Encryption & Key Management , Enterprise Mobility Management / BYOD , Governance

Finding a Way to Access Encrypted Data

FBI's Comey Rejects Cryptographers' View on Technical Barriers
Finding a Way to Access Encrypted Data
Deputy Attorney General Sally Quillian Yates and FBI Director James Comey

FBI Director James Comey says he has faith in American technological ingenuity to overcome obstacles and give law enforcement the ability to access and decrypt data on the devices of criminals and terrorists.

See Also: Webinar | Passwords: Here Today, Gone Tomorrow? Be Careful What You Wish For.

Comey testified before the Senate Judiciary Committee on July 8, one day after a dozen cryptographers and cybersecurity specialists published a paper that contends it's unrealistic to create a so-called "backdoor" to allow law enforcement and intelligence agencies to decrypt coded information (see Experts Blast Encryption Backdoor Plan). The paper's authors assert that any process or technology that would allow law enforcement to decrypt data could be used by bad actors as well.

Neither Comey nor Deputy Attorney General Sally Quillian Yates, who also testified, offered a technical solution that could give law enforcement access to encrypted data without providing hackers with the same privileges. Still, Comey said he rejected the cryptographers' supposition that such technical obstacles cannot be surmounted.

"This is a really, really hard problem," Comey testified. "You hear lots of folks say it's too hard; it can't be fixed. My reaction to that is, 'Really?' I think Silicon Valley is full of folks who, when they stood in their garages years ago [and] were told that their dreams were too hard to achieve, thank goodness, they didn't listen and they built remarkable things that changed all of our lives.

"Maybe this is too hard, but given the stakes, given the importance of securing the Internet, and public safety for the good folks of this country, we've got to give it a shot. I don't think it's been given an honest, hard look."

Working with Industry

Yates, the No. 2 official at the Justice Department, told the lawmakers that the Obama administration was not seeking a "one size, fits all legislative solution at this point to essentially cram down the throats of technology industry."

Rather, Yates said, the government seeks individual meetings with technology companies to develop ways to help the vendors respond to court orders giving law enforcement access to encrypted data. "We're not seeking a front door, backdoor or any other kind of door," she said. "We're not seeking for the government to have direct access to these communications. But we are seeking to work with the industry such that they would be able to respond to these valid [court] orders."

Encryption became more of an obstacle for law enforcement when Apple and Google last year announced that they would design their smartphone systems to give device owners complete control over encryption keys. Once a smartphone is sold, even the manufacturers cannot decrypt coded data without the owner's permission.

Comey explained why law enforcement needs access to encrypted data. One example he provided involves how the Islamic State, also known as ISIL or ISIS, uses Twitter to recruit terrorists in the United States. Though law enforcement can monitor the Twitter conversations, ISIL eventually communicates with some of its 21,000 English-language followers through end-to-end encrypted messaging. "This is an enormous problem," Comey said. "It is different. Al-Qaeda would never vet an operative by tasking them. ISIL says, 'Go kill, go kill. Here's a list of military members you can kill. Go do it.'

"We are stopping these things so far through tremendous hard work, use of sources, the use of online undercovers, but it is incredibly difficult. I cannot see me stopping these indefinitely. I'm not trying to scare folks. I just want people to know that this a change in my world, the top responsibility of the FBI, that implicates this growing dark problem."

Bypassing a Backdoor

Another witness, Herbert Lin of the think tank Hoover Institution, said even if vendors agreed to give law enforcement access to encrypted data, that wouldn't necessarily prevent a device owner from installing an app created by a third party overseas to circumvent a backdoor. Then, the government would "have to prevent people from bringing into the U.S. [those] apps from abroad," which would require "an Internet firewall around the United States that blocks such apps and border inspections and import controls," said Lin, a senior research scholar for international security and cooperation.

It's a point expanded on by the committee's ranking member, Sen. Patrick Leahy, D-Vt. "Some say that any competent Internet user would be able to download strong encryption technology, or install an app allowing encrypted communications, regardless of restrictions on American businesses," he said. "But it would put American companies at a disadvantage in the global marketplace."


About the Author

Eric Chabrow

Eric Chabrow

Host & Producer, ISMG Security Report; Executive Editor, GovInfoSecurity & InfoRiskToday

Chabrow hosts and produces the semi-weekly podcast ISMG Security Report and oversees ISMG's GovInfoSecurity and InfoRiskToday. He's a veteran multimedia journalist who has covered information technology, government and business.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.eu, you agree to our use of cookies.