In addition to denying reality, Hanningan's not so hot with the idioms, either, pluralizing "heaven". Unless GCHQ's extensive surveillance extends into the otherworldly, and they've documented a plurality of heavens.
Maybe he would have gotten it right if he's stuck to a metaphor from his own side of the aisle ("...with the devil knows what consequences...")
The reality is that LEOs aren't "going dark", it's that they're getting blinded by the light. The Boston Marathon bombing case (where the Feds blew of clear and specific warnings about the Tsarnaev brothers) is a classic example of the real information-overload problem.
Given that it's the tech companies who put cameras in millions of people's pockets with which to catch Cops Behaving Badly, then they've earned the title "gatekeepers of justice", and a damn good thing, too.
The explanation is 2,000 words long. It does not make a huge amount of sense
It seems to have finally been pulled from his page, but of course nothing that catches people's attention ever truly disappears from the Internet. Behold, a serving of word salad that makes Sarah Palin look like Daniel Webster:
Curious by nature, I wanted to test the suggestion that somehow, lurking out in the pornographic world there is some evil operator waiting for the one in a gazillion chance that a candidate for federal office would go to that particular website and thereby be infected with a virus that would cause his or her FEC data file to crash the FECfile application each time that it was loaded on the day of the filing deadline, as well as impact other critical campaign systems. Well, the Geek Squad techs testified to me, after servicing thousands of computers at the Baileys Crossroads location that they had never seen any computer using their signature virus protection for the time period to acquire over 4800 viruses, 300 of which would require re-installation of the operating system. We are currently awaiting their attempt at recovery of files on that machine accidentally deleted when they failed to backup files before re-installation, a scenario about which Matthew Wavro speculated openly to me before we were informed by the Geek Squad that that had indeed occurred. Generally, the circumstances in which I have been involved in a life with over 30 years of leadership, I cannot just shoot from the hip, like reporters in this town who could not even get my campaign history straight, an incumbent who believed that 7000 Americans died because of global climate change, a nomination rival who assumed that a “conservative surge” was just going to magically appear in November like it did on Super Tuesday, had they not been Dump Trump Democrats in fact, or who now is being called silly by the incumbent for not doing his homework on Metro. I don’t just like being right wing, I also like being right.
But, now let me tell you the results of my empirical inquiry that introduced me to Layla and Ivone. Around Powerball lottery time, January 9, 2016, I calculated the odds that my friend Rev. Howard John Wesley and I working independently arrived at the same prayer plan, and I was able to determine that there was about a one in a billion chance that that could have occurred in the way that it did. (www.facebook.com/...). Well, as much as folks like Duffy Taylor want to hope that the Devil is waiting for Christian candidates on a particular pornographic website to infect his or her FEC data file is even more improbable than my Paul and Silas story, and I know that Duffy Taylor is not a man of faith belief; so, I don’t know how he empirically arrives at his conclusion. I couldn’t see the probability or possibility without a RAND computer.
Critics in the industry suggest that providing access to encrypted data will weaken their systems. But these same companies, for business purposes, already maintain and have access to vast amounts of encrypted personal information, such as credit-card numbers, bank-account information and purchase histories.
This "people let Google have personal information, so it's okay for the government to get people's personal information" argument is not only idiotic, it is offensive. It is precisely equivalent to "that stuck-up bitch has no business complaining that I pinched her butt when she goes out in public dressed like that".
The question is at what point is the lock on the door overkill?
For software security, the answer is "when it requires so much processor power that it significantly slows down other functionality". The issue doesn't really arise for the modern generation of smartphones.