Another Police Chief Says Phone Encryption Is A Pedophile's Best Friend

from the public-suffers-third-degree-stupidity-burns dept

More law enforcement officials are coming forward to express their dismay at Apple's and Google's decision to encrypt cellphones by default. And the hysteria seems to be getting worse. As was recently covered, FBI director James Comey stated that no one was above the law, while failing to realize there's actually no law preventing Apple or Google from doing this.

The chief of the Chicago police went even further:

“Apple will become the phone of choice for the pedophile,” said John J. Escalante, chief of detectives for Chicago’s police department. “The average pedophile at this point is probably thinking, I’ve got to get an Apple phone.”
Now, Washington DC's police chief, Cathy Lanier (who we've praised previously for her implementation and enforcement of a tough [on cops] citizen recording policy) is echoing Escalante's ridiculous statement.
“This is a very bad idea,” said Cathy Lanier, chief of the Washington Metropolitan Police Department, in an interview. Smartphone communication is “going to be the preferred method of the pedophile and the criminal. We are going to lose a lot of investigative opportunities.”
First off, law enforcement rarely ever encounters encryption. These facts are borne out by the US Courts' annual statistics on warrant requests. That they'll encounter it more often from now on has nothing to do with the scary stories they've been telling to justify their collective freakout. Those criminals didn't use it, for the most part. And if they did, it was circumvented nearly 100% of the time.

Second, implying that pedophiles are suddenly going to start buying iPhones/Androids is a non-starter. Plenty of encryption options already exist and most pedophiles and criminals already own cellphones. Police have captured plenty of criminals and pedophiles without cracking encryption. See "first off" above.

Third, and this is where the irony sets in, Lanier's department is a big fan of encryption. From 2011:
D.C. police became one of the latest departments to adopt the practice [encrypting police radio communications] this fall. Police Chief Cathy Lanier said recently that a group of burglars who police believe were following radio communications on their smartphones pulled off more than a dozen crimes before ultimately being arrested and that drug dealers fled a laundromat after a sergeant used his radio to call in other officers — suggesting that they, too, might have been listening in.

"Whereas listeners used to be tied to stationary scanners, new technology has allowed people — and especially criminals — to listen to police communications on a smartphone from anywhere," Lanier testified at a D.C. Council committee hearing this month. "When a potential criminal can evade capture and learn, 'There's an app for that,' it's time to change our practices."
Journalist wondered what sort of impact this decision would have on public safety, if only certain individuals were allowed to hear as-it-happens discussions of dangerous events. All the cops could think about was the ones that got away. Now the encryption's on the other end and the police are using both the public safety argument and counting their escaped criminals before they've actually escaped justice.

I guess encryption only works for the government. All others need not apply. Lanier's statement -- combined with the DCPD's encrypted transmissions -- means she only wants to encrypt the communications of the department's "pedophiles and criminals."

Now, going back to James Comey complaining about Apple and Google being above the law. Nothing that exists can legally prevent them from providing this encryption to their customers… at least for now. Surfing high on a wave of hysteria, former FBI Counsel Andrew Weissman has arrived to push for exactly that: new laws.
They have created a system that is a free-for-all for criminals,” said Weissmann, a law professor at New York University. “It’s the wrong balancing act. Having court-ordered access to telephones is essential to thwart criminal acts and terrorist acts.”

Weissmann said there was little the Justice Department could do to stop the emerging policies. The companies are permitted to have encryption systems. The only way to ensure law enforcement access is for Congress to pass legislation, he said.
The answer to a move prompted by the exposure of government overreach is… more government overreach. Weissman's horrendous idea will find some sympathetic ears in Congress, but not nearly as many as it would have found a few years ago. Any legislation prompted by law enforcement officials' iPedophile hallucinations will be decidedly terrible and loaded with negative side effects and collateral damage.

And let's not forget that, since the beginning of criminal activity, there have always been panics about new technology placing ne'er-do-wells ahead of pursuing flatfoots. Here's one from 1922, pointed out by the ACLU's Chris Soghoian:


Here's a text version:
The automobile is a swift and powerful vehicle of recent development, which has multiplied by quantity production and taken possession of our highways in battalions, until the slower, animal-drawn vehicles, with their easily noted individuality, are rare. Constructed as covered vehicles to standard form in immense quantities, and with a capacity for speed rivaling express trains, they furnish for successful commission of crime a disguising means of silent approach and swift escape unknown in the history of the world before their advent. The question of their police control and reasonable search on highways or other public places is a serious question.

The baffling extent to which they are successfully utilised to facilitate commission of crime of all degrees, from those against morality, chastity, and decency to robbery, rape, burglary, and murder, is a matter of common knowledge. Upon that problem a condition and not a theory confronts proper administration of our criminal laws.
Law enforcement techno-panic. Dating all the way back to the "silent approach" of a 1920's-era internal combustion engine.

Hide this

Thank you for reading this Techdirt post. With so many things competing for everyone’s attention these days, we really appreciate you giving us your time. We work hard every day to put quality content out there for our community.

Techdirt is one of the few remaining truly independent media outlets. We do not have a giant corporation behind us, and we rely heavily on our community to support us, in an age when advertisers are increasingly uninterested in sponsoring small, independent sites — especially a site like ours that is unwilling to pull punches in its reporting and analysis.

While other websites have resorted to paywalls, registration requirements, and increasingly annoying/intrusive advertising, we have always kept Techdirt open and available to anyone. But in order to continue doing so, we need your support. We offer a variety of ways for our readers to support us, from direct donations to special subscriptions and cool merchandise — and every little bit helps. Thank you.

–The Techdirt Team

Filed Under: cathy lanier, fud, phone encryption
Companies: android, google


Reader Comments

Subscribe: RSS

View by: Time | Thread


  1. identicon
    Anonymous Coward, 2 Oct 2014 @ 4:07pm

    If they want a war, we'll give them a party.

    https://www.cryptoparty.in/documentation/handbook

    link to this | view in thread ]

  2. icon
    That One Guy (profile), 2 Oct 2014 @ 4:28pm

    Let's follow that logic chain a bit shall we?

    Between police and people in the government freaking out and declaring that encryption clearly has no other purpose than use by terrorists/criminals/pedophiles, I wonder if anyone has pointed out just where that line of thinking leads?

    The government uses encryption? Obviously it's staffed by nothing but terrorists and pedophiles.

    The police use encryption? Obviously they are staffed by terrorists and pedophiles.

    Hell, the one complaining this time employs encryption on her own department's communications, according to her logic the only possible reason(s) they could have to do that is a nefarious and/or criminal one.

    When you get right down to it, what they're really going completely crazy over is people protecting their privacy, and making it so certain groups can't just go browsing through their private documents/files without them knowing about it, and without a court approved warrant.

    And the absolute best part of this? It wouldn't even be an issue if the government and police had followed the rules and shown an ounce of self-restraint in the first place. It's only because they have shown that they absolutely cannot be trusted that more and more people and companies are ramping up their security and encryption efforts.

    link to this | view in thread ]

  3. identicon
    Anonymous Coward, 2 Oct 2014 @ 4:48pm

    Re: Let's follow that logic chain a bit shall we?

    Makes sense, the people most against something are often found guilty of it.

    link to this | view in thread ]

  4. identicon
    Anonymous Coward, 2 Oct 2014 @ 5:01pm

    Why do they keep calling it an "idea" its already done. Deployed to millions of iPhones. Game over. See you next time.

    link to this | view in thread ]

  5. identicon
    Anonymous Coward, 2 Oct 2014 @ 5:03pm

    That there sir is Communism. Them Communists are out to get us! Anything against hardcore patriotism is evil communism.

    link to this | view in thread ]

  6. icon
    Andrew Norton (profile), 2 Oct 2014 @ 5:11pm

    In other news, a Police badge is a criminals best friend.

    link to this | view in thread ]

  7. identicon
    Anonymous Coward, 2 Oct 2014 @ 5:15pm

    "Another Police Chief Says Phone Encryption Is A Pedophile's Best Friend"

    So, that is why all politicians have heavily encrypted phones...

    link to this | view in thread ]

  8. identicon
    Anonymous Coward, 2 Oct 2014 @ 5:19pm

    Pedophiles can use encryption, so encryption should be removed.
    Pedophiles can breathe air, so Earth's atmosphere should be removed.

    link to this | view in thread ]

  9. identicon
    Anonymous Coward, 2 Oct 2014 @ 5:25pm

    As much as "they" are "dismayed" about this, and proclaiming that all "the bad guys" will now use these phones - these days you have to be suspicious that it's because they want to direct them to these devices. Maybe there are secret "backdoors" in them after all...

    link to this | view in thread ]

  10. icon
    AricTheRed (profile), 2 Oct 2014 @ 5:33pm

    Really?

    This group of "Law Enforcement Professionals", henceforth known as A Bag of Dicks, have not heard of Blackphone? with standard end-to-end encryption of virtually all features between Blackphone users?

    What does that make that group of early adopters? A big bunch of antichrist-gay-nazi-zombie biker-libertarian-babyrapist-left-handed-midget-lesbian-albino-eskimo-ISIL/ISIS/Al Queda-journalist beheaders?

    link to this | view in thread ]

  11. identicon
    Anonymous Coward, 2 Oct 2014 @ 5:35pm

    Another Police Chief Says
    "Hey, I'm an idiot!"

    link to this | view in thread ]

  12. identicon
    Anonymous Coward, 2 Oct 2014 @ 6:10pm

    None of this encryption thing would be necessary had the law enforcement as well as government decided to just chunk what the law means in favor of breaking it.

    It makes you wonder how ever in the world did these criminals get caught before cell phones and the internet came to be. Or could it be that now a days, law enforcement doesn't want to leave the office? No worrying about criminals and the threat they represent law enforcement that made them so afraid they went and got their very own MRAPs, grenade launchers, and military armament. The cities they are responsible for patrolling now being handled by face recognition cameras all over the place (even though the software is full of bugs, can't actually do accurate ids, and the cameras only take low quality images) so that the desk is now the patrol beat.

    No one would be concerned with encryption had it not proved necessary to protect oneself from the authorities. People are beginning to understand they have less to fear from criminals than they do the authorities.

    I'm from the government and I'm here to help has taken on a whole new meaning.

    link to this | view in thread ]

  13. identicon
    Anonymous Coward, 2 Oct 2014 @ 6:17pm

    Re: Really?

    Is this the Blackphone of which you speak:
    They used to be able to monitor these years ago, but it is unlikely (given their general level of technical incompetence), that the monitoring equipment is anywhere close to functional now!

    http://rubytuesdaysvintagehome.com/images/ARECALL300PLAIN300DINNERSERVICEANDTEASET089.jpg

    link to this | view in thread ]

  14. identicon
    Anonymous Coward, 2 Oct 2014 @ 6:23pm

    How smart is a pedophile?

    Clearly not smart enough to configure his phone all by himself.

    Clearly not smart enough to figure out on his own that he needs encryption.

    Fortunately, the FBI and other police agencies are running a mass-awareness-raising campaign for all the pedophiles of the world. Soon, thanks to these public-spirited law-enforcement bureaucrats, EVERY pedophile will have learned how important encryption is, and how he can get an encrypted phone without any technical no-how.

    This is, no doubt, a good thing. But I have to ask, with so many demands on those formerly-taxpayers' dollars, is educating pedophiles on the best ways of avoiding surveillance really appropriate?

    link to this | view in thread ]

  15. identicon
    Deniable Sources, 2 Oct 2014 @ 6:37pm

    So what's the concern about phones, exactly?

    Most of what's on my phone is pretty simple: call logs, emails, texts, calendar entries, and files synced through various cloud services.

    All of which, interestingly, are available to law enforcement armed with a proper warrant, assuming they know enough to ask. My phone is just one convenient place to find them, and the only one a random LEO might find in my pocket during a contrived search.

    Now if that LEO really has probable cause, they can get my calls and contacts. They can get my emails. They can get my files. Heck, if they subpoena Verizon and Google they can get the history of the towers I've hit and the places I've parked my car. About the only thing they can't get is immediate access to that information without a decent reason and without having to go to the trouble of a real investigation.

    In other words, encryption on a phone is unusually bad because it particularly affects lazy, dishonest, or incompetent law enforcement officials. God forbid...

    (And to the smug ones saying that the Secret Encoder Key that reveals the location of a hostage might be found on a pedophile's phone, stored nowhere else and for some reason in plaintext on the phone as opposed to any one of a number of encrypting storage applications, I would simply advise them to buy lottery tickets, because they've cleaned out pretty much all the long odds by now.)

    link to this | view in thread ]

  16. identicon
    Anonymous Coward, 2 Oct 2014 @ 6:55pm

    Re:

    Sir, your idea is brilliant and I'd like to crowdfund this right away.

    That will take care of those roaming packs of pedophiles & terrorists that are lurking in the shadows.

    link to this | view in thread ]

  17. identicon
    Anonymous Coward, 2 Oct 2014 @ 7:45pm

    All they do is cry for power.

    link to this | view in thread ]

  18. identicon
    Paul Powers, 2 Oct 2014 @ 9:00pm

    One day after Congressman and former FBI agent Mike Rodgers assures Senator Feinstein of California that her Cyber Spying bill CISA will pas the Senate, a Cybersecurity breach happens a JP Morgan

    Hi, Sorry about the last post. After reading this article and then reading today about a cyberbreach that happened at JP Morgan Chase http://dealbook.nytimes.com/2014/10/02/jpmorgan-discovers-further-cyber-security-issues/ one day after Congressman and Former FBI agent Mike Rodgers according to the Hill Newspaper, Rep Rodgers assured the Senator that her Cyberspying bill CISA or S.2588 would be pushed in the Senate as you will see from this link here > http://thehill.com/policy/technology/219429-house-chairman-fears-political-tantrums-could-sink-cyber -bill

    Perhaps I am being a bit of a conspirator but this Cyberbreach at JP Morgan Chase just strikes me very odd that it happened after the day Congressman Rodgers who is retiring from Congress this year made his statement and then a Cyberbreach at JP Morgan.

    In case you do not know what CISA or the S. 2588: Cybersecurity Information Sharing Act of 2014 it is a massive Cyberspying bill that will give your ISP or Internet Service Providers the right to give your information to law enforcement violating your 4th amendment rights and to anyone in the private sector willing to pay money for your private e-mails and under CISA your ISP will get immunity for selling your information regardless of Contract or you the internet user finding out. S. 2588: Cybersecurity Information Sharing Act of 2014

    CISA also takes destroys NET NEUTRALITY http://www.usnews.com/news/articles/2014/07/07/nsa-net-neutrality-fears-overshadow-senate-cybersecur ity-vote and allows with legal authority major NSA Spying http://www.theguardian.com/commentisfree/2014/jul/12/senate-nsa-secret-cybersecurity-information-sha ring-act

    I recently heard a Muslim Student going to a high school in Alabama had been harassed by the NSA when the School got a phone call from the NSA to spy on the student simply because the Student has a Muslim name http://fusion.net/story/18656/alabama-school-district-says-nsa-was-watching-high-school-students-on- social-media/

    There have been petitions to try to stop CISA Cyberspying bill from both the Electronic Frontier Foundation(EFF) https://act.eff.org/action/stop-the-cybersecurity-information-sharing-act-of-2014 and Fight 4 the Future http://www.cispaisback.org/

    Both are online civil liberties groups. Anyway it is just sad how Government and the police are pushing to invade are privacy and I would not be surprised if some events we see are to push out are privacies and 4th amendment laws here in America. CISA for example is a violation of privacy to give immunity to ISP's to sell and give my private e-mails and text to Law Enforcement against my 4th amendment rights and sell my information and I would not put it passed a former FBI agent in Washington just as these police know are rights get in the way of there right to destroy are freedoms online and here in America. Sad but true.

    link to this | view in thread ]

  19. icon
    tqk (profile), 2 Oct 2014 @ 9:33pm

    Proclivity == action?

    Why are ***so*** many LEOs *SO* focussed on this (to the exclusion of *everything* else)? Are they basically demented or ... perverted [!] in some wierd fashion which we civilians can't track?!?

    "Get a life" comes to mind. Yeah sure, save the children, but not to the exclusion of *EVERYthing* else in life, please.

    Yeesh.

    link to this | view in thread ]

  20. icon
    ECA (profile), 2 Oct 2014 @ 9:33pm

    Dear Mr. Policeman

    from now on...
    ALL your Emails, facebook, twitters, and other accounts, and cellphones will be monitored..
    AS well as your wife and children..

    NOW where do you wish us to place this camera with AUDIO..

    link to this | view in thread ]

  21. identicon
    Anonymous Coward, 2 Oct 2014 @ 9:40pm

    Re: Re: Let's follow that logic chain a bit shall we?

    Probably true of infringement. In fact Hollywood was built on infringement.

    link to this | view in thread ]

  22. identicon
    Anonymous Coward, 2 Oct 2014 @ 10:55pm

    Child abuse includes using children as pawns in order to push political agendas. I never would have pegged Eric Holder as a child abuser. Yet clearly he's using children to push his political agendas. For shame.

    link to this | view in thread ]

  23. icon
    Uriel-238 (profile), 2 Oct 2014 @ 11:12pm

    Cop pedophiles are different.

    ...Or maybe they think different.

    link to this | view in thread ]

  24. identicon
    David, 3 Oct 2014 @ 12:16am

    A child's best protection against pedophiles is an encrypted phone

    Lot's of blackmail potential gone. And remember: most child abuse occurs close to family circles. No need whatsoever to phone around about it.

    link to this | view in thread ]

  25. identicon
    Anonymous Coward, 3 Oct 2014 @ 12:17am

    No, moron cops are the paedophile's best friend.

    link to this | view in thread ]

  26. identicon
    Anonymous Coward, 3 Oct 2014 @ 1:08am

    So pedos are more dangerous than criminals and even terrorists?
    Friendly reminder that if you are on the internet you will very likely stumble across a random questionable picture, and a single thumbnail is enough to put you away for decades.

    hurr encryption is bad your children will die just please ignore the massive failures in the system

    link to this | view in thread ]

  27. identicon
    Anonymous Coward, 3 Oct 2014 @ 1:10am

    Grew up in this county hearing the absolute worst stories about this sheriff. The fact he actually got publicity for being such a moron, and there's a techdirt hitpiece about it is a wild dream come true.

    link to this | view in thread ]

  28. identicon
    Anonymous Coward, 3 Oct 2014 @ 1:26am

    Re: Let's follow that logic chain a bit shall we?

    It's so easy! They just have to propose that encryption be outlawed. Come on, do it!
    Oh, you'd rather frame it in dubious moral stances? Ok, then. Go ahead.
    By the way, when I access my homebanking account I'm certainly uploading child porn, right? Online payments? Ha! I'm funding terrorist left and right!

    link to this | view in thread ]

  29. identicon
    Spodula, 3 Oct 2014 @ 1:31am

    Porn on a phone?

    I think they are more likely to bump up against the fact that Mobile phones, with their tiny screens and UIs getting the way, are notoriously bad for Porn of whatever stripe....

    link to this | view in thread ]

  30. icon
    PaulT (profile), 3 Oct 2014 @ 3:12am

    Re:

    "So pedos are more dangerous than criminals and even terrorists?"

    No, just scarier. Bring up the "but the children", and you can paint anyone who tries to invoke common sense as supporting child rape. After all, if it's "for the children", how can you be against it? So, those with real opposing arguments and factual arguments stay quiet lest they be painted as pro-abuse. A classic tactic for politicians.

    link to this | view in thread ]

  31. icon
    Ninja (profile), 3 Oct 2014 @ 4:04am

    Re: Let's follow that logic chain a bit shall we?

    Tell this asshole that the worst dictatorships also benefit from the lack of encryption and actively campaign against it. Simple as that. If encryption is the pedophile best friend it is also the tyrant worst foe.

    link to this | view in thread ]

  32. icon
    Ninja (profile), 3 Oct 2014 @ 4:07am

    Law enforcement techno-panic. Dating all the way back to the "silent approach" of a 1920's-era internal combustion engine.

    Today they can use even more silent options such as planes and motorcycles with jet engines.

    link to this | view in thread ]

  33. identicon
    Almost Anonymous, 3 Oct 2014 @ 5:41am

    Small thread derail

    The automobile is a swift and powerful vehicle of recent development, which has multiplied by quantity production and taken possession of our highways in battalions, until the slower, animal-drawn vehicles, with their easily noted individuality, are rare. Constructed as covered vehicles to standard form in immense quantities, and with a capacity for speed rivaling express trains, they furnish for successful commission of crime a disguising means of silent approach and swift escape unknown in the history of the world before their advent. The question of their police control and reasonable search on highways or other public places is a serious question.

    The baffling extent to which they are successfully utilised to facilitate commission of crime of all degrees, from those against morality, chastity, and decency to robbery, rape, burglary, and murder, is a matter of common knowledge. Upon that problem a condition and not a theory confronts proper administration of our criminal laws.
    They should really require a license or something to use those "automobiles". That would surely prevent criminals from using them for crimes.

    link to this | view in thread ]

  34. identicon
    Anonymous Coward, 3 Oct 2014 @ 5:50am

    "First off, law enforcement rarely ever encounters encryption. These facts are borne out by the US Courts' annual statistics on warrant requests."

    Um, no @Tim. You and Mike both seem to insist on spreading this bit of misinformation. The wiretap report you link to discusses the few times that police have encountered encryption that kept them from intercepting a call. That's why the title of the TD post has the phrase "Wiretap Report" in it. The report says nothing at all about how many times police encountered encrypted data stored on phones or computers, or whether they had trouble decrypting it, which is the scenario that would be relevant to the new Apple and Android policies.

    Both you and Mike are smart enough to know the difference between encrypted communications and encrypted data stored on a device. So stop claiming that "law enforcement rarely encounters encryption." I don't believe that's true. As Orin Kerr and others have written, police send Apple phones all the time to get Apple to unlock them. Which they would not do if they weren't encrypted. But if you think it is, then cite something that actually supports that claim, rather than something you know or ought to know is irrelevant.

    link to this | view in thread ]

  35. identicon
    Anonymous Coward, 3 Oct 2014 @ 6:04am

    Re: Re: Let's follow that logic chain a bit shall we?

    The only time you fund Terrorists these days are when you pay your taxes!

    link to this | view in thread ]

  36. identicon
    Anonymous Coward, 3 Oct 2014 @ 6:17am

    Start making a list of all the cities and states that keep making stupid comments in favor of no encryption and that's where you don't want to live , call it the 100 places that despise citizen privacy.

    link to this | view in thread ]

  37. identicon
    Pixelation, 3 Oct 2014 @ 8:03am

    Insert anything police don't like

    "Another Police Chief Says ___________ Is A Pedophile's Best Friend"

    link to this | view in thread ]

  38. identicon
    the threat to peace is the USA, 3 Oct 2014 @ 8:13am

    so the police chief in question is a child molestor?

    I mean how else can the guy know....?

    link to this | view in thread ]

  39. identicon
    this disgusts me, 3 Oct 2014 @ 8:18am

    people are dying in africa over a canadian patent

    link to this | view in thread ]

  40. identicon
    Anonymous Coward, 3 Oct 2014 @ 9:58am

    Re:

    So stop claiming that "law enforcement rarely encounters encryption." I don't believe that's true. As Orin Kerr and others have written, police send Apple phones all the time to get Apple to unlock them. Which they would not do if they weren't encrypted. But if you think it is, then cite something that actually supports that claim, rather than something you know or ought to know is irrelevant.

    What difference should it make in the frequency that law enforcement encounters encryption? If I choose not to have a passcode on my phone, and the phone is lost, it's that much easier for the person finding it to access any of the data on it.
    Why should ANYONE choose to make law enforcement's job easier, while at the same time, expose themselves to a much bigger risk?
    What good does that serve?
    Being as responsible as you can with YOUR DATA is far more important than making some cop's life more difficult, should he feel the need to rummage through your data.

    I think you're really missing the point of the article, if that's what you're choosing to criticize.

    link to this | view in thread ]

  41. identicon
    Daemon_ZOGG, 3 Oct 2014 @ 10:33am

    The Criminals?

    Since the government uses encryption, then they are the criminals. Obviously, they must be hiding something with criminal intent. There's no need to seek any legal action to prove it. We'll just assume their guilty. That will be good enough.

    link to this | view in thread ]

  42. identicon
    Anonymous Coward, 3 Oct 2014 @ 11:45am

    Words of wisdom from a man who is being off by criminals to ignore crimes

    link to this | view in thread ]

  43. identicon
    Anonymous Coward, 3 Oct 2014 @ 11:45am

    Re:

    paid off*

    This place really needs an edit button

    link to this | view in thread ]

  44. identicon
    Anonymous Coward, 3 Oct 2014 @ 12:58pm

    Re: Re:

    If it makes no difference how frequently law enforcement encounters encryption, then Mike and Tim have no need to keep repeating the false claim that law enforcement rarely encounters encryption. I think Tim and Mike make this claim because they think it bolsters their argument that Apple and Google are making the right call in designing their handset encryption so that not even Apple/Google can break it.

    But I do get the point of the article. I'm not even disagreeing with Tim's and Mike's and AC#42's conclusion that the Apple/Google policy is a good idea. I certainly understand the upside to individual users. After all, as a user I have little interest in Apple or Google being able to break the encryption on my phone. I agree that having strong encryption in widespread use has lots of benefits not just for me but for the public in general, and cuts down on the risk that backdoors will be exploited by hackers and scammers.

    But there are downsides to making it so the police can never break the encryption on a handset, even where the police have gotten a search warrant and need Apple's or Google's help to decrypt the data. Sometimes the encrypted data will be critical to some serious case-pick whatever kind of case is important to you-and if police cannot access the data it might be someone gets hurt or a violent criminal goes free or maybe just that someone loses a ton of money. This downside could well be outweighed by all the other good effects that flow from unbreakable handset encryption. Tim sure seems to think so, and as I said before, I am not sure I disagree with him.

    But just because we think more encryption is a good thing does not mean we should pretend that police hardly ever encounter encryption or that it never gets in the way of a real investigation (and then to cite a report about encryption in a totally different area).

    link to this | view in thread ]

  45. icon
    John Fenderson (profile), 3 Oct 2014 @ 1:06pm

    Re: Re: Re:

    I largely agree with you here, but part ways on this part:

    "...gets in the way of a real investigation..."

    Access to the contents of phones have been a convenience for the police, but I'm unaware of any case that could not have been solved using other standard investigatory techniques.

    I understand the desire for the police to have convenience -- I like that in my own job as well -- but failing to make something convenient is not the same as getting in the way of something.

    link to this | view in thread ]

  46. identicon
    Mark Noo, 5 Oct 2014 @ 8:54pm

    If all people with encrypted cell phones are pedophiles and the DC police have encrypted cell phones. What are the DC Police.

    link to this | view in thread ]

  47. identicon
    Luke, 2 Jun 2015 @ 5:23am

    Good read - I sited this in a similar article I created about police scanner encryption: http://www.zipscanners.com/resources/police-scanner-encryption-explained/

    link to this | view in thread ]


Follow Techdirt
Essential Reading
Techdirt Deals
Report this ad  |  Hide Techdirt ads
Techdirt Insider Discord

The latest chatter on the Techdirt Insider Discord channel...

Loading...
Recent Stories

This site, like most other sites on the web, uses cookies. For more information, see our privacy policy. Got it
Close

Email This

This feature is only available to registered users. Register or sign in to use it.