“We’re not looking for a ‘back door'” that breaks encryption, the FBI said on Wednesday. Don’t even know what that is, really, said director Christopher Wray: He thinks it’s some type of “secret, insecure means of access” – is that right?
No, that’s not what the FBI is after, he said during a speech (here are his prepared remarks) at the Boston College/FBI Boston Conference on Cyber Security.
Rather, what law enforcement wants is a secure means to access evidence on devices once they’ve shown probable cause and have a warrant, he said. How that gets done is up to you smart people in technology, the “brightest minds doing and creating fantastic things.”
I’m open to all kinds of ideas. But I reject this notion that there could be such a place that no matter what kind of lawful authority you have, it’s utterly beyond reach to protect innocent citizens.
You’ve got to hand it to Wray: his tone was far more flattering – “brightest minds?” nice! – than when FBI forensic expert Stephen Flatley called Apple a bunch of “jerks” and “evil geniuses” for encrypting iPhones.
But Wray’s tempered remarks can be read as a velvet glove slipped over an iron fist, and that iron fist has been banging at this door for quite a while. The FBI has been battling encryption ever since Apple made it a default on the iPhone in September 2014.
Apple’s encryption is so strong that even Apple can’t break it. That’s made it all the harder to catch criminals and terrorists, the FBI has stressed both inside and outside of courtrooms.
In his speech, Wray picked up from where he left off in January, when he called unbreakable encryption a “public safety issue,” citing 7,775 devices that the FBI couldn’t crack in 2017 – more than half of those that the agency sought to lawfully access…
…which in turn picked up from where his predecessor, James Comey, left off… which also followed Assistant Attorney General Rod Rosenstein having made the same arguments multiple times last year.
From Wednesday’s speech:
Each one of those nearly 7,800 devices is tied to a specific subject, a specific defendant, a specific victim, a specific threat. Last fall I spoke to a group of CISOs and someone asked about that number. He basically said, ‘What’s the big deal with 7,800? There are millions of devices out there.’
We’re not interested in the millions of devices used by everyday citizens. We’re only interested in those devices that have been used to plan or execute criminal or terrorist activities.
Of course you can give us access to encrypted devices without breaking encryption, Wray said. After all, look what’s been done with cloud platforms that users can access from anywhere:
For one thing, many of us in this room use cloud-based services. You’re able to safely and securely access your email, your files, and your music on your home computer, on your smartphone, or at an internet café in Tokyo… That didn’t happen by accident. It’s only possible because tech companies took seriously the real need for both flexible customer access to data and cybersecurity.
Just as the FBI director has again argued the same thing that the bureau has been arguing for years – the same arguments about somehow being able to get past encryption without breaking it, in some way that the FBI doesn’t know because that’s up to the people who build things – the same logic holds on the other side: unbreakable encryption that doesn’t break encryption is not a thing.
Apple CEO Tim Cook has said that a backdoor wouldn’t be such an issue if it were to be used only for catching “bad people,” but he doubts that crooks couldn’t manage to figure out how to exploit a backdoor even if it were only meant to help law enforcement.
Naked Security still says #nobackdoors
Paul Ducklin put it pretty bluntly: “Tim Cook is right: if you put in cryptographic backdoors, the good guys lose for sure, while the bad guys only lose if they’re careless.”
It’s not as if the US hasn’t tried it. It didn’t turn out well.
In the 1990s, the US required American software companies to use deliberately weakened encryption algorithms in software for export, in an attempt to make it safe to sell cryptographic software even to potential enemies because their traffic would always be crackable.
The results:
- International customers simply bought non-US products instead, hurting US encryption vendors.
- EXPORT_GRADE ciphers lived on long after they were no longer legally required, leaving behind backdoors such as FREAK and LOGJAM that potentially put all of us at risk.
As Naked Security and other encryption vendors have repeatedly pointed out, backdoors have a way of being forgotten about, soon end up widely known, often live much longer than anyone imagined, and can be widely misused: all good reasons to avoid them.
SOPHOS STATEMENT ON ENCRYPTION
Our ethos and development practices prohibit “backdoors” or any other means of compromising the strength of our products for any purpose, and we vigorously oppose any law that would compel Sophos (or any other technology supplier) to weaken the security of our products.
Mahhn
I can see him representing the Flat Earth Society: Christopher Wray – I’ve traveled to around our planet and see no evidence the world isn’t flat. So build me a map that represents the world the way I see it, flat. So everyone will know it’s true…..
jkwilborn
Will I be an outlaw if I use Linux with an encrypted drives that require passwords? He needs to realize that National Security is on the line here. ALL of our governmental leaders use these phone, do they want China, Russia or other countries accessing these devices?
Who would buy American if anyone could access them. This compares to some extent to saying we have a warrant for this item that at the bottom of 3 miles of ocean. They will have to learn they just cannot have some things, even with a warrant. Such is life. Plus this is all forensics, as we know even when they have bad people in their view they don’t do anything until the crime occurs.
Bryan
…backdoors have a way of being forgotten about, soon end up widely known…
Oh irony of ironies that these can both be true. It’d be funny (if it weren’t so sad)*. Maybe Schrodinger fits in there somewhere as well.
*Jonathan Coulter, Want You Gone, Portal 2
Jim
Why is it always written as one of two options. There is a third option: Two algorithms mathematically linked in such a way that either will decrypt the device. Not a back door. A second path into the data via decryption. Each path through the encryption would need to be just as secure as it currently is.
Mark
That means that there would then be two different keys that have access to your data. If I change the password I put on my data, what updates the key used for the second decryption method so the authorities could use the backup method? The massive database to tie the second leg to a device would itself be a target of attack.
The two cypher method just makes it at least twice as likely access will be compromised.
Dumbfounded
I’m not a mathematician by any stretch of the imagination but as I understand it what you propose would be considered a “collision”. The mathematics upon which strong encryption is based is rooted in there being one, and only one, input for a given output. I humbly admit that I do not have the mathematically prowess to verify any of the proofs that underlie this subject but I fail to see how what you are suggesting is mathematically provable to not be collision.
Jim
I have another question: Does China allow unbreakable encryption? I assume not, so, how does Apple sell iPhones in China? They sell more phones in China than they do in the US.
Frenchiealso@gmail.com
The FBI arguments for access would be received with less circonception, had it not become embroiled in domestic spying of a political campaign at the behest of another one. These kinds of misconduct by individuals without scruples does not spread sentiments of trust all around. An agency supposedly neutral allowed itself to be corrupted for partisan gains. This is what we encounter in Banana republics and countries we denounce as totalitarian, like Iran, Russia or China.
These actions do not lead me to believe the FBI can be trusted on the subject of encryption. At least not until, a big cleaning has been instituted.
Scott Johnson
It seems all this phone encryption is a direct response to the secret surveillance the USA government was doing. Everytime any alphabet agency whines about encryption it makes me giggle.
Karen
So, has he never heard of a one-time pad, or even speaking privately for that matter?
For all it’s drawbacks, no warrent will work if I burn my random, only-used-once, paper key material.
I am unsure if he is really that dense, or if he does not understand basic mathmatics.
Pound MeToo
“Apple’s encryption is so strong that even Apple can’t break it.” I think you mean the standard encryption algorithms that Apple uses… Or did they re-invent the wheel yet again?
Regardless the feds are right and it can easily be done. Just have a escrow system for a second key…… and make it an opt-in program! . Doesn’t that technically meet their requirements?
Anonymous
Not sure if you were being serious or not – but an opt-in program obviously would not work, because the bad guys wouldn’t opt in.
I’ve been developing hardware-based high-security crypto products or over 30 years. We’ve been through the weakened (40-bit) “export” strength crypto, the key escrow, the export regulations and everything else. However, we have ALWAYS designed our products so that it was impossible for even us to recover data our customers have encrypted, or break the security in any other way.
Mahhn
Sir (presuming), as you are a subject matter expert, I hope you pick up a regular nick name and comment often with insights. I’m sure many would like that.