Posted 6 months ago | by @devadmin

The U.S. Department of Justice (DOJ) has renewed calls to ban encryption through an international statement claiming that end-to-end encryption “poses significant challenges to public safety,” including sexually exploited children.

In an Oct. 11th statement from the DoJ, the agency called for technology companies to work with the government to find a solution for encryption i.e. offer a backdoor with the means to allow the investigation of illegal activity and content by authorities. The department stated end-to-end encryption has hindered law enforcement from accessing certain content and creates “severe risks to public safety.”

The recent statement was signed by the DoJ, the Home Department of the United Kingdom, the Australian Minister for Home Affairs, India, Japan, a New Zealand Member of Parliament and the Minister of Public Safety and Emergency Preparedness of Canada.

The DoJ stated end to end encryption — in which only the senders and receivers can access the data being sent — undermined law enforcement from “investigating serious crimes” and “protecting national security.” In addition, a tech company’s ability to identify and respond to child sexual exploitation and abuse, violent crime, and terrorist propaganda may be compromised, claimed the department.

Earlier this year, three Republican senators pushed a bill that would outlaw end-to-end encryption for technology companies, requiring device manufacturers and service providers to assist federal and local law enforcement by providing access to encrypted data. The bill, named “The Lawful Access to Encrypted Data Act,” is currently under review in the Committee on the Judiciary. There is also the EARN IT Act, a proposed bill that would require digital messages to first pass through government-approved scanning software in order to monitor for malicious criminal activity.

The argument that encryption is harmful for children and it supports child sex abuse isn’t new.

Earlier this year in the name of protecting the children, U.S. lawmakers and the Department of Justice said they wanted to ban end-to-end encryption, opening Internet users to a host of attacks on their privacy by not only the government but also malicious hackers.

Attorney General William Barr claimed he wants to protect the children, but his former law firm, Kirkland & Ellis, protected Jeffrey Epstein—one of the most serial child sex traffickers. And it turns out Barr’s own father, Donald Barr, was the headmaster of an elite New York City school that hired college dropout Epstein to teach math and physics.

Barr expressed at the White House Summit on Human Trafficking that encryption was aiding human traffickers. He said:

“We live in a digital age, and like everyone else, human traffickers are relying increasingly on digital communication and the Internet … and more and more, the evidence we rely on to detect and to deal with these predators is digital evidence,” Barr said. “However, increasingly, this evidence is being encrypted.

We all recognize that encryption is important in the commercial world to protect consumers like us from cybercriminals, but now, we’re seeing military-grade encryption being marketed on consumer products like cellphones and social media platforms and messaging services, and that means that we cannot get access to this data.

We just can’t have chatrooms and websites that are involved in grooming children victims or selling trafficked women — sites that are impenetrable to law enforcement—and we have to do something about this.”

Barr has previously said that technology companies using end-to-end advanced encryption and other security measures are effectively turning devices into “law-free zones.”

“As we use encryption to improve cybersecurity, we must ensure that we retain society’s ability to gain lawful access to data and communications when needed to respond to criminal activity,” Barr said in his keynote address at the International Conference on Cybersecurity at Fordham University Law School in Manhattan.

The ACLU has stated strongly that Barr doesn’t understand the benefits of encryption and that they outweigh the negatives of its use.

“Encryption reliably protects consumers’ sensitive data,” Brett Max Kaufman, a senior staff lawyer in the Center for Democracy at the American Civil Liberties Union said. He added, “There is no way to give the F.B.I. access to encrypted communications without giving the same access to every government on the planet. Technology providers should continue to make their products as safe as possible and resist pressure from all governments to undermine the security of the tools they offer.”

Congress is seeking to ban companies from using end-to-end encryption and impose penalties for businesses that use it. Barr, Sen. Lindsey Graham (R-SC), and Sen. Senator Richard Blumenthal (D-CT) are targeting encryption with the “Eliminating Abusive and Rampant Neglect of Interactive Technologies (or EARN IT) Act.” The act would modify the Communications Decency Act’s Section 230 to make companies liable in state criminal cases and civil lawsuits over child abuse and exploitation if they don’t follow practices set by a national commission, according to Engadget.

That commission would be known as the “National Commission on Online Child Exploitation Prevention,” would be comprised of 15 people, and led by the Attorney General who just so happens to be Barr himself. This new government organization would also include the Chairman of the Federal Trade Commission, the Secretary of Homeland Security, and 12 others handpicked by members of Congress. The Commission would be tasked with recommending “best practices for providers of interactive computer services regarding the prevention of online child exploitation conduct.”

Riana Pfefferkorn, a member of the Stanford Law School’s Center for Internet and Society, wrote in a blog post that the bill threatens the constitutional rights of online communication platforms and their users in a solid evaluation of the bill. Pfefferkorn explained:

While the EARN IT Act is ostensibly aimed at Section 230, it’s actually a sneaky way of affecting [encryption laws] without directly amending it. This bill has a number of extremely serious problems, too many to fit into one blog post. It is potentially unconstitutional under the First, Fourth, and Fifth Amendments, for one thing.

If passed, the EARN IT ACT law would also require companies like Telegram to allow backdoor government access to encrypted information which would also provide a “golden key” vulnerability for malicious hackers—something that Barr doesn’t appear to understand.

The EFF wrote:

Throughout his term as Attorney General, William Barr has frequently and vocally demanded “lawful access” to encrypted communications, ignoring the bedrock technical consensus that it is impossible to build a backdoor that is only available to law enforcement. Barr is far from the first administration official to make impossible demands of encryption providers: he joins a long history of government officials from both parties demanding that encryption providers compromise their users’ security.

Even government officials in the FBI and DOJ aren’t convinced Barr is doing the right thing by seeking to ban encryption, according to the Wall Street Journal.

In 2018, the FBI lied and inflated the number of encrypted phones it said were connected to ongoing criminal investigations. The Bureau incorrectly stated time and time again that 7,800 phones were blocked from investigators. The Washington Post later reported that those figures were more like 1,000 to 2,000. The FBI blamed a “programming error” for the discrepancy.

Modern law provides enough legal means making EARN IT an unnecessary escalation on Section 230 which protects small companies more than the big giants. Currently, if an Internet company finds that an individual or group is using its platform to distribute child sexual abuse material, federal law already requires them to provide that information to the National Center for Missing and Exploited Children and to cooperate with law enforcement investigations.

The DOJ and other agencies across the world setting their eyes on encryption isn’t just bad news for internet service companies and social media apps, it’s bad news for Bitcoin and the bigger one, privacy coins. Ben has previously warned about the coming demise of privacy coins, and how the IRS was paying individuals to break Monero’s strong encryption. This also comes as the DOJ just recently stated in a report enitled: “Cryptocurrency: An Enforcement Framework” that cryptocurrency users using privacy coins are akin to potential “criminal conduct.”