{"id":30340,"date":"2015-04-11T12:41:14","date_gmt":"2015-04-11T16:41:14","guid":{"rendered":"http:\/\/www.opensource.im\/uncategorized\/as-encryption-spreads-u-s-grapples-with-clash-between-privacy-security.php"},"modified":"2015-04-11T12:41:14","modified_gmt":"2015-04-11T16:41:14","slug":"as-encryption-spreads-u-s-grapples-with-clash-between-privacy-security","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/encryption\/as-encryption-spreads-u-s-grapples-with-clash-between-privacy-security.php","title":{"rendered":"As encryption spreads, U.S. grapples with clash between privacy, security"},"content":{"rendered":"<p><p>    For months, federal law enforcement agencies and industry have    been deadlocked on a highly contentious issue: Should tech    companies be obliged to guarantee government access to    encrypted data on smartphones and other digital devices, and is    that even possible without compromising the security of    law-abiding customers?  <\/p>\n<p>    Recently, the head of the National Security Agency provided a    rare hint of what some U.S. officials think might be a    technical solution. Why not, suggested Adm. Michael S. Rogers,    require technology companies to create a digital key that could    open any smartphone or other locked device to obtain text    messages or photos, but divide the key into pieces so that no    one person or agency alone could decide to use it?  <\/p>\n<p>    I dont want a back door, Rogers, the director of the    nations top electronic spy agency, said during a speech at    Princeton University, using a tech industry term for covert    measures to bypass device security. I want a front door. And I    want the front door to have multiple locks. Big locks.  <\/p>\n<p>    Law enforcement and intelligence officials have been warning    that the growing use of encryption could seriously hinder    criminal and national security investigations. But the White    House, which is preparing a report for President Obama on the    issue, is still weighing a range of options, including whether    authorities have other ways to get the data they need rather    than compelling companies through regulatory or legislative    action.  <\/p>\n<p>    The task is not easy. Those taking part in the debate have    polarized views, with advocates of default commercial    encryption finding little common ground with government    officials who see increasing peril as the technology becomes    widespread on mobile phones and on text messaging apps.  <\/p>\n<p>    Apple catalyzed the public debate in September     when it announced that one of the worlds most popular    smartphones would come equipped with a unique digital key that    can be used only by its owner. Even if presented with a    warrant, Apple could no longer unlock an iPhone that runs its    latest operating system.  <\/p>\n<p>    Hailed as a victory for consumer privacy and security, the    development dismayed law enforcement officials, who said it    threatens what they describe as a centuries-old social compact    in which the government, with a warrant based on probable    cause, may seize evidence relevant to criminal investigations.  <\/p>\n<p>    What were concerned about is the technology risks bringing    the country to a point where the smartphone owner alone, who    may be a criminal or terrorist, has control of the data, Deputy    Assistant Attorney General David Bitkower said     at a recent panel on encryption hosted by the nonprofit    Congressional Internet Caucus Advisory Committee. That, he    said, has not been the standard American principle for the    last couple of hundred years.  <\/p>\n<p>    Tech industry officials and privacy advocates take a different    view. I dont believe that law enforcement has an absolute    right to gain access to every way in which two people may    choose to communicate, said Marc Zwillinger, an attorney    working for tech companies on encryption-related matters and a    former Justice Department official. And I dont think our    Founding Fathers would think so, either. The fact that the    Constitution offers a process for obtaining a search warrant    where there is probable cause is not support for the notion    that it should be illegal to make an unbreakable lock. These    are two distinct concepts.  <\/p>\n<p>    The increasing use of encrypted storage extends well beyond the    iPhone or the similar option that Google offers  though not by    default  on     new versions of its Android operating system. Windows and    Apple offer simple settings to encrypt the contents of personal    computers, and several cloud storage companies encrypt the data    they host with keys known only to their customers.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Follow this link:<br \/>\n<a target=\"_blank\" href=\"http:\/\/feeds.washingtonpost.com\/c\/34656\/f\/636635\/s\/454ad41b\/sc\/28\/l\/0L0Swashingtonpost0N0Cworld0Cnational0Esecurity0Cas0Eencryption0Espreads0Eus0Eworries0Eabout0Eaccess0Eto0Edata0Efor0Einvestigations0C20A150C0A40C10A0C7c1c75180Ed40A10E11e40Ea62f0Eee745911a4ff0Istory0Bhtml0Dwprss0Frss0Inational\/story01.htm\/RK=0\/RS=XX.uvec4QE5x9Q8eax80AynGHB4-\" title=\"As encryption spreads, U.S. grapples with clash between privacy, security\">As encryption spreads, U.S. grapples with clash between privacy, security<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> For months, federal law enforcement agencies and industry have been deadlocked on a highly contentious issue: Should tech companies be obliged to guarantee government access to encrypted data on smartphones and other digital devices, and is that even possible without compromising the security of law-abiding customers? Recently, the head of the National Security Agency provided a rare hint of what some U.S. officials think might be a technical solution<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[45],"tags":[],"class_list":["post-30340","post","type-post","status-publish","format-standard","hentry","category-encryption"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/30340"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=30340"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/30340\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=30340"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=30340"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=30340"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}