Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Compliance

Senators Introduce “Balanced” Bill That Aims to End Warrant-Proof Encryption

Republican senators have introduced what they have described as a “balanced” bill that would require technology companies to give law enforcement agencies access to encrypted user data.

Republican senators have introduced what they have described as a “balanced” bill that would require technology companies to give law enforcement agencies access to encrypted user data.

Authorities in the United States and other countries have long tried to convince — an in some cases force — tech companies to develop and use encryption that would allow law enforcement to access encrypted data if needed. Experts have argued that adding backdoors to encryption systems would also allow malicious actors to abuse those backdoors, thus defeating the purpose of strong encryption.

Senators Lindsey Graham (R-South Carolina), Tom Cotton (R-Arkansas) and Marsha Blackburn (R-Tennessee) are making another attempt with a new bill introduced on Tuesday, which they have named the Lawful Access to Encrypted Data Act.

They claim the goal of the bill is to “bolster national security interests and better protect communities across the country by ending the use of ‘warrant-proof’ encrypted technology by terrorists and other bad actors to conceal illicit behavior.”

The officials believe that while encryption is “vital” for securing data, communications and financial transactions, law enforcement should be given access to the information they seek if they present a warrant.

Governments typically argue that end-to-end encryption hinders law enforcement investigations into the activities of alleged terrorists, criminals and pedophiles. The senators who introduced the Lawful Access to Encrypted Data Act also say that strong encryption “adds little to the security of the communications of the ordinary user, but it is a serious benefit for those who use the internet for illicit purposes.”

On the other hand, security and privacy experts who support the use of end-to-end encryption provide journalists, activists, whistleblowers and members of persecuted groups as examples of individuals for whom strong encryption is crucial.

Governments would like tech companies to develop encryption that provides strong encryption for users while also giving law enforcement access to encrypted data for use in their investigations. This is technically impossible without implementing a backdoor that could also be abused by malicious actors.

Advertisement. Scroll to continue reading.

The Republican senators say the Lawful Access to Encrypted Data Act is more balanced compared to previously proposed legislation because in addition to forcing device manufacturers and service providers to help law enforcement gain access to encrypted data, it provides incentives.

The Attorney General would be allowed to ask companies to report on their ability to comply with court orders, but it’s prohibited from forcing vendors to use specific technical methods.

Moreover, the government would compensate companies for their compliance and the Attorney General would create a prize competition to reward those who create a solution that maximizes privacy and security while allowing lawful access to encrypted data.

The Justice Department would also fund a grant program to “increase digital evidence training for law enforcement and creates a call center for advice and assistance during investigations.”

Related: WhatsApp Defends Encryption as It Tops 2 Billion Users

Related: DoJ Again Asks for Encryption Backdoors After Hacking US Naval Base Shooter’s iPhones

Related: Inside GCHQ’s Proposed Backdoor Into End-to-End Encryption

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Bill Dunnion has joined telecommunications giant Mitel as Chief Information Security Officer.

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

More People On The Move

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Data Protection

The cryptopocalypse is the point at which quantum computing becomes powerful enough to use Shor’s algorithm to crack PKI encryption.

CISO Strategy

SecurityWeek spoke with more than 300 cybersecurity experts to see what is bubbling beneath the surface, and examine how those evolving threats will present...

CISO Conversations

Joanna Burkey, CISO at HP, and Kevin Cross, CISO at Dell, discuss how the role of a CISO is different for a multinational corporation...

Artificial Intelligence

The CRYSTALS-Kyber public-key encryption and key encapsulation mechanism recommended by NIST for post-quantum cryptography has been broken using AI combined with side channel attacks.

CISO Conversations

In this issue of CISO Conversations we talk to two CISOs about solving the CISO/CIO conflict by combining the roles under one person.

CISO Strategy

Security professionals understand the need for resilience in their company’s security posture, but often fail to build their own psychological resilience to stress.