Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Data Protection

Encryption Fears for Law Enforcement Overblown: Study

Encrypted communication is making law enforcement and counterterrorism investigations more difficult, but fears of “going dark” are overblown, a study said Monday.

The report by Harvard University’s Berkman Center said that despite efforts to boost encryption in smartphone and online services, investigations still can gain access to data in many circumstances.

Encrypted communication is making law enforcement and counterterrorism investigations more difficult, but fears of “going dark” are overblown, a study said Monday.

The report by Harvard University’s Berkman Center said that despite efforts to boost encryption in smartphone and online services, investigations still can gain access to data in many circumstances.

Encryption Debate

The study sought to evaluate claims by US law enforcement and intelligence officials that encryption is leading to a situation where they are unable to obtain data even with a legitimate warrant — a scenario described by some as “going dark.”

“We question whether the ‘going dark’ metaphor accurately describes the state of affairs,” the report said.

“Are we really headed to a future in which our ability to effectively surveil criminals and bad actors is impossible? We think not.”

The researchers acknowledged that it has become increasingly difficult to get data from encrypted smartphones powered by software Apple or Google software.

But they also pointed out a distinction between data “at rest” on smart devices and in transmission.

Advertisement. Scroll to continue reading.

“The distinction is important because an overwhelming percentage of Internet users communicate through web-based services, such as webmail, instant messages, and social networking websites that are not end-to-end encrypted,” the report said.

“In the course of an investigation, government officials can intercept communications and seek access to stored communications held by these intermediaries by obtaining a warrant, court order, or subpoena, provided that the company is capable of producing the information sought,” it added.

The encryption debate has heated up in the United States and other countries in light of concerns raised by FBI and National Security Agency officials who claim investigations are being hindered by encryption.

US presidential candidates and others have argued for solutions that could allow encrypted data to be delivered with an appropriate warrant.

But the Berkman report said that “short of a form of government intervention in technology that appears contemplated by no one outside of the most despotic regimes, communication channels resistant to surveillance will always exist.”

It also noted that for national security, “we must consider whether providing access to encrypted communications to help prevent terrorism and investigate crime would also increase our vulnerability to cyber espionage and other threats.”

The researchers said that despite the latest encryption efforts, many software systems are “fragmented” and that a lack of coordination will leave open some avenues for investigation.

The report said that with the number of connected devices on the rise, “this has the potential to drastically change surveillance. The still images, video, and audio captured by these devices may enable real-time intercept and recording with after-the-fact access.”

“The going dark metaphor suggests that communications are becoming steadily out of reach — an aperture is closing, and once closed we are blind,” the report concluded.

“This does not capture the current state and trajectory of technological development.”

Related: Charting a Middle Path on the Encryption Debate

RelatedSocial Media a Key Element for Terror Groups

Written By

AFP 2023

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

SecurityWeek’s Threat Detection and Incident Response Summit brings together security practitioners from around the world to share war stories on breaches, APT attacks and threat intelligence.

Register

Securityweek’s CISO Forum will address issues and challenges that are top of mind for today’s security leaders and what the future looks like as chief defenders of the enterprise.

Register

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Data Protection

The cryptopocalypse is the point at which quantum computing becomes powerful enough to use Shor’s algorithm to crack PKI encryption.

Artificial Intelligence

The CRYSTALS-Kyber public-key encryption and key encapsulation mechanism recommended by NIST for post-quantum cryptography has been broken using AI combined with side channel attacks.

Cybercrime

No one combatting cybercrime knows everything, but everyone in the battle has some intelligence to contribute to the larger knowledge base.

Compliance

The three primary drivers for cyber regulations are voter privacy, the economy, and national security – with the complication that the first is often...

Cybercrime

The FBI dismantled the network of the prolific Hive ransomware gang and seized infrastructure in Los Angeles that was used for the operation.

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Cybersecurity Funding

Los Gatos, Calif-based data protection and privacy firm Titaniam has raised $6 million seed funding from Refinery Ventures, with participation from Fusion Fund, Shasta...