p>Other kinds of nonencrypted data may provide valuable information that can serve as an alternative, and computer systems can be enormously helpful in finding and analyzing that data. In the wake of the 1993 World Trade Center bombing, investigators had to wade through paper copies of phone company records to discover who talked to whom when, and from there draw connections between members of the bombing conspiracy. Modern software \u2013 and digital phone, financial and other records available with a warrant \u2013 <a href=\"https:\/\/www.youtube.com\/watch?v=Nd2fZZhxuzQ\">can make that analysis immeasurably faster<\/a>.<\/p>\n<figure>\n            <iframe loading=\"lazy\" width=\"440\" height=\"260\" src=\"https:\/\/www.youtube.com\/embed\/Nd2fZZhxuzQ?wmode=transparent&amp;start=0\" frameborder=\"0\" allowfullscreen><\/iframe><figcaption><span class=\"caption\">Former federal prosecutor Patrick Fitzgerald explains how technology assists criminal investigators.<\/span><\/figcaption><\/figure>\n<p>The \u201cinternet of things\u201d provides another potential treasure trove for investigators: In one instance, for example, the history of a person\u2019s heart rate as measured by his data-collecting pacemaker led to his <a href=\"http:\/\/fortune.com\/2017\/02\/07\/pacemaker-arson-charges\/\">indictment for arson<\/a> when his story of his actions during the fire didn\u2019t hold up. In another case, a woman\u2019s activity level, as tracked by her Fitbit, <a href=\"http:\/\/www.cnn.com\/2017\/04\/25\/us\/fitbit-womans-death-investigation-trnd\/index.html\">contradicted her husband\u2019s account<\/a> of her death \u2013 and led to murder charges against him.<\/p>\n<p><a href=\"https:\/\/theconversation.com\/the-real-costs-of-cheap-surveillance-67763\">Following suspects<\/a> is a third area where technology really helps police: Using a team of trackers cost approximately US$275 an hour \u2013 but tracking a suspect\u2019s phone as it travels <a href=\"http:\/\/www.yalelawjournal.org\/forum\/tiny-constables-and-the-cost-of-surveillance-making-cents-out-of-united-states-v-jones\">drops the price to $5.21 an hour<\/a>. <\/p>\n<p>Such technological advances aren\u2019t used as easily by state and local investigators, who conduct <a href=\"http:\/\/www.uscourts.gov\/statistics-reports\/wiretap-report-2016\">more than half of law enforcement wiretaps<\/a> in the U.S. Sometimes state and local police are stymied by relatively simple issues, such as the <a href=\"http:\/\/judiciary.house.gov\/_files\/hearings\/printers\/112th\/112-59_64581.pdf\">wide variety of phones, internet providers and data formats<\/a>. In 2013, the FBI stepped up to help, creating training programs through its <a href=\"https:\/\/ndcac.fbi.gov\/\">National Domestic Communications Assistance Center<\/a> to help police gather digital evidence without needing to break encryption.<\/p>\n<p>Even as these varied investigatory techniques will help, sometimes encryption will simply prevent investigators from getting the goods \u2013 or getting them quickly enough to prevent a crime. But law enforcement has <a href=\"https:\/\/www.eff.org\/deeplinks\/2017\/10\/deputy-attorney-general-rosensteins-responsible-encryption-demand-bad-and-he\">always had to deal<\/a> with <a href=\"https:\/\/gizmodo.com\/in-1851-a-man-picked-two-unpickable-locks-and-changed-1698557792\">blocks to obtaining evidence<\/a>; <a href=\"https:\/\/www.law.cornell.edu\/wex\/exclusionary_rule\">the exclusionary rule<\/a>, for example, means that <a href=\"http:\/\/caselaw.findlaw.com\/us-supreme-court\/367\/643.html\">evidence collected in violation of a citizen\u2019s constitutional protections is often inadmissible in court<\/a>. <\/p>\n<h2>Facing new threats<\/h2>\n<p>The importance of strong cryptography in protecting people\u2019s privacy has become clearer in recent years. Attackers are more sophisticated \u2013 as shown in the 2015 <a href=\"https:\/\/www.dni.gov\/files\/documents\/ICA_2017_01.pdf\">Russian hack of the Democratic National Committee<\/a> emails and the 2017 <a href=\"https:\/\/www.nytimes.com\/2017\/09\/07\/business\/equifax-cyberattack.html\">Equifax data breach<\/a>, among others. And any groups \u201cviewed as likely to shape future U.S. policies\u201d were <a href=\"https:\/\/www.dni.gov\/files\/documents\/ICA_2017_01.pdf\">targets of Russian hacking efforts<\/a>, according to the Office of the Director of National Intelligence. That could include almost any organization \u2013 activist groups, church associations, community foundations, professional societies, nongovernmental organizations and more \u2013 that forms the underpinning of democratic societies. <\/p>\n<p>This broad threat to fundamental parts of American society poses a serious danger to national security as well as individual privacy. Increasingly, a number of former senior law enforcement and national security officials have <a href=\"https:\/\/www.washingtonpost.com\/opinions\/the-need-for-ubiquitous-data-encryption\/2015\/07\/28\/3d145952-324e-11e5-8353-1215475949f4_story.html\">come out strongly in support of end-to-end encryption<\/a> and strong device protection (much like the kind <a href=\"https:\/\/www.aei.org\/publication\/gen-michael-hayden-on-apple-the-fbi-and-data-encryption\/\">Apple has been developing<\/a>), which can protect against hacking and other data theft incidents.<\/p>\n<p><img loading=\"lazy\" src=\"https:\/\/counter.theconversation.com\/content\/84252\/count.gif?distributor=republish-lightbox-basic\" alt=\"The Conversation\" width=\"1\" height=\"1\" \/>As technology changes, the jobs of police and intelligence workers must also change; in some ways, it will be harder, in others, easier. But the basic need for security supports the call for wide use of strong encryption \u2013 and without modifications that make it easy for Russians, or others, to break in.<\/p>\n<p><span><a href=\"https:\/\/theconversation.com\/profiles\/susan-landau-409193\">Susan Landau<\/a>, Professor of Computer Science, Law and Diplomacy and Cybersecurity, <em><a href=\"http:\/\/theconversation.com\/institutions\/tufts-university-1024\">Tufts University<\/a><\/em><\/span><\/p>\n<p>This article was originally published on <a href=\"http:\/\/theconversation.com\">The Conversation<\/a>. Read the <a href=\"https:\/\/theconversation.com\/real-security-requires-strong-encryption-even-if-investigators-get-blocked-84252\">original article<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Susan Landau, Tufts University The FBI and the U.S. Department of Justice have been fighting against easy, widespread public access to encryption technologies for 25 years. Since the bureau\u2019s dispute with Apple in 2016 over access to the encrypted iPhone of one of the two people who shot 14 victims in San Bernardino, California, this [&hellip;]<\/p>\n","protected":false},"author":44,"featured_media":10353,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[3410],"tags":[3427,1701,612,2555,3429,2375,3428,1749,2376,525,2989,2343],"_links":{"self":[{"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/posts\/10352"}],"collection":[{"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/users\/44"}],"replies":[{"embeddable":true,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/comments?post=10352"}],"version-history":[{"count":1,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/posts\/10352\/revisions"}],"predecessor-version":[{"id":10354,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/posts\/10352\/revisions\/10354"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/media\/10353"}],"wp:attachment":[{"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/media?parent=10352"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/categories?post=10352"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/tags?post=10352"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}