Critical Read

Study says law enforcement can make do without encryption override

digital key

What: "Don't Panic: Making Progress in the 'Growing Dark' Debate" -- a report from Harvard University's Berkman Center's Berklett Cybersecurity Project, released Feb. 1.

Why: Law enforcement and intel agencies have warned that criminals and terrorists are "going dark" -- using increasingly strong, commercially available encryption for their communications to evade monitoring. Security and law enforcement agencies have ominously complained that commercial encryption is crippling their investigative and surveillance capabilities and, by extension, opening up a new world of mayhem.

But the rising alarm in the national intelligence and law enforcement communities over increasingly strong encryption capabilities on commercial networks and devices isn't justified, according to a new study.

The Berkman Center said it tapped the expertise of security and policy experts from academia, civil society and the U.S. intelligence community in debates on the encryption issue; the study was a distillation of the points made in those discussions.

Fears of a new world of undetectable communications and crippled government and law enforcement surveillance capabilities, it said, are overblown, and ignore other technological developments and the interplay of commercial market pressures.

The end-to-end encryption and other architectures that obscure user data aren't attractive to companies that provide communications services because those companies use that data for revenue. It also said complete end-to-end encryption is unlikely since "software ecosystems" are mostly fragmented and it would take "far more coordination and standardization than currently exists" to work.

Additionally, it said the fear of suspects and terrorists telecommunications "going dark" rendering surveillance impossible discounts the rise of the Internet of Things, where all manner of devices offer new paths for surveillance. The IoT, it said will make everyday objects capable of providing still images, video and audio, possibly enabling real-time intercept and recording with after-the-fact access.

Verbatim: "Thus an inability to monitor an encrypted channel could be mitigated by the ability to monitor from afar a person through a different channel."

Click here to read the full study.

About the Author

Mark Rockwell is a senior staff writer at FCW, whose beat focuses on acquisition, the Department of Homeland Security and the Department of Energy.

Before joining FCW, Rockwell was Washington correspondent for Government Security News, where he covered all aspects of homeland security from IT to detection dogs and border security. Over the last 25 years in Washington as a reporter, editor and correspondent, he has covered an increasingly wide array of high-tech issues for publications like Communications Week, Internet Week, Fiber Optics News, tele.com magazine and Wireless Week.

Rockwell received a Jesse H. Neal Award for his work covering telecommunications issues, and is a graduate of James Madison University.

Click here for previous articles by Rockwell. Contact him at mrockwell@fcw.com or follow him on Twitter at @MRockwell4.


Featured

  • Cybersecurity
    Shutterstock photo id 669226093 By Gorodenkoff

    The disinformation game

    The federal government is poised to bring new tools and strategies to bear in the fight against foreign-backed online disinformation campaigns, but how and when they choose to act could have ramifications on the U.S. political ecosystem.

  • FCW PERSPECTIVES
    sensor network (agsandrew/Shutterstock.com)

    Are agencies really ready for EIS?

    The telecom contract has the potential to reinvent IT infrastructure, but finding the bandwidth to take full advantage could prove difficult.

  • People
    Dave Powner, GAO

    Dave Powner audits the state of federal IT

    The GAO director of information technology issues is leaving government after 16 years. On his way out the door, Dave Powner details how far govtech has come in the past two decades and flags the most critical issues he sees facing federal IT leaders.

Stay Connected

FCW Update

Sign up for our newsletter.

I agree to this site's Privacy Policy.