Menu
Obama administration's encryption concerns meant to start a debate

Obama administration's encryption concerns meant to start a debate

The U.S. government still supports using encryption but has questions about law enforcement access to data

U.S. President Barack Obama's administration still believes in the use of encryption to protect digital information, even after top officials have questioned how law enforcement agencies will get access to data on encrypted devices, a White House advisor said.

There is "no scenario" in which the U.S. government wants weaker encryption, Michael Daniel, the White House's cybersecurity coordinator, said Thursday.

But Obama and other officials have raised questions about how to deal with technology that puts information "literally beyond the reach of law enforcement under any sort of due process," Daniel said during a discussion about encryption and law enforcement at the Information Technology and Innovation Foundation in Washington, D.C.

In recent months, FBI director James Comey, U.S. National Security Agency director Michael Rogers and Obama himself have all raised concerns about law enforcement access to encrypted communications.

The officials raised those concerns after moves by Apple and Google to include encryption on smartphone operating systems, in part in response to news reports about large-scale surveillance programs at the NSA. But the concerns were meant to kick start a broad public debate about the amount of data law enforcement agencies should have access to, Daniel said.

Daniel didn't offer any suggestions about how to allow police access to encrypted data without building back doors into devices, but he said it's important for the U.S. to work out a process that is acceptable to police, to tech vendors and to the public. The U.S. needs to come up with a solution that it can show the rest of the world as an alternative to more invasive options being pushed by China and other countries, he said.

"This is a problem that's worth a lot of graduate students' time," he said.

The debate about law enforcement access to electronic devices isn't going away, with the growing adoption of the Internet of things, drones and autonomous vehicles, noted Daniel Castro, vice president at ITIF. Law enforcement agencies will have interest in "similar levels of access" to those technologies as it does to smartphones and other devices, he said.

Other speakers at the ITIF event questioned how a new U.S. policy could create a process for law enforcement agencies to get access to encrypted data without also exposing that data to cyberattackers.

So far, encrypted communications haven't created much of a problem, with the U.S. Courts' 2013 wiretap report showing only nine cases nationwide where encryption limited police from gaining access to information, said Amie Stepanovich, senior policy counsel at Access, a digital rights group.

Encrypted data may make some police work more difficult, and law enforcement agencies may have to resurrect old tactics that focus on individual suspects, she said. Encryption won't make police work "harder than it historically was," Stepanovich added. "You're going to have to step back from the model that's emerged with the Internet Age, of collecting all the information and being able to analyze it, and you'll have to go back to the targeted surveillance model."

Even without access to encrypted smartphone data, U.S. police agencies have many ways to track suspects, including email and telephone metadata, airplanes that mimic cell towers and license plate readers, panelists said.

"The notion of the government going dark I don't think is accurate," said Bruce Heiman, a lawyer focused on U.S. policy and regulations with the K&L Gates law firm. "The government is awash in data."

Government agencies have a lot of "tools" to gain access to information they want, added David O'Neil, a partner in the Debevoise and Plimpton law firm and a former head of the criminal division in the U.S Department of Justice. Law enforcement agencies so far haven't publicly identified a criminal or terrorism case that fell apart because of a lack of access to encrypted data, he said.

"I am confident that [encryption] won't be a deal breaker for law enforcement," he added.

Grant Gross covers technology and telecom policy in the U.S. government for The IDG News Service. Follow Grant on Twitter at GrantGross. Grant's email address is grant_gross@idg.com.

Subscribe here for up-to-date channel news

Follow Us

Join the New Zealand Reseller News newsletter!

Error: Please check your email address.

Tags Information Technology and Innovation FoundationinternetBarack ObamaK&L GatesprivacyDaniel CastroMichael RogersMichael DanielU.S. FBIDebevoise and PlimptonsecurityAmie StepanovichBruce HeimanencryptiongovernmentAccessU.S. Department of JusticeU.S. White HouseregulationU.S. National Security AgencyDavid O'NeilJames Comey

Featured

Slideshows

StorageCraft celebrates high achievers at its inaugural A/NZ Partner Awards

StorageCraft celebrates high achievers at its inaugural A/NZ Partner Awards

Revealed at a glitzy bash in Sydney at the Ivy Penthouse, the first StorageCraft Partner Awards locally saw the vendor honour its top-performing partners with ASI Solutions, SMBiT Pro, Webroot, ACA Pacific and Soft Solutions New Zealand taking home the top awards. Photos by Maria Stefina.

StorageCraft celebrates high achievers at its inaugural A/NZ Partner Awards
Kiwi resellers make a splash on Synnex and Lenovo RotoVegas road trip

Kiwi resellers make a splash on Synnex and Lenovo RotoVegas road trip

​Synnex and Lenovo hosted 18 resellers for an action-packed weekend adventure in RotoVegas, taking in white water rafting on the Kaituna River, as well as quad biking and dinner at Stratosfare​, overlooking Lake Rotorua at the top of Mount Ngongotaha​. Photos by Synnex.

Kiwi resellers make a splash on Synnex and Lenovo RotoVegas road trip
Show Comments