Back to news

September 4, 2018 | International, C4ISR

Five Eyes Intel Alliance Urges Big Tech to Help Break Encrypted Messages

By Joseph Marks

The U.S. and four major allies warn new legislation might be necessary to ensure law enforcement can access communications.

Homeland Security Secretary Kirstjen Nielsen joined leaders of the U.S.'s four major intelligence sharing partners Thursday in a statement urging tech companies to help law enforcement access otherwise-encrypted communications from criminals and terrorists.

The joint statement stopped short of urging new laws to mandate that cooperation but warned that “should governments continue to encounter impediments to lawful access to information necessary to aid the protection of the citizens of our countries, we may pursue technological, enforcement, legislative or other measures to achieve lawful access solutions.”

The statement from the U.S., Canada, the United Kingdom, Australia and New Zealand, collectively known as the Five Eyes, describes law enforcement's inability to access encrypted communications as “a pressing international concern that requires urgent, sustained attention.”

While “governments should recognize that the nature of encryption is such that there will be situations where access to information is not possible,” the statement notes, “such situations should be rare.”

Obama and Trump administration officials have warned since 2014 that end-to-end encryption systems, which shield the content of communications even from the communications provider, are allowing criminals and terrorists to plan operations outside law enforcement's reach.

Legislative proposals that would make it easier for police to access those communications have failed to gain traction, however, even after a 2015 showdown between the FBI and Apple over an encrypted iPhone used by San Bernardino shooter Syed Farook.

An inspector general's investigation in March found the FBI rushed to court in that case, seeking to compel Apple's assistance without exploring other options for cracking into the phone.

Thursday's statement notes that: “Providers of information and communications technology and services ... are subject to the law, which can include requirements to assist authorities to lawfully access data, including the content of communications.”

The statement does not go into detail, however, about what laws would justify those requirements and how they should be interpreted. The San Bernardino case was never decided in court because an unknown third party sold the FBI a method for breaking through the phone's passcode and accessing its encrypted contents.

U.S. tech companies, for the most part, have resisted calls to cooperate with law enforcement. They argue that any effort to weaken encryption would be found and exploited by criminal hackers or foreign spies.

Technologists, civil libertarians and many members of Congress have urged police to use other methods to break through encrypted communications without forcing companies to help or installing government backdoors into encryption systems.

Those methods include obtaining a warrant to hack into the communications and building a case using unencrypted metadata.

During the summit, Nielsen and other Five Eyes officials also agreed to strengthen cooperation between their nations' cyber centers and to cooperate on improving the cybersecurity of supply chains for critical infrastructure such as energy plants and airports.

https://www.nextgov.com/cybersecurity/2018/08/five-eyes-intel-alliance-urges-big-tech-help-break-encrypted-messages/150961/

On the same subject

  • French 2023 defense budget adds $3 billion to fund 'war economy'

    September 28, 2022 | International, Other Defence

    French 2023 defense budget adds $3 billion to fund 'war economy'

    The increase was forecast by Defense Minister Sebastian Lecornu when he met with French lawmakers this summer.

  • Missile Defense Review expected in May

    April 9, 2018 | International, Aerospace, Land

    Missile Defense Review expected in May

    By: Aaron Mehta WASHINGTON ― The Trump administration's review of America's missile defense capabilities is now expected to be released in May. The Missile Defense Review, a strategy document designed to take a holistic view of America's missile defense posture, was expected to be released in February. But finally, it appears the document is nearing completion. Pentagon spokesman Tom Crosson, in response to an inquiry by Defense News, said that the review is “currently in development” and that “we expect to release the review sometime next month.” The review is expected to be unclassified. The review is part of a series of big-picture strategic documents that started with the December release of the National Security Strategy, followed by the January release of the National Defense Strategy, and continued with February's Nuclear Posture Review. Notably, the review was originally positioned as a “ballistic missile defense review,” but the term ballistic has since been dropped by the Trump administration ― something Tom Karako, a missile defense expert with the Center for Strategic and International Studies, said was a wise choice. “The fact that the administration has dropped ‘ballistic' from the review's title indicates the document will probably employ a wider lens,” Karako wrote in a CSIS analysis Friday. “This could include a robust effort to better defend against Russian and Chinese cruise missiles, other maneuvering endo-atmospheric threats like hypersonic boost-glide vehicles (HGVs), and advanced short-range ballistic missiles.” Although no one has spelled out the direction of the review, there have been some hints given about where the administration intends to take missile defense. The FY19 budget request for the Missile Defense Agency, for instance, increased by $2 billion from previous funding levels, with an express focus on defeating a missile threat from North Korea. And Michael Griffin, the Pentagon's new head of research and engineering, has expressed support for investing in airborne missile defense capabilities. Jen Judson in Washington contributed to this report. https://www.defensenews.com/space/2018/04/06/missile-defense-review-expected-in-may

  • The Army wants to build a better signals intelligence force

    July 23, 2018 | International, C4ISR

    The Army wants to build a better signals intelligence force

    By: Mark Pomerleau The Army's top intelligence official signed the service's new signals intelligence strategy July 16, a move that defense leaders believe leaves the Army better situated to better fight despite electronic warfare and cyber attacks. The new strategy ensures "our readiness to provide timely and relevant SIGINT-support [and meet] the commander's information needs in a large scale combat operation against a sophisticated adversary,” Lt. Gen. Scott Berrier, said July 18 during an event on Capitol Hill hosted by the Association of Old Crows. Officials say the integration of SIGINT, electronic warfare and cyber is critical from a material, organization and doctrinal perspective. “Not only will our four lines of effort improve our SIGINT corps' capabilities and relevance in the face of rapid changes in the global security environment, it will also enable our electronic warfare and cyberspace effort to meet new challenges,” Berrier said. The four initiatives in the new strategy include: - Organizing and building the Army SIGINT force, - Educating the force, - Equipping the force, and - Developing doctrine. The new strategy increases the Army's ability to collect intelligence against peer adversaries, such as China and Russia, and provides a firm foundation for successful electronic warfare and cyber operations, Berrier said. A key component of the convergence includes the new Terrestrial Layer System (TLS), a SIGINT/EW system projected to be fielded on vehicles and used by new military intelligence-electronic warfare (MI-EW) companies the Army is working to stand up. The Army wants SIGINT, electronic warfare and cyber systems on the same platforms in the air and ground domain, Maj. Gen. Robert Walters, commander of the Intelligence Center of Excellence, said at the event. These systems, Berrier said, should be able to not only sense the environment but employ some type of action such as electronic attack or cyber capability. Why converge? Officials have stressed repeatedly in the last year the need for colleagues in similar disciplines throughout the Army to stay in touch and reap the mutually beneficial equities on behalf of commanders in the field. Lt. Gen. Stephen Fogarty, the head of Army Cyber Command, said commanders shouldn't have to have something explained to them by the EW guy, the SIGINT guy and then the cyber guy. “What we decided is there's a better way, we have to pull it all together” for the commander, he said at the event. “We're going to have to work together because we all operate in the same space. And so do we really need three separate tools to plan operations in the spectrum? My argument would be no.” From an organizational perspective, the 29 series electronic warfare personnel will have deep knowledge in both cyber and electromagnetic spectrum operations. On the materiel side, especially with programs like the Terrestrial Layer System, the cyber and intel community are meeting regularly to integrate their requirements, officials said. In addition, Maj. Gen. John Morrison, commander of the Cyber Center of Excellence, told reporters in June that the Intelligence Center of Excellence is working with the Cyber Center to help ensure integrated formation and integrated capabilities. https://www.c4isrnet.com/intel-geoint/2018/07/19/the-army-wants-to-build-a-better-signals-intelligence-force/

All news