Eight Epic Failures of Regulating Cryptography (Cindy Cohn)
Oct. 21, 2010 (Deeplinks Blog / EFF) -- Oct. 21, 2010 (DeeplingAs noted in late September, the FBI is on a charm offensive, seeking to ease its ability to spy on Americans by expanding the reach of the Communications Assistance to Law Enforcement Act (CALEA). Among other things, the government appears to be seriously discussing a new requirement that all communications systems be easily wiretappable by mandating "back doors" into any encryption systems.
(Encryption allows users to have private conversations and secure transactions, among other uses, on technologies from cell phones to web browsing to email. Learn more about encryption from EFF's Surveillance Self-Defense guide.)
If this sounds familiar, it's because regulating encryption was a monstrous proposal officially declared dead in 2001 after threatening Americans' privacy, free speech rights, and innovation for nearly a decade. But like a zombie, it's now rising from the grave, bringing the same disastrous flaws with it.
For those who weren't following digital civil liberties issues in 1995, or for those who have forgotten, here's a refresher list of why forcing companies to break their own privacy and security measures by installing a back door was a bad idea 15 years ago. We'll be posting more analysis when more details on the "new" proposal emerge, but this list is a start:
It will create security risks. Don't take our word for it. Computer security expert Steven Bellovin has explained some of the problems. First, it's hard to secure communications properly even between two parties. Cryptography with a back door adds a third party, requiring a more complex protocol, and as Bellovin puts it: "Many previous attempts to add such features have resulted in new, easily exploited security flaws rather than better law enforcement access."
It doesn't end there. Bellovin notes:
Complexity in the protocols isn't the only problem; protocols require computer programs to implement them, and more complex code generally creates more exploitable bugs. In the most notorious incident of this type, a cell phone switch in Greece was hacked by an unknown party. The so-called 'lawful intercept' mechanisms in the switch — that is, the features designed to permit the police to wiretap calls easily — was abused by the attacker to monitor at least a hundred cell phones, up to and including the prime minister's. This attack would not have been possible if the vendor hadn't written the lawful intercept code.
More recently, as security researcher Susan Landau explains, "an IBM researcher found that a Cisco wiretapping architecture designed to accommodate law-enforcement requirements — a system already in use by major carriers — had numerous security holes in its design. This would have made it easy to break into the communications network and surreptitiously wiretap private communications."
The same is true for Google, which had its "compliance" technologies hacked by China.
This isn't just a problem for you and me and millions of companies that need secure communications. What will the government itself use for secure communications? The FBI and other government agencies currently use many commercial products — the same ones they want to force to have a back door. How will the FBI stop people from un-backdooring their deployments? Or does the government plan to stop using commercial communications technologies altogether?
It won't stop the bad guys. Users who want strong encryption will be able to get it — from Germany, Finland, Israel, and many other places in the world where it's offered for sale and for free. In 1996, the National Research Council did a study called "Cryptography's Role in Securing the Information Society," nicknamed CRISIS. Here's what they said:
Products using unescrowed encryption are in use today by millions of users, and such products are available from many difficult-to-censor Internet sites abroad. Users could pre-encrypt their data, using whatever means were available, before their data were accepted by an escrowed encryption device or system. Users could store their data on remote computers, accessible through the click of a mouse but otherwise unknown to anyone but the data owner, such practices could occur quite legally even with a ban on the use of unescrowed encryption. Knowledge of strong encryption techniques is available from official U.S. government publications and other sources worldwide, and experts understanding how to use such knowledge might well be in high demand from criminal elements. — CRISIS Report at 303
None of that has changed. And of course, more encryption technology is more readily available today than it was in 1996.
It will harm innovation. In order to ensure that no "untappable" technology exists, we'll likely see a technology mandate and a draconian regulatory framework. The implications of this for America's leadership in innovation are dire. Could Mark Zuckerberg have built Facebook in his dorm room if he'd had to build in surveillance capabilities before launch in order to avoid government fines? Would Skype have ever happened if it had been forced to include an artificial bottleneck to allow government easy access to all of your peer-to-peer communications?
This has especially serious implications for the open source community and small innovators. Some open source developers have already taken a standagainst building back doors into software.
It will harm US business. If, thanks to this proposal, US businesses cannot innovate and cannot offer truly secure products, we're just handing business over to foreign companies who don't have such limitations. Nokia, Siemens, and Ericsson would all be happy to take a heaping share of the communications technology business from US companies. And it's not just telecom carriers and VOIP providers at risk. Many game consoles that people can use to play over the Internet, such as the Xbox, allow gamers to chat with each other while they play. They'd have to be tappable, too.
It will cost consumers. Any additional mandates on service providers will require them to spend millions of dollars making their technologies compliant with the new rules. And there's no real question about who will foot the bill: the providers will pass those costs onto their customers. (And of course, if the government were to pay for it, they would be using taxpayer dollars.)
It will be unconstitutional.. Of course, we wouldn't be EFF if we didn't point out the myriad constitutional problems. The details of how a cryptography regulation or mandate will be unconstitutional may vary, but there are serious problems with nearly every iteration of a "no encryption allowed" proposal that we've seen so far. Some likely problems:
The First Amendment would likely be violated by a ban on all fully encrypted speech.
The First Amendment would likely not allow a ban of any software that can allow untappable secrecy. Software is speech, after all, and this is one of the key ways we defeated this bad idea last time.
The Fourth Amendment would not allow requiring disclosure of a key to the backdoor into our houses so the government can read our "papers" in advance of a showing of probable cause, and our digital communications shouldn't be treated any differently.
The Fifth Amendment would be implicated by required disclosure of a private papers and the forced utterance of incriminating testimony.
Right to privacy. Both the right to be left alone and informational privacy rights would be implicated.
It will be a huge outlay of tax dollars. As noted below, wiretapping is still a relatively rare tool of government. Yet the tax dollars needed to create a huge regulatory infrastructure staffed with government bureaucrats who can enforce the mandates will be very high. So, the taxpayers would end up paying for more expensive technology, higher taxes, and lost privacy, all for the relatively rare chance that motivated criminals will act "in the clear" by not using encryption readily available from a German or Israeli company or for free online.
The government hasn't shown that encryption is a problem. How many investigations have been thwarted or significantly harmed by encryption that could not be broken? In 2009, the government reported only one instance of encryption that they needed to break out of 2,376 court-approved wiretaps, and it ultimatelydidn't prevent investigators from obtaining the communications they were after.
The New York Times reports that the government officials pushing for this have only come up with a few examples (and it's not clear that all of the examples actually involve encryption) and no real facts that would allow independent investigation or confirmation. More examples will undoubtedly surface in the FBI's PR campaign, but we'll be watching closely to see if underneath all the scary hype there's actually a real problem demanding this expensive, intrusive solution.
The real issue with encryption may simply be that the FBI has to use more resources when they encounter it than when they don't. Indeed, Bellovin argues: "Time has also shown that the government has almost always managed to go around encryption." (One circumvention that's worked before: keyloggers.) But if the FBI's burden is the real issue here, then the words of the CRISIS Report are even truer today than they were in 1996:
It is true that the spread of encryption technologies will add to the burden of those in government who are charged with carrying out certain law enforcement and intelligence activities. But the many benefits to society of widespread commercial and private use of cryptography outweigh the disadvantages.
Cindy Cohn is the Legal Director for the Electronic Frontier Foundation as well as its General Counsel.
- CreatedTuesday, October 26, 2010
- Last modifiedWednesday, November 06, 2013
World Desk Activities
www.niemanlab.org/2024/04/inside-newsweek-ai-exper…
www.journalismfestival.com/programme/2024/reader-r…
Reader revenue beyond the English language – – International Journalism Festival
In the past few months, many news publishers in the US have announced layoffs. Others have tweaked or abandoned their paywalls and pursued more open models.…
phys.org/news/2024-04-surf-clams-coast-virginia-re…
Surf clams off the coast of Virginia reappear and rebound
The Atlantic surf clam, an economically valuable species that is the main ingredient in clam chowder and fried clam strips, has returned to Virginia waters…
medicalxpress.com/news/2024-04-antibiotics-reveal-…
Antibiotics reveal a new way to fight cancer
Cancer cells grow and spread by hiding from the body's immune system. Immunotherapy allows the immune system to find and attack hidden cancer cells, helping…
phys.org/news/2024-04-crucial-quantum-internet.htm…
Crucial connection for 'quantum internet' made for the first time
Researchers have produced, stored, and retrieved quantum information for the first time, a critical step in quantum networking.
medicalxpress.com/news/2024-04-women-major-complic…
Women who experience major complications during pregnancy found to have increased risk of early death years later
A team of medical researchers from the University of Texas Health Science Center, in the U.S., and Lund University, in Sweden, has found via study…
medicalxpress.com/news/2024-04-common-hiv-treatmen…
Common HIV treatments may aid Alzheimer's disease patients
Alzheimer's disease (AD) currently afflicts nearly seven million people in the U.S. With this number expected to grow to nearly 13 million by 2050, the…
medicalxpress.com/news/2024-04-adolescent-stress-p…
Study suggests adolescent stress may raise risk of postpartum depression in adults
In a new study, a Johns Hopkins Medicine-led research team reports that social stress during adolescence in female mice later results in prolonged elevation of…
Latest Stories
Electronic Frontier Foundation
- Speaking Freely: Obioma Okonkwo April 23, 2024
- Screen Printing 101: EFF's Spring Speakeasy at Babylon Burning April 23, 2024
- Podcast Episode: Right to Repair Catches the Car April 23, 2024
- U.S. Senate and Biden Administration Shamefully Renew and Expand FISA Section 702, Ushering in a Two Year Expansion of Unconstitutional Mass Surveillance April 22, 2024
The Intercept
VTDigger
- Mike Pieciak announces reelection bid for Vermont state treasurer April 25, 2024
- Senate’s version of budget would reduce motel program room capacity by a third April 25, 2024
- Bennington lawmaker pleads not guilty to DUI charge April 25, 2024
- Vermont Senate passes $8.6 billion state budget, teeing up negotiations with the House April 25, 2024
Mountain Times -- Central Vermont
- Mountain Times -Volume 52, Number 17, April 24-20, 2024 April 24, 2024
- Weekly Horoscope — April 24-30, 2024 April 24, 2024
- Loon vs. Canada goose: A battle for Goose Poop Island April 24, 2024
- A break in the action April 24, 2024