Data encryption in sharp focus after deadly attacks

December 12, 2015 by Rob Lever
A view of a makeshift memorial near the Inland Regional Center on December 4, 2015 in San Bernardino, California
A view of a makeshift memorial near the Inland Regional Center on December 4, 2015 in San Bernardino, California

With renewed focus on how encrypted messages can be used to plot terrorist attacks, President Barack Obama's administration is stepping up pressure on the tech sector to help in the battle.

Although issues around have been ongoing for decades, the prickly topic has sprung to the fore in recent weeks following killing sprees in Paris and California.

Over the past two years, more sophisticated encryption—notably for smartphones—has become widely available following revelations by former intelligence contractor Edward Snowden about vast US surveillance programs.

But US administration officials as well as local law enforcement are making the case for better access to encrypted data, saying new smartphone and encryption technologies have made it more difficult to thwart "malicious actors."

"We want to strike the right balance. We want to make sure encryption is not used in a way that does allow for dark space for terrorist groups," a White House statement said.

Privacy remains a major counter-argument.

Underlining those concerns, an online petition calling on the administration to avoid weakening encryption got more than 100,000 signatures, requiring a White House reply.

White House chief technology officer Ed Felton and cybersecurity chief Michael Daniel said in response that "American technologists have a unique perspective... and we need them to bring their expertise, innovation and creativity to bear against the threat of terrorism."

Some analysts say the public is though ready to accept improved access for legitimate investigative purposes.

'Back doors'

"This is part of a larger debate since the dawn of the Internet about how much anonymity people should have," said James Lewis, a senior fellow at the Center for Strategic and International Studies, who as a former administration official worked on encryption issues.

Lewis said the debate has been skewed by the use of the term "back door" for law enforcement or intelligence when in fact most tech firms have the ability to decrypt data under certain circumstances.

US shooting
Updated map of the shooting in the United States in California that left at least 14 killed Wednesday. 90 x 70 mm
"Companies like Google mine this data for advertising purposes," Lewis said.

Darren Hayes, a professor of computer science forensics at Pace University in New York, said one helpful move would be for Apple and Google to roll back their encryption to the level of a year ago to enable access to smartphones with a warrant or court order.

"It worked very well, but Apple somewhere along the line decided it didn't make business sense," he said, adding that tech firms are conscious of their public image and don't want to be seen as tools of law enforcement or the National Security Agency.

At the same time, he said, in New York "there are more than 100 investigations stopped in their tracks because there are phones that can't be analyzed. These are murderers, rapists, pedophiles who are not being prosecuted."

Hayes said that in the current environment, are not likely to voluntarily make changes to help .

"The only way they would be persuaded is through legislation," he said.

FBI Director James Comey told lawmakers the administration "has decided not to seek a legislative remedy at this time," but repeated his warning about "going dark"—losing the ability to track communications over new encrypted messaging systems.

"We believe it must be addressed since the resulting risks are grave in both traditional criminal matters as well as in national security matters," he said.

He added that the government "is actively engaged with private companies to ensure they understand the public safety and risks that result from malicious actors' use of their encrypted products and services."

Investigators look at the vehicle involved in a shootout between police and two suspects in San Bernardino, California, on Decem
Investigators look at the vehicle involved in a shootout between police and two suspects in San Bernardino, California, on December 3, 2015
Right to privacy

But privacy activists and encryption specialists in the private sector remain firm in resisting efforts to provide special access to investigators.

"Weakening encryption makes us all less secure," says Rainey Reitman of the Electronic Frontier Foundation in a blog post.

"We cannot create a back door, a front door, or any other kind of door for the United States government that cannot be exploited by malicious hackers and other foreign governments."

Activists say encryption offers numerous benefits, such as securing personal or business data and financial transactions, and can help deter smartphone thefts.

Robyn Greene, policy counsel for the Open Technology Institute at New America Foundation, said that "prohibiting companies from selling encrypted devices would not prevent criminals or terrorists from being able to access unbreakable encryption."

Green added that smartphones should have the same privacy protection as other means of communication.

"Police can enter homes with warrants, but there is no requirement that people record their conversations and interactions just in case they someday become useful in an investigation," she said on the Just Security blog.

"The conversations that we once had through disposable letters and in-person conversations now happen over the Internet and on phones. Just because the medium has changed does not mean our right to privacy has."

Explore further: Attacks revive debate on encryption, surveillance

Related Stories

Attacks revive debate on encryption, surveillance

November 17, 2015

The deadly Paris attacks have reignited debate on encrypted communications by terror cells and whether law enforcement and intelligence services are "going dark" in the face of new technologies.

Tech firms, activists press US on encryption

May 19, 2015

Some 140 tech companies, civil liberties and privacy activists urged the White House Tuesday to pull back efforts to weaken encryption or include law enforcement "backdoors" on technology products.

Why government and tech can't agree about encryption

November 25, 2015

Your phone is getting better and better at protecting your privacy. But Uncle Sam isn't totally comfortable with that, because it's also complicating the work of tracking criminals and potential national-security threats.

Recommended for you

Coffee-based colloids for direct solar absorption

March 22, 2019

Solar energy is one of the most promising resources to help reduce fossil fuel consumption and mitigate greenhouse gas emissions to power a sustainable future. Devices presently in use to convert solar energy into thermal ...

EPA adviser is promoting harmful ideas, scientists say

March 22, 2019

The Trump administration's reliance on industry-funded environmental specialists is again coming under fire, this time by researchers who say that Louis Anthony "Tony" Cox Jr., who leads a key Environmental Protection Agency ...


Adjust slider to filter visible comments by rank

Display comments: newest first

not rated yet Dec 13, 2015
Encryption is essentially obscuration of text in a thicket of complicated processes that can be undone by reversing the same processes. Part of the process is the "key" that determines the starting place in the process. Universally, the process will repeat itself given enough time and processed text. This is because the random number generator is only pseudo-random (a mathematical model of randomness). What makes encryption worth the effort is that unauthorized decryption uses so much time and computer H/W that it is only worth while for limited cases. Most encryption that the public can get is breakable, if there is probable cause to do it. The short cut of a "back-door" is an open invite to criminals. Military grade encryption is light years ahead of "cell phone" grade stuff. Every country in the world is trying to crack the military stuff, and getting nowhere. Guess who will crack civilian encryption?
not rated yet Dec 13, 2015
At the same time, he said, in New York "there are more than 100 investigations stopped in their tracks because there are phones that can't be analyzed. These are murderers, rapists, pedophiles who are not being prosecuted."

Hard to understand! Why on earth do they need a bugged cell phone to capture a rapist? Can you kill, rape or do anything illegal without being captured as long as you don't use a cell phone?

Also, once you have their phone numbers and names, which would allow you to get a surveillance warrant, it is possible to stop those "murderers, rapists, pedophiles" by surveillance and collecting evidence (like for example DNA).

If you want to listen, to the whole of New York's citizens, hoping to catch the conversation between murderers or rapists and exchanging videos about their crimes, then you need back-doors.

But I think law enforcement is better than that and terrorism is just exploited to re-install or reinforce mass surveillance.

Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Click here to reset your password.
Sign in to get notified via email when new comments are made.