{"id":8446,"date":"2017-07-25T08:10:07","date_gmt":"2017-07-25T16:10:07","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/07\/25\/news-2220\/"},"modified":"2017-07-25T08:10:07","modified_gmt":"2017-07-25T16:10:07","slug":"news-2220","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2017\/07\/25\/news-2220\/","title":{"rendered":"Going dark: encryption and law enforcement"},"content":{"rendered":"<p><strong>Credit to Author: William Tsing| Date: Tue, 25 Jul 2017 15:00:18 +0000<\/strong><\/p>\n<p>We\u2019re hearing it a lot lately: encryption is an insurmountable roadblock between law enforcement and keeping us safe. They can\u2019t gather intelligence on terrorists because they use encryption. They can\u2019t convict criminals because they won&#8217;t hand over encryption keys. They can\u2019t stop bad things from happening because bad guys won\u2019t unlock their phones. Therefore\u2014strictly to keep us safe\u2014the tech industry must provide them with means to weaken, circumvent, or otherwise subvert encryption, all for the public good. No \u201cbackdoors\u201d, mind you; they simply want a way for encryption to work for good people, but not bad. This is dangerous nonsense, for a lot of reasons.<\/p>\n<h3>1. It\u2019s technically incorrect<\/h3>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-18887 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/07\/63526000.jpg\" alt=\"\" width=\"250\" height=\"250\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/07\/63526000.jpg 250w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/07\/63526000-150x150.jpg 150w\" sizes=\"auto, (max-width: 250px) 100vw, 250px\" \/><\/p>\n<p>Encryption sustains its value by providing an end to end protection of data, as well as what we call \u201cdata at rest.\u201d Governments have asked for both means of observing data in transit, as well as retrieving data at rest on devices of interest. They also insist that they have no interest in weakening encryption as a whole, but just in retrieving the information they need for an investigation. From a technical perspective, this is contradictory gibberish. An encryption algorithm either encodes sensitive data or it doesn\u2019t\u2014the only method for allowing a third-party to gain access to plain-text data would be to either provide them with the private keys of the communicants in question or maintain an exploitable flaw in the algorithm that a third-party could take advantage of. Despite government protestations to the contrary, this makes intuitive sense: how could you possibly generate encryption secure against one party (hackers) but not another (government)? <strong><em>Algorithms cannot discern good intentions, so they must be secure against everyone.<\/em><\/strong><\/p>\n<h3>2. They have a myriad of other options to get what they need<\/h3>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-18890 size-medium aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/07\/shutterstock_416392966-300x200.jpg\" alt=\"\" width=\"300\" height=\"200\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/07\/shutterstock_416392966-300x200.jpg 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/07\/shutterstock_416392966.jpg 500w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>Let&#8217;s assume for a moment that a government entity has a reasonable suspicion that a crime has been committed, a reasonable certainty that a certain person did it, and a reasonable suspicion that evidence leading to a conviction lies on an encrypted device. Historically, government entities have\u00a0not checked all these boxes before attempting to subvert decryption, but let\u2019s give them the benefit of the doubt for the moment. Options available to various levels of law enforcement and\/or intelligence include, but are not limited to:<\/p>\n<ul>\n<li>Eavesdropping on unencrypted or misconfigured comms of a suspect\u2019s contact<\/li>\n<li>Collecting unencrypted metadata to characterize the encrypted data<\/li>\n<li>Detaining the suspect indefinitely until they &#8220;voluntarily&#8221; decrypt the device<\/li>\n<li>Geolocation to place the suspect in proximity to the crime<\/li>\n<li>Link analysis to place the suspect in social contact with confirmed criminals<\/li>\n<li>Grabbing unencrypted data at rest from compliant third party providers<\/li>\n<li>Eavesdropping on other channels where the suspect describes the encrypted data<\/li>\n<li><a href=\"https:\/\/xkcd.com\/538\/\" target=\"_blank\" rel=\"noopener noreferrer\">Wrench decryption<\/a><\/li>\n<\/ul>\n<p>Given the panoply of tools available to the authorities, why would they need to start an investigation by breaking the one tool available to the average user that keeps their data safe from hackers?<\/p>\n<h3>3. They\u2019re not really \u201cgoing dark\u201d<\/h3>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-18891 size-medium aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/07\/shutterstock_86230-232x300.jpg\" alt=\"\" width=\"232\" height=\"300\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/07\/shutterstock_86230-232x300.jpg 232w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/07\/shutterstock_86230-464x600.jpg 464w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/07\/shutterstock_86230.jpg 773w\" sizes=\"auto, (max-width: 232px) 100vw, 232px\" \/><\/p>\n<p>In 1993, a cryptographic device called the \u201c<a href=\"https:\/\/epic.org\/crypto\/clipper\/\" target=\"_blank\" rel=\"noopener noreferrer\">clipper chip<\/a>\u201d was proposed by the government to encrypt data while holding private keys in a \u201ckey escrow\u201d controlled by law enforcement. Rather than breaking the encryption, law enforcement would have simply had a decryption key available. For everyone. An academic analysis of why this was a stunningly bad idea can be found <a href=\"https:\/\/www.schneier.com\/academic\/archives\/1997\/04\/the_risks_of_key_rec.html\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/p>\n<p>Given that this program was shuttered in response to an overwhelmingly negative public opinion, has law enforcement and intelligence agencies been unable to collect data for the past 24 years? Or have they turned to other investigatory tools available to them as appropriate?<\/p>\n<h3>4. If we do give them a backdoor, what would they do with it?<\/h3>\n<p>1984-style heavy handed tactics are unlikely at present time, but a government breach that results in loss of control of the backdoor? Much more likely. The <a href=\"https:\/\/oversight.house.gov\/wp-content\/uploads\/2016\/09\/The-OPM-Data-Breach-How-the-Government-Jeopardized-Our-National-Security-for-More-than-a-Generation.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">breach at OPM<\/a>\u00a0most likely endangered the information of up to a third of adult Americans, depending on who and how you count. (We don\u2019t know for sure because the government didn\u2019t say how they counted.) That breach involved data of sensitive, valuable, government employees. Would they do any better with a backdoor that impacts technology used by pretty much everyone?<\/p>\n<h4><a href=\"https:\/\/arstechnica.com\/tech-policy\/2017\/02\/former-nsa-contractor-may-have-stolen-75-of-taos-elite-hacking-tools\/\" target=\"_blank\" rel=\"noopener noreferrer\">No<\/a>, <a href=\"https:\/\/www.nytimes.com\/2017\/03\/07\/world\/europe\/wikileaks-cia-hacking.html\" target=\"_blank\" rel=\"noopener noreferrer\">they<\/a>\u00a0<a href=\"https:\/\/www.buzzfeed.com\/jasonleopold\/the-cias-secret-2009-data-breach-revealed-for-the-first-time?utm_term=.khVADdrw9#.wt5NO2MPJ\" target=\"_blank\" rel=\"noopener noreferrer\">wouldn\u2019t<\/a>.<\/h4>\n<p>Let&#8217;s take a look at how they secure their own networks, post OPM. <a href=\"https:\/\/www.hsgac.senate.gov\/media\/minority-media\/final-coburn-oversight-report-finds-major-problems-in-dhs\" target=\"_blank\" rel=\"noopener noreferrer\">Oh<\/a> <a href=\"https:\/\/twitter.com\/ericgeller\/status\/887317038196240384\" target=\"_blank\" rel=\"noopener noreferrer\">dear<\/a>&#8230;.<\/p>\n<p>If the most powerful and richest government in the world cannot secure their own classified data, why should we trust them with ours? The former head of the FBI once called for an \u201cadult conversation\u201d on encryption. We agree. So here\u2019s a modest counter-proposal:<\/p>\n<ul>\n<li>Stop over-classifying cyberthreat intelligence. The security community cannot fix what it does not know. Threat intelligence over a year old is effectively worthless.<\/li>\n<li>Send subject matter experts to participate in <a href=\"https:\/\/www.nationalisacs.org\" target=\"_blank\" rel=\"noopener noreferrer\">ISACs<\/a>, not \u201cliaisons.\u201d<\/li>\n<li>Collaborate in the ISACs in good faith: shared intelligence should have context and collaboration should extend beyond lists of IOCs.<\/li>\n<li>Exchange analytic tradecraft: analysts in the government often use techniques that while obscure, are not classified. This will improve tradecraft on both sides.<\/li>\n<li>Meet the DHS standard for securing your own machines, classified or otherwise. No one would trust someone with a key escrow if those keys are held in a leaky colander.<\/li>\n<\/ul>\n<p>We think these are reasonable requests that can help keep people safe, without breaking the encryption the world relies on daily to do business, conduct private conversations, and on occasion, express thoughts without fear of reprisal. We hope you agree.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/security-world\/2017\/07\/going-dark-encryption-and-law-enforcement\/\">Going dark: encryption and law enforcement<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/security-world\/2017\/07\/going-dark-encryption-and-law-enforcement\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: William Tsing| Date: Tue, 25 Jul 2017 15:00:18 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/security-world\/2017\/07\/going-dark-encryption-and-law-enforcement\/' title='Going dark: encryption and law enforcement'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/07\/key.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>There&#8217;s been a lot of talk recently about encryption and how law enforcement can&#8217;t convict criminals without encryption keys. We beg to differ.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/security-world\/government\/\" rel=\"category tag\">Government<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/security-world\/privacy-security-world\/\" rel=\"category tag\">Privacy<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/security-world\/\" rel=\"category tag\">Security world<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/backdoor\/\" rel=\"tag\">backdoor<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/encryption\/\" rel=\"tag\">encryption<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/government\/\" rel=\"tag\">government<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/law-enforcement\/\" rel=\"tag\">law enforcement<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/privacy\/\" rel=\"tag\">privacy<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/security-world\/2017\/07\/going-dark-encryption-and-law-enforcement\/' title='Going dark: encryption and law enforcement'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/security-world\/2017\/07\/going-dark-encryption-and-law-enforcement\/\">Going dark: encryption and law enforcement<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[10836,10439,1328,560,5897,10497],"class_list":["post-8446","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-backdoor","tag-encryption","tag-government","tag-law-enforcement","tag-privacy","tag-security-world"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/8446","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=8446"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/8446\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=8446"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=8446"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=8446"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}