Law Enforcement Official Claims Citizens Use Better Encryption Than Cops Do

from the when-you-don't-understand-the-subject-but-think-you-should-offer-an-expert-o dept

Arguing against encryption is a popular law enforcement pastime. The problem is there really aren't many good arguments to be made against the use of encryption, so people like Attorney General Bill Barr and FBI Director Chris Wray have to summon up apocalyptic scenarios or beat down straw men of their own creation to score points for their side.

Given that the anti-encryption side is loaded with disingenuous intentions, it's really no surprise to see statements being made by law enforcement officials that are either stupid or lies… or maybe some combination of both. A recent NPR discussion of calls to end encryption features a real gem from an official representing a Tennessee law enforcement agency.

[NPR Host Martin] KASTE: There's been a lot of media attention lately on the FBI showdowns with Apple about opening iPhones used in terrorism. But those situations are relatively rare, given that the feds often have other ways of getting information. What's more common is that end-to-end encryption is frustrating local law enforcement - people like Cpt. Clay Anderson.

CLAY ANDERSON: It comes into play at least probably once or twice every single week.

KASTE: He supervises investigations for the sheriff's office in Humphreys County, Tenn. They get a lot of cases involving sexual exploitation - predators grooming minors via online messaging.

ANDERSON: In those cases, you run into dead ends because you can't get past encryption. I mean, who needs that type of encryption other than maybe the military with some type of sensitive operation that they're doing? You know, we don't even in law enforcement use encryption like that.

First off, YES, law enforcement uses encryption like that. Do officers carry smartphones? Then they're using "encryption like that." Are the sheriff office's internal communications and on-site databases encrypted? Then they're using "encryption like that." How about the laptops in their vehicles? I sincerely hope those are protected by "encryption like that."

"Encryption like that" apparently refers to encryption law enforcement can't break easily. In other words, encryption law enforcement doesn't have the passwords to. There's no "military-grade" encryption. Either encryption works or it doesn't. It's not a matter of "grades." These words might sound meaningful to people not familiar with encryption, but they're meaningless to anyone with the slightest familiarity with the subject.

"Military grade" meant something nearly 30 years when the government restricted the export of encryption methods that couldn't easily be broken by US agencies. The explosion of consumer products (computers, smartphones) that has occurred since that point has rendered the line between "consumer" and "military-grade" encryption nonexistent.

The military uses the same encryption consumers do. Captain Clay Anderson's parroting of Bill Barr's idiotic talking points suggesting device manufacturers start using a dumbed-down encryption method for consumer electronics is just that: idiotic. To compromise encryption millions of consumers use would also compromise the encryption the government (home of "military-grade") uses, as Bruce Schneier points out.

The thing is, that distinction between military and consumer products largely doesn't exist. All of those "consumer products" Barr wants access to are used by government officials -- heads of state, legislators, judges, military commanders and everyone else -- worldwide. They're used by election officials, police at all levels, nuclear power plant operators, CEOs and human rights activists. They're critical to national security as well as personal security.

Hopefully, Captain Anderson is just ignorant. Hopefully his officers and his department are making full use of "encryption like that." To do otherwise would be irresponsible. Or maybe Anderson is just upset he can't get all the evidence he needs by sitting at his desk. He doesn't really seem to be the best choice for investigating crimes against children.

In early September 2012, Jackie Little went to investigators with the Humphreys County Sheriff’s Office to report that she had been raped by three men.

In recorded video of her interview, Sheriff Chris Davis can be heard vowing to investigate while sitting in a room with the detective assigned to the case, Clay Anderson.

“If they’ve done this to you, we’re going prosecute them. We’re going to prosecute them wide open,” Davis said.

But our investigation found Anderson never even attempted to gather DNA evidence, didn’t seek out one piece of potential video and interviewed the three suspects several months after the rape was reported.

Anderson was twice recommended for termination by other law enforcement agencies, but resigned before termination could occur, leaving him free to join this department and add his, um, "skills" to their investigatory unit. Now, he's the regional face of "going dark" and his arguments are proving to be just as questionable as his law enforcement career.

Filed Under: clay anderson, encryption, law enforcement

Reader Comments

Subscribe: RSS

View by: Time | Thread

  1. icon
    Uriel-238 (profile), 26 Feb 2020 @ 12:35pm

    It depends on the county

    Rural families tend to have high-powered (.306 or .308) rifles handy which are longer ranged and better quality than the assault rifles that are issued to police (unless we're talking about the snipers particular to metropolitan SWAT teams).

    To be fair, an AK-47 is preferred by many American soldiers over the Armalite-based guns on the field, and an AK clip of 7.62×39mm ammo is a common addition to muster for those sent into hot-zones where AKs are used by the enemy. Largely, they require much less maintenance than GI.

    Depending on the county, body armor that stops the 5.56×45mm NATO round is illegal for civilians to own. Not that it helps much; a hit to body armor may keep its wearer alive, but it will certainly put an end to his day.

Add Your Comment

Have a Techdirt Account? Sign in now. Want one? Register here

Subscribe to the Techdirt Daily newsletter

Comment Options:

  • Use markdown. Use plain text.
  • Remember name/email/url (set a cookie)

Follow Techdirt
Special Affiliate Offer

Report this ad  |  Hide Techdirt ads
Essential Reading
Techdirt Deals
Report this ad  |  Hide Techdirt ads
Techdirt Insider Chat
Report this ad  |  Hide Techdirt ads
Recent Stories
Report this ad  |  Hide Techdirt ads

This site, like most other sites on the web, uses cookies. For more information, see our privacy policy. Got it

Email This

This feature is only available to registered users. Register or sign in to use it.