Mueller Report Keeps the Backdoor Encryption Debate Spinning
Encrypted communication channels and ephemeral messaging hindered the special counsel's investigation. Could this influence the debate over absolute encryption versus backdoor access?
April 22, 2019 at 11:30 AM
4 minute read
Among its many disclosures, the special counsel's 448-page redacted report on Russia's interference in the 2016 presidential election revealed that the investigation was stifled by the use of ephemeral and encrypted messaging systems.
“Further, the Office learned that some of the individuals we interviewed or whose conduct we investigated—including some associated with the Trump Campaign—deleted relevant communications or communicated during the relevant period using applications that feature encryption or that do not provide for long-term retention of data or communications records,” the report noted. “In such cases, the Office was not able to corroborate witness statements through comparison to contemporaneous communications or fully question witnesses about statements that appeared inconsistent with other known facts.”
All of this begs the question: Will the report impact the debate around absolute encryption versus government backdoor access? Probably not, experts say, seeing as how Mueller's report simply presents a new forum for old talking points.
April Doss, cybersecurity and privacy chair at Saul Ewing Arnstein & Lehr, called the competition between privacy interests and larger social needs an enduring challenge.
“I don't see this report taking center stage in this debate, but I do think it provides a broader range of examples as to where these challenges arise,” she said.
Doss cited page 44 of the report, which notes that the Russian Military Intelligence Service (GRU) communicated with WikiLeaks via Twitter private messaging and unspecified encrypted channels. “We can expect that limited the ability of the intelligence agencies to understand what this foreign adversary, the GRU, was trying to do.”
Just last fall, Five Eyes, a group consisting of governments from the U.S., Australia, Canada, the United Kingdom and New Zealand, released a communiqué asking tech companies to install backdoors in their encryption.
But tech providers have generally resisted such efforts, arguing that installing backdoors to afford law enforcement access to the communications of potential bad actors would make their systems vulnerable.
John Simek, vice president at cyber forensics and information security company Sensei Enterprises, sees the ongoing debate as cyclical, something that will enter the spotlight and then fade back out again with the turning of the news cycle.
“It's ongoing. I don't know that it's ever died nor do I think it ever will die. And anyone that's in the security realm will tell you that it's a bad idea, but if you're a government employee, you're under the significant misperception that it's a good idea,” Simek said.
The very nature of communications like ephemeral messaging are part of what keep the conversation spinning like a hamster on a wheel. Sharon Nelson, president of Sensei Enterprises, said that people in the middle of divorces are often willing to pay big bucks in the hopes of reconstituting evidence of an affair. But chances are slim.
“To be a good vendor, you have to tell them it's a much longer shot with the ephemeral products,” she said.
To be sure, there's no shortage of cheap and available ephemeral communications devices on the market. Last month, for instance, Facebook founder Mark Zuckerberg indicated that ephemeral messaging could play a big role in the future of the platform.
Nelson thinks combating elicit activity conducted over ephemeral messaging will take a strong legal deterrent. “I think that is where they have to go. When this stuff carries jail time it's serious.”
But it seems unlikely that the law will head too far in that direction any time soon, especially as the focus on privacy continues to sharpen within the United States.
Jarno Vanto, a partner in the privacy and cybersecurity group at Crowell & Moring, cited state-level efforts like the California Consumer Privacy Act, as well as calls in some circles for a federal privacy law as examples of the conversation trending towards the protection of electronic messages from third parties access.
“What I'm sensing is that this requirement for backdoors and government access to encrypted communications has taken a sidestep of that [in the United States],” Vanto said.
This content has been archived. It is available through our partners, LexisNexis® and Bloomberg Law.
To view this content, please continue to their sites.
Not a Lexis Subscriber?
Subscribe Now
Not a Bloomberg Law Subscriber?
Subscribe Now
NOT FOR REPRINT
© 2025 ALM Global, LLC, All Rights Reserved. Request academic re-use from www.copyright.com. All other uses, submit a request to [email protected]. For more information visit Asset & Logo Licensing.
You Might Like
View AllTrending Stories
Who Got The Work
J. Brugh Lower of Gibbons has entered an appearance for industrial equipment supplier Devco Corporation in a pending trademark infringement lawsuit. The suit, accusing the defendant of selling knock-off Graco products, was filed Dec. 18 in New Jersey District Court by Rivkin Radler on behalf of Graco Inc. and Graco Minnesota. The case, assigned to U.S. District Judge Zahid N. Quraishi, is 3:24-cv-11294, Graco Inc. et al v. Devco Corporation.
Who Got The Work
Rebecca Maller-Stein and Kent A. Yalowitz of Arnold & Porter Kaye Scholer have entered their appearances for Hanaco Venture Capital and its executives, Lior Prosor and David Frankel, in a pending securities lawsuit. The action, filed on Dec. 24 in New York Southern District Court by Zell, Aron & Co. on behalf of Goldeneye Advisors, accuses the defendants of negligently and fraudulently managing the plaintiff's $1 million investment. The case, assigned to U.S. District Judge Vernon S. Broderick, is 1:24-cv-09918, Goldeneye Advisors, LLC v. Hanaco Venture Capital, Ltd. et al.
Who Got The Work
Attorneys from A&O Shearman has stepped in as defense counsel for Toronto-Dominion Bank and other defendants in a pending securities class action. The suit, filed Dec. 11 in New York Southern District Court by Bleichmar Fonti & Auld, accuses the defendants of concealing the bank's 'pervasive' deficiencies in regards to its compliance with the Bank Secrecy Act and the quality of its anti-money laundering controls. The case, assigned to U.S. District Judge Arun Subramanian, is 1:24-cv-09445, Gonzalez v. The Toronto-Dominion Bank et al.
Who Got The Work
Crown Castle International, a Pennsylvania company providing shared communications infrastructure, has turned to Luke D. Wolf of Gordon Rees Scully Mansukhani to fend off a pending breach-of-contract lawsuit. The court action, filed Nov. 25 in Michigan Eastern District Court by Hooper Hathaway PC on behalf of The Town Residences LLC, accuses Crown Castle of failing to transfer approximately $30,000 in utility payments from T-Mobile in breach of a roof-top lease and assignment agreement. The case, assigned to U.S. District Judge Susan K. Declercq, is 2:24-cv-13131, The Town Residences LLC v. T-Mobile US, Inc. et al.
Who Got The Work
Wilfred P. Coronato and Daniel M. Schwartz of McCarter & English have stepped in as defense counsel to Electrolux Home Products Inc. in a pending product liability lawsuit. The court action, filed Nov. 26 in New York Eastern District Court by Poulos Lopiccolo PC and Nagel Rice LLP on behalf of David Stern, alleges that the defendant's refrigerators’ drawers and shelving repeatedly break and fall apart within months after purchase. The case, assigned to U.S. District Judge Joan M. Azrack, is 2:24-cv-08204, Stern v. Electrolux Home Products, Inc.
Featured Firms
Law Offices of Gary Martin Hays & Associates, P.C.
(470) 294-1674
Law Offices of Mark E. Salomone
(857) 444-6468
Smith & Hassler
(713) 739-1250