{"id":29642,"date":"2015-03-12T00:45:46","date_gmt":"2015-03-12T04:45:46","guid":{"rendered":"http:\/\/www.opensource.im\/uncategorized\/influencers-stronger-encryption-on-consumer-devices-wont-hurt-national-security-video.php"},"modified":"2015-03-12T00:45:46","modified_gmt":"2015-03-12T04:45:46","slug":"influencers-stronger-encryption-on-consumer-devices-wont-hurt-national-security-video","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/encryption\/influencers-stronger-encryption-on-consumer-devices-wont-hurt-national-security-video.php","title":{"rendered":"Influencers: Stronger encryption on consumer devices won&#8217;t hurt national security (+video)"},"content":{"rendered":"<p><p>    Three-quarters of Passcode's Influencers disagree with FBI Director    James Comey, insisting stronger encryption on consumer    devices would not hinder law enforcement and intelligence    agencies so much that it would harm national security.  <\/p>\n<p>    \"Its crucial that users demand the highest level of security    to both protect our personal privacy and mitigate the potential    harm that can result from theft of personal data.    Unquestionably, encrypting the content of smartphones makes it    more difficult to access that information; thats the point,\"    said Nuala O'Connor, head of the Center for Democracy and    Technology. \"However, there are still many legal channels    police can pursue to access encrypted data.\"  <\/p>\n<p>    Mr. Comey and intelligence officials have criticized companies    such as Google and Apple for strengthening encryption on    consumer devices because they say it will stymie law    enforcement as they track criminals and terrorists. While the    73 percent of Influencers largely acknowledged that encryption    will occasionally pose some obstacles to law enforcement, they    insisted they were not severe enough to justify built-in    government access to data.  <\/p>\n<p>    \"Evidence that this is a serious problem demanding a policy    response is laughably weak,\" said Cato Institute senior fellow    Julian Sanchez.  <\/p>\n<p>    \"We live in a Golden Age of Surveillance. Never in human    history have police had such easy access to such vast    quantities of data about people. They'll still be able to use    subpoenas or court orders (and the threat of contempt penalties    or even obstruction charges) to compel people to decrypt data;    they can still surreptitiously attempt to get people's    passphrases through physical surveillance,\" Mr. Sanchez    continued. \"It is flat out insane to suggest that we should    undermine the security of a technology used by hundreds of    millions of people for legitimate purposes because of the    minuscule fraction of cases where crypto will be the    make-or-break factor in a legitimate investigation.\"  <\/p>\n<p>    Security pros also had objections, taking issue with    intelligence officials' assertions that it would be    technologically feasible to provide government access to    encrypted data through a secure channel without compromising    users' security.  <\/p>\n<p>    \"Much greater harms to national security would result from the    government deliberately weakening encryption protocols (again)    as the FREAK vulnerability demonstrated this past week,\" said    Chris Finan, chief executive officer of Manifold Security. \"DC    policymakers shouldn't seek a middle-ground solution on this    issue, because it simply doesn't exist when it comes to    cryptography.  <\/p>\n<p>        Get Monitor cybersecurity news and analysis delivered        straight to your inbox.      <\/p>\n<p>    \"The only answer is to support the strongest possible    encryption protocols, while also enabling law enforcement    professionals with the resources needed to conduct classic    police work,\" Mr. Finan continued.\"The FBI director should realize    that the days of relying on backdoor technology shortcuts are    over. Encryption is as empowering a technology as gunpowder or    firearms, policymakers need to appreciate the irreversibility    of this paradigm shift and adapt. Quite simply, governments no    longer enjoy a monopoly on technologies like cryptographic    protocols or offensive cyberwarfare exploits. There are no tech    magic bullets to address these policy challenges.\"  <\/p>\n<p>    The Passcode Influencers Poll brings together a diverse group    of more than 80 security and privacy experts from across    government, the private sector, academia, and the privacy    community. To preserve the candor of their responses,    Influencers have the choice to keep their comments anonymous,    or voice their opinions on the record.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>See more here:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.csmonitor.com\/World\/Passcode\/Passcode-Influencers\/2015\/0311\/Influencers-Stronger-encryption-on-consumer-devices-won-t-hurt-national-security-video\/RK=0\/RS=6O8N9koS7VRrLKqvhk0Xj1SUCXs-\" title=\"Influencers: Stronger encryption on consumer devices won't hurt national security (+video)\">Influencers: Stronger encryption on consumer devices won't hurt national security (+video)<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Three-quarters of Passcode's Influencers disagree with FBI Director James Comey, insisting stronger encryption on consumer devices would not hinder law enforcement and intelligence agencies so much that it would harm national security. \"Its crucial that users demand the highest level of security to both protect our personal privacy and mitigate the potential harm that can result from theft of personal data. Unquestionably, encrypting the content of smartphones makes it more difficult to access that information; thats the point,\" said Nuala O'Connor, head of the Center for Democracy and Technology. <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[45],"tags":[],"class_list":["post-29642","post","type-post","status-publish","format-standard","hentry","category-encryption"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/29642"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=29642"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/29642\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=29642"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=29642"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=29642"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}