• Monthly
  • $25
  • $50
  • $100
  • $other
  • use PayPal

Spring Donation Drive

CounterPunch is a lifeboat piggybank-icon of sanity in today’s turbulent political seas. Please make a tax-deductible donation and help us continue to fight.
FacebookTwitterRedditEmail

The FBI Can Bypass Encryption

Encryption has gained the attention of actors on both sides of the mass surveillance debate. For example in a speech at the Brookings Institution FBI Director James Comey complained that strong encryption was causing U.S. security services to “go dark.” Comey described encrypted data as follows:

“It’s the equivalent of a closet that can’t be opened, a safe deposit box that can’t be opened, a safe that can’t ever be cracked.”

Got that? Comey essentially says that encryption is a sure bet. Likewise during an interview with James Bamford whistleblower Ed Snowden confidently announced that:

“We have the means and we have the technology to end mass surveillance without any legislative action at all, without any policy changes… By basically adopting changes like making encryption a universal standard—where all communications are encrypted by default—we can end mass surveillance not just in the United States but around the world.”

If you glanced over the above excerpts and took them at face value you’d probably come away thinking that all you needed to protect your civil liberties is the latest encryption widget. Right? Wow, let me get my check book out! Paging Mr. Omidyar…

Not so fast bucko. There’s an important caveat, some fine print that Ed himself spelled out when he initially contacted film director Laura Poitras. In particular Snowden qualified that:

“If the device you store the private key and enter your passphrase on has been hacked, it is trivial to decrypt our communications.”

This corollary underscores the reality that, despite the high profile sales pitch that’s being repeated endlessly, strong encryption alone isn’t enough. Hi-tech subversion is a trump card as the Heartbleed bug graphically illustrated. In light of the NSA’s mass subversion programs it would be naïve to think that there aren’t other critical bugs like Heartbleed, subtle intentional flaws, out in the wild being leveraged by spies.

The FBI’s Tell

James Comey’s performance at Brookings was an impressive public relations stunt. Yet recent history is chock full of instances where the FBI employed malware like Magic Lantern and CIPAV to foil encryption and identify people using encryption-based anonymity software like Tor. If it’s expedient the FBI will go so far as to impersonate a media outlet to fool suspects into infecting their own machines. It would seem that crooks aren’t the only attackers who wield social engineering techniques.

In fact the FBI has gotten so adept at hacking computers, utilizing what are referred to internally as Network Investigative Techniques, that the FBI wants to change the law to reflect this. The Guardian reports on how the FBI is asking the U.S. Advisory Committee on Rules and Criminal Procedure to move the legal goal posts, so to speak:

“The amendment [proposed by the FBI] inserts a clause that would allow a judge to issue warrants to gain ‘remote access’ to computers ‘located within or outside that district’ (emphasis added) in cases in which the ‘district where the media or information is located has been concealed through technological means’. The expanded powers to stray across district boundaries would apply to any criminal investigation, not just to terrorist cases as at present.”

In other words the FBI wants to be able to hack into a computer when its exact location is shrouded by anonymity software. Once they compromise the targeted machine it’s pretty straightforward to install a software implant (i.e. malware) and exfiltrate whatever user data they want, including encryption passwords.

If encryption is really the impediment that director Comey makes it out to be then why is the FBI so keen to amend the rules in a manner which implies that they can sidestep it? In the parlance of poker this is a “tell.”

Denouement

As a developer who has built malicious software designed to undermine security tools I can attest that there is a whole burgeoning industry which prays on naïve illusions of security. Companies like Hacking Team have found a lucrative niche offering products to the highest bidder that compromise security and… a drumroll please… defeat encryption.

There’s a moral to this story. Cryptome’s John Young prudently observes:

“Protections of promises of encryption, proxy use, Tor-like anonymity and ‘military-grade’ comsec technology are magic acts — ELINT, SIGINT and COMINT always prevail over comsec. The most widely trusted and promoted systems are the most likely to be penetrated, exploited, spied upon, successfully attacked, covertly compromised with faults hidden by promoters, operators, competitors, compromisers and attackers all of whom warn against the others while mutually benefiting from continuous alarms about security and privacy.”

When someone promises you turnkey anonymity and failsafe protection from spies, make like that guy on The Walking Dead and reach for your crossbow. Mass surveillance is a vivid expression of raw power and control. Hence what ails society is fundamentally a political problem, with economic and technical facets, such that safeguarding civil liberties on the Internet will take a lot more than just the right app.

Bill Blunden is an independent investigator whose current areas of inquiry include information security, anti-forensics, and institutional analysis. He is the author of several books, including The Rootkit Arsenal , and Behold a Pale Farce: Cyberwar, Threat Inflation, and the Malware-Industrial Complex. Bill is the lead investigator at Below Gotham Labs.

More articles by:

Bill Blunden is a journalist whose current areas of inquiry include information security, anti-forensics, and institutional analysis. He is the author of several books, including “The Rootkit Arsenal” andBehold a Pale Farce: Cyberwar, Threat Inflation, and the Malware-Industrial Complex.” Bill is the lead investigator at Below Gotham Labs and a member of the California State University Employees Union, Chapter 305.

bernie-the-sandernistas-cover-344x550

Weekend Edition
May 17, 2019
Friday - Sunday
Melvin Goodman
Trump and the Middle East: a Long Record of Personal Failure
Joan Roelofs
“Get Your Endangered Species Off My Bombing Range!”
Jeffrey St. Clair
Roaming Charges: Slouching Towards Tehran
Paul Street
It’s Even More Terrible Than You Thought
Rob Urie
Grabby Joe and the Problem of Environmental Decline
Ajamu Baraka
2020 Elections: It’s Militarism and the Military Budget Stupid!
Andrew Levine
Springtime for Biden and Democrats
Richard Moser
The Interlocking Crises: War and Climate Chaos
Ron Jacobs
Uncle Sam Needs Our Help Again?
Eric Draitser
Elizabeth Warren Was Smart to Tell FOX to Go to Hell
Peter Bolton
The Washington Post’s “Cartel of the Suns” Theory is the Latest Desperate Excuse for Why the Coup Attempt in Venezuela has Failed
Doug Johnson Hatlem
Analysis of Undecideds Suggests Biden’s Support May be Exaggerated
Peter Lackowski
Eyewitness in Venezuela: a 14-year Perspective
Karl Grossman
Can Jerry Nadler Take Down Trump?
Howie Hawkins
Does the Climate Movement Really Mean What It Says?
Gary Leupp
Bolton and the Road to the War He Wants
Jill Richardson
Climate Change was No Accident
Josh Hoxie
Debunking Myths About Wealth and Race
David Barsamian
Iran Notes
David Mattson
Social Carrying Capacity Politspeak Bamboozle
Christopher Brauchli
The Pompeo Smirk
Louis Proyect
Trotsky, Bukharin and the Eco-Modernists
Martha Burk
Will Burning at the Stake Come Next?
John W. Whitehead
The Deadly Perils of Traffic Stops in America
Binoy Kampmark
The Christchurch Pledge and a Regulated Internet
David Rosen
Florida’s Sex Wars: the Battle to Decriminalize Sex Work
Ralph Nader
Trump: Importing Dangerous Medicines and Food and Keeping Consumers in the Dark
Brett Haverstick
America’s Roadless Rules are Not Protecting Public Wildlands From Development
Alan Macleod
Purity Tests Can be a Good Thing
Binoy Kampmark
Modern Merchants of Death: the NSO Group, Spyware and Human Rights
Kim C. Domenico
Anarchism & Reconciliation, Part II
Peter LaVenia
Game of Thrones and the Truth About Class (Spoiler Warning)
Manuel E. Yepe
The Options Trump Puts on the Table
Renee Parsons
The Pompeo/Bolton Tag Team
David Swanson
Where Lyme Disease Came From and Why It Eludes Treatment
Cesar Chelala
Lowering Your Risk of Alzheimer’s Disease
Kollibri terre Sonnenblume
Our Problems are Deeper than “Capitalism” (and “Socialism” Alone Can’t Solve Them)
Chris Zinda
Delegislating Wilderness
Robert Koehler
War’s Unanswered Questions
Robert P. Alvarez
Let Prison Inmates Vote
Barbara Nimri Aziz
A Novel We Can All Relate To
David Yearsley
Carmen’s Mother’s Day Lessons
Charles R. Larson
Review: Ziya Tong’s “The Reality Bubble”
Elliot Sperber
Pharaoh’s Dream
Elizabeth Keyes
Somewhere Beyond Corporate Media Yemenis Die
FacebookTwitterRedditEmail