Stories
Slash Boxes
Comments

SoylentNews is people

posted by janrinok on Sunday June 07 2015, @12:26PM   Printer-friendly
from the not-so-subtle-approach dept.

Another day, another U.S. law enforcement official calling for regulation and weakening of encryption. This time, Michael Steinbach, assistant director in the FBI's Counterterrorism Division, has told Congress that Internet communication services are helping ISIS/ISIL and other terrorist groups as they are now "Going Dark," and the FBI needs a "front door":

As far as the FBI is concerned, private companies must "build technological solutions to prevent encryption above all else," the Washington Post reports Steinbach as saying. That's a pretty sharp reverse ferret from the FBI, which four years ago was recommending encryption as a basic security measure. But Steinbach said evildoers are hiding behind US-made technology to mask their actions.

Steinbach told the committee that encrypted communications were the bane of the agency's efforts to keep the American public safe from terror. But the FBI wasn't insisting on back door access to encryption; rather, it wants companies to work directly with law enforcement where necessary. "Privacy above all other things, including safety and freedom from terrorism, is not where we want to go," Steinbach said. "We're not looking at going through a back door or being nefarious."

Instead the FBI wants a front door; a system to allow it to break encryption created by US companies. Understandably, US tech firms aren't that keen on the idea, since "we have borked encryption" isn't much of a selling point.

Steinbach claims that while "traditional voice telephone companies are required by CALEA to develop and maintain capabilities to intercept communications when law enforcement has lawful authority, that requirement does not extend to most Internet communications services." The Electronic Frontier Foundation, however, fought unsuccessfully against the expansion of CALEA in 2004 to cover Internet and some VoIP providers. Efforts to expand CALEA continued in 2010, when the FBI first began to complain about "Going Dark":

In 2010, the FBI began its "Going Dark" campaign. Despite the fact that we are in a Golden Age of Surveillance, the campaign is a charm offensive to convince politicians that FBI is unable to listen in on Internet users' digital communications after obtaining a court order because of recent advances in technology. The proposed legislation would have forced all communications services to build secret backdoors for the government to spy on users and to decrypt any encrypted messages exchanged via the service. The proposal's problems were many, and it quietly died after a tremendous amount of uproar.

In the beginning of 2013, it was reported the FBI was again pushing for a wholesale expansion of CALEA to all Internet communications services. Similar to 2010, the FBI wants to force all companies with messaging services to engineer their products with a secret government backdoor and to decrypt all encrypted messages. The proposal also adds another component: fining companies for not cooperating. In May 2013, the New York Times revealed that the White House was "on the verge" of backing the proposal. While the bill was not introduced in 2013, updating CALEA was a stated priority for FBI Director James Comey in 2014 and we expect it to be so for 2015 as well.


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 2) by RobotMonster on Sunday June 07 2015, @04:10PM

    by RobotMonster (130) on Sunday June 07 2015, @04:10PM (#193281) Journal

    One Time Pad.
    If you can share a pad and keep it secure, you're golden -- undecryptable.
    It's a pretty old technology, and not that complicated.
    Sure it's not as convenient as modern crypto, but it *is* unbreakable.

    Borking standard encryption only weakens security for the average person.
    This is only a win for bad actors -- people who really want secure comms will still have them -- and the average person reliant on industry standards will be left wide open.

    It'd be almost like your television could be sending audio & video of you to somewhere for 'analysis', or your refrigerator could start sending spam while your router started mining bitcoins. Oh wait.

    Starting Score:    1  point
    Karma-Bonus Modifier   +1  

    Total Score:   2  
  • (Score: 0) by Anonymous Coward on Monday June 08 2015, @03:58PM

    by Anonymous Coward on Monday June 08 2015, @03:58PM (#193700)

    Even better: As soon as you have the encrypted file, you can create a "key" that "decrypts" that file to anything you want (as long as it has the same size). So if someone asks you for the key, you just hand them the false key instead. There's no way to prove that it is not the correct key.

  • (Score: 2) by WillR on Monday June 08 2015, @08:53PM

    by WillR (2012) on Monday June 08 2015, @08:53PM (#193813)
    The conundrum of the one time pad: If you can share a pad and keep it secure, why not just send the message the same way?