Back Down The Rabbit Hole About Encryption On Smartphones

from the the-rule-of-law dept

Deputy Attorney General Rod Rosenstein wrote the disapproving memo that President Trump used as a pretext to fire FBI Director James Comey in May. But on at least one area of law-enforcement policy, Rosenstein and Comey remain on the same page—the Deputy AG set out earlier this month to revive the outgoing FBI director's efforts to limit encryption and other digital security technologies. In doing so, Rosenstein has drawn upon nearly a quarter century of the FBI's anti-encryption tradition. But it's a bad tradition.

Like many career prosecutors, Deputy Attorney General Rod Rosenstein is pretty sure he's more committed to upholding the U.S. Constitution and the rule of law than most of the rest of us are. This was the thrust of Rosenstein's recent October 10 remarks on encryption, delivered to an audience of midshipmen at the U.S. Naval Academy.

The most troubling aspect of Rosenstein's speech was his insistence that, while the government's purposes in defeating encryption are inherently noble, the motives of companies that provide routine encryption and other digital-security tools (the way Apple, Google and other successful companies now do) are inherently selfish and greedy.

At the same time, Rosenstein said those who disagree with him on encryption policy as a matter of principle—based on decades of grappling with the public-policy implications of using strong encryption versus weak encryption or no encryption—are "advocates of absolute privacy." (We all know that absolutism isn't good, right?)

In his address, Rosenstein implied that federal prosecutors are devoted to the U.S. Constitution in the same way that Naval Academy students are:

"Each Midshipman swears to 'support and defend the Constitution of the United States against all enemies, foreign and domestic.' Our federal prosecutors take the same oath."

Of course, he elides the fact that many who differ with his views on encryption—including yours truly, as a lawyer licensed in three jurisdictions—have also sworn, multiple times, to uphold the U.S. Constitution. What's more, many of the constitutional rights we now regard as sacrosanct, like the Fifth Amendment privilege against self-incrimination, were only vindicated over time under our rule of law—frequently in the face of overreaching by law-enforcement personnel and federal prosecutors, all of whom also swore to uphold the Constitution.

The differing sides of the encryption policy debate can’t be reduced to supporting or opposing the rule of law and the Constitution. But Rosenstein chooses to characterize the debate this way because, as someone whose generally admirable career has been entirely within government, and almost entirely within the U.S. Justice Department, he simply never attempted to put himself in the position of those with whom he disagrees.

As I've noted, Rosenstein's remarks draw on a long tradition. U.S. intelligence agencies, together with the DOJ and the FBI, reflexively resorted to characterizing their opponents in the encryption debate as fundamentally mercenary (if they're companies) or fundamentally unrealistic (if they're privacy advocates). In Steven Levy's 2001 book Crypto, which documented the encryption policy debates of the 1980s and 1990s, he details how the FBI framed the question for the Clinton administration:

"What if your child is kidnapped and the evidence necessary to find and rescue your child is unrecoverable because of 'warrant-proof' encryption?"

The Clinton administration's answer—deriving directly from George H.W. Bush-era intelligence initiatives—was to try to create a government standard built around a special combination of encryption hardware and software, labeled "the Clipper Chip" in policy shorthand. If the U.S. government endorsed a high-quality digital-security technology that also was guaranteed not to be "warrant-proof"—that allowed special access to government agents with a warrant—the administration asserted this would provide the appropriate "balance" between privacy guarantees and the rule of law.

But, as Levy documents, the government's approach in the 1990s raised just as many questions then as Rosenstein's speech raises now. Levy writes:

"If a crypto solution was not global, it would be useless. If buyers abroad did not trust U.S. products with the [Clipper Chip] scheme, they would eschew those products and buy instead from manufacturers in Switzerland, Germany, or even Russia."

The United States' commitment to rule of law also raised questions about how much our legal system should commit itself to enabling foreign governments to demand access to private communications and other data. As Levy asked at the time:

"Should the United States allow access to stored keys to free-speech—challenged nations like Singapore, or China? And would France, Egypt, Japan, and other countries be happy to let their citizens use products that allowed spooks in the United States to decipher conversations but not their own law enforcement and intelligence agencies?"

Rosenstein attempts to paint over this problem by pointing out that American-based technology companies have cooperated in some respects with other countries' government demands—typically over issues like copyright infringement or child pornography rather than digital-security technologies like encryption. "Surely those same companies and their engineers could help American law enforcement officers enforce court orders issued by American judges, pursuant to American rule of law principles," he says.

Sure, American companies, like companies everywhere, have complied as required with government demands designed to block content deemed in illegal in the countries where they operate. But demanding these companies meet content restrictions—which itself at times also raises international rule-of-law issues—is a wholly separate question from requiring companies to enable law-enforcement everywhere to obtain whatever information they want regarding whatever you do on your phone or on the internet. This is particularly concerning when it comes to foreign governments' demands for private content and personal information, which might include providing private information about dissidents in unfree or "partly free" countries whose citizens must grapple with oppressive regimes.

Technology companies aren't just concerned about money—it's cheaper to exclude digital security measures than to invent and install new ones (such as Apple's 3D-face-recognition technology set to be deployed in its new iPhone X). Companies do this not just to achieve a better bottom line but also to earn the trust of citizens. That's why Apple resists pressure, both from foreign governments and from the U.S. government, to develop tools that governments—and criminals—could use to turn my iPhone against me. This matters even more in 2017 and beyond—because no matter how narrowly a warrant or wiretap order is written, access to my phone and other digital devices is access to more or less everything in my life. The same is true for most other Americans these days.

Rosenstein is certainly correct to have said "there is no constitutional right to sell warrant-proof encryption"—but there absolutely is a constitutional right to write computer software that encrypts my private information so strongly that government can't decrypt it easily. (Or at all.) Writing software is generally understood to be presumptively protected expression under the First Amendment. And, of course, one needn't sell it—many developers of encryption tools have given them away for free.

What's more, our government's prerogative to seek information pursuant to a court-issued order or warrant has never been understood to amount to a "constitutional right that every court order or search warrant be successful." It's common in our law-enforcement culture—of which Rosenstein is unquestionably a part and partisan—to invert the meaning of the Constitution's limits on what our government can do, so that that law-enforcement procedures under the Fourth and Fifth Amendments are interpreted as a right to investigatory success.

We've known this aspect of the encryption debate for a long time, and you don't have to be a technologist to understand the principle involved. Levy quotes Jerry Berman, then of the Electronic Frontier Foundation and later the founder of the Center for Democracy and Technology, on the issue: "The idea that government holds the keys to all our locks, even before anyone has been accused of committing a crime, doesn't parse with the public."

As Berman bluntly sums it up, "It's not America."

Mike Godwin (@sfmnemonic) is a distinguished senior fellow at the R Street Institute.

Hide this

Thank you for reading this Techdirt post. With so many things competing for everyone’s attention these days, we really appreciate you giving us your time. We work hard every day to put quality content out there for our community.

Techdirt is one of the few remaining truly independent media outlets. We do not have a giant corporation behind us, and we rely heavily on our community to support us, in an age when advertisers are increasingly uninterested in sponsoring small, independent sites — especially a site like ours that is unwilling to pull punches in its reporting and analysis.

While other websites have resorted to paywalls, registration requirements, and increasingly annoying/intrusive advertising, we have always kept Techdirt open and available to anyone. But in order to continue doing so, we need your support. We offer a variety of ways for our readers to support us, from direct donations to special subscriptions and cool merchandise — and every little bit helps. Thank you.

–The Techdirt Team

Filed Under: crypto wars, doj, encryption, going dark, privacy, rod rosenstein, rule of law


Reader Comments

Subscribe: RSS

View by: Time | Thread


  1. identicon
    Anonymous Coward, 27 Oct 2017 @ 9:46am

    "pretty sure he's more committed to upholding the U.S. Constitution and the rule of law than most of the rest of us are."

    Moet people do not like this sort of holier than thou bullshit

    link to this | view in thread ]

  2. identicon
    Anonymous Coward, 27 Oct 2017 @ 9:59am

    When the government starts with a presumption of righteousness in all cases and when people generally follow rules and laws without question, where is the space for fixing a broken system?

    link to this | view in thread ]

  3. identicon
    Anonymous Coward, 27 Oct 2017 @ 10:01am

    Re:

    Not to mention re-defining words to be interpretable any way you want and the fact that many of the founder's intents are either ignored or are irrelevant today.

    link to this | view in thread ]

  4. icon
    ThaumaTechnician (profile), 27 Oct 2017 @ 10:03am

    Thread is Godwinned even before the first comment.

    Great to see a certified Internet celebrity posting here.

    From Rosenstein's speech: "On the morning of the attack, one of the terrorists exchanged 109 instant messages with an overseas terrorist." A few words later: "Responsible encryption can involve effective, secure encryption that allows access only with judicial authorization."

    Yeah, you wouldn't have had the authorization in time, aside from what if the terrorists used codewords in plaintext communications?

    Besides, if the FBI and the CIA spend their time actually investigating, rather than _creating_ terrorists, lying to Congress, etc, etc, and maybe put those to started illegal wars on trial, I'd pay attention.

    link to this | view in thread ]

  5. identicon
    Anonymous Coward, 27 Oct 2017 @ 10:13am

    So you're okay with the meta-data, GPS and cell-tower locations logged?

    Meta-data and location are going to be easily available to gov't (besides every commercial entity that wishes to buy it). By having a cell phone at all, you tacitly agree to be surveilled. Since there's no way around that, you simply ignore it. -- Or is the omission intentional?

    But the criminals disguised as gov't of the former United States of America are not the only invaders of privacy.

    The everyday actuality is that Israeli-owned (and therefore, the state of Israel and Mossad) Amdocs gets nearly all American phone meta-data and is thereby able to find high-value targets:
    https://en.wikipedia.org/wiki/Amdocs

    You don't complain about a foreign state having your meta-data. -- Did you know about that? Does it worry or bother you at all?

    link to this | view in thread ]

  6. identicon
    Anonymous Coward, 27 Oct 2017 @ 10:14am

    Re: So you're okay with the meta-data, GPS and cell-tower locations logged?

    You also don't mention Apple having and selling your meta-data. (You even imply fond of Apple, key indicator of a netwit who trusts corporations.)

    By the way, the only information that can be trusted about the seven mega-corporations that Snowden named is that they give NSA "direct access". They now and then put on shows of going to court to reveal some numbers, but we have no way of even vaguely checking those numbers, nor ANY statements corporations make about how or whether they protect your privacy. But Techdirt clearly believes that corporations can be trusted.

    Anyhoo, you just rant narrowly on the last tiny bit of privacy through encryption. Yet since you've already surrendered 98% of your own phone privacy (and no doubt more by having dozens of other gadgets and online accounts), you're more of a Judas goat than a privacy advisor.

    link to this | view in thread ]

  7. identicon
    Anonymous Coward, 27 Oct 2017 @ 10:17am

    So when are they gonna attempt to outlaw dying? People die and they take their memories with them. Law enforcement can no longer retrieve the data that an individual once had. /s

    Yeah it's right up there with backdoors to encryption.

    link to this | view in thread ]

  8. identicon
    Anonymous Coward, 27 Oct 2017 @ 10:20am

    Also, isn't the ability to keep conversations private part of the right to organize to challenge and change the government? An all powerful government, which is what he is supporting, is a terrible thing to experience.

    link to this | view in thread ]

  9. icon
    afn29129 (profile), 27 Oct 2017 @ 10:29am

    Re: So you're okay with the meta-data, GPS and cell-tower locations logged?

    link to this | view in thread ]

  10. identicon
    Carlie Coats, 27 Oct 2017 @ 10:32am

    poison pill / compromise suggestion

    OK, if he wants to be that way, he's claiming that "righteous" breaking of encryption is OK. Then, let's treat the "unrighteous" breaking, trying to solve some of the problems we have seen with "official" Fourth Amendment related actions:

    • Disclosure of keys and non-warrant breaking of encryption are causes of civil action.
    • Statutory damages are $250,000 per individual breaking or disclosure. (e.g., breaking the encryption on 3 files shall be treated as 3 actions, not 1)
    • Perpetrators are responsible as individuals -- sovereign immunity is not a defense nor justification.
    • Not knowing the law is not a defense (as it has been, e.g., in all those "photographing the police" camera-seizure cases)
    • In court actions, failure to respond to subpoenas -- including "national security"claims-- shall be treated as spoliation. Refusal to respond to subpoenas is justification for adding the refuser to the list of defendants, and shall constitute an additional offense for purpose of computing damages.
    • Statute of limitations is 25 years.
    • Loser pays attorneys' fees.

    Does he consider his "righteous" breaking sufficiently important to balance it with these reasonable penalties for "unrighteous" breaking? If not, why not?

    link to this | view in thread ]

  11. icon
    DannyB (profile), 27 Oct 2017 @ 10:33am

    What we need

    Silicone Valley nerds should be able to come up with encryption that is perfectly secure until a judge signs a warrant. They just haven't tried yet.

    If they can create perpetual motion machines and faster than light drives, this shouldn't be any more difficult of a problem to solve.

    link to this | view in thread ]

  12. identicon
    Anonymous Coward, 27 Oct 2017 @ 10:35am

    What if

    Ok, lets pretend that there is some magical way to accomplish this backdoor/front door/golden key for encryption the way that some politicians is possible.
    In fact, lets also pretend that this magical method only lets the government use it when the targeted party is actually guilty. Remember, we're playing pretend.
    Still following?

    How would any of this help when the would-be bad guy uses unauthorized/illegal encryption?

    link to this | view in thread ]

  13. identicon
    kog999, 27 Oct 2017 @ 11:49am

    Re: What we need

    "Silicone Valley nerds should be able to come up with encryption that is perfectly secure until a judge signs a warrant. They just haven't tried yet"

    That would be a good start. but once they have that tackled they will need to work on having perfectly secure encryption until a law enforcement officer wants to look at the data. only working if there is a valid warrant would be unamerican.

    link to this | view in thread ]

  14. identicon
    Anonymous Coward, 27 Oct 2017 @ 11:54am

    Re: Re: So you're okay with the meta-data, GPS and cell-tower locations logged?

    You bring up a good point and while related, is an entirely different discussion. And, I might add, one that Techdirt has reported on previously, many times with disdain for the practice of corporations collecting and selling your metadata.

    The author isn't saying he's ok with the collection of his metadata, it just isn't relevant to this particular article.

    Go do your research before you rant and rave about someone's supposed hypocrisy and make a bunch of accusations that have no basis in anything remotely close to what we call reality.

    link to this | view in thread ]

  15. identicon
    Rekrul, 27 Oct 2017 @ 12:16pm

    Re:

    So when are they gonna attempt to outlaw dying? People die and they take their memories with them. Law enforcement can no longer retrieve the data that an individual once had. /s

    That's what the Stitchers program is for. :)

    link to this | view in thread ]

  16. identicon
    Rekrul, 27 Oct 2017 @ 12:28pm

    The people calling for warrant-friendly encryption don't appear to understand the problem because it's computer related. They could be lying (which wouldn't surprise me), but let's assume that they truly think computers are magical enough to do what they want.

    Someone should ask them to come up with a plan for making a warrant-friendly lock that keeps the bad guys out, but that the police can open when they need to. Then they need to be asked what will keep whatever plan they come up with from being abused (other than the obviously impeccable character of all law enforcement officers) and how they will keep the bad guys from gaining the same access that the police have.

    I'd be really interested to hear what they come up with.

    link to this | view in thread ]

  17. identicon
    kog999, 27 Oct 2017 @ 12:47pm

    Re:

    that's easy obviously you will only give the master key to the police. There will be a department policy not to abuse it so no abuse can occur. The policy will not give they key to the bad guys. wasn't that easy now whats stopping you nerds again?

    link to this | view in thread ]

  18. identicon
    Anonymous Coward, 27 Oct 2017 @ 12:53pm

    Re: poison pill / compromise suggestion

    Broken encryption is broken encryption, does not matter what the reason is or whether it is just - it is still worthless broken encryption no matter how one looks at it.

    Are these foolish people actually suggesting that we continue to conduct business as usual while knowing that the encryption has been compromised? What sort of liability would a business be accepting if they did this and would the government actually attempt to prosecute them for simply obeying what the government told them to do? That is perverse but not unexpected - sad.

    link to this | view in thread ]

  19. identicon
    Schrodinger, 27 Oct 2017 @ 12:55pm

    Re: Re: What we need

    Leave my cat alone!

    link to this | view in thread ]

  20. identicon
    Anonymous Coward, 27 Oct 2017 @ 12:57pm

    Re: What we need

    - responsible encryption
    - perpetual motion
    - faster than light

    these have something in common, can you find it?

    link to this | view in thread ]

  21. identicon
    Anonymous Coward, 27 Oct 2017 @ 2:25pm

    Why encryption matters

    FBI says they have about 7,000 or 50% encrypted devices they can't get in.
    Consumer Reports says about 2.1 million were stolen in 2014. Applying FBI percentages, that's over 1 million people protected by encryption when their phones were stolen.
    And the theft rate is dropping.
    For all the talk of law enforcement decrying encryption. The reality is, it appears to be reducing crime.

    link to this | view in thread ]

  22. identicon
    Anonymous Coward, 27 Oct 2017 @ 6:51pm

    Re: So you're okay with the meta-data, GPS and cell-tower locations logged?

    You don't complain about the MPAA having our data. You're not really in the best position to gripe about this, blue boy.

    link to this | view in thread ]

  23. icon
    afn29129 (profile), 27 Oct 2017 @ 6:55pm

    Re: Re:

    But that's overlooking bad actor within the 'police'. A point that the person did make. What you would then need is magical encryption that can differentiate good cops from bad cops. Magical unicorns with extreme powers. Unicorns squared. Cosmic unicorns!

    link to this | view in thread ]

  24. icon
    That One Guy (profile), 27 Oct 2017 @ 8:43pm

    "We must destroy your security in order to protect your security."

    Yeah, that's one of the big things that really pisses me off. Not just the arrogant 'We know better than the experts' stance, but the fact that they are trying to screw the public over in the name of protecting the public. They claim that encryption that works is preventing them from solving crimes, completely ignoring all the crimes working encryption prevents.

    Even assuming that every single encrypted phone they can't access was equal to one unsolvable case each that is still a trivial number to the crimes that are prevented by criminals not having access to the contents of stolen phones. Having a phone stolen is bad, having email, banking, social media credentials stolen would be vastly worse, and that is what they are arguing for more of.

    link to this | view in thread ]

  25. icon
    That One Guy (profile), 27 Oct 2017 @ 8:46pm

    Re:

    I'd suggest they consult with the TSA, I hear they had a smashing success with their TSA-friendly lock system, so they seem like the sorts to be consulted on warrant-friendly locks.

    link to this | view in thread ]

  26. identicon
    Anonymous Coward, 28 Oct 2017 @ 9:42am

    Re: Re: What we need

    They are all impossible.

    link to this | view in thread ]

  27. icon
    Tanner Andrews (profile), 28 Oct 2017 @ 11:51am

    Rosenstein is certainly correct to have said "there is no constitutional right to sell warrant-proof encryption"

    He is certainly wrong.

    Initially, there is a right to write such a thing, as the US First Amendment provides for free expression. If I am smart enough to figure out how to do this, I may certainly express and demonstrate my view through the writing. That would include my view that I have really developed ``warrant-proof'' encryption.

    There may be other views, where other people working in the field of encryption, may have doubts that my ROT-13 encryption is truly unbreakable. Those folks are also free to express their views. But, given the general competence of Federal warrant-seeking agencies, I feel pretty confident that ROT-13 would be qualify.

    The second prong, selling, does not negate the first. Courts routinely hold that publishers who charge for copies of their publication retain the First Amendment rights despite the commercial motive in publishing. Valentine v. Chrestensen was a bit of an outlier, if not flatly wrong even on its rather specialized facts.

    Were these things to be otherwise, you could never have had the NY Times publishing ``Pentagon Papers'' information, because the newspaper publishes with the intent of collecting money and the motive of making a profit.

    Wherefore:

    V sneg va gur trareny qverpgvba bs Ebfrafgrva.

    link to this | view in thread ]

  28. identicon
    Anonymous Coward, 28 Oct 2017 @ 1:42pm

    Re:

    Do not be so sure that you can publish warrant proof encryption, because they could do the same as they have for DRM, where publishing a means of breaking it is illegal.

    link to this | view in thread ]

  29. identicon
    Anonymous Coward, 28 Oct 2017 @ 5:25pm

    "which might include providing private information about dissidents in unfree or "partly free" countries whose citizens must grapple with oppressive regimes."

    Complete bullshit. As if americans were that free. Nothing farther from the truth. Millions are poor. Tens of millions more drowned in debt. Too many hooked on drugs. With the biggest penitentiary population on Earth. Most full of fear, hate, paranoia and hysteria towards their peers. But they are free, looool. And all to just be able to buy Chinese plastics anyway.

    And oppressive governments? May I remind you who is oppressing people as Snowden, Assange, KDC, etc. And many millions around the world through all those worlds.

    Mike Godwin and Techdirt are pots calling out the kettles.

    link to this | view in thread ]

  30. identicon
    Anonymous Coward, 28 Oct 2017 @ 5:26pm

    Re:

    Through all those wars...

    link to this | view in thread ]

  31. identicon
    Wra, 30 Oct 2017 @ 2:24pm

    Technology companies aren't just concerned about money—it's cheaper to exclude digital security measures than to invent and install new ones (such as Apple's 3D-face-recognition technology set to be deployed in its new iPhone X). Companies do this not just to achieve a better bottom line but also to earn the trust of citizens. That's why Apple resists pressure, both from foreign governments and from the U.S. government, to develop tools that governments—and criminals—could use to turn my iPhone against me. This matters even more in 2017 and beyond—because no matter how narrowly a warrant or wiretap order is written, access to my phone and other digital devices is access to more or less everything in my life. The same is true for most other Americans these days.

    Some D.C. circles have been pointing at Apple's quiet acquiescence to China's backdoor demands as evidence that Apple cares more about money rather than principle.

    I admit I'm curious why none of the journalists who say encryption backdoors would necessarily mean it would enable criminals + authoritarian gov control emphasize how China is making its communications infrastructure vulnerable and how Apple is staying silent on this.

    link to this | view in thread ]


Follow Techdirt
Essential Reading
Techdirt Deals
Report this ad  |  Hide Techdirt ads
Techdirt Insider Discord

The latest chatter on the Techdirt Insider Discord channel...

Loading...
Recent Stories

This site, like most other sites on the web, uses cookies. For more information, see our privacy policy. Got it
Close

Email This

This feature is only available to registered users. Register or sign in to use it.