Showing posts with label encryption. Show all posts
Showing posts with label encryption. Show all posts

Tuesday, December 20, 2016

ENCRYPTION WORKING GROUP RELEASES YEAR-END REPORT

The report contains key observations and opportunities for progress

cid:image001.png@01D1CEE4.662DFBD0Washington, D.C. –Members of the bipartisan encryption working group – established in March 2016 by House Judiciary Committee Chairman Bob Goodlatte (R-VA), Ranking Member John Conyers, Jr. (D-MI), House Energy and Commerce Committee Chairman Fred Upton (R-MI), and Ranking Member Frank Pallone, Jr. (D-NJ) – today released a year-end report laying out key observations and next steps.

For nearly a year, the Encryption Working Group has held numerous meetings with a variety of federal, state, and local government entities, former government officials, private industry and trade associations, civil society organizations, consultants and legal experts, academia, and cryptographers. These meetings have produced critical information, culminating in a year-end report that lays out four key observations and identifies several areas for future discussion next Congress.

The report concludes:

“Encryption is inexorably tied to our national interests. It is a safeguard for our personal secrets and economic prosperity. It helps to prevent crime and protect national security. The widespread use of encryption technologies also complicates the missions of the law enforcement and intelligence communities. As described in this report, those complications cannot be ignored. This is the reality of modern society. We must strive to find common ground in our collective responsibility: to prevent crime, protect national security, and provide the best possible conditions for peace and prosperity.

“That is why this can no longer be an isolated or binary debate. There is no ‘us versus them,’ or ‘pro-encryption versus law enforcement.’ This conversation implicates everyone and everything that depends on connected technologies—including our law enforcement and intelligence communities. This is a complex challenge that will take time, patience, and cooperation to resolve.  The potential consequences of inaction—or overreaction—are too important to allow historical or ideological perspectives to stand in the way of progress.”

Below are key observations of the report.

1.      Any measure that weakens encryption works against the national interest.
2.      Encryption technology is a global technology that is widely and increasingly available around the world.
3.      The variety of stakeholders, technologies, and other factors create different and divergent challenges with respect to encryption and the “going dark” phenomenon, and therefore there is no one-size-fits-all solution to the encryption challenge.
4.      Congress should foster cooperation between the law enforcement community and technology companies.

Based on these observations, the report has identified several areas for future discussion by the committees next Congress, such as exploring opportunities to help law enforcement agencies navigate the process of accessing information from private companies; examining options to improve law enforcement’s ability to leverage metadata; reviewing the circumstances, resources and legal framework necessary to help law enforcement agencies exploit existing flaws in digital products; considering the implications of alternative legal strategies such as compelling individual consumers to decrypt their devices, and the role of encryption in fostering greater data security and privacy.

The members of the working group issuing the report are House Judiciary Committee Chairman Bob Goodlatte (R-VA), House Energy and Commerce Chairman Fred Upton (R-Mich.), Ranking Member John Conyers, Jr. (D-Mich.), Ranking Member Frank Pallone, Jr. (D-N.J.), and Representatives Jim Sensenbrenner (R-WI), Darrell Issa (R-CA), Zoe Lofgren (D-CA), Suzan DelBene (D-WA), Bill Johnson (R-OH), and Yvette D. Clarke (D-NY).
Voting is beautiful, be beautiful ~ vote.©

Monday, March 21, 2016

Conyers, Goodlatte, Upton, and Pallone Announce Bipartisan Encryption Working Group

Encryption a Top Issue for House Judiciary and Energy and Commerce Committees

Dean of the U.S. House
of Representatives
John Conyers, Jr.
Washington, D.C.  – House Judiciary Committee Chairman Bob Goodlatte (R-VA), Ranking Member John Conyers (D-MI), House Energy and Commerce Committee Chairman Fred Upton (R-MI), and Ranking Member Frank Pallone, Jr. (D-NJ) today announced the creation of an encryption working group to examine the complicated legal and policy issues surrounding encryption. The group will identify potential solutions that preserve the benefits of strong encryption – including the protection of Americans’ privacy and information security - while also ensuring law enforcement has the tools needed to keep us safe and prevent crime. The House Judiciary Committee and Energy and Commerce Committee have primary jurisdiction over encryption and the issues it presents for citizens, law enforcement, and American technology companies.

Members of the working group are:

Jim Sensenbrenner (R-WI)
Darrell Issa (R-CA)
Zoe Lofgren (D-CA)
Suzan DelBene (D-WA)
Bill Johnson (R-OH)
Adam Kinzinger (R-IL)
Yvette Clarke (D-NY)
Joe Kennedy (D-MA)

Chairmen Goodlatte and Upton and Ranking Members Conyers and Pallone will serve as ex officio members of the working group and released the following joint statement:

“The widespread use of strong encryption is important to protecting Americans’ privacy.  We also recognize that challenges remain for law enforcement agencies seeking to disrupt criminals and terrorists from doing us harm. The bipartisan encryption working group will examine the issues surrounding this ongoing national debate. Members will work toward finding solutions that allow law enforcement agencies to fulfill their responsibility without harming the competitiveness of the U.S. technology sector or the privacy and security that encryption provides for U.S. citizens. We look forward to continuing our work on this important issue facing our country.”

Voting is beautiful, be beautiful ~ vote.©

Tuesday, March 1, 2016

Statement of Ranking Member John Conyers, Jr. Full Committee Hearing: “The Encryption Tightrope: Balancing Americans’ Security and Privacy”


Dean of the U.S. House
of Representatives
John Conyers, Jr.
“Thank you, Mr. Chairman.  I want to associate myself with your comments about our jurisdiction. 

“It is not an accident that the House Judiciary Committee is the committee of primary jurisdiction with respect to the legal architecture of government surveillance. 

“In times of heightened tension, many of our colleagues will rush to do something, anything, to get out in front of an issue.  We welcome their voices in the debate—but it is here, in this Committee room, that the House begins to make decisions about the tools and methods available to law enforcement.

“I believe that it is important to say up front, before we get into the details of the Apple case, that strong encryption keeps us safe even as it protects our privacy. 

“Former NSA Director Michael Hayden said last week that ‘America is more secure . . . with unbreakable end-to-end encryption.’

“In this room, just last Thursday, former Secretary of Homeland Security Michael Chertoff testified that, in his experience, strong encryption helps law enforcement more than it hinders any agency in any given case.

“The National Security Council has concluded that ‘the benefits to privacy, civil liberties, and cybersecurity gained from encryption outweigh the broader risks . . . created by weakening encryption.’
           
            “And Director Comey has put it very plainly:

‘Universal strong encryption will protect all of us—our innovation, our private thoughts, and so many other things of value—from thieves of all kinds.  We will all have lock-boxes in our lives that only we can open and in which we can store all that is valuable to us.  There are lots of good things about this.’

“Now, for years, despite what we know about the benefits of encryption, the Department of Justice and the FBI have urged this Committee to give them the authority to mandate that companies create back doors into their secure products. 

“I have been reluctant to support this idea for a number of reasons.  The technical experts have warned us that it is impossible to intentionally introduce flaws into secure products—often called ‘back doors’—that only law enforcement can exploit, to the exclusion of terrorists and cyber criminals. 

“The tech companies have warned us that it would cost millions of dollars to implement and would place them at a competitive disadvantage around the world. 

“The national security experts have warned us that terrorists and other criminals will simply resort to other tools, entirely outside the reach of our law enforcement and intelligence agencies.

“And I accept that reasonable people can disagree with me on each of these points.

“What concerns me, Mr. Chairman, is that in the middle of an ongoing congressional debate on this subject, the FBI would ask a federal magistrate to give them the special access to secure products that this Committee, this Congress, and the Administration have so far refused to provide.

“Why has the government taken this step and forced this issue?  I suspect that part of the answer lies in an email obtained by the Washington Post and reported to the public last September. 

“In it, a senior lawyer in the intelligence community writes that although ‘the legislative environment towards encryption is very hostile today . . . it could turn in the event of a terrorist attack or criminal event where strong encryption can be shown to have hindered law enforcement.’

“He concluded that there is value in ‘keeping our options open for such a situation.’

“I am deeply concerned by this cynical mindset.  And I would be deeply disappointed if it turns out that the government is found to be exploiting a national tragedy to pursue a change in the law.

“I also have doubts about the wisdom of applying the All Writs Act—which was enacted in 1789, codified in 1911, and last applied to a communications provider by the Supreme Court in 1977—to a profound question about privacy and modern computing in 2016.

“I fear that pursuing this serious and complex issue through the awkward use of an inapt statute was not, and is not, the best course of action.

“I am not alone in this view.  Yesterday, in the Eastern District of New York, a federal judge denied a motion to order Apple to unlock an iPhone under circumstances similar to those in San Bernardino.

“The court found that the All Writs Act, as construed by the government, would confer on the courts an ‘overbroad authority to override individual autonomy.’

“Moreover, ‘nothing in the government’s argument suggests any principled limit on how far a court may go in requiring a person or company to violate the most deeply-rooted values.’

“We could say the same about the FBI’s request in California.  The government’s assertion of power is without limiting principle and likely to have sweeping consequences—whether or not we pretend that the request is limited to just this device, or just this one case.

“This Committee, and not the courts, is the appropriate place to consider those consequences—even if the dialogue does not yield the result desired by some in the law enforcement community.

“I am grateful that we are having this conversation today, back in the forum in which it belongs: the House Judiciary Committee.  I thank the Chairman, and I yield back.”
Voting is beautiful, be beautiful ~ vote.©