Poisonous political divisions have spawned an encryption arms race across the Trump administration, as both the presidents advisers and career civil servants scramble to cover their digital tracks in a capital nervous about leaks.
The surge in the use of scrambled-communication technology enabled by free smartphone apps such as WhatsApp and Signal could skirt or violate laws that require government records to be preserved and the publics business to be conducted in official channels, several ethics experts say. It may even cloud future generations knowledge of the full history of Donald Trumps presidency.
Story Continued Below
The operative word is accountability. You cannot hold an agency or someone accountable if records are not kept and made available, said John Carlin, a former Democratic Kansas governor who served as the archivist of the National Archives from 1995 to 2005. If there is a hearing or investigation someday and no access to records, there is not much you can do.
White House press secretary Sean Spicer has pointedly warned his staff that using encrypted apps would violate a law requiring the preservation of presidential records, POLITICO reported Sunday.
Conservative advocacy groups also denounce the use of encrypted technologies by career employees, comparing it to Hillary Clintons use of a private email server when she was secretary of State. The House Science Committee has demanded an inquiry into the use of encryption by employees at the Environmental Protection Agency although it has shown no similar curiosity about use of encryption in the White House.
Its stunning that its still going on in light of the Clinton email scandal, said Judicial Watch President Tom Fitton, who has been critical of the use of encrypted messaging by both civil servants and the White House. Its no different than what she was doing.
Defenders of federal workers say interest in encryption has skyrocketed as career employees ponder how to respond to an administration they fear will break the law and punish dissent in pursuit of a radical agenda. Jon Brod the co-founder of Confide, a company that offers an encrypted messaging program of the same name said the company has seen a surge in use of its app following the election.
People in the government are finding many uses for encryption, including internal conversations and leaks to the news media.
More than 70 workers from several agencies are using encrypted cellphone apps to arrange nighttime and weekend meetings at homes in the D.C. area to discuss their potential resistance to Trump, said Danielle Brian, executive director of the Project on Government Oversight.
She said the employees want to know what to do if they see something illegal happening at their agencies, how to report misdeeds to Congress or inspectors general, and what is protected under whistleblower laws. The demand is so great that POGO plans to hire a full-time employee to train workers across the country on how to report problems, keep their jobs and use encrypted messages to communicate and organize outside of work.
In addition to the EPA, employees at the State Department, the Department of Homeland Security, the Department of Transportation and other agencies are using encrypted messaging apps, POLITICO has learned.
We are responding to an increasing level of anxiety in the federal workplace about free speech rights and civil liberties, said POGO's Brian, who has attended three private sessions to offer advice on government workers legal protections. This is a whole new world for us.
Federal workers told POLITICO they've adopted encrypted apps because they fear being targeted by Trump's political allies.
"Its very scary," one career civil servant said in an interview, requesting anonymity to avoid possible retaliation. "You dont know who to trust.
Trump has made no secret of his desire to uncover the sources of the many leaks that have roiled the first month of his presidency. The spotlight has finally been put on the low-life leakers! he wrote on Twitter earlier this month. They will be caught!
The hunt for leaks has swept up the White House communications staff, where Spicer has begun quietly cracking down on the use of encrypted apps. POLITICO reported Sunday that Spicer recently checked White House staffers phones and warned them against using apps like Confide, which deletes messages as soon as theyre read, and Signal, which also has an optional setting to automatically delete messages.
The crackdown came after some political appointees in Trumps White House began using the encrypted apps so they can have covert conversations with journalists and their colleagues. But it remains unclear if top White House officials can completely halt the use of the apps. And at least some staff were still using them as of earlier this month, sources say.
"To my knowledge, no one in the [White House] is using the Confide app or any other similar app and we go to great lengths to preserve all records," a White House official told POLITICO in an email late last week.
However, a BuzzFeed reporter determined that Spicer and White House aide Hope Hicks had once downloaded the Confide app, the site reported this month after using a feature that lets users find contacts who have already signed up. Spicer told BuzzFeed he used Confide only once "months ago."
The White House official told POLITICO that Hicks "does not use the app and deleted it from her phone." The official did not respond to follow-up questions about how the White House knows other staff aren't using the app.
Trump staffers are keenly aware of the risks of their internal communications going public, having faced widespread leaking from their own ranks during the campaign and having seen the damaging fallout from last year's dumps of hacked emails from Democrats such as Clinton campaign chairman John Podesta.
Yet ethics experts argue that the use of encrypted messaging apps by White House staff for official business would be a clear violation of the law. "At a minimum, the White House ought to explain what record preservation steps it is taking," said Norm Eisen, former ethics czar under ex-President Barack Obama and co-founder of the group Citizens for Responsibility and Ethics in Washington. "If they refuse to answer those questions, it is fair to assume they are at risk of violating the law."
For both the Trump team and the career employees, encrypted apps like Signal, WhatsApp, Confide and Wickr make it easier to communicate in secret by leaving would-be snoops with unreadable strings of text thwarting any hackers or government investigators who might get hold of the messages. Thats on top of the strong encryption offered by devices such as the latest iPhones, which the FBI has complained it cant crack even in drug or terrorism investigations.
Its unclear whether the career employees are breaking any laws. While it is illegal for federal employees to hold secret discussions to conduct government business, several workers insisted in interviews that they use the apps only for personal communications.
A spokeswoman at the National Archives, which maintains the governments records, said in an email that personal opinions by and between agency employees, even about senior agency officials, would not likely meet the definition of a federal record that must be preserved.
But experts say the nature of encryption technology makes it difficult to tell what the employees are discussing. Conservative groups are exploiting that fact to target federal workers who are critical of Trump.
"Any effective regulation of federal employee behavior is heavily predicated on learning that that misconduct has occurred, said Dan Metcalfe, the former director of the Justice Departments Office of Information and Privacy, who spent more than two decades guiding federal agencies on Freedom of Information Act issues. Thats the only way you can regulate it after the fact.
White House staffers are bound by the Presidential Records Act, a post-Watergate law that requires the preservation of official government records. It allows public access to those documents after a waiting period that can stretch from five to 12 years.
Other federal employees must abide by the Federal Records Act, which similarly requires the preservation of government documents. But the law allows more speedy public access to those documents through Freedom of Information Act requests.
The Federal Records Act was amended in 2014 to include all electronic messages, including text messages, voice mails and messaging apps. July 2015 guidance to federal agencies from the National Archives specifically mentions WhatsApp as an example of an application whose messages must be preserved if they pertain to government business.
But even if the technology is new, attempts to skirt federal records laws arent.
This is just another variation on the theme, Fitton said about the use of encrypted messaging apps to communicate. Its not a new issue issue. Its just a new flavor. It doesnt matter the technology because the agencies are required to maintain these records. You can delete text messages and emails too.
Staffers in Republican and Democrat administrations alike often keep sensitive information out of emails, preferring phone conversations, which largely arent subject to record keeping laws. The Reagan, George H.W. Bush and Clinton administrations strongly resisted calls to preserve their email records (the Reagan White House adopted a rudimentary form of email in the 1980s), resulting in a years-long legal battle.
George W. Bush administration officials faced criticism for using non-government email accounts. And Obama administration officials were caught using alternative email addresses that obscured their identities.
Indeed, resistance to preserving records dates back to the early days of the country. Martha Washington and Thomas Jefferson famously burned their correspondence with their spouses, for example, keeping many of their private thoughts out of reach of later generations.
But the wide availability of encrypted messaging makes secrecy easier than ever.
Its certainly easier to circumvent public records laws in a written format now than it ever has been, said Mark Rumold, a senior staff attorney at the Electronic Frontier Foundation, a nonprofit group that pushes for government transparency.
Republicans in Congress are increasingly frustrated, worrying that career employees are secretly undercutting Trumps policies.
After POLITICO reported this month that several EPA employees were using Signal, House Science Chairman Lamar Smith (R-Texas) asked the agencys inspector general to look into the issue. Several right-leaning groups have filed FOIA requests seeking EPA employees communications using Signal.
But Smith and other Republicans have not publicly committed to investigate encryption at the White House. A spokeswoman for Rep. Jason Chaffetz (R-Utah), chairman of the House Oversight Committee, declined to comment when asked whether he is looking into the issue.
Some Democrats counter that federal workers should be protected, citing whistleblower laws that shield workers from retribution if they report law-breaking or gross mismanagement.
Reps. Ted Lieu (D-Calif.) and Rep. Don Beyer (D-Va.) even released a guide that underscores federal workers rights. The guide appears to endorse the use of encrypted apps, calling them a safe bet.
In an interview, Lieu said, I just want to make clear to federal employees, Congress passed an entire law protecting whistleblowers."
Tim Starks contributed to this story.
Read more here:
Trump inspires encryption boom in leaky DC - Politico
- Report: NSA building comp to crack encryption types [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- Report: NSA looking to crack all encryption with quantum computer [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- Sound Advice: Explaining Comcast cable encryption [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- NSA Building Encryption-Busting Super Computer [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- NSA researches quantum computing to crack most encryption [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- Advanced Encryption Standard - Wikipedia, the free encyclopedia [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- How Encryption Works - HowStuffWorks "Computer" [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- Email Encryption - MB Technology Solutions - Video [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- Email Encryption - Video [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption - Video [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- Toshiba WT8 Full Disk Encryption, Miracast, Easy Stand - Video [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- Australian Encryption | Text encryption software for the protection of your privacy - Video [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- njRAT v0 6 4 server Clean Encryption - Video [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- AlertBoot New Encryption Compliance Reports Prepare Covered Entities For HIPAA Audits [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- BlackBerry denies using backdoor-enabled encryption code [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- What Is Encryption? (with pictures) - wiseGEEK [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- HowStuffWorks "How Encryption Works" [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Gambling with Secrets Part 5 8 Encryption Machines - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- The Benefits of Hosted Disk Encryption - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Quill Encryption - what's that? - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- WhatsApp Encryption - Shmoocon 2014 by @segofensiva @psaneme - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- encryption demo2 - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- encryption demo - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Seven - Encryption Official Lyric Visual - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Quantum Computers - The Ultimate Encryption Backdoor? - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Eric Schmidt: Encryption will break through the Great Firewall of China [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- From NSA to Gmail: Ex-spy launches free email encryption service [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Tennessee bill takes on NSA encryption-breaking facility at Oak Ridge/SHUT. IT. DOWN. - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Substitute for:Measurements. 1 Episode. Strength of the encryption algorithm - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- RSA Encryption Checkpoint - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Gambling with Secrets 8 8 RSA Encryption 1 - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Google chairman says 'encrypting everything' could end China's censorship, stop NSA snooping [Last Updated On: January 26th, 2014] [Originally Added On: January 26th, 2014]
- Ex-spy launches free email encryption service [Last Updated On: January 26th, 2014] [Originally Added On: January 26th, 2014]
- 3 2 The Data Encryption Standard 22 min - Video [Last Updated On: January 26th, 2014] [Originally Added On: January 26th, 2014]
- RSA Encryption step 3 - Video [Last Updated On: January 26th, 2014] [Originally Added On: January 26th, 2014]
- RSA Encryption step 2 - Video [Last Updated On: January 26th, 2014] [Originally Added On: January 26th, 2014]
- aes tutorial, cryptography Advanced Encryption Standard AES Tutorial,fips 197 - Video [Last Updated On: January 26th, 2014] [Originally Added On: January 26th, 2014]
- Townsend Security Release First Encryption Key Management Module for Drupal [Last Updated On: January 27th, 2014] [Originally Added On: January 27th, 2014]
- RSA Encryption step 5 - Video [Last Updated On: January 27th, 2014] [Originally Added On: January 27th, 2014]
- Lavabit case highlights legal fuzziness around encryption rules [Last Updated On: January 28th, 2014] [Originally Added On: January 28th, 2014]
- A Beginner's Guide To Encryption: What It Is And How To Set It Up [Last Updated On: January 28th, 2014] [Originally Added On: January 28th, 2014]
- How App Developers Leave the Door Open to NSA Surveillance [Last Updated On: January 28th, 2014] [Originally Added On: January 28th, 2014]
- Intro to RSA Encryption step 1 - Video [Last Updated On: January 28th, 2014] [Originally Added On: January 28th, 2014]
- “Honey Encryption” Will Bamboozle Attackers with Fake Secrets [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- Encryption - A Life Unlived (DEMO) - Video [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- Baffle thy enemy: The case for Honey Encryption [Last Updated On: January 31st, 2014] [Originally Added On: January 31st, 2014]
- New AlertBoot Encryption Reports Make Dental HIPAA Compliance Easier [Last Updated On: January 31st, 2014] [Originally Added On: January 31st, 2014]
- Encryption - The Protest - Video [Last Updated On: January 31st, 2014] [Originally Added On: January 31st, 2014]
- Encryption - New Life - Video [Last Updated On: February 1st, 2014] [Originally Added On: February 1st, 2014]
- Encryption - Intro - Video [Last Updated On: February 1st, 2014] [Originally Added On: February 1st, 2014]
- Encryption - Blank Canvas - Video [Last Updated On: February 1st, 2014] [Originally Added On: February 1st, 2014]
- Security First SPxBitFiler-IPA encryption pattern for the IBM PureApplication System - Video [Last Updated On: February 3rd, 2014] [Originally Added On: February 3rd, 2014]
- Revolutionary new cryptography tool could make software unhackable [Last Updated On: February 4th, 2014] [Originally Added On: February 4th, 2014]
- viaForensics webinar: Mobile encryption - the good, bad, and broken - Aug 2013 - Video [Last Updated On: February 4th, 2014] [Originally Added On: February 4th, 2014]
- K.OStream 0.2 File Encryption Test - Video [Last Updated On: February 4th, 2014] [Originally Added On: February 4th, 2014]
- Tumblr adds SSL encryption option, but not as the default [Last Updated On: February 5th, 2014] [Originally Added On: February 5th, 2014]
- Latest Java Project Source Code on Chaotic Image Encryption Techniques - Video [Last Updated On: February 5th, 2014] [Originally Added On: February 5th, 2014]
- Encryption - University of Illinois at Urbana–Champaign [Last Updated On: February 6th, 2014] [Originally Added On: February 6th, 2014]
- A Beginner's Guide to Encryption: What It Is and How to ... [Last Updated On: February 6th, 2014] [Originally Added On: February 6th, 2014]
- Real Data Encryption Software is More Important than Ever ... [Last Updated On: February 8th, 2014] [Originally Added On: February 8th, 2014]
- Caesar Cipher Encryption method With example in C Language - Video [Last Updated On: February 8th, 2014] [Originally Added On: February 8th, 2014]
- Hytera DMR 256 bit encryption - Video [Last Updated On: February 9th, 2014] [Originally Added On: February 9th, 2014]
- Townsend Security Releases Encryption Key Management Virtual Machine for Windows Azure [Last Updated On: February 10th, 2014] [Originally Added On: February 10th, 2014]
- Unitrends Data Backup Webinar: Utilizing The Cloud, Deduplication, and Encryption - Video [Last Updated On: February 10th, 2014] [Originally Added On: February 10th, 2014]
- Main menu [Last Updated On: February 12th, 2014] [Originally Added On: February 12th, 2014]
- Use of encryption growing but businesses struggle with it – study [Last Updated On: February 12th, 2014] [Originally Added On: February 12th, 2014]
- SlingSecure Mobile Voice Encryption Installation Video for Android - Video [Last Updated On: February 12th, 2014] [Originally Added On: February 12th, 2014]
- Data breaches drive growth in use of encryption, global study finds [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- Darren Moffat: ZFS Encryption - Part 2 - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- Darren Moffat: ZFS Encryption - Part 1 - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- How do I configure User Local Recovery in Endpoint Encryption Manager 276 - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- Symmetric Cipher (Private-key) Encryption - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- SafeGuard File Encryption for Mac - Installation and Configuration - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- Fundamentals of Next Generation Encryption - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- Tutorial: Einrichten der EgoSecure Endpoint Removable Device Encryption - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- 'PGP' encryption has had stay-powering but does it meet today's enterprise demands? [Last Updated On: February 15th, 2014] [Originally Added On: February 15th, 2014]
- Fact or Fiction: Encryption Prevents Digital Eavesdropping [Last Updated On: February 15th, 2014] [Originally Added On: February 15th, 2014]
- RHCSA PREP:answer to question 20 (Central Authentication Using LDAP with TLS/SSL Encryption) - Video [Last Updated On: February 15th, 2014] [Originally Added On: February 15th, 2014]
- Protect+ Voice Recorder with Encryption - Video [Last Updated On: February 15th, 2014] [Originally Added On: February 15th, 2014]