FBI’s war on encryption is unnecessary because the Internet of Things will spy on us just fine
By Xeni Jardin| Boing Boing | February 1, 2016
The war on encryption waged by the F.B.I. and other intelligence agencies is unnecessary, because the data trails we voluntarily leak allow “Internet of Things” devices and social media networks to track us in ways the government can access.
That’s the short version of what’s in “Don’t Panic: Making Progress on the ‘Going Dark’ Debate,” a study published today by the Berkman Center for Internet and Society at Harvard.
The title references the government’s argument that “encrypted communications are creating a ‘going dark’ crisis that will keep them from tracking terrorists and kidnappers,” as David E. Sanger explains in his coverage at the New York Times.
But “ ‘Going dark’ does not aptly describe the long-term landscape for government surveillance,” concludes the Berkman study convened by Matt Olsen, Bruce Schneier, and Jonathan Zittrain.
From the Berkman study intro:
In the last year, conversations around surveillance have centered on the use of encryption in communications technologies. The decisions of Apple, Google, and other major providers of communications services and products to enable end-to-end encryption in certain applications, on smartphone operating systems, as well as default encryption of mobile devices, at the same time that terrorist groups seek to use encryption to conceal their communication from surveillance, has fueled this debate.
The U.S. intelligence and law enforcement communities view this trend with varying degrees of alarm, alleging that their interception capabilities are “going dark.” As they describe it, companies are increasingly adopting technological architectures that inhibit the government’s ability to obtain access to communications, even in circumstances that satisfy the Fourth Amendment’s warrant requirements. Encryption is the hallmark of these architectures. Government officials are concerned because, without access to communications, they fear they may not be able to prevent terrorist attacks and investigate and prosecute criminal activity. Their solution is to force companies to maintain access to user communications and data, and provide that access to law enforcement on demand, pursuant to the applicable legal process. However, the private sector has resisted. Critics fear that architectures geared to guarantee such access would compromise the security and privacy of users around the world, while also hurting the economic viability of U.S. companies. They also dispute the degree to which the proposed solutions would truly prevent terrorists and criminals from communicating in mediums resistant to surveillance.
Leading much of the debate on behalf of the U.S. government is the Department of Justice, including the Federal Bureau of Investigation, whose leaders have commented on the matter in numerous public statements, speeches, and Congressional testimony throughout 2014 and 2015. After nearly a year of discourse, which included numerous statements critical of the government’s position from former U.S. intelligence officials and security technologists, the White House declared in October 2015 it would not pursue a legislative fix in the near future.
However, this decision has not brought closure. The FBI has since focused its energy on encouraging companies to voluntarily find solutions that address the investigative concerns. Most recently, terrorist attacks in San Bernardino, Paris, and elsewhere around the world, along with rising concern about the terrorist group ISIS, have focused increased attention on the issues of surveillance and encryption. These developments have led to renewed calls, including among U.S. Presidential candidates, for the government and private sector to work together on the going dark issue and for the Obama administration to reconsider its position.
You can read the whole report here, it’s offered in PDF.
The “findings” section is chilling. Basically, they’re saying the government won’t have any problem tracking us and surveilling our communications, because we’re freely sharing a lot of very revealing personal data and metadata to third parties, all day, every day, security be damned. “Internet of Things” connected devices, social media, and everywhere else you’re leaking data without encryption? All of those are accessible sources of data for intelligence agencies or law enforcement.
In short, our findings are:• End-to-end encryption and other technological architectures for obscuring user data are unlikely to be adopted ubiquitously by companies, because the majority of businesses that provide communications services rely on access to user data for revenue streams and product functionality, including user data recovery should a password be forgotten.
• Software ecosystems tend to be fragmented. In order for encryption to become both widespread and comprehensive, far more coordination and standardization than currently exists would be required.
• Networked sensors and the Internet of Things are projected to grow substantially, and this has the potential to drastically change surveillance. The still images, video, and audio captured by these devices may enable real-time intercept and recording with after-thefact access. Thus an inability to monitor an encrypted channel could be mitigated by the ability to monitor from afar a person through a different channel.
• Metadata is not encrypted, and the vast majority is likely to remain so. This is data that needs to stay unencrypted in order for the systems to operate: location data from cell phones and other devices, telephone calling records, header information in e-mail, and so on. This information provides an enormous amount of surveillance data that was unavailable before these systems became widespread.
• These trends raise novel questions about how we will protect individual privacy and security in the future. Today’s debate is important, but for all its efforts to take account of technological trends, it is largely taking place without reference to the full picture.
The structure of the study was pretty novel. From the New York Times :
The Harvard study, funded by the Hewlett Foundation, was unusual because it involved technical experts, civil libertarians and officials who are, or have been, on the forefront of counterterrorism. Larry Kramer, the former dean of Stanford Law School, who heads the foundation, noted Friday that until now “the policy debate has been impeded by gaps in trust — chasms, really — between academia, civil society, the private sector and the intelligence community” that have impeded the evolution of a “safe, open and resilient Internet.”
Among the chief authors of the report is Matthew G. Olsen, who was a director of the National Counterterrorism Center under Mr. Obama and a general counsel of the National Security Agency.
Two current senior officials of the N.S.A. — John DeLong, the head of the agency’s Commercial Solutions Center, and Anne Neuberger, the agency’s chief risk officer — are described in the report as “core members” of the group, but did not sign the report because they could not act on behalf of the agency or the United States government in endorsing its conclusions, government officials said.
Share this:
Related
February 2, 2016 - Posted by aletho | Civil Liberties, Full Spectrum Dominance, Timeless or most popular | FBI, Human rights, United States
No comments yet.
Featured Video
Iran War Confusion & Mixed Messaging /Lt Col Daniel Davis
or go to
Aletho News Archives – Video-Images
From the Archives
Anti-science
The infinite list
The Naked Emperor’s Newsletter | October 12, 2022
Almost three years ago science entered a new dark age.
Jay Bhattacharya, a professor of medicine at Stanford University and co-author of the Great Barrington Declaration, seems to agree. He has been compiling a list of the examples of anti-science we have unfortunately become used to.
I have listed his thoughts so far but the list is continually expanding... continue
Blog Roll
-
Join 2,458 other subscribers
Visits Since December 2009
- 7,495,592 hits
Looking for something?
Archives
Calendar
Categories
Aletho News Civil Liberties Corruption Deception Economics Environmentalism Ethnic Cleansing, Racism, Zionism Fake News False Flag Terrorism Full Spectrum Dominance Illegal Occupation Mainstream Media, Warmongering Malthusian Ideology, Phony Scarcity Militarism Progressive Hypocrite Russophobia Science and Pseudo-Science Solidarity and Activism Subjugation - Torture Supremacism, Social Darwinism Timeless or most popular Video War Crimes Wars for IsraelTags
9/11 Afghanistan Africa al-Qaeda Australia BBC Benjamin Netanyahu Brazil Canada CDC Central Intelligence Agency China CIA CNN Covid-19 COVID-19 Vaccine Donald Trump Egypt European Union Facebook FBI FDA France Gaza Germany Google Hamas Hebron Hezbollah Hillary Clinton Human rights Hungary India Iran Iraq ISIS Israel Israeli settlement Japan Jerusalem Joe Biden Korea Latin America Lebanon Libya Middle East National Security Agency NATO New York Times North Korea NSA Obama Pakistan Palestine Poland Qatar Russia Sanctions against Iran Saudi Arabia Syria The Guardian Turkey Twitter UAE UK Ukraine United Nations United States USA Venezuela Washington Post West Bank WHO Yemen Zionism
Aletho News- Iran War Confusion & Mixed Messaging /Lt Col Daniel Davis
- Israel threatens Gaza flotilla activists with death after abduction
- Met refuses to probe British nationals accused of war crimes in Gaza
- Hezbollah denies activity in Syria amid persistent and false claims
- Melkite bishops concerned over Israeli demolitions in South Lebanon
- Israel’s Obliteration Ecocide from Gaza to Lebanon and Beyond
- UAE deports tens of thousands of Pakistanis, seizes their savings amid war on Iran: Report
- Wheels Down in Tbilisi: Was a Routine U.S. Military Stopover a Deliberate Signal to Iran?
- Trump’s second strike on Iran would be suicidal. But that’s not the reason why he won’t go ahead with it
- Palantir touts record expansion and ‘battlefield’ AI value
If Americans Knew- An All-American Retort to Israel’s Invasion of Lebanon
- How Dr. Adam Hamawy’s experience as a surgeon in Gaza inspired him to run for Congress
- Under Trump, Green Card Seekers Face New Scrutiny for Views on Israel
- With World Distracted by War, Extremist Settlers Intensify Attacks in West Bank
- Israel’s brutality toward Gaza flotilla activists – 3 articles
- “Spitting and humiliation are daily. People are afraid to walk in Jerusalem with Christian symbols.”
- How the US-Israel Relationship Weakens America and Harms the World
- 1 in 5 amputees in Gaza is a child, UN warns amid prosthetic care crisis
- 6,000 Gazans lack prosthetic and/or rehabilitation care – Daily Update
- As in Gaza, Israel is targeting rescue workers in South Lebanon, killing more than 100 since March
No Tricks Zone- 46 IPCC Scientists Break Rank, Publicly Challenge Long-Standing Dogmatic Climate Claims
- Another Study Links Warming To Cloud Forcing, Shortwave Radiation, Natural Atmospheric Circulation
- Wind Energy Is Toxic, Hazardous To Human Health, Scientific Review Shows
- Oversupply Of Volatile Solar Energy Leads To Record NEGATIVE Prices!
- New Study: Extreme Heat Records, Heatwaves, Extreme Cold Records Declining Across US Since 1899
- It’s The Cold, Stupid! Cold 20 Times More Lethal Than Heat, Multiple Studies Show
- European Institute For Climate And Energy: “Climate Debate is Seldom About Science”
- New Study: The Climate May Be 5 Times More Sensitive To Solar Forcing Than Commonly Assumed
- EV Industry Reached $70 Billion In Losses In 2024 Due To Delusional Green Ideologies
- Reality Check: Maldives Have Actually Grown In Size Or Remained Stable Over Recent Decades
Contact:
atheonews (at) gmail.com
Disclaimer
This site is provided as a research and reference tool. Although we make every reasonable effort to ensure that the information and data provided at this site are useful, accurate, and current, we cannot guarantee that the information and data provided here will be error-free. By using this site, you assume all responsibility for and risk arising from your use of and reliance upon the contents of this site.
This site and the information available through it do not, and are not intended to constitute legal advice. Should you require legal advice, you should consult your own attorney.
Nothing within this site or linked to by this site constitutes investment advice or medical advice.
Materials accessible from or added to this site by third parties, such as comments posted, are strictly the responsibility of the third party who added such materials or made them accessible and we neither endorse nor undertake to control, monitor, edit or assume responsibility for any such third-party material.
The posting of stories, commentaries, reports, documents and links (embedded or otherwise) on this site does not in any way, shape or form, implied or otherwise, necessarily express or suggest endorsement or support of any of such posted material or parts therein.
The word “alleged” is deemed to occur before the word “fraud.” Since the rule of law still applies. To peasants, at least.
Fair Use
This site contains copyrighted material the use of which has not always been specifically authorized by the copyright owner. We are making such material available in our efforts to advance understanding of environmental, political, human rights, economic, democracy, scientific, and social justice issues, etc. We believe this constitutes a ‘fair use’ of any such copyrighted material as provided for in section 107 of the US Copyright Law. In accordance with Title 17 U.S.C. Section 107, the material on this site is distributed without profit to those who have expressed a prior interest in receiving the included information for research and educational purposes. For more info go to: http://www.law.cornell.edu/uscode/17/107.shtml. If you wish to use copyrighted material from this site for purposes of your own that go beyond ‘fair use’, you must obtain permission from the copyright owner.
DMCA Contact
This is information for anyone that wishes to challenge our “fair use” of copyrighted material.
If you are a legal copyright holder or a designated agent for such and you believe that content residing on or accessible through our website infringes a copyright and falls outside the boundaries of “Fair Use”, please send a notice of infringement by contacting atheonews@gmail.com.
We will respond and take necessary action immediately.
If notice is given of an alleged copyright violation we will act expeditiously to remove or disable access to the material(s) in question.
All 3rd party material posted on this website is copyright the respective owners / authors. Aletho News makes no claim of copyright on such material.

Leave a comment