Subscribe free to our newsletters via your




CYBER WARS
FBI chief urges 'robust debate' on encryption
by Staff Writers
Washington (AFP) July 6, 2015


Security experts warn against encryption 'backdoors'
Washington (AFP) July 7, 2015 - A group of computer code experts said Tuesday that law enforcement cannot be given special access to encrypted communications without opening the door to "malicious" actors.

A research report published by the Massachusetts Institute of Technology challenges claims from US and British authorities that such access is the policy response needed to fight crime and terrorism.

Providing this kind of access "will open doors through which criminals and malicious nation-states can attack the very individuals law enforcement seeks to defend," said the report by 13 scientists.

The paper was released a day after FBI Director James Comey called for public debate on the use of encrypted communications, saying Americans may not realize how radical groups and criminals are using the technology.

Comey argued in a blog post that Islamic State militants are among those using encryption to avoid detection.

The New York Times, which reported earlier on the study, said Comey was expected to renew a call at a congressional hearing for better access to encrypted communications to avoid "going dark."

The computer scientists said, however, that any effort to build in access for law enforcement could be exceedingly complex and lead to "unintended consequences," such as stifling innovation and creating hostility toward new tech products.

"The costs would be substantial, the damage to innovation severe, and the consequences to economic growth difficult to predict," the report said.

"The costs to developed countries' soft power and to our moral authority would also be considerable."

In the 1990s, there was a similar debate on the "clipper chip" proposal to allow "a trusted third party" to have access to encrypted messages that could be granted under a legal process.

The clipper chip idea was abandoned, but the authors said that if it had been widely adopted, "it is doubtful that companies like Facebook and Twitter would even exist."

The computer scientists said the idea of special access would create numerous technical and legal challenges, leaving unclear who would have access and who would set standards.

"The greatest impediment to exceptional access may be jurisdiction," the report said.

"Building in exceptional access would be risky enough even if only one law enforcement agency in the world had it."

The British government is considering legislation to compel communications service providers, including US-based corporations, to grant access to British law enforcement agencies.

"China has already intimated that it may require exceptional access," the report said.

"If a British-based developer deploys a messaging application used by citizens of China, must it provide exceptional access to Chinese law enforcement?"

Among the report's authors are Daniel Weitzner, director of the MIT Computer Science and Artificial Intelligence Laboratory, and well-known MIT cryptographer Ronald Rivest.

FBI Director James Comey called Monday for public debate on the use of encrypted communications, saying Americans may not realize how radical groups and criminals are using the technology.

Comey's comments in a blog post appeared to seek more public support for his view, first expressed last year, that stronger encryption being developed for mobile devices could hurt the efforts of US law enforcement and intelligence operations.

While the FBI chief's comments sparked criticism in the tech community and among civil liberties activists, Comey said Americans may not realize how Islamic State militants use encryption to avoid detection.

"When the government's ability... to see an individual's stuff goes away, it will affect public safety," he wrote on the Lawfare blog.

"That tension is vividly illustrated by the current ISIL threat, which involves ISIL operators in Syria recruiting and tasking dozens of troubled Americans to kill people, a process that increasingly takes part through mobile messaging apps that are end-to-end encrypted, communications that may not be intercepted, despite judicial orders under the Fourth Amendment," he wrote, using another name for the IS group.

He added that criminal probes may also be affected because "there is simply no doubt that bad people can communicate with impunity in a world of universal strong encryption."

The FBI chief and other US officials began expressing concern last year after Google and Apple announced plans to lock communications, leaving keys only in users' hands, in a way that would prevent access by law enforcement even with a warrant.

Those moves came after an outcry over revelations from former intelligence contractor Edward Snowden exposing vast electronic surveillance programs by the US and its allies.

Comey said in his blog post that "the logic of encryption will bring us, in the not-to-distant future, to a place where devices and data in motion are protected by universal strong encryption... in such a way that permits access only by participants to a conversation or the owner of the device holding the data."

He noted that "there are many benefits" to encryption, saying it can protect "our innovation, our private thoughts, and so many other things of value, from thieves of all kinds."

But he added that the public should consider the trade-offs of allowing access to the government under certain conditions.

"Democracies resolve such tensions through robust debate," Comey said.

"It may be that, as a people, we decide the benefits here outweigh the costs and that there is no sensible, technically feasible way to optimize privacy and safety in this particular context," the FBI chief added.

"Those are decisions Americans should make, but I think part of my job is make sure the debate is informed by a reasonable understanding of the costs."


Thanks for being here;
We need your help. The SpaceDaily news network continues to grow but revenues have never been harder to maintain.

With the rise of Ad Blockers, and Facebook - our traditional revenue sources via quality network advertising continues to decline. And unlike so many other news sites, we don't have a paywall - with those annoying usernames and passwords.

Our news coverage takes time and effort to publish 365 days a year.

If you find our news sites informative and useful then please consider becoming a regular supporter or for now make a one off contribution.
SpaceDaily Contributor
$5 Billed Once


credit card or paypal
SpaceDaily Monthly Supporter
$5 Billed Monthly


paypal only


.


Related Links
Cyberwar - Internet Security News - Systems and Policy Issues






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle








CYBER WARS
China targets web control with new national security law
Beijing (AFP) July 1, 2015
China passed a wide-ranging new national security law Wednesday, expanding its legal reach over the Internet and even outer space as concerns grow about ever-tighter limits on rights. Since President Xi Jinping came to power, the ruling Communist Party has overseen a wide-ranging crackdown on activists, while unrest related to the mainly Muslim region of Xinjiang has worsened and spread. ... read more


CYBER WARS
Nepal quake: Flat owners baulk at return to high-life

Pope takes message to defend poor, environment to Bolivia

Sri Lanka probes WFP over tsunami SUV gifts

Brazil orders search-and-rescue aircraft

CYBER WARS
Global Positioning System: A Generation of Service to the World

Blind French hikers cross mountains with special GPS

China's Beidou navigation system more resistant to jamming

GPS Industries Launches Troon Connectivity Program

CYBER WARS
World's oldest man dies at 112 in Japan

Revised view of brain circuit reveals how we avoid powerful odors

Study: Frustrated customers quicker to blame human brands

Researchers show how our sense of smell evolved, including in cave men

CYBER WARS
The bizarre mating habits of flatworms

Unraveling iridescence

Scientists warn of species loss due to man-made landscapes

Bats do it, dolphins do it - now humans can do it, too

CYBER WARS
As blacklegged ticks migrate, Lyme disease follows

Study explains how dengue virus adapts as it travels

Scientists, feds aim to curb spread of brucellosis in Yellowstone

Five-year window for preventing AIDS rebound: experts

CYBER WARS
China firm to punish 'unscheduled' pregnancies: report

Dalai Lama birthday celebrations draw support, protests in US

Millions of silver pieces for China's official Christians

Chinese tourists boost Thai economy but stir outrage

CYBER WARS
Mexico army ordered soldiers to kill criminals: NGO

Malaysian navy shadows tanker, urges hijackers to give up

Polish bootcamp trains security contractors for mission impossible

A blast and gunfire: Mexico's chopper battle

CYBER WARS
World Bank removes critical section from China report

China brokers to invest $19 mn to curb market plunge

China manufacturing sees slight pick-up in June

World Bank warns China over state financial control




The content herein, unless otherwise known to be public domain, are Copyright 1995-2014 - Space Media Network. All websites are published in Australia and are solely subject to Australian law and governed by Fair Use principals for news reporting and research purposes. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA news reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement All images and articles appearing on Space Media Network have been edited or digitally altered in some way. Any requests to remove copyright material will be acted upon in a timely and appropriate manner. Any attempt to extort money from Space Media Network will be ignored and reported to Australian Law Enforcement Agencies as a potential case of financial fraud involving the use of a telephonic carriage device or postal service.