Cybersecurity & Tech Surveillance & Privacy

Another Take on the Lessons of Paris Shootings for Encryption

Herb Lin
Tuesday, November 17, 2015, 1:14 PM

A variety of sources are reporting that the terrorists in Paris used encryption that may have thwarted intelligence efforts to monitor their pre-attack activities. (See, for example, today's New York Times.) Ben Wittes had a nice piece yesterday that focused on what the Snowden disclosures may or may not have done to lead to this ostensible outcome.

Published by The Lawfare Institute
in Cooperation With
Brookings

A variety of sources are reporting that the terrorists in Paris used encryption that may have thwarted intelligence efforts to monitor their pre-attack activities. (See, for example, today's New York Times.) Ben Wittes had a nice piece yesterday that focused on what the Snowden disclosures may or may not have done to lead to this ostensible outcome. I want to offer below a complementary perspective that does not contradict Ben’s thoughts but does add one observation that he doesn’t make.

Specifically, the argument that only exceptional access can provide government authorities with the necessary information to thwart terrorist events don’t seem to apply to what appears to have happened in investigating the Paris shootings. The terrorists had to be in communication with each other before the events, and their use of encrypted communications apps may have prevented surveillance that could have thwarted them. But as indicated by the rapid arrests in the wake of the shootings and the identification of the leaders of the plot , the number of people for whom surveillance may be necessary is almost surely small and their identities largely known.

If so, targeted means for gaining access to encrypted communications are feasible. That is, government authorities could target the communications of a set of specific individuals using technical means. Encrypted communications must be decrypted and displayed for the terrorist or criminal to read them, and thus they can be captured by on-device software. Message capturing software could be pushed only to individuals under suspicion (and only with appropriate legal oversight). In principle, there is no reason that government authorities could not read encrypted terrorist communications a few moments after the terrorist reads them. (This approach shares much in common with the “Lawful Hacking” approach advocated by Bellovin, Blaze, Clark, and Landau.)

In arguing against the “lawful hacking approach”, advocates of generalized requirements to provide exceptional access usually posit an encrypted device is in the hands of government authorities and may contain information helpful to taking immediate action. While the case is still unfolding, this does not seem to have been the case in the Paris shootings.


Dr. Herb Lin is senior research scholar for cyber policy and security at the Center for International Security and Cooperation and Hank J. Holland Fellow in Cyber Policy and Security at the Hoover Institution, both at Stanford University. His research interests relate broadly to policy-related dimensions of cybersecurity and cyberspace, and he is particularly interested in and knowledgeable about the use of offensive operations in cyberspace, especially as instruments of national policy. In addition to his positions at Stanford University, he is Chief Scientist, Emeritus for the Computer Science and Telecommunications Board, National Research Council (NRC) of the National Academies, where he served from 1990 through 2014 as study director of major projects on public policy and information technology, and Adjunct Senior Research Scholar and Senior Fellow in Cybersecurity (not in residence) at the Saltzman Institute for War and Peace Studies in the School for International and Public Affairs at Columbia University. Prior to his NRC service, he was a professional staff member and staff scientist for the House Armed Services Committee (1986-1990), where his portfolio included defense policy and arms control issues. He received his doctorate in physics from MIT.

Subscribe to Lawfare