{"id":229,"date":"2015-04-14T06:26:33","date_gmt":"2015-04-14T06:26:33","guid":{"rendered":"http:\/\/www.dogoodsoft.com\/blog\/?p=229"},"modified":"2024-12-23T07:52:57","modified_gmt":"2024-12-23T07:52:57","slug":"the-nsa-wants-a-multi-part-encryption-key-for-front-door-access-to-your-data","status":"publish","type":"post","link":"https:\/\/www.dogoodsoft.com\/blog\/the-nsa-wants-a-multi-part-encryption-key-for-front-door-access-to-your-data-229\/","title":{"rendered":"The NSA wants a multi-part encryption key for &#8220;front door&#8221; access to your data"},"content":{"rendered":"<p><a href=\"https:\/\/www.dogoodsoft.com\/blog\/wp-content\/uploads\/2015\/04\/1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-230 size-full\" src=\"https:\/\/www.dogoodsoft.com\/blog\/wp-content\/uploads\/2015\/04\/1.png\" alt=\"The NSA wants a multi-part encryption key for 'front door' access to your data\" width=\"231\" height=\"238\" \/><\/a><\/p>\n<p>The US National Security Agency (NSA) appears to be increasingly concerned about the growing\u00a0adoption of encryption and its ability to thwart the agency&#8217;s surveillance efforts.<\/p>\n<p>Now, after months of debate with tech firms about government access to encrypted data on smartphones and other devices, the NSA has proposed a solution which it hopes will strike a balance between its desire to know everything about everyone and the average law-abiding citizen&#8217;s right to privacy.<\/p>\n<p>According to The Washington Post,\u00a0that solution &#8211; put forward by\u00a0NSA director Michael S. Rogers &#8211; lies in a multi-part encryption key, created by various tech companies, which could unlock any device.<\/p>\n<p>Speaking at Princeton University recently, Rogers said the key could be broken into several parts, meaning no one agency or company would be able to use it without the co-operation of the others:<\/p>\n<blockquote><p><tt>I don't want a back door. I want a front door. And I want the front door to have multiple locks. Big locks.<\/tt><\/p><\/blockquote>\n<p>With the highly contentious Section 215 of the Patriot Act &#8211; legislation that has allowed mass eavesdropping from the security services &#8211; due to sunset on 1 June 2015, privacy rights groups and concerned members of the public have long been voicing their concerns about bulk data collection.<\/p>\n<p>Add to that the fact that firms such as Apple, Google and Microsoft recently sent a letter to President Barack Obama which demanded an end to data collection, and you can probably\u00a0see why the NSA is exploring more palatable alternatives.<\/p>\n<p>The debate about encryption and government access comes about as tech companies continue to make customer privacy a key selling point for their products and services.<\/p>\n<p>Companies like Apple &#8211; which recently took the decision to enable device encryption by default and made key promises to its customers concerning their privacy &#8211; are giving the NSA a real headache as the agency argues the need for government access to data to aid in the battle against crime and terrorism.<\/p>\n<p>Edward Snowden, for his part, continues to lament the level of access the US government still has. At a ecret meeting at this year&#8217;s South by Southwest festival he urged tech companies to foil surveillance efforts through the development of better privacy tools.<\/p>\n<p>But Rogers firmly believes that his proposal for a\u00a0&#8216;front door&#8217; is both sound and justified, allowing for\u00a0access as and when required, while keeping data safe from would-be hackers and other forms of attack.<\/p>\n<p>Of course, his view is not universally shared &#8211;\u00a0Donna Dodson, chief cyber\u00adsecurity adviser at the Commerce Department&#8217;s National Institute of Standards and Technologies pointed out that a master key still presents\u00a0a risk, even if it is broken into parts held by different parties:<\/p>\n<blockquote><p><tt>The basic question is, is it possible to design a completely secure system?\u00a0There\u2019s no way to do this where you don\u2019t have unintentional vulnerabilities.<\/tt><\/p><\/blockquote>\n<p>Privacy advocates and industry officials alike are not convinced by Rogers&#8217; proposal either. Marc Zwillinger, a former Justice Department official now working as an attorney for tech companies on encryption-related matters, told the Post that law enforcement should not have the undeniable right to access every means of communication between two parties. He added:<\/p>\n<blockquote><p><tt>I don\u2019t think our Founding Fathers would think so, either.<\/tt><\/p>\n<p><tt>The fact that the Constitution offers a process for obtaining a search warrant where there is probable cause is not support for the notion that it should be illegal to make an unbreakable lock. These are two distinct concepts.<\/tt><\/p><\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p>The US National Security Agency (NSA) appears to be increasingly concerned about the growing\u00a0adoption of encryption and its ability to thwart the agency&#8217;s surveillance efforts. Now, after months of debate with tech firms about government access to encrypted data on smartphones and other devices, the NSA has proposed a solution which it hopes will strike &hellip; <a href=\"https:\/\/www.dogoodsoft.com\/blog\/the-nsa-wants-a-multi-part-encryption-key-for-front-door-access-to-your-data-229\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">The NSA wants a multi-part encryption key for &#8220;front door&#8221; access to your data<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[97,96,95],"class_list":["post-229","post","type-post","status-publish","format-standard","hentry","category-news","tag-front-door","tag-multi-part-encryption-key","tag-nsa"],"_links":{"self":[{"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/posts\/229","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/comments?post=229"}],"version-history":[{"count":2,"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/posts\/229\/revisions"}],"predecessor-version":[{"id":332,"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/posts\/229\/revisions\/332"}],"wp:attachment":[{"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/media?parent=229"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/categories?post=229"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/tags?post=229"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}