At Crypto Hearing, Best Arguments Against Backdoor Mandates Come from Members of Congress Themselves
Encryption advocates registered a big win this week when it became abundantly clear at a Congressional oversight hearing that of the about the purported of .
On Wednesday, five expert witnesses before the House Oversight and Government Reform Committee鈥檚 Subcommittee on Information Technology on the topic of 鈥淓ncryption Technology and Potential U.S. Policy Responses.鈥 One of those experts was Kevin Bankston, OTI鈥檚 Policy Director, whose laid out . (Read Bankston’s shorter here.) Bankston was joined on the panel by technical expert , a respected computer science professor who, among other things, in the U.S. government’s in 1994; Jon Potter, President of the Application Developers Alliance, who of backdoor mandates on companies; Amy Hess, from the Science and Technology Branch of the FBI, who about strong encryption; and Daniel Conley, District Attorney of Suffolk County, a representative of .
Although Blaze, Potter, and Bankston made a compelling case in favor of strong encryption, many of the best arguments against the idea of mandated backdoors came from the . Three of the fiercest critics at the hearing, Subcommittee Chairman Will Hurd, Representative Ted Lieu, and Representative Rod Blum, account for a significant percentage of the total number of Congressmen with backgrounds in computer science, a potent reminder of the need for in government.
Here are some highlights from the exchanges between members and the witnesses on Wednesday afternoon:
Representative Jason Chaffetz (R-UT), Chairman of the House Oversight and Government Reform Committee:
鈥淚 have three general concerns about Director Comey鈥檚 proposal. First, it鈥檚 impossible to build just a backdoor for just the good guys鈥 just the good guys can get this. If somebody at the Genius Bar can figure it out, so can the nefarious folks in a van down by the river…
鈥淪econd, we already live in what some experts refer to as the 鈥淕olden Age of Surveillance鈥 for law enforcement. Federal, state, and local law enforcement have never had鈥 more tools at their disposal to detect, prevent, and prosecute crime. It seems that every day there is a new, often startling, story about the United States鈥 government鈥檚 ability to track its own citizens. I recognize technology can be a double-edged sword and many pose challenges for law enforcement, but we鈥檙e certainly not going to go dark, and in many ways we鈥檝e never been brighter.
鈥淭hird, strong encryption prevents crime and is a part of the economy. People keep their lives on their mobile phones. A typical mobile phone might hold a person鈥檚 pictures, contacts, communications, finances, schedule, and much more personal information…. If your phone is lost or stolen you want to know your information is protected, and encryption does that.
鈥淭here鈥檚 a reason the world鈥檚 largest technology companies are increasingly developing stronger, more frequently used encryption technologies. It鈥檚 not because they鈥檙e anti-law enforcement, on the contrary it鈥檚 because sophisticated cyber hacks are nearly daily events. No one is immune from digital snooping, from the White House, to corporate America, to private citizens. The opportunity brought to us by the modern technologies are near limitless鈥 but not if the system is compromised.
鈥淪trong encryption helps ensure data is secure and allows companies and individuals to operate with confidence and trust鈥 we have choices to make. Do we allow the 99% of Americans who are good, honest, decent, hardworking, patriotic people to have encrypted phones? Or do we need to leave the backdoor open and create vulnerability for all of them. Cause vulnerability, it鈥檚 all or none folks. It鈥檚 not just a little bit, not just for the good guys. And that鈥檚 why we鈥檙e having this hearing today.鈥
…
Rep. Chaffetz (after the FBI鈥檚 Amy Hess asserts that, in her opinion, encryption also helps prevent crimes):
鈥淏ut the policies that the FBI is advocating, specifically the director, don鈥檛 necessarily fall in line with that, do they? I mean I struggle with what the director is asking for. Because are you going to have encryption? Not encryption?
鈥淭hat鈥檚 the concern, if you create a key, now let鈥檚 pretend it鈥檚 a key to your house, you go down to Ace Hardware you make a copy of it, right somebody鈥檚 going to be able to figure it out, you have a locksmith who can go and open your front door. It鈥檚 the same principle and unless you have some new technology that we don鈥檛 know about, that鈥檚 the concern and that鈥檚 the disconnect between what we hear from the FBI and the reality of, do you create the hardest, strongest encryption possible, which means not having a key鈥?鈥
Representative Ted Lieu (D-CA): 鈥As a recovering computer science major, it is clear to me that creating a pathway for decryption only for good guys is technologically stupid. You just can鈥檛 do that.鈥
…
Rep. Lieu: 鈥I鈥檓 going to reserve the balance of my time to make a statement, which is primarily directed at Mr. Conley [the Suffolk County District Attorney]. I respect your public service; I take great offense at your testimony today. You mentioned that unaccountable corporate interests such as Apple and Google are essentially protecting those who rape, defraud, assault, and kill. I think that鈥檚 offensive; it鈥檚 a fundamental misunderstanding of the problem. Why do you think Apple and Google are doing this? It鈥檚 because the public is demanding it. People like me, privacy advocates, a public that doesn鈥檛 want an out of control surveillance state. It is the public that is asking for this, Apple and Google didn鈥檛 do this because they thought they鈥檇 make less money. This is a private sector response to government overreach.
鈥淭hen you make another statement, that somehow these technology companies are not credible because they also collect private data. Well here鈥檚 the difference: Apple and Google don鈥檛 have coercive power. District Attorneys do, the FBI does, the NSA does. And to me it鈥檚 very simple to draw the privacy balance when it comes to law enforcement and privacy 鈥 just follow the damn Constitution. And because the NSA didn鈥檛 do that, and other law enforcement agencies didn鈥檛 do that, you are seeing a vast public reaction to this. Because the NSA, your colleagues, have essentially violated Fourth Amendment rights of every American citizen for years by seizing all of our phone records, by collecting our internet traffic, and now this is spilling over to other aspects of law enforcement. And if you want to get this fixed I suggest that you write to NSA, and the FBI should tell the NSA, stop violating our rights. And then maybe you鈥檇 have the public much more on the side of supporting some of what law enforcement is asking for. And then let me just conclude by saying I do agree with law enforcement that we live in a dangerous world. And that is why our Founders put in the Constitution of the United States, why they put in the Fourth Amendment. Because they understand that an Orwellian, overreaching federal government is one of the most dangerous things this world can have.鈥
…
Rep. Lieu: 鈥淐urrently right now there is nothing preventing two people, anywhere in the world, from downloading an encryption program to encrypt end to end, those two communications that would make this pathway essentially meaningless鈥 and is it your understanding that sometimes terrorists now resort to using something as writing something on a piece of paper to go off the grid? 鈥nd we don鈥檛 say that companies who make paper shredders are somehow protecting terrorists, correct?鈥
…
Representative Robin Kelly (D-IL): 鈥Is there such a thing as creating a backdoor that is only for the good guys?… Also, could the existence of a backdoor created in the interest of public safety actually serve as a 鈥淭rojan horse鈥 that cybercriminals exploit to their advantage?鈥 (Witnesses answer in the affirmative.)
…
Representative Blake Farenthold (R-TX): 鈥淲ouldn鈥檛 [a golden key] become the biggest hacker target in the world if it were known that there were a golden key and what we might have today that might be deemed secure as computing power increases might become a lot easier to break?鈥 (Witnesses answer in the affirmative.)
…
Rep. Farenthold: 鈥淚s there anyone on the panel who believes we can build a technically secure backdoor with a golden key? Raise your hand and I鈥檒l recognize you if you think that can be done… Let the record reflect no one on the panel thinks that can be done.鈥
District Attorney Conley (in response to Rep. Farenthold鈥檚 question): 鈥淚 hate to hear talk like 鈥榯hat cannot be done鈥, imagine if Jack Kennedy said we cannot go to the moon, that cannot be done. He said something else. We鈥檙e going to get there in the next decade. So I would say to the computer science community, let鈥檚 get the best minds in the United States together on this. We can balance the interests here.鈥
Rep. Farenthold (in response to Mr. Conley): 鈥淚 appreciate that, because I鈥檓 a proud American as well, but I think what we鈥檙e saying today is, it would be the equivalent of President Kennedy saying 鈥渨e鈥檒l be able to get to the moon in ten years and nobody else will ever be able to get there ever鈥 it鈥檚 not like we鈥檙e saying that we can鈥檛 develop a secure system but we are also saying that, can we develop a secure system that will remain secure for any length of time that somebody smarter might not be able to hack five years down the road.鈥
…
Representative Rod Blum (R-IA): “I鈥檓 a software developer myself, and I鈥檓 also a homebuilder. So I鈥檇 just like to give you an analogy, as I understand this. Isn鈥檛 this analogous to the government asking for, or requiring homebuilders to put a video camera in every room of every new home they build, with the guarantee or the promise that the government won鈥檛 turn it on鈥nless we get a warrant? And that would make law enforcement鈥檚 job easier, correct and this would make law enforcement鈥檚 job easier… and quicker if there is a crime in the home? Isn鈥檛 this analogous to that? …Because what troubles me is law enforcement tends to agree with, and I鈥檒l paraphrase here, but that there鈥檚 a reasonable standard of privacy, of Fourth Amendment rights when one is in their own home鈥 but when it comes to our cell phone conversations, our emails, anything that is electronic and data, it seems that this reasonable right to privacy isn鈥檛 there.”
…
Representative Will Hurd (R-TX), Chairman of the Subcommittee on Information Technology: “I would like to read… Recommendation 29 that President Obama鈥檚 Review Group provided was:
“鈥榃e recommend that, regarding encryption, the US Government should:
1. Fully support and not undermine efforts to create encryption standards;
2. Not in any way subvert, undermine, weaken, or make vulnerable generally available commercial software; and
3. Increase the use of encryption and urge U.S. companies to do so, in order to better protect data in transit, at rest, in the cloud, and in other storage.鈥
鈥淚 think that鈥檚 a pretty good recommendation.鈥
…
Overall, the message from the Congressional representatives at the hearing was clear: backdoor mandates are a bad idea for a variety of technical and economic reasons, and they would undermine Americans鈥 civil liberties. We hope the FBI and other members of law enforcement heed their message.