Quantcast
Channel: RidgeCook
Viewing all articles
Browse latest Browse all 40

Intel pushback of FBI crypto proposal printed in Fed Govt hometown newspaper

$
0
0

The Intel and DoD establishment has been coming out  against the FBI's campaign to weaken or backdoor encryption programs.  We  can speculate why but the inside fighting first became public at a corporate  forum and now has reached the Editorial page of the govt. "hometown" paper.  Once its been accepted there, then the decisions have been made at the head  office and its just an announcement to the factory floor.  Sure there will  still be hearings and "think" pieces and long winded interviews but Money  Talks, Bullshit Walks.  And there is MONEY to be made if the fact (or  illusion) of program integrity is maintained.  And those who are the white  knights fighting on the side of good?  They left the secret part of the govt  to become "consultants"  in technology and security.  Other words, they are  recognized "experts" who have gravitas with the inhabitants of official  Washington from being"in the trenches".. "If only I could tell you what I  know but I can't, so just believe me."   Well, they are now the mouthpieces  of the software giants and sell both the big programs and grease the way for  the public/private intelligence services.   All of which could be much less  profitable if the FBI proposal gets its big, flat, policeman's shoes in  game.  No thanks.

Or another cynical take could be that that openly creating the hole would push  suspect individuals or organizations away from public applications and create private ones  which would not have the backdoors or strenghtened in other ways.

Otherwords, shut up about backdoors and let us carry one with what we are  doing.

R

------------excerpt----------------

"Why the fear over ubiquitous data encryption is overblown "  By Mike McConnell, Michael Chertoff and William Lynn July 28

Mike McConnell is a former director of the National Security Agency and  director of national intelligence. Michael Chertoff is a former homeland  security secretary and is executive chairman of the Chertoff Group, a  security and risk management advisory firm with clients in the technology  sector. William Lynn is a former deputy defense secretary and is chief  executive of Finmeccanica North America and DRS Technologies.

".....We recognize the importance our officials attach to being able to  decrypt a coded communication under a warrant or similar legal authority.  But the issue that has not been addressed is the competing priorities that  support the companies' resistance to building in a back door or duplicated  key for decryption. We believe that the greater public good is a secure  communications infrastructure protected by ubiquitous encryption at the  device, server and enterprise level without building in means for government  monitoring.

First, such an encryption system would protect individual privacy and  business information from exploitation at a much higher level than exists  today. As a recent MIT paper explains, requiring duplicate keys introduces  vulnerabilities in encryption that raise the risk of compromise and theft by  bad actors. If third-party key holders have less than perfect security, they  may be hacked and the duplicate key exposed. This is no theoretical  possibility, as evidenced by major cyberintrusions into supposedly secure  government databases and the successful compromise of security tokens held  by a major information security firm. Furthermore, requiring a duplicate key  rules out security techniques, such as one-time-only private keys.

Second, a requirement that U.S. technology providers create a duplicate key  will not prevent malicious actors from finding other technology providers  who will furnish ubiquitous encryption. The smart bad guys will find ways  and technologies to avoid access, and we can be sure that the "dark Web"  marketplace will offer myriad such capabilities. This could lead to a  perverse outcome in which law-abiding organizations and individuals lack  protected communications but malicious actors have them.

Finally, and most significantly, if the United States can demand that  companies make available a duplicate key, other nations such as China will  insist on the same. There will be no principled basis to resist that legal  demand. The result will be to expose business, political and personal  communications to a wide spectrum of governmental access regimes with  varying degrees of due process.

Strategically, the interests of U.S. businesses are essential to protecting  U.S. national security interests. After all, political power and military  power are derived from economic strength. If the United States is to  maintain its global role and influence, protecting business interests from  massive economic espionage is essential. And that imperative may outweigh  the tactical benefit of making encrypted communications more easily  accessible to Western authorities. ....

https://www.washingtonpost.com/... 324e-11e5-8353-1215475949f4_story.html


Viewing all articles
Browse latest Browse all 40

Trending Articles



<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>