Why Ensuring Lawful Access Is Necessary - And Response

  • Tuesday, June 30, 2020

A 55-year-old man from Knoxville, sexually enticed a female minor while she was online. Evidence revealed at trial showed the man communicated with the minor, on numerous occasions, using a social media site, sending explicit sexual messages and requesting a meeting. A family member of the minor reported the inappropriate messages to law enforcement. After law enforcement initiated an undercover operation posing as the young girl, and within 48 hours, the perpetrator sent additional explicit sexual messages.

The perpetrator received 10 years in federal prison.

This despicable act is just one of far too many instances where vulnerable individuals fall victim to online predators, scammers and hackers who perpetrate their crimes in our communities using technology. Fortunately, law enforcement was able to access the evidence necessary to bring this particular predator to justice. However, due to the spread of technology like "end-to-end" and "warrant proof" encryption, it is becoming increasingly difficult for law enforcement to access critical digital evidence, even when permitted by a court. This makes the job of protecting all Americans from terrorists, drug traffickers and hackers, and in particular protecting children from online predators who seek to violate and exploit them, exceedingly difficult.

The COVID-19 pandemic has massively increased our online presence. While digital technology helps children continue their studies and stay connected with friends and families, this increased online presence also exposes children to predatory individuals on a previously unimaginable scale.

Child predators rely on digital apps and social media platforms to message and share images with potential victims, outside of the view of their caregivers and law enforcement. Increasingly, these internet platforms, through their own deliberate design, are unable to safeguard against criminals who can maintain anonymity due to "end-to-end" encryption.

"End-to-end" encryption prevents everyone except the participants in a digital conversation from viewing the content of messages, even when criminal activity is involved.

As a result, service providers can neither monitor their own platforms for illicit behavior nor produce readable content to law enforcement in response to court issued wiretap orders and search warrants. While encryption technology in general is an essential tool for protecting cybersecurity and privacy, "warrant-proof" forms of encryption allow perpetrators to avoid detection by law enforcement and limit access to vital evidence needed to bring criminals to justice or prevent crimes from happening in the first place.

Frequently, Attorney General William Barr has outlined the problems that arise when technology companies protect the privacy of individuals who seek to evade law enforcement and operate free of consequences without considering the other important values at stake. "End-to-end" encryption platforms turn the privacy of the unscrupulous into an absolute right contrary to society’s interests in public safety and without regard to the rights of potential victims of online exploitation.

A reasonable approach to encryption would balance the privacy and public safety interests of the community, by requiring makers of consumer devices and providers of online communication services to provide law enforcement with lawful access to encrypted data when authorized by a court of law.

As Attorney General Barr observed when commenting on a bill recently introduced in the United States Senate to address "warrant-proof" encryption, "Data security and public safety are not mutually exclusive. Encryption should keep us safe and secure, not provide an impenetrable safe haven for predators, terrorists and criminals."

Cybersecurity is a central part of the DOJ’s mission. It is one part of the broader safety net we can provide the American people: keeping data safe, personal information safe and communities and schools safe. We all want safe and secure private data; we also want safe and secure communities. And we can have both.

                                                   
J. Douglas Overbey
United States Attorney
Eastern District of Tennessee

*  *  *

The dream of “secure, but not warrant-proof” encryption is a pipe dream. Of course no one wants criminals to have uncrackable communications; the problem is that once a vulnerability is introduced into a platform, there is no way to control who uses it. Either an encryption scheme is mathematically difficult to decipher or not; the math doesn’t care whether the party using the backdoor is Mr. Overbey with a warrant or identity thieves in China. Insecure communications by fiat, when cracked by hackers or a bad actor nation-state, will halt the entire modern economy; e-commerce, proprietary information, even the electric grid, all gone.

In any case, who’s to say a warrant will always be required, even if it is at first? I hope we’ve learned from the misuse of the Patriot Act not to give the government more spying powers. If I recall, the old chestnut “but it’s for the children” was used to justify that one too.

Charles McCullough
East Ridge

Opinion
TNGOP Budget Puts Big Business Over Working Families - And Response
  • 4/19/2024

The Republican-controlled Tennessee General Assembly passed yesterday a $53 billion budget that included a $1.6 billion cash handout for some property-rich corporations and a new $400 million ... more

Capitol Report From State Rep. Greg Vital For April 19
  • 4/19/2024

General Assembly passes $52.8 billion budget Budget highlights supermajority’s efforts to keep taxes low and remain fiscally conservative Members of the 113th General Assembly on Thursday ... more