{"id":27992,"date":"2017-11-15T07:37:15","date_gmt":"2017-11-15T12:37:15","guid":{"rendered":"http:\/\/olduvai.ca\/?p=27992"},"modified":"2017-11-15T07:37:15","modified_gmt":"2017-11-15T12:37:15","slug":"the-government-is-lying-to-us-about-cybersecurity","status":"publish","type":"post","link":"https:\/\/olduvai.ca\/?p=27992","title":{"rendered":"The Government Is Lying to Us About Cybersecurity"},"content":{"rendered":"<section class=\"hero article-detail\"><img decoding=\"async\" class=\"img-slider img-article-featured\" src=\"https:\/\/fee.org\/media\/25685\/accessdenied.jpg?anchor=center&amp;mode=crop&amp;height=656&amp;widthratio=2.1341463414634146341463414634&amp;rnd=131550478180000000\" alt=\"\" \/><\/section>\n<section class=\"section text-left article-detail-container\">\n<div class=\"container\">\n<div class=\"row\">\n<div class=\"col-md-8 print75\">\n<div class=\"single-article\">\n<div class=\"article-about\">\n<h3 class=\"article-republish-title\"><a href=\"https:\/\/fee.org\/articles\/the-government-is-lying-to-us-about-cybersecurity\/\">The Government Is Lying to Us About Cybersecurity<\/a><\/h3>\n<div class=\"article-subtitle\">The Department of Justice is full of excuses for wanting back doors into encryption systems, but they&#8217;re just that: excuses.<\/div>\n<div class=\"author-list-box\"><\/div>\n<\/div>\n<div class=\"article-body-cont ng-isolate-scope\">\n<div class=\"article-body-text\">\n<p data-block=\"true\" data-editor=\"dgn78\" data-offset-key=\"ce9r3-0-0\">In a press conference,<a href=\"https:\/\/arstechnica.com\/tech-policy\/2017\/11\/doj-strong-encryption-that-we-dont-have-access-to-is-unreasonable\/\"> Deputy Attorney General Rod Rosenstein stated <\/a>that the \u201cabsolutist position\u201d that strong encryption should be, by definition, unbreakable is \u201cunreasonable.\u201d<\/p>\n<p class=\"_1mf _1mj\" data-offset-key=\"ce9r3-0-0\"><span data-offset-key=\"ce9r3-0-0\">The DOJ is lying about three things:<\/span><\/p>\n<p class=\"_1mf _1mj\" data-offset-key=\"3hhde-0-0\"><span data-offset-key=\"3hhde-0-0\"><strong>First<\/strong><\/span><\/p>\n<p class=\"_1mf _1mj\" data-offset-key=\"3hhde-0-0\"><span data-offset-key=\"3hhde-0-0\">The US government works against the security of businesses. Just this week, I had to\u00a0<a href=\"https:\/\/developer.apple.com\/library\/content\/documentation\/LanguagesUtilities\/Conceptual\/iTunesConnect_Guide\/Chapters\/SubmittingTheApp.html#\/\/apple_ref\/doc\/uid\/TP40011225-CH33-SW6\">tell Apple<\/a>\u00a0that my iPhone app did not have certain kinds of encryption that the U.S. government has export control on. Encryption export controls cripple the security and innovation of software products made by American businesses.\u00a0\u00a0<\/span><\/p>\n<p>Furthermore, the U.S. government\u00a0<a href=\"https:\/\/www.schneier.com\/blog\/archives\/2016\/08\/the_nsa_is_hoar.html\">hoards software exploits<\/a>\u00a0so it can hack into your computer rather than publish them that so companies can patch their products. The NSA\u00a0<a href=\"https:\/\/www.wired.com\/2007\/11\/securitymatters-1115\/\">intentionally sneaks weaknesses into protocols<\/a>\u00a0and\u00a0<a href=\"https:\/\/www.theverge.com\/2013\/12\/20\/5231006\/nsa-paid-10-million-for-a-back-door-into-rsa-encryption-according-to\">bribes businesses to add holes to security products<\/a>\u00a0so it can steal the data of their customers.<\/p>\n<p><span class=\"rte-quote\">The only \u201ccybersecurity\u201d that the government cares about is its ability to conduct surveillance\u00a0and attacks on political targets. <\/span><\/p>\n<p>When businesses want to improve the security of their products, they offer rewards for exploits \u2013\u00a0<a href=\"https:\/\/venturebeat.com\/2017\/07\/26\/microsoft-launches-windows-bug-bounty-program-with-rewards-ranging-from-500-to-250000\/\">Microsoft pays up to $250,000 per exploit<\/a>, Facebook\u00a0<a href=\"http:\/\/fortune.com\/2017\/01\/19\/facebook-hacker-bug-bounty\/\">has paid $40,000<\/a>, and so on. The NSA\u00a0<a href=\"https:\/\/www.washingtonpost.com\/news\/the-switch\/wp\/2013\/08\/31\/the-nsa-hacks-other-countries-by-buying-millions-of-dollars-worth-of-computer-vulnerabilities\/?utm_term=.0232ada64c45\">purchases millions of dollars of exploits<\/a>\u00a0from hackers and uses them to\u00a0<a href=\"http:\/\/foreignpolicy.com\/2017\/04\/28\/nsa-halts-controversial-spy-program\/\">spy on the entire world, including U.S. citizens<\/a>. Unfortunately, the NSA is <a href=\"https:\/\/www.nytimes.com\/2017\/11\/12\/us\/nsa-shadow-brokers.html?_r=0\" target=\"_blank\" rel=\"noopener noreferrer\">incompetent at keeping secrets<\/a>, so it\u00a0<a href=\"https:\/\/arstechnica.com\/information-technology\/2017\/04\/nsa-leaking-shadow-brokers-just-dumped-its-most-damaging-release-yet\/\">lost their exploit database<\/a>\u00a0and\u00a0<a href=\"https:\/\/threatpost.com\/leaked-nsa-exploit-spreading-ransomware-worldwide\/125654\/\">caused millions of computers to be infected and hijacked with the exploits they hoarded<\/a>.The hardware and software pieces of both the Internet and individual user\u2019s computers are made by private companies. There is nothing the U.S. government can do to improve \u201ccybersecurity\u201d other than prosecuting criminal behavior.\u00a0 However, the U.S. government prosecutes a\u00a0<a href=\"https:\/\/www.csoonline.com\/article\/2618598\/cyber-crime\/why-internet-crime-goes-unpunished.html\">minuscule\u00a0proportion of cybercrime<\/a>.<\/p>\n<p>&#8230;click on the above link to read the rest of the article&#8230;<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/section>\n","protected":false},"excerpt":{"rendered":"<p>The Government Is Lying to Us About Cybersecurity The Department of Justice is full of excuses for wanting back doors into encryption systems, but they&#8217;re just that: excuses. In a press conference, Deputy Attorney General Rod Rosenstein stated that the \u201cabsolutist position\u201d that strong encryption should be, by definition, unbreakable is \u201cunreasonable.\u201d The DOJ is [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[6],"tags":[3229,16994,3897,17028,14991,17029,2148,577,746,786,827],"class_list":["post-27992","post","type-post","status-publish","format-standard","hentry","category-liberty","tag-cybersecurity","tag-david-l-veksler","tag-doj","tag-encryption-exploits","tag-foundation-for-economic-education","tag-government-lying","tag-hacking","tag-nsa","tag-spying","tag-technology","tag-united-states"],"_links":{"self":[{"href":"https:\/\/olduvai.ca\/index.php?rest_route=\/wp\/v2\/posts\/27992","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/olduvai.ca\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/olduvai.ca\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/olduvai.ca\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/olduvai.ca\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=27992"}],"version-history":[{"count":1,"href":"https:\/\/olduvai.ca\/index.php?rest_route=\/wp\/v2\/posts\/27992\/revisions"}],"predecessor-version":[{"id":27993,"href":"https:\/\/olduvai.ca\/index.php?rest_route=\/wp\/v2\/posts\/27992\/revisions\/27993"}],"wp:attachment":[{"href":"https:\/\/olduvai.ca\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=27992"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/olduvai.ca\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=27992"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/olduvai.ca\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=27992"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}