Skip to content
Menu
Menu

Mandating Insecurity?

Posted on 9 July 2015 by The Tactical Hermit

nsa

 

The America Citizens Right of the Expectation of Privacy. It is a touchy subject, no doubt. Ever since the Edward Snowden revelations that big brother was in fact, watching, Americans have realized that everything they do online (pretty much) can be monitored, recorded, analyzed and filed for future use. It was no surprise then that when FBI Director Comey got in front of a Senate Judiciary Committee yesterday and asked that lawmakers help find a way around Commercial encryption technology, mainly used in smart-phones, new fuel was added to this explosive debate that shows no signs of wearing down.

To get a better perspective on this issue, I found this article by Susan Landau on Lawfareblog.

Keys Under Doormats: Mandating Insecurity

Two decades ago US law enforcement sought laws requiring communication providers to be able to decrypt communications when served with a court order. The proposed technology to accomplish this was escrowed encryption — keys stored by the government — and the methodology is the now infamous Clipper chip.

In 1997 a group of cryptographers and security experts — including our own Bruce Schneier — warned that such escrowed encryption created serious security risks and that it was infeasible for an international setting; after all, which nation would hold the keys? It would be fun to claim the computer scientists were prescient; a more sober assessment is that they were realistic. Two years later the US government agreed, ending its efforts on escrowed encryption. I have heard intelligence officials remark that that mistaken effort is a partial cause for our current poor state of computer security. Certainly the attempt to force escrowed encryption was no help in securing communication or computer systems.

It seems that FBI Director Comey and UK Prime Minister Cameron have not learned the lessons of the past. Both are pressing hard for laws requiring “exceptional access” mechanisms. This is some form of technology that would enable government access to content even if the content was encrypted. Yesterday Director Comey again wrote about his concerns, explaining the dangers that would ensue if devices and communications are locked, with law enforcement having no ability to get at the data even in an emergency. That’s not exactly the case. But whether or not law enforcement can tackle encrypted systems — and there is evidence that they can in many cases — is not the issue I want to discuss today.

Read the Remainder at LawfareBlog

3 thoughts on “Mandating Insecurity?”

  1. Brittius says:
    9 July 2015 at 15:16

    Reblogged this on Brittius.

  2. gamegetterII says:
    9 July 2015 at 15:32

    Reblogged this on Starvin Larry.

  3. culvernater says:
    9 July 2015 at 15:56

    Reblogged this on culvernaters truth seeking.

Leave a Reply

Your email address will not be published. Required fields are marked *

Recent Post

  • Tattoo Zoo
  • Dose of Truth
  • RKBA 101: Subsidize the Invader and Disarm the White Man
  • Morning Laugh
  • Military History 101: How Siege Warfare Returned

Book of the Month

Fellow Conspirators

Area Ocho

American Partisan

Western Rifle Shooters Association

Brushbeater

Von Steuben Training and Consulting

CSAT

Politically Incorrect Humor and Memes

Freedom is Just Another Word

Fix Bayonets

The Firearm Blog

BorderHawk

Cold Fury

Don Shift SHTF

NC Renegades

Big Country Ex-Pat

The Bayou Renaissance Man

Bustednuckles

The Feral Irishman

EatGruelDog

It Ain’t Holy Water

Gab News

Pacific Paratrooper

Badlands Fieldcraft

Stuck Pig Medical

Swift Silent Deadly

Spotter Up

The Survival Homestead

SHTF Preparedness

The Organic Prepper

The Zombie Apocalypse Survival Homestead

Taki’s Magazine

Defensive Training Group

No White Guilt

Vermont Folk Truth

The Occidental Observer

The Dissident Right

Psy-Op Cinema

VDare

American Renaissance

Blacksmith Publishing

Arktos Publishing

Antelope Hill Publishing

White People Press

White Rabbit Radio

Viking Life Blog (Archived)

Identity Dixie

League of the South

James LaFond

Adam Piggott

The Unz Review

Dissident Thoughts

The Third Position

Renegade Tribune

COPYRIGHT NOTICE/DISCLAIMER & FAIR USE ACT

All blog postings, including all non-fiction and fictional works are copyrighted and considered the sole property of the Tactical Hermit Blog. The names, characters and incidents portrayed in the short stories and novelettes are entirely fictional and are of the author's imagination. Any resemblance to actual events, locales or organizations or persons living or dead is entirely coincidental, The information contained in the articles posted to this site are for informational and/or educational purposes only. The Tactical Hermit disclaims any and all liability resulting from the use or misuse of the information contained herein.

The views and opinions expressed on this blog are those of the authors and do not necessarily reflect the official policy or position of any of the companies that advertise here. 

Much of the information on this blog contains copyrighted material whose use has not always been specifically authorized by the rightful copyright owner. This material is made available in an effort to educate and inform and not for remuneration. Under these guidelines this constitutes "Fair Use" under Section 107 of the U.S. Copyright Law. The publisher of this site DOES NOT own the copyrights of the images on the site. The copyrights lie with the respective owners.

© 2023 | Powered by Minimalist Blog WordPress Theme