SAN FRANCISCO, CA - September 19: One of the custom paintings in a stairwell of the Electronic ... [+] Frontier Foundation offices, September 19, 2013 in San Francisco, CA, USA. (Photo by Peter DaSilva for The Washington Post via Getty Images)
Recently, theres been a lot of activity around encryption, bitcoin and the connection between financial and personal liberty and digital rights and tools. As protest movements emerge around the world, there are also moves to create backdoors into encryption and to weaken the same technologies that are underpinning and supporting meaningful dissent from Hong Kong to Nigeria.
Electronic Frontier Foundation (EFF) director Cindy Cohn has been at the forefront of fighting for digital rights, both as a lawyer and advocate on important Constitutional cases. Heres her thoughts on what it means to lead a digital rights advocacy group in a volatile time where digital rights are under threat.
We set three challenge areas for the year 2020, but I would say that weve done a lot on them, there have been intervening events.
Our three challenge areas for 2020 were the rise of public-private partnerships between the police and private companies for surveillance purposes, the need to really articulate the role of the public interest Internet, especially in Europe to try to make sure that rules that get passed because Europe is mad at Facebook dont have bad effects on Facebook competitors or little businesses and also things like the Internet Archive and Wikimedia that are very much public interest pieces of Internet infrastructure.
And then the third [area] was to talk about the problems of content moderation and how the content moderation strategies of big tech are troubling and also causing these collateral effects like attacks on end-to-end encryption.
Those were the three things we started out with. Of course, the two big things that intervened and one small thing are, well, one big thing is COVID, of course and so we spent a lot of time on working on how to think about the kinds of tracking applications that are coming out on COVID soon well be talking about immunity passports [...], how to think about those things and how to weigh the tradeoffs.
The second big thing that happened was the big racial justice movement and police violence against people of color and the response and that has led us to really refresh and push out alot of the work that we do around protecting yourself in protests, as well as raise some concern on the use of facial recognition technologies and the impact they have on political protests and then the third thing is the election in the United States.
Theres probably a much more erudite version of this on the EFF website. The general framing of this, I try to frame it for people who may not be in the thick of it because it can feel really technical.
Imagine a world in which the local police come around and knock on your door and say theres crime around here, and some of it is really serious crime, so what we want you to do is to make sure that your doors not locked because if youre a criminal, we want to be able to come in and catch you, and most people would get thats a really insane way to go about law enforcement because, first of all, if theres crime about, you want to be more secure not less secure, and why are the cops treating me like Im a potential defendant as opposed to the person who needs to be protected?
These two things would come up for me immediately and I think they would for most people. Law enforcement isnt doing their job right if the way that theyre trying to do their job is to make me less secure in order to make their job easier.
[...]
Ive been involved in trying to protect end-to-end encryption, first to free it up from government control with the Bernstein case in the 90s, and now trying to protect it for the 30 years Ive been involved with Internet policy a time that predates even the World Wide Web. I can give you 20 other reasons as well, but I think those are the two biggest ones in terms of how to talk to people who arent deep in this debate about it.
We do a lot of work to support cryptocurrencies we passed the period where we were nervous about the regulatory state. [...] We do a lot of work to support financial privacy and we think that bitcoin and all cryptocurrencies are really for us as a civil liberties group we think about it in the framing of financial privacy and the importance of this. My colleague Rainey Reitman does a lot of work on this, and we do a lot of work talking to regulators on why financial privacy matters and why they should respect it.
The Jewel case had an argument in the Ninth Circuit Court of Appeals just on November 2nd, the day before the elections where it sits as a legal matter is that the government claims secrecy and that because of this secrecy the case should be dismissed some version of this state is been where weve been since weve launched the case in 2008. Well see if the Ninth Circuit buys it there are several other decisions that have come out of the Ninth Circuit in the last couple of years that makes us think they will reject the governments position. But that really just gets us to the starting gate of the case so well have further to go. So thats where that is, and were waiting to see what the panel is going to do.
In the overall fight about NSA surveillance [...], the bigger thing is that the NSA has abandoned two of the three big programs that it had that the [EFF] sued over. One of them is the mass collection of telephone records, which they didnt really abandon but Congress made them stop. They do something else that honestly doesnt seem to collect fewer records, so theres still an ongoing fight about that.
The underlying authority for that mass collection actually got extended to March 2020, and then they never renewed it. The underlying legal authority for the mass telephone collection has expired. We dont think that thats limited them too much because the way that these programs work if theyve launched it while they still have authority, they get to keep doing it. They usually cannot start a new investigation. Because its all secret, we dont know what loopholes are there, but on the surface, thats what its supposed to look like.
The other one is the mass metadata collection, which the [NSA] stopped a long time ago actually, because it didnt work and Congress was breathing down their necks about the fact that it didnt work so they stopped that one.
But the tapping into the Internet backbone, which is really to me the bigger of the programs in terms of our security and the risk of mischief is still going on as far as we can tell. Theyve had to limit it and theyve had to slowly narrow it, but the core of the program where theyre sitting on the Internet backbone watching all of the traffic that goes by with a secret list to pull off what they want thats still going on.
The first thing I would say is that while there are some individual things that people can do, if you reduce this to a problem about your choices, youre going to fail. Youre going to be overwhelmed. We have to stand up for policy choices and legal choices that make these tools available to us. Yes, people can use things like Signal and Tor (Im on the board of directors for the Tor Project), they can use DuckDuckGo rather than Google to have more private searches there are a suite of tools that you can use such as Mastodon rather than Facebook for your social media.
Theres a suite of alternative tools that people can use, but theyre all very small and weak compared to how big they ought to be, and I think we have to stand up for legal and policy solutions that make these tools better available to us. Supporting end-to-end encryption against these kinds of attacks is one of the big things that we do and a place where we put a lot of our efforts in but also just in general, how do we move away from the surveillance business model as well as the surveillance state. Both of them are growing greater right now and both of them require not just technical solutions, technical solutions are important but we also have to have policy and legal solutions tech cant do this by itself.
People can support organizations like us that do this work theres a ton of them and its a movement. If EFF is the one you want, we have cool swag but there are organizations all around the world, big and small that are working in the digital rights movement its not hard to find them, we have a bunch of them in our Electronic Frontier Alliance. In addition to supporting the tools by using the tools and building the tools, you need to support the laws and policies that protect the tools.
Read the original post:
EFF Director Cindy Cohn On Warrantless Surveillance, Encryption And Financial Privacy With Bitcoin - Forbes
- WhatsApp overhauling status tab with encrypted Snapchat Stories-like feature - 9 to 5 Mac [Last Updated On: February 21st, 2017] [Originally Added On: February 21st, 2017]
- GOP demands inquiry into EPA use of encrypted messaging apps - CNET [Last Updated On: February 21st, 2017] [Originally Added On: February 21st, 2017]
- Encryption Apps Help White House Staffers Leakand Maybe Break the Law - WIRED [Last Updated On: February 21st, 2017] [Originally Added On: February 21st, 2017]
- World Wide Web Creator Calls for Internet Decentralization & Encryption - The Data Center Journal [Last Updated On: February 21st, 2017] [Originally Added On: February 21st, 2017]
- What It Means to Have an 'Adult' Conversation on Encryption - Pacific Standard [Last Updated On: February 21st, 2017] [Originally Added On: February 21st, 2017]
- Confide in me! Encryption app leaks sensitive info from Washington DC - SC Magazine UK [Last Updated On: February 21st, 2017] [Originally Added On: February 21st, 2017]
- Gmail v7.2 Prepares to Add Support for S/MIME Enhanced Encryption - XDA Developers (blog) [Last Updated On: February 26th, 2017] [Originally Added On: February 26th, 2017]
- Top 6 Data Encryption Solutions - The Merkle [Last Updated On: February 26th, 2017] [Originally Added On: February 26th, 2017]
- Your Guide to the Encryption Debate - Consumer Reports - ConsumerReports.org [Last Updated On: February 26th, 2017] [Originally Added On: February 26th, 2017]
- Google helps put aging SHA-1 encryption out to pasture - Engadget [Last Updated On: February 26th, 2017] [Originally Added On: February 26th, 2017]
- Decipher your Encryption Challenges - Infosecurity Magazine [Last Updated On: February 28th, 2017] [Originally Added On: February 28th, 2017]
- How the Politics of Encryption Affects Government Adoption - Freedom to Tinker [Last Updated On: February 28th, 2017] [Originally Added On: February 28th, 2017]
- How Encryption Makes Your Sensitive Cloud-Based Data an Asset, Not a Liability - Security Intelligence (blog) [Last Updated On: February 28th, 2017] [Originally Added On: February 28th, 2017]
- Set up VMware VM Encryption for hypervisor-level security - TechTarget [Last Updated On: February 28th, 2017] [Originally Added On: February 28th, 2017]
- How The Media Are Using Encryption Tools To Collect Anonymous Tips - NPR [Last Updated On: February 28th, 2017] [Originally Added On: February 28th, 2017]
- Encryption patent that roiled Newegg is dead on appeal | Ars Technica - Ars Technica [Last Updated On: February 28th, 2017] [Originally Added On: February 28th, 2017]
- Research proposes 'full-journey' email encryption - The Stack [Last Updated On: March 1st, 2017] [Originally Added On: March 1st, 2017]
- Database-as-a-service platform introduces encryption-at-rest - BetaNews [Last Updated On: March 1st, 2017] [Originally Added On: March 1st, 2017]
- Encrypted Messaging Service 'Signal' Adds Video Call Option - Top Tech News [Last Updated On: March 2nd, 2017] [Originally Added On: March 2nd, 2017]
- Germany, France lobby hard for terror-busting encryption backdoors ... - The Register [Last Updated On: March 2nd, 2017] [Originally Added On: March 2nd, 2017]
- How to Send Encrypted Nudes, a Guide for the Discerning Lover - Inverse [Last Updated On: March 2nd, 2017] [Originally Added On: March 2nd, 2017]
- Ironclad Encryption Corporation Announces New Ticker Symbol OTCQB: IRNC - Yahoo Finance [Last Updated On: March 2nd, 2017] [Originally Added On: March 2nd, 2017]
- The Best Email Encryption Software of 2017 | Top Ten Reviews [Last Updated On: March 2nd, 2017] [Originally Added On: March 2nd, 2017]
- No, you shouldn't delete Signal or other encrypted apps - TechCrunch [Last Updated On: March 11th, 2017] [Originally Added On: March 11th, 2017]
- Best encryption software: Top 5 - Computer Business Review [Last Updated On: March 11th, 2017] [Originally Added On: March 11th, 2017]
- Encryption Backdoors, Vault 7, and the Jurassic Park Rule of Internet Security - Just Security [Last Updated On: March 11th, 2017] [Originally Added On: March 11th, 2017]
- That Encrypted Chat App the White House Liked? Full of Holes - WIRED [Last Updated On: March 11th, 2017] [Originally Added On: March 11th, 2017]
- What the CIA WikiLeaks Dump Tells Us: Encryption Works - New York Times [Last Updated On: March 11th, 2017] [Originally Added On: March 11th, 2017]
- Snake-Oil Alert Encryption Does Not Prevent Mass-Snooping - Center for Research on Globalization [Last Updated On: March 11th, 2017] [Originally Added On: March 11th, 2017]
- Customer Letter - Apple [Last Updated On: March 11th, 2017] [Originally Added On: March 11th, 2017]
- Don't Let WikiLeaks Scare You Off of Signal and Other Encrypted Chat Apps - WIRED [Last Updated On: March 12th, 2017] [Originally Added On: March 12th, 2017]
- BT to offer customers encryption service for data - Capacity Media (registration) [Last Updated On: March 12th, 2017] [Originally Added On: March 12th, 2017]
- Encryption - technet.microsoft.com [Last Updated On: March 12th, 2017] [Originally Added On: March 12th, 2017]
- Use FileVault to encrypt the startup disk on ... - Apple Support [Last Updated On: March 12th, 2017] [Originally Added On: March 12th, 2017]
- Viber launches secret chats to go beyond encryption - SlashGear [Last Updated On: March 13th, 2017] [Originally Added On: March 13th, 2017]
- Zix wins 5-vendor email encryption shootout - Network World [Last Updated On: March 13th, 2017] [Originally Added On: March 13th, 2017]
- A lesson from the CIA WikiLeaks dump: Encryption works - The Seattle Times [Last Updated On: March 13th, 2017] [Originally Added On: March 13th, 2017]
- What the CIA WikiLeaks Dump Tells Us: Encryption Works - NewsFactor Network [Last Updated On: March 18th, 2017] [Originally Added On: March 18th, 2017]
- Panicked Secret Service Says It Lost Encrypted Laptop But It's Fine, Everything's Fine - Gizmodo [Last Updated On: March 18th, 2017] [Originally Added On: March 18th, 2017]
- Google Cloud adds new customer-supplied encryption key partners ... - ZDNet [Last Updated On: March 18th, 2017] [Originally Added On: March 18th, 2017]
- Preseeding Full Disk Encryption - Linux Journal [Last Updated On: March 18th, 2017] [Originally Added On: March 18th, 2017]
- Bypassing encryption: 'Lawful hacking' is the next frontier of law enforcement technology - Boston Business Journal [Last Updated On: March 18th, 2017] [Originally Added On: March 18th, 2017]
- SecurityBrief NZ - Gemalto introduces on-prem encryption key solution for 'highly regulated' organisations - SecurityBrief NZ [Last Updated On: March 21st, 2017] [Originally Added On: March 21st, 2017]
- 'Always Be Concerned': US Court Slaps Down Fifth Amendment Defense of Encryption - Sputnik International [Last Updated On: March 21st, 2017] [Originally Added On: March 21st, 2017]
- Quantum Key System Uses Unbreakable Light-Based Encryption to Secure Data - Photonics.com [Last Updated On: March 21st, 2017] [Originally Added On: March 21st, 2017]
- Wikileaks Only Told You Half The Story -- Why Encryption Matters More Than Ever - Forbes [Last Updated On: March 21st, 2017] [Originally Added On: March 21st, 2017]
- EPA Sued For Withholding Info On Encrypted Text Messages | The ... - Daily Caller [Last Updated On: March 22nd, 2017] [Originally Added On: March 22nd, 2017]
- Opinion Data encryption efforts ramp up in face of growing security threats - Information Management [Last Updated On: March 22nd, 2017] [Originally Added On: March 22nd, 2017]
- Bypassing encryption: Lawful hacking is the next frontier of law enforcement technology - Salon [Last Updated On: March 22nd, 2017] [Originally Added On: March 22nd, 2017]
- NeuVector Announces Container Visualization, Encryption, and Security Solution for NGINX Plus - DABCC.com [Last Updated On: March 23rd, 2017] [Originally Added On: March 23rd, 2017]
- Is encryption one of the required HIPAA implementation specifications? - TechTarget [Last Updated On: March 23rd, 2017] [Originally Added On: March 23rd, 2017]
- Paper Spells Out Tech, Legal Options for Encryption Workarounds - Threatpost [Last Updated On: March 23rd, 2017] [Originally Added On: March 23rd, 2017]
- Encryption debate needs to be nuanced, says FBI's Comey - TechTarget [Last Updated On: March 25th, 2017] [Originally Added On: March 25th, 2017]
- Comey Renews Debate Over Encryption - 550 KTSA [Last Updated On: March 25th, 2017] [Originally Added On: March 25th, 2017]
- UK minister says encryption on messaging services is unacceptable - Reuters [Last Updated On: March 28th, 2017] [Originally Added On: March 28th, 2017]
- The why and how of encrypting files on your Android smartphone - Phoenix Sun [Last Updated On: March 28th, 2017] [Originally Added On: March 28th, 2017]
- UK targets WhatsApp encryption after London attack - Yahoo News [Last Updated On: March 28th, 2017] [Originally Added On: March 28th, 2017]
- Critical flaw alert! Stop using JSON encryption | InfoWorld - InfoWorld [Last Updated On: March 28th, 2017] [Originally Added On: March 28th, 2017]
- SecureMyEmail is email encryption for everyone - TechRepublic - TechRepublic [Last Updated On: March 28th, 2017] [Originally Added On: March 28th, 2017]
- Apple iOS 10.3 will introduce encryption which makes it MORE difficult for cops and spooks to crack into ISIS nuts ... - The Sun [Last Updated On: March 29th, 2017] [Originally Added On: March 29th, 2017]
- How to Analyze An Encryption Access Proposal - Freedom to Tinker [Last Updated On: March 29th, 2017] [Originally Added On: March 29th, 2017]
- Questions for the FBI on Encryption Mandates - Freedom to Tinker [Last Updated On: March 29th, 2017] [Originally Added On: March 29th, 2017]
- Justice Department anti-terror chief keeps pressing on encryption - Politico (blog) [Last Updated On: March 29th, 2017] [Originally Added On: March 29th, 2017]
- UK government can force encryption removal, but fears losing, experts say - The Guardian [Last Updated On: March 29th, 2017] [Originally Added On: March 29th, 2017]
- Encryption FAQs [Last Updated On: March 29th, 2017] [Originally Added On: March 29th, 2017]
- Why isn't US military email protected by standard encryption tech? - Naked Security [Last Updated On: April 9th, 2017] [Originally Added On: April 9th, 2017]
- How have ARM TrustZone flaws affected Android encryption? - TechTarget [Last Updated On: April 9th, 2017] [Originally Added On: April 9th, 2017]
- Keeping the enterprise secure in the age of mass encryption - Information Age [Last Updated On: April 9th, 2017] [Originally Added On: April 9th, 2017]
- Lack of encryption led to Dallas siren hack - WFAA [Last Updated On: April 12th, 2017] [Originally Added On: April 12th, 2017]
- Internet Society tells G20 nations: The web must be fully encrypted - The Register [Last Updated On: April 12th, 2017] [Originally Added On: April 12th, 2017]
- Make Encryption Ubiquitous, Says Internet Society - Infosecurity ... - Infosecurity Magazine [Last Updated On: April 12th, 2017] [Originally Added On: April 12th, 2017]
- Can we encrypt the web while giving governments a backdoor to snoop? - SC Magazine UK [Last Updated On: April 12th, 2017] [Originally Added On: April 12th, 2017]
- Why we need to encrypt everything - InfoWorld [Last Updated On: April 12th, 2017] [Originally Added On: April 12th, 2017]
- Hacked Dallas sirens get extra encryption to fend off future attacks - Computerworld [Last Updated On: April 12th, 2017] [Originally Added On: April 12th, 2017]
- SHA-1 Encryption Has Been Broken: Now What? - Forbes [Last Updated On: April 14th, 2017] [Originally Added On: April 14th, 2017]
- Hewlett Packard Enterprise touts encryption tool for federal clients - The Hill [Last Updated On: April 14th, 2017] [Originally Added On: April 14th, 2017]
- Encryption on the Rise in Age of Cloud - Infosecurity Magazine - Infosecurity Magazine [Last Updated On: April 14th, 2017] [Originally Added On: April 14th, 2017]
- Lawmaker Pushes Bill That Requires Encryption by Pennsylvania State Employees - Government Technology [Last Updated On: April 14th, 2017] [Originally Added On: April 14th, 2017]
- Disk encryption - Wikipedia [Last Updated On: April 14th, 2017] [Originally Added On: April 14th, 2017]
- The apps to use if you want to keep your messages private - Recode [Last Updated On: April 15th, 2017] [Originally Added On: April 15th, 2017]