{"id":596,"date":"2015-10-15T02:05:48","date_gmt":"2015-10-15T02:05:48","guid":{"rendered":"http:\/\/www.dogoodsoft.com\/blog\/?p=596"},"modified":"2024-12-23T07:59:02","modified_gmt":"2024-12-23T07:59:02","slug":"the-next-steps-for-the-white-house-on-encryption","status":"publish","type":"post","link":"https:\/\/www.dogoodsoft.com\/blog\/the-next-steps-for-the-white-house-on-encryption-596\/","title":{"rendered":"The next steps for the White House on encryption"},"content":{"rendered":"<p><a href=\"https:\/\/www.dogoodsoft.com\/blog\/wp-content\/uploads\/2015\/10\/11.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-597 size-full\" src=\"https:\/\/www.dogoodsoft.com\/blog\/wp-content\/uploads\/2015\/10\/11.png\" alt=\"The next steps for the White House on encryption\" width=\"621\" height=\"416\" srcset=\"https:\/\/www.dogoodsoft.com\/blog\/wp-content\/uploads\/2015\/10\/11.png 621w, https:\/\/www.dogoodsoft.com\/blog\/wp-content\/uploads\/2015\/10\/11-300x201.png 300w, https:\/\/www.dogoodsoft.com\/blog\/wp-content\/uploads\/2015\/10\/11-1x1.png 1w\" sizes=\"auto, (max-width: 621px) 100vw, 621px\" \/><\/a><\/p>\n<p>THE OBAMA administration\u2019s decision not to seek legislation requiring technology companies to give law enforcement access to encrypted communications on smartphones has a certain logic. In this age of hacking and cyberintrusion, encryption can keep most people safer. But the decision also carries risks. Encryption can give a tiny band of criminals and terrorists a safe haven. The United States must now make the most of the useful side of encryption, but without losing sight of the risks.<\/p>\n<p>FBI Director James B. Comey warned last year that law enforcement might be \u201cgoing dark\u201d because technology companies, including Apple and Google, are introducing ways for users to send encrypted messages by smartphones that can be unlocked only by the users, not by the companies. Mr. Comey was alarmed this would give criminals and terrorists a place to communicate that was beyond reach even of law enforcement with a court order. Mr. Comey suggested Congress require tech companies to provide what is known as extraordinary access to encrypted information, a \u201clawful intercept\u201d capability, sometimes referred to as a backdoor, or a special key for the government. We sympathized with Mr. Comey\u2019s appeal and urged all sides to look for a compromise.<\/p>\n<p>No compromise was forthcoming. The reaction to Mr. Comey\u2019s suggestion in the technology world was a strong protest that any weakening of encryption \u2014 even a tiny bit, for a good reason \u2014 creates a vulnerability for all. The firms also made the argument that encryption can be a positive force in today\u2019s chaotic world of cyberattacks; their customers want absolute privacy, too, for the digital lives held on the smartphones in their pockets. They also pointed out that if backdoor access is granted to the U.S. government, it will provide cover for authoritarian governments such as China and Russia to demand the same or worse.<\/p>\n<p>Mr. Comey said last week that private talks with the tech companies have been \u201cincreasingly productive.\u201d That is promising. There are methods the FBI might use to crack encryption case by case or to find the information elsewhere. The FBI and state and local law enforcement are most in need; the National Security Agency has much stronger tools for breaking encryption overseas.<\/p>\n<p>Having stood up to Mr. Comey, Silicon Valley should demonstrate the same fortitude when it comes to China and Russia and absolutely refuse to allow intrusions by these and other police states. It would help, too, if President Obama articulated the principle loud and clear.<\/p>\n<p>That leaves a nagging worry. The United States is a rule-of-law nation, and encryption technology is creating a space that is in some ways beyond the reach of the law. Encryption may indeed be valuable to society if it protects the majority. But what if it enables or protects the 1 percent who are engaged in criminality or terrorism? That threat has to be taken into account, and so far it remains unresolved. It will not go away.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>THE OBAMA administration\u2019s decision not to seek legislation requiring technology companies to give law enforcement access to encrypted communications on smartphones has a certain logic. In this age of hacking and cyberintrusion, encryption can keep most people safer. But the decision also carries risks. Encryption can give a tiny band of criminals and terrorists a &hellip; <a href=\"https:\/\/www.dogoodsoft.com\/blog\/the-next-steps-for-the-white-house-on-encryption-596\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">The next steps for the White House on encryption<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[60,245,52,244],"class_list":["post-596","post","type-post","status-publish","format-standard","hentry","category-news","tag-apple","tag-comey","tag-encryption","tag-smartphones"],"_links":{"self":[{"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/posts\/596","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/comments?post=596"}],"version-history":[{"count":1,"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/posts\/596\/revisions"}],"predecessor-version":[{"id":598,"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/posts\/596\/revisions\/598"}],"wp:attachment":[{"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/media?parent=596"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/categories?post=596"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/tags?post=596"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}