- Lyft received a whopping 7 sexual assault lawsuits in a day Wednesday 10:00 PM
- High school reopens investigation into Nazi salute video after other racist videos emerge Wednesday 7:14 PM
- Facebook content moderators continue to suffer from brutal working conditions Wednesday 5:58 PM
- #RIPReese: Man bullied for relationship with trans woman dies by suicide Wednesday 4:46 PM
- Redaction error reveals ICE is paying Palantir $49 million Wednesday 4:25 PM
- People are using social media to raise awareness about the Amazon fires Wednesday 4:24 PM
- How to watch ‘Detective Pikachu’ right now Wednesday 3:56 PM
- Walmart is suing Tesla over fires at stores with solar panels Wednesday 3:44 PM
- Jeremy Renner asks nicely for Sony to let Spider-Man back in the MCU Wednesday 2:51 PM
- The best and safest torrenting sites you should be using in 2019 Wednesday 2:47 PM
- ‘Beyoncé’s Assistant for a Day’ creator is releasing more games on storytelling app Yarn Wednesday 1:54 PM
- Why does everyone keep falling for that Instagram and Facebook hoax? Wednesday 1:46 PM
- A bunch of celebrities fell for that viral Instagram hoax Wednesday 1:17 PM
- Former Die Antwoord crew member says video shows ‘homophobic attack’ Wednesday 1:13 PM
- How to stream all the MLS Rivalry Week matches Wednesday 1:13 PM
The office that oversees the U.S. intelligence community released a critical response Thursday to a study that called into question government warnings about the dangers of encryption.
In a letter to Sen. Ron Wyden (D-Ore.), who requested a government analysis of the Harvard University report, Deirdre Walsh, the director of legislative affairs for the Office of the Director of National Intelligence, said the study’s findings “do not fully account for the realities we face.”
The report presented evidence that a decades-long push by senior law-enforcement and intelligence officials to weaken encryption to aid criminal and terrorism investigations is misplaced. Not only is unbreakable, “end-to-end” encryption far from ubiquitous, the report’s authors wrote, but other sources of evidence, including unencrypted metadata and Internet of Things devices, are becoming increasingly common.
The findings bolstered the argument of the technology and privacy communities, which have pushed back on law-enforcement demands for guaranteed-access mechanisms in commercial encryption. Cryptographers and civil-liberties activists warn that these so-called “backdoors” will jeopardize everyday Americans’ digital security and ruin U.S. tech firms’ reputations.
But Walsh argued in her letter to Wyden that, despite the report saying end-to-end encryption was not widespread, “some of the largest providers of certain types of communications services have already implemented” it. And even if that doesn’t lead to near-universal use of unbreakable encryption, she wrote, such technology is already spreading, making investigators’ work harder and criminals’ work easier.
Harvard’s Berkman Center for Internet and Society issued the report, titled “Don’t Panic: Making Progress on the ‘Going Dark’ Debate,” on Feb. 1. Its authors include Matthew Olsen, former director of the National Counterterrorism Center; Harvard law professor Jack Goldsmith, a former senior official in President George W. Bush‘s Justice Department; and eminent cryptographer Bruce Schneier.
The title of the report referred to law enforcement’s argument that wrongdoers are “going dark” as encryption shields their activities from discovery.
When James Clapper, the Director of National Intelligence, testified before the Senate Intelligence Committee in February, Wyden asked his office to study the report’s findings.
Addressing the claim that Internet of Things data and unencrypted metadata could provide a substitute for the encrypted content of criminals’ communications, Walsh wrote, “this is simply wrong.” Metadata, she argued, only shed light on the circumstances of communications—where and when they happened, for example—and Internet of Things devices are not universally unencrypted.
“It is difficult to see how information obtained from a refrigerator, a washing machine, or a child’s toy could mitigate the impact of the loss of” communications data, Walsh wrote. She also criticized the report for overlooking the fact that many local police departments lacked the resources to tap into those smart devices.
“Even more troubling,” she wrote, “the report fails to acknowledge the different privacy implications of collecting information from these sorts of devices inside one’s own home.”
Eric Geller is a politics reporter who focuses on cybersecurity, surveillance, encryption, and privacy. A former staff writer at the Daily Dot, Geller joined Politico in June 2016, where he's focused on policymaking at the White House, the Justice Department, the State Department, and the Commerce Department.