Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

‘Five Eyes’ Nations Quietly Demand Government Access to Encrypted Data (Sept. 4, 2018)
NYT ^ | Sept. 4, 2018 | David E. Sanger and Sheera Frenkel

Posted on 12/26/2018 6:04:48 PM PST by yesthatjallen

The Trump administration and its closest intelligence partners have quietly warned technology firms that they will demand “lawful access” to all encrypted emails, text messages and voice communications, threatening to compel compliance if the private companies refuse to voluntarily provide the information to the governments.

The threat was issued last week by the United States, Britain, Australia, New Zealand and Canada, the so-called Five Eyes nations that broadly share intelligence. Collectively, they have been frustrated by the spread of encrypted apps on cellphones and the ability to send encrypted messages through social media and, most prominently, on Apple’s iPhones.

The issue flared repeatedly during the Obama administration, with the former F.B.I. director, James B. Comey, warning that law enforcement officials were “going dark” as nefarious actors relied on encrypted channels to discuss or plan criminal activity or terrorist plots. But the Trump administration has said little about the subject, even after the meeting in Australia where the demand was issued in a joint statement by the five nations.

“Should governments continue to encounter impediments to lawful access to information necessary to aid the protection of the citizens of our countries,” the joint statement said, “we may pursue technological, enforcement, legislative or other measures to achieve lawful access solutions.”

ETC...

(Excerpt) Read more at nytimes.com ...


TOPICS: Australia/New Zealand; Canada; News/Current Events; US: New York; United Kingdom
KEYWORDS: 5eyes; apple; australia; canada; china; davidesanger; encrypteddata; fiveeyes; iphone; jamescomey; newyork; newyorkcity; newyorkslimes; newyorktimes; newzealand; privacy; sheerafrenkel; timcook; unitedkingdom
Navigation: use the links below to view more comments.
first 1-2021-4041-46 next last
This article is from Sept.

I did a search and it didn't come up.

There's a lot of relevant information in this one.

1 posted on 12/26/2018 6:04:48 PM PST by yesthatjallen
[ Post Reply | Private Reply | View Replies]

To: yesthatjallen

mark for later reading


2 posted on 12/26/2018 6:05:51 PM PST by dirtboy
[ Post Reply | Private Reply | To 1 | View Replies]

To: yesthatjallen

Those wishing to secure their emails from sender to receiver should look into PGP / OpenPGP


3 posted on 12/26/2018 6:18:14 PM PST by taxcontrol
[ Post Reply | Private Reply | To 1 | View Replies]

To: yesthatjallen

“There will be no place to hide”

No reasonable or wise person would want mass surveillance to happen at all, and will fight to keep our Fourth Amendment, and privacy intact. Although, in reality, it is already gone.

If we do not have the right to privacy with our government and law enforcement, this means they have the right to create files, and to ascertain who their enemy may be. In such a case, those under such a sovereign government are simply not free!

Society won’t do it, but they need to understand, if the government has the right to all of your speech, habits, what you read, and ultimately your thoughts, whatever government does this is not morally or politically neutral, and is totalitarian.

China has already literally taken the surveillance strategies of how a US credit card company determines credit, and applied it to all of a persons life. China has created a grading system of surveillance to “score”, segregate, punish, and elevate individuals, and is now deploying this throughout all of Chinese society.

If you are not a good communist, or do not agree with your local police, or something taught in school, you get punished, even to the point of not being allowed to travel outside your town or in some cases, your apartment building. In this case a person who does not espouse government control, cannot even go shopping nearby. This is done through the monitoring of all habits, beliefs, speech, and activity!

This stuff should make any reasonable person nauseated.

But most young people in the west today, are so dumb and illiterate in history and everything else in life, they will be happy and hasten their own oblivion.

Thanks for re-posting.


4 posted on 12/26/2018 6:31:49 PM PST by patriotfury ((May the fleas of a thousand camels occupy mo' ham mads tents!))
[ Post Reply | Private Reply | To 1 | View Replies]

To: yesthatjallen

are PGP and/or one-time-pad files
allowed on FR mail?


5 posted on 12/26/2018 6:47:20 PM PST by RockyTx (fr)
[ Post Reply | Private Reply | To 1 | View Replies]

To: yesthatjallen

If they want a back door, I say give them their back door — under the condition that the government agrees to absolutely indemnify any person harmed by a leak or a bad actor using that back door, plus triple damages, and triple legal fees to any harmed party. No sovereign immunity, and only a preponderance of evidence standard for proving damages. And the government is enjoined from appealing any unfavorable decisions and must make any payments within 3 months of judgement. Any citizen has the right to appeal any unfavorable judgement as far as he can.

Plus transactional immunity for any crime other than terrorist activity discovered in whole or in part through the weakened encryption.

Let them chew on that for a while and see what they say. If they don’t want to sign up to it, they don’t really want to stop bad actors, they want to spy on us.


6 posted on 12/26/2018 6:48:18 PM PST by CurlyDave
[ Post Reply | Private Reply | To 1 | View Replies]

To: yesthatjallen

Actually, this type of surveillance would not be so likely to be carried out by a moral and conservative government, as such a government would be much more respectful of Constitutional Law!

This means, what we have going on here is not guided by the pursuit and defense of liberty, but truly is guided by an entity (government) which both fears its people, and is seeking to insure its own subjection over the individual and society.

Such a master/slave relationship of government over its subjects, will not allow any transparency, or anyone to shed light on their activity and goals.

Just look as the DNC for example, or the Clintons and other marxist types who have been put in places of leadership in government today.

HRC had a massive system of surveillance set up during the Clinton presidency. So did Obama. And they used it to go after political threats.

Hillary was behind “Filegate”, which likely smuggled most of the government background and security files on congressmen, judges, and agency leadership. It was crazy illegal, and it did happen. In the minds of many who have look at this at all, it was mind blowing, and they got away with it! All because the left ultimately intends to apply surveillance as a weapon against their opponents, to wipe them out!

Think what the weaponized DOJ/FBI, or IC, or IRS, can and has done in mass, and of the ideology of those in control of these organizations of government!


7 posted on 12/26/2018 6:57:20 PM PST by patriotfury ((May the fleas of a thousand camels occupy mo' ham mads tents!))
[ Post Reply | Private Reply | To 1 | View Replies]

To: yesthatjallen

The same “Five Eyes” SOB’s who collaborated in the attempt to bring down Trump with a fake dossier?

Those “Five Eyes” a-holes?


8 posted on 12/26/2018 7:06:17 PM PST by rlmorel (Leftists: They believe in the "Invisible Hand" only when it is guided by government.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: rlmorel

bttt


9 posted on 12/26/2018 7:09:45 PM PST by timestax
[ Post Reply | Private Reply | To 8 | View Replies]

To: patriotfury

It is painful and embarrassing for me to say this, but I must. I was for the PATRIOT Act because, IMO, we were at war. We just had 3,000 Americans murdered. I have always felt that in a time of war, the government should be able to impose certain restrictions of the freedom of speech.

Of course, I am thinking along the lines of the New York Times publishing details of military operations that could aid the enemy. I think most of us could say “Yes, we don’t want to have CNN standing outside the fences of the runway at Whiteman AFB broadcasting to the world that we have B-2 bombers taking off en-masse on some mission”, but it is clear from events even before the spying on Donald Trump that the government cannot be trusted.

I should never have supported it. I was wrong.

They simply cannot be trusted with that kind of power over individual citizens. The had reams of rules and regulations to keep them from doing what they did to Trump and his team, and simply ignored them to bring the surveillance power of the government right down on individual American citizens.

So, yes. I was wrong, and I sure do regret supporting it. If I refuse to support granting that power of government and thereby making the jobs of terrorists easier, I would be fine with that...even more so if we were actually allowed to fight back against them without having our hands tied behind our backs by PC rules of engagement.


10 posted on 12/26/2018 7:19:10 PM PST by rlmorel (Leftists: They believe in the "Invisible Hand" only when it is guided by government.)
[ Post Reply | Private Reply | To 7 | View Replies]

To: timestax

That was a very hard lesson for me to learn, timestax.

Very hard.


11 posted on 12/26/2018 7:20:06 PM PST by rlmorel (Leftists: They believe in the "Invisible Hand" only when it is guided by government.)
[ Post Reply | Private Reply | To 9 | View Replies]

To: yesthatjallen

I simply refuse to believe that the NSA can’t do simple SSL interception to read your network traffic. This idea that they can’t access your data doesn’t hold water with me.


12 posted on 12/26/2018 7:22:54 PM PST by JamesP81 (The Democrat Party is a criminal organization.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: yesthatjallen
The Trump administration and its closest intelligence partners have quietly warned technology firms that they will demand “lawful access” to all encrypted emails, text messages and voice communications, threatening to compel compliance if the private companies refuse to voluntarily provide the information to the governments.

No. And I will not use the services or buy the products of any technology firm which 'voluntarily provides this information to the governments'. It doesn't matter that my emails, text messages and voice communications are among the most boring on the face of planet - it's the principle of the thing.
13 posted on 12/26/2018 7:32:18 PM PST by AnotherUnixGeek
[ Post Reply | Private Reply | To 1 | View Replies]

To: JamesP81

If you are using a VPN service, they utilize AES (Advanced Encryption Standard) with 256-bit keys — also known as AES-256.

I have never heard of AES-256 with a strong password being cracked. Perhaps someone else here can comment on that. If it gets cracked, it is probably due to social engineering. I do not thing a brute force attack can be made on it, even with the resources of the government.


14 posted on 12/26/2018 7:33:44 PM PST by rlmorel (Leftists: They believe in the "Invisible Hand" only when it is guided by government.)
[ Post Reply | Private Reply | To 12 | View Replies]

To: JamesP81
I simply refuse to believe that the NSA can’t do simple SSL interception to read your network traffic. This idea that they can’t access your data doesn’t hold water with me.

You are describing a man in the middle attack. That is not what this is about.

15 posted on 12/26/2018 7:45:49 PM PST by IndispensableDestiny
[ Post Reply | Private Reply | To 12 | View Replies]

To: yesthatjallen

Quantum computers will or have already rendered most encryption algorithms obsolete.


16 posted on 12/26/2018 8:05:11 PM PST by Disambiguator (Keepin' it analog.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Disambiguator

“Quantum computers will or have already rendered most encryption algorithms obsolete.”

And then we will have encryption based upon quantum computers. This is the same historic battle between tank cannons and armor plate. When one advances, the other soon leaps ahead in response.


17 posted on 12/26/2018 9:59:39 PM PST by DesertRhino (Dog is man's best friend, and moslems hate dogs. Add that up. ....)
[ Post Reply | Private Reply | To 16 | View Replies]

To: RockyTx

If you mean something like this, I seriously doubt it. FWIW below is just an example of what it looks like in case nobody has seen it. It’s a waste of space and not efficient in a forum such as this, it just doesn’t fit. More useful for email.

-——BEGIN PGP MESSAGE-——
hQIOAzheJ6Hn3o1QEAf+M6eg4yF/ikZSAnYvjF+5Mz7Cx6bHIvztN2acKml0helBIdj4ugxOjsBd9VCMiSMxT7YTNvmcBKcpr8nD/+UW82nP3+Ggq7uMU4NDpTn
-——END PGP MESSAGE-——


18 posted on 12/26/2018 10:07:01 PM PST by nevadapatriot
[ Post Reply | Private Reply | To 5 | View Replies]

To: yesthatjallen
They already have technical access to virtually everything.

What this is about is "lawful" access, a repeatable and documentable process carried out in response to a lawful warrant. They expect Internet companies to build-in access capabilities analogous to the "wiretap rooms" phone companies provided to government agencies in central offices. Those who knew how could pick up any US landline and dial a sequence of numbers which interrogated the central office as to the wiretap status of the line, with the answer provided in either a steady or alternating tone. In any case I expect the government to eventually prevail in this effort for backdoor access because of the precedent of decades of access to telephone conversations by legal process.

If you want true privacy you will have to provide it for yourself rather than relying on any corporate or government entity. For example, not even quantum computing is likely to be able to decrypt messages sent using a one-time pad with a truly random key. However....

As I said above, this article is about lawful access as opposed to technical access. In terms of what information they can technically access if they really want to without regard to its lawful application in a court of law, just remember that your brain transmits electrical signals as it operates, and with the right equipment those signals are readable at some distance.

19 posted on 12/26/2018 10:52:29 PM PST by JustaTech (A mind is a terrible thing)
[ Post Reply | Private Reply | To 1 | View Replies]

To: yesthatjallen

Carte blanche = inevitable abuse.


20 posted on 12/26/2018 11:43:06 PM PST by YogicCowboy ("I am not entirely on anyone's side, because no one is entirely on mine." - J. R. R. Tolkien)
[ Post Reply | Private Reply | To 1 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-4041-46 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson