
Encryption Adoption and Government Access to Cloud Communications
Explore the evolution of encryption technology and its impact on government surveillance efforts, focusing on the shifting dynamics of lawful access to cloud communications. Professor Peter Swire discusses the rise of encryption, declining effectiveness of traditional wiretaps, and the significance of stored communications in a globalized communication landscape.
Download Presentation

Please find below an Image/Link to download the presentation.
The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author. If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.
You are allowed to download the files provided on this website for personal or commercial use, subject to the condition that they are used lawfully. All files are the property of their respective owners.
The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.
E N D
Presentation Transcript
From Real-Time Intercepts to Stored Records: Why Encryption Drives the Government to Seek Access to the Cloud Professor Peter Swire The Privacy Project Cloud Conference April 4, 2012
The TPP Paper Rising adoption of encryption Declining effectiveness of traditional wiretaps Especially at local level Technological reason for shift in lawful access to the cloud The haves & have-nots
Encryption Adoption (Finally?) VPNs Blackberry Gmail now, other webmail soon SSL pervasive (credit card numbers) Dropbox & many more Facebook enables HTTPS, may shift default Skype & other VoIP Result interception order at ISP or local telco often won t work
Ways to Grab Communications 1. Break the encryption (if it s weak) 2. Grab comms in the clear (CALEA) 3. Grab comms with hardware or software before or after encrypted (backdoors) 4. Grab stored communications, such as in the cloud My descriptive thesis: #4 is becoming FAR more important, for global communications Also, temptation to do more #2 and #3
3 Phone call Alice Local switch Telecom Company Local switch Phone call Bob
3 Phone call Alice Local switch Telecom Company Local switch Phone call Bob
Hi Bob! Alice Alice ISP %!#&*YJ#$ &#^@% %!#&*YJ#$ &#^@% Internet: Many Nodes between ISPs %!#&*YJ#$ &#^@% %!#&*YJ#$ &#^@% %!#&*YJ#$ &#^@% %!#&*YJ#$ &#^@% %!#&*YJ#$ &#^@% %!#&*YJ#$ &#^@% %!#&*YJ#$ &#^@% %!#&*YJ#$ &#^@% Bob ISP Hi Bob! Bob
Problems with Weak Encryption Nodes between A and B can see and copy whatever passes through Many potential malicious nodes Strong encryption as feasible and correct answer US approved for global use in 1999 India, China new restrictions on strong encryption Encryption and Globalization says those restrictions are bad idea
Hi Bob! Encrypt Bob's public key Alice Encrypted message %!#&YJ@$ Alice's local ISP %!#&YJ@$ Backbone provider %!#&YJ@$ Bob's local ISP %!#&YJ@$ Hi Bob! Decrypt Bob's private key Bob
Ways to Grab Communications 1. Break the encryption (if it s weak) 2. Grab comms in the clear (CALEA) 3. Grab comms with hardware or software before or after encrypted (backdoors) 4. Grab stored communications, such as in the cloud
Limits of CALEA Applies to switched network & connect to that Bad cybersecurity to have unencrypted IP go through Internet nodes How deep to regulate IP products & services WoW just a game? Will all Internet hardware & software be built wiretap ready? That would be large new regulation of the Internet Could mobilize SOPA/PIPA coalition
Ways to Grab Communications 1. Break the encryption (if it s weak) 2. Grab comms in the clear (CALEA) 3. Grab comms with hardware or software before or after encrypted (backdoors) 4. Grab stored communications, such as in the cloud
Governments Install Software? Police install virus on your computer This opens a back door, so police gain access to your computer Good idea for the police to be hackers? Good for cybersecurity?
Ways to Grab Communications 1. Break the encryption (if it s weak) 2. Grab comms in the clear (CALEA) 3. Grab comms with hardware or software before or after encrypted (backdoors) 4. Grab stored communications, such as in the cloud
Stored Records: The Near Future Global requests for stored records Encrypted webmail, so local ISP less useful Local switched phone network less useful Push for data retention , so police can get the records after the fact The haves and have nots Server in your jurisdiction Technically ahead of the curve MLATs and other upcoming legal battles
Conclusion Adoption of strongly encrypted communications now going through a decisive shift Access by the cloud provider remains in many scenarios This technological shift will put pressure to develop legal mechanisms for global access to cloud providers