James Clapper Says Nerd Magic Can Solve Terrorist Content Filtering, Create Safe Encryption Backdoors
from the harry-potter-but-for-lawful-access dept
Former Director of National Intelligence James Clapper went from having a comfortable, shadowy job in a comfortable, shadowy office to being the face of the American surveillance state after the Snowden leaks. Instead of only being periodically hassled by a couple of Intelligence Committee members (mainly Ron Wyden), Clapper was called to account for the NSA's apparent surveillance sins. And he handled it badly.
After plenty of evasive discussion, Clapper finally said, "Oh, you mean those phone records," and ushered in a new era of slightly less bulk metadata collection. But he still made the most of his speaking opportunities to pin the woes of the terrorized world on Snowden, noting his leaks "sped up encryption adoption by seven years." It was an oddly precise estimate, especially given the contradicting evidence showing terrorists hadn't really changed their communication methods in response to the Snowden leaks.
Clapper is no longer the Intelligence Director, but he's still beating the encryption drum during interviews. And it appears he's aligned himself with another former government employee, James Comey. Speaking to the National Press Club in Australia, Clapper called for both harder nerding and tech companies being a (possibly compelled) source of light in the growing darkness.
As governments around the world face the ongoing threat of extremism, former US Director of National Intelligence James Clapper says tech companies have a social "responsibility" to take better care of what appears on their platforms.
[...]
"I do think there is a role to play here in some screening and filtering of what appears in social media," he said.
"In the same way that these companies very directly capitalise on the information that we make available to them and exploit it, it seems that that same ingenuity could be applied in a sensitive way to filtering out or at least identifying some of the more egregious material that appears on social media."
How social media companies are supposed to auto-filter all terrorist content is, of course, left unexplained. When companies like Facebook can't even filter human breasts without screwing it up, it's a stretch to say the problem of terrorist content and communications is just a coding breakthrough away. Considering the vast amount of content posted everyday on major networks, it's not as simple as applying a bit more mental elbow grease. Much of this is relegated to algorithms, simply because there's not enough manpower in the world to handle the input of billions of social media users.
Clapper also called for tech companies to "work with" law enforcement to provide access to encrypted communications.
Clapper suggested that cooperation could mean "law enforcement particularly would be allowed access to encryption" if it could be done in a "safeguarded way."
"I hear the argument about if you share once with one person and it's forever compromised. I'm not sure I really buy into that," he said.
It really doesn't matter whether Clapper "buys" this or not. It's a fact. And it's a fact that's been demonstrated in explicit detail by the leak of NSA software exploits. A hole is hole -- one that can be used for good or for evil. The world's top intelligence agency can't even keep its exploits secure. How are we expected to believe law enforcement agencies are going to keep these backdoors from being discovered and exploited?
Clapper grooved on the Comey vibe during this talk, acting as though tech expertise is some sort of dark art used deliberately to stick it to The Man. Anyone who uses the phrase "miraculous technological things like iPhones" shouldn't expect to have their assertions taken seriously. It suggests the person making them still has trouble distinguishing between innovation and magic. Consequently, it's these sort of people who continually claim "safe" backdoors are possible, rather than being the mythical deus ex machina they actually are.
Thank you for reading this Techdirt post. With so many things competing for everyone’s attention these days, we really appreciate you giving us your time. We work hard every day to put quality content out there for our community.
Techdirt is one of the few remaining truly independent media outlets. We do not have a giant corporation behind us, and we rely heavily on our community to support us, in an age when advertisers are increasingly uninterested in sponsoring small, independent sites — especially a site like ours that is unwilling to pull punches in its reporting and analysis.
While other websites have resorted to paywalls, registration requirements, and increasingly annoying/intrusive advertising, we have always kept Techdirt open and available to anyone. But in order to continue doing so, we need your support. We offer a variety of ways for our readers to support us, from direct donations to special subscriptions and cool merchandise — and every little bit helps. Thank you.
–The Techdirt Team
Filed Under: backdoors, encryption, filtering, james clapper, nerd harder
Reader Comments
Subscribe: RSS
View by: Time | Thread
(I should try this at least once in my life)
And it's both amusing and sad that every single nerd, security expert and otherwise much more tech-savvy person out there has already told him it can't be done and he keeps insisting. He's not even listening, he's dead set in his Magic Key theory. We should nerd harder to create mechanisms that can't be intentionally broken at all (ie: you can't insert backdoors without making it unusable) so people like him can't screw the rest of us.
[ link to this | view in chronology ]
Re:
[ link to this | view in chronology ]
Re: Re:
[ link to this | view in chronology ]
Simon and Garfunkel Put It Best
> And disregards the rest
_The Boxer_
[ link to this | view in chronology ]
Re:
In his defense, in response he himself showed that whatever the nerds do, the powerful can escape the consequences.
[ link to this | view in chronology ]
Re:
It's just another case of actual motivations versus stated mission.
What if you could have access to/control over the entire digital existence of your friends/neighbors/lovers? Of your co-workers/bosses and their bosses? Of your business competitors? Of your personal rivals?
What couldn't you do with all that information so as to force your interests over theirs?
Don't ever be confused by these professional liars' words versus their actual mission. Especially when their end-game motivations couldn't be more obvious.
Ever notice how mass surveillance apologists/promoters like Comey/Clapper/May/Macron and their ilk always frame the discussion in terms of the legitimate mission of "stopping the bad guys". But they only ever pay a passing lip service to WHAT ELSE could (i.e., almost certainly will) be done in abuse of all this private information on everyone. They just give vague reassurances to the public of the legitimate use scenario by describing a unicorn fantasy dreamland of strict oversight and proportional response - when it's plain to see our intelligence communities operate without effective oversight and out of reach of the law.
Mass surveillance is primarily about crushing any challenges to established financial-power interests. Period. No matter if those challenges might come from "terrorists", political/personal/business competitors, or just from citizens legitimately challenging corruption/malfeasance by corporate/government/institutional officials.
[ link to this | view in chronology ]
The Clapper
Just invent a device that allows you to turn encryption on by clapping your hands. Turning it off would be as easy as clapping again.
Clap on! Clap off!
[ link to this | view in chronology ]
https://www.youtube.com/watch?v=BKorP55Aqvg
[ link to this | view in chronology ]
“So…we need to figure out how to make one-way holes? SOMEONE CALL THE ACME CORPORATION!”
[ link to this | view in chronology ]
Re:
Does the ACME CORPORATION have a line of black holes, with different flavors? The colors would all be the same of course, any color you like, so long as it is black.
[ link to this | view in chronology ]
Re: Re:
Of course you could just use the ones already in the Justice Department......
[ link to this | view in chronology ]
I think I see his problem
"I hear the argument about if you share once with one person and it's forever compromised"
In his thinking, it's the sharing of the backdoor key that's the compromising factor. He doesn't even fathom the idea that the very existence of the backdoor itself is the compromising factor.
[ link to this | view in chronology ]
[ link to this | view in chronology ]
Re:
[ link to this | view in chronology ]
Oh, he wants me to do this for free? Well, I suppose I could. He'll have to take a number and get in line behind the other 7,936 people who've asked me to do pro bono development for them over the years, though.
[ link to this | view in chronology ]
Rub some bacon on it,
That works for me,
Rub some bacon on it,
Only the govt can use it,
Rub some bacon on it,
We promise we won't abuse it,
Rub some bacon on it...
[ link to this | view in chronology ]
Unicorns
[ link to this | view in chronology ]
Re: Unicorns
[ link to this | view in chronology ]
Unicorn math
If Unicorns can do the magic math, then clapper can go find a unicorn to do it and leave us nerds alone.
You can't have three lines on a plane perpendicular to each other.
[ link to this | view in chronology ]
Re: Unicorn math
You can if you use government math. Look at the budget, for example. They can take the numbers and make them add up to whatever they want. That's what they use the unicorns in area 51 for.
[ link to this | view in chronology ]
Dont know..
They have been preaching this for along time.
They have been SAYING and TELLING us they can break anything, and built a FEW major intercept locations designed to Crack and break and monitor What goes on, On the internet..
I do know, and have a good amount of experience with computers, hardware and software released to consumers and some of the OLD LARGE computers.
Saying things about how this stuff works from THEIR SIDE, shows me that Most of them have never even taken a computer class.
I have said many times that searching the net and de-crypting ANYTHING hidden would be a monstrous undertaking.. They tried it 1 time in the past and FILLED a 20x20 room 3 foot deep in 1 day. enough information/data to take 3-5 years to sort, unless you had ENOUGH people to do the job. This is an OLD idea of using 1/2 the nation to watch over the other 1/2, and those 1/2 watching the others, watching them..
Over the last 10 - 15 years..The internet has grown Huge. And communication in many forms happens, from programs talking to programs to Data being sent back and forth, from OPEN channels of TXT communication, to Naked pictures.. There are Many peograms from Games to Chat programs that let people communicate with each other..BEING ABLE to find and use/monitor ALL those channels would be a task. All the different chat programs and Languages involved would make it a Task and 1/2...
NOW take a abit more information, that the INTERNET was not designed around GRAPHICS and BROWSERS..those are secondary, and even Further down the line..the OLD internet is a strange place for many. And lots of Keyboard typing.. What you see NOW days with Browsers is about 1/100th of what is behind your browser.
IF someone wants to Create a Private chat..it isnt to hard. Monitoring "ALL" of this, is a Task from hell..You woiuld need Monitoring on Every computer from Point to point, to even trace this..From the Beginning to the END of a chat channel. Even in the USA you will travel between 4-16 Computer systems to GET ANYWHERE.. Iv experienced SOME of the monitoring done in the past, as playing games or chatting CAUSES LAG, Esp when you hit International Borders..
Example: Look at China and North Korea..TRYING to block ANY AND ALL data..Then trying to monitor it. With all the internet, all the cellphone, all the FORMS of communication there is only 1 way to BLOCK IT ALL.. DONT connect to the system, and RUn an EMP field around the country so no one can communicate with a Satellite.. And a waste of power/energy, and resources..
Every time I hear about a Server break-in, I laugh. WE/CORPS keep trying to cut corners and Limit the number of people they PAY to do a job, and AUTOMATE things..Let the computers do it. Critical thinking IS NOT what a computer does, a Computer is only YES/NO.. There are other ways for a computer to decide, but that is the easiest. And as with being a SNEAKY THIEF, its easy to bypass most of the Alarms.. When you have a HUMAN to bypass, you have someone that can THINK/FIGURE out what MIGHT BE HAPPENING..
I laugh because of HOW advanced we are NOW, and WHY things are NOT done to track and verify WHO is on the other end of a Servers connection.
NOW, back to Encryption..
IF I wanted to HIDE something on the net for 1-many..It would not be hard. NO direct communication involved. AS easy as an Advert/POPUP, that goes around the world. And only a FEW know HOW to see/read it..
How about a designed SITE with Updates, and a Picture that has encoding in it.
Or setting up on a remote server ANYWHERE in the world a FAST burst of data that is triggered (at a time/instance/something happening) and sent to Any place/Everyplace.. If you dont know this trick, Lookup Zombie machines/computers..GREAT for DDOS..
TRACKING and decoding everything on the internet, would take 1/2 the power of the internet.. GET the other countries to help and use THEIR resources to do the job, OR create a BIG/LONG connection to EVERY server on the net.. THEN decode the graphic interface of 5-7 computer languages used AND the old internet.. LET computers SORT it, and HUMANS examine it, and ........ 3-5 to 10 years AFTER the fact..
I dont need to continue, it just gets More and more complicated on WHAT/HOW can be done..ANYTHING can be done, but how much time do you have.
As with ALL WAR, you need people on the ground, to identify the bodies.. Unless we can get someone to Knock on the door and arrest someone, a computer can only Point a finger OVER HERE/THERE/SOMEWHERE ELSE..
[ link to this | view in chronology ]
Re: Dont know..
Then your enemy has to keep an offline computer where he does his typing, and does the initial encryption, to feed it into the computer that you've cracked and thereby only upload an encrypted file into the transmission.
Then you devise a virus that infects the flash drive that people use to transmit the file from the offline computer to the online computer, like Stuxnet did to the Iranian centrifuge control machines, so that you can infect the offline system and carry the cleartext information to your cracked beginning point.
Then....
[ link to this | view in chronology ]
Re: Re: Dont know..
[ link to this | view in chronology ]
[ link to this | view in chronology ]
It might be even simpler than we think...
[ link to this | view in chronology ]
Re: It might be even simpler than we think...
SELF GOVERNING..and LET THE PEOPLE TRACK IT DOWN..
[ link to this | view in chronology ]
Invisible, Magic Friend vs. Science
Yet another example of "Teach the Controversy."
[ link to this | view in chronology ]
James Clapper is a War Criminal
"I do think there is a role to play here in some screening and filtering of what appears in social media," he said.
It isn't social media that pushes people into committing acts of terrorism.
Terrorists and their sympathizers are but a symptom of the problem not the root cause.
Governments (ie the powerful) that humiliate, emasculate, coerce, militarily occupy, levy sanctions responsible for the deaths of hundreds of thousands of innocents, kidnap, indefinitely detain people with out charge, torture, assassinate and any other of the dirty deeds employed by those in power to keep the down trodden on their knees are directly responsible for the scourge known as terrorism.
If there were any justice to be found in this universe Mr. Clapper and his cohorts would be dragged before a jury of their peers to answer for their war/Constitutional crimes but as we have seen with Mr. Clappers perjury before congress there are at least two separate systems of justice in the US - one system for the politically connected criminals ensconced within government and another for the great unwashed (ie you and I).
More bombs, mass surveillance and the unicorn solution of compromised encryption algorithms is not the solution - they will only deliver the same bloody results.
Removing the occupying armies and the central banks responsible for the neo-colonialism and the deaths of millions of innocents in the Middle East and Africa would be a good place to start.
[ link to this | view in chronology ]
Re: James Clapper is a War Criminal
If people would realize that's not the intent to begin with, that those in power just want more power, those with money just want more money, and those with control just want more control, you'd be halfway to fixing the real problem.
They don't do this to play theatrics, they know the vast numbers of sheep won't do anything about what they do, this is specifically designed to find the other 1%'ers who WILL do something about it, before they become a threat to those in power, so they can be dealt with. The rest is just a show for the powerless 98% that standby while any hope of salvation evaporates before their eyes.
Yes, "Never attribute to malice what can be attributed to stupidity", but at the same time: "Never attribute to stupidity, what should be attributed to malice." If they have done anything in these last few decades, it's prove that they are not stupid, we are.
[ link to this | view in chronology ]
At least be consistent you dangerous fools
What really annoys me is how they're not even consistent in their message.
On one hand they say the tech people are brilliant and know what they're doing, so clearly they should have no problem doing this, yet at the same time they basically call everyone in the field lying idiots by dismissing the repeated statements about how they're not just asking for the difficult, not the extremely difficult, but the impossible.
So which is it, are the 'nerds' lying buffoons who clearly don't have the knowledge to be able to do it, or are they brilliant individuals who are smart enough to know that you're asking for the impossible?
At this point my assumption is that both of them know that they're asking for the impossible, and that even trying poses a huge risk to the public, but they don't care, either from a stubborn refusal to admit to being wrong(the better option sadly enough), or because they simple do not care about the threat what they're asking for would pose to the public.
[ link to this | view in chronology ]
Re: At least be consistent you dangerous fools
So which is it, are the 'nerds' lying buffoons who clearly don't have the knowledge to be able to do it, or are they brilliant individuals who are smart enough to know that you're asking for the impossible?
It's perfectly possible to believe that people are extremely intelligent and also lying to you. There's nothing requiring that liars also be idiots. Particularly when your rhetoric is, in part, based on the narrative that the tech people are the enemy of law enforcement and national security. Then it becomes easy to claim that all of these really smart people can do this, but they claim they can't because they hate us and therefore we need to pass laws forcing them to do this.
Do these people actually believe that? I wouldn't bet on it.
[ link to this | view in chronology ]
Re: Re: At least be consistent you dangerous fools
Fair enough, I'd forgotten just how antagonistic the relationship they've got towards the tech industry can be/is, so I suppose it is possible to think that the tech people can do it and are just lying about it, if you assume that everyone in the field is lying.
I don't believe that's what they actually believe, but I concede that it is possible for both positions to be true in a fashion under the right mindset.
[ link to this | view in chronology ]
Re: Re: Re: At least be consistent you dangerous fools
[ link to this | view in chronology ]
[ link to this | view in chronology ]
[ link to this | view in chronology ]
To censor or not...?
And who draws the line?
This black-and-white thinking is so naive that words fail me...
[ link to this | view in chronology ]
Re: To censor or not...?
I do, of course!
[ link to this | view in chronology ]
Why Don’t The NSA Do It?
Maybe President Trump can issue an Executive Order to that effect—could that be the missing sprinkling of magic pixie dust that is needed to kick-start the process?
[ link to this | view in chronology ]
Re: Why Don’t The NSA Do It?
And if they don't do it, he could just fire them all!
"YOU'RE FIRED!"
[ link to this | view in chronology ]
Re: Why Don't The NSA Do It?
They did!
That gave us:
I'd say they are making progress...
[ link to this | view in chronology ]
Yeah, you'd think after trying for the last thirty years they would have come up with something.
[ link to this | view in chronology ]
...Mmm, that sounds sexy.
[ link to this | view in chronology ]
[ link to this | view in chronology ]
Re:
Well obviously after they break real encryption and force people to use the Government Approved 'Encryption' the next step is to make using any working encryption illegal, once and for all stopping the ability for terrorists to have private, long-distance conversations. I mean really, terrorists might have no problem murdering people for their aims, but it's not like they'd break the law in order to use working encryption.
It's a fool-proof plan really, and all it will cost will be the safety and security of the entire country, a sacrifice they are more than willing to have the public make.
[ link to this | view in chronology ]
This magic requires....
[ link to this | view in chronology ]
[ link to this | view in chronology ]
[ link to this | view in chronology ]
Ned to try a new narrative
I suggest this; There is no unbreakable encryption, the problem is encryption that takes 10 billion years to break using current technology. An obvious solution presents itself - make computers 100 billion times faster. Then encryption can be broken in a little over a month.
We need to call on governments to invest billions of dollars in basic research, so that we can make computers faster and fight terrorism!
This would have the advantages that it shifts the narrative into something our glorious leaders can understand ($$) and that more basic research tends to benefit everyone.
Omit to tell them that, when they actually develop the new quantum supercomputer, I will just add a couple of digits to my passwords and they will have to start all over again.
[ link to this | view in chronology ]
Re: Ned to try a new narrative
AND every time they TRY to find a way to DECODE what has been done..
They find someone used a blind drop..(not part of the internet)
[ link to this | view in chronology ]
Why hasn't anyone created a 'magic' gun that can only be used to shoot bad guys?
[ link to this | view in chronology ]