- Wet Kylo Ren may turn everyone to the dark side 4 Years Ago
- Man allegedly targeted trans women on dating app, robbed them at knifepoint 4 Years Ago
- Researchers expose how Amazon Echo and Google Home can steal passwords 4 Years Ago
- Facebook removing Instagram Story filters that mimic plastic surgery Today 2:16 PM
- Mom solves ‘ghost baby’ image mystery after viral post Today 1:23 PM
- Elon Musk tweeted ‘through space’ Today 1:16 PM
- Don’t want a Fitbit? These step tracker apps got you covered Today 12:51 PM
- Protesters sing ‘Baby Shark’ to soothe frightened toddler Today 12:47 PM
- Who is Babu Frik, the adorable, teeny mechanic from ‘Rise of Skywalker’? Today 12:36 PM
- Senators push for social media data portability Today 12:11 PM
- ‘Stage Fright’ is a therapeutic lens into Jenny Slate’s weird world Today 11:34 AM
- Congressmen call on Twitter to shut down accounts for Hamas, Hezbollah Today 11:12 AM
- How to stream Lakers vs. Clippers Today 11:02 AM
- Popular Twitch streamer banned for something he didn’t even say Today 10:13 AM
- What is going on with C-3PO in the final trailer for ‘The Rise of Skywalker’? Today 10:04 AM
California lawmaker: Ban strong encryption to fight human trafficking
Silicon Valley can’t be pleased about this.
A California state lawmaker wants to ban strong encryption on the grounds that it facilitates human trafficking.
Assemblyman Jim Cooper’s bill would “require a smartphone that is manufactured on or after January 1, 2017, and sold in California, to be capable of being decrypted and unlocked by its manufacturer or its operating system provider.”
The bill would effectively outlaw Apple‘s latest version of its iOS mobile operating system, which uses what is known as end-to-end encryption, a form of protection that even Apple cannot break. Other California-based tech companies, including Android maker Google, are also moving toward strong encryption.
Cooper’s proposal mirrors a New York bill introduced last week that would also require smartphone manufacturers to design their encryption so that law enforcement could break it in the course of an investigation. But while the New York bill’s sponsor cited the threat of terrorism in calling for weakened encryption, Cooper offered a different rationale.
In an interview with Ars Technica, Cooper said that tech companies were stonewalling police and delaying or preventing them from catching human traffickers.
“If you’re a bad guy [we] can get a search record for your bank, for your house, you can get a search warrant for just about anything,” he said. “For the industry to say it’s privacy, it really doesn’t hold any water. We’re going after human traffickers and people who are doing bad and evil things. Human trafficking trumps privacy, no ifs, ands, or buts about it.”
Tech companies and security experts argue that this form of guaranteed access, which amounts to a backdoor in the encryption, jeopardizes Americans’ privacy and security by creating a portal that anyone—not just authorized government personnel—can exploit.
Since the 1990s, government officials have sparred with technologists over whether hardware and software makers should guarantee the government access to encrypted data. This fight, known as the “crypto wars,” gained new urgency late last year after terrorist attacks in Paris and San Bernardino, California.
Some intelligence officials, like FBI Director James Comey, have argued that terrorists hide their plans behind encryption—a phenomenon he calls “going dark”—and that tech companies have a duty to prevent this. Privacy advocates point out that both the United States and France operate mass-surveillance programs designed to pick up indicators of extremist activity and that the failure to prevent the attacks lies with these programs, not tech firms.
Gautam Hans, policy counsel at the Center for Democracy & Technology, called Cooper’s comments about human trafficking and privacy “reductive.”
“Creating vulnerabilities in devices in order to prevent human trafficking is a short-sighted solution—one that makes everyone less secure,” he said in an email. “I would much rather law enforcement use the multiple tools currently at their disposal.”
Ross Schulman, senior policy counsel at New America’s Open Technology Institute, said in an email that the California and New York bills “mistake encryption for the enemy when in fact encryption protects average people every day from identity theft, economic espionage, and fraud.”
The chairman and ranking member of the Senate Intelligence Committee are working on a bill that could ban strong encryption nationally. The ranking member, California Sen. Dianne Feinstein, has repeatedly bucked pressure from Silicon Valley in her home state and endorsed efforts to weaken encryption. She has also proposed other measures that the tech industry loathes, like a bill requiring companies to report terrorist propaganda on their networks.
Google did not respond to a request for comment about Cooper’s bill. Apple declined to comment. A spokesman for California Gov. Jerry Brown (D) did not respond to an email asking whether he would sign the bill if it reached his desk.
“Experts all the way up to the Director of the NSA agree that any gap in the armor weakens the entire system,” Schulman said. “State legislatures need to think very hard before they take [strong encryption] away. ”
Eric Geller is a politics reporter who focuses on cybersecurity, surveillance, encryption, and privacy. A former staff writer at the Daily Dot, Geller joined Politico in June 2016, where he's focused on policymaking at the White House, the Justice Department, the State Department, and the Commerce Department.