{"id":57475,"date":"2015-05-04T12:00:50","date_gmt":"2015-05-04T11:00:50","guid":{"rendered":"https:\/\/www.transcend.org\/tms\/?p=57475"},"modified":"2015-05-05T21:24:41","modified_gmt":"2015-05-05T20:24:41","slug":"feds-are-using-fear-not-facts-in-anti-encryption-crusade","status":"publish","type":"post","link":"https:\/\/www.transcend.org\/tms\/2015\/05\/feds-are-using-fear-not-facts-in-anti-encryption-crusade\/","title":{"rendered":"Feds Are Using Fear, Not Facts, in Anti-Encryption Crusade"},"content":{"rendered":"<p><em>Federal agencies say encryption will doom us, but they\u2019re already using spy tools that circumvent it.<\/em><\/p>\n<p><em>30 Apr 2015 &#8211; <\/em>For months, the FBI, the National Security Agency and an alphabet soup of other spooky agencies have been lashing out at tech companies that have responded to former NSA contractor Edward Snowden\u2019s surveillance revelations by starting to protect customers with stronger encryption. But it\u2019s increasingly obvious that the government\u2019s crypto panic is powered by fear, not facts.<\/p>\n<p>Last week at the RSA security conference in San Francisco, Department of Homeland Security Director Jeh Johnson <a target=\"_blank\" href=\"http:\/\/gizmodo.com\/dhs-secretary-begs-silicon-valley-to-stop-the-encryptio-1699273657\" >begged Silicon Valley<\/a> companies to give the government access to encrypted communications, asking the crowd to \u201cimagine the problems if well after the advent of the telephone, the warrant authority of the government to investigate crime had extended only to the U.S. mail.\u201d<\/p>\n<p>\u201cImagine an America where federal, state and municipal law enforcement agencies cannot access critical communications, even when legally authorized to do so,\u201d <a target=\"_blank\" href=\"http:\/\/blogs.wsj.com\/experts\/2015\/04\/20\/the-fbis-stance-on-encrypted-communications\/\" >begins<\/a> a recent Wall Street Journal blog post written by Amy Hess, the FBI\u2019s executive assistant director. \u201cImagine the injustice if a suspected criminal can hide incriminating communications without fear of discovery by the police or if information that could exonerate an innocent party is inaccessible.\u201d<\/p>\n<p>The reason the FBI, Homeland Security and other agencies want us to imagine these frightening scenarios is that their encryption problem is just that: imaginary. It\u2019s built on the false premise that making encryption more accessible will allow criminals to shield themselves from the law. The only solution, the government says, is for companies to put backdoors into their devices and apps, <a target=\"_blank\" href=\"http:\/\/america.aljazeera.com\/opinions\/2014\/10\/fbi-surveillanceappleprivacyencryption.html\" >which by definition means installing defects<\/a> that make our data more vulnerable to criminals and spies.<\/p>\n<p>One need look only at what law enforcement agencies are doing in secret to see that these predictions of digital anarchy are pure fantasy.<\/p>\n<p>Earlier this month, Motherboard reporter Lorenzo Franceschi-Bicchierai discovered that <a target=\"_blank\" href=\"http:\/\/motherboard.vice.com\/read\/the-dea-has-been-secretly-buying-hacking-tools-from-an-italian-company\" >the Drug Enforcement Administration has been buying hacking tools<\/a> from an Italian company, Hacking Team, through a shell company based in Maryland. The software, Remote Control System, is a remote host-based interception suite that allows police to infect devices, steal passwords, intercept Skype calls and even monitor targets in real time through their webcams. Researchers discovered it (and a competing product, <a target=\"_blank\" href=\"https:\/\/citizenlab.org\/2013\/03\/you-only-click-twice-finfishers-global-proliferation-2\/\" >FinFisher<\/a>) is being <a target=\"_blank\" href=\"https:\/\/citizenlab.org\/2015\/03\/hacking-team-reloaded-us-based-ethiopian-journalists-targeted-spyware\/\" >used to spy on journalists and activists<\/a> in Morocco, Ethiopia, the United Arab Emirates and <a target=\"_blank\" href=\"https:\/\/citizenlab.org\/2014\/02\/mapping-hacking-teams-untraceable-spyware\/\" >other countries<\/a> with notoriously poor human rights records.<\/p>\n<p>Here\u2019s how Hacking Team <a target=\"_blank\" href=\"https:\/\/www.youtube.com\/watch?v=8GhEvuU8LjU\" >advertises<\/a> the software (emphasis added):<\/p>\n<p>You cannot stop your targets from moving. How can you keep chasing them? <em>What you need is a way to bypass encryption<\/em>, collect relevant data out of <em>any device<\/em> and keep monitoring your targets wherever they are, even outside your monitoring domain. <em>Remote Control System does exactly that.<\/em><\/p>\n<p>These kinds of tools aren\u2019t new, but their recent prevalence as commercial products underscores how government agencies are increasingly utilizing hacker techniques. The FBI has been in the hacking business for more than a decade, and it <a target=\"_blank\" href=\"http:\/\/www.nationaljournal.com\/tech\/fbi-s-plan-to-expand-hacking-power-advances-despite-privacy-fears-20150316\" >recently won new powers<\/a> to hack computers even when their user and location are unknown. This despite the fact that in 2013, a judge in Texas <a target=\"_blank\" href=\"https:\/\/www.theverge.com\/2013\/4\/26\/4269266\/judge-denies-fbi-request-to-install-webcam-spyware-on-suspects-pc\" >rejected an FBI request to send spyware<\/a> to an unknown suspect\u2019s computer, saying the agency offered \u201clittle more than vague assurances\u201d that it wouldn\u2019t intrude on innocents in the process.<\/p>\n<p>From a practical standpoint, these tactics make sense. Encryption protects data using impossibly complicated math, and it\u2019s infinitely easier to solve complicated math problems by stealing the answers than by cracking the code. The strongest encryption in the world won\u2019t save you if someone can get inside your computer and steal your encryption keys, and products such as Remote Control System and FinFisher are giving those capabilities to police and governments around the globe.<\/p>\n<p>It might also explain why U.S. agencies are still unable to show a single case in which encryption has crippled a criminal investigation. According to annual reports presented to Congress since 1997, encryption wasn\u2019t an obstacle to government wiretaps <a target=\"_blank\" href=\"http:\/\/www.theverge.com\/2013\/6\/28\/4475564\/government-wiretaps-foiled-by-encryption-for-the-first-time\" >even once until 2012<\/a>. Of the 3,576 wiretaps authorized in 2013, the government was bested by encryption in only <a target=\"_blank\" href=\"http:\/\/www.uscourts.gov\/Statistics\/WiretapReports\/wiretap-report-2013.aspx\" >nine cases<\/a>. None of those cases involved terrorists, kidnappers or any of the other cyberbogeymen the FBI keeps warning about, and there\u2019s no indication that encryption alone prevented any crimes from being solved.<\/p>\n<p>So either government agencies are being incredibly modest or they\u2019re simply hiding the fact that encryption isn\u2019t a real problem because they already have the means to circumvent it.<\/p>\n<p>Of course, giving police hacking powers presents a whole new set of problems. When should they be allowed to break into someone\u2019s computer? How would a judge ensure that they\u2019re hacking the right device and that innocent bystanders won\u2019t be affected? How long should a police or government agency be allowed to exploit a commercial software vulnerability for hacking purposes?<\/p>\n<p>Hacking isn\u2019t the only way police can get access to encrypted communications. In most cases, a court will simply compel a suspect to surrender their passwords or encryption keys. And the four-digit PIN that protects your iPhone or Android <a target=\"_blank\" href=\"https:\/\/www.defcon.org\/images\/defcon-21\/dc-21-presentations\/Engler-Vines\/DEFCON-21-Engler-Vines-Electromechanical-PIN-Cracking.pdf\" >can be easily cracked in a matter of days<\/a>.<\/p>\n<p>When it comes to encrypted messaging apps such as WhatsApp and Signal, another option for the government is to force companies to send a fake key to the target. Even though the companies can\u2019t read their users\u2019 messages, they still control the system that distributes the keys needed to encrypt them. That means the FBI could compel WhatsApp to send a suspect an FBI key instead of an intended recipient\u2019s, allowing agents to decrypt the message.<\/p>\n<p>These aren\u2019t perfect solutions, but their targeted nature undoubtedly makes them better options than forcing tech companies to build backdoors for police. Security experts have <a target=\"_blank\" href=\"https:\/\/www.theverge.com\/policy\/2013\/5\/17\/4341506\/security-experts-warn-fbi-wiretap-bill-would-make-apps-less-secure\" >warned again and again<\/a> that you can\u2019t create \u201cgolden keys\u201d for the FBI that will be safe from Chinese hackers and Russian credit card thieves \u2014 a backdoor for one can be found and exploited by all.<\/p>\n<p>The FBI keeps plugging its ears and saying there\u2019s a way to make backdoors work. But so far, its only ideas are fantasies. Take the split key escrow system, in which a \u201ctrusted third party\u201d such as the FBI holds a portion of the keys needed to decrypt data. <a target=\"_blank\" href=\"https:\/\/www.schneier.com\/paper-key-escrow.html\" >Cryptographers<\/a> rejected this concept nearly two decades ago.<\/p>\n<p><a target=\"_blank\" href=\"http:\/\/www.crypto.com\/papers\/governmentreform-blaze2015.pdf\" >Testifying before Congress on Wednesday<\/a> (PDF), Matt Blaze, the cryptographer who famously discovered flaws in the NSA\u2019s proposed <a target=\"_blank\" href=\"https:\/\/epic.org\/crypto\/clipper\/\" >Clipper Chip<\/a> key escrow system, said:<\/p>\n<p>Harsh technical realities make such an ideal solution effectively impossible, and attempts to mandate one would do enormous harm to the security and reliability of our nation\u2019s infrastructure, the future of our innovation economy and our national security.<\/p>\n<p>Amazingly, when Rep. Blake Farenthold, R-Texas, <a target=\"_blank\" href=\"https:\/\/www.youtube.com\/watch?feature=player_embedded&amp;v=YG0bUmuj4tg#t=3141\" >asked<\/a> the panel of experts at the hearing whether anyone thought it was possible to build secure crypto backdoors, no one \u2014 including the FBI\u2019s own expert witness \u2014 raised their hand. That law enforcement groups continue to ignore this broad consensus proves that their position relies on scaremongering and distortions.<\/p>\n<p>These agencies need to accept that they can\u2019t have their cake and eat it too. Criminals have always taken steps to avoid being caught, and if we\u2019ve learned anything from the FBI\u2019s takedown of the online drug bazaar Silk Road, it\u2019s that even the strongest encryption and anonymity tools can\u2019t stop people from making mistakes.<\/p>\n<p>In asking for backdoors, the government is simply trying to double down on surveillance powers while putting the security of law-abiding citizens at risk \u2014 and inviting other countries to come knocking for golden keys of their own.<\/p>\n<p>______________________________<\/p>\n<p><em>Joshua Kopstein is a cyberculture journalist and researcher from New York City. His work focuses on Internet law and disorder, surveillance and government secrecy.<\/em><\/p>\n<p><a target=\"_blank\" href=\"http:\/\/america.aljazeera.com\/opinions\/2015\/4\/feds-are-using-fear-not-facts-in-anti-encryption-crusade.html\" >Go to Original \u2013 aljazeera.com<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Federal agencies say encryption will doom us, but they\u2019re already using spy tools that circumvent it. That law enforcement groups continue to ignore a broad consensus of experts speaks to how desperately their position relies on scaremongering and distortions. <\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[60],"tags":[],"class_list":["post-57475","post","type-post","status-publish","format-standard","hentry","category-whistleblowing-surveillance"],"_links":{"self":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts\/57475","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/comments?post=57475"}],"version-history":[{"count":0,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts\/57475\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/media?parent=57475"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/categories?post=57475"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/tags?post=57475"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}