FBI Director wants 'adult conversation' about backdooring encryption

How about f**k off – is that adult enough?


FBI Director James Comey is gathering evidence so that in 2017 America can have an "adult" conversation about breaking encryption to make crimefighters' lives easier.

Speaking at Tuesday's 2016 Symantec Government Symposium in Washington, Comey banged on about his obsession with strong cryptography causing criminals to "go dark" and making themselves harder to catch. Comey said that once the election cycle is over, he will be resuming his push to force technology companies to bork their own products, and this time armed with plenty of supporting documentation.

"The conversation we've been trying to have about this has dipped below public consciousness now, and that's fine. Because what we want to do is collect information this year so that next year we can have an adult conversation in this country," he said, AP reports.

"We want to lock some people up, so that we send a message that it's not a freebie to kick in the door, metaphorically, of an American company or private citizen and steal what matters to them. And if we can't lock people up, we want to call (them) out. We want to name and shame through indictments, or sanctions, or public relation campaigns – who is doing this and exactly what they're doing."

Americans do have the right to a measure of privacy in their own homes, cars, or on their electronic devices, he said. But the government also has the right to invade that privacy when law enforcement feels it has probable cause.

Comey referenced the Apple case, where the FBI tried to force Tim Cook's company to build a version of iOS that could bypass the security systems of an iPhone used by the San Bernardino terrorist. The FBI backed down after a third party proved able to get into the handset, and nothing of note was found on it.

But Comey isn't giving up in his quest to introduce a backdoor in encryption systems, or a front door as he prefers to call it. This despite the NSA and the best minds in the crypto business pointing out that it's mathematically impossible to build such an access mechanism that can't be found and exploited by others.

Comey, and others, seem to think that it is possible, despite offering no evidence to support this view. Instead they want to force the technology industry to invent a way to make it possible for them to defeat encryption.

Even supposing such a system was possible and police got a golden key to crypto, there's no guarantee that the method wouldn't leak out. As we saw with the Microsoft Secure Boot fiasco, even the most sensitive golden keys can leak, and a method to break all American crypto systems would be top of the wish list for criminals and foreign powers.

Comey's argument is also predicated on the assumption that criminals will only use American crypto systems. At the last count, two-thirds of the crypto systems out there come from outside the Land of the FreeTM and so would be unaffected.

US tech firms are, of course, very worried about law enforcement's plans. If implemented, any backdoor would kill their sales, both domestically and internationally. American technology sales have already suffered post-Snowden and selling broken crypto would accelerate this decline. ®

Similar topics


Other stories you might like

  • Prisons transcribe private phone calls with inmates using speech-to-text AI

    Plus: A drug designed by machine learning algorithms to treat liver disease reaches human clinical trials and more

    In brief Prisons around the US are installing AI speech-to-text models to automatically transcribe conversations with inmates during their phone calls.

    A series of contracts and emails from eight different states revealed how Verus, an AI application developed by LEO Technologies and based on a speech-to-text system offered by Amazon, was used to eavesdrop on prisoners’ phone calls.

    In a sales pitch, LEO’s CEO James Sexton told officials working for a jail in Cook County, Illinois, that one of its customers in Calhoun County, Alabama, uses the software to protect prisons from getting sued, according to an investigation by the Thomson Reuters Foundation.

    Continue reading
  • Battlefield 2042: Please don't be the death knell of the franchise, please don't be the death knell of the franchise

    Another terrible launch, but DICE is already working on improvements

    The RPG Greetings, traveller, and welcome back to The Register Plays Games, our monthly gaming column. Since the last edition on New World, we hit level cap and the "endgame". Around this time, item duping exploits became rife and every attempt Amazon Games made to fix it just broke something else. The post-level 60 "watermark" system for gear drops is also infuriating and tedious, but not something we were able to address in the column. So bear these things in mind if you were ever tempted. On that note, it's time to look at another newly released shit show – Battlefield 2042.

    I wanted to love Battlefield 2042, I really did. After the bum note of the first-person shooter (FPS) franchise's return to Second World War theatres with Battlefield V (2018), I stupidly assumed the next entry from EA-owned Swedish developer DICE would be a return to form. I was wrong.

    The multiplayer military FPS market is dominated by two forces: Activision's Call of Duty (COD) series and EA's Battlefield. Fans of each franchise are loyal to the point of zealotry with little crossover between player bases. Here's where I stand: COD jumped the shark with Modern Warfare 2 in 2009. It's flip-flopped from WW2 to present-day combat and back again, tried sci-fi, and even the Battle Royale trend with the free-to-play Call of Duty: Warzone (2020), which has been thoroughly ruined by hackers and developer inaction.

    Continue reading
  • American diplomats' iPhones reportedly compromised by NSO Group intrusion software

    Reuters claims nine State Department employees outside the US had their devices hacked

    The Apple iPhones of at least nine US State Department officials were compromised by an unidentified entity using NSO Group's Pegasus spyware, according to a report published Friday by Reuters.

    NSO Group in an email to The Register said it has blocked an unnamed customers' access to its system upon receiving an inquiry about the incident but has yet to confirm whether its software was involved.

    "Once the inquiry was received, and before any investigation under our compliance policy, we have decided to immediately terminate relevant customers’ access to the system, due to the severity of the allegations," an NSO spokesperson told The Register in an email. "To this point, we haven’t received any information nor the phone numbers, nor any indication that NSO’s tools were used in this case."

    Continue reading

Biting the hand that feeds IT © 1998–2021