{"id":9167,"date":"2020-06-30T21:13:20","date_gmt":"2020-06-30T18:13:20","guid":{"rendered":"https:\/\/forklog.media\/?p=9167"},"modified":"2020-07-01T19:23:46","modified_gmt":"2020-07-01T16:23:46","slug":"u-s-senators-introduce-ultimate-backdoor-bill-banning-the-use-of-strong-consumer-grade-encryption","status":"publish","type":"post","link":"https:\/\/forklog.com\/en\/u-s-senators-introduce-ultimate-backdoor-bill-banning-the-use-of-strong-consumer-grade-encryption\/","title":{"rendered":"U.S. Senators Introduce Ultimate Backdoor Bill Banning the Use of Strong Consumer-Grade Encryption"},"content":{"rendered":"<p>Last week, Republican U.S. Senators introduced the Lawful Access to Encrypted Data Act \u201cending the use of \u2018warrant-proof\u2019 encrypted technology by terrorists and other bad actors to conceal illicit behavior.\u201d Experts and privacy advocates think it can effectively outlaw strong encryption.<\/p>\n<p><!--more--><\/p>\n<p>As the name may suggest, the Lawful Access to Encrypted Data Act (LAED Act, also referred to as LAEDA) is about requiring device manufacturers and service providers to allow law enforcement to access encrypted data, whether it is stored on a device or transmitted through the internet.<\/p>\n<blockquote><p><b><i>\u201cThe bill would require service providers and device manufacturers to provide assistance to law enforcement when access to encrypted devices or data is necessary,\u201d <\/i><\/b><i>the official announcement <\/i><a href=\"https:\/\/www.judiciary.senate.gov\/press\/rep\/releases\/graham-cotton-blackburn-introduce-balanced-solution-to-bolster-national-security-end-use-of-warrant-proof-encryption-that-shields-criminal-activity\"><i>reads<\/i><\/a><i>, <\/i><b><i>\u201cbut only after a court issues a warrant, based on probable cause that a crime has occurred, authorizing law enforcement to search and seize the data.\u201d<\/i><\/b><\/p><\/blockquote>\n<p>The Senators behind the proposal argued that terrorists, drug traffickers, and other unsavory individuals exploit consumer-level encrypted communications to run their operations, while law enforcement officials can\u2019t access information potentially important to the investigation.<\/p>\n<blockquote><p><b><i>\u201cIn recent history, we have experienced numerous terrorism cases and serious criminal activity where vital information could not be accessed, even after a court order was issued. Unfortunately, tech companies have refused to honor these court orders and assist law enforcement in their investigations,\u201d <\/i><\/b><i>said Senate Judiciary Committee Chairman Lindsey Graham.<\/i><\/p><\/blockquote>\n<p>The bill would require companies like Apple and Facebook to \u201cassist law enforcement with accessing encrypted data if assistance would aid in the execution of the warrant.\u201d If a company is unable to comply, it will have to implement the required capabilities or appeal in federal court. The U.S. government will compensate the affected companies \u201cfor reasonable costs incurred in complying with the directive.\u201d<\/p>\n<p>This basically means that U.S. companies will have to have an encryption backdoor available for all data stored or transmitted. Those who don\u2019t have one will have to redesign their systems so there is a backdoor. Experts perceive the bill as an outright ban on end-to-end encryption in the U.S.<\/p>\n<p>The bill would also direct the Attorney General to organize a competition with awards for those who \u201ccreate a lawful access solution in an encrypted environment while maximizing privacy and security.\u201d On top of that, LAEDA proposes to fund a grant program to \u201cincrease digital evidence training for law enforcement\u201d and create a call center that would provide advice and assistance to investigators.<\/p>\n<p>In her initial <a href=\"https:\/\/cyberlaw.stanford.edu\/blog\/2020\/06\/there%E2%80%99s-now-even-worse-anti-encryption-bill-earn-it-doesn%E2%80%99t-make-earn-it-bill-ok\">analysis<\/a> of the bill, Riana Pfefferkorn, Associate Director of Surveillance and Cybersecurity at the Stanford Center for Internet and Society, warned about the potential impact of the proposal on encryption and users\u2019 privacy.<\/p>\n<blockquote><p><b><i>\u201cThe bill is an actual, overt, make-no-mistake, crystal-clear ban on providers from offering end-to-end encryption in online services, from offering encrypted devices that cannot be unlocked for law enforcement, and indeed from offering any encryption that does not build in a means of decrypting data for law enforcement,\u201d <\/i><\/b><i>she wrote, <\/i><b><i>\u201cThis bill is the encryption backdoor mandate we\u2019ve been dreading was coming, but that nobody, during the past six years of the renewed Crypto Wars, had previously dared to introduce.\u201d<\/i><\/b><\/p><\/blockquote>\n<p>Riana Pfefferkorn also warned about the sweeping scope of the proposal:<\/p>\n<blockquote><p><b><i>\u201cIt isn\u2019t just aimed at Apple, Google, Facebook, Signal, and the like, though it certainly applies to them; it goes well beyond, to include everyone from Box and Dropbox to the full range of Microsoft\u2019s products, to OEM handset manufacturers.\u201d<\/i><\/b><\/p><\/blockquote>\n<p>Given the broad wording of the bill, Riana suggested that it might apply even to individual contributors in open-source projects.<\/p>\n<p>If the LAED Act passes, U.S. tech companies will be unable to provide users with end-to-end encryption.<\/p>\n<blockquote><p><b><i>\u201cSay goodbye to WhatsApp and Signal: they\u2019ll be wiped from the Google and Apple app stores. iMessage will no longer be E2EE, either. And as for Zoom\u2019s big plans to end-to-end encrypt video calls? If this passes, Zoom can put their pencils down on that one,\u201d<\/i><\/b><i> Riana Pfefferkorn wrote.<\/i><\/p><\/blockquote>\n<p>Importantly, the LAED Act doesn\u2019t even have to pass in order to harm encryption. As <a href=\"https:\/\/slate.com\/technology\/2020\/06\/lawful-access-encrypted-data-act.html\">pointed out<\/a> by Slate\u2019s Jillian Foley, companies that had plans to introduce strong encryption may now reconsider the decision\u201d<\/p>\n<blockquote><p><b><i>\u201cEven if this bill doesn\u2019t end up succeeding, any uncertainty in the meantime might make companies like Zoom unwilling to push ahead with ambitious plans for encryption, which could hold back privacy timelines months or possibly years.\u201d<\/i><\/b><\/p><\/blockquote>\n<p><b>Follow us on <\/b><a href=\"https:\/\/twitter.com\/forklogmedia\"><b>Twitter<\/b><\/a><b> and <\/b><a href=\"https:\/\/www.facebook.com\/forklogmedia\"><b>Facebook<\/b><\/a><b> and join our <\/b><a href=\"https:\/\/t.me\/forklogmedia\"><b>Telegram channel<\/b><\/a><b> to know what\u2019s up with crypto and why it\u2019s important.<\/b><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Last week, Republican U.S. Senators introduced the Lawful Access to Encrypted Data Act \u201cending the use of \u2018warrant-proof\u2019 encrypted technology by terrorists and other bad actors to conceal illicit behavior.\u201d Experts and privacy advocates think it can effectively outlaw strong encryption.<\/p>\n","protected":false},"author":6,"featured_media":9169,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"select":"1","news_style_id":"","cryptorium_level":"","_short_excerpt_text":"","creation_source":"human_written","_metatest_mainpost_news_update":false,"footnotes":""},"categories":[3],"tags":[1123,1113,219],"class_list":["post-9167","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-and-analysis","tag-encryption","tag-surveillance","tag-us"],"aioseo_notices":[],"amp_enabled":true,"views":"2769","promo_type":"1","layout_type":"","short_excerpt":"","is_update":"","_links":{"self":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/9167","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/comments?post=9167"}],"version-history":[{"count":2,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/9167\/revisions"}],"predecessor-version":[{"id":9171,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/9167\/revisions\/9171"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media\/9169"}],"wp:attachment":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media?parent=9167"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/categories?post=9167"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/tags?post=9167"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}