{"id":29664,"date":"2015-03-12T00:50:55","date_gmt":"2015-03-12T04:50:55","guid":{"rendered":"http:\/\/www.opensource.im\/uncategorized\/opinion-how-to-defuse-a-simmering-crypto-war.php"},"modified":"2015-03-12T00:50:55","modified_gmt":"2015-03-12T04:50:55","slug":"opinion-how-to-defuse-a-simmering-crypto-war","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/cryptography\/opinion-how-to-defuse-a-simmering-crypto-war.php","title":{"rendered":"Opinion: How to defuse a simmering crypto war"},"content":{"rendered":"<p><p>    Watch a debate on balancing national security with    privacy featuring White House Cybersecurity    Coordinator Michael Daniel, Lance Hoffman, and others live on    CSMonitor.com starting at 9 a.m. Thursday, March 12. If you are    in Washington, you can register for the event here.  <\/p>\n<p>    What is a nation's optimum cryptography policy? In 1993, the    US government proposed it be allowed back-door    access to communications via an encryption chip  the Clipper    chip  built into computer systems. Under suitable conditions,    the government would be able to decrypt any communication and    thus thwart criminal activity. Thatproposal did not sit    well with privacy advocates, civil libertarians, and others who    saw it as overreach on the governments part and a serious    infringement on civil liberties.  <\/p>\n<p>    After the Edward Snowden leaks and subsequent efforts by    Google, Apple, and others to build strong encryption    that makes it almost impossible for governments to break into    their products, the federal government has reopened the    crytography discussion.  <\/p>\n<p>    Many of the same issues that arose in the Clipper chip debate    are being raised now  and many of the same solutions are being    proposed, this time by the Obama    administration. The tensions between national security, law    enforcement, and civil liberties are now more obvious in a    post-9\/11 world, but the basic question is not new. Controlling    the actions of people in positions of power was discussed by    Plato in \"The    Republic.\"  <\/p>\n<p>    A system with a back door built in is also a system with a    built-in vulnerability, exploitable by friends as well as foes.    Sometimes even systems thought to be secure have bugs that    arent discovered or fixed for years, such as the recently    discovered FREAK exploit. Introduced in the 1990s for    compliance with US cryptography export regulations, it affected    several popular web browsers.  <\/p>\n<p>    Governments should examine the political, economic, and social    costs of effectively mandating insecure operating systems,    hardware, and standards. Witness governments such as Germany demanding more    secure systems built in their own countries (with personal    data kept there also). Apple and Google and other companies    hear this. They know that trust, once lost, is hard to rebuild.  <\/p>\n<p>    Technological responses by themselves are not solutions. But    they can provide part of the solution to the puzzle, just as    encryption already does in verifying nuclear test-ban treaty    compliance. For example, technological methods exist that    require a majority of \"trusted\" parties to agree before a key    is made available. These trusted parties could include the    phone manufacturer, the police, a civil liberties organization,    a news organization, and others. Just how many parties should    be involved and who they should be are difficult questions that    require many viewpoints  global viewpoints  to be    considered.  <\/p>\n<p>    And here is where much more dialogue among technologists,    lawyers, and policymakers should be encouraged.    Cross-disciplinary thought is woefully underfunded; thats one    reason for the current chaotic state of affairs. Research by    independent parties on the economic, political, and social    costs and benefits of surveillance mechanisms, not only on the    mechanisms themselves, should provide a starting point and will    help realize the Internets potential for building bridges, as    opposed to barriers, between cultures.  <\/p>\n<p>    Lance J. Hoffman is director of the Cyber Security Policy    and Research Institute at The GeorgeWashington University in    Washington. Follow him on Twitter@LanceHoffman1.  <\/p>\n<p>        Get Monitor cybersecurity news and analysis delivered        straight to your inbox.      <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Visit link:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.csmonitor.com\/World\/Passcode\/Passcode-Voices\/2015\/0311\/Opinion-How-to-defuse-a-simmering-crypto-war\/RK=0\/RS=fopnO6n6KYeOeYb9XiU0KWwVawE-\" title=\"Opinion: How to defuse a simmering crypto war\">Opinion: How to defuse a simmering crypto war<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Watch a debate on balancing national security with privacy featuring White House Cybersecurity Coordinator Michael Daniel, Lance Hoffman, and others live on CSMonitor.com starting at 9 a.m. Thursday, March 12. If you are in Washington, you can register for the event here<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1600],"tags":[],"class_list":["post-29664","post","type-post","status-publish","format-standard","hentry","category-cryptography"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/29664"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=29664"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/29664\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=29664"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=29664"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=29664"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}