New! Sign up for our free email newsletter.
Science News
from research organizations

FBI approach to investigations puts security at risk, experts say

Amplifying testimony she delivered before a Senate hearing in March, Susan Landau says the FBI's approach is outdated and that the agency needs to invest more in '21st century investigative savvy'

Date:
June 16, 2016
Source:
Worcester Polytechnic Institute
Summary:
Experts say the FBI's efforts to compel Apple to write software to unlock an iPhone used by a terrorist reflects an outdated approach to law enforcement that threatens to weaken smartphones security, putting the private information of millions of people at risk and undermining the growing use of smartphones as trusted authenticators for accessing online information.
Share:
FULL STORY

In an essay to be published on June 17, 2016 in Science magazine Susan Landau, professor of cybersecurity policy at Worcester Polytechnic Institute (WPI), argues that the FBI's recent and widely publicized efforts to compel Apple Computer to write software to unlock an iPhone used by a terrorist in California reflects an outdated approach to law enforcement that threatens to weaken the security of all smartphones, potentially putting the private information of millions of smartphone users at risk and undermining the growing use of smartphones as trusted authenticators for accessing online information.

The Science essay grew out of testimony Landau delivered in March before a hearing of the U.S. House Judiciary Committee [Landau's testimony begins at 3:35:44]. In that forum, Landau countered the argument of FBI director James Comey that encrypted devices (which Comey has characterized as "warrant-proof spaces") hinder the agency's ability to investigate crimes. Landau says the FBI is looking at smartphones through a 20th century lens, a perspective that is particularly troubling given the potential for smartphones to either replace or augment static passwords as authenticators for logging into computers or accessing online accounts.

Login credentials are a favored target of hackers, Landau says, since they can provide access to valuable data and leave computer systems open to attack. More and more, companies like Facebook and Google and even some high-level government agencies are using smartphones as authenticators to make online resources significantly more difficult to breach. But for smartphone authentication to be effective, smartphones, themselves, must be secure.

Landau says the FBI's efforts to weaken smartphone security reflect its outdated approach to investigating crime and its inadequate resources for conducting modern cyber investigations. Landau argues that the agency needs to invest in building up its own "21st century investigative savvy," including creating "an investigative center with agents with deep technical understanding of modern communications technologies and computer science."

With the ability to develop new surveillance approaches and tools matched to the latest advances in communications technologies, the agency will no longer need to seek to weaken the devices that people, corporations, and government agencies worldwide depend on to securely communicate, transact business, and transmit sensitive information.


Story Source:

Materials provided by Worcester Polytechnic Institute. Note: Content may be edited for style and length.


Journal Reference:

  1. S. Landau. The real security issues of the iPhone case. Science, 2016; 352 (6292): 1398 DOI: 10.1126/science.aaf7708

Cite This Page:

Worcester Polytechnic Institute. "FBI approach to investigations puts security at risk, experts say." ScienceDaily. ScienceDaily, 16 June 2016. <www.sciencedaily.com/releases/2016/06/160616150732.htm>.
Worcester Polytechnic Institute. (2016, June 16). FBI approach to investigations puts security at risk, experts say. ScienceDaily. Retrieved March 18, 2024 from www.sciencedaily.com/releases/2016/06/160616150732.htm
Worcester Polytechnic Institute. "FBI approach to investigations puts security at risk, experts say." ScienceDaily. www.sciencedaily.com/releases/2016/06/160616150732.htm (accessed March 18, 2024).

Explore More

from ScienceDaily

RELATED STORIES