This is a living guide to encryption: what it is, what it isnt, why its controversial, and how it might be changed. This guide will be updated as events warrant.
Encryption is the process of scrambling information so only the intended recipients can decipher it. An encrypted message requires a key a series of mathematical values to decrypt it. This protects the message from being read by an unwanted third party. If someone without the key tries to hack in and read the message, theyll see a set of seemingly random characters. Using modern encryption techniques, extracting the original message without the key is nearly impossible.
That basic process is a fundamental building block of network security, ensuring that information can travel over the public internet without being intercepted in transit. Without some form of encryption, it would be impossible to implement basic online services like email, e-commerce, and the SSL system that verifies webpages.
While most uses of encryption are uncontroversial, the wide availability of techniques has opened up new political questions around lawful access. Presented with a warrant for a particular users information, businesses are legally required to turn over all the information they have. But if that information is encrypted and the company doesnt have the key, there may be no way to work back to the original data.
Some products hold copies of user keys and decrypt data when served with a warrant, including Gmail, Facebook pages, and most cloud storage providers. But messaging apps like WhatsApp, Telegram, and Signal do not, and the device encryption used by iOS also makes the phones local data inaccessible. That approach has both privacy and security benefits: since the data is not available outside of the local device, the apps are far more resilient to breaches and centralized attacks.
In 2014, James Comey, the then-director of the FBI, wrote a memo spelling out his concerns about encryption. Those charged with protecting our people arent always able to access the evidence we need to prosecute crime and prevent terrorism even with lawful authority, he wrote.
Comey went on to warn that encryption would make it more difficult for law enforcement to catch suspected criminals. If communications are encrypted by default, he said, the government cant monitor and collect communications, even if a judge allows them to do so. Encryption, he summarized, will have very serious consequences for law enforcement and national security agencies at all levels. Sophisticated criminals will come to count on these means of evading detection. Its the equivalent of a closet that cant be opened. A safe that cant be cracked. And my question is, at what cost?
The governments position on encryption hasnt evolved a whole lot in the intervening years. Attorney General William Barr and Sen. Lindsey Graham (R-SC) argued last year that hardened encryption makes it difficult to figure out when messaging platforms are used to coordinate crimes. If a large-scale terrorist attack is carried out, the government needs to act quickly to understand the national security risks. Hardened encryption could make this discovery process harder.
In 2016, in the wake of the San Bernardino shooting, the FBI asked Apple to hand over information from the suspects iPhone. At first, the company complied, giving the FBI data from the suspects iCloud backup. Then the FBI demanded access to the phones local storage. This would have involved Apple deploying an entirely new version of iOS to the device, which the company refused to do. In a statement, a company spokesperson said: We believed it was wrong and would set a dangerous precedent.
The FBI responded by trying to force Apple to help, citing the All Writs Act of 1789. Just before a hearing on this case, however, the FBI was able to unlock the iPhone using an anonymous third-party company. The phone did not contain much new information the FBI hadnt already had, but the conflict escalated the fight between tech companies and the government over encryption.
In 2019, after the shooting at the Pensacola Naval Air Station, the government again asked for Apples assistance unlocking the suspects iPhone. Apple did not comply, but it did hand over data from the suspects iCloud backups. In response to Apples refusal to unlock the shooters iPhone, President Donald Trump tweeted: We are helping Apple all of the time on TRADE and so many other issues, and yet they refuse to unlock phones used by killers, drug dealers and other violent criminal elements.
A week later, it was revealed that the company had dropped plans to allow users to encrypt their iCloud backups after the FBI argued the move would harm future investigations.
In March 2019, Facebook CEO Mark Zuckerberg published a memo laying out his vision for a new privacy-focused social network. In it, he stated the companys plan to roll out encryption across its various messaging apps. People expect their private communications to be secure and to only be seen by the people theyve sent them to not hackers, criminals, over-reaching governments, or even the people operating the services theyre using, he wrote.
The news set off a firestorm of criticism from certain politicians most notably, AG Barr. In a letter to the company, Barr, along with officials in the United Kingdom and Australia, wrote, Companies should not deliberately design their systems to preclude any form of access to content, even for preventing or investigating the most serious crimes. They added that encryption put people at risk by severely eroding a companys ability to detect and respond to illegal content and activity, such as child sexual exploitation and abuse, terrorism, and foreign adversaries attempts to undermine democratic values and institutions, preventing the prosecution of offenders and safeguarding of victims. They asked Facebook to stop the encryption rollout. Facebook did not comply with this request.
Republicans seem to want US tech companies to comply with law enforcement in the event of a major national security attack. They do not want US tech companies to make accessing user data more complicated through end-to-end encryption. In his letter to Facebook, Barr asked Zuckerberg to allow law enforcement to obtain lawful access to content in a readable and usable format, as reported by The New York Times.
Most Democratic presidential candidates are supportive of end-to-end encryption. When asked whether the government should be able to access Americans encrypted conversations, Sen. Bernie Sanders (I-VT) said: [I] firmly [oppose] the Trump administrations efforts to compel firms to create so-called backdoors to encrypted technologies. Sen. Elizabeth Warren (D-MA) did not answer directly, but she said that the government can enforce the law and protect our security without trampling on Americans privacy. Individuals have a Fourth Amendment right against warrantless searches and seizures, and that should not change in the digital era. During his primary run, former South Bend, Indiana mayor Pete Buttigieg said, End-to-end encryption should be the norm. Former New York City mayor Mike Bloomberg, in an op-ed from 2016, argued against end-to-end encryption and said tech companies shouldnt be above the law in refusing court orders to hand over user data.
Section 230 of the Communications Decency Act protects websites from lawsuits if a user posts something illegal. Theres been a large debate about whether companies should continue to have these protections, with various lawmakers proposing plans to change or amend Section 230.
In January, one proposed change called Eliminating Abusive and Rampant Neglect of Interactive Technologies Act (EARN IT) sought to strip tech companies of their Section 230 protections if they didnt comply with new rules for finding and removing content related to child exploitation. And while the bill, titled the National Strategy for Child Exploitation Prevention, didnt lay out many specifics, complying with these rules would likely mean not encrypting some user data.
Apple has taken the lead on the issue so far, and it has been careful to valorize law enforcement and lawful access provisions, while firmly opposing a backdoor. As CEO Tim Cook framed it in an open letter at the start of the San Bernardino case, Apple is willing to do everything it can including turning over iCloud logs and other user data but unlocking device encryption is a step too far. Up to this point, we have done everything that is both within our power and within the law to help [the FBI], Cook wrote. But now the U.S. government has asked us for something we simply do not have, and something we consider too dangerous to create. They have asked us to build a backdoor to the iPhone.
For the most part, other tech companies have lined up behind Google with the Facebook-owned WhatsApp leading the way. In response to Barrs letter in 2019, Will Cathcart, head of WhatsApp, and Stan Chudnovsky, who works on Messenger, said the company was not prepared to build the government a backdoor in order to access user messages. Cybersecurity experts have repeatedly proven that when you weaken any part of an encrypted system, you weaken it for everyone, everywhere, they wrote. It is simply impossible to create such a backdoor for one purpose and not expect others to try and open it.
Still, many tech companies that rely on government contracts have had to walk a more politically delicate line. Microsoft supported Apple publicly during the San Bernardino case, but more recent statements from Microsoft CEO Satya Nadella have taken a softer line. In January 2020, Nadella expressed opposition to backdoors but optimism about legislative or other technical solutions, saying, We cant take hard positions on all sides.
As tech companies like Facebook continue to move forward with large-scale encryption projects, more major changes could come in the form of legislation aimed at helping or hurting large-scale encryption initiatives. In 2019, Rep. Ted Lieu (D-CA) reintroduced a 2016 bill called the Ensuring National Constitutional Rights for Your Private Telecommunications Act (ENCRYPT), which would create a national standard for encrypted technology. Rep. Zoe Lofgren (D-CA), along with a bipartisan coalition, also introduced the Secure Data Act, which would stop federal agencies from forcing tech companies to build backdoors into their products, thereby weakening encryption. Finally, theres still the draft of the National Strategy for Child Exploitation Prevention, which would make it much harder for tech companies to encrypt their products.
Continued here:
What the 2020 election means for encryption - The Verge
- Quinn: Supreme Court should clarify Fourth Amendment rights in the digital age - April 26th, 2014 [April 26th, 2014]
- Fourth amendment | Wex Legal Dictionary / Encyclopedia ... - April 26th, 2014 [April 26th, 2014]
- The Fourth Amendment is destroyed by the Roberts led Supreme Court. - Video - April 26th, 2014 [April 26th, 2014]
- Protections for e-data clear Senate committee - April 27th, 2014 [April 27th, 2014]
- Weighing The Risks Of Warrantless Phone Searches During Arrests - April 29th, 2014 [April 29th, 2014]
- Court may let cops search smartphones - April 29th, 2014 [April 29th, 2014]
- Supreme Court to hear case on police searches of cellphones - April 29th, 2014 [April 29th, 2014]
- Fourth Amendment in the digital age: Supreme Court to decide if police can search cellphones without a warrant - April 30th, 2014 [April 30th, 2014]
- What Scalia knows about illegal searches - April 30th, 2014 [April 30th, 2014]
- Should police be allowed to search your smartphone - Video - April 30th, 2014 [April 30th, 2014]
- The Shaky Legal Foundation of NSA Surveillance on Americans - May 1st, 2014 [May 1st, 2014]
- Pennsylvania Supreme Court rules police don't need warrants to search cars - May 3rd, 2014 [May 3rd, 2014]
- Local police: Updated vehicle-search law still requires probable cause - May 3rd, 2014 [May 3rd, 2014]
- Liberal Supreme Court Justice Comes To The Defense Of Scalia - May 3rd, 2014 [May 3rd, 2014]
- Smartphones and the Fourth Amendment - Video - May 4th, 2014 [May 4th, 2014]
- Fourth Amendment Defined & Explained - Law - May 6th, 2014 [May 6th, 2014]
- I-Team: Do police seek search warrant friendly judges? - May 8th, 2014 [May 8th, 2014]
- Is Big Brother Listening? Applying the Fourth Amendment in an Electronic Age - Video - May 9th, 2014 [May 9th, 2014]
- Magistrate waxes poetic while rejecting Gmail search request - May 10th, 2014 [May 10th, 2014]
- The Fourth Amendment - Video - May 10th, 2014 [May 10th, 2014]
- License reader lawsuit can be heard, appeals court rules - May 15th, 2014 [May 15th, 2014]
- Seize the Rojo - Video - May 16th, 2014 [May 16th, 2014]
- NSA Spying Has a Disproportionate Effect on Immigrants - May 16th, 2014 [May 16th, 2014]
- Motorists sue Aurora, police in 2012 traffic stop after bank robbery - May 18th, 2014 [May 18th, 2014]
- Judge Says NSA Phone Surveillance Likely Unconstitutional - Video - May 21st, 2014 [May 21st, 2014]
- New York Attorney Heath D. Harte Releases a Statement on Fourth Amendment Rights - May 22nd, 2014 [May 22nd, 2014]
- The Fourth Amendment Rights - Video - May 23rd, 2014 [May 23rd, 2014]
- Bangor Area School District teachers vote no to random drug - May 24th, 2014 [May 24th, 2014]
- I Don't Care About The Contitution, Take Your Fourth Amendment And Shove It The Hills Hotel - Video - May 27th, 2014 [May 27th, 2014]
- Lonestar1776 at Illegal Checkpoint 80 Miles Inside Border - Standing UP & Pushing Back! pt 2/2 - Video - August 31st, 2014 [August 31st, 2014]
- Suit charges Daytona Beach's rental inspection program violates civil rights - September 3rd, 2014 [September 3rd, 2014]
- 4th Amendment - Laws.com - September 4th, 2014 [September 4th, 2014]
- YOU CAN ARREST ME NOW (cops refuse, steal phone) - Video - September 7th, 2014 [September 7th, 2014]
- The Feds Explain How They Seized The Silk Road Servers - September 8th, 2014 [September 8th, 2014]
- Volokh Conspiracy: Does obtaining leaked data from a misconfigured website violate the CFAA? - September 9th, 2014 [September 9th, 2014]
- Defence asks judge in NYC to toss out bulk of evidence in Silk Road case as illegally obtained - September 10th, 2014 [September 10th, 2014]
- Family of a mentally ill woman files lawsuit against San Mateo Co. after deadly shooting - September 10th, 2014 [September 10th, 2014]
- Minnesota Supreme Court upholds airport drug case decision - September 12th, 2014 [September 12th, 2014]
- Law Talk - Obamacare Rollout; Fourth Amendment, NSA Spying Stop & Frisk DUI Check Points lta041 - Video - September 12th, 2014 [September 12th, 2014]
- Volokh Conspiracy: The posse comitatus case and changing views of the exclusionary rule - September 15th, 2014 [September 15th, 2014]
- Guest: Why the privacy of a public employees cellphone matters - September 16th, 2014 [September 16th, 2014]
- Volokh Conspiracy: Apples dangerous game - September 19th, 2014 [September 19th, 2014]
- Judge expounds on privacy rights - September 20th, 2014 [September 20th, 2014]
- Great privacy essay: Fourth Amendment Doctrine in the Era of Total Surveillance - September 20th, 2014 [September 20th, 2014]
- The Fourth Amendment By Maison Erdman - Video - September 20th, 2014 [September 20th, 2014]
- Volokh Conspiracy: When administrative inspections of businesses turn into massive armed police raids - September 22nd, 2014 [September 22nd, 2014]
- The chilling loophole that lets police stop, question and search you for no good reason - September 23rd, 2014 [September 23rd, 2014]
- Pet Owners Look to Muzzle Police Who Shoot Dogs - September 27th, 2014 [September 27th, 2014]
- Volokh Conspiracy: A few thoughts on Heien v. North Carolina - September 29th, 2014 [September 29th, 2014]
- Volokh Conspiracy: Third Circuit on the mosaic theory and Smith v. Maryland - October 1st, 2014 [October 1st, 2014]
- Volokh Conspiracy: Third Circuit gives narrow reading to exclusionary rule - October 2nd, 2014 [October 2nd, 2014]
- Volokh Conspiracy: Supreme Court takes case on duration of traffic stops - October 3rd, 2014 [October 3rd, 2014]
- Search & Seizure, Racial Bias: The American Law Journal on the Philadelphia CNN-News Affiliate WFMZ Monday, October 6 ... - October 3rd, 2014 [October 3rd, 2014]
- Argument preview: How many brake lights need to be working on your car? - October 3rd, 2014 [October 3rd, 2014]
- The 'Barney Fife Loophole' to the Fourth Amendment - October 3rd, 2014 [October 3rd, 2014]
- Search & Seizure: A New Fourth Amendment for a New Generation? - Promo - Video - October 4th, 2014 [October 4th, 2014]
- Ap Government Fourth Amendment Project - Video - October 4th, 2014 [October 4th, 2014]
- Lubbock Liberty Workshop With Arnold Loewy On The Fourth Amendment - Video - October 5th, 2014 [October 5th, 2014]
- Feds Hacked Silk Road Without A Warrant? Perfectly Legal, Prosecutors Argue - October 7th, 2014 [October 7th, 2014]
- Supreme Court Starts Term with Fourth Amendment Case - October 7th, 2014 [October 7th, 2014]
- Argument analysis: A simple answer to a deceptively simple Fourth Amendment question? - October 9th, 2014 [October 9th, 2014]
- Feds Say That Even If FBI Hacked The Silk Road, Ulbricht's Rights Weren't Violated - October 9th, 2014 [October 9th, 2014]
- Mass Collection of U.S. Phone Records Violates the Fourth Amendment - Video - October 9th, 2014 [October 9th, 2014]
- Leggett sides with civil liberties supporters - October 10th, 2014 [October 10th, 2014]
- Search & Seizure / Car Stops: A 'New' Fourth Amendment for a New Generation? - Video - October 10th, 2014 [October 10th, 2014]
- The Fourth Amendment- The Maininator Period 4 - Video - October 10th, 2014 [October 10th, 2014]
- Judge nukes Ulbricht's complaint about WARRANTLESS FBI Silk Road server raid - October 11th, 2014 [October 11th, 2014]
- Montgomery County will not hold immigrants without probable cause -- Gazette.Net - October 13th, 2014 [October 13th, 2014]
- Debate: Does Mass Phone Data Collection Violate The 4th Amendment? - October 14th, 2014 [October 14th, 2014]
- Does the mass collection of phone records violate the Fourth Amendment? - October 19th, 2014 [October 19th, 2014]
- When Can the Police Search Your Phone and Computer? - October 21st, 2014 [October 21st, 2014]
- Supreme Court to decide if cops can access hotel registries without warrants - October 22nd, 2014 [October 22nd, 2014]
- Third Circuit Allows Evidence from Warrantless GPS Device - October 22nd, 2014 [October 22nd, 2014]
- US court rules in favor of providing officials access to entire email account - October 24th, 2014 [October 24th, 2014]
- EL MONTE POLICE OFFICER VIOLATES ARMY VETERAN'S FOURTH AMENDMENT RIGHT - Video - October 25th, 2014 [October 25th, 2014]
- FBI demands new powers to hack into computers and carry out surveillance - October 30th, 2014 [October 30th, 2014]
- Fourth Amendment (United States Constitution ... - November 4th, 2014 [November 4th, 2014]
- Fourth Amendment - Video - November 4th, 2014 [November 4th, 2014]
- Call Yourself a Hacker and Lose Fourth Amendment Rights - Video - November 5th, 2014 [November 5th, 2014]
- Volokh Conspiracy: Magistrate issues arrest warrants for 17 years but is new to probable cause - November 7th, 2014 [November 7th, 2014]