Subscribe free to our newsletters via your
. Military Space News .




CYBER WARS
Security experts warn against encryption 'backdoors'
by Staff Writers
Washington (AFP) July 7, 2015


FBI chief urges 'robust debate' on encryption
Washington (AFP) July 6, 2015 - FBI Director James Comey called Monday for public debate on the use of encrypted communications, saying Americans may not realize how radical groups and criminals are using the technology.

Comey's comments in a blog post appeared to seek more public support for his view, first expressed last year, that stronger encryption being developed for mobile devices could hurt the efforts of US law enforcement and intelligence operations.

While the FBI chief's comments sparked criticism in the tech community and among civil liberties activists, Comey said Americans may not realize how Islamic State militants use encryption to avoid detection.

"When the government's ability... to see an individual's stuff goes away, it will affect public safety," he wrote on the Lawfare blog.

"That tension is vividly illustrated by the current ISIL threat, which involves ISIL operators in Syria recruiting and tasking dozens of troubled Americans to kill people, a process that increasingly takes part through mobile messaging apps that are end-to-end encrypted, communications that may not be intercepted, despite judicial orders under the Fourth Amendment," he wrote, using another name for the IS group.

He added that criminal probes may also be affected because "there is simply no doubt that bad people can communicate with impunity in a world of universal strong encryption."

The FBI chief and other US officials began expressing concern last year after Google and Apple announced plans to lock communications, leaving keys only in users' hands, in a way that would prevent access by law enforcement even with a warrant.

Those moves came after an outcry over revelations from former intelligence contractor Edward Snowden exposing vast electronic surveillance programs by the US and its allies.

Comey said in his blog post that "the logic of encryption will bring us, in the not-to-distant future, to a place where devices and data in motion are protected by universal strong encryption... in such a way that permits access only by participants to a conversation or the owner of the device holding the data."

He noted that "there are many benefits" to encryption, saying it can protect "our innovation, our private thoughts, and so many other things of value, from thieves of all kinds."

But he added that the public should consider the trade-offs of allowing access to the government under certain conditions.

"Democracies resolve such tensions through robust debate," Comey said.

"It may be that, as a people, we decide the benefits here outweigh the costs and that there is no sensible, technically feasible way to optimize privacy and safety in this particular context," the FBI chief added.

"Those are decisions Americans should make, but I think part of my job is make sure the debate is informed by a reasonable understanding of the costs."

A group of computer code experts said Tuesday that law enforcement cannot be given special access to encrypted communications without opening the door to "malicious" actors.

A research report published by the Massachusetts Institute of Technology challenges claims from US and British authorities that such access is the policy response needed to fight crime and terrorism.

Providing this kind of access "will open doors through which criminals and malicious nation-states can attack the very individuals law enforcement seeks to defend," said the report by 13 scientists.

The paper was released a day after FBI Director James Comey called for public debate on the use of encrypted communications, saying Americans may not realize how radical groups and criminals are using the technology.

Comey argued in a blog post that Islamic State militants are among those using encryption to avoid detection.

The New York Times, which reported earlier on the study, said Comey was expected to renew a call at a congressional hearing for better access to encrypted communications to avoid "going dark."

The computer scientists said, however, that any effort to build in access for law enforcement could be exceedingly complex and lead to "unintended consequences," such as stifling innovation and creating hostility toward new tech products.

"The costs would be substantial, the damage to innovation severe, and the consequences to economic growth difficult to predict," the report said.

"The costs to developed countries' soft power and to our moral authority would also be considerable."

In the 1990s, there was a similar debate on the "clipper chip" proposal to allow "a trusted third party" to have access to encrypted messages that could be granted under a legal process.

The clipper chip idea was abandoned, but the authors said that if it had been widely adopted, "it is doubtful that companies like Facebook and Twitter would even exist."

The computer scientists said the idea of special access would create numerous technical and legal challenges, leaving unclear who would have access and who would set standards.

"The greatest impediment to exceptional access may be jurisdiction," the report said.

"Building in exceptional access would be risky enough even if only one law enforcement agency in the world had it."

The British government is considering legislation to compel communications service providers, including US-based corporations, to grant access to British law enforcement agencies.

"China has already intimated that it may require exceptional access," the report said.

"If a British-based developer deploys a messaging application used by citizens of China, must it provide exceptional access to Chinese law enforcement?"

Among the report's authors are Daniel Weitzner, director of the MIT Computer Science and Artificial Intelligence Laboratory, and well-known MIT cryptographer Ronald Rivest.


Thanks for being here;
We need your help. The SpaceDaily news network continues to grow but revenues have never been harder to maintain.

With the rise of Ad Blockers, and Facebook - our traditional revenue sources via quality network advertising continues to decline. And unlike so many other news sites, we don't have a paywall - with those annoying usernames and passwords.

Our news coverage takes time and effort to publish 365 days a year.

If you find our news sites informative and useful then please consider becoming a regular supporter or for now make a one off contribution.
SpaceDaily Contributor
$5 Billed Once


credit card or paypal
SpaceDaily Monthly Supporter
$5 Billed Monthly


paypal only


.


Related Links
Cyberwar - Internet Security News - Systems and Policy Issues






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle








CYBER WARS
FBI chief urges 'robust debate' on encryption
Washington (AFP) July 6, 2015
FBI Director James Comey called Monday for public debate on the use of encrypted communications, saying Americans may not realize how radical groups and criminals are using the technology. Comey's comments in a blog post appeared to seek more public support for his view, first expressed last year, that stronger encryption being developed for mobile devices could hurt the efforts of US law en ... read more


CYBER WARS
US Awards Contract to Develop Missile Defense Command System

US Authorizes 'Forward-Based' Missile Defense System for Allies

USAF Early Warning Satellites Get No-Cost Update from Lockheed Martin

Boecore to support Army missile defense

CYBER WARS
Chinese Navy simulates combat missile resupply in first ever drill

MBDA France orders MMP missile warheads

The Hypersonic Missile Arm Race

State Dept. OKs possible missile sale to Australia

CYBER WARS
Drone postal deliveries begin in Switzerland

Open Secrets from X-37B

Thales, IAI demo new NATO STANAG 7085 data link on UAV

US drone strikes target militants on Afghan-Pakistan border

CYBER WARS
Navy engineer invents new data transmission system

Fourth MUOS arrives in Florida for August launch

Airbus DS unveils new mobile welfare communication portfolio

Britain looks to replace tactical radios

CYBER WARS
Raytheon wins IDIQ contract for Army sensor systems

Saab joining BAE Systems, Patria in bid to produce armored vehicle

Raytheon helps bolster Jordan's border security

Compact cannon for British armored vehicles

CYBER WARS
UN restrictions on arms, missiles to stay in Iran deal: US

Iran calls on global powers to drop UN arms ban

Lebanon arms deal with France not blocked: Saudi FM

Senate okays defense bill over White House objections

CYBER WARS
China has nearly finished runway on artifical island in South China Sea

IS in Afghanistan on Xi, Putin's summit agenda: China

Putin hosts BRICS summit amid standoff with West

Georgia launches joint drills with five NATO countries

CYBER WARS
New nanogenerator harvests power from rolling tires

Soft core, hard shell -- the latest in nanotechnology

Ultrafast heat conduction can manipulate nanoscale magnets

MIPT physicists develop ultrasensitive nanomechanical biosensor




The content herein, unless otherwise known to be public domain, are Copyright 1995-2014 - Space Media Network. All websites are published in Australia and are solely subject to Australian law and governed by Fair Use principals for news reporting and research purposes. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA news reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement All images and articles appearing on Space Media Network have been edited or digitally altered in some way. Any requests to remove copyright material will be acted upon in a timely and appropriate manner. Any attempt to extort money from Space Media Network will be ignored and reported to Australian Law Enforcement Agencies as a potential case of financial fraud involving the use of a telephonic carriage device or postal service.