US gov says it can break your encryption without a court order

Share on Twitter
Share on Google+
Share on LinkedIn
Share on Reddit
Remember all that drama over encryption, with the FBI wrestling in court with Apple over its inability to access an iPhone belonging to one of the San Bernardino terrorists? And the way that the FBI, even after it paid somebody to crack that iPhone, keeps arguing that strong encryption is allowing major swaths of the criminal and terrorist underworld to “go dark”?
It’s all octopus ink, if you go by what the government says: it doesn’t need approval from its secret surveillance court to ask a tech company to create an encryption backdoor. It already has the legal authority to compel cooperation, it stated in Congressional testimony released over the weekend.
Sophos Home
Free home computer security software for all the family
Learn More
According to ZDNet’s Zack Whittaker, the remarks were made in July in response to questions posed by Sen. Ron Wyden (D-OR), but they were only made public this weekend.
Intelligence officials from the FBI, the National Security Agency (NSA), and the Director of National Intelligence (DNI) told the Senate Intelligence Committee on 7 June 2017 that they can resort to an order from the Foreign Intelligence Surveillance Court (FISC) compelling tech companies to help them out if need be. But they don’t even have to go that far (and had not, as of the date of the hearing), given that they can use FISA to authorize government personnel to compel compliance without the FISC even being given a heads-up about the matter.
ZDNet says the intelligence officials declined to tell the committee whether they’d ever asked a company to add an encryption backdoor.
As ZDNet points out, the government relies on Section 702 of Title VII of the Foreign Intelligence Surveillance Act (FISA) to carry out the bulk of its intelligence gathering and surveillance operations.
That’s not the legislation the FBI relied on in its attempts to get Apple to unlock either the San Bernardino terrorist’s iPhone or that of an alleged meth dealer in Brooklyn. Rather, in those cases, the government relied on a broad interpretation of a law known as the All Writs Act.
黑客可能会制作击键记录软件,并安装在公共电脑上,公司应该教育员工不要在未知的公共电脑上进行和公司相关的业务操作。
The All Writs Act, which hails from 1789, allows courts to issue writs (orders) “necessary or appropriate in aid of their respective jurisdictions and agreeable to the usages and principles of law.”
During the June testimony before Congress, intelligence officials strenuously defended Section 702, saying that it had provided valuable intelligence in multiple cases.
Their support is timely: the legislation is up for renewal, reform or expiration by year’s end, in a few weeks.
网络安全法宣传推广视频 https://v.qq.com/x/page/p050493s0f5.html

The news that the legislation OKs the government’s compelling of encryption breakage without seeking a court order likely isn’t consequential. As it is, the court in question – the FISC – basically just rubber stamps the government’s surveillance requests, keeping its proceedings secret and almost never pushing back against the requests, as NPR has reported.
ZDNet cited a blog post by Marcy Wheeler, an independent journalist who focuses on national security, who last month dissected a FISA reform bill proposed by Wyden.
Wheeler explained that Wyden is concerned that Section 702 “leaves in place current statutory authority to compel companies to provide assistance, potentially opening the door to government mandated de-encryption without FISA Court oversight.”
Translation: the government can use the legislation to force a company such as Apple to back-door its encryption.
Yup, that’s exactly what he’s concerned about, Wyden confirmed in a statement on the bill.
Follow @LisaVaas
犯罪份子使用类似“钓鱼邮件”的技术引诱您,通过要求您点击貌似真实的邮件或短信中的链接,进而获取您的敏感信息如银行账号,密码及信用卡资料,所以,请保持警戒!

猜您喜欢

信息安全意识测验
针对普通员工的环境和职业健康安全管理体系在线教程
网络安全法视频宣传片 第二集 国家网络安全的现状与重要性概述
百国外交官集聚双11品鉴中国文化
CLASSIFIEDS1000 PETERVERDONE
防泄密意识培训课