{"id":29416,"date":"2015-03-01T18:47:28","date_gmt":"2015-03-01T23:47:28","guid":{"rendered":"http:\/\/www.opensource.im\/uncategorized\/fbis-attack-on-encryption.php"},"modified":"2015-03-01T18:47:28","modified_gmt":"2015-03-01T23:47:28","slug":"fbis-attack-on-encryption","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/encryption\/fbis-attack-on-encryption.php","title":{"rendered":"FBI\u2019s attack on encryption"},"content":{"rendered":"<p><p>    WASHINGTON  As Googles Android    smartphone operating system was coming under attack in fall    2012 from malware with the colorful names of Loozfon and    FinFisher, the FBIs Internet Crime Complaint Center issued    an alert against the threat.  <\/p>\n<p>    Depending on the type of phone, the FBI said, the operating    system may have encryption available. This can be used to    protect the users personal data.  <\/p>\n<p>    Last fall, when Apple and Google announced they were cleaning    up their operating systems to ensure that their users    information was encrypted to prevent hacking and potential data    loss, FBI Director James Comey attacked both companies. He    claimed the encryption would cause the users to place    themselves above the law.  <\/p>\n<p>    The tech community fired back. The only actions that have    undermined the rule of law, Ken Gude wrote in Wired, are    the governments deceptive and secret mass-surveillance    programs.  <\/p>\n<p>    The battle resumed in February 2015. Michael Steinbach, FBI    assistant director for counterterrorism, said it is    irresponsible for companies like Google and Apple to use    software that denies the FBI lawful means to intercept data.  <\/p>\n<p>    Yet the FBI does have a lawful means to intercept it: the    Foreign Intelligence Surveillance Act. Its scope was expanded    by Congress after the 9\/11 attacks.  <\/p>\n<p>    Its worth noting that the FBI never asked Congress to force    tech companies to build back doors into their products    immediately after the 9\/11 attacks. Only after Google and Apple    took steps to patch existing security vulnerabilities did the    bureau suddenly express concern that terrorists might be    exploiting this encryption.  <\/p>\n<p>    In fact, the bureau has a host of legal authorities and    technological capabilities at its disposal to intercept and    read communications, or even to penetrate facilities or homes    to implant audio and video recording devices. The larger    problem confronting the FBI and the entire U.S. intelligence    community is their over-reliance on electronic technical    collection against terrorist targets.  <\/p>\n<p>    The best way to disrupt any organized criminal element is to    get inside of it physically. But the U.S. governments    counterterrorism policies have made that next to impossible.  <\/p>\n<p>    The FBI, for example, targets the very Arab-American and    Muslim-American communities it needs to work with if it hopes    to find and neutralize home-grown violent extremists, including    promulgating new rules on profiling that allow for the    potential mapping of Arab- or Muslim-American communities.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>The rest is here:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.japantimes.co.jp\/opinion\/2015\/03\/01\/commentary\/world-commentary\/fbis-attack-on-encryption\/?utm_source=rss&amp;utm_medium=rss&amp;utm_campaign=fbis-attack-on-encryption\/RK=0\/RS=Wa3OuR6a9_aI107iHAXvts50pLE-\" title=\"FBI\u2019s attack on encryption\">FBI\u2019s attack on encryption<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> WASHINGTON As Googles Android smartphone operating system was coming under attack in fall 2012 from malware with the colorful names of Loozfon and FinFisher, the FBIs Internet Crime Complaint Center issued an alert against the threat. Depending on the type of phone, the FBI said, the operating system may have encryption available<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[45],"tags":[],"class_list":["post-29416","post","type-post","status-publish","format-standard","hentry","category-encryption"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/29416"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=29416"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/29416\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=29416"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=29416"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=29416"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}