Anyone remember the Crypto wars of the 1990s? Back in the early 1990s, the U.S. placed strict regulations on the exportation of cryptography and even put encryption technologies it on the munitions list as auxiliary military equipment. This restriction was a real burden to software firms like Lotus, Microsoft, and Novell as they wanted to offer data confidentiality and integrity features for PC users. Eventually the NSA offered a compromise by approving a weak 40-bit encryption algorithm for export purposes.This was far from the end of the battle however. In 1993, the U.S. government (NSA) developed and promoted a technology called the Clipper chip, capable of encrypting telecommunications while providing a “back door” for government surveillance. Meanwhile, civil libertarians and privacy advocates fought to loosen government encryption restrictions in court.The first issue in play is relatively myopic, the DOJ wants Apple to hack into a specific iPhone that belonged to one of the San Bernardino terrorists. My assumption is that this wouldn’t be too difficult for Apple from a technology standpoint as it could simply go into the iOS source code, find an exposed service or software vulnerability and develop an exploit to break into the phone. Okay, but this process would violate Apple’s stated privacy policy and commitment to customers. Aside from its reputation, Apple is really concerned about the possible precedent here. If Apple is willing to break into one phone, why not 10, 100, 1000, or more? The Edward Snowden episode demonstrated that the NSA has an insatiable appetite for private data. Apple is worried that its cooperation with the FBI/DOJ would end up sucking the company into a greater government surveillance vortex with no exit. Apple supporters like Facebook, Google, and Microsoft are also concerned that if Apple gives in, others will be forced to follow. And while the DOJ tries to focus the current brouhaha on a single phone, the bigger question is clearly about the dichotomy between privacy vs. national security. Political candidates, law enforcement officials, and intelligence agencies are positioning Apple vs. DOJ as the tip of the spear in a greater push for “back doors” into encryption technology so that the U.S. good guys can catch criminal and terrorist bad guys. Yup, this issue may be a great one for soundbites and political speeches but history should teach us that we are really wasting our time. Organized criminals and terrorists already understand their outlaw status. To maintain anonymity and hid their data, they’ve adopted stealthing tactics, including the use of commercial and open source encryption technology.
Related Terms
Bring Your Own Device (BYOD)You can skip this ad in 5 seconds