{"id":381,"date":"2015-07-09T03:22:45","date_gmt":"2015-07-09T03:22:45","guid":{"rendered":"http:\/\/www.dogoodsoft.com\/blog\/?p=381"},"modified":"2024-12-23T07:52:20","modified_gmt":"2024-12-23T07:52:20","slug":"fbi-chief-wants-backdoor-access-to-encrypted-communications-to-fight-isis","status":"publish","type":"post","link":"https:\/\/www.dogoodsoft.com\/blog\/fbi-chief-wants-backdoor-access-to-encrypted-communications-to-fight-isis-381\/","title":{"rendered":"FBI chief wants &#8216;backdoor access&#8217; to encrypted communications to fight Isis"},"content":{"rendered":"<p><a href=\"https:\/\/www.dogoodsoft.com\/blog\/wp-content\/uploads\/2015\/07\/Snap11.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-382 size-full\" src=\"https:\/\/www.dogoodsoft.com\/blog\/wp-content\/uploads\/2015\/07\/Snap11.jpg\" alt=\"FBI chief wants 'backdoor access' to encrypted communications to fight Isis\" width=\"618\" height=\"371\" srcset=\"https:\/\/www.dogoodsoft.com\/blog\/wp-content\/uploads\/2015\/07\/Snap11.jpg 618w, https:\/\/www.dogoodsoft.com\/blog\/wp-content\/uploads\/2015\/07\/Snap11-300x180.jpg 300w, https:\/\/www.dogoodsoft.com\/blog\/wp-content\/uploads\/2015\/07\/Snap11-2x1.jpg 2w\" sizes=\"auto, (max-width: 618px) 100vw, 618px\" \/><\/a><\/p>\n<p>The director of the Federal Bureau of Investigation has warned US senators that the threat from the Islamic State merits a &#8220;debate&#8221; about limiting commercial encryption \u2013 the linchpin of digital security \u2013 despite a growing chorus of technical experts who say that undermining encryption would prove an enormous boon for hackers, cybercriminals, foreign spies and terrorists.<\/p>\n<p>In a twin pair of appearances before the Senate\u2019s judiciary and intelligence committees on Wednesday, James Comey testified that Isis\u2019s use of end-to-end encryption, whereby the messaging service being used to send information does not have access to the decryption keys of those who receive it, helped the group place a \u201cdevil\u201d on the shoulders of potential recruits \u201csaying kill, kill, kill, kill\u201d.<\/p>\n<p>Comey said that while the FBI is thus far disrupting Isis plots, &#8220;I cannot see me stopping these indefinitely&#8221;. He added: &#8220;I am not trying to scare folks.&#8221;<\/p>\n<p>Since October, following Apple\u2019s decision to bolster its mobile-device security, Comey has called for a &#8220;debate&#8221; about inserting &#8220;back doors&#8221; \u2013 or &#8220;front doors&#8221;, as he prefers to call them \u2013 into encryption software, warning that &#8220;encryption threatens to lead us all to a very, very dark place.&#8221;<\/p>\n<p>But Comey and deputy attorney general Sally Quillian Yates testified that they do not at the moment envision proposing legislation to mandate surreptitious or backdoor access to law enforcement. Both said they did not wish the government to itself hold user encryption keys and preferred to &#8220;engage&#8221; communications providers for access, though technicians have stated that what Comey and Yates seek is fundamentally incompatible with end-to-end encryption.<\/p>\n<p>Comey, who is not a software engineer, said his response to that was: &#8220;Really?&#8221; He framed himself as an advocate of commercial encryption to protect personal data who believed that the finest minds of Silicon Valley can invent new modes of encryption that can work for US law enforcement and intelligence agencies without inevitably introducing security flaws.<\/p>\n<p>While the FBI director did not specifically cite which encrypted messaging apps Isis uses, the Guardian reported in December that its grand mufti used WhatsAppto communicate with his former mentor. WhatsApp adopted end-to-end encryption last year.<\/p>\n<p>&#8220;I think we need to provide a court-ordered process for obtaining that data,&#8221; said Dianne Feinstein, the California Democrat and former intelligence committee chair who represents Silicon Valley.<br \/>\nBut Comey\u2019s campaign against encryption has run into a wall of opposition from digital security experts and engineers. Their response is that there is no technical way to insert a back door into security systems for governments that does not leave the door ajar for anyone \u2013 hackers, criminals, foreign intelligence services \u2013 to exploit and gain access to enormous treasure troves of user data, including medical records, financial information and much more.<\/p>\n<p>The cybersecurity expert Susan Landau, writing on the prominent blog Lawfare, called Comey\u2019s vision of a security flaw only the US government could exploit &#8220;magical thinking&#8221;.<\/p>\n<p>Comey is aided in his fight against encryption by two allies, one natural and the other accidental. The natural ally is the National Security Agency director, Michael Rogers, who in February sparred with Yahoo\u2019s chief of information security when the Yahoo official likened the anti-crypto push to &#8220;drilling a hole in the windshield&#8221;, saying: &#8220;I just believe that this is achievable. We\u2019ll have to work our way through it.&#8221; The Guardian, thanks to Edward Snowden\u2019s disclosures, revealed in September 2013 that the NSA already undermines encryption.<\/p>\n<p>The less obvious ally is China, whom the FBI blamed last month for stealing a massive hoard of federal personnel data.<\/p>\n<p>In May, China unveiled a national security law calling for &#8220;secure and controllable&#8221; technologies, something US and foreign companies fear is a prelude to a demand for backdoor entry into companies\u2019 encryption software or outright provision of encryption keys.<\/p>\n<p>Without ever mentioning his own FBI director\u2019s and NSA director\u2019s similar demands, Barack Obama castigated China\u2019s anti-encryption push in March. Obama has also declined to criticize efforts in the UK, the US\u2019s premier foreign ally, to undermine encryption. Prime minister David Cameron is proposing to introduce legislation in the autumn to force companies such as Apple, Google and Microsoft to provide access to encrypted data.<\/p>\n<p>Under questioning from some skeptical senators, Comey made a number of concessions. When Ron Wyden, an Oregon Democrat, asked if foreign countries would attempt to mandate similar access, Comey replied, &#8220;I think they might.&#8221; The director acknowledged that foreign companies, exempt from any hypothetical US mandate, would be free to market encryption software.<br \/>\nIn advance of Comey\u2019s testimony, several of the world\u2019s leading cryptographers, alarmed by the return of a battle they thought won during the 1990s &#8220;Crypto Wars&#8221;, rejected the effort as pernicious from a security perspective and technologically illiterate.<\/p>\n<p>A paper they released on Tuesday, called &#8220;Keys Under Doormats&#8221;, said the transatlantic effort to insert backdoors into encryption was &#8220;unworkable in practice, raise[s] enormous legal and ethical questions, and would undo progress on security at a time when internet vulnerabilities are causing extreme economic harm&#8221;.<\/p>\n<p>Asked by Feinstein if the experts had a point, Comey said: &#8220;Maybe. If that\u2019s the case, I guess we\u2019re stuck.&#8221;<\/p>\n<p>Kevin Bankston of the New America Foundation called into question the necessity of Comey\u2019s warnings that encryption would lead to law enforcement &#8220;going dark&#8221; against threats. Bankston, in a Tuesday blogpost, noted that the government\u2019s latest wiretap disclosure found that state and federal governments could not access four encrypted conversations out of 3,554 wiretapped in 2014.<\/p>\n<p>Yet Yates said both that the Justice Department was &#8220;increasingly&#8221; facing the encryption challenge and that she lacked the data quantifying how serious the challenge was. Yates told the Senate judiciary committee that law enforcement declined to seek warrants in cases of encrypted communications and did not say how often it made such a decision.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The director of the Federal Bureau of Investigation has warned US senators that the threat from the Islamic State merits a &#8220;debate&#8221; about limiting commercial encryption \u2013 the linchpin of digital security \u2013 despite a growing chorus of technical experts who say that undermining encryption would prove an enormous boon for hackers, cybercriminals, foreign spies &hellip; <a href=\"https:\/\/www.dogoodsoft.com\/blog\/fbi-chief-wants-backdoor-access-to-encrypted-communications-to-fight-isis-381\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">FBI chief wants &#8216;backdoor access&#8217; to encrypted communications to fight Isis<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[143,142,52],"class_list":["post-381","post","type-post","status-publish","format-standard","hentry","category-news","tag-data-and-computer-security","tag-data-protection","tag-encryption"],"_links":{"self":[{"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/posts\/381","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/comments?post=381"}],"version-history":[{"count":1,"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/posts\/381\/revisions"}],"predecessor-version":[{"id":383,"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/posts\/381\/revisions\/383"}],"wp:attachment":[{"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/media?parent=381"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/categories?post=381"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/tags?post=381"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}