Take Two

It seems that the debate over encryption technology is entering a new phase.

The argument that law enforcement needs a magical* backdoor into every piece of encryption software “to fight terrorism” isn’t making enough headway to satisfy our political masters. If an article by Melody Gutierrez in today’s Chron (only available behind the paywall on the website) is any indication, the new argument is our old friend “think of the children”.

* I don’t need to explain this do I? Oh, all right. For the benefit of anyone who’s been aggressively not paying attention: there’s no such thing as a backdoor that can only be used by authorized people. If there’s a way to bypass or remove encryption, crackers–independent, criminal-sponsored, and government-sponsored will find a way to use it.

As Ms. Gutierrez puts it, “lawmakers and law enforcement groups are pushing bills [in California and New York] to enable investigators to unscramble data […] in human trafficking, terrorism and child pornography cases.”

Worthy causes, certainly, but does anyone really believe it would stop there? Even leaving aside the impossibility of limiting access to the decryption tools to the “right” people, once the capability is introduced, there would be an immediate push to expand the categories of crimes it could be used for.

And the emotional appeals are so over-the-top the article almost reads like a parody. Consider this quote from Assemblyman Jim Cooper, who wrote the bill being considered in California:

“If your kid goes to meet someone and your kid disappears and we find the phone, right now–today, there is no way for us to find out who they were last texting, who they were talking to unless you have the pass code to get in.”

Really, Jim? You haven’t heard of “metadata”? The records of who you call and who you text that the NSA has been using for years to build profiles on Americans who have no connection to terrorism? You don’t even need to “find the phone” to get that information. You just need the kid’s phone number!

Be honest, Jim. You know fully well what you’re talking about is the content of those texts, which are stored on the phones. You even admit it:

“The biggest thing is the information we want to get is from your phone at rest, not information traveling over the airwaves. This won’t affect 99.9 percent of the public.”

Yes, Jim, it will affect that 99.9%. Again, anything that weakens encryption for some people weakens it for everyone.

Feh! You can’t trust the company that makes your device to keep your data safe, and you can’t trust the government either. My advice is to make sure that your devices are encrypted now, while it’s still legal for companies to sell them without government-mandated backdoors. Turn the encryption on now (instructions below) and be prepared to refuse any future OS update that introduces a backdoor. Oh, and don’t forget to encrypt your backups!

On iOS 8 and above, you enable the device encryption by turning on the passcode feature. Go to “Settings | Touch ID & Passcode” (or “Settings | Passcode” if your phone or tablet doesn’t have Touch ID hardware). Tap “Turn Passcode On”. Tadaa!

Android is a little more time-consuming. Google advises you to set aside at least an hour for the encryption. (These instructions apply primarily to Nexus devices; non-Google devices may differ to a greater or lesser degree.) Once you have the time blocked out, set a lock screen pin, pattern, or password. Plug in the charger (encrypting the entire device will burn through your battery like crazy). Then go to “Settings | Security | Encrypt phone” (or “Encrypt tablet”) and follow the instructions.

5 thoughts on “Take Two

  1. It used to be said that “patriotism is the last refuge of the scoundrel”, but that neighborhood’s become to crowded, now that virtually every scoundrel comes wrapped in a flag, so the fallback position has become “what about the children?” Oh, and “terrorism”; don’t forget that. Both of them are so broad and ill-defined that you can apply them to anybody who’s out, this month, and yet we’re supposed to get all excited and intimidated at the sound of the words. Thanks, Casey, for keeping it real.


    • At least “patriotism!,” “terrorism!,” and “think of the children!” work as instant tags to identify the scoundrels. Anybody who uses all three in a single statement has effectively convicted him or herself…


      • As has often been remarked- especially of late- there’s nothing easier than subverting a democracy. All you have to do is tell them they’re in danger and they have to give up some of their freedoms, in order to be safe. Then, anyone who opposes your suggestions can be identified as an “enemy of the State”, because they are undermining the State’s security. That one’s been working for at least a couple of thousand years- and, I suspect, much longer than that.


        • Of course, with a representative democracy, all it takes is subverting the representatives. As Jackie noted in a different context the other day, when petitions are ignored, the system is already subverted.


  2. Pingback: Crack! | Koi Scribblings

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.