{"id":3247,"date":"2019-08-08T21:58:42","date_gmt":"2019-08-08T21:58:42","guid":{"rendered":"https:\/\/blog.paranoidprofessor.com\/?p=3247"},"modified":"2019-08-08T21:58:42","modified_gmt":"2019-08-08T21:58:42","slug":"more-like-postcards-than-like-letters","status":"publish","type":"post","link":"https:\/\/blog.paranoidprofessor.com\/index.php\/2019\/08\/08\/more-like-postcards-than-like-letters\/","title":{"rendered":"More like postcards than like letters"},"content":{"rendered":"\n<p>Every couple of\nyears, sometimes more often, some politician or law enforcement\nofficer brings up that encryption is preventing them from doing their\njob.  Just recently reported in Arstechnica was such an article about\nthe US Attorney General William Barr.<\/p>\n\n\n<p style=\"padding-left: 80px;\"><a href=\"https:\/\/arstechnica.com\/tech-policy\/2019\/08\/post-snowden-tech-became-more-secure-but-is-govt-really-at-risk-of-going-dark\/\" target=\"_blank\" rel=\"noopener noreferrer\">\u201cEncryption seriously degrades law enforcements ability to detect and prevent crime before it occurs.\u201d<\/a><\/p>\n\n\n<p>It is true that when messages or data is encrypted it is difficult to impossible to decrypt depending on how well the encryption was done.  I do have to agree that as a law professional it must be frustrating to be thwarted by locked phones, encrypted messages, mail or documents.  In the \u201cgood old days\u201d you only needed to turn on the device to be able to browse through it looking for something incriminating. In retrospect that should probably be thought of the as the golden age of law enforcement starting with the creation of the personal computer and lasting up until about 2000.  It is a subjective date but at the time the new kid on the block was the BlackBerry which was a cell phone with secure encryption.  This was the first wake up call that information could be encrypted so that it could not be simply intercepted and examined.  This allowed anti-government groups to both communicate in real time without the fear of that information getting out.<\/p>\n\n\n\n<p>Over the years since then more and more security (ie encryption) technology has become main-stream.  So simple in fact that you only need to know how to make a call or send a message and not be forced to use other intrusive methods to protect your message.<\/p>\n\n\n\n<p style=\"font-size:24px\">Prevention<\/p>\n\n\n\n<p>The argument of Mr. Barr and all of these other well meaning people is that if this information was not encrypted it would allow law enforcement the ability to prevent bad things from happening.  This is both a very admirable goal but quite lofty as well.  The number of emails sent per day is <a href=\"https:\/\/www.templafy.com\/blog\/how-many-emails-are-sent-every-day-top-email-statistics-your-business-needs-to-know\/\">269 billion<\/a> while the number of text messages are <a rel=\"noreferrer noopener\" aria-label=\"18 billion per day (opens in a new tab)\" href=\"https:\/\/www.textrequest.com\/blog\/how-many-texts-people-send-per-day\/\" target=\"_blank\">18 billion per day<\/a>.  I am not sure what the US infrastructure would need to be in order to process this bulk of information, but it would be substantial.  It is not the few computers needed to sift through the data but what happens to the threats that are found.  If the goal was to prevent crimes then coordination between a group of potential bank robbers in rural Nebraska should be reported to the nearest authorities.<\/p>\n\n\n\n<p>To be honest, I\ncannot see this level of access by the government being all that\nhelpful for local crimes.  I would imagine that they would focus on\nFederal crimes such as threats to the nation\u2019s leaders or general\nTerrorism.  Unless the terrorists are pretty stupid, they would not\nbe telegraphing their movements.<\/p>\n\n\n<p style=\"padding-left: 40px;\"><strong>Poor<\/strong><\/p>\n<p style=\"padding-left: 40px;\">We will all meet at the corner of 3rd street as planned on Tuesday 13 March at 5pm.<\/p>\n<p style=\"padding-left: 40px;\"><strong>Average<\/strong><\/p>\n<p style=\"padding-left: 40px;\">We are meeting on Tuesday at 5pm<\/p>\n<p style=\"padding-left: 40px;\"><strong>Clever<\/strong><\/p>\n<p style=\"padding-left: 40px;\">The plan is on, meet next Tuesday at the spot we agreed.<\/p>\n\n\n<p>These exact messages are not so much help unless you have the context.  These messages could be for some sort of terrorist plot or it could be meeting for a bachelor party.  The context may be found in a single email but more than likely it would need to be gathered through many mails with other methods (ie humans interacting with bad guys).  The emails, despite the massive volume, may not provide enough information.<\/p>\n\n\n\n<p style=\"font-size:24px\">Improve access or\nallow overreach<\/p>\n\n\n\n<p>Allowing lawful access to encrypted information without prior approval or assistance of the party being surveilled would be really nice.  The government has knowledge that you are purchasing very questionable materials and would like to take a peek into your communications to verify this.  This request, if guarded by impartial people, on the ground of national security does seem reasonable.  Nobody wants a bombing or a plane crash to occur if it can be prevented.<\/p>\n\n\n\n<p>Yet there is always mission creep.  If this ability to access emails were possible and the government decided that they would also use this power to tackle large scale fraud and corruption it would probably be viewed as good.  It would not be long before some ambitious person decided that people cheating on their taxes would also be a good target for this as well.  What about helping to prosecute spouses that do not pay their alimony or child support?<\/p>\n\n\n\n<p>None of these are bad uses but what is the person who had this access was not impartial and had a chip on his or her shoulder.  This would be a great way to do the same thing in a directed manner. Trying to dig up dirt on an ex-boyfriend.  Getting hints on what your political opponent is doing and find ways to undermine them &#8211; part of the problem is that people are flawed.<\/p>\n\n\n\n<p>Sometimes this\naccess to the data is referred to as a back door.  Basically, a\nhidden way to monitor or access data in a given system.  It seems to\nbe that it should really be referred to as the front door.  To enable\nthis functionality, you are giving either a key for that particular\nuser or for all users of that particular system to the government. \nWould you trust that some government official, policeman or other\npolitical appointee had access to all your data?  Would you trust\nthem to have the key to your house or apartment?<\/p>\n\n\n\n<p style=\"font-size:24px\">No encryption would provide effective access<\/p>\n\n\n\n<p>Well, at least if this power would be given over it would be effective?  It would be probably 98% effective or perhaps even more emails or social media accounts.  The problem is the smartest \u201cbad people\u201d would be able to cover their tracks pretty effectively.   <\/p>\n\n\n\n<ul><li>Private mode browsing to reduce browsing history<\/li><li>Using docker or virtual machines to reduce browsing history<\/li><li>Old fashioned couriers for transferring messages or materials<\/li><li><a rel=\"noreferrer noopener\" aria-label=\"Dead drops   (opens in a new tab)\" href=\"https:\/\/edition.cnn.com\/videos\/us\/2016\/06\/21\/what-is-a-dead-drop-declassified-mike-rogers-orig.cnn\" target=\"_blank\">Dead drops<\/a> for transmitting information in an unseen manner<\/li><li><a rel=\"noreferrer noopener\" aria-label=\"Book ciphers (opens in a new tab)\" href=\"https:\/\/en.wikipedia.org\/wiki\/Book_cipher\" target=\"_blank\">Book ciphers<\/a> to make the data uniquely encrypted<\/li><li><a rel=\"noreferrer noopener\" aria-label=\"Spam encoding (opens in a new tab)\" href=\"http:\/\/www.spammimic.com\/encode.cgi\" target=\"_blank\">Spam encoding<\/a> another interesting way to pass messages around in plain sight<\/li><li><a rel=\"noreferrer noopener\" aria-label=\"Embedded in pictures (opens in a new tab)\" href=\"https:\/\/www.makeuseof.com\/tag\/4-ways-to-hide-secret-messages-in-pictures\/\" target=\"_blank\">Embedded in pictures<\/a> yet another way of hiding or transferring messages<\/li><li><a rel=\"noreferrer noopener\" aria-label=\"Foldering (opens in a new tab)\" href=\"https:\/\/www.fastcompany.com\/40586130\/manafort-allegedly-used-foldering-to-hide-emails-heres-how-it-works\" target=\"_blank\">Foldering<\/a>, messages saved in draft folder<\/li><li>Use messaging services that have not been compromised<\/li><\/ul>\n\n\n\n<p>The ability for law\nenforcement to have access to the contents of a smart phone is not\nuseless but it is more useful for prosecuting people who have already\ndone bad things.  Depending on the crime, the criminal is no longer\nalive to have justice meted out to him.<\/p>\n\n\n\n<p>Presumably, just having access to the SIM card in the smart phone would allow the investigators a trail of people or phones that they can follow.  This information would (currently)  provides a digital footprint to where the phone went.<\/p>\n\n\n\n<p style=\"font-size:24px\">What could it hurt to provide this &#8220;back door&#8221;?<\/p>\n\n\n\n<p>People are basically honest and hard working so we have little to fear.  Many people have access to other types of high security materials.  Well, that may be the case but people are also basically lazy and have a tendency to do the least possible work to get the most possible income.<\/p>\n\n\n\n<p>Not only that but\nthis provides a very juicy target for people with bad intentions. \nLook at the problems that occurred due to incompetence, laziness or\nbad luck.<\/p>\n\n\n\n<ul><li><a rel=\"noreferrer noopener\" aria-label=\"Yahoo (opens in a new tab)\" href=\"https:\/\/money.cnn.com\/2017\/10\/03\/technology\/business\/yahoo-breach-3-billion-accounts\/index.html\" target=\"_blank\">Yahoo<\/a> (3 billion)<\/li><li><a rel=\"noreferrer noopener\" aria-label=\"Capital one data breach  (opens in a new tab)\" href=\"https:\/\/edition.cnn.com\/2019\/07\/29\/business\/capital-one-data-breach\/index.html\" target=\"_blank\">Capital one data breach <\/a>(100 million)<\/li><li><a rel=\"noreferrer noopener\" aria-label=\"NSA tools leak (opens in a new tab)\" href=\"https:\/\/www.schneier.com\/blog\/archives\/2019\/05\/leaked_nsa_hack.html\" target=\"_blank\">NSA tools leak<\/a><\/li><li><a rel=\"noreferrer noopener\" aria-label=\"Facebook (opens in a new tab)\" href=\"https:\/\/www.upguard.com\/breaches\/facebook-user-data-leak\" target=\"_blank\">Facebook<\/a> (540 million)<\/li><li><a rel=\"noreferrer noopener\" aria-label=\"Fortnite (opens in a new tab)\" href=\"https:\/\/research.checkpoint.com\/hacking-fortnite\/\" target=\"_blank\">Fortnite<\/a> (200 million)<\/li><li><a rel=\"noreferrer noopener\" aria-label=\"Aadhaar  (opens in a new tab)\" href=\"https:\/\/www.zdnet.com\/article\/another-data-leak-hits-india-aadhaar-biometric-database\/\" target=\"_blank\">Aadhaar <\/a>(1.1 billion)<\/li><\/ul>\n\n\n\n<p>It is truely difficult to ensure that personal data is kept secure even with no back door as these companies can attest to.<\/p>\n\n\n\n<p>The benefit of\nproviding such a \u201csecret back door\u201d is questionable while the\ndamage would be immeasurable if this access made its way into the\nwrong hands.  This \u201cleak\u201d wouldn\u2019t have to be sabotage or ill\nwill, it could be carelessness by someone who had legitimate access.<\/p>\n\n\n\n<p>After all, if the NSA cannot manage to keep their secret tools and methods secret what are the odds that a group that is controlled by politicians will fare any better?<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Every couple of years, sometimes more often, some politician or law enforcement officer brings up that encryption is preventing them from doing their job. Just recently reported in Arstechnica was such an article about the US Attorney General William Barr. &hellip; <a href=\"https:\/\/blog.paranoidprofessor.com\/index.php\/2019\/08\/08\/more-like-postcards-than-like-letters\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[89,4],"tags":[],"_links":{"self":[{"href":"https:\/\/blog.paranoidprofessor.com\/index.php\/wp-json\/wp\/v2\/posts\/3247"}],"collection":[{"href":"https:\/\/blog.paranoidprofessor.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.paranoidprofessor.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.paranoidprofessor.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.paranoidprofessor.com\/index.php\/wp-json\/wp\/v2\/comments?post=3247"}],"version-history":[{"count":4,"href":"https:\/\/blog.paranoidprofessor.com\/index.php\/wp-json\/wp\/v2\/posts\/3247\/revisions"}],"predecessor-version":[{"id":3252,"href":"https:\/\/blog.paranoidprofessor.com\/index.php\/wp-json\/wp\/v2\/posts\/3247\/revisions\/3252"}],"wp:attachment":[{"href":"https:\/\/blog.paranoidprofessor.com\/index.php\/wp-json\/wp\/v2\/media?parent=3247"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.paranoidprofessor.com\/index.php\/wp-json\/wp\/v2\/categories?post=3247"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.paranoidprofessor.com\/index.php\/wp-json\/wp\/v2\/tags?post=3247"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}