{"id":831,"date":"2016-03-10T02:41:51","date_gmt":"2016-03-10T02:41:51","guid":{"rendered":"http:\/\/www.dogoodsoft.com\/blog\/?p=831"},"modified":"2024-12-23T07:47:03","modified_gmt":"2024-12-23T07:47:03","slug":"new-fbi-strategy-wins-back-lost-ground-in-encryption-fight","status":"publish","type":"post","link":"https:\/\/www.dogoodsoft.com\/blog\/new-fbi-strategy-wins-back-lost-ground-in-encryption-fight-831\/","title":{"rendered":"New FBI strategy wins back lost ground in encryption fight"},"content":{"rendered":"<p><a href=\"https:\/\/www.dogoodsoft.com\/blog\/wp-content\/uploads\/2016\/03\/fbi.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-832 size-large\" src=\"https:\/\/www.dogoodsoft.com\/blog\/wp-content\/uploads\/2016\/03\/fbi-1024x555.jpg\" alt=\"New FBI strategy wins back lost ground in encryption fight\" width=\"654\" height=\"354\" srcset=\"https:\/\/www.dogoodsoft.com\/blog\/wp-content\/uploads\/2016\/03\/fbi-1024x555.jpg 1024w, https:\/\/www.dogoodsoft.com\/blog\/wp-content\/uploads\/2016\/03\/fbi-300x163.jpg 300w, https:\/\/www.dogoodsoft.com\/blog\/wp-content\/uploads\/2016\/03\/fbi-2x1.jpg 2w, https:\/\/www.dogoodsoft.com\/blog\/wp-content\/uploads\/2016\/03\/fbi.jpg 1160w\" sizes=\"auto, (max-width: 654px) 100vw, 654px\" \/><\/a><\/p>\n<p>By July 2015, FBI Director Jim Comey knew he was losing the battle against sophisticated technologies that allowed criminals to communicate without fear of government surveillance.<\/p>\n<p>In back-to-back congressional hearings that month, Comey struggled to make the case that terrorists and crooks were routinely using such encryption systems to evade the authorities. He conceded that he had no real answer to the problem and agreed that all suggested remedies had major drawbacks. Pressed for specifics, he couldn\u2019t even say how often bureau investigations had been stymied by what he called the \u201cgoing dark\u201d problem.<\/p>\n<p>\u201cWe&#8217;re going to try and do that for you, but I&#8217;m not optimistic we&#8217;re going to be able to get you a great data set,\u201d he told lawmakers.<\/p>\n<p>This week, Comey was back before Congress with a retooled sales pitch. Gone were the vague allusions to ill-defined problems. In their place: a powerful tale of the FBI\u2019s need to learn what is on an encrypted iPhone used by one of the terrorists who killed 14 people in California. \u201cMaybe the phone holds the clue to finding more terrorists. Maybe it doesn\u2019t,\u201d Comey wrote shortly before testifying. \u201cBut we can&#8217;t look the survivors in the eye, or ourselves in the mirror, if we don&#8217;t follow this lead.\u201d<\/p>\n<p>The tactical shift has won Comey tangible gains. After more than a year of congressional inaction, two prominent lawmakers, Sen. Mark Warner (D-Va.) and House Homeland Security Chairman Michael McCaul (R-Texas), have proposed a federal commission that could lead to encryption legislation. Several key lawmakers, who previously hadn\u2019t chosen sides over encryption, such as Rep. Jim Langevin (D-RI), are siding with the administration in its legal battle with Apple. Likewise, several former national security officials \u2014 such as former National Security Agency chief Gen. Michael Hayden and former Director of National Intelligence Mike McConnell \u2014 who lined up with privacy advocates in the past have returned to the government side in this case.<\/p>\n<p>\u201cThe public debate was not going the FBI\u2019s way and it appears there\u2019s been a deliberate shift in strategy,\u201d said Mike German, a former FBI special agent. \u201cThey realized\u2026that the most politically tenable argument was going to be \u2018we need access when we have a warrant and in a serious criminal case. All the better if it\u2019s a terrorism case.\u2019\u201d<\/p>\n<p>The catalyst for change has been a high-stakes legal fight in a central California courtroom where Apple seeks to overturn a judge\u2019s order to write new software to help the FBI circumvent an iPhone passcode. Other technology companies such as Microsoft, Google, Facebook and Twitter this week rallied to Apple\u2019s side. The Justice Department, meanwhile, has drawn supporting legal briefs from law enforcement associations as well as families of the San Bernardino victims.<\/p>\n<p>Comey\u2019s evolution may have been foreshadowed last summer. In an August email, Robert Litt, the intelligence community\u2019s top lawyer, wrote colleagues that the mood on Capitol Hill \u201ccould turn in the event of a terrorist attack or criminal event where strong encryption can be shown to have hindered law enforcement,\u201d according to The Washington Post.<\/p>\n<p>The Dec. 2 San Bernardino attack, coming less than three weeks after a coordinated series of Islamic State shootings and bombing killed at least 130 people in Paris, reignited law enforcement concern about terrorists\u2019 ability to shield their plotting via encryption. The San Bernardino killers, Syed Farook and his wife Tashfeen Malik, destroyed two cellphones before dying in a gun battle with police. Investigators discovered the iPhone at issue in the courtroom fight inside the Farook family\u2019s black Lexus sedan.<\/p>\n<p>To be sure, Comey\u2019s new strategy thus far has paid only limited dividends. The Warner-McCaul commission, if it is ever formed, may or may not change U.S. encryption policy. Renewed support from former officials, such as Hayden and McConnell, extends only to the San Bernardino case.<\/p>\n<p>Indeed, the FBI director\u2019s hopes for an enduring solution to \u201cthe going dark\u201d problem remain aspirational. The White House last fall abandoned plans to seek legislation mandating a technological fix for authorities\u2019 encryption headaches. And since then, the Obama administration has confined itself to jawboning Silicon Valley.<\/p>\n<p>But in choosing to make a fight over the iPhone used by one of the San Bernardino terrorists, Comey has selected an advantageous battlefield. Many encryption supporters say that the San Bernardino case isn\u2019t really about encryption because the FBI is asking Apple to build custom software that bypasses the phone\u2019s passcode, a separate though related security feature. That distinction, however, may be lost on the public and many members of Congress. Some have even speculated the FBI is using the San Bernardino massacre to revive an encryption debate that it appeared to have lost.<\/p>\n<p>\u201cIt appears to me they\u2019re using this case specifically to try to enact a policy proposal they could not get through Congress last year,\u201d said Rep. Ted Lieu (D-Calif.), an encryption advocate. \u201cIt\u2019s clear to me that the FBI is trying to use this case to influence the public.\u201d<\/p>\n<p>The fight with Apple not only carries the emotional heft of terrorism, but \u2014 thanks to the distinction between encryption backdoors and passcode subversion \u2014 has drawn many of Comey\u2019s most vocal critics from the national security community back into the fold.<\/p>\n<p>Hayden, the former NSA head, and McConnell, the nation\u2019s ex-intelligence czar, opposed Congress mandating the creation of technological \u201cback doors\u201d for the government to exploit. Yet, on the Apple case, they side with Comey.<\/p>\n<p>\u201cThe FBI made this a test case and that was very deliberate on their part, to refocus the conversation,\u201d said Robert Cattanach, a former Justice Department prosecutor. \u201cThis is not some abstract principle of privacy versus government overreach. There are real impacts.\u201d<\/p>\n<p>The San Bernardino case could be a win-win for Comey. If Apple prevails in court, Congress might respond by intervening with legislation. Both the FBI and Apple have said Congress is better equipped to manage the issue than courts.<\/p>\n<p>The legal battles also may discourage companies from building strong encryption given the risk of future legal showdowns, said German, who is now a fellow with the Brennan Center for Justice.<\/p>\n<p>\u201cThis is less about Apple than about the developer who is sitting in his garage right now creating the next big thing,\u201d he said. \u201cThe idea is to make that person realize that the stronger they build the security the harder it will be for them when they get that order to unlock it to do so. There\u2019s an incentive to build a crack in the system.\u201d<\/p>\n","protected":false},"excerpt":{"rendered":"<p>By July 2015, FBI Director Jim Comey knew he was losing the battle against sophisticated technologies that allowed criminals to communicate without fear of government surveillance. In back-to-back congressional hearings that month, Comey struggled to make the case that terrorists and crooks were routinely using such encryption systems to evade the authorities. He conceded that &hellip; <a href=\"https:\/\/www.dogoodsoft.com\/blog\/new-fbi-strategy-wins-back-lost-ground-in-encryption-fight-831\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">New FBI strategy wins back lost ground in encryption fight<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[52,88,333],"class_list":["post-831","post","type-post","status-publish","format-standard","hentry","category-news","tag-encryption","tag-fbi","tag-strategy"],"_links":{"self":[{"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/posts\/831","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/comments?post=831"}],"version-history":[{"count":1,"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/posts\/831\/revisions"}],"predecessor-version":[{"id":833,"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/posts\/831\/revisions\/833"}],"wp:attachment":[{"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/media?parent=831"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/categories?post=831"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.dogoodsoft.com\/blog\/wp-json\/wp\/v2\/tags?post=831"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}