Renewed Crypto Wars?
February 9, 2016 (IN10440)
Kristin Finklea, Specialist in Domestic Security (email@example.com, 7-6259)
Technology has been evolving at a rapid pace, presenting both opportunities and challenges for U.S. law enforcement.
On the one hand, some contend that technology developments have resulted in a "golden age of surveillance" for law
enforcement; the large amount of information that investigators have at their fingertips—access to location data,
information about individuals' contacts, and a range of websites—collectively form "digital dossiers" on individuals.
On the other hand, some argue that law enforcement is "going dark" as their capabilities are outpaced by the speed of
technological change, and thus they cannot access certain information they are authorized to obtain. Strong encryption,
for instance, has been cited as one such innovation contributing to law enforcement's going dark issue.
While the tension created by changing technology is not new, it was reinvigorated in 2014 as technology companies like
Apple and Google began implementing automatic enhanced encryption on mobile devices and certain communications
systems. Companies using such strong encryption do not maintain "back door" keys and therefore cannot unlock, or
decrypt, the devices—not even when presented with an authorized wiretap order. Concerns about the lack of back door
keys were highlighted by the November and December 2015 terrorist attacks in Paris, France and San Bernardino, CA.
Questions arose as to whether the attackers used strong encryption and, more importantly, if they did, whether this
prevented law enforcement and intelligence officials from identifying the attackers and potentially thwarting the
attacks. These questions have reopened discussions on how encryption and quickly advancing technologies could
impact law enforcement investigations.
In the 1990s, a broad discussion on encryption took place in the United States. The "crypto wars" pitted the government
against data privacy advocates in a debate on the use of data encryption. This strain was highlighted by proposals to
build back doors into certain encrypted communications devices and to block the export of strong encryption code.
Clipper Chip. During the Clinton Administration, encryption technology, known as the Clipper Chip, was introduced.
This technology used a concept called "key escrow." The idea was that a chip (the Clipper Chip) would be inserted into
a communications device, and at the start of each encrypted communication session, the chip would copy the
encryption key and send it to the government to be held in escrow, essentially establishing a back door for access. With
authorization—such as a court authorized wiretap—government agencies would then have the ability to access the key
to the encrypted communication. Vulnerabilities in the system design were later discovered, showing that the system
could be breached and the escrow capabilities disabled. As such, this system was not adopted.
Encryption Export. During the same period, the federal government opened an investigation into Philip Zimmermann,
the creator of Pretty Good Privacy (PGP) encryption software, the most widely used email encryption platform. When
PGP was released, it "was a milestone in the development of public cryptography. For the first time, military-grade
cryptography was available to the public, a level of security so high that even the ultra-secret code-breaking computers
at the National Security Agency could not decipher the encrypted messages." When someone released a copy of PGP
on the Internet, it proliferated, sparking a federal investigation into whether Zimmermann was illegally exporting
cryptographic software (then considered a form of "munitions" under the U.S. export regulations) without a specific
munitions export license. Ultimately the case was resolved without an indictment. Courts have since been presented
with the question of how far the First Amendment right to free speech protects written software code—which includes
The 1990s also brought "concerns that emerging technologies such as digital and wireless communications were making
it increasingly difficult for law enforcement agencies to execute authorized surveillance." Congress passed the
Communications Assistance for Law Enforcement Act (CALEA; P.L. 103-414) to help law enforcement maintain its
ability to execute authorized electronic surveillance in a changing technology environment. Among other things,
CALEA requires that telecommunications carriers assist law enforcement in executing authorized electronic
There are several noteworthy caveats to the requirements under CALEA:
Law enforcement and officials may not require telecommunications providers (and manufacturers of equipment
and providers of support services) to implement "specific design of equipment, facilities, services, features, or
system configurations." Similarly, officials may not prohibit "the adoption of any equipment, facility, service, or
feature" by these entities.
Telecommunications carriers are not responsible for "decrypting, or ensuring the government's ability to decrypt,
any communication encrypted by a subscriber or customer, unless the encryption was provided by the carrier and
the carrier possesses the information necessary to decrypt the communication."
Both CALEA caveats play central roles in the current debate. For one, policymakers have been questioning whether to
require certain entities to build back doors in their products and services such that law enforcement could more easily
access communications and data when presenting a lawful wiretap order or warrant. Further, they have been debating
the utility of requiring these entities to ensure that devices and communications could be unlocked and decrypted.
Questions regarding potential legislation include
would legislation be effective if it can only impose requirements on products manufactured or sold in the United
would back doors allowing exceptional access for one entity—law enforcement—inadvertently allow exceptional
access for others;
could legislation be sufficiently technology neutral to keep pace with technological change;
what economic impact might back door requirements have on affected U.S. technology companies; and
would allowing the U.S. government access to certain communications and devices set the desired example for
The Obama Administration considered pushing for legislation requiring technology companies to build back door
access points into encryption but decided against it. In the absence of a favorable legislative option, some have
proposed a national commission to study today's security and technology challenges and to brainstorm options that
might be acceptable to both law enforcement and the technology industry.