US Top Law Enforcement Calls Strong Encryption a ‘Serious Problem’

Exterminator

Level 85
Thread author
Verified
Top Poster
Well-known
Oct 23, 2012
12,527
BOSTON—Top U.S. law enforcement and policy makers touched the third-rail issue of encryption Wednesday with several high-ranking officials lamenting their inability to crack open phones, laptops and communications protected with strong encryption.

U.S. Deputy Attorney General Rod Rosenstein made the strongest argument that “warrant-proof” encryption hobbles law enforcement’s ability to protect the public and solve crimes. He argued instant messaging services such as WhatsApp, iMessage and Signal “encrypt their messages by default, thereby blocking the police from reading those messages, even if an impartial judge authorizes their interception.”

“Increasingly, technology frustrates the traditional law enforcement efforts to collect evidence that’s needed to protect public safety and solve crimes,” Rosenstein told attendees of The Cambridge Cyber Summit. No where is that more apparent, Rosenstein said, than with criminals that have “gone dark” and use the cloak of anonymity to access illicit markets that “facilitate all matter of crime, from narcotics trafficking, to illegal firearm sales, to identity theft, child exploitation, and computer hacking.”

He said, “the advent of warrant-proof encryption is a serious problem” and “it threatens to destabilize the balance between privacy and security that has existed for two centuries.” At the same time, Rosenstein also stressed encryption can be a valuable tool “essential to the growth and flourishing of the digital economy.”
A year and a half ago, Apple fought the FBI over data privacy and law enforcement’s attempt to force the company to unlock an iPhone used by a terrorist. That sparked a loud privacy debate that may have quieted over the past several months, but is far from decided.

Proponents of strong encryption maintain data protection is a basic necessity ensuring privacy and the safety of digital communications, data, devices and networks. Backdoors or weak encryption open the door for hackers or repressive governments to compromise individual safety and privacy.

“We are certainly not asking for a backdoor. What’s really important for America is strong encryption. It’s good for business, it’s good for individuals,” Rob Joyce, special assistant to the president and cyber security coordinator for the White House, told attendees.

“The flip side of that is there are some really evil people in this world and in the end the rule of law needs to proceed. So, what we are asking for is for companies to consider how they can support legal needs for information – things that come from a judicial order. How can they be responsive to that?”

Tech firms need to consider from the outset—when building a platform or building a capability—how they are going to respond to those inevitable asks from a judge’s order, Joyce said.

“There are other companies that I would consider more responsible corporate citizens that are considering from the start they will need to be responsive to an order,” Joyce said. “We are hoping other companies will consider our (legal) needs and not take a hands-off approach, but consider us in their architecture.”

Joyce said he didn’t expect companies to lay bare every secret behind an encryption application, but just “enough to be responsive to what law enforcement and intel folks need.”

Between the two, Rosenstein was the more vocal critic of the use of end-to-end encryption in network communications, laptops and mobile phones. “Our society has never had a system where evidence of criminal wrongdoing was totally impervious to detection, even when officers obtained a court-authorized warrant. But that’s the world that is being created,” he said.

“People should understand the consequences of warrant-proof security. We should have a candid public debate about the pros and cons of allowing companies to create lock boxes that cannot be opened by police and judges,” Rosenstein said.
 

Arequire

Level 29
Verified
Top Poster
Content Creator
Feb 10, 2017
1,822
Joyce said he didn’t expect companies to lay bare every secret behind an encryption application, but just “enough to be responsive to what law enforcement and intel folks need.”
What a great statement...

"We only want the information that allows us - the ones with the ability to imprison for the rest of your life - to associate you with something we may find undesirable or alarming and retain that information indefinitely in case we need to reference it at a later date. That's all we want!" :rolleyes:
 

Entreri

Level 7
Verified
May 25, 2015
342
With the prison industrial complex in the US, if I live in the states, I would want as much protection as possible from these corrupt LEO's and so called "justice" system.

Numerous nations around the world are run by tin-pot dictators, religious nutters, and a few are communist. Strong encryption protects us all.

Let us not forget, that the greatest mass murderers in history, by far, is the state.
 

zzz00m

Level 6
Verified
Well-known
Jun 10, 2017
248
Just a random thought here, but maybe it wouldn't be such a big problem now if the US government hadn't abused the public's trust by the secret widespread gathering of data on private citizens without a warrant. I think most Americans, including the law abiding ones, would prefer to take their personal info to the grave with them.
 

mlnevese

Level 28
Verified
Top Poster
Well-known
May 3, 2015
1,742
Does anyone have any doubts that strong privacy options may be used to hide criminal activity? I think this is not a surprise to anyone...
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top