KaitlinMorrisonFirstEssay 2 - 20 Oct 2014 - Main.KaitlinMorrison
|
|
META TOPICPARENT | name="FirstEssay" |
| | Introduction | |
< < | I recently attended a lecture by Orin Kerr on the Fourth Amendment in the digital era. The entry point was whether the search incident to arrest exception to the warrant requirement should include small computers (cell phones). The meaning of the Fourth Amendment has shifted over time in response to changes in technology, from the car to the computer. Kerr calls this equilibrium-shifting, and characterizes it as an attempt to protect the original level of privacy the founders sought to safeguard, even if that means shifting the legal rules to achieve that. He advocates broadly for different Fourth Amendment rules for digital and physical evidence, and specifically, that a warrant should be required before searching a cell phone seized during arrest. | > > | I recently attended a lecture by Orin Kerr on the Fourth Amendment in the digital era. The entry point was whether the search incident to arrest exception to the warrant requirement should include small computers (cell phones). The meaning of the Fourth Amendment has shifted over time in response to changes in technology, from the car to the computer. Kerr calls this equilibrium-shifting, and characterizes it as an attempt to protect the original level of privacy the founders sought to safeguard, even if that means shifting legal rules. He advocates broadly for different Fourth Amendment rules for digital and physical evidence, and specifically, that a warrant should be required before searching a cell phone seized during arrest. | | Forced Decryption | | Suppressing the right of individuals to encrypt seems tantamount to suppressing speech in the digital era. You can choose to speak and be recorded, or you can choose not to speak at all. What kind of choice is that? The idea that ephemeral encryption is an individual right can be distinguished when speaking about highly regulated companies, such as banks. It is reasonable to imagine that they might be required to keep records of internal communications. | |
< < | This type of ephemeral encryption is a means of shoring up the Fourth Amendment from the other side of the fence, through self-help by the communicator. Rather than relying on a ponderously shifting understanding of the Fourth-Amendment, why don't we make our digital data as ephemeral as the physical evidence the Fourth Amendment was intended to protect? | > > | Ephemeral encryption is a means of shoring up the Fourth Amendment from the other side of the fence, through self-help by the communicator. Rather than relying on a ponderously shifting understanding of the Fourth-Amendment, why don't we make our digital data as ephemeral as the physical evidence the Fourth Amendment was intended to protect? | | Widespread Adoption | |
< < | Part of acceptance/normalizing of encryption must be widespread adoption. Snowden may have heightened interest in privacy, but most still label those who insist on privacy or even show any concern for it as crackpots and criminals. There is a widely held idea that those with nothing to hide should not care about privacy. The converse is those who use encryption have something to hide. One can imagine a penalizing statue like the one for failure to encrypt in an ephemeral encryption scenario: encryption with intent to commit a crime. With widespread use, this mens rea element is dashed. I didn't use encryption with the intent to commit a crime, it is simply the default. I just happened to also commit a crime, just as those who have communicate in person sometimes commit crimes. | > > | Part of acceptance/normalizing of encryption must be widespread adoption. Snowden may have heightened interest in privacy, but most still label those who insist on privacy or even show any concern for it as crackpots and criminals. There is a widely held idea that those with nothing to hide should not care about privacy. The converse is those who use encryption have something to hide. One can imagine a penalizing statue like the one for refusal to decrypt in an ephemeral encryption scenario: encryption with intent to commit a crime. With widespread use, this mens rea element is dashed. I didn't use encryption with the intent to commit a crime, it is simply the default. I just happened to also commit a crime, just as those who communicate in person sometimes commit crimes. | | | |
< < | Widespread adoption, however, is precisely the stumbling block the free software movement, and other progressive tech movements. Why should people take the slightly harder road for a gain that feels illusory to them? Mass adoption would require that encryption to be just as easy to use as nonencryption, the default option. Most would not otherwise be motivated to abandon something that 'works,' while perhaps not entirely for them, for something that they must work on, and thus maintain their precious – wait why why was this important again? - privacy and autonomy. | > > | Widespread adoption, however, is precisely the stumbling block of the free software movement. Why should people take the slightly harder road for a gain that feels illusory to them? Mass adoption would require that encryption be just as easy to use as nonencryption, the default option. Most would not otherwise be motivated to abandon something that 'works,' while perhaps not entirely for them, for something that they must work on, and thus maintain their precious – wait why why was this important again? - privacy and autonomy. | |
\ No newline at end of file |
|
KaitlinMorrisonFirstEssay 1 - 20 Oct 2014 - Main.KaitlinMorrison
|
|
> > |
META TOPICPARENT | name="FirstEssay" |
Fixing the Fourth Amendment from Inside the Fence: Ephemeral Encryption
-- By KaitlinMorrison - 20 Oct 2014
Introduction
I recently attended a lecture by Orin Kerr on the Fourth Amendment in the digital era. The entry point was whether the search incident to arrest exception to the warrant requirement should include small computers (cell phones). The meaning of the Fourth Amendment has shifted over time in response to changes in technology, from the car to the computer. Kerr calls this equilibrium-shifting, and characterizes it as an attempt to protect the original level of privacy the founders sought to safeguard, even if that means shifting the legal rules to achieve that. He advocates broadly for different Fourth Amendment rules for digital and physical evidence, and specifically, that a warrant should be required before searching a cell phone seized during arrest.
Forced Decryption
Where the discussion began to falter was around encryption. While Kerr believed a warrant was necessary, the perceived wisdom is that the phone should be simply be seized, placed in an RF-shielded baggie, and a warrant acquired. The purpose of the baggie is to prevent remote wipes, perhaps most epically portrayed in the season five premiere of Breaking Bad. But what if the data on the phone is encrypted, and no one has the encryption key other than the suspect? Post-Snowden, Apple is beginning to sell products that claim to allow this kind of encryption, though how much we should trust this claim is questionable. Snapchat claimed photos sent over the app weren't stored until it was proven otherwise, and companies generally only care if you believe their security claims long enough to buy and use the product.
Should suspects be compelled to decrypt data, despite the Fifth Amendment right against self-incrimination? One option would be a separate penalty for failure to decrypt – let's say, ten years. Is this self-incrimination, or something more like being required to allow police into your home when they have a valid warrant. It's not quite the same, however, because police can break down a door without your assistance, but strong encryption can be practically impenetrable.
Ephemeral Encryption
This self-incrimination issue will soon be moot if we take encryption one step further, and imagine data that is not stored and thus unavailable for decryption; data that simply self-destructs. Off-the-record (OTR) encryption does just that. OTR allows for a conversation to happen in real time, and during the conversation both sides can read the conversation and no one else can. When the conversation starts, the two parties agree on a random and temporary, let's say ephemeral, encryption key unique to the conversation. After the conversation, both parties immediately discard the key. Following the conversation, no one can read the conversation, including the two parties involved. There is nothing stored or saved to be disclosed after the fact. When agreed upon by both parties, the conversation simply vanishes at it's completion, like a voice fading in the air.
Who has knowledge of this conversation? The participants still know what was said, the same as it ever was. What is eliminated is the unnecessary, unwanted, seeing and storing of the conversation by various entities in between. This scheme grants the privacy and ephemerality of an in-person conversation to all those who would wish to communicate with each other in the way it is done now – digitally. If we have the right to speech, the right to communicate, and communication is now done primarily by bits and bytes, why should I not have the right to to a digital whisper?
Protecting the Right to Whisper By Self-Help
The tone of the Kerr talk was that perhaps something should be done about this whole encryption thing, lest law enforcement be thwarted in their duties. But we have always had fastidious criminals. This would not render crimes unsolvable. Those involved still have the information, and can be witnesses. Other acts have likely occurred outside of emails to commit the crime. Targeted surveillance based on probable cause may still be undertaken. What ephemeral encryption prevents is the dragnet of mundane, non-targeted surveillance that erodes all privacy.
Suppressing the right of individuals to encrypt seems tantamount to suppressing speech in the digital era. You can choose to speak and be recorded, or you can choose not to speak at all. What kind of choice is that? The idea that ephemeral encryption is an individual right can be distinguished when speaking about highly regulated companies, such as banks. It is reasonable to imagine that they might be required to keep records of internal communications.
This type of ephemeral encryption is a means of shoring up the Fourth Amendment from the other side of the fence, through self-help by the communicator. Rather than relying on a ponderously shifting understanding of the Fourth-Amendment, why don't we make our digital data as ephemeral as the physical evidence the Fourth Amendment was intended to protect?
Widespread Adoption
Part of acceptance/normalizing of encryption must be widespread adoption. Snowden may have heightened interest in privacy, but most still label those who insist on privacy or even show any concern for it as crackpots and criminals. There is a widely held idea that those with nothing to hide should not care about privacy. The converse is those who use encryption have something to hide. One can imagine a penalizing statue like the one for failure to encrypt in an ephemeral encryption scenario: encryption with intent to commit a crime. With widespread use, this mens rea element is dashed. I didn't use encryption with the intent to commit a crime, it is simply the default. I just happened to also commit a crime, just as those who have communicate in person sometimes commit crimes.
Widespread adoption, however, is precisely the stumbling block the free software movement, and other progressive tech movements. Why should people take the slightly harder road for a gain that feels illusory to them? Mass adoption would require that encryption to be just as easy to use as nonencryption, the default option. Most would not otherwise be motivated to abandon something that 'works,' while perhaps not entirely for them, for something that they must work on, and thus maintain their precious – wait why why was this important again? - privacy and autonomy.
|
|
|
|
This site is powered by the TWiki collaboration platform. All material on this collaboration platform is the property of the contributing authors. All material marked as authored by Eben Moglen is available under the license terms CC-BY-SA version 4.
|
|