When the Democratic presidential contenders gathered on the debate stage in Des Moines, Iowa, on Saturday, just hours after a series of terrorist attacks in Paris left at least 129 people dead, the candidates spent the early portion of their time on stage examining issues related to national security. They spoke of boots on the ground, regime changes, what role the United States ought to play in the fight against ISIS, and whether or not they use the term radical Islam.
But curiously, throughout the lengthy discussion, the one issue that was never mentionednot oncewas encryption. Thats lucky, at least for the candidates. As the world continues to reel from the Paris attacks, the debate over whether tech companies like Apple and Google are allowed to fully encrypt users communications will, no doubt, become one of the central dramas of the national security conversation going into the 2016 presidential race. It may also be among the toughest issues for the candidates, especially Democrats, to navigate.
Encryption may be among the toughest issues for the candidates, especially Democrats, to navigate.
Just yesterday, CIA director John Brennan said that he hoped the Paris attacks would serve as a wakeup call to those who oppose government surveillance in favor of personal privacy.
There are a lot of technological capabilities that are available right now that make it exceptionally difficult both technically as well as legally for intelligence security services to have insight that they need to uncover it,” he said, adding that terrorists have gone to school to figure out ways to evade intelligence officials.
Brennan attributed that fact, in part, to Edward Snowdens disclosures of the National Security Agencys bulk data collection programs, saying they tipped would-be terrorists off to surveillance tactics. In the past several years, because of a number of unauthorized disclosures and a lot of hand-wringing over the governments role in the effort to try to uncover these terrorists, he said, there have been some policy and legal and other actions that make our ability, collectively, internationally, to find these terrorists much more challenging.
This, of course, is not the first time weve heard these concerns from government officials. Just a day before the Paris attacks, the NSAs former general counsel, Matt Olsen, told an audience gathered in Des Moines that after Snowden came forward, the agency lost track of terrorists. Meanwhile, FBI director James Comey has been an outspoken critic of encryption, arguing that it enables criminals to go dark.
Whether encryption is really the security risk the government makes it out to be, of course, is still up for debate. We at WIRED have debated it plenty. Now it’s time for the presidential candidates to do the same.
Until now, the Democratic candidates in particular have been light on detail about where they stand on encryption and surveillance. This reticence stands to reason. By aligning themselves too closely with Washington’s intelligence community, they could alienate their Silicon Valley base, which is increasingly powerful in politics. But if they cater too much to the interests of tech companies such as Apple and Google, they could lose favor among voters who increasingly see national security as the country’s most pressing issue.
Former Secretary of State Hillary Clinton has walked an uneasy line on the subject of surveillance in the past. On one hand, she was a supporter of the controversial PATRIOT Act as a senator back in 2001, a decision that’s been widely criticized by Bernie Sanders’ camp. This summer, she also said that cybersecurity legislation such as the Cybersecurity Information Sharing Act, or CISA, which is already highly unpopular among privacy advocates, doesn’t go far enough in encouraging tech companies to share information with the US government. And during the first debate, she said Snowden “stole very important information that has unfortunately fallen into a lot of the wrong hands,” and that he shouldn’t return home “without facing the music.”
‘I think there are really strong, legitimate arguments on both sides.’
At the same time, however, she has endorsed the USA Freedom Act, which would end the NSA’s bulk data collection program, calling it “a good step forward in ongoing efforts to protect our security and civil liberties.” And at a conference earlier this year, Clinton told Re/Code’s Kara Swisher that encryption is “a classic hard choice,” but she hedged before offering up her plan for what to do about it. “I would be the first to say I don’t have the answer,” she said. “I think there are really strong, legitimate arguments on both sides.”
Vermont Senator Bernie Sanders, on the other hand, has been far more outspoken in his opposition of government surveillance. He received a round of applause at the first Democratic debate for voting against the PATRIOT Act and has said that, as president, he would shut down the NSA’s surveillance program altogether.
But national security is considered Sanders’ major weak spot. Even those who support his stance on inequality sometimes question his ability as commander-in-chief. The more fearful Americans become of the threat ISIS poses, the weaker Sanders’ stance on surveillance may appear to the electorate beyond Sanders’ base. After all, a recent poll showed that 56 percent of voters said they would give the government access to some personal data if it meant protecting the country from a terrorist attack.
On the other side of the aisle, candidates like Jeb Bush, Marco Rubio, Carly Fiorina, Donald Trump, and Chris Christie have all spoken out against encryption and the need for government surveillance. The one notable exception, of course, is Kentucky Sen. Rand Paul, who said at a conference last week that he believes governments should require warrants to access people’s communications. Still, that policy doesn’t apply to companies like Apple, which promises users that their data is encrypted so that it can’t be accessed even with a warrant.
The battle over how to balance security and privacy, of course, is nothing new in politics. Just last month, the Obama administration backed away from legislation that would have forced tech companies to decrypt messages for law enforcement. The move was seen as a win for technologists and privacy advocates alike.
Those same advocates are now hoping that fear won’t cause politicians to resume the fight against encryption. “The Paris attacks are absolutely tragic, but the response must not be to undermine cybersecurity for digital services on which many millions of people depend,” said Harley Geiger, senior counsel and advocacy director for the Center for Democracy & Technology. “Weakening encryption will also not prevent organized groups from using strong encryption. Difficult-to-crack encryption and apps will continue to be available on the Internet, even if governments seek to ban them.”
And yet, as calls for stronger national security spread post-Paris, candidates that support encryption may face added pressures from both the public and their Republican opponents to reevaluateor at the least, delineatewhere they stand on encryption. And when they do, they may find it’s not so easy to keep both sides happy.
Go here to read the rest:
After Paris, Encryption Will Be a Key Issue in the 2016 Race
- encryption - How secure is AES-256? - Cryptography Stack ... - June 2nd, 2019
- The World's Email Encryption Software Relies on One Guy, Who ... - May 5th, 2019
- Encryption breakthrough could keep prying eyes away from your ... - May 5th, 2019
- What Is Data Encryption? Definition, Best Practices & More ... - May 1st, 2019
- IronClad Encryption Partners with Data443 Risk Mitigation ... - April 30th, 2019
- What Is Encryption? An Overview of Modern Encryption ... - April 30th, 2019
- Symmetric vs. Asymmetric Encryption What are differences? - April 29th, 2019
- Difference Between Hashing and Encryption - ssl2buy.com - April 29th, 2019
- What is Advanced Encryption Standard (AES)? - Definition ... - April 29th, 2019
- How to Encrypt Your Wireless Network - Lifewire - April 29th, 2019
- After Paris, Encryption Will Be a Key Issue in the 2016 ... - April 22nd, 2019
- Email encryption - Wikipedia - April 8th, 2019
- What is Encryption, and Why Are People Afraid of It? - April 8th, 2019
- Data encryption | cryptology | Britannica.com - April 8th, 2019
- How to Enable Full-Disk Encryption on Windows 10 - April 1st, 2019
- Does Encryption Really Help ISIS? Heres What You Need to ... - March 27th, 2019
- AES and RSA Encryption Explained - March 27th, 2019
- Encryption: What it is and why its important - Norton - March 23rd, 2019
- Email encryption in transit - Gmail Help - March 21st, 2019
- Authenticated encryption - Wikipedia - March 19th, 2019
- Email Encryption Options for MDaemon Email Server - March 14th, 2019
- How to Encrypt Files on Windows - Tutorial - Toms Guide - March 6th, 2019
- Encryption, Key Management - bank information security - March 5th, 2019
- Which Types of Encryption are Most Secure? - February 7th, 2019
- JSON Object Signing and Encryption (JOSE) - February 4th, 2019
- What Is Encryption, and How Does It Work? - January 26th, 2019
- The Pitfalls of Facebook Merging Messenger, Instagram, and ... - January 26th, 2019
- Encryption: Avoiding the Pitfalls That Can Lead to Breaches - January 14th, 2019
- Encryption | Information Technology Services - December 31st, 2018
- Encryption - Investopedia - December 16th, 2018
- How to Protect Data at Rest with Amazon EC2 Instance Store ... - December 9th, 2018
- Next Generation Encryption - blogs.cisco.com - December 4th, 2018
- 3 Different Data Encryption Methods - DataShield blog - November 22nd, 2018
- Security and encryption | Documentation | Turtl - November 18th, 2018
- Encryption | General Data Protection Regulation (GDPR) - November 16th, 2018
- Using Encryption and Authentication Correctly (for PHP ... - November 13th, 2018
- Encryption | SANS Security Awareness - November 9th, 2018
- Types of Encryption | Office of Information Technology - November 5th, 2018
- Use Your own Encryption Keys with S3s Server-Side ... - October 29th, 2018
- What is Tokenization vs Encryption - Benefits & Uses Cases ... - October 12th, 2018
- Device Encryption | it.ucsf.edu - October 12th, 2018
- 5 Common Encryption Algorithms and the Unbreakables of the Future - September 15th, 2018
- Top 5 best encryption software tools of 2018 | TechRadar - August 26th, 2018
- New EBS Encryption for Additional Data Protection | AWS ... - August 22nd, 2018
- Best Encryption Software 2018 - Encrypt Files on Windows PCs - August 20th, 2018
- Download BestCrypt Volume Encryption 3.78.05 / 4.01.09 Beta - July 26th, 2018
- End-to-end encryption - Wikipedia - July 24th, 2018
- Download Symantec Encryption Desktop 10.4.0 Build 1100 - July 15th, 2018
- HTTPS - Wikipedia - July 10th, 2018
- AES encryption - June 20th, 2018
- Encrypt email messages - Outlook - June 20th, 2018
- Download Sophos Free Encryption 188.8.131.52 - softpedia.com - June 19th, 2018
- Does Skype use encryption? | Skype Support - June 16th, 2018
- Encryption- Computer & Information Security - Information ... - May 25th, 2018
- Enable BitLocker on USB Flash Drives to Protect Data - May 25th, 2018
- Transparent Data Encryption (TDE) - msdn.microsoft.com - April 12th, 2018
- Encryption Software Market - Global Forecast to 2022 - March 24th, 2018
- What AES Encryption Is And How It's Used To Secure File Transfers - March 24th, 2018
- Encryption vs. Cryptography - What is the Difference? - March 24th, 2018
- Energy-efficient encryption for the internet of things | MIT News - February 16th, 2018
- The Best Encryption Software - TopTenReviews - February 16th, 2018
- File-Based Encryption | Android Open Source Project - February 7th, 2018
- Beyond Encryption | Secure Enterprise email using existing ... - February 1st, 2018
- Azure Search enterprise security: Data encryption and user ... - January 26th, 2018
- Skype finally getting end-to-end encryption | Ars Technica - January 13th, 2018
- FBI chief says phone encryption is a 'major public safety issue' - January 13th, 2018
- Encryption and Export Administration Regulations (EAR) - December 27th, 2017
- Key (cryptography) - Wikipedia - December 21st, 2017
- security - Fundamental difference between Hashing and ... - December 15th, 2017
- What Is Encryption? | Surveillance Self-Defense - December 4th, 2017
- Comodo Disk Encryption Download - softpedia.com - December 1st, 2017
- Encryption - Simple English Wikipedia, the free encyclopedia - November 24th, 2017
- BitLocker Drive Encryption Overview - technet.microsoft.com - November 23rd, 2017
- The Encrypting File System - technet.microsoft.com - November 18th, 2017
- FBI cant break the encryption on Texas shooters smartphone - November 13th, 2017
- DOJ: Strong encryption that we dont have access to is ... - November 13th, 2017
- DOJ Fires Up New War With Apple Over Encryption - November 12th, 2017
- Security Awareness - Encryption | Office of Information ... - October 15th, 2017
- Data Encryption and Decryption (Windows) - October 14th, 2017
- Trumps DOJ tries to rebrand weakened encryption as responsible ... - October 11th, 2017