FUD: Former FBI Guy Lies, Claiming New Mobile Encryption Would Have Resulted In Dead Kidnap Subject
from the uh,-no dept
Yesterday, we wrote about law enforcement freaking out over the announcements from both Apple and Google that they'd start encrypting phones by default, better protecting data on those phones from anyone who wants it -- whether government/law enforcement or hackers. We noted, oddly, that former FBI guy Ronald Hosko had showed up in articles in both the Washington Post and the WSJ spewing a bunch of FUD about it. In the WSJ:The level of privacy described by Apple and Google is "wonderful until it's your kid who is kidnapped and being abused, and because of the technology, we can't get to them,'' said Ronald Hosko, who left the FBI earlier this year as the head of its criminal-investigations division. "Who's going to get lost because of this, and we're not going to crack the case?"In the Washington Post:
Ronald T. Hosko, the former head of the FBI’s criminal investigative division, called the move by Apple “problematic,” saying it will contribute to the steady decrease of law enforcement’s ability to collect key evidence — to solve crimes and prevent them. The agency long has publicly worried about the “going dark” problem, in which the rising use of encryption across a range of services has undermined government’s ability to conduct surveillance, even when it is legally authorized.This is just blatant fear mongering, and not even close to realistic. But the Washington Post doubled down and let Hosko write an entire (and entirely bogus) story about how he helped save a kidnapped man from murder earlier this year and "with Apple's and Google's new encryption rules, he would have died." He accurately writes about a kidnapping in North Carolina, and how law enforcement tracked down the perpetrators, including by requesting and getting "the legal authority to intercept phone calls and text messages." Of course, here's the thing: nothing in this new encryption changes that. Transmitted content is unrelated to the encryption of stored content on the phones. It's the stored content that is being encrypted. It's kind of scary that a supposed "expert" like Hosko doesn't seem to comprehend the difference.
“Our ability to act on data that does exist . . . is critical to our success,” Hosko said. He suggested that it would take a major event, such as a terrorist attack, to cause the pendulum to swing back toward giving authorities access to a broad range of digital information.
Either way, he insists that the encryption would have prevented this (it wouldn't). His story originally said:
Last week, Apple and Android announced that their new operating systems will be encrypted by default. That means the companies won’t be able to unlock phones and iPads to reveal the photos, e-mails and recordings stored within.After some people pointed out how very, very, very wrong this is, Hosko or the Washington Post "updated" the story, but still makes the same basic claims:
It also means law enforcement officials won’t be able to look at the range of data stored on the device, even with a court-approved warrant. Had this technology been used by the conspirators in our case, our victim would be dead. The perpetrators would likely be freely plotting their next revenge attack.
Last week, Apple and Google announced that their new operating systems will be encrypted by default. Encrypting a phone doesn’t make it any harder to tap, or “lawfully intercept” calls. But it does limit law enforcement’s access to a data, contacts, photos and email stored on the phone itself.Except, even the update is not true. As the AP's Ted Birdis notes, the affidavit in the case shows that the FBI used phone toll records and wiretaps to figure out the case, and didn't get access to any phones "until after [the] victim [was] safe."
Had this technology been in place, we wouldn’t have been able to quickly identify which phone lines to tap. That delay would have cost us our victim his life.The perpetrators would likely be freely plotting their next revenge attack.
In other words, Hosko's story is pure FUD. The new moves by these companies would not have meant the guy died. It wouldn't have impacted the story at all.
Meanwhile, as a massive post by Julian Sanchez notes, phone encryption products have been on the market for a while and if it was such a big problem we'd already know about it, but so far it's been pretty limited. In the entire US in 2013, there were nine cases where police claimed that encryption stymied their investigations. Furthermore, in the vast majority of cases where they came up against encryption, they were still able to crack it. So... the impact here is minimal.
But that apparently won't stop lies from the likes of Ronald Hosko.
Update: And... it appears that the Washington Post edited the story again to now make it accurate, but which also disproves the entire point of the story. Now the basic story is "we saved this guy... and mobile encryption would have done nothing to stop it, but it's a bad bad thing anyway." If Hosko couldn't get the very basics right, how could he be considered a credible person discussing this issue?
Thank you for reading this Techdirt post. With so many things competing for everyone’s attention these days, we really appreciate you giving us your time. We work hard every day to put quality content out there for our community.
Techdirt is one of the few remaining truly independent media outlets. We do not have a giant corporation behind us, and we rely heavily on our community to support us, in an age when advertisers are increasingly uninterested in sponsoring small, independent sites — especially a site like ours that is unwilling to pull punches in its reporting and analysis.
While other websites have resorted to paywalls, registration requirements, and increasingly annoying/intrusive advertising, we have always kept Techdirt open and available to anyone. But in order to continue doing so, we need your support. We offer a variety of ways for our readers to support us, from direct donations to special subscriptions and cool merchandise — and every little bit helps. Thank you.
–The Techdirt Team
Filed Under: encryption, fbi, fud, kidnapping, mobile encryption, ronald hosko
Companies: apple, google
Reader Comments
The First Word
“Subscribe: RSS
View by: Time | Thread
[ link to this | view in chronology ]
Re:
Nobody does the work they're actually supposed to be doing.
[ link to this | view in chronology ]
[ link to this | view in chronology ]
Re:
[ link to this | view in chronology ]
Re:
[ link to this | view in chronology ]
Is he kidding?
The pendulum to swing back? WTF? Really? These guys are out of control. The "pendulum" is so far off right now if it tips any more toward them... we can hardly call it the pendulum effect anymore. It's meaningless. It almost as if he is wanting/wishing for another attack. Then he'd show us.
[ link to this | view in chronology ]
Re: Is he kidding?
[ link to this | view in chronology ]
He does have a point
[ link to this | view in chronology ]
Re: He does have a point
[ link to this | view in chronology ]
Re: He does have a point
[ link to this | view in chronology ]
[ link to this | view in chronology ]
Headline misleading
I don't know if the latter would necessarily be a bad result.
[ link to this | view in chronology ]
So had the phone's data been encrypted, you would not have been able to illegally access all of the information before you secured a warrant to tap the phone lines?
Because, you know, you need to know which phone you are tapping to get the warrant you asshat.
[ link to this | view in chronology ]
It's like seatbelts
Even if this story was true, the greater good from encryption far outweighs one bad situation.
[ link to this | view in chronology ]
Re: It's like seatbelts
[ link to this | view in chronology ]
[ link to this | view in chronology ]
Re:
[ link to this | view in chronology ]
Hosko's just a shill
[ link to this | view in chronology ]
M.O. for the govt.
[ link to this | view in chronology ]
I wonder if they have ever done a benefits/risk assessment?
[ link to this | view in chronology ]
Re: I wonder if they have ever done a benefits/risk assessment?
Ah, but you see, when you get used to just being able to hack into any device you feel like without once involving a real judge, 'getting a warrant' becomes a monumental task in comparison.
Police and government agencies are used to being able to 'peek' without having to go through the hassle of 'bothering' a judge(and deal with the annoyance of providing enough evidence for a warrant), and they know that a good chunk of their fishing expeditions wouldn't pass muster in front of a judge, so of course they're freaking out about the possibility of such activity requiring a warrant.
[ link to this | view in chronology ]
[ link to this | view in chronology ]
The problem as I see it.
This sure makes it sound like the times it's legally authorized are the exception.
Even if it's not the exception, anytime it's not legally authorized it's a crime.
We are simply getting a little more protection from criminals even when the criminals are working for the government.
[ link to this | view in chronology ]
NSA/FBI want only one type of breakable encryption
This NSA push for a single *beakable* encryption scheme has been done before -- e.g., "DES" -- in order to avoid a nightmare of hundreds of different encryption apps -- some of which might actually be strong enough to resist the NSA.
[ link to this | view in chronology ]
FUD
[ link to this | view in chronology ]
Uncorrected Article still being published
http://www.northjersey.com/opinion/opinion-apple-android-privacy-moves-could-be-deadly-1.109453 1
"It also means law enforcement officials won’t be able to look at the range of data stored on the device, even with a court-approved warrant. Had this technology been used by the conspirators in our case, our victim would be dead. The perpetrators would likely be freely plotting their next revenge attack."
[ link to this | view in chronology ]
He Knows
I think he probably knows the difference quite well. But as a law enforcement officer he just got used to lying and always getting away with it.
[ link to this | view in chronology ]
I'd say this disinfo skirmish still accomplished its goal.
[ link to this | view in chronology ]
[ link to this | view in chronology ]
Nothing new
We have had full disk encryption for years, and when properly implemented there is nothing law enforcement can do about it.
Proper implementation means that the software must take into account current Fifth Amendment law by permitting the owner of the computer to only divulge the partial truth.
Fifth Amendment law is very odd in that if the government can prove you know a truth, it can sometimes force you to divulge it, but if the government only knows a half truth or doesn't know anything at all, you can plead the Fifth provided the whole truth is stored in your mind.
If Apple really was interested in protecting privacy, they should have implemented full end to end voice communication along with plausibly deniable full device encryption.
Full disk encryption is useless without the power to divulge two different passwords, one decrypting innocent pictures and another really private stuff.
[ link to this | view in chronology ]
If they're encrypting the data that's much better; I just figured it would be the operating system. Heaven forbid users improve the product they bought...that would be stealing or something!
[ link to this | view in chronology ]
[ link to this | view in chronology ]
Same lie as used to force tracking devices in cell phones.
[ link to this | view in chronology ]
You, on the other hand, claim that Apple/Google's handset encryption policies are no big deal for police - "In the entire US in 2013, there were nine cases where police claimed that encryption stymied their investigations." - and you cite the same 2013 report from the US courts that Julian Sanchez cited. But that report (with the "9 cases" stat) was talking about wiretaps, not encrypted handsets. That's a pretty important difference.
Look, I'm as appalled as you are about the sleight of hand in Hosko's column. He's either being intentionally dishonest, sloppy, or he doesn't understand the technologies he's writing about. But I know you understand the technologies, and I trust you're not deliberately conflating those two things, either.
[ link to this | view in chronology ]
false sense of security anyone?
The encryption on phones is on only when the phone is turned off as it is. while on a fast chase I don't see the unsub stopping to turn off his phone while typing a complex pass code that he has if he cares about security.
It is more likely disinformation more targeted to give us false sense of security.
encryption has nothing to do with the metadata and the call recording or tapping.
Also you can use third party folder encryption to hide sensitive data on the phone.
Phone records and texts are stored by the carrier too.
[ link to this | view in chronology ]
Strange
[ link to this | view in chronology ]