{"id":6457,"date":"2015-07-09T15:00:29","date_gmt":"2015-07-09T20:00:29","guid":{"rendered":"http:\/\/hcstx.org\/?p=6457"},"modified":"2015-07-09T15:00:29","modified_gmt":"2015-07-09T20:00:29","slug":"mandating-insecurity","status":"publish","type":"post","link":"https:\/\/thetacticalhermit.com\/index.php\/2015\/07\/09\/mandating-insecurity\/","title":{"rendered":"Mandating Insecurity?"},"content":{"rendered":"<p><a href=\"https:\/\/hcsblogdotorg.files.wordpress.com\/2015\/07\/nsa2.jpg\"><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter size-full wp-image-6463\" src=\"https:\/\/hcsblogdotorg.files.wordpress.com\/2015\/07\/nsa2.jpg\" alt=\"nsa\" width=\"270\" height=\"186\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<p>The America Citizens Right of the Expectation of Privacy. It is a touchy subject, no doubt. Ever since the Edward Snowden revelations that big brother was in fact, watching, Americans have realized that everything they do online (pretty much) can be monitored, recorded, analyzed and filed for future use. It was no surprise then that when FBI Director Comey got in front of a Senate Judiciary Committee<strong><a href=\"http:\/\/www.businessinsider.com\/fbi-data-encryption-is-making-it-harder-to-hunt-isis-sympathizers-2015-7\"> yesterday<\/a><\/strong> and asked that lawmakers help find a way around Commercial encryption technology, mainly used in smart-phones, new fuel was added to this explosive debate that shows no signs of wearing down.<\/p>\n<p>To get a better perspective on this issue, I found this article by Susan Landau on <strong><a href=\"http:\/\/www.lawfareblog.com\/keys-under-doormats-mandating-insecurity\">Lawfareblog<\/a>.<\/strong><\/p>\n<div class=\"l-top\">\n<div class=\"panel-pane pane-views pane-articles\">\n<div class=\"pane-content\">\n<div class=\"view view-articles view-id-articles view-display-id-block view-dom-id-13edad52fafa65d9d9953f1e1c9fcf47\">\n<div class=\"view-content\">\n<div class=\"views-row views-row-1 views-row-odd views-row-first views-row-last\">\n<header class=\"article-top\">\n<blockquote>\n<h1 class=\"title\" style=\"text-align:center;\">Keys Under Doormats: Mandating Insecurity<\/h1>\n<\/blockquote>\n<div class=\"article-top__meta\"><\/div>\n<\/header>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"l-main\">\n<div class=\"panel-pane pane-node-body\">\n<div class=\"pane-content\">\n<div class=\"field field-name-body field-type-text-with-summary field-label-hidden\">\n<div class=\"field-items\">\n<div class=\"field-item even\">\n<blockquote><p>Two decades ago US law enforcement sought laws requiring communication providers to be able to decrypt communications when served with a court order. The proposed technology to accomplish this was escrowed encryption \u2014 keys stored by the government \u2014 and the methodology is the now infamous\u00a0<a href=\"http:\/\/www.cryptomuseum.com\/crypto\/usa\/clipper.htm\" target=\"_blank\" rel=\"nofollow noopener\">Clipper chip<\/a>.<\/p>\n<p>In 1997 a group of cryptographers and security experts \u2014 including our own\u00a0<a href=\"https:\/\/www.schneier.com\/\" target=\"_blank\" rel=\"nofollow noopener\">Bruce Schneier<\/a>\u00a0\u2014\u00a0<a href=\"https:\/\/www.cs.columbia.edu\/~smb\/papers\/paper-key-escrow.pdf\" target=\"_blank\" rel=\"nofollow noopener\">warned<\/a>\u00a0that such escrowed encryption created serious security risks and that it was infeasible for an international setting; after all, which nation would hold the keys? It would be fun to claim the computer scientists were prescient; a more sober assessment is that they were realistic. Two years later the US government agreed, ending its efforts on escrowed encryption. I have heard intelligence officials remark that that mistaken effort is a partial cause for our current poor state of computer security. Certainly the attempt to force escrowed encryption was no help in securing communication or computer systems.<\/p>\n<p>It seems that FBI Director Comey and UK Prime Minister Cameron have not learned the lessons of the past. Both are pressing hard for laws requiring &#8220;exceptional access&#8221; mechanisms. This is some form of technology that would enable government access to content even if the content was encrypted. Yesterday Director Comey again\u00a0<a href=\"http:\/\/www.lawfareblog.com\/encryption-public-safety-and-going-dark\" target=\"_blank\" rel=\"nofollow noopener\">wrote<\/a>\u00a0about his concerns, explaining the dangers that would ensue if devices and communications are locked, with law enforcement having no ability to get at the data even in an emergency. That&#8217;s\u00a0<a href=\"http:\/\/privacyink.org\/pdf\/GoingBright.pdf\" target=\"_blank\" rel=\"nofollow noopener\">not<\/a>\u00a0exactly the case. But whether or not law enforcement can tackle encrypted systems \u2014 and there is evidence that they can in many cases \u2014 is\u00a0<em>not<\/em>\u00a0the issue I want to discuss today.<\/p><\/blockquote>\n<p>Read the Remainder at <strong><a href=\"http:\/\/www.lawfareblog.com\/keys-under-doormats-mandating-insecurity\">LawfareBlog<\/a><\/strong><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; The America Citizens Right of the Expectation of Privacy. It is a touchy subject, no doubt. Ever since the Edward Snowden revelations that big brother was in fact, watching, Americans have realized that everything they do online (pretty much) can be monitored, recorded, analyzed and filed for future use. It was no surprise then&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_newsletter_tier_id":0,"jetpack_publicize_message":"","jetpack_is_tweetstorm":false,"jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false}}},"categories":[74,1317,883,1635,1132,1189,65],"tags":[1712,1705,1713,1714],"jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/posts\/6457"}],"collection":[{"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/comments?post=6457"}],"version-history":[{"count":0,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/posts\/6457\/revisions"}],"wp:attachment":[{"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/media?parent=6457"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/categories?post=6457"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/tags?post=6457"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}