. Military Space News .
CYBER WARS
Apple ready for encryption 'conversation': lawyer
By Rob Lever
Washington (AFP) Feb 29, 2016


FBI defends stand against Apple on encryption
Washington (AFP) March 1, 2016 - FBI chief James Comey on Tuesday defended his agency's efforts to force Apple to help unlock an iPhone in the San Bernardino attacks probe.

Testifying at a congressional hearing on encryption and privacy where lawmakers voiced concerns about a harmful precedent, Comey said law enforcement's job may be crippled by "warrant-proof spaces" that become inaccessible to investigators.

Addressing a case that has set off a fierce public debate, Comey said Americans need to know the safety implications if encryption makes it impossible to access data on smartphones and other devices.

"It's our job to tell the American people the tools we use to keep you safe are becoming less effective," Comey told the House Judiciary Committee hearing.

"If there are warrant-proof spaces in American life, what does it mean? What are the costs?"

But Comey also acknowledged that forcing Apple to help unlock the San Bernardino shooter's iPhone could set a precedent for other investigations.

"It is going to be potentially precedential, that's just the way the law works," he said in response to a question from Representative John Conyers, Democrat of Michigan.

The hearing comes amid an intense legal and political battle after Apple said it would challenge a court order to provide the FBI technical assistance to help break into the San Bernardino iPhone.

Apple has argued the FBI is effectively asking the company to "hack" its own devices and create a "back door" that could be exploited by malicious actors.

Comey told the hearing that in his view, "it's not about back doors... there's already a door on that phone, we're asking Apple to take away the vicious guard dog."

Citizens' rights are protected by an independent judiciary, he added, citing a longstanding principle that "if an independent judge finds reason to believe that certain private communications contain evidence of a crime, then the government can conduct a limited search."

Lawmakers from both parties appeared skeptical of the FBI efforts, questioning whether they could lead to weaker overall security in the future for new technologies.

"It won't really be a one-time request? It will set a precedent for the FBI and other law enforcement agencies?" the committee chairman, Virginia Republican Bob Goodlatte, asked.

He also questioned whether Apple's creation of new software would "fall into the wrong hands and make everyone less secure."

Conyers said meanwhile that the FBI's legal efforts could be seen as "an end run" around the legislative process to step up its access to encrypted devices.

"I would be deeply disappointed if it turns out that the government is exploiting a national tragedy to pursue a change in the law," he said.

"This committee and not the courts is the place to consider the appropriate consequences."

In remarks prepared for the same hearing, Apple general counsel Bruce Sewell said the public should understand that "encryption is a good thing, a necessary thing" even if it makes the work of law enforcement more difficult.

Apple wants a "conversation" to help settle a standoff with US law enforcement over accessing an encrypted iPhone, according to testimony prepared for a congressional hearing.

In a statement prepared for the Tuesday hearing, Apple general counsel Bruce Sewell said the public should understand that "encryption is a good thing, a necessary thing" even if it makes the work of law enforcement more difficult.

Apple and FBI are locked in battle over a warrant seeking to force the technology company to help unlock the iPhone used by one of the shooters in December's San Bernardino attacks.

Apple's refusal has set off an intense political debate about encrypted devices that provide "keys" only to users.

In his remarks, Sewell said Apple has been stepping up its encryption over the past few years.

"As attacks on our customers' data become increasingly sophisticated, the tools we use to defend against them must get stronger too," he said.

"Weakening encryption will only hurt consumers and other well-meaning users who rely on companies like Apple to protect their personal information."

Encryption helps preserve privacy around the world, he added, "and it keeps people safe."

Lawmakers and the public should decide the question of access to the locked iPhone, Sewell said, renewing Apple's criticism of the government's use of the broad 1789 All Writs Act, which offers broad authority to law enforcers.

"The American people deserve an honest conversation around the important questions stemming from the FBI's current demand," he said.

"Most importantly, the decisions should be made by you and your colleagues as representatives of the people, rather than through a warrant request based on a 220-year-old statute. At Apple, we are ready to have this conversation."

Sewell repeated comments by Apple chief Tim Cook that the FBI is asking the company "to create an operating system that does not exist" that would open "a backdoor into the iPhone."

- 'Cripples' law enforcement -

But New York District Attorney Cyrus Vance argued in his own prepared testimony that the current level of encryption "cripples even the most basic steps of a criminal investigation."

"In the past, criminals kept evidence of their crimes in safes, file cabinets, and closets," he said.

"Today, criminals, like the rest of us, live their lives on smartphones and store evidence of their crimes on smartphones... it should be clear why investigating a case without access to this evidence is doing so with one hand tied behind our backs."

Vance said his office is locked out of 175 phones, frustrating investigations into attempted murder, sex abuse, child pornography and other crimes.

"The real-world effect of all of this is that Apple's encryption policy frustrates the ability of law enforcement to prevent, investigate, and prosecute criminals, including the very hackers that Apple claims it wants to protect users against," he added.

Susan Landau, a professor at Worcester Polytechnic Institute, said in her own prepared testimony that forcing Apple to create new software to help the FBI would create risks.

The FBI's claims that the software would be used for just one device "are both true and incorrect at the same time," she said.

"The fact is that the software cannot be developed, used, and deleted," she added.

"Given that the phone's data may be used in investigations and court cases, the 'break-in' software must remain available for examination."

Governments in Russia, China and other authoritarian countries would demand Apple deliver the same software, she added.

Separately, two US lawmakers introduced a bill to establish a bipartisan commission of experts to study the issue of access to encrypted devices.

Senator Mark Warner and Representative Mike McCaul proposed the creation of a 16-member "National Commission on Security and Technology Challenges."

The panel would include "leading experts and practitioners from the technology sector, cryptography, law enforcement, intelligence, the privacy and civil liberties community, global commerce and economics and the national security community" who would make recommendations to Congress.


Thanks for being here;
We need your help. The SpaceDaily news network continues to grow but revenues have never been harder to maintain.

With the rise of Ad Blockers, and Facebook - our traditional revenue sources via quality network advertising continues to decline. And unlike so many other news sites, we don't have a paywall - with those annoying usernames and passwords.

Our news coverage takes time and effort to publish 365 days a year.

If you find our news sites informative and useful then please consider becoming a regular supporter or for now make a one off contribution.
SpaceDaily Contributor
$5 Billed Once


credit card or paypal
SpaceDaily Monthly Supporter
$5 Billed Monthly


paypal only


.


Related Links
Cyberwar - Internet Security News - Systems and Policy Issues






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle

Previous Report
CYBER WARS
WikiLeaks list did not lead to attacks
Dallas TX (SPX) Mar 01, 2016
The WikiLeaks organization was criticized for providing a target list for terrorists when it published a secret memo in 2010 with 200 international sites that the U.S. Department of State considered critical to national security. Was there any truth to that claim? Dr. Daniel G. Arce, Ashbel Smith Professor and program head of economics in the UT Dallas School of Economic, Political a ... read more


CYBER WARS
China Interfering in THAAD Deployment Decision Process Preposterous

S. Korea dismisses China warning on US missile system

Russian expert says THAAD deployment in S. Korea to raise regional tension

US missile system in S. Korea would hurt Seoul-Beijing ties: envoy

CYBER WARS
Russia negotiating S-300 missile systems' supplies to Iran

Saudi says it intercepted Scud missile from Yemen

Saab, Indian firm in joint venture for missile programs

Saudi Patriot 'intercepts' Scud fired from Yemen capital

CYBER WARS
New sensor payload capability available for Global Hawk

US failing to explain deadly drone policy: report

NASA Global Hawk Flies Pacific Storm Mission

Drone serves as both aircraft and submarine

CYBER WARS
US Army Pacific exercise highlights joint communications for Pacific Theater

ViaSat tapped to provide tactical terminals for Apache helicopters

Harris wins place on military communications contract

General Dynamics MUOS-Manpack radio supports government testing of MUOS network

CYBER WARS
Rheinmetall upgrading Polish Army's Leopard 2 tanks

Arsenal to produce lighter-weight mortar bipods

Milrem unveils unmanned ground vehicle at Singapore Airshow

BAE Systems announces upgrades to engineering vehicle

CYBER WARS
EU lawmakers urge Saudi arms embargo

Jacobs Engineering leads pilot procurement project

Australia unveils 'massive' increase in defence spending

Finmeccanica, Panama end contract disputes

CYBER WARS
China to secure 'de facto' control of S. China Sea: US admiral

Ex-military chiefs say Britain is 'stronger' in EU

China's Pacific actions galvanize neighbors against it: Pentagon chief

China deploys fighter jets to contested island in S. China Sea

CYBER WARS
Stretchable nano-devices towards smart contact lenses

New ways to construct contactless magnetic gears

Scientists take nanoparticle snapshots

Scientists find a new way to make nanowire lasers









The content herein, unless otherwise known to be public domain, are Copyright 1995-2024 - Space Media Network. All websites are published in Australia and are solely subject to Australian law and governed by Fair Use principals for news reporting and research purposes. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA news reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. All articles labeled "by Staff Writers" include reports supplied to Space Media Network by industry news wires, PR agencies, corporate press officers and the like. Such articles are individually curated and edited by Space Media Network staff on the basis of the report's information value to our industry and professional readership. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. General Data Protection Regulation (GDPR) Statement Our advertisers use various cookies and the like to deliver the best ad banner available at one time. All network advertising suppliers have GDPR policies (Legitimate Interest) that conform with EU regulations for data collection. By using our websites you consent to cookie based advertising. If you do not agree with this then you must stop using the websites from May 25, 2018. Privacy Statement. Additional information can be found here at About Us.