Apple’s and Google’s announcements that they will encrypt information on your phone are nice, but won’t help much. Most data is in the cloud, these days; and your protections in the cloud are governed by laws of numerous countries, almost all of which have quite large exceptions.
At the Internet Engineering Task Force we have taken a very strong stand that pervasive surveillance is a form of attack. This is not a matter of lack of trust of any one organization, but rather a statement that if one organization can snoop on your information, others will be able to do so as well, and they may not be so nice as the NSA. The worst you can say about the NSA is that a few analysts got carried away and spied on their partners. With real criminals it’s another matter. As we have seen with Target, other large department stores, and now JP Morgan, theirs is a business, and you are their commodity, in the form of private information and credit card numbers.
So now here comes Apple, saying that they will protect you from the government. According to Apple, you do, as they has chosen to make it difficult for the government to break into your phone. Like all technology, this “advance” has its pluses and minuses. To paraphrase a leader in the law enforcement community, everyone wants their privacy until it’s their child at risk. However, in the United States, at least, we have a standard that the director of the FBI seems to have forgotten- it’s called probable cause. It’s based on a dingy pesky old amendment to the Constitution which states:
The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no warrants shall issue, but upon probable cause, supported by oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.
So what happens if one does have probable cause? This is where things get interesting. If one has probable cause to believe that there is an imminent threat to life or property and they can’t break into a phone, then something bad may happen. Someone could get hurt, for instance. Is that Apple’s fault? And who has the right to interpret and enforce the fourth amendment? If Apple has a right to do so, then do I have the right to interpret what laws I will? On the other hand, Apple might respond that it has no responsibility to provide law enforcement anything, and all it is doing is exercising the right of free speech to deliver a product that others use to communicate with. Cryptographer and Professor Daniel Bernstein successfully argued this case in the 9th Circuit in the 1990s. And he was right to do so, because going back to the beginning of this polemic, even if you believe your government to be benevolent, if it can access your information, so can a bad guy, and there are far more bad guys out there.
Apple hasn’t simply made this change because it doesn’t like the government. Rather, the company has recognized that for consumers to put private information into their phone, they must trust the device to not be mishandled by others. At the same time, Apple has said through their public statements that information that goes into their cloud is still subject to lawful seizure. And this brings us back to the point that President Obama made at the beginning of the year: government risk isn’t the only form of risk. The risk remains that private aggregators of information – like Apple and Google or worse, Facebook– will continue to use your information for whatever purposes they see fit. If you don’t think this is the case, ask how much you pay for their services?
And since most of the data about your or that you own is either in the cloud or heading to the cloud, you might want to worry less about the phone or tablet, and more about where your data actually resides. If you’re really concerned about governments, then you might also want to ask this question: which governments can seize your data? The answer to that question is not straight forward, but there are three major factors:
- Where the data resides;
- Where you reside;
- Where the company that controls the data resides.
For instance, If you reside in the European Union, then nominally you should receive some protection from the Data Privacy Directive. Any company that serves European residents has to respect the rights specified in that. On the other hand, there are of course exceptions for law enforcement. If a server resides in some random country, however, like the Duchy of Grand Fenwick, perhaps there is a secret law that states that operators must provide the government all sorts of data and must not tell anyone they are doing so. That’s really not so far from what the U.S. government did with National Security Letters.There’s a new service that Cisco has rolled out, called the Intercloud that neatly addresses this matter for large enterprises, providing a framework to keep some data local, and some data in the cloud, and the enterprise has some control over which. Whether that benefit will extend to consumers is unclear.In the end I conclude that people who are truly worried about their data need to consider what online services they use, including Facebook, this blog you are reading right now, Google, Amazon, or anyone else. They also have to consider how if at all they are using the cloud. I personally think they have to worry less about physical devices, and that largely speaking Apple’s announcement is but a modest improvement in overall security. The same could be said for IETF efforts.