FBI's Top Lawyer From The Apple Encryption Fight Says Law Enforcement Needs To Suck It Up And Embrace Encryption

from the didn't-see-that-coming dept

Jim Baker was the FBI’s General Counsel during its well-publicized attempt to use the San Bernardino shootings from 2016 as a wedge to force Apple to build a backdoor into its data encryption scheme. As we noted at the time, this seemed like a very clear, somewhat cynical attempt to use a high profile attack as an excuse to force Apple’s hand in building back doors. When that battle happened, then FBI director Jim Comey took to the pages of Lawfare to insist that there were good reasons for the FBI to fight with Apple in court to force it to create a backdoor.

Now, Baker has taken to the pages of Lawfare as well to… apparently point out that he and the FBI were totally wrong about all of that and that his former colleagues at the FBI and DOJ need to get it over it and embrace encryption. It’s quite a piece.

In the face of congressional inaction, and in light of the magnitude of the threat, it is time for governmental authorities?including law enforcement?to embrace encryption because it is one of the few mechanisms that the United States and its allies can use to more effectively protect themselves from existential cybersecurity threats, particularly from China. This is true even though encryption will impose costs on society, especially victims of other types of crime.

Baker defends his own work on the San Bernardino case, but is now recognizing how dangerous backdoors can be and how important encryption is. He takes current Attorney General William Barr to task for his new anti-encryption propaganda campaign:

The attorney general?s perspective on encryption is far from universal. A range of individuals and groups?including some tech companies, computer scientists, engineers, cybersecurity experts, and privacy and human rights organizations?think that encryption protects both our security and our privacy. See here and here for examples. Well-designed and well-implemented encryption makes it harder for malicious cyber actors to unlawfully hack and steal our communications, personal data and intellectual property. In their view, weakening encryption through the installation of ?back doors? on smartphones or in communications systems, or providing law enforcement with ?golden keys? to allow them access to encrypted data, jeopardizes all of us. Many would disagree strongly with the attorney general?s assessment that an acceptable technical solution to law enforcement?s problem?one that appropriately balances

all of the equities at issue?actually exists.

Baker even highlights a key point many of us have pointed out in the past. For all the talk of “going dark,” law enforcement has more access to information than ever before in history:

Further, the situation for law enforcement may not actually be as bad as some claim. In fact, some argue that society is in a ?golden age of surveillance? as substantially more data?especially metadata?than ever before is available for collection and analysis by law enforcement. Finally, critics charge that law enforcement agencies have not provided the public with comprehensive and reliable data to explain exactly how many encrypted devices or communications those agencies encounter as well as the number and type of investigations that encryption negatively impacts.

Indeed, Baker highlights how misleading Barr and others (including Baker’s old boss, Comey’s) arguments are when they say that encryption leads to a lawless digital space:

So, encryption has not, as the attorney general complained in his speech, really created a ?law free zone.? It?s just that the law that applies in this area is not what Barr or the Justice Department want the law to be.

Baker also highlights how undermining encryption puts us all at risk in a wide variety of ways, from basically handing over security services to non-US companies, to putting all our data at risk, to also creating a great opening for countries who wish to do us harm. There are a lot of really great points in this post, way beyond what I’m highlighting here, so I highly recommend reading the whole thing. Indeed, towards the end, Baker (correctly) highlights that protecting our own digital security almost certainly is a better way of protecting Americans than being able to hack into the phones of a few people:

If I?m correct about the existential nature of cyber threats and about the risks that nation-states such as China, in particular, pose to the United States and its allies, then federal, state and local governments should be doing everything they can to enhance the cybersecurity status of the nation. All public safety officials should think of protecting the cybersecurity of the United States as an essential part of their core mission to protect the American people and uphold the Constitution. And they should be doing so even if there will be real and painful costs associated with such a cybersecurity-forward orientation. The stakes are too high and our current cybersecurity situation too grave to adopt a different approach.

A key theme throughout the whole piece is that it’s time for law enforcement to accept reality and to stop pretending there’s some fantasy “magic bullet” or “golden key” that will allow them to safely backdoor their way into encrypted devices. He admits that this may, sometimes, make law enforcement’s job harder, but the benefits for everyone’s safety so vastly outweigh that potential downside as to suggest this shouldn’t even be much of a debate.

All of this is stuff that many of us who have fought against encryption backdoors have been saying for decades, but it’s pretty surprising (to the level of almost shocking) that Baker is now expressing this view — given his role in literally working to backdoor Apple’s encryption. This is not a privacy activist. This is someone who was basically in charge of the FBI’s last big effort to have the courts break encryption. Baker insists that his actual views haven’t changed very much, though that does seem at least somewhat difficult to square with the FBI’s position in the Apple legal fight. But, either way, it’s great to see someone of his stature and experience now agreeing that undermining encryption would be very, very dangerous — and that he’s willing to tell his former colleagues, directly, that they, too, should embrace this position.

Filed Under: , , , , , , ,

Rate this comment as insightful
Rate this comment as funny
You have rated this comment as insightful
You have rated this comment as funny
Flag this comment as abusive/trolling/spam
You have flagged this comment
The first word has already been claimed
The last word has already been claimed
Insightful Lightbulb icon Funny Laughing icon Abusive/trolling/spam Flag icon Insightful badge Lightbulb icon Funny badge Laughing icon Comments icon

Comments on “FBI's Top Lawyer From The Apple Encryption Fight Says Law Enforcement Needs To Suck It Up And Embrace Encryption”

Subscribe: RSS Leave a comment
11 Comments
This comment has been deemed insightful by the community.
Almost Anonymous says:

Great but late

Yes, of course I agree with Baker (now), but does anybody else find it aggravating how often public officials will have one (wrong/bad) stance while still in their office, but then they have a different (correct/not bad) stance once they leave or announce their retirement? I’m so thrilled that he has come around, but changing your mind now doesn’t undo the damage already done, which is a large reason why the stupidity of back doors and golden keys refuses to go away!

Anyway, yay, I guess.

This comment has been deemed insightful by the community.
James Burkhardt (profile) says:

Re: Great but late

It makes sense, from a human perspective.

Like Techdirt notes with IP Lawyers, as an FBI lawyer Baker was seeped daily in the language and rhetoric of the FBI and encryption. This naturally leads to a human’s opinions to slowly adapt to reflect the most vocal opinions of their colleges. So when he leaves, his reception of contrary positions changes.

As well, as a lawyer, Baker’s job was to argue his client’s position, even when that position is bad or unfounded. (this is why some of the arguments coming out of the President’s lawyers in court are so off the wall – the facts and law are so against the arguments being made, but the president is insisting on fighting anyway). So even if he disagreed, his job relied on him arguing a case he didn’t necessarily agree with.

Combined, its not surprising that those leaving the FBI echo chamber change their mind years later.

Anonymous Coward says:

Re: Re: Great but late

Meanwhile I always figured they would do it after they they didn’t have a job to threaten for mentioning inconvenient and impolite truths. Thar does explain why their resignation letters/retirements aren’t immediately followed by a traditional "Okay now that I have my gold watch and no restrictions here is everything I wanted to say but couldn’t…."

Smartassicus the Roman says:

Legally Speaking

It amazes me that it takes more than five seconds for someone to understand that damn-near unbreakable encryption is an absolute necessity and should always be strengthened and never, ever weakened or backdoor-ed. But then I realize that the people who do want to break, bypass, or weaken anything that protects is are all law enforcement or law-makers who want to control what we think, say, do, and feel and it makes perfect sense.

Anonymous Coward says:

Huawei et al

Baker’s Lawfare piece spends much time talking about cyber security, and how bad the US’s is. He also notes that it is an almost certainty that there will be Huawei gear in the core of many of the US’s commercial networks, and that this may provide the Chinese milint with access to those networks. THIS is the reason that strong encryption is important; because of these threats. This also shows his "position hasn’t changed much". He was always about protecting the US, but now sees the cyber threat as far more important than encrypted communications. I agree with him.

As MM says, read the piece. Its long, but well thought out.

Add Your Comment

Your email address will not be published. Required fields are marked *

Have a Techdirt Account? Sign in now. Want one? Register here

Comment Options:

Make this the or (get credits or sign in to see balance) what's this?

What's this?

Techdirt community members with Techdirt Credits can spotlight a comment as either the "First Word" or "Last Word" on a particular comment thread. Credits can be purchased at the Techdirt Insider Shop »

Follow Techdirt

Techdirt Daily Newsletter

Ctrl-Alt-Speech

A weekly news podcast from
Mike Masnick & Ben Whitelaw

Subscribe now to Ctrl-Alt-Speech »
Techdirt Deals
Techdirt Insider Discord
The latest chatter on the Techdirt Insider Discord channel...
Loading...