{"id":26800,"date":"2014-10-16T19:41:23","date_gmt":"2014-10-16T23:41:23","guid":{"rendered":"http:\/\/www.opensource.im\/?p=26800"},"modified":"2014-10-16T19:41:23","modified_gmt":"2014-10-16T23:41:23","slug":"fbi-director-attacks-tech-companies-for-embracing-new-modes-of-encryption","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/encryption\/fbi-director-attacks-tech-companies-for-embracing-new-modes-of-encryption.php","title":{"rendered":"FBI director attacks tech companies for embracing new modes of encryption"},"content":{"rendered":"<p><p>  The FBI director, James Comey, speaks about the impact of  technology on law enforcement in Washington on Thursday.  Photograph: Jose Luis Magana\/AP<\/p>\n<p>    The director of the FBI savaged tech    companies for their recent embrace of end-to-end encryption and    suggested rewriting laws to ensure law enforcement access to    customer data in a speech on Thursday.<\/p>\n<p>    James Comey said data encryption such as that employed on    Apples latest mobile operating system would deprive police and    intelligence companies of potentially life-saving information,    even when judges grant security agencies access through a    warrant.  <\/p>\n<p>    Criminals and terrorists would like nothing more than for us    to miss out, he said. Technologists have found such statements    reminiscent of the Crypto    Wars of the 1990s, an earlier period in which the US    government warned about encryption constraining law    enforcement.  <\/p>\n<p>    Framing his speech at the Brookings Institution as kickstarting    a dialogue and insisting he was not a scaremonger, Comey    said encryption threatens to lead us all to a very, very dark    place.  <\/p>\n<p>    Comey also posed as a question whether companies not subject    currently to Calea should be required to build lawful intercept    capabilities for law enforcement, something he contended would    not expand FBI authorities. Calea is a 1994 surveillance law    mandating that law enforcement and intelligence agencies have    access to telecommunications data, which Comey described as    archaic in the face of technological innovation.  <\/p>\n<p>    Im hoping we can now start a dialogue with Congress on    updating it, Comey said.  <\/p>\n<p>    Privacy advocates contend Comey is demagoguing the issue.  <\/p>\n<p>    It took a June supreme court ruling, they point out, for law    enforcement to abandon its contention that it did not require    warrants at all to search through smartphones or tablets, and    add that technological vulnerabilities can be exploited by    hackers and foreign intelligence agencies as well as the US    government. Additionally, the FBI and police retain access to    data saved remotely in the so-called cloud  where much data    syncs for storage from devices like Apples  for which    companies like Apple keep the encryption keys.  <\/p>\n<p>    Comey, frequently referring to bad guys using encryption,    argued access to the cloud is insufficient.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Read the original here:<br \/>\n<a target=\"_blank\" href=\"http:\/\/feeds.theguardian.com\/c\/34708\/f\/663828\/s\/3f87943b\/sc\/46\/l\/0L0Stheguardian0N0Cus0Enews0C20A140Coct0C160Cfbi0Edirector0Eattacks0Etech0Ecompanies0Eencryption\/story01.htm\/RK=0\/RS=nH7bMDGsAQCkiVLwoXwufsVYlhY-\" title=\"FBI director attacks tech companies for embracing new modes of encryption\">FBI director attacks tech companies for embracing new modes of encryption<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> The FBI director, James Comey, speaks about the impact of technology on law enforcement in Washington on Thursday. Photograph: Jose Luis Magana\/AP The director of the FBI savaged tech companies for their recent embrace of end-to-end encryption and suggested rewriting laws to ensure law enforcement access to customer data in a speech on Thursday<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[45],"tags":[],"class_list":["post-26800","post","type-post","status-publish","format-standard","hentry","category-encryption"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/26800"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=26800"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/26800\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=26800"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=26800"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=26800"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}