There has been a current war raging between technology and government policy. Apple has used encryption technology to protect user data on the iPhone. But they left a crack in the armor, and the FBI wants to create policy to jump through that tiny crack in order to decipher what is on Syed Farook’s phone.
What this tells us is that encryption works. If
the FBI or NSA could break strong encryption, then they would remove
the memory chips from Farook’s iPhone, copy the data and run it through a cloud
of government computers to read the files. But they can’t. That explains to us
that encryption works.
So instead, the FBI has used the All Writs Act law
from 1789 to convince a federal judge to force Apple to write a
special version of iOS to unlock the iPhone of a bad fellow in 2016. If that
sounds unlikely, well, it just might work.
If this policy wins in court and
the FBI forces Apple to break open Farook’s phone, it won’t
stop there. Apple will begin living the nightmare of hundreds of
state and federal judges demanding exactly the same thing. And that’s just the
beginning; governments around the world will join in with their
demands. Apple will be forced to unlock phones from Beijing to Moscow,
phones of both bad guys and protesters fighting repressive regimes.
When policy wins a round against technology,
it often runs amok.
Fortunately, this won’t be the last round. Apple has already signaled its intent to plug the crack they left in today’s iPhone. So very soon, perhaps even later this year, Apple will ship a phone with encryption that even they can’t break. Then no government on earth will be able to open those phones.
Maybe the battle will continue. But for policy to win the
next round, it will need to order Apple and the
other technology providers using encryption to change their products
so the government can look inside. This is the so-called backdoor, and this is
dangerous ground for policy makers.
Creating this backdoor requires changes to law — and that
means Congress. In a world obsessed with what Snowden revealed and with a
public angry enough to possibly elect Donald Trump, do you think Congress will
write a new law to create a backdoor for the government to snoop wherever it wants? No
chance. Technology will win, hands down.
So does that mean the game is over? That
all Apple has to do is move forward and create their iPhone fortress?
Well, maybe not. Because technology continues to march forward.
It turns out that technology will almost certainly
break today’s approach to encrypting data that is sent over the Internet.
A
completely different technology called quantum computing is
emerging from the lab, with early products being built now
Quantum computing is
completely different from today’s digital computers. Instead of calculations
using 1s and 0s, quantum computers use something called a qubit, which can
represent many values at the same time.
What this means is that some problems that are virtually
impossible to solve using today’s digital computers are child’s play for the
quantum computer of tomorrow.
Of particular interest is the asymmetric
encryption approach that is used to secure HTTPS and, thus, just about
everything confidential that is sent over the Internet. These keys are
practically unbreakable using digital computers. But for a powerful quantum
computer, they will be a piece of cake.
We are still a long way from a quantum computer that can pick
the lock on encryption keys. Quantum computing today is roughly as advanced as
digital computing was in 1971 when Intel created the first microprocessor.
But technology moves faster in 2016 than it did in the 1970s.
In 20 years, or maybe even as few as 10, quantum computers
may exist that can look inside all of today’s digital communications. Like most
new technology, quantum computing will be expensive and complex at first,
so it won’t be available to everyone. But the NSA and FBI won’t be
deterred, and they will be first in line to buy a quantum computer. This is a
pretty scary scenario, but technology does not play favorites. Technical
advancements become available to anyone with the will and means to acquire
them.
Like all technology, eventually quantum computing will
get cheaper and simpler. We’ll all probably carry a quantum computer in our
pocket someday. And while quantum computing may someday break today’s
encryption keys, something called quantum cryptography promises an
approach to encryption that cannot be foiled by a quantum computer. So the
pendulum will swing back and the FBI will be frustrated yet again.
The battle never ends. But in the
end, technology always wins.
No comments:
Post a Comment