FBI Director Gets Back On His Anti-Encryption Bullshit In Statement To Homeland Security Committee

from the just-shut-the-fuck-up dept

We’ll get to Chris Wray in a moment, but first let’s do a throwback to May 29, 2018 — the date the FBI first promised to correct its miscount (estimated to be off by as much as 4,000 devices) of uncrackable devices in its possession. Multiple statements utilizing the FBI’s bad stats were edited, with the erroneous number replaced with footnotes like this:

** Due to an error in the FBI’s methodology, an earlier version of this speech incorrectly stated that the FBI had been unable to access 7,800 devices. The correct number will be substantially lower.

This promise to deliver accurate numbers debuted 1,642 days ago. To put that in perspective, we’ve had two national elections and three different presidents (Obama, Trump, Biden) since the FBI promised to perform a recount. That number will continue to increase because it appears the FBI has no intention of telling the truth about how much of a problem device encryption actually poses.

FBI Director Chris Wray apparently has no shame. Despite spending more than a half-decade basically lying about the encryption “problem” the FBI faces, Chris Wray (like James Comey before him) continues to use every opportunity he has to claim encryption that can’t be bypassed at will by law enforcement is a threat to public safety and, in this case, national security.

Speaking to the Senate Homeland Security Committee, Wray again made a pitch for an impossibility he likes to call “lawful access.”

Protecting data and privacy in a digitally connected world is a top priority for the FBI, and we believe that promoting encryption is a vital part of that mission. Encryption without lawful access, though, does have a negative effect on law enforcement’s ability to protect the public. As I have testified previously, when the FBI discusses lawful access, we mean putting providers who manage encrypted data in a position to decrypt it and provide it to us in response to a legal process. We do not mean for encryption to be weakened or compromised so that it can be defeated from the outside by law enforcement or anyone else

The last two sentences contradict each other: you cannot have encryption that can be broken on demand that will still be secure when the bad guys come for it. Asking device manufacturers to become apartment complex managers who hold onto everyone’s keys just in case law enforcement needs to get in isn’t any better. It just centralizes the attack vector, giving malicious hackers fewer targets, but ones housing much bigger payloads.

So, when Chris Wray says he’s not asking for “backdoored” encryption, he’s technically telling the truth. He just wants to be let in the front door whenever he asks. You don’t need a back door when the front door is no longer an obstacle. The FBI Director is playing word games, referring to fully functioning encryption as “warrant-proof” and compromised end-to-end encryption as “lawful access.” That makes this assertion extremely disingenuous.

Unfortunately, too much of the debate over lawful access has revolved around discussions of this concept that the FBI would not support.

Nah. That ain’t it. The discussion revolves around what Wray himself has asked for. Wray won’t provide specifics or technical details because that would make it too easy for critics to poke holes in his plans. So, he makes up new phrases like “warrant-proof” and “lawful access” to avoid being pinned down on what it is he actually wants and then he claims everyone else is misconstruing the things he won’t be intellectually honest about.

What Wray wants is one-stop shopping for evidence — something agents can accomplish by doing little more than plugging a seized phone or laptop into a third-party box that grabs every bit of data residing on the devices for the FBI to search through at its leisure. The average phone can contain more evidence than an entire house, depending on the crime being investigated. But that doesn’t mean the government should have at-will access just because the alternative is inaccessible evidence.

Since the inception of law enforcement agencies, there has always been evidence investigators can’t access. Incriminating documents get burned. Murder weapons get tossed into rivers and lakes. Criminals use stash houses to keep their own houses free of incriminating evidence. Criminal conspirators speak in person outdoors, rather than risk interception via phone lines or bugged rooms. And yet, no FBI director has repeatedly called for the private sector and government to work together to prevent the exploitation of matchbooks, open bodies of water, outdoor conversations, and real estate purchases.

This is increasingly dumb shit. And it’s made worse because the FBI won’t be honest about the problem it says it has on its hands. Chris Wray shouldn’t be considered a credible speaker on the subject of encryption — at least not until he stops being vague about what it is he really wants. And definitely not until he provides the updated encrypted device numbers his agency promised almost a half-decade ago.

Filed Under: , , ,

Rate this comment as insightful
Rate this comment as funny
You have rated this comment as insightful
You have rated this comment as funny
Flag this comment as abusive/trolling/spam
You have flagged this comment
The first word has already been claimed
The last word has already been claimed
Insightful Lightbulb icon Funny Laughing icon Abusive/trolling/spam Flag icon Insightful badge Lightbulb icon Funny badge Laughing icon Comments icon

Comments on “FBI Director Gets Back On His Anti-Encryption Bullshit In Statement To Homeland Security Committee”

Subscribe: RSS Leave a comment
7 Comments
Anonymous Coward says:

we mean putting providers who manage encrypted data in a position to decrypt it and provide it to us in response to a legal process.

Such an encryption is what is provided by HTTPS, which protects communications between the two ends of a message e3xchange, where one operates a web site, like a bank.

What he wants is to make a service provider a party to private conversation between individuals, and a risk element to that privacy should the site be breached and all the encryption keys stolen. Key management for such a site becomes a nightmare, and user privacy no more security that that provided by unencrypted email, that is to say almost none.

This comment has been deemed insightful by the community.
That One Guy (profile) says:

I always find it darkly funny that they use ‘warrant-proof’ when describing encryption that works given a major reason for this song and dance is so that they can avoid getting warrants.

Accused criminal has the dastardly plan to make use of encryption to protect their privacy, potentially including hiding criminal actions? Get a warrant to search the device and serve it to the accused to gain access to the device in question.

Can’t crack the encryption yourself because it actually works and wasn’t broken for you? Get a judge to force the accused to decrypt it.

End up with a judge that knows about and follows the fifth amendment and tells you ‘no’? Tough luck, try something else.

Privacy has always been a thing and there has always been communications and information beyond the reach of law enforcement no matter how much they may loathe the idea, giving criminals the world over the greatest gift they could ever receive in the form of mandatory broken encryption is not and never will be worth the trade-off for letting law enforcement and everyone else have access to otherwise private communications so they can maybe solve some crimes that would have otherwise been beyond them.

Anonymous Coward says:

Nerd Harder (played to the tune of Eye of the Tiger)

Nerd!
Nerd! Nerd! Nerd!
Nerd! Nerd! Nerd!
Nerd! Nerd! Nerd!

Nerd!
Nerd! Nerd! Nerd!
Nerd! Nerd! Nerd!
Nerd! Nerd! Nerd!

Loggin’ in, startin’ up Windows
Worst OS on the planet
But the spooks, they just love it to death
They want us all insecure all the time

Comey’s
lied on and on about this whole goin’ dark
wants to go
and install some useless backdoors
But it’s
not gonna work and it’ll make us less safe
Now Wray still says tech needs to go
nerd harder

Nerd!
Nerd! Nerd! Nerd!
Nerd! Nerd! Nerd!
Nerd! Nerd! Nerd!

Nerd!
Nerd! Nerd! Nerd!
Nerd! Nerd! Nerd!
Nerd! Nerd! Nerd!

Ignorant, that’s what Chris Wray is
Not a clue about nothin’
Safe backdoors, it just cannot be done
But he still asks for the impossible

Comey’s
lied on and on about this whole goin’ dark
wants to go
and install some useless backdoors
But it’s
not gonna work and it’ll make us less safe
Now Wray still says tech needs to go
nerd harder

Just got to nerd harder

Add Your Comment

Your email address will not be published. Required fields are marked *

Have a Techdirt Account? Sign in now. Want one? Register here

Comment Options:

Make this the or (get credits or sign in to see balance) what's this?

What's this?

Techdirt community members with Techdirt Credits can spotlight a comment as either the "First Word" or "Last Word" on a particular comment thread. Credits can be purchased at the Techdirt Insider Shop »

Follow Techdirt

Techdirt Daily Newsletter

Ctrl-Alt-Speech

A weekly news podcast from
Mike Masnick & Ben Whitelaw

Subscribe now to Ctrl-Alt-Speech »
Techdirt Deals
Techdirt Insider Discord
The latest chatter on the Techdirt Insider Discord channel...
Loading...