Create an account


Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
AppleInsider - Republican bill seeks end to ‘warrant-proof’ encryption

#1
Republican bill seeks end to ‘warrant-proof’ encryption

<div style="margin: 5px 5% 10px 5%;"><img src="https://www.sickgaming.net/blog/wp-content/uploads/2020/06/republican-bill-seeks-end-to-warrant-proof-encryption.jpg" width="870" height="485" title="" alt="" /></div><div><div><img src="https://www.sickgaming.net/blog/wp-content/uploads/2020/06/republican-bill-seeks-end-to-warrant-proof-encryption.jpg" class="ff-og-image-inserted"></div>
<p>U.S. Senate Republicans on Tuesday introduced the Lawful Access to Encrypted Data Act, a bill that seeks to weaken encryption technologies that have in the past put a damper on law enforcement operations. </p>
<div class="col-sm-12">
<p>The proposed bill is <a href="https://www.judiciary.senate.gov/press/rep/releases/graham-cotton-blackburn-introduce-balanced-solution-to-bolster-national-security-end-use-of-warrant-proof-encryption-that-shields-criminal-activity">heralded by sponsors</a> as a means to strengthen national security interests and “better protect communities across the country” by ending “warrant-proof” encrypted technology used by terrorists and bad actors. </p>
</div>
<div class="col-sm-12">
<p>If enacted, the law would force tech companies to help agencies access encrypted data in service of a warrant. </p>
</div>
<div class="col-sm-12">
<p>Senate Judiciary Committee Chairman Lindsey Graham (R-SC) and Senators Tom Cotton (R-AR) and Marsha Blackburn (R-TN) proposed the act. </p>
</div>
<div class="col-sm-12">
<p>“Tech companies’ increasing reliance on encryption has turned their platforms into a new, lawless playground of criminal activity. Criminals from child predators to terrorists are taking full advantage,” said Cotton. “This bill will ensure law enforcement can access encrypted material with a warrant based on probable cause and help put an end to the Wild West of crime on the Internet,” </p>
</div>
<div class="col-sm-12">
<p>Government entities, namely law enforcement agencies, have long sought to dismantle strong encryption methods, including end-to-end messaging encryption, on-device encryption and other forms of personal data security, in a bid to streamline investigations. Critics and tech companies that market encrypted products, like Apple, argue strong encryption is a vital cog in the data privacy machine that, if weakened, leaves users <a href="https://appleinsider.com/inside/apple-and-encryption">vulnerable to attack</a>.
</p>
</div>
<div class="col-sm-12">
<p>“Terrorists and criminals routinely use technology, whether smartphones, apps, or other means, to coordinate and communicate their daily activities. In recent history, we have experienced numerous terrorism cases and serious criminal activity where vital information could not be accessed, even after a court order was issued. Unfortunately, tech companies have refused to honor these court orders and assist law enforcement in their investigations,” Graham said in a statement.
</p>
</div>
<div class="col-sm-12">
<p>While not mentioned by name, Apple in 2016 <a href="http://appleinsider.com/articles/16/02/16/judge-orders-apple-to-access-iphone-belonging-to-san-bernadino-shooter">refused to comply</a> with FBI requests to create a “backdoor” into an iPhone associated with a terror suspect. CEO Tim Cook at the time called the demand “<a href="https://appleinsider.com/articles/16/02/17/tim-cook-calls-fbi-backdoor-demand-dangerous-vows-to-fight-case">dangerous</a>,” noting a backdoor into one device would put the security of millions of others in jeopardy. </p>
</div>
<div class="col-sm-12">
<p>“My position is clear: After law enforcement obtains the necessary court authorizations, they should be able to retrieve information to assist in their investigations,” Graham said. “Our legislation respects and protects the privacy rights of law-abiding Americans. It also puts the terrorists and criminals on notice that they will no longer be able to hide behind technology to cover their tracks.”
</p>
</div>
<div class="col-sm-12">
<p>While Apple has vehemently argued against the creation of backdoors, it continues to comply with court orders and valid warrants for data as dictated by existing law. </p>
</div>
<div class="col-sm-12">
<p>The proposal includes a provision that would allow the attorney general to hold a competition that gives a prize for discovering methods of accessing encrypted data while “maximizing privacy and security.” protecting privacy and security. As noted by <em>CNET</em>, security experts have long regarded such concepts <a href="https://www.cnet.com/news/republicans-push-bill-requiring-tech-companies-to-help-access-encrypted-data/">as impossible</a>. </p>
</div>
<div class="col-sm-12">
<p>“The bill announced today balances the privacy interests of consumers with the public safety interests of the community by requiring the makers of consumer devices to provide law enforcement with access to encrypted data when authorized by a judge,” Attorney General Bill Barr said in a statement, <em>CNET</em> reports. “I am confident that our world-class technology companies can engineer secure products that protect user information and allow for lawful access.” </p>
</div>
<div class="col-sm-12">
<p>Today’s proposed bill is the latest attempt to dilute strong encryption technologies developed by big tech companies. </p>
</div>
</div>


https://www.sickgaming.net/blog/2020/06/...ncryption/
Reply



Forum Jump:


Users browsing this thread:

Forum software by © MyBB Theme © iAndrew 2016