As the world grapples with the rise of transferable digital assets from central-bank digital currencies (CBDCs) to stablecoins an oft-repeated concept is that national security and law enforcement will be in conflict with individual privacy.
This belief is based on the idea that we have only two choices: either reveal individual identities so that governments can track and trace potentially illicit digital transactions, or preserve individual privacy and severely jeopardize law enforcement interests. This binary concept is on track to inform policy, regulation and product development that could permanently impact the evolution of digital assets, computing systems, and finance.
It is a false choice, and one we should not accept.
The stakes are admittedly high when it comes both to law enforcement and individual privacy. We cannot and should not accept a future digital landscape where terrorists and criminals abuse the system. Nor can we accept a world where individuals sacrifice their right to privacy by exposing, en masse, economic and personal details to commercial or governmental actors.
Todays system of applying anti-money-laundering (AML) and know-your-customer (KYC) requirements is predicated on individuals turning over sensitive personally identifiable information (PII), which is susceptible to hackers and potential invasions of privacy by public and private sector entities. This cache of information, which includes full names, addresses, birthdates, Social Security numbers, business partners and more, is repeatedly disclosed to different institutions making each of them a holder of exceptionally sensitive data that cannot be put back in the bottle once exposed.
Fortunately, recent years has brought a range of privacy-enhancing techniques (PETs) that may create an ideal arrangement. At their core, these techniques are focused on being able to confirm certain critical information about an individual engaging in a transaction (for example, that the individual isnt on a terrorist watchlist), without revealing PII about that individual. Promising areas include zero-knowledge proofs, homomorphic encryption and multi-party computation, which generally enable parties to prove that an encrypted proposition is true without revealing the underlying information.
For example, cryptographic techniques can prove that someone is over 21 years old, rather than showing a drivers license that reveals personal information such as a home address. A zero-knowledge proof can keep such information encrypted, but perform a computation to verify that the encrypted birthdate is on or before the threshold date 21 years prior.
Likewise, cryptography can allow portable credentials that prove, rather than disclose, key elements, such as what trusted entity has conducted customer due diligence, what elements of information were checked, including sanctions lists, and more. This approach can drive expanded opportunities for people to access financial services through digital wallets faster and more broadly, including for economic impact payments and other emergency services. It will also safeguard and secure underlying personal information, which will no longer be as vulnerable to exposure from hacks. PII would only be revealed upon other risk factors justifying it, subject to legal protections.
The privacy technology frontier has meaningful implications for U.S. policy.
First, and most importantly, it is critical that policymakers develop policy based on where technology is headed rather than where it has been. When automobiles first emerged in England, an old law dubbed the Red Flag Act required self-propelled vehicles (previously, only steam-powered locomotives) to be led at walking pace by someone waving a red flag. The New York Times aptly pointed out in 1895 that it served to destroy the usefulness of a horseless carriage.
We should similarly not build rules imposing traditional identity disclosure requirements akin to a mechanic walking alongside a vehicle with a red flag just because we believe it is the only way to satisfy key objectives. Programs including FinCENs PET-dedicated Innovation Hours Program that focus on the important role of privacy-preserving principles in developing technical solutions is an example of forward-leaning approaches that need to be replicated across government to ensure we have rules that incorporate technological advances.
Just as traffic laws, signals, and road signs were a better alternative to people carrying around red flags, privacy-protecting zero-knowledge proofs are a better alternative to people broadly sharing their PII.
Safely ensuring privacy for the digital economy will be a core global competitive advantage.
Second, the U.S. should be pursuing massive investment into public-private research efforts aimed at developing the worlds most advanced privacy-enhancing tools. Safely ensuring privacy for the digital economy will be a core global competitive advantage. It can attract global consumers to adopt American platforms and solutions as they aim to preserve their privacy in the face of increasing surveillance and exploitation efforts, including major nation-state cyber attacks and pervasive global attacks on journalists.
Such collaborative efforts would also embed American norms and values into our digital infrastructure in stark contrast to global competitors. The U.S. decided long ago that although encryption (and the Fourth Amendment) makes it more difficult for the government to monitor activity, that security provides critical protection from anti-democratic authoritarians and attackers. Breaches are significantly less severe if the system comprehensively encrypts (or declines to collect) data from the beginning. Advances in PETs allows for that protection while securely and privately verifying and computing, rather than exposing, data. The choice is not binary.
Some progress is being made. The White Houseissued a comprehensiveExecutive Orderon broader digital asset policy a few monthsago, and agencies are currently putting out requests for more information. For example, the U.S.Treasury Department recently issued a request for comment. There are also a number ofCBDC-related billsthat focus on privacy.
When applied to digital-asset innovations, including development of a digital U.S. dollar, PETs will solve one of the larger perceived policy barriers: having to make a binary choice between privacy and security, when in fact, privacy is a necessary part of security and our democracy. The boundless energy of American ingenuity has been unlocked when people feel secure from exploitation. Advances in cryptography can help ensure personal and democratic resilience with more mathematical certainty and dynamic opportunity than the politically-contingent, binary (and false) trade-offs that are being presented.
Daniel Gorfine is former chief innovation officer of the U.S. Commodity Futures Trading Commission, co-founder of the non-profit Digital Dollar Project, and founder of Gattaca Horizons LLC.
Michael Mosier is former acting director of the U.S. Treasurys Financial Crimes Enforcement Network (FinCEN), former deputy chief of the U.S. Department of Justices Money Laundering & Asset Recovery Section, and is currently general counsel at Espresso Systems.
More: The long-awaited U.S. data-privacy bill appears to be on track, again
Also read: Ro Khanna: Tech-funding bill is not just about jobs its about a new patriotism
Read this article:
Stablecoin and other digital assets are falsely framed as a choice between personal privacy and national security. We can have both. - MarketWatch
- Protections for e-data clear Senate committee [Last Updated On: April 26th, 2014] [Originally Added On: April 26th, 2014]
- Quinn: Supreme Court should clarify Fourth Amendment rights in the digital age [Last Updated On: April 26th, 2014] [Originally Added On: April 26th, 2014]
- Fourth amendment | Wex Legal Dictionary / Encyclopedia ... [Last Updated On: April 26th, 2014] [Originally Added On: April 26th, 2014]
- Fourth Amendment to the United States Constitution ... [Last Updated On: April 26th, 2014] [Originally Added On: April 26th, 2014]
- The Fourth Amendment is destroyed by the Roberts led Supreme Court. - Video [Last Updated On: April 26th, 2014] [Originally Added On: April 26th, 2014]
- Court may let cops search smartphones [Last Updated On: April 28th, 2014] [Originally Added On: April 28th, 2014]
- Supreme Court to hear case on police searches of cellphones [Last Updated On: April 28th, 2014] [Originally Added On: April 28th, 2014]
- Fourth Amendment in the digital age: Supreme Court to decide if police can search cellphones without a warrant [Last Updated On: April 30th, 2014] [Originally Added On: April 30th, 2014]
- What Scalia knows about illegal searches [Last Updated On: April 30th, 2014] [Originally Added On: April 30th, 2014]
- Should police be allowed to search your smartphone - Video [Last Updated On: April 30th, 2014] [Originally Added On: April 30th, 2014]
- Fourth Amendment to the United States Constitution - Video [Last Updated On: May 1st, 2014] [Originally Added On: May 1st, 2014]
- Rand Paul Third Party Records Should Get Fourth Amendment Protection O'Reilly Factor 6 11 2013 - Video [Last Updated On: May 1st, 2014] [Originally Added On: May 1st, 2014]
- The Shaky Legal Foundation of NSA Surveillance on Americans [Last Updated On: May 2nd, 2014] [Originally Added On: May 2nd, 2014]
- Pennsylvania Supreme Court rules police don't need warrants to search cars [Last Updated On: May 3rd, 2014] [Originally Added On: May 3rd, 2014]
- Local police: Updated vehicle-search law still requires probable cause [Last Updated On: May 3rd, 2014] [Originally Added On: May 3rd, 2014]
- Liberal Supreme Court Justice Comes To The Defense Of Scalia [Last Updated On: May 3rd, 2014] [Originally Added On: May 3rd, 2014]
- Gerald Celente - Trends In The News - America's Spiritual Death - (1/20/14) - Video [Last Updated On: May 4th, 2014] [Originally Added On: May 4th, 2014]
- Smartphones and the Fourth Amendment - Video [Last Updated On: May 4th, 2014] [Originally Added On: May 4th, 2014]
- Fourth Amendment Searches And Seizures - Video [Last Updated On: May 5th, 2014] [Originally Added On: May 5th, 2014]
- Fourth Amendment Defined & Explained - Law [Last Updated On: May 6th, 2014] [Originally Added On: May 6th, 2014]
- Enforcement Techniques For Violations Of The Fourth Amendment - Video [Last Updated On: May 6th, 2014] [Originally Added On: May 6th, 2014]
- I-Team: Do police seek search warrant friendly judges? [Last Updated On: May 7th, 2014] [Originally Added On: May 7th, 2014]
- Is Big Brother Listening? Applying the Fourth Amendment in an Electronic Age - Video [Last Updated On: May 9th, 2014] [Originally Added On: May 9th, 2014]
- It Costs Less to Care [Last Updated On: May 10th, 2014] [Originally Added On: May 10th, 2014]
- The Fourth Amendment - Video [Last Updated On: May 10th, 2014] [Originally Added On: May 10th, 2014]
- Magistrate waxes poetic while rejecting Gmail search request [Last Updated On: May 11th, 2014] [Originally Added On: May 11th, 2014]
- License reader lawsuit can be heard, appeals court rules [Last Updated On: May 15th, 2014] [Originally Added On: May 15th, 2014]
- Seize the Rojo - Video [Last Updated On: May 16th, 2014] [Originally Added On: May 16th, 2014]
- NSA Spying Has a Disproportionate Effect on Immigrants [Last Updated On: May 17th, 2014] [Originally Added On: May 17th, 2014]
- Motorists sue Aurora, police in 2012 traffic stop after bank robbery [Last Updated On: May 17th, 2014] [Originally Added On: May 17th, 2014]
- Judge Says NSA Phone Surveillance Likely Unconstitutional - Video [Last Updated On: May 21st, 2014] [Originally Added On: May 21st, 2014]
- New York Attorney Heath D. Harte Releases a Statement on Fourth Amendment Rights [Last Updated On: May 22nd, 2014] [Originally Added On: May 22nd, 2014]
- Bangor Area School District teachers vote no to random drug [Last Updated On: May 24th, 2014] [Originally Added On: May 24th, 2014]
- The Fourth Amendment Rights - Video [Last Updated On: May 24th, 2014] [Originally Added On: May 24th, 2014]
- I Don't Care About The Contitution, Take Your Fourth Amendment And Shove It The Hills Hotel - Video [Last Updated On: May 27th, 2014] [Originally Added On: May 27th, 2014]
- Lonestar1776 at Illegal Checkpoint 80 Miles Inside Border - Standing UP & Pushing Back! pt 2/2 - Video [Last Updated On: September 1st, 2014] [Originally Added On: September 1st, 2014]
- Suit charges Daytona Beach's rental inspection program violates civil rights [Last Updated On: September 2nd, 2014] [Originally Added On: September 2nd, 2014]
- 4th Amendment - Laws.com [Last Updated On: September 6th, 2014] [Originally Added On: September 6th, 2014]
- YOU CAN ARREST ME NOW (cops refuse) - Video [Last Updated On: September 6th, 2014] [Originally Added On: September 6th, 2014]
- The Feds Explain How They Seized The Silk Road Servers [Last Updated On: September 8th, 2014] [Originally Added On: September 8th, 2014]
- Defence asks judge in NYC to toss out bulk of evidence in Silk Road case as illegally obtained [Last Updated On: September 9th, 2014] [Originally Added On: September 9th, 2014]
- Volokh Conspiracy: Does obtaining leaked data from a misconfigured website violate the CFAA? [Last Updated On: September 9th, 2014] [Originally Added On: September 9th, 2014]
- Family of a mentally ill woman files lawsuit against San Mateo Co. after deadly shooting [Last Updated On: September 10th, 2014] [Originally Added On: September 10th, 2014]
- Minnesota Supreme Court upholds airport drug case decision [Last Updated On: September 12th, 2014] [Originally Added On: September 12th, 2014]
- Law Talk - Obamacare Rollout; Fourth Amendment, NSA Spying Stop & Frisk DUI Check Points lta041 - Video [Last Updated On: September 12th, 2014] [Originally Added On: September 12th, 2014]
- Volokh Conspiracy: The posse comitatus case and changing views of the exclusionary rule [Last Updated On: September 15th, 2014] [Originally Added On: September 15th, 2014]
- Guest: Why the privacy of a public employees cellphone matters [Last Updated On: September 16th, 2014] [Originally Added On: September 16th, 2014]
- Volokh Conspiracy: Apples dangerous game [Last Updated On: September 19th, 2014] [Originally Added On: September 19th, 2014]
- Judge expounds on privacy rights [Last Updated On: September 20th, 2014] [Originally Added On: September 20th, 2014]
- Great privacy essay: Fourth Amendment Doctrine in the Era of Total Surveillance [Last Updated On: September 20th, 2014] [Originally Added On: September 20th, 2014]
- The Fourth Amendment By Maison Erdman - Video [Last Updated On: September 20th, 2014] [Originally Added On: September 20th, 2014]
- Volokh Conspiracy: When administrative inspections of businesses turn into massive armed police raids [Last Updated On: September 22nd, 2014] [Originally Added On: September 22nd, 2014]
- The chilling loophole that lets police stop, question and search you for no good reason [Last Updated On: September 23rd, 2014] [Originally Added On: September 23rd, 2014]
- E.O. 12333: End-Running the Fourth Amendment | The Dissenter [Last Updated On: September 25th, 2014] [Originally Added On: September 25th, 2014]
- Fourth Amendment: The History Behind "Unreasonable ... [Last Updated On: September 25th, 2014] [Originally Added On: September 25th, 2014]
- Pet Owners Look to Muzzle Police Who Shoot Dogs [Last Updated On: September 27th, 2014] [Originally Added On: September 27th, 2014]
- Volokh Conspiracy: A few thoughts on Heien v. North Carolina [Last Updated On: September 29th, 2014] [Originally Added On: September 29th, 2014]
- Volokh Conspiracy: Third Circuit on the mosaic theory and Smith v. Maryland [Last Updated On: October 1st, 2014] [Originally Added On: October 1st, 2014]
- Volokh Conspiracy: Third Circuit gives narrow reading to exclusionary rule [Last Updated On: October 2nd, 2014] [Originally Added On: October 2nd, 2014]
- Volokh Conspiracy: Supreme Court takes case on duration of traffic stops [Last Updated On: October 2nd, 2014] [Originally Added On: October 2nd, 2014]
- Search & Seizure, Racial Bias: The American Law Journal on the Philadelphia CNN-News Affiliate WFMZ Monday, October 6 ... [Last Updated On: October 4th, 2014] [Originally Added On: October 4th, 2014]
- Argument preview: How many brake lights need to be working on your car? [Last Updated On: October 4th, 2014] [Originally Added On: October 4th, 2014]
- The 'Barney Fife Loophole' to the Fourth Amendment [Last Updated On: October 4th, 2014] [Originally Added On: October 4th, 2014]
- Search & Seizure: A New Fourth Amendment for a New Generation? - Promo - Video [Last Updated On: October 4th, 2014] [Originally Added On: October 4th, 2014]
- Lubbock Liberty Workshop With Arnold Loewy On The Fourth Amendment - Video [Last Updated On: October 5th, 2014] [Originally Added On: October 5th, 2014]
- Ap Government Fourth Amendment Project - Video [Last Updated On: October 5th, 2014] [Originally Added On: October 5th, 2014]
- Volokh Conspiracy: Oral argument in Heien v. North Carolina [Last Updated On: October 6th, 2014] [Originally Added On: October 6th, 2014]
- Feds Hacked Silk Road Without a Warrant? Perfectly Legal, Prosecutors Argue [Last Updated On: October 7th, 2014] [Originally Added On: October 7th, 2014]
- Supreme Court Starts Term with Fourth Amendment Case [Last Updated On: October 7th, 2014] [Originally Added On: October 7th, 2014]
- Feds Say That Even If FBI Hacked The Silk Road, Ulbricht's Rights Weren't Violated [Last Updated On: October 8th, 2014] [Originally Added On: October 8th, 2014]
- Argument analysis: A simple answer to a deceptively simple Fourth Amendment question? [Last Updated On: October 8th, 2014] [Originally Added On: October 8th, 2014]
- Mass Collection of U.S. Phone Records Violates the Fourth Amendment - Video [Last Updated On: October 8th, 2014] [Originally Added On: October 8th, 2014]
- Leggett sides with civil liberties supporters [Last Updated On: October 10th, 2014] [Originally Added On: October 10th, 2014]
- Search & Seizure / Car Stops: A 'New' Fourth Amendment for a New Generation? - Video [Last Updated On: October 10th, 2014] [Originally Added On: October 10th, 2014]
- Broken Lights And The Fourth Amendment National Constitution Center - Video [Last Updated On: October 10th, 2014] [Originally Added On: October 10th, 2014]
- The Fourth Amendment- The Maininator Period 4 - Video [Last Updated On: October 10th, 2014] [Originally Added On: October 10th, 2014]
- Judge nukes Ulbricht's complaint about WARRANTLESS FBI Silk Road server raid [Last Updated On: October 11th, 2014] [Originally Added On: October 11th, 2014]
- Montgomery County will not hold immigrants without probable cause -- Gazette.Net [Last Updated On: October 13th, 2014] [Originally Added On: October 13th, 2014]
- Debate: Does Mass Phone Data Collection Violate The 4th Amendment? [Last Updated On: October 15th, 2014] [Originally Added On: October 15th, 2014]
- Does the mass collection of phone records violate the Fourth Amendment? [Last Updated On: October 18th, 2014] [Originally Added On: October 18th, 2014]