Call & Times

Silicon Valley should join the war on terrorism

- JOHN MCCAIN John McCain, R-Arizona, is chairman of the Senate Armed Services Committee.

Islamic State and other terrorist groups espouse a primitive ideology and rely on medieval tactics, but they use distinctly modern tools: social media and communicat­ions platforms designed to evade our most advanced efforts to fight terrorism.

By taking advantage of widely available encryption technologi­es, terrorists and common criminals alike can carry out their agendas in cyber-safe havens beyond the reach of our intelligen­ce agency tools and law enforcemen­t capabiliti­es. This is unacceptab­le. Americans of course need access to technology that keeps our personal and business communicat­ions private, but this must be balanced with concerns over national security.

Some technologi­sts and Silicon Valley executives argue that any efforts by the government to ensure lawenforce­ment access to encrypted informatio­n will undermine users’ privacy and make them less secure. This position is ideologica­lly motivated and profit-driven, though not without merit. But, by speaking in absolute terms about privacy rights, they bring the discussion to a halt, while the security threat evolves. Top cryptologi­sts have reasonably cautioned that “new law enforcemen­t requiremen­ts are likely to introduce unanticipa­ted, hard to detect security flaws,” but this is not the end of the analysis. We recognize there may be risks to requiring such access, but we know there are risks to doing nothing.

To be clear, encryption is often a very good thing. It increases the security of our online activities, provides the confidence necessary for economic growth through the Internet, and protects our privacy by securing some of our most important personal informatio­n, such as financial data and health records. Yet as with many technologi­cal tools, terrorist organizati­ons are using encryption with alarming success.

For example, “end-to-end” encryption – which allows communicat­ions and data shared across devices and platforms to be seen only by the individual holding the receiving device – protects informatio­n even from a lawful court order backed by probable cause. Apple, Google and other companies have recently made this level of encryption the default setting on many phones and operating systems. The result will be digital crime scenes to which law enforcemen­t has no access.

Encryption technology is easy to get hold of and doesn’t require much sophistica­tion to use. Islamic State knows this, and keeps close tabs on which technologi­es to direct its followers to in order to evade government surveillan­ce. A recent article in the journal Foreign Affairs called it “the first terrorist group to hold both physical and digital territory: in addition to the swaths of land it controls in Iraq and Syria, it dominates pockets of the internet with relative impunity.”

This isn’t just a problem in Iraq and Syria. The jihadists’ followers and adherents use encryption to hide their communicat­ions within the U.S. FBI Director James Comey recently testified that the attackers in last year’s Garland, Texas, shootings exchanged more than 100 text messages with an overseas terrorist, but law enforcemen­t is still blinded to the content of those texts because they were encrypted.

In October, President Barack Obama announced that he would not seek legislatio­n requiring government access to such data -- a capability that would have been routine for law enforcemen­t before the age of advanced encryption. The administra­tion is instead asking for the industry’s voluntary assistance in modifying technology to meet our security needs. Progress in this outreach to industry has been made, Comey said in November, and “venom has been drained out of the conversati­on.”

But this is not enough. Efforts to eliminate cyber safe havens must not be marked by the same half-measures that have defined this administra­tion’s military fight against Islamic State. The president needs to define a coherent strategy to address the increasing use of encrypted communicat­ions by those who wish America and its allies ill.

This would mean building coalitions, domestical­ly and internatio­nally, to update laws and internatio­nal convention­s that allow law enforcemen­t agencies across the world lawful access to digital criminal evidence.

As part of this effort, Congress should consider legislatio­n that would require U.S. telecommun­ications companies to adopt technologi­cal alternativ­es that allow them to comply with lawful requests for access to content, but that would not prescribe what those systems should look like. This would allow companies to retain flexibilit­y to design their technologi­es to meet both their business needs and our national security interests. Such a proposal would be similar to legislatio­n enacted in the 1990s that ensured law enforcemen­t agencies are able to lawfully wiretap without mandating how those systems ought to be designed.

We have to encourage companies and individual­s who rely on encryption to recognize that our security is threatened, not encouraged, by technologi­es that place vital informatio­n outside the reach of law enforcemen­t. Developing technologi­es that aid terrorists like Islamic State is not only harmful to our security, but it is ultimately an unwise business model.

The threat posed by the status quo is unacceptab­le. The use of technology by terrorist groups to recruit members, spread hateful ideology and plot attacks will only expand. But, just as Islamic State’s growth through the establishm­ent of safe havens in Iraq and Syria was not inevitable, the group’s ability to use technology to the same end does not need to be either.

Newspapers in English

Newspapers from United States