Read

User menu

Search form

Computer Experts: U.S. and U.K. Demands for Encrypted Data Access "Unprincipled and Unworkable"

Computer Experts: U.S. and U.K. Demands for Encrypted Data Access "Unprincipled and Unworkable"
Wed, 7/8/2015 - by Ewen MacAskill
This article originally appeared on The Guardian

Demands by U.S. and British security agencies for access to encrypted communication data have been dealt a serious blow in a report by an influential group of cryptographers and computer scientists who dismiss the move as unprincipled and unworkable.

They warn that such access “will open doors through which criminals and malicious nation states can attack the very individuals law enforcement seeks to defend.”

The report says: “The costs would be substantial, the damage to innovation severe and the consequences for economic growth hard to predict. The costs to our moral authority would also be considerable.”

The expert opinion comes on the eve of an appearance before the US Senate intelligence committee by the FBI director, James Comey, who last year savaged tech companies for embracing end-to-end encryption, claiming it would deprive the security services of potentially life-saving information.

David Cameron and the home secretary, Theresa May, are proposing to introduce legislation in the autumn to force companies such as Apple, Google and Microsoft to provide access to encrypted data. The proposed legislation has been requested by the intelligence agencies, which say encryption has made their job much more difficult.

The 26-page report, Keys Under Doormats, is written by largely the same group of cryptographers and computer scientists who two decades ago challenged a similar move by the intelligence agencies in both the U.S. and U.K. Their contribution helped force the Clinton administration to back down.

The authors of the new report set out various technical and practical obstacles facing the U.S. and U.K. governments’ attempts to secure access.

“Political and law enforcement leaders in the United States and the United Kingdom have called for internet systems to be redesigned to assure government access to information – even encrypted information. They argue that the growing use of encryption will neutralize their investigative capabilities. They propose that data storage and communications systems must be designed for exceptional access by law enforcement agencies.

“These proposals are unworkable in practice, raise enormous legal and ethical questions, and would undo progress on security at a time when internet vulnerabilities are causing extreme economic harm.”

Among problems they identify is the ability of the U.S. government and its law enforcement agencies to protect the security credentials that would unlock data. “If law enforcement has guaranteed access to everything, an attacker who gains access to these keys would enjoy the same privilege,” the report says.

Turning to the U.K., the authors focus on the government’s promised legislation to compel communication service providers, including US-based corporations, to grant access to U.K. law enforcement agencies, with other countries certain to follow suit.

“China has already intimated that it may require exceptional access. If a British-based developer deploys a messaging application used by citizens of China, must it provide exceptional access to Chinese law enforcement? Which countries have sufficient respect for the rule of law to participate in an international exceptional access framework?” the report says.

The authors conclude that the governments raise more questions than they answer. “Absent a concrete technical proposal, and without adequate answers to the questions raised in this report, legislators should reject out of hand any proposal to return to the failed cryptography control policy of the 1990s,” the report says.

The authors include Whit Diffie, one of the pioneers of public key cryptography; Bruce Schneier, author of several books on computer security; Josh Benaloh, senior cryptographer at Microsoft Research; Susan Landau, former senior staff policy adviser at Google; Steven Bellovin, professor at Columbia University and a pioneer of firewalls; and Ross Anderson, professor of security engineering at Cambridge University.

Anderson looked ahead to the U.K. government’s proposed legislation. “What Cameron wants isn’t just against the principles of good security engineering, but violates human rights principles too.

“There are three tests for exceptional access to be compatible with human rights. The required access must be set out in law sufficiently clearly for its effects to be foreseeable, it must be proportionate and it must be necessary in a democratic society. The government demands for access to everything fail all these tests by a mile.”

Anderson added: “A point I would like to make to the prime minister and his circle is: whoever put the prime minister up to this should get a complete bollocking. The proposals are wrong in principle and unworkable in practice.”

He asked where Cameron had received his advice from on matters of cryptography, assuming it was from GCHQ and May, and suggested it was time he spoke to representatives from civil society and companies such as Google, Facebook and Twitter.

Originally published by The Guardian

3 WAYS TO SHOW YOUR SUPPORT

ONE-TIME DONATION

Just use the simple form below to make a single direct donation.

DONATE NOW

MONTHLY DONATION

Be a sustaining sponsor. Give a reacurring monthly donation at any level.

GET SOME MERCH!

Now you can wear your support too! From T-Shirts to tote bags.

SHOP TODAY

Sign Up

Article Tabs

Agriculture, the service economy, sexual exploitation, manufacturing, construction and domestic work drive today's enslavement around the world.

Thanks to the Electoral College, leftists have perhaps the final say this November over whether democracy can hold on for at least another four years, or if fascism will take root and infect all facets of the federal government for decades to come.

What remains unknown is whether post-truth Republicans will succeed in 2024 as the Nazis did in 1933.

Based on details that have emerged about Trump’s presidential agenda, the far-right Heritage Foundation plans for the next GOP president to have all the tools necessary to demolish multicultural democracy and establish a white, Christian ethnostate that imposes a gender apartheid not unlike the Taliban’s Afghanistan.

Donald Trump, Hitler

Like Hitler, Trump has a unique command of propaganda, a captivating public presence, and he knows how to drive home narratives beneficial to him and harmful to his enemies.

Agriculture, the service economy, sexual exploitation, manufacturing, construction and domestic work drive today's enslavement around the world.

Thanks to the Electoral College, leftists have perhaps the final say this November over whether democracy can hold on for at least another four years, or if fascism will take root and infect all facets of the federal government for decades to come.

History shows there are no “one-day” dictatorships. When democracies fall, they typically fall completely.

What remains unknown is whether post-truth Republicans will succeed in 2024 as the Nazis did in 1933.

Based on details that have emerged about Trump’s presidential agenda, the far-right Heritage Foundation plans for the next GOP president to have all the tools necessary to demolish multicultural democracy and establish a white, Christian ethnostate that imposes a gender apartheid not unlike the Taliban’s Afghanistan.

Based on details that have emerged about Trump’s presidential agenda, the far-right Heritage Foundation plans for the next GOP president to have all the tools necessary to demolish multicultural democracy and establish a white, Christian ethnostate that imposes a gender apartheid not unlike the Taliban’s Afghanistan.

Posted 1 month 2 weeks ago

Thanks to the Electoral College, leftists have perhaps the final say this November over whether democracy can hold on for at least another four years, or if fascism will take root and infect all facets of the federal government for decades to come.

Posted 1 week 17 hours ago

What remains unknown is whether post-truth Republicans will succeed in 2024 as the Nazis did in 1933.

Posted 1 month 1 day ago

History shows there are no “one-day” dictatorships. When democracies fall, they typically fall completely.

Posted 1 week 2 days ago

Agriculture, the service economy, sexual exploitation, manufacturing, construction and domestic work drive today's enslavement around the world.

Posted 15 hours 25 min ago