Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×
Encryption Government Privacy Security

FBI Chief Calls Unbreakable Encryption 'Urgent Public Safety Issue' (reuters.com) 442

The inability of law enforcement authorities to access data from electronic devices due to powerful encryption is an "urgent public safety issue," FBI Director Christopher Wray said on Tuesday in remarks that sought to renew a contentious debate over privacy and security. From a report: The FBI was unable to access data from nearly 7,800 devices in the fiscal year that ended Sept. 30 with technical tools despite possessing proper legal authority to pry them open, a growing figure that impacts every area of the agency's work, Wray said during a speech at a cyber security conference in New York. "This is an urgent public safety issue," Wray added, while saying that a solution is "not so clear cut."
This discussion has been archived. No new comments can be posted.

FBI Chief Calls Unbreakable Encryption 'Urgent Public Safety Issue'

Comments Filter:
  • by 110010001000 ( 697113 ) on Tuesday January 09, 2018 @11:02AM (#55893577) Homepage Journal
    Think of the children! No, not the children assembling iPhones in sweatshops: the children the FBI are looking to protect. Think of them.
  • "I want free access to the cookie jar, waaaaaah!"

    • I'm not sure it is (Score:5, Insightful)

      by H3lldr0p ( 40304 ) on Tuesday January 09, 2018 @11:07AM (#55893613) Homepage

      I don't see it all that short term thinking. This is definitely part of a larger picture, a longer termed plan.

      Get this wedge in now, this idea that some authority should have all the keys to the encryption kingdom, and it should be easier to keep it there when the next privacy scheme comes along. Otherwise it's a doubly hard fight the next time. You have to convince more people that the authorities are correct to want it. Do it now, when it is of less concern.

      • by 110010001000 ( 697113 ) on Tuesday January 09, 2018 @11:14AM (#55893677) Homepage Journal
        Exactly. Once the plan is in place it is very hard to repeal. After all, the plan was keeping us safe. Why would you want to repeal it? Do you want the terrorists to win?
        • by ebyrob ( 165903 ) on Tuesday January 09, 2018 @11:27AM (#55893819)

          It's sad.

          Breakable encryption is no encryption at all. I guess the 3 letter agencies want to back-door themselves to indeterminism along with the whole world just because they think it'll give them that last 2% of control. Perhaps they don't realize what an asymptote maximizing control is. (With an emphasis on the as)

          • by VeryFluffyBunny ( 5037285 ) on Tuesday January 09, 2018 @12:55PM (#55894675)
            And the FBI doesn't see weakened, back-doored, or no encryption as a threat to national security? Just think, Russia or North Korea could interfere with US elections!
            • Hell, on the other hand, they may already actually really have it all broken, and the TLA's are doing a very smart thing...bitching that they can't get into devices to give everyone a false sense of security.

              Or...am I giving them too much credit?

          • by infolation ( 840436 ) on Tuesday January 09, 2018 @01:02PM (#55894727)
            Their meltdown backdoor's unavailable so it's time to legislate on front doors again.
      • by Archtech ( 159117 ) on Tuesday January 09, 2018 @11:23AM (#55893777)

        In fact the story goes back to 1975 (at least). That's when Diffie and Hellman found themselves battling the NSA, which wanted DES to be accepted as the encryption standard simply because NSA could crack it.

      • by bluefoxlucid ( 723572 ) on Tuesday January 09, 2018 @11:34AM (#55893871) Homepage Journal

        I strongly oppose government efforts to weaken our protections. I'm relying on unbreakable encryption in my own campaign, notably in my plans to end identity theft and increase voter participation. The most-powerful encryption ever used has been the spoken word, in closed quarters, with a soft noise generator to prevent electronic surveillance: no record of communications. Written and then pulped notes. Anything that destroys the data.

        I haven't translated these plans to my new site [johnmoserforcongress.com] yet. I need to, but I've been working alone. My political competitor, Elijah Cummings, has expressed no interest in protecting our privacy from domestic spying.

      • by nine-times ( 778537 ) <nine.times@gmail.com> on Tuesday January 09, 2018 @11:42AM (#55893935) Homepage

        To be honest, I don't think he's exactly wrong to say that unbreakable encryption is a public safety issue. It's an issue. It's an issue we can debate and think about and talk about. If encryption is unbreakable, then it makes it harder for law enforcement to do certain things that they might validly want to do.

        On the other hand, if people can't encrypt their data (or that encryption is breakable), then it creates an entirely different set of problems. People can't safeguard their data or protect their systems. It increases the vulnerability of our infrastructure. It increases the chances that criminals and terrorists can gain access to important and private information.

        There are going to be real valid problems either way. There should be open discussions about what all of those problems are, and how we can mitigate them. But ultimately, I don't think breakable encryption (or backdoored encryption) is a viable long-term option, even if we were willing to live in a police state. The ability to break or circumvent encryption will inevitably fall into the hands of criminals.

        • by geekmux ( 1040042 ) on Tuesday January 09, 2018 @12:44PM (#55894587)

          To be honest, I don't think he's exactly wrong to say that unbreakable encryption is a public safety issue. It's an issue. It's an issue we can debate and think about and talk about. If encryption is unbreakable, then it makes it harder for law enforcement to do certain things that they might validly want to do.

          On the other hand, if people can't encrypt their data (or that encryption is breakable), then it creates an entirely different set of problems. People can't safeguard their data or protect their systems. It increases the vulnerability of our infrastructure. It increases the chances that criminals and terrorists can gain access to important and private information.

          There are going to be real valid problems either way. There should be open discussions about what all of those problems are, and how we can mitigate them. But ultimately, I don't think breakable encryption (or backdoored encryption) is a viable long-term option, even if we were willing to live in a police state. The ability to break or circumvent encryption will inevitably fall into the hands of criminals.

          You want to have open discussions? Fine. We'll start with dismantling the FISA court system that seeks to hide Unconstitutional activity.

          I agree, there are issues on both sides. No one is debating the existence of a Catch-22 here. The real problem is those who are asking for the keys to the kingdom cannot be trusted to respect The People or their Constitutional Rights. THAT is the real issue to address.

          • by HornWumpus ( 783565 ) on Tuesday January 09, 2018 @12:57PM (#55894687)

            We don't get much data on the FISA courts. What we get shows the promises made to be pure, unmitigated bullshit.

            The FISA judges are supposed to be holding the government to standards. They are FAILING, based on 100% FISA court warrant issue rate reported for the initial years of operation.

            Rubber stamp court should be abolished immediately, all warrants quashed. All records publicly reviewed and any perjury by feds (or anybody else) prosecuted to _full_ extent of law (after a period of a few years).

            I can dream can't I? Not a crime to dream of justice for the justice department, at least not yet.

        • by Trailer Trash ( 60756 ) on Tuesday January 09, 2018 @12:52PM (#55894645) Homepage

          To be honest, I don't think he's exactly wrong to say that unbreakable encryption is a public safety issue. It's an issue.

          He's absolutely correct that it's a public safety issue. The last century taught us (those who were paying attention, at least) that authoritarian government is the biggest public safety issue that has ever existed, save for maybe the bubonic plague. So, sorry FBI, the bottom line is that we have bigger fish to fry than "encryption".

      • by sdinfoserv ( 1793266 ) on Tuesday January 09, 2018 @11:52AM (#55894031)
        My biggest problem with "them" having the keys to the entire kingdom is "they" have repeatedly demonstrated a lack of accountability, complete disregard to law when not being immediately scrutinized, and just the basic ability to keep the keys they already have, safe.
        Other than that, what's the problem?
        • by dgatwood ( 11270 )

          Even if you assume that they'll do their jobs perfectly, there would still the problem that any back door is essentially guaranteed to eventually be discovered by bad actors and used against the public at large. If the NSA gets their way, we won't be able to do banking online, because it won't be possible to secure the transactions. We won't be able to use credit cards at stores, because it won't be possible to secure the transactions. Basically, imagine a global information apocalypse, and then multipl

      • this idea that some authority should have all the keys to the encryption kingdom

        Much as I don't like this idea myself, it is not new.

        The Fourth Amendment explicitly allows the Executive Branch — after securiing Judicial Branch's approval — to access all of our possessions and "effects". They have a right to do that, which no one seems to seriously dispute.

        The strong encryption has given us the means to lock things up so that even the government can't get them — this part is new. Although t

        • by hierofalcon ( 1233282 ) on Tuesday January 09, 2018 @12:21PM (#55894331)

          While correct, you're missing the point. Ciphers have been around for a very, very long time. They weren't used as extensively in the past as they are today. But they've been around throughout history. A quick wikipedia search references Egyptian hieroglyphs for example. The technology progressed over time and the cost to break the encrypted text increased over time to what we have today.

          Nonetheless, encrypted communications were available when the constitution was written and they were in use. Yet the constitution makes no mention of preventing the citizens from using encrypted communications or in forcing the users to decrypt the documents on demand.

          The federal government gave itself the rights mentioned, but did not choose to worry about the technology of the day providing documents that they could see, but couldn't decrypt without a lot of work or the help of one of the parties on either end of the transmission. They had just fought a revolution against a government that employed big brother tactics (like garrisoning soldiers in people's homes). They didn't want the government doing any of that type of crap anymore.

          The FBI and others might really wish today that the writers had considered encryption, but they didn't choose to. The writer's generation relied on spies and good old footwork to figure things out. They didn't rely solely on documents. Good for them.

          • At least one of the founding fathers was well aware of strong cryptography and at the time made a cipher that was thought to be unbreakable [wikipedia.org] by some. By today's standards it is pretty weak but versions of it saw use into WWII [wikipedia.org] where it was used for securely transmitting near real-time info that if cracked a few hours or a day later by the enemy would be of no value.
        • by anegg ( 1390659 )

          The Fourth Amendment explicitly allows the Executive Branch â" after securiing Judicial Branch's approval â" to access all of our possessions and "effects". They have a right to do that, which no one seems to seriously dispute. The strong encryption has given us the means to lock things up so that even the government can't get them â" this part is new. Although they still have the right to read your data, they no longer have the ability to do it.

          I'm not of the opinion that the U.S. Constit

    • by DickBreath ( 207180 ) on Tuesday January 09, 2018 @12:13PM (#55894259) Homepage
      If the FBI gets their way on this weak breakable encryption, it will have economic consequences for the US.

      The other 96% of the world's population will know that they can't trust American products. They might make their own phones, systems, devices, etc even more secure against American TLAs. Thus accomplishing the opposite of what the TLAs want.

      Aren't the majority of smartphones already made outside the US? Maybe all they need to do is build their own secure OS with secure encryption that the US won't like. Will the US stop people coming in with foreign made phones that are too secure?

      What about economic consequences of American executives traveling abroad using insecure US made equipment and having valuable trade secrets stolen?

      But think of the children!
  • Oh no! (Score:5, Funny)

    by gfxguy ( 98788 ) on Tuesday January 09, 2018 @11:05AM (#55893599)
    Heaven forbid people actually be secure in their persons, papers, and effects!
    • Re:Oh no! (Score:5, Insightful)

      by MachineShedFred ( 621896 ) on Tuesday January 09, 2018 @11:14AM (#55893679) Journal

      If he can find unbreakable encryption to be an urgent public safety issue, can I find him to be an urgent public privacy issue?

      Also, no amount of wishing will put the AES-256 toothpaste back in the tube. Because, math.

      • by suutar ( 1860506 )

        This. Even if it was mandated tomorrow that all encrypted communications shall use X cipher to which the government has a backdoor and through magic psychic software it actually cannot be decrypted without proper cause and judicial review, there's not anything that would prevent the payload from being encrypted again using a different system, and there would be no way to tell without actually decrypting the outer wrapper.

      • Re:Oh no! (Score:5, Insightful)

        by sdinfoserv ( 1793266 ) on Tuesday January 09, 2018 @11:59AM (#55894113)
        People said that when television first went to satellites. Back in the '80;s, home satellite TV boxes had card readers (just like credit cards) that had all your data id: channel and subscription info, on them. Possession of card readers, used by hackers to read/write their own cards, even for legitimate purposes (like making library cards on the same technology) became a crime - So too did even the "knowledge" of how the readers worked. It was a crime to post or share data layouts or how the hardware functioned. When a society reaches a point where it accepts that knowledge itself is a crime, essentially, outlawing ideas, the notion of "freedom" from there on is nothing more than veneer.
      • When AES-256 is a crime only criminals will have AES-256. Make using it a crime and it won't matter that you can't crack it since you can just lock anyone using it up. Problem solved.
      • Also, no amount of wishing will put the AES-256 toothpaste back in the tube. Because, math.

        Which is exactly why I would like to outlaw specific types of math. Nobody needs anything larger than a 32-bit number for anything, nor a decimal point number. Let's ban floating point math and any number larger than 2^31 (for scientific use) and 2^29 (for economic use). This prevents strong encryption (remember that symmetric encryption can be done in far fewer bits than the FBI would like to allow). Problems solved for everyone.

    • Re:Oh no! (Score:4, Insightful)

      by TheGratefulNet ( 143330 ) on Tuesday January 09, 2018 @11:32AM (#55893861)

      pigs just keep on piggin'.

      each month is a new cry about their lack of ability to STROLL THRU OUR LIVES and even plant shit on our computers.

      we will not give in. but I suspect we'll lose anyway, because they have infinite money, power, almost people, who want to invade our privacy for lulz (mostly).

      its sad that we are now in a perpetual state of WAR with our own governments on this very issue. and they show no signs of giving in.

    • The question might better be phrase 'is it unreasonable to require breakable encryption that may expose all of a person's 'papers and effects' despite their intention to be private in such?'

      Because we recognize a right to be secure from unreasonable searches and seizures.

  • by sinij ( 911942 ) on Tuesday January 09, 2018 @11:07AM (#55893607)
    I will grant Christopher Wray benefit of the doubt and interpret his words charitably - he must have meant it is public safety issue that more people don't use strong cryptography, potentially exposing sensitive data to FBI and other crooks.
  • by DontBeAMoran ( 4843879 ) on Tuesday January 09, 2018 @11:08AM (#55893625)

    Either encryption works for everyone, or it works for no one.

    In the end, calling unbreakable encryption an "urgent public safety issue" is pointless.

    Why are cars lacking security features against terrorists?
    Why are guns lacking security features against terrorists?
    Why is cash lacking security features against terrorists?

    The FBI/CIA/NSA does not only want to access the devices thieves/killers/terrorists, they want to spy on EVERYONE.

    • The justice system in the US is for the most part adversarial. The prosecutors and police are on one side and the alleged criminals and their lawyers on the other. I think this works well in some cases. In other cases I think it doesn't work at all. In France and other places, there are no sides and what matters to the courts is that the truth gets out.

      There are many cases where I think the French way is a better solution, such as organized crimes. Mafiosos, gangs, paedophile rings, etc should n

    • Encryption can be either secure or insecure. You can't have it both ways.

      If secure, then the hackers can't break it, but neither can the government.

      If insecure, then the government can read your data, but so can the hackers.

      If US made products are known to have mandated weak encryption, the rest of the world will take note of that. It will put US products at a competitive disadvantage relative to other products not subject to mandatory weak encryption. US travelers abroad can have their valuable
  • by Arzaboa ( 2804779 ) on Tuesday January 09, 2018 @11:11AM (#55893649)

    An urgent public safety issue? Talk about first world problems. Even if one person gets through and kills 50 people, Its a sad day, but certainly not the end of the world.

    --
    We had every right to shoot him. - G. Gordon Liddy

  • by Jody Bruchon ( 3404363 ) on Tuesday January 09, 2018 @11:11AM (#55893655)
    You have the legal authority to pry them open. Get prying. Having the authority to try to open something doesn't give you the entitlement to open it. Unfortunately, it seems the top dog at the FBI does not understand this concept. It's also entirely the fault of the FBI and other government agencies with police powers that this encryption situation has gone in this direction. They made this bed and they must lie in it. No law can change the fundamental properties of mathematical operations, and good luck outlawing consumer encryption since every CPU being made nowadays (even Celerons and Atoms) has hardware AES and such strong encryption is ubiquitous. Combined with the epic failure and subsequent revelations of major flaws in the government's key escrow Clipper Chip, there is no way the FBI is killing off the spread of encryption.
    • It's not a matter of whether they understand the technology or not. They just don't give a damn. They want access to EVERYTHING, ALL THE TIME, and Constitional rights be damned. This is the true nature of the mind of your average law-enforcement type. Your 'rights', to them, are more like 'privileges, which can be granted and revoked at their will and whim, because they have guns.' This is why we're supposed to have checks and balances built into our criminal legal system, and this is why it's important to
  • by Anonymous Coward
    It is an 'Urgent Public Safety Issue', but not in the way they are suggesting...
  • by CaptainDork ( 3678879 ) on Tuesday January 09, 2018 @11:15AM (#55893681)

    ... is our fucking brains.

    "Our inability to get inside people's heads is an "urgent public safety issue."

    • Re: (Score:2, Funny)

      I am pretty sure they are already in our heads. I hear them talking to me all the time.
    • Government agencies throughout the ages had no problem with cracking skulls open.

      Granted, it wasn't usually done when they wanted to get information out of said skulls. More if they wanted said information to cease existing.

  • Apparently doesn't know what the first, fourth and fourteenth amendments are or that they are supposed to protect us from him.
  • send mulder and scully to the apple spaceship!

  • I remember back in the 90's or early 2000's someone said the CIA was intercepting ALL email in the USA, and running it through a program that would look for key words or some such garbage. I went into my signature file, using a WHITE FONT and put in my sig file about 20-30 words that should have triggered something, just to hopefully screw with their program. Probably didn't work, but it made me feel better. Hey, I'm as law and order as the next guy, but MY PRIVACY IS MINE. You THINK I'm doing something il
  • Sure (Score:5, Interesting)

    by HornyBastard ( 666805 ) on Tuesday January 09, 2018 @11:25AM (#55893797)
    I will use any encryption that you want me to use.
    As long as you can prove to me that you use the same encryption for everything at the FBI.
    If you are not willing to do that. GO FUCK YOURSELF
  • What those people are overlooking is that if encryption is weak enough (or subverted) that NSA can crack it, it is weak enough for other government agencies and criminals to do likewise.

    They may still believe that good ol' American know-how leads the world - but if so, they are just plain wrong. Mathematics is international.

  • To be honest, Law Enforcement and their " kill everyone who doesn't comply with our demands " is an urgent Public Safety Issue.

    Encryption, on the other hand, hasn't killed any innocent people as far as I know so I think their priorities are a bit skewed.

    Back on topic:

    Encryption, when properly inplemented, does exactly what it's supposed to do. It keeps unauthorized eyes off of private data. Just because you wear a badge doesn't give you the right to spy on everyone.

    If our government could be trusted, we w

  • Why Not Try? (Score:5, Interesting)

    by bartle ( 447377 ) on Tuesday January 09, 2018 @11:29AM (#55893843) Homepage

    What puzzles me is, with all of the resources that the US federal government has at their disposal, why aren't they actually trying to crack encrypted phones?

    As I understand it, the older iPhones could likely be cracked by desoldering a chio and interrogating it. The newer ones have their entire security apparatus encased in a single chip but I don't see why the chip couldn't be removed, disassembled, and its partial private key extracted. It's probably not something that could be done by hand and would probably involve contracting with a chip-fabricating outfit. The outlay costs would be enormous but once a "Federal Bureau of Device Recovery" was established and operational, they could make back money by cracking phones for state and local law enforcement.

    It's just so strange because it seems likely that eventually other countries will have this capability, if they don't already. My guess is that if the FBI hasn't figured out how to crack encrypted iPhones themselves in the next 5 years, they'll be a company in Israel that will be happy to do it for them.

    • Re:Why Not Try? (Score:5, Informative)

      by ledow ( 319597 ) on Tuesday January 09, 2018 @11:43AM (#55893949) Homepage

      Decapping a chip is difficult, expensive and not guaranteed. Most TPMs and security-chips are almost impossible to open without damage.

      Go look at the arcade-ROM decapping efforts. Even 30-year-old ROMs have protections that mean some games are now permanently lost forever, and the ones that are successful rely on "seeing" (via X-Ray etc.) the data as a visible effect on the image. That doesn't work for anything modern at all, you'd need new kinds of instruments or something to measure the individual charge on an individual transistor from billions of them on a tiny sliver of silicon.

      Modern chips, especially those designed to be secure and avoid tampering? Not a chance. Nobody has yet demonstrated an attack on a modern TPM chip like that, and the private keys aren't exactly just sitting there in plain-text even if you could.

      And then updating for EVERY technology change, nm-advancement, etc.? Cost would not just be prohibitive but astronomical.

      Do you believe that those 7800 devices a year are all just one read away from stopping a terrorist attack each? Highly unlikely. If anything one arrest could result in 20-30 devices, not even worrying about whether it was a drug-deal or a telecoms violation or whatever else the FBI might deal with.

      The value just isn't there, even if the technology could exist.

      To my knowledge, literally NO-ONE in the world has read a key from a physical iPhone security chip, for instance. There have been software flaws, and things found in publicly available firmware that are quickly patched out but even those don't cause the processor to magically give up all its private keys. That's not how those chips work. Even Apple themselves may not be able to do it (only replace the device in question and reset it, not bring across the private keys).

      This is part of the "problem". The system is secure. And that means secure from all attackers, including the people who want access to the devices for legitimate reasons (e.g. the owners in some cases!). If it wasn't, it would be insecure, against both those categories of people, and thus not be fit for purpose.

      Sure, at some point, someone will find a hole. And then the next round will devices will counter that. But the FBI expecting to have something that nobody else in the world has, possibly even the manufacturer, which can only be given by weakening the whole purpose of the system for everyone, and for it to be cost-effective, to handle a boat load of enquiries that they presumably have NO OTHER evidence for? That's just silly.

      I'm sure if it was "go to war or not" territory, someone would find a way. But there, no expense is spared. As a run of the mill "let's see what this terrorist suspect texted via WhatsApp" enquiry? Not a chance.

      If they COULD do this, they would be. And they'd be keeping very quiet about it. Because the second it was public, every new phone, chip and computer would be redesigned to stop it in the future.

    • by guruevi ( 827432 )

      Lack of warrants. If they had the warrants to do that to these phones, they would've done it. The reason they want easy access is so that they can get arrests made without getting in trouble about breaking the phone. Right now, the phones are just bricks with potential damaging information on a presumably innocent suspect.

      Although a well designed security chip won't be easy to break, they self-destruct when attempts are made to get physical access.

    • Re:Why Not Try? (Score:4, Insightful)

      by DickBreath ( 207180 ) on Tuesday January 09, 2018 @12:29PM (#55894437) Homepage
      Because. What they REALLY want is different. They want unsupervised, unmonitored, warrantless access to all your data, any time. All the time. That is what this is actually about. Even if they need secret gag orders imposed upon tech companies. They want unmonitored access.

      We now have:
      Secret Laws
      Secret Interpretations of Laws
      Secret Courts
      Secret Warrants
      Secret Court Orders
      Secret Arrests
      Secret Trials
      Secret Evidence (not made available to the defense)
      Secret Convictions
      Secret Prisons
      Secret "enhanced interrogation" programs


      Gee, it sounds like we've become everything we were fighting against in the previous century.
  • by Hal_Porter ( 817932 ) on Tuesday January 09, 2018 @11:36AM (#55893889)

    The director paged through the packet logs from the FBI director's machine and smiled to himself.

  • If they've got a wiretap warrant, then they can put a trojan on the suspects phone _before_ the arrest to gather evidence.
    Just send a 'copy all data to FBI server' command when you're ready to make the arrest so that even if the phone is locked/destroyed they've got the data.

  • The inability of law enforcement authorities to gain convictions due to legal rights is an “urgent public safety issue,” FBI Director Christopher Wray said on Tuesday in remarks that sought to renew a contentious debate over privacy and security.

    The FBI was unable to force convictions of nearly data from nearly 7% of the accused [wikipedia.org] in the fiscal year that ended Sept. 30, despite possessing proper legal authority to lie, trick, and deceive [popehat.com], a figure that impacts every area of the agency's work, Wray

  • by Impy the Impiuos Imp ( 442658 ) on Tuesday January 09, 2018 @11:49AM (#55894009) Journal

    They want to catch crooks. Meanwhile, billions in dictatorships are kept down with the assistance of breaking crypto.

    Are we to sacrifice them so a prosecutor can get a notch or two on his belt once in a great while?

    And what are those hundreds of millions of children living with a boot on their face...forever...worth?

    Torture and murder some, you are a nasty criminal. Torture and murder hundreds of thousands, and people in free countries say you are practicing self-rule.

  • by PPH ( 736903 ) on Tuesday January 09, 2018 @11:53AM (#55894053)

    7800 terrorists went free? 7800 deals for pot were consummated? Or 7800 sets of hot nude pics were not drooled over by FBI agents?

  • by dark.nebulae ( 3950923 ) on Tuesday January 09, 2018 @11:55AM (#55894071)

    Nobody said your job was going to be easy.

    No one has granted you carte blanche to access our data, our lives, our thoughts.

    The big problem here is the effort to prevent a crime vs solving a crime.

    The government, the police, the feds, etc. want access to prevent a crime, but that in itself is quite fluid because, as Trump is demonstrating, it can be a "crime" just to say he is a foolish, petulant child. So they want access to everything to "prevent" this kind of thing.

    While I might support cracking something open for additional evidence to solve a crime, where at least one or more judges agree that a crime has been committed and where the courts can be used to argue whether or not to force the opening, I would never consent to allowing any so-called authority a pass key to dig around in my stuff in a preventative fishing expedition.

  • ... that crime has increased exponentially in sync with the exponential rise in smart device sales.

    Just kidding and stuff.

    Today [fbi.gov], the FBI released its annual compilation of crimes reported to its Uniform Crime Reporting (UCR) Program by law enforcement agencies from around the nation. Crime in the United States, 2015 reveals a 3.9 percent increase in the estimated number of violent crimes and a 2.6 percent decrease in the estimated number of property crimes last year when compared to 2014 data.

    According to the report, there were an estimated 1,197,704 violent crimes committed around the nation. While that was an increase from 2014 figures, the 2015 violent crime total was 0.7 percent lower than the 2011 level and 16.5 percent below the 2006 level.

  • by Slicker ( 102588 ) on Tuesday January 09, 2018 @12:42PM (#55894571)

    While we want privacy and anonymity, we don't want it used for nefarious purposes. Such things tend to serve people generally but also terrorists, pedophiles, drug cartels, etc. I strongly believe we need a system that provides accountable anonymity, such as a Reputational Identity Service.

    That is, create an identity that enables others it interacts with to rank its reputations along a rubric. This could be used for determining if the identity is a good citizen on comment boards, doesn't cheat people in business, etc. It could act as a form of credit check... Does the entity have a strong reputation for dependability in paying what it owes? Just like with ordinary credit, an identity would begin with no reputation and slowly build one over time. If the identity has a long history of being a certain way then the risk is low that that will change any time soon. This is true, even if the same person holds two identities--one for good and one for evil. You will know which one is safe to deal with, and how much it is..

    Each person's must have a limit as to how much he/she can give to others, to prevent undue reputation inflation or deflation. So each time you score another, you have a percentage of your total to give and that takes away proportionally from those you have already given to. So one's reputation can build but it will also fade over time. One's reputation score is measured by its average over time... This is LIKES++.

    On message boards, filter and allow privileges based on reputations. Do business based on reputations. Deny certain information based on reputation. Reputation may always be earned or lost.

  • by jwhyche ( 6192 ) on Tuesday January 09, 2018 @06:18PM (#55896975) Homepage

    Since there is no such thing as unbreakable encryption, I fail to see the problem here. Sure, it might take you a trillion years but all encryption can eventually be broken. Just takes time.

Don't tell me how hard you work. Tell me how much you get done. -- James J. Ling

Working...