By Andy Greenberg, Forbes
As encryption technologies have outpaced the mathematical methods of breaking crypto schemes, law enforcement has feared for years that scrambled messages between evildoers (or law-breaking activists) would thwart their snooping. But it seems that either lawbreakers aren't using encryption, or those privacy tools simply don't work.
In an annual report published Friday by the U.S. judicial system on the number of wiretaps it granted over the past year (see full document below), the courts revealed that there were 2,376 wiretaps by law enforcement agencies in 2009, up 26% from 1,891 the year before, and up 76% from 1999. (Those numbers, it should be noted, don't include international wiretaps or those aimed at intelligence purposes rather than law enforcement.)
But in the midst of that wiretapping bonanza, a more surprising figure is the number of cases in which law enforcement encountered encryption as a barrier: one.
According to the courts, only one wiretapping case in the entire country encountered encryption last year, and in that single case, whatever privacy tools were used don't seemed to have posed much of a hurdle to eavedroppers. "In 2009, encryption was encountered during one state wiretap, but did not prevent officials from obtaining the plain text of the communications," reads the report.
Matt Blaze, a crypto-focused computer science professor at the University of Pennsylvania, points out that the numbers should put to rest the government's decades-old concern that widely available encryption technology would unleash a wave of untrackable criminal conspiracies of cypherpunk mafioso.
"This counters the predictions of almost the entire US government law enforcement and national security crypto debate," says Blaze. "It's been argued that the widespread availability of encryption would cripple law enforcement. None of those predictions have borne fruit."
~ more... ~
No comments:
Post a Comment