{"id":245,"date":"2015-04-22T02:04:26","date_gmt":"2015-04-22T02:04:26","guid":{"rendered":"http:\/\/www.dogoodsoft.com\/blog\/?p=245"},"modified":"2024-12-23T08:00:18","modified_gmt":"2024-12-23T08:00:18","slug":"u-s-secretary-of-homeland-security-warns-about-the-dangers-of-pervasive-encryption","status":"publish","type":"post","link":"https:\/\/www.dogoodsoft.com\/blog\/u-s-secretary-of-homeland-security-warns-about-the-dangers-of-pervasive-encryption-245\/","title":{"rendered":"U.S. Secretary Of Homeland Security Warns About The Dangers Of Pervasive Encryption"},"content":{"rendered":"<p><a href=\"https:\/\/www.dogoodsoft.com\/blog\/wp-content\/uploads\/2015\/04\/Snap14.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-247 size-full\" src=\"https:\/\/www.dogoodsoft.com\/blog\/wp-content\/uploads\/2015\/04\/Snap14.jpg\" alt=\"U.S. Secretary Of Homeland Security Warns About The Dangers Of Pervasive Encryption\" width=\"692\" height=\"388\" srcset=\"https:\/\/www.dogoodsoft.com\/blog\/wp-content\/uploads\/2015\/04\/Snap14.jpg 692w, https:\/\/www.dogoodsoft.com\/blog\/wp-content\/uploads\/2015\/04\/Snap14-300x168.jpg 300w, https:\/\/www.dogoodsoft.com\/blog\/wp-content\/uploads\/2015\/04\/Snap14-2x1.jpg 2w\" sizes=\"auto, (max-width: 692px) 100vw, 692px\" \/><\/a><\/p>\n<p>In a speech at cybersecurity conference RSA, U.S. Secretary of Homeland Security Jeh Johnson outlined the government\u2019s discomfort with increasing implementation of encryption by technology companies, and what impact the shift might have on national security.<\/p>\n<p>While tech firms like Apple are advancing encryption to an increasingly broad set of consumer activities, the government is concerned that it could increasingly be locked out from the communications, and the intentions, of threats to national security.<\/p>\n<p>The issue of encryption, who should hold the controlling\u00a0keys, and if American technology companies should be compelled to provide special access to consumer data to the United States government are issues as old as they are controversial. The common argument against any weakening of encryption is that there are no unexploitable weaknesses \u2014 if Google were to craft a back or front door for the U.S.\u00a0government,\u00a0it\u2019s impossible to keep that same entryway free from other parties.<\/p>\n<p>After asking for \u201cindulgence\u201d and \u201cunderstanding,\u201d the secretary said during his remarks that the \u201ccurrent course [the technology industry is on, toward deeper and deeper encryption in response to the demands of the marketplace, is one that presents real challenges for those in law enforcement and national security.\u201d<\/p>\n<p>In\u00a0the secretary\u2019s view, the nation\u2019s \u201cinability to access encrypted information poses public safety challenges.\u201d Ignoring the mild irony behind that comment \u2014 why else <i>would<\/i> you choose to encrypt data? \u2014 the government employee continued: \u201cIn fact, encryption is making it harder for your government to find criminal activity and potential terrorist activity.\u201d<\/p>\n<p>Johnson concluded with a colorful description of privacy and freedom, calling them \u201cthe things that constitute our greatest homeland security.\u201d<\/p>\n<p>His remarks were very similar to President Barack Obama\u2019s in an interview earlier this year with Re\/code\u2019s Kara Swisher. The president said that while he was more in favor of encryption than most in law enforcement, he also recognized the problems it posed for those agencies. Both Obama and Johnson spoke about the importance of privacy when facing tech-oriented audiences, but failed to take a strong stance in its defense.<\/p>\n<p>The Homeland Security secretary weighs in on this issue as White House aides are investigating encryption and preparing\u00a0to\u00a0report back to the president this month. In a recent speech at Princeton University,NSA chief\u00a0Michael Rogers argued law enforcement should have front door access with multiple locks. He argued government abuse of this access could be avoided by splitting multiple keys\u00a0among separate agencies.<\/p>\n<p>But Jeff Williams, the CTO of Contrast Security, tells TechCrunch that such an approach is impossible. He\u00a0argued that it would be impossible for the government to create technology that would allow it front door access to all communications devices and splitting such a tool among agencies would be inefficient and ineffective.\u00a0He also said a split key could still be thwarted by super-encryption.<\/p>\n<p>\u201cFrankly the\u00a0cat is out of the bag on secure encryption,\u201d Williams said.<\/p>\n<p>Even with the upcoming report to the president, it is unlikely Obama will take any measurable stand for Americans\u2019 privacy rights. The private sector and law enforcement have\u00a0volleyed back and forth on this issue for decades, now reigniting the exact same debate we saw in the early 1990s over the Clipper Chip. We\u2019ve seen the White House take very little action on limiting the scope of the American intelligence apparatus, even in the wake of high-profile leaks from Edward Snowden.<\/p>\n<p><strong>Why would it start now?<\/strong><\/p>\n<p>The private sector has to keep improving encryption, as customers \u2014 particularly those outside the United States \u2014 worry about surveillance. But as these companies work to keep threats out of these devices, we can be certain that our law enforcement agencies are working just as fast to break into them.<\/p>\n<p>With little public scrutiny over this technical issue, politicians have little incentive to stand up for privacy. Even with high-profile remarks such as those from Johnson today, it\u2019s likely we\u2019ll continue to see more of the status quo.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In a speech at cybersecurity conference RSA, U.S. Secretary of Homeland Security Jeh Johnson outlined the government\u2019s discomfort with increasing implementation of encryption by technology companies, and what impact the shift might have on national security. While tech firms like Apple are advancing encryption to an increasingly broad set of consumer activities, the government is &hellip; <a href=\"https:\/\/www.dogoodsoft.com\/blog\/u-s-secretary-of-homeland-security-warns-about-the-dangers-of-pervasive-encryption-245\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">U.S. Secretary Of Homeland Security Warns About The Dangers Of Pervasive Encryption<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[106,105,104],"class_list":["post-245","post","type-post","status-publish","format-standard","hentry","category-news","tag-dangers-of-pervasive-encryption","tag-pervasive-encryption","tag-u-s"],"_links":{"self":[{"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/posts\/245","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/comments?post=245"}],"version-history":[{"count":2,"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/posts\/245\/revisions"}],"predecessor-version":[{"id":248,"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/posts\/245\/revisions\/248"}],"wp:attachment":[{"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/media?parent=245"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/categories?post=245"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/tags?post=245"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}