Showing posts with label Apple. Show all posts
Showing posts with label Apple. Show all posts

Tuesday, March 1, 2016

Statement of Ranking Member John Conyers, Jr. Full Committee Hearing: “The Encryption Tightrope: Balancing Americans’ Security and Privacy”


Dean of the U.S. House
of Representatives
John Conyers, Jr.
“Thank you, Mr. Chairman.  I want to associate myself with your comments about our jurisdiction. 

“It is not an accident that the House Judiciary Committee is the committee of primary jurisdiction with respect to the legal architecture of government surveillance. 

“In times of heightened tension, many of our colleagues will rush to do something, anything, to get out in front of an issue.  We welcome their voices in the debate—but it is here, in this Committee room, that the House begins to make decisions about the tools and methods available to law enforcement.

“I believe that it is important to say up front, before we get into the details of the Apple case, that strong encryption keeps us safe even as it protects our privacy. 

“Former NSA Director Michael Hayden said last week that ‘America is more secure . . . with unbreakable end-to-end encryption.’

“In this room, just last Thursday, former Secretary of Homeland Security Michael Chertoff testified that, in his experience, strong encryption helps law enforcement more than it hinders any agency in any given case.

“The National Security Council has concluded that ‘the benefits to privacy, civil liberties, and cybersecurity gained from encryption outweigh the broader risks . . . created by weakening encryption.’
           
            “And Director Comey has put it very plainly:

‘Universal strong encryption will protect all of us—our innovation, our private thoughts, and so many other things of value—from thieves of all kinds.  We will all have lock-boxes in our lives that only we can open and in which we can store all that is valuable to us.  There are lots of good things about this.’

“Now, for years, despite what we know about the benefits of encryption, the Department of Justice and the FBI have urged this Committee to give them the authority to mandate that companies create back doors into their secure products. 

“I have been reluctant to support this idea for a number of reasons.  The technical experts have warned us that it is impossible to intentionally introduce flaws into secure products—often called ‘back doors’—that only law enforcement can exploit, to the exclusion of terrorists and cyber criminals. 

“The tech companies have warned us that it would cost millions of dollars to implement and would place them at a competitive disadvantage around the world. 

“The national security experts have warned us that terrorists and other criminals will simply resort to other tools, entirely outside the reach of our law enforcement and intelligence agencies.

“And I accept that reasonable people can disagree with me on each of these points.

“What concerns me, Mr. Chairman, is that in the middle of an ongoing congressional debate on this subject, the FBI would ask a federal magistrate to give them the special access to secure products that this Committee, this Congress, and the Administration have so far refused to provide.

“Why has the government taken this step and forced this issue?  I suspect that part of the answer lies in an email obtained by the Washington Post and reported to the public last September. 

“In it, a senior lawyer in the intelligence community writes that although ‘the legislative environment towards encryption is very hostile today . . . it could turn in the event of a terrorist attack or criminal event where strong encryption can be shown to have hindered law enforcement.’

“He concluded that there is value in ‘keeping our options open for such a situation.’

“I am deeply concerned by this cynical mindset.  And I would be deeply disappointed if it turns out that the government is found to be exploiting a national tragedy to pursue a change in the law.

“I also have doubts about the wisdom of applying the All Writs Act—which was enacted in 1789, codified in 1911, and last applied to a communications provider by the Supreme Court in 1977—to a profound question about privacy and modern computing in 2016.

“I fear that pursuing this serious and complex issue through the awkward use of an inapt statute was not, and is not, the best course of action.

“I am not alone in this view.  Yesterday, in the Eastern District of New York, a federal judge denied a motion to order Apple to unlock an iPhone under circumstances similar to those in San Bernardino.

“The court found that the All Writs Act, as construed by the government, would confer on the courts an ‘overbroad authority to override individual autonomy.’

“Moreover, ‘nothing in the government’s argument suggests any principled limit on how far a court may go in requiring a person or company to violate the most deeply-rooted values.’

“We could say the same about the FBI’s request in California.  The government’s assertion of power is without limiting principle and likely to have sweeping consequences—whether or not we pretend that the request is limited to just this device, or just this one case.

“This Committee, and not the courts, is the appropriate place to consider those consequences—even if the dialogue does not yield the result desired by some in the law enforcement community.

“I am grateful that we are having this conversation today, back in the forum in which it belongs: the House Judiciary Committee.  I thank the Chairman, and I yield back.”
Voting is beautiful, be beautiful ~ vote.©

Thursday, February 25, 2016

House Judiciary Committee to Hold Hearing on Encryption


Dean of the U.S. House
of Representatives
John Conyers, Jr.
Washington, D.C.  – On Tuesday, March 1, 2016 at 1:00 p.m., the House Judiciary Committee will hold a hearing titled “The Encryption Tightrope: Balancing Americans’ Security and Privacy.” The House Judiciary Committee previously held member briefings on encryption, which included a briefing from technology companies and a classified briefing from the government. 

As encryption has increasingly become much more widespread among consumers, there is an ongoing national debate about the positive and negative implications it poses for consumers’ security and privacy. Encryption is used to strengthen consumers’ privacy but it also has presented new challenges for law enforcement seeking to obtain information during the course of its criminal investigations. For example, following the December 2015 terrorist attack in San Bernardino, California, investigators recovered a cell phone belonging to one of the terrorists responsible for the attack. After the FBI was unable to unlock the phone and recover its contents, a federal judge recently ordered Apple to provide “reasonable technical assistance to assist law enforcement agents in obtaining access to the data” on the device.

Below is a statement from House Judiciary Committee Chairman Bob Goodlatte (R-Va.) and Ranking Member John Conyers (D-Mich.) on this hearing.

“The widespread use of strong encryption has implications both for Americans’ privacy and security. As technology companies have made great strides to enhance the security of Americans’ personal and private information, law enforcement agencies face new challenges when attempting to access encrypted information. Americans have a right to strong privacy protections and Congress should fully examine the issue to be sure those are in place while finding ways to help law enforcement fight crime and keep us safe.


“Next week, the House Judiciary Committee will continue its examination of encryption and the questions it raises for Americans and lawmakers. As we move forward, our goal is to find a solution that allows law enforcement to effectively enforce the law without harming the competitiveness of U.S. encryption providers or the privacy protections of U.S. citizens.”

Witnesses for the hearing are:

Panel I
·         The Honorable James B. Comey, Director, Federal Bureau of Investigation

Panel II
·         Mr. Bruce Sewell, Senior Vice President and General Counsel, Apple, Inc.
·         Ms. Susan Landau, Professor, Worcester Polytechnic Institute
·         Mr. Cyrus R. Vance, Jr., District Attorney, New York County

This hearing will take place in 2141 Rayburn House Office Building and will be webcast live at http://judiciary.house.gov/. Camera crews wishing to cover must be congressionally-credentialed and RSVP with the House Radio-TV Gallery at (202) 225-5214.

Voting is beautiful, be beautiful ~ vote.©

Thursday, February 18, 2016

Senior House Judiciary Committee Democrats Express Concern Over Government Attempts to Undermine Encryption


Washington, D.C.—Earlier this week, through a court order, the United States government demanded that Apple Inc. help the Federal Bureau of Investigation (FBI) develop software in an effort to break the encryption on an iPhone that was recovered after the recent shootings in San Bernardino, California.  The government cited the “All Writs Act,” enacted in 1789, to demand that the technology company create a new version of the iPhone operating system to circumvent several security features on the device.  Apple has five days to respond to the court’s order.  The House Judiciary Committee will hold an oversight hearing on the encryption debate on March 1.

Dean of the U.S. House
of Representatives
John Conyers, Jr.
Senior Democratic Members of the House Judiciary Committee, Reps. Conyers, Nadler, Lofgren and Jackson Lee, released the following statement in response:

“The terrorist attack in San Bernardino was a tragic event.  We agree that heightened vigilance is necessary to combat the threat of home grown extremism in all of its forms.  In this effort, we commit our full support to law enforcement agencies at the local, state, and federal levels and hope to provide them with the resources and tools they require to perform their jobs. 

“But there is little reason for the government to make this demand on Apple—except to enact a policy proposal that has gained no traction in Congress and was rejected by the White House.

“Properly understood, strong encryption is our best defense against online criminals—including terrorist organizations.  It is the backbone of the Internet economy and vital for the protection of both free expression and privacy.  The government’s demand on Apple would coerce a private U.S. company to hack its own device, threatening the trust of millions of customers and placing our technology industry at a significant disadvantage abroad. 

“In a September 2015 article, the Washington Post  cited an email from a top intelligence community official which stated: ‘the legislative environment is very hostile today . . . it could turn in the event of a terrorist attack or criminal event where strong encryption can be shown to have hindered law enforcement.’  We are concerned that the heartbreaking event in San Bernardino is being exploited to undertake an end-run around the legislative process in just this fashion.”

Voting is beautiful, be beautiful ~ vote.©