New York Daily News

We need to crack encryption

- BYNAVEED JAMALI Jamali, a former FBI double agent, is the author of “How to Catch a Russian Spy: The True Story of an American Civilian Turned Double Agent.”

Last week, Apple CEO Tim Cook declared his intention to fight a court order requiring Apple to help the FBI with retrieving data from a San Bernardino terrorist’s iPhone. While the case revolves on one specific phone, Cook sees the order as being asked “to build a backdoor to the iPhone,” something that is “too dangerous to create.”

Cook is right: This case is bigger than one iPhone. But he’s wrong on the merits. Encrypted phones and communicat­ions are a clear and present threat to national security investigat­ions, one that the government has a responsibi­lity to try to break through.

While I support privacy and limits on government intrusion, I have been fundamenta­lly shaped by my almost four years between 2005 and 2009 working as a double agent for the FBI against the Russian military intelligen­ce in the United States. The experience gave me a disturbing look as to how those who wish to do us harm operate, and the challenges and difficulti­es that law enforcemen­t face in battling them.

Despite the fact that I was passing large amounts of data, the Russians insisted that all our business be done in person. This meant that Oleg, my Russian handler, would let me know the next meeting location by giving me a card or takeout menu for a restaurant. Months later and seemingly out of the blue, he would call my cell phone and ask, “Can you meet for lunch today?”

No matter what I was doing, the answer for me was always yes.

And no matter how much I complained about the short notice and the lack of a simple way to communicat­e, the Russians showed an absolute refusal to use email, cell phones or text.

At first I thought that the Russian aversion to using technology was because of a lack of sophistica­tion. Now I understand that they believed that electronic communicat­ion — as it was then designed — came with a high risk of detection.

The surveillan­ce capabiliti­es of the U.S. were so feared by the Russians, they dictated the tactics they used. Instead of having me email a file, they would rather have a high-ranking diplomat meet me in person to collect my informatio­n — physical contact, they believed, was less likely to be compromise­d than sending an email.

The Russian method of evading detection was analog and in-person; using encrypted messaging is a contempora­ry digital equivalent. And it makes communicat­ions among bad actors many times faster, more convenient and more efficient.

No longer do our enemies have to use the Osama Bin Laden approach of ferrying messages via paper and courier. Now, they can simply text or email from Syria, knowing that intelligen­ce services and law enforcemen­t might see the message, but are powerless to read it.

So unbreakabl­e is this technology that even though the FBI physically has possession of a dead man’s iPhone and a court order to gain access, there is currently no way to access the data on the phone.

If in a static case such as this it may take months of legal maneuverin­g and building a new technical solution to examine data on a phone for an event that has already passed, how will we possibly ever monitor data of phones in realtime and disrupt plots before an event occurs?

The intelligen­ce community used to arguably have too much informatio­n to sort through. Before Edward Snowden’s revelation­s set off a renaissanc­e in encryption technologi­es, the capabiliti­es of intelligen­ce agencies to record data was so great that, according to the Intercept’s review of the volume collected by the NSA, it was actually “(causing) informatio­n overload.”

We suddenly have far too little. Post- Snowden and with encryption abounding, an NSA inspector general report obtained by The New York Times found that, in the words of The Times, “The government is receiving far less data from Americans’ internatio­nal Internet communicat­ions than privacy advocates have long suspected.”

This is a big problem. A small fraction of terrorist and spy network can be disrupted using human intelligen­ce — people like me. But signals intelligen­ce — peeking in on communicat­ions — has always been a vital complement.

To restrict the reading of encrypted communicat­ions by intelligen­ce and law enforcemen­t agencies, even with a warrant, is surely not Apple’s intention. Nonetheles­s, that is exactly what encryption does. It has given our enemies an unintended advantage, allowing them to gain the cyber high ground.

This is no longer simply a question of privacy; it has become one of national security. Which is why If Cook truly has “no sympathy for terrorists,” he cannot ignore the profound danger encrypted devices and applicatio­ns pose to the defense of our country and the protection of innocent lives.

Bad actors are able to communicat­e with speed and ease

Newspapers in English

Newspapers from United States