US Senators want to force tech companies to give "legal access" encrypted information

It became known does little information about a move by a group of Republican senators which is trying to force companies technological to comply with "legal access" to encrypted information.

And it is that, at the beginning of the week, presented the "Lawful Access to Encrypted Data Act" (Law on legal access to encrypted data), demanding an end to "court-order proof" encryption, which in their words, this has long interrupted criminal investigations.

The bill was introduced by Senator Lindsey Graham, Chairman of the Senate Judiciary Committee, as well as Senators Tom Cotton and Marsha Blackburn.

If adopted, the Tech companies would be forced to help researchers access the encrypted information if this contribution could lead to an arrest warrant. Since lawmakers and the United States Department of Justice have long battled tech companies over encryption.

The Justice Department argues that encryption prevents that the researchers obtain the necessary evidence of the suspects' devices and has asked major tech companies to provide "legal access," a key to decrypt data that would not be made available only at the request of the police. The FBI made a similar request to Apple in 2016 when it wanted data from the iPhone of a terrorist who died after the mass shooting in San Bernardino, California.

But the technology experts and privacy advocates they have warned for a long time against the deployment of a backdoor in encryption, arguing that Such a solution is more dangerous than it helps.

End-to-end encryption protects billions of people from hackers, oppressive governments, or even meddlesome partners by providing security measures that companies themselves cannot bypass, at least in theory. Creating a way for researchers to access this data raises concerns that hackers and cybercriminals may also take this route.

The bill does not explicitly require to technology companies to create a back door, stating that the Attorney General is prohibited from giving specific measures on how technology companies must comply with legal access orders.

The bill It also allows tech companies that receive a request to appeal in federal court vary or cancel the orders.

"My position is clear: once the police have obtained the necessary court clearances, companies should be able to retrieve information to assist them in their investigations," Graham said in a statement.

“Our legislation respects and protects the privacy rights of law-abiding Americans. It also warns terrorists and criminals that they will no longer be able to hide behind technology to cover their tracks.

The bill also allows to the Attorney General launch a competition with a prize for anyone who canfind a way to access the encrypted data while protecting confidentiality and security. Security experts have long noted that this was an impossible request.

This bill is not the first attempt congressional to weaken crypto policies in the United States.

Since in March, Graham and a bipartisan group of senators introduced EARN IT, which could remove the section 230 legal shield for tech companies if they continue to help protect child sexual predators with tools like encryption.

The Justice Department has criticized tech companies like Apple and Facebook for adopting end-to-end encryption, saying that technology protects terrorists and sexual predators.

In May, the FBI said it had an "Apple problem," claiming the company refused to help unlock a terrorist's iPhone during a 2019 attack on a naval base in Florida.

Apple had no comment, but said in May that it had assisted the FBI investigation "in every way possible."


Be the first to comment

Leave a Comment

Your email address will not be published. Required fields are marked with *

*

*

  1. Responsible for the data: AB Internet Networks 2008 SL
  2. Purpose of the data: Control SPAM, comment management.
  3. Legitimation: Your consent
  4. Communication of the data: The data will not be communicated to third parties except by legal obligation.
  5. Data storage: Database hosted by Occentus Networks (EU)
  6. Rights: At any time you can limit, recover and delete your information.