Former NSA Lawyer Says Reason Blackberry Failed Was 'Too Much Encryption' Warns Google/Apple Not To Make Same Mistake
from the give-it-a-rest,-stew dept
There are times that I wonder if former NSA General Counsel Stewart Baker is just trolling with his various comments, because they're so frequently out of touch with reality, even though he's clearly an intelligent guy. His latest is to join in with the misguided attacks on Apple and Google making mobile encryption the default on iOS and Android devices, with an especially bizarre argument: protecting the privacy of your users is bad for business. Oh really? Specifically, Baker engages in some hysterically wrong historical revisionism concerning the rise and fall of RIM/Blackberry:Baker said encrypting user data had been a bad business model for Blackberry, which has had to dramatically downsize its business and refocus on business customers. “Blackberry pioneered the same business model that Google and Apple are doing now - that has not ended well for Blackberry,” said Baker.While it's true that some countries, like India, demanded the right to spy on Blackberry devices, the idea that this was the reason for the company's downfall is ludicrous. First of all, RIM gave in to some of those demands anyway. But, more importantly, the reason that Blackberry failed was because the company just couldn't keep up from an innovation standpoint -- and that's because early on it made the decision to focus onenforcing patents, rather than truly innovating. RIM got fat and lazy by getting an early lead and then focusing on protecting it, rather than keeping up with the market. And... one of the reasons it got that early lead was because companies were willing to buy into the Blackberry in part because of its strong encryption.
He claimed that by encrypting user data Blackberry had limited its business in countries that demand oversight of communication data, such as India and the UAE and got a bad reception in China and Russia. “They restricted their own ability to sell. We have a tendency to think that once the cyberwar is won in the US that that is the end of it - but that is the easiest war to swim.”
The idea that encryption was bad for business because China and Russia couldn't spy on people is not only ridiculous and silly, but it appears to be Baker supporting authoritarian states spying on its citizenry. What the hell, Stewart?
Beyond that, Baker insists that, really, the public doesn't want encryption anyway, and if people only knew what was really going on with the "bad guys," we'd all be willing to give up our privacy:
Baker said the market for absolute encryption was very small, and that few companies wanted all their employees’ data to be completely protected. “There’s a very comfortable techno-libertarian culture where you think you’re doing the right thing,” said Baker.Right. And that's what basic police and detective work is for. It doesn't mean that you need to weaken the security and privacy of everyone else. Anyway, let's see if Baker goes out and shorts Apple and Google's stock now that he believes encryption and protecting the privacy of their users is really so bad for business.
“But I’ve worked with these companies and as soon as they get a law enforcement request no matter how liberal or enlightened they think they are, sooner to later they find some crime that is so loathsome they will do anything to find that person and identify them so they can be punished.
Thank you for reading this Techdirt post. With so many things competing for everyone’s attention these days, we really appreciate you giving us your time. We work hard every day to put quality content out there for our community.
Techdirt is one of the few remaining truly independent media outlets. We do not have a giant corporation behind us, and we rely heavily on our community to support us, in an age when advertisers are increasingly uninterested in sponsoring small, independent sites — especially a site like ours that is unwilling to pull punches in its reporting and analysis.
While other websites have resorted to paywalls, registration requirements, and increasingly annoying/intrusive advertising, we have always kept Techdirt open and available to anyone. But in order to continue doing so, we need your support. We offer a variety of ways for our readers to support us, from direct donations to special subscriptions and cool merchandise — and every little bit helps. Thank you.
–The Techdirt Team
Filed Under: blackberry, china, cryptowars, encryption, india, nsa, russia, stewart baker, surveillance
Companies: apple, blackberry, google, rim
Reader Comments
Subscribe: RSS
View by: Time | Thread
I used "mislead" and "only" in italics because that's precisely the strategy I began to see here and it's spreading throughout the world (I've seen clueless news here parroting the same bullshit). I think it's about time we unite and start explaining what encryption is and why these morons from law enforcement advocating against it are so wrong.
[ link to this | view in thread ]
On my computer however, things are a little different. I use bitlocker to ensure it is all encrypted (Using both a TPM and a USB key which I carry around with me) - not to stop law enforcement (although they would have to have a very convincing warrant for me to give up the keys), but because I use it to run an offsite backup of works servers - which, as we are a scanning bureau, contain over 400GB of data, most of which consists of legal files for criminal cases, personal data, accountancy data etc. It would probably be criminal for me to NOT keep this kind of information encrypted!
[ link to this | view in thread ]
Given that governments are looking more and more like the bad guys, it is strong encryption, or out with the pitchforks, and I doubt that he would like where the latter would be applied.
[ link to this | view in thread ]
[ link to this | view in thread ]
"loathsome" crimes? Well...
We've been trying, but -- as amply documented here at TD and elsewhere -- the CIA insists on redacting the names of torturers and their accomplices.
[ link to this | view in thread ]
[ link to this | view in thread ]
novel excuse
[ link to this | view in thread ]
Sounds just like the usual trolls here, claiming to work for tons of artists who all apparently demand DRM on every disc and a fine for every customer.
Don't count on either to prove their credentials, of course.
[ link to this | view in thread ]
Lies, damned Lies and even more Damned Lies
This is more likely the reason why they died, the inability to trust the encryption to prevent government snooping.
India's laws are also why jobs outsourced to India never actually receive the data, only video feeds from terminal servers located outside of India to get around the "We must see all data coming in and going out of our country".
[ link to this | view in thread ]
Quite the opposite
In contrast to phones, sadly there is no convincing "sucks less" alternative from the market leaders.
The Nobel Peace Prize winning product announcement from the Democrats last time round has been a thundering disappointment, and now the battery is dead with the contract running for another two years.
It's not clear who will be producing the successor model, but it's pretty clear that it will deserve the name watchU.
[ link to this | view in thread ]
Nice.
[ link to this | view in thread ]
[ link to this | view in thread ]
We Demand
[ link to this | view in thread ]
The same can be said for Nokia. Was that an encryption problem too?
“They restricted their own ability to sell."
Yeah, I remember once I got into the market for a smartphone, the Blackberry's dated UI was a turn-off compared to competitors and in business terms the requirement for BES subscriptions for certain features was something of a turn-off when considering new options. In both cases I rejected them and went with competitors. That trend has continues as friends and colleagues have rejected them in favour of iPhones and Samsungs even if they preferred the physical keyboard, which was one of the Blackberry's major attractions. WhatsApp and similar cross-platform apps pretty much killed Blackberry as an option for many once they got away from needing it to use BIM. only its cheap price seemed to keep many interested, and even that market's gone once cheaper Androids became ubiquitous. If only they hadn't restricted their own ability to sell by not keeping up with the demands of their market.
Oh wait, this is about *encryption*? Oh, whichever scapegoat you prefer, I suppose...
[ link to this | view in thread ]
C'mon man, get your propaganda straight
[ link to this | view in thread ]
[ link to this | view in thread ]
Subtle threat isn't subtle
Between the lines: "they didn't comply with us requesting no encryption, so we killed them off. That's a bad business model, right?"
[ link to this | view in thread ]
Re: Quite the opposite
Mid-term elections are (almost) always about turnout and that won't go in favor of any political party unless their base has a cause (or two or three) to rally behind. The Democratic Party has made the strategic political mistake of trying to be "centrist" when in fact no such political position exists any more in the United States. (I don't say that because I approve of the situation, I say that because it's true.) By moving farther and farther right (in an attempt to catch moving and mythical goalposts) they've lost far more support than they've gained. And now they're paying for it.
[ link to this | view in thread ]
Is the guy from NSA now claiming they killed off blackberry to get ride of encryption?
[ link to this | view in thread ]
Re: Re: Quite the opposite
[ link to this | view in thread ]
Re: Re: Re: Quite the opposite
Just askin'.
'Cause you can stop blaming Obama for whatever happens till the next election NOW.
[ link to this | view in thread ]
So what he is saying is that companies should comply with oppressive regimes that want to monitor all communications because that is a better way of doing business.
Yay for the American way!
[ link to this | view in thread ]
Re: Quite the opposite
When that was no longer true, there was no reason for people to stick with it.
[ link to this | view in thread ]
Re: Re: Quite the opposite
>>they weakened their security in order to operate in
>>certain repressive regimes.
You really could not have phrased that better!
[ link to this | view in thread ]
Re:
[ link to this | view in thread ]
Re: Re:
It's the 21st century. Where's my hovercar, dude?
[ link to this | view in thread ]
Simple question for Stewart Baker and anyone arguing against encryption.
Work?
Home?
Family members?
I'd love to see some reporters ask that question live.
[ link to this | view in thread ]
Re: Lies, damned Lies and even more Damned Lies
Sadly I have no control on the choice of phone.
[ link to this | view in thread ]
Re: Simple question for Stewart Baker and anyone arguing against encryption.
[ link to this | view in thread ]
Re:
And, implying that "bad guys" don't already use encryption or some other sort of obfuscation leads to two premises: one, the government is only capable of catching profoundly stupid criminals; and two, they really, really don't want average citizens to become opaque to mass surveillance.
[ link to this | view in thread ]
[ link to this | view in thread ]
Re:
Which you shouldn't do.
[ link to this | view in thread ]
Perhaps he can tell me what car I should buy, since he knows what I what. Let me guess, one thatcontinuously transmits a GPS signal and can be remotely shutdown if there's reasonable suspicion?
[ link to this | view in thread ]
Re: Re:
The clever thing from a law enforcement perspective with raising this specific debate, is the highlighting of some encryptions not being valuable. Therefore, as soon as they stop talking about encryption as the death of the world, the bad guys will feel uncomfortable. The lack of discussion would be worse than getting hammered in public opinion on this issue...
[ link to this | view in thread ]
Re:
That's what OnStar thinks you want.
[ link to this | view in thread ]
Re: Re:
http://cryptome.org/2014/11/ms-onedrive-nsa-prism.htm
[ link to this | view in thread ]
Re: C'mon man, get your propaganda straight
[ link to this | view in thread ]
Re: Re: Re:
Also you can use Bitlocker without ever signing into a Microsoft account on account creation, thus no OneDrive to upload to. The same is true for Apple's FileVault.
As far as security, they've both pretty well have been vetted, even Bruce Schneier's blog says that they are not bad.
BitLocker
FileVault2
What half of the idiots don't realize is that FDE is only good when the device is turned off, and even then with enough time and effort pretty much anything is vulnerable if they have the hardware.
[ link to this | view in thread ]
Re: Re: Re: Re:
[ link to this | view in thread ]
Re: Re: Re: Re:
AES ?
I am informed that the Earth is believed to be about 4 1/2 billion years old. The best guesses for the age of the universe, I think, are about three times that.
There are also energy considerations. Via Schneier:
[ link to this | view in thread ]
DVD's are encrypted
Good for the goose....
[ link to this | view in thread ]
Re:
[ link to this | view in thread ]
Re: Simple question for Stewart Baker and anyone arguing against encryption.
If he can keep a secret from me, then I want to be able to keep my secret also.
[ link to this | view in thread ]
Re: Re: Re: Re: Re:
I guess you never heard of the evil maid attack, Van Eck phreaking?
Pretty cool experiment if you are interested: Hack-a-day
[ link to this | view in thread ]
Re: Re: Re: Re: Re: Re:
I should have quoted a little bit more, I guess:
The commenter's assertion was: “[T]he device is turned off, and even then with enough time and effort...”
[ link to this | view in thread ]
BB = DoD
[ link to this | view in thread ]
Re: Re: Re: Re: Re:
With a single change, this assertion is correct. The change is to remove the words "pretty much".
Even AES. All of those claims about how it would take longer than the lifespan of the universe to break are based on brute-force attacks, which is not how breaking them is done in the real world.
Ignoring quantum encryption (which is still purely experimental and largely theoretical) and excepting one-time pads (which are very difficult -- although certainly not impossible -- to do properly), there is no encryption scheme which is unbreakable.
The value of encryption is not to keep something a secret forever. If you need to do that, then you're better off using different methods. The value is to make breaking so time-consuming and expensive that by the time it has been accomplished, the data that was encrypted is not so critical anymore.
[ link to this | view in thread ]
Re: Re: Re: Re: Re: Re:
Do you have a proof of that?
To prove:
I've never seen that proof.
No more than I've ever seen a proof that P != NP.
[ link to this | view in thread ]
[ link to this | view in thread ]
Re:
[ link to this | view in thread ]
Re: Re: Re: Re: Re: Re: Re:
We also act in faith to a certain extent that the assumptions behind a particular method of encryption haven't changed. (I.e. a mathematically efficient way to reverse a one-way function or a weakness in "random" number generation has not secretly discovered.)
The "my data is encrypted using xyz method and you will never be able to get to it. Never! Bwahahahaha!" is unrealistic. Methods to protect data are business decisions as well as technical ones, so using commercial tools in a way that reduces the likelihood of preinstalled backdoors is reasonable.
One might presume the reason the NSA screams so loudly about large shifts toward even moderately strong encryption is not because they can never decrypt any particular communication, but rather because they can't easily intercept/store the vast majority of communication (and have a much narrower field of "interesting" encrypted traffic). In other words, the cost/benefit ratio has been shifted dramatically.
After all, if a government really wants my data and is not constrained by law, there are extremely efficient decryption solutions available today that can defeat any known methods of encryption I may have employed.
https://xkcd.com/538/
[ link to this | view in thread ]
Re: Re: Re: Re: Re: Re: Re:
Immediate prior clause from the post
A one time pad, done properly is theoretically unbreakable. Because it uses a pure random key, it is possible to generate a key, of the same length as the message, to translate (decrypt) it into any string of the same length; which includes all meaningful strings of the message length, including padded strings, in all languages that can be represented in the coding scheme that could be represented by the encrypted message. Hence, providing a key that produces a meaningful message is not proof that that is what was sent.
[ link to this | view in thread ]
In what world
In what world do people not care about their privacy Baker is another fear monger
I encrypted my phone just because of people like him clueless
[ link to this | view in thread ]
Re: Re: Re: Re: Re: Re: Re:
[ link to this | view in thread ]
Re: Re: Re: Re: Re: Re: Re: Re:
Intuitively, I believe your claim was "P == NP", and I'm kinda noodling around with an actual proof that is indeed what you claimed.
Fwiw, the other AC's reply also got me to thinking about Kolmogorov complexity.
[ link to this | view in thread ]
This Encryption Arms Race Needs a Change of Tactics
I suggest we take a page out of the spook agencies' handbook and be more aware of who is looking at whom.
The technology to do this readily available and in place, but the funding needed may prevent anything like this from happening.
My vision is to create a system by which standardized honeypots are located in the DMZ of routers and the firmware of mobile devices and then report to a community monitored database that shows who is looking at home in real time.
Using projects like Tomato and DD-WRT and Cyanogenmod to develop an open source honeypot project with standard updates to stay on top of the latest attacks and then each device reporting to a centralized public domain database showing aggregate data that highlights the type of attack and the targets of the attack.
[ link to this | view in thread ]
Re: Re: Re: Re: Re: Re: Re: Re: Re:
Yes, I wasn't going to nitpick this because it's often referred to both ways, and either way is logically the same thing.
[ link to this | view in thread ]
As the years go by, it gets harder and harder to see very much difference between the actions of the US and other 1ˢᵗ world countries. They are all doing the same things and what they are not doing that distinguished them from each other is fading into a blurry undefined border that gets ever more difficult to compare those differences. It's like everyone is going back to a banana republic.
Now add lawyer + NSA and if that isn't recipe to hear a lie, it only misses politician in the mix. While I read what is reportedly said here from the NSA, in the back of my mind I always hear, "This is the NSA and it lies all the time". I now filter all incoming input from that group with that in mind. Nearly nothing do I accept coming from them at face value. It always requires supporting evidence from someone else to have a hint of believability to it. Government does not supply supporting evidence because it too is caught in the same trap. Given that it has lied so much, when it comes time to believe because they need you to have faith, it's not there now. I won't take their info at face value. They have squandered the inherent trust and the ability to be taken at face value with things like "We're the good guys".
[ link to this | view in thread ]
Re: Re: Re: Re: Re:
Which is easy. Any security system is only as strong as it's weakest link. And, in the case of computer security, most of the time you (the user) are the weakest link.
[ link to this | view in thread ]
Re: Re: Re:
[ link to this | view in thread ]
Re: Re: Re: Re: Re: Re:
Oh, you'd like my passord. Happy to oblige.
Right you are! All you have to do is ask the user, and they give it right up.
[ link to this | view in thread ]
Re: Re: Re: Re:
Cool. But it's not atomic jet-powered.
It's the 21st century. Dude, I want my atomic jet-powered hovercar.
[ link to this | view in thread ]
Re: Re: Re: Re: Re:
Most AES implementations used in today's products are seriously flawed, and do not adhere to the theoretical mean time required to brute force the theoretical model.
[ link to this | view in thread ]
Re: Re: Re: Re: Re: Re: Re:
[ link to this | view in thread ]
Re: Re: Re: Re: Re: Re: Re: Re:
Even worse, I'll leak the fact that I seed the urandom pool with input from both:
• Hotbits
• Random.org
That's not too terrible of a leak, insamuch as anyone observing my internet connection can see it. But still...
[ link to this | view in thread ]
Make it yourself encryption.
[ link to this | view in thread ]
Rephrasing Baker's claims for transparency
[ link to this | view in thread ]
[ link to this | view in thread ]
Re: Make it yourself encryption.
Not impossible at all, but if they do then they're fools. It's actually really, really hard to come up with strong homebrew encryption, and it's even harder to verify that the encryption you have is any good.
Crypto is a highly specialized field of mathematics. If you aren't an expert in it, you're begging for trouble by going the DIY route.
[ link to this | view in thread ]
Slippery slope
I'm surprised no one picked up on this slippery slope of abusing rights. It starts by doing "anything" to stop a bad guy (terrorist, child molester, etc). Then when the police break some rules, like gathering data without a warrant, and get their man, this will set a precedent so they can continue doing it. "Just this once" to stop a "terrorist" never seems to be just once.
[ link to this | view in thread ]
What is this the mob?
[ link to this | view in thread ]
[ link to this | view in thread ]
Re:
[ link to this | view in thread ]
Re:
Sokrates is not actually warning of an "evil kind" here: he is rather dismissing them as irrelevant.
[ link to this | view in thread ]
[ link to this | view in thread ]
Re: Re: Re: Re: Re: Re: Re:
And where do you store this password? I'm willing to bet you don't have it memorized.
The nature of passwords is that the harder it is to crack, the harder it is for humans to remember. If the password becomes too difficult to remember, and must be stored, it's now worthless (because the password to store the complex password will need to be easy enough to remember...which defeats the purpose of the complex password).
Either way, the point is that it's much easier to crack a password than the encryption it protects. Computers have gotten powerful enough that even standard computers using a graphics card can test an insane amount of passwords per second. A specialized computer, such as EFF's Deep Crack, would break your hash in under a month.
Passwords are like a door lock. They'll stop someone from easily breaking in, but even the toughest door or most complex lock is only going to buy you time. A determined attacker is getting in.
[ link to this | view in thread ]
And, at least in my memory, the timing of these backdoors corresponded quite closely with RIMs slide out of the marketplace.
[ link to this | view in thread ]