{"id":26508,"date":"2014-10-05T00:40:50","date_gmt":"2014-10-05T04:40:50","guid":{"rendered":"http:\/\/www.opensource.im\/?p=26508"},"modified":"2014-10-05T00:40:50","modified_gmt":"2014-10-05T04:40:50","slug":"editorial-compromise-needed-on-smartphone-encryption","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/encryption\/editorial-compromise-needed-on-smartphone-encryption.php","title":{"rendered":"Editorial: Compromise needed on smartphone encryption"},"content":{"rendered":"<p><p>    By Editorial Board October 3  <\/p>\n<p>    LAW ENFORCEMENT officials deserve to be heard in their recent        warnings about the impact of next-generation encryption    technology on smartphones, such as Apples new iPhone. This is    an important moment in which technology, privacy and the rule    of law are colliding.  <\/p>\n<p>        Apple announced Sept. 17 that its latest mobile operating    system, iOS 8, includes encryption so thorough that the company    will not be able to unlock it for law enforcement. The    encryption is to be set by the user, and Apple will not retain    the key. Googles next version of its popular Android operating    system also will be unlockable by the company. Both insist they    are giving consumers ironclad privacy protection. The moves are    in large part a response to public worries about National    Security Agency surveillance of Internet and telephone metadata    revealed by former government contractor Edward Snowden.  <\/p>\n<p>    What has the law enforcement community up in arms is the    prospect of losing access to the data on these smartphones in    cases where they have a valid, court-approved search warrant.    The technology firms, while pledging to honor search warrants    in other situations, say they simply wont possess the ability    to unlock the smartphones. Only the owner of the phone, who set    up the encryption, will be able to do that. Attorney General    Eric H. Holder Jr. said this could imperil investigations in    kidnapping and other cases; FBI Director James B. Comey said he    could not understand why the tech companies would market    something expressly to allow people to place themselves beyond    the law.  <\/p>\n<p>    This is not about mass surveillance. Law enforcement    authorities are not asking for the ability to surveil    everyones smartphone, only those relatively few cases where    there is a court-approved search warrant. This seems reasonable    and not excessively intrusive. After all, the government in    many other situations has a right  and responsibility  to set    standards for products so that laws are followed. Why not    smartphones? Moreover, those worried about privacy can take    solace from the Supreme Courts decision in June in Riley v.    California, which acknowledged the large amount of private    information on smartphones and said a warrant is generally    required before a search.  <\/p>\n<p>    Law enforcement will not be entirely without tools in criminal    investigations. Data stored in the cloud and other locations    will still be available; wiretaps, too. But smartphone users    must accept that they cannot be above the law if there is a    valid search warrant.  <\/p>\n<p>    How to resolve this? A police back door for all smartphones    is undesirable  a back door can and will be exploited by bad    guys, too. However, with all their wizardry, perhaps Apple and    Google could invent a kind of secure golden key they would    retain and use only when a court has approved a search warrant.    Ultimately, Congress could act and force the issue, but wed    rather see it resolved in law enforcement collaboration with    the manufacturers and in a way that protects all three of the    forces at work: technology, privacy and rule of law.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Go here to see the original:<br \/>\n<a target=\"_blank\" href=\"http:\/\/feeds.washingtonpost.com\/c\/34656\/f\/645348\/s\/3f19e3ce\/sc\/46\/l\/0L0Swashingtonpost0N0Copinions0Ccompromise0Eneeded0Eon0Esmartphone0Eencryption0C20A140C10A0C0A30C96680Abf80E4a770E11e40E891d0E713f0A520A86a0A0Istory0Bhtml0Dwprss0Frss0Ihomepage\/story01.htm\/RK=0\/RS=2mGd5ItkSc4vszz1AAkAePU.DwQ-\" title=\"Editorial: Compromise needed on smartphone encryption\">Editorial: Compromise needed on smartphone encryption<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> By Editorial Board October 3 LAW ENFORCEMENT officials deserve to be heard in their recent warnings about the impact of next-generation encryption technology on smartphones, such as Apples new iPhone. This is an important moment in which technology, privacy and the rule of law are colliding. <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[45],"tags":[],"class_list":["post-26508","post","type-post","status-publish","format-standard","hentry","category-encryption"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/26508"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=26508"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/26508\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=26508"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=26508"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=26508"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}