{"id":12430,"date":"2016-04-21T11:39:41","date_gmt":"2016-04-21T15:39:41","guid":{"rendered":"http:\/\/www.megalextoria.com\/wordpress\/?p=12430"},"modified":"2016-04-21T11:39:41","modified_gmt":"2016-04-21T15:39:41","slug":"app-store-censorship-and-fbi-hacking-proposed-at-congressional-crypto-hearing","status":"publish","type":"post","link":"https:\/\/www.megalextoria.com\/wordpress\/index.php\/2016\/04\/21\/app-store-censorship-and-fbi-hacking-proposed-at-congressional-crypto-hearing\/","title":{"rendered":"App Store Censorship and FBI Hacking Proposed at Congressional Crypto Hearing"},"content":{"rendered":"<p>Tech experts and industry representatives squared off against law enforcement officials in <a href=\"https:\/\/energycommerce.house.gov\/hearings-and-votes\/hearings\/deciphering-debate-over-encryption-industry-and-law-enforcement\">two sessions of lively testimony<\/a> today in front of the House Energy and Commerce committee. Today&#8217;s hearing is the latest in the ongoing battle in the courts and legislature commonly called the second \u201cCrypto Wars,\u201d after a similar national debate in the 1990s.<\/p>\n<p>Two witnesses on the law enforcement panel offered a chilling proposal to deal with the well-documented weakness that any domestic encryption ban would do little against the <a href=\"https:\/\/cyber.law.harvard.edu\/publications\/2016\/encryption_survey\">hundreds of encryption products developed and sold internationally<\/a>. Thomas Galati of the NYPD and Charles Cohen of the Indiana State Police argued that software could be kept off American computing devices by <a href=\"https:\/\/motherboard.vice.com\/read\/police-officials-google-and-apple-should-censor-encryption-apps-in-their-stores\">exerting legal pressure on the Android, Apple, and Blackberry app stores<\/a>.<\/p>\n<p>That proposal would seem to leave to app store gatekeepers the nigh-impossible task of ensuring none of the software it carries comes with \u201cwarrant-proof\u201d cryptographic options. But worse, it cuts right to the core of fundamental computing freedom questions and cues up the next legislative battle to address what software people are allowed to run on their devices.<\/p>\n<p>It&#8217;s a scenario envisioned by EFF Special Advisor Cory Doctorow in <a href=\"https:\/\/boingboing.net\/2012\/01\/10\/lockdown.html\">his essay Lockdown<\/a>: as long as we&#8217;re using the kinds of general purpose computers that power our phones, laptops, and increasingly everything else, the only way to remove capabilities is by requiring <a href=\"https:\/\/www.eff.org\/issues\/DRM\">DRM software<\/a> and other spyware to make sure users are in compliance.<\/p>\n<p>The laws that currently aim to enforce those kinds of restrictions piggyback on copyright law, and create uncertainty around phone jailbreaking, to pick a relevant example. EFF has argued for\u2014and won\u2014<a href=\"https:\/\/www.eff.org\/deeplinks\/2015\/10\/victory-users-librarian-congress-renews-and-expands-protections-fair-uses\">explicit exemptions to those laws<\/a>, allowing users to install software from alternative app stores. It&#8217;s not hard to imagine that if a proposal to regulate encryption software through app store chokepoints were to proceed, it would be accompanied by pressure to tighten those restrictions.<\/p>\n<p>At another point in the hearing, lawmakers pressed the FBI&#8217;s Amy Hess on the role of third-party \u201cgrey hat\u201d hackers in accessing the data on the iPhone at the heart of the <a href=\"https:\/\/www.eff.org\/cases\/apple-challenges-fbi-all-writs-act-order\">hotly contested \u201cApple v. FBI\u201d case<\/a>. Representative Diana DeGette of Colorado suggested <a href=\"https:\/\/www.buzzfeed.com\/hamzashaban\/fbi-says-bolstering-its-own-capability-to-crack-encrypted-de\">those capabilities might be cultivated internally instead<\/a>.<\/p>\n<p>Hess disagreed, saying the FBI will always need to seek the cooperation of industry and academic experts. That might have been an opportunity to discuss the duty FBI and other agencies have in disclosing vulnerabilities to those same tech industry companies\u2014an area EFF has worked to shine light on through Freedom of Information Act requests and lawsuits<a href=\"https:\/\/www.eff.org\/cases\/eff-v-nsa-odni-vulnerabilities-foia\"> concerning the Vulnerabilities Equities Process (VEP)<\/a>. Unfortunately, no lawmakers pushed Hess on the question.<\/p>\n<p>The second panel\u2014made up of industry and tech representatives\u2014seemed to serve as a fact-checking service for the first. Apple&#8217;s General Counsel Bruce Sewell, for example, categorically denied three allegations made about his company in the previous panel, saying Apple has not provided source code to the Chinese government, has not actively \u201cthrown away\u201d keys it once used to assist law enforcement, and has not announced passcode protection for the next generation of its iCloud backup software.<\/p>\n<p>Other irresponsible statements from the first panel went without comment. When Charles Cohen, the Indiana State Police commander, was asked about information that is more accessible to surveillance now than before cell phones, he drew a blank. \u201cI&#8217;m having problems thinking of information that is available now that was not before. From my perspective, thinking through investigations that we previously had information for, when you combine the encryption issue along with shorter and shorter retention periods for Internet service providers \u2026 it might be difficult to find an example of an avenue that is now available that was not before.\u201d It&#8217;s possible that Cohen is not familiar the myriad ways in which cell phone metadata, content, and location tracking are being used by law enforcement\u2014but that would be quite a surprise, given the Indiana State Police&#8217;s <a href=\"http:\/\/indianapublicmedia.org\/news\/state-police-respond-investigation-tracking-device-59918\/\">long history with the technology<\/a>.<\/p>\n<p>Ultimately, it&#8217;s a step forward that a congressional committee has summoned tech expertise into the room, if only to explain why law enforcement wasn&#8217;t able to compromise our security in the first Crypto Wars. Speaking to a representative who floated the idea of a key escrow system, University of Pennsylvania Associate Professor of Computer and Information Science Dr. Matt Blaze explained: \u201cI just want to caution that the split-key design, as attractive as it sounds, was also at the core of the NSA design of the Clipper Chip, which was where we started over two decades ago.\u201d Blaze should know; his research discovering a fatal flaw in the Clipper Chip protocol is <a href=\"https:\/\/www.eff.org\/deeplinks\/2015\/04\/clipper-chips-birthday-looking-back-22-years-key-escrow-failures\">often credited with sinking the project<\/a>.<\/p>\n<p>Meanwhile in the Senate, draft legislation could threaten uncompromised cryptography altogether. U.S. readers, tell your Senators to <a href=\"https:\/\/act.eff.org\/action\/tell-congress-stop-the-burr-feinstein-backdoor-proposal\">oppose the Burr-Feinstein backdoor proposal today<\/a>.<\/p>\n<p>Source: <em><a href=\"https:\/\/www.eff.org\/deeplinks\/2016\/04\/app-store-censorship-and-fbi-hacking-proposed-congressional-crypto-hearing\">App Store Censorship and FBI Hacking Proposed at Congressional Crypto Hearing | Electronic Frontier Foundation<\/a><\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Tech experts and industry representatives squared off against law enforcement officials in two sessions of lively testimony today in front of the House Energy and Commerce committee. Today&#8217;s hearing is the latest in the ongoing battle in the courts and legislature commonly called the second \u201cCrypto Wars,\u201d after a similar national debate in the 1990s. Two witnesses on the law enforcement panel offered a chilling proposal to deal with the well-documented weakness that any domestic encryption ban would do little against the hundreds of encryption products developed and sold internationally. Thomas Galati of the NYPD and Charles Cohen of the Indiana State Police argued that software could be kept off American computing devices by exerting legal pressure on the Android, Apple, and Blackberry app stores. That proposal would seem to leave to app store gatekeepers the nigh-impossible task of ensuring none of the software it carries comes with \u201cwarrant-proof\u201d cryptographic options. But worse, it cuts right to the core of fundamental computing freedom questions and cues up the next legislative battle to address what software people are allowed to run on their devices. It&#8217;s a scenario envisioned by EFF Special Advisor Cory Doctorow in his essay Lockdown: as long as [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[15],"tags":[194,407,513,687],"class_list":["post-12430","post","type-post","status-publish","format-standard","hentry","category-news-and-politics","tag-apple","tag-censorship","tag-cryptography","tag-fbi"],"_links":{"self":[{"href":"https:\/\/www.megalextoria.com\/wordpress\/index.php\/wp-json\/wp\/v2\/posts\/12430","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.megalextoria.com\/wordpress\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.megalextoria.com\/wordpress\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.megalextoria.com\/wordpress\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.megalextoria.com\/wordpress\/index.php\/wp-json\/wp\/v2\/comments?post=12430"}],"version-history":[{"count":0,"href":"https:\/\/www.megalextoria.com\/wordpress\/index.php\/wp-json\/wp\/v2\/posts\/12430\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.megalextoria.com\/wordpress\/index.php\/wp-json\/wp\/v2\/media?parent=12430"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.megalextoria.com\/wordpress\/index.php\/wp-json\/wp\/v2\/categories?post=12430"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.megalextoria.com\/wordpress\/index.php\/wp-json\/wp\/v2\/tags?post=12430"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}