The Senate Armed Services Committee held a hearing on “Cybersecurity and U.S. National Security.” The hearing got most of its coverage because Sen. John McCain used it to repeatedly complain about Apple CEO Tim Cook’s decision to turn down an invitation to testify. But one person who did testify was Cyrus Vance, the Manhattan District Attorney. He has been leading the charge to mandate law enforcement access to tech products, and has testified at Capitol Hill several times. Unfortunately, despite the practice, he hasn’t gotten any better and has a tendency to, purposely or because he just can’t learn, misconstrue the facts and argue against a strawman.
Vance: The debate over encryption and public safety has matured significantly since 2014. The issue has crossed over into mainstream consciousness, owing in large part to Apple’s public refusal to assist the FBI with unlocking a terrorist’s iPhone in San Bernardino.
Fact: “Apple had asked the F.B.I. to issue its application for the tool under seal. But the government made it public, prompting Mr. Cook to go into bunker mode to draft a response.” [http://www.nytimes.com/2016/02/19/technology/how-tim-cook-became-a-bulwark-for-digital-privacy.html]9](http://www.nytimes.com/2016/02/19/technology/how-tim-cook-became-a-bulwark-for-digital-privacy.html)
Vance: Apple and Google’s decisions limit our access to critical information under a questionable claim of an increase in privacy. The encryption Apple provided on its mobile devices pre-iOS 8—that is, up until the end of September, 2014—was both secure for its customers and amenable to court-authorized searches.
Vance uses a bit of a strawman argument here. It’s not just a claim of an increase in privacy, but also of security. People are more likely to lose their phones than they are to be a drug dealer or child pornographer. I have a good passcode and I would turn on encryption on my phone even if it wasn’t the default. But, by going to an encryption-by-default model, Apple is protecting the much larger number of non-tech-savvy people who wouldn’t know or think to do that, but still run the risk of losing their phone.
Vance: We have good cause to believe that because Apple itself characterized its iOS 7 operating system as the ultimate in privacy, touting its proven encryption methods, and assuring users that iOS 7 could be used with confidence in any personal or corporate environment….Which is to say, Apple itself had already demonstrated that strong encryption and compliance with court orders were not incompatible.
It appears that Vance believes that using good encryption is an end-state. However, it is constantly evolving. Due to increases in computing power as well as the simple fact that people’s knowledge and techniques improve, what was considered secured by good encryption 10 years ago is no longer adequate. Microsoft also said that Windows was the most secure operating system ever at various points in time, that doesn’t mean it holds true today.
Vance: But with evidence from that defendant’s smartphone locked behind a passcode known only to him, and existing solely on his device, we could only charge a far less serious offense.
This ignores the times when prosectors can get a contempt of court charge if the person refuses to decrypt their computer, like this case where the defendant will “stay locked up indefintiely until he decrypts the drive.”
Vance: Also consider financial services, one of the most regulated industries in our country. As we learned more about how criminals were using banks to move money, Congress required firms to fight money laundering and to better know their customers – and specifically, to retain customers’ data and make that data available to law enforcement with a court order.
This is really comparing apples to oranges (see what I did right there?). Those are bank records. Apple can be compelled to turn over customer records, which Apple has, which is something Apple already does. If you use iCloud backup, then Apple has information on you. And Apple will turn those records over to law enforcement. That’s a lot different than introducing a vulnerability into the banking system, which would be the equivalent to Apple introducing a vulnerability into their operating system.
Also testifying at the hearing was Kenneth Wainstein, a partner at Cadwalader, Wickersham & Taft and formerly a top lawyer at the Department of Justice. I’ll only focus on his call-to-action at the end of his writtent testimony.
For the tech industry and civil liberties groups, this means laying out technically specific support for the contention that a government accommodation would undermine the integrity of default encryption. They should provide hard data that demonstrates exactly how—and how much—each possible type of accommodation would impact their encryption systems.
Perhaps he missed it, but this has been done. A group of some of the biggest-name cryptographers released a technical report through the Massachusetts Institute of Technology’s Computer Science and Artificial Intelligence Laboratory. From it’s conclusion: “This report’s analysis of law enforcement demands for exceptional access to private communications and data shows that such access will open doors through which criminals and malicious nation-states can attack the very individuals law enforcement seeks to defend. The costs would be substantial, the damage to innovation severe, and the consequences to economic growth difficult to predict. The costs to developed coun- tries’ soft power and to our moral authority would also be considerable. Policy-makers need to be clear-eyed in evaluating the likely costs and benefits.”

