FTC CTO: Full Disk Encryption Is Important In Preventing Crime

from the taking-a-stand dept

While the FBI and NSA continue their campaign to fight against allowing encryption for devices, it’s clear that not everyone in the government agrees. It does appear that there’s a bit of a fight going on within the administration over where to come down (as President Obama himself admitted), and in a recent blog post, it seems pretty clear where the FTC comes down in this debate. The FTC’s CTO, Ashkan Soltani, who has long been a strong user-privacy advocate (and before joining the FTC helped in some of the reporting on the Snowden documents), wrote the blog post celebrating the virtues of full disk encryption and other “end user device controls.” It starts out by noting that when he recently lost his own laptop, he wasn’t that worried, thanks to the fact that it was encrypted.

Strong end-user privacy and security controls, such as device encryption and firmware passwords, not only protect personal information from unwanted access ? they can also make it easier to recover lost or stolen devices as well.

Last month, I had the misfortune of having a personal laptop stolen.

Fortunately for me, while I was a bit bummed about losing my two-year-old laptop, I backup regularly and always enable disk encryption which is an important step to protect the information stored on the hard-disk from unwanted access by criminals, employers, or other actors (with the exception of very sophisticated adversaries).

He notes that this actually allowed him to help track down the device, because whoever ended up with the “useless” laptop tried to bring it to an Apple Genius Bar, which resulted in Soltani receiving an email.

Fast forward to a few weeks later, when I received an email to my personal account notifying me of an upcoming Apple Genius Bar visit. I was initially confused by the email but soon realized that it’s probably the thief (or the undiscerning buyer) of my laptop trying to take it into Apple for repair ? likely because they?re unable to use it without knowing the firmware password I set.

I immediately began calling local law enforcement and the nearby Apple stores notifying them of the theft and this development. After a few phone calls and the help of a fantastic Sergeant in the Local Crimes Unit of the Sacramento Police department, I was able to coordinate an agreement whereby Apple would notify law enforcement if the new user brought the machine in for repair. After an initial disappointment on account of the suspect skipping his Genius Bar reservation, a representative from Apple Customer Relations notified me that the device was brought into another store and they were coordinating with Sacramento Police Department to return it to me. I?m unclear as to whether they were able to track down the original thief.

And thus, the FTC’s CTO makes it clear that full disk encryption has benefits beyond even just keeping your own data safe:

In the end, strong end-user controls like device encryption and firmware passwords not only protect sensitive info stored on the device, they also prevent criminals from utilizing stolen property. The more devices feature strong end-user controls, the less likely thieves can profit from their theft on the open market.

Given that the FBI is supposed to be interested in preventing crime, you’d think James Comey would support that kind of thing…

Filed Under: , , , , ,

Rate this comment as insightful
Rate this comment as funny
You have rated this comment as insightful
You have rated this comment as funny
Flag this comment as abusive/trolling/spam
You have flagged this comment
The first word has already been claimed
The last word has already been claimed
Insightful Lightbulb icon Funny Laughing icon Abusive/trolling/spam Flag icon Insightful badge Lightbulb icon Funny badge Laughing icon Comments icon

Comments on “FTC CTO: Full Disk Encryption Is Important In Preventing Crime”

Subscribe: RSS Leave a comment
36 Comments
David says:

Uh, no?

Given that the FBI is supposed to be interested in preventing crime, you’d think James Comey would support that kind of thing…

That makes as much sense as “given that hack drivers are supposed to be interested in transporting people, you’d think that the Iron Gustav would have supported automobiles”.
The FBI’s job description is preventing crime (well, they recently changed it to preventing terrorism since that’s a lot less work and basically means that you can spend all your time eavesdropping rather than trying to do detective work, but let’s be conservative). So why would they want their job to be made redundant?

In particularly, if it makes it harder for them to diddle their privates while they are nosing through other people’s affairs?

Anonymous Coward says:

Given that the FBI is supposed to be interested in preventing crime,

Given that their role is investigating crime, why would they be interested in preventing it, and putting themselves out of a job. They want access to everybody’s devices, and the ability to track them so that they find more crimes to investigate and so increase their budget and manpower.

Stephen says:

Re: Full Disk Encryption is okay

Full Disk Encryption is okay…

…until your hard drive has problems and you need to recover the data from it. If the disk’s file system is intact then you or a tech guy probably can recover them–as long as you have the encryption keys. If however it is NOT intact–because, for example, your drive has suffered a head crash and corrupted the directory–forcing you to try to recover it on a block-by-block basis, then chances are you’re stuffed because each block will be gibberish, making it nightmarish to work out the block sequence for each file.

One further point: full disk encryption as a safeguard presumes you either don’t keep backups of your files or you do but those backups are also encrypted. Because if you DO keep backups and those backups are NOT encrypted then why would the thieves go for the encrypted drive when they’d do better to grab the backup files instead?

DannyB (profile) says:

Re: No more encryption?

DRM is worse than simple encryption, because I must be able to control (eg, trust) YOUR computer to do MY will. That is, to decrypt something, but make the crypto keys inaccessible to you. It’s all an exercise in obfuscation to make the barrier so high that few or no crackers will discover how to crack the encryption.

Now what arguments could be made that DRM could be used to commit crimes? If I must be able to control your computer in order for you to receive my encrypted message (or music or movie) then imagine the position that puts three letter agency snoopers in?

tqk (profile) says:

Re: Re: No more encryption?

Now what arguments could be made that DRM could be used to commit crimes?

Would that be like a large corporation which sold copies of its imaginary property and those copies came bundled with software which installed stealthily (unbeknownst to the new owner of that copy of the imaginary property and the device within which it was being used)? This behavior was not mentioned to the customer either before or after purchase time. This software is also well known to create an unsecurable security vulnerability.

Happily, some lucky (or prescient) users did not use the operating system on their devices which the corporation assumed they’d be using, so this subterfuge was discovered.

Anonymous Coward says:

"Preventing crime"

So he encrypted his laptop.

That did not prevent it from being stolen. It only prevented use of the laptop.

That’s like saying a burglar alarm prevents burglaries. NO, they do not, they only send signals that something needs to be checked.

Also like saying a fire alarm prevents fires. NO, they do not, they only send signals that something needs to be checked.

Anonymous Coward says:

Re: "Preventing crime"

It prevented the permanent loss of the laptop, prevented the thief from accessing content on the laptop, and, if deployed at a wide enough scale, would render theft of laptops undesirable because of the risk that the stolen laptop would be a fancy brick for anyone without the owner password.

tqk (profile) says:

Re: Re: "Preventing crime"

… would render theft of laptops undesirable because of the risk that the stolen laptop would be a fancy brick for anyone without the owner password.

And, could quite possibly lead to the recovery of said laptop, when it’s brought in for service, and perhaps even the arrest and prosecution of the thief. Gee, that’d almost be like crime prevention, yes?

Anonymous Coward says:

Re: "Preventing crime"

Your burglar alarm analogy is close on the secondary point, but you missed the details. If an entire neighborhood is known to have almost every house equipped with alarms, the whole neighborhood is less likely to be burglarized. If encryption becomes near ubiquitous, there will be less market for stolen electronic devices.

Anonymous Coward says:

Re: Re: Re: "Preventing crime"

I don’t see how that follows, since reformatting the disk renders the device usable again.

True, but that assumes the new possessor has the time and resources to do this. I agree, this seems like a pretty low bar, but it is not a zero cost operation. Some non-technical users probably have no valid OS install media, so they could not necessarily load a functioning OS onto the device.

Also, for non-Mac laptops, it introduces the threat that the new possessor will have to install a new version of Windows. Just the threat of having Windows 10 on a system would deter me from using it. 😉

Anonymous Coward says:

Re: Re: Re:2 "Preventing crime"

Since in this case we’re talking about a 2013 MacBook…

The EFI firmware is protected by a password, meaning that you’d need to physically remove the drive to reformat it… and the drive is likely a flash drive soldered onto the motherboard.

Next up: if the thief DOES succeed in formatting the drive, they need to re-install the OS. To do this, they need to either have a hard copy (which Apple doesn’t sell), or boot into recovery mode, where Apple requires their Apple ID and CLSID (hardware serial numbers) to download and install the OS.

Since Apple already knows which Apple ID the CLSID belongs to, that’s the ID and password they require.

In this case, a thief would really have to start by stealing the Apple ID BEFORE they stole the physical computer. And if they stole the Apple ID first, they’d have no need to steal the computer to get at the information, as they could just remote log-in to the computer and do whatever they wanted.

But either way, the hardware is protected and linked to the account. If you have the equipment to get around the protections, you’re unlikely to actually have incentive to steal the MacBook in the first place.

John Fenderson (profile) says:

Re: Re: Re:3 "Preventing crime"

I’m not familiar with the Apple BIOS. Is it impossible to clear the BIOS password using the usual methods?

What do you do if you lose your password? Does the Apple ID substitute for a password, does Apple hold the password, or does Apple have a back door?

If the answer to any of those three questions is “yes”, that’s a very good reason not to buy Apple computers.

Michael (profile) says:

Re: Re: Re: "Preventing crime"

It does add expense to the thief. Now, they not only have to steal a laptop, but they have to format the drive and install a new OS onto it so they can sell it.

While there are probably lots of sophisticated thieves out there, this could easily have an impact on those that are unable to easily perform this task (like someone stealing to support drug habits).

Also, if the sophisticated thieves do have a corporate install key of some sort, it could add another crumb to the trail of catching them if they are reformatting a bunch of stolen laptops and installing a new OS with a single product key.

It doesn’t “prevent theft”, but it adds another barrier that may help reduce it’s frequency – thus preventing some thefts.

Add Your Comment

Your email address will not be published. Required fields are marked *

Have a Techdirt Account? Sign in now. Want one? Register here

Comment Options:

Make this the or (get credits or sign in to see balance) what's this?

What's this?

Techdirt community members with Techdirt Credits can spotlight a comment as either the "First Word" or "Last Word" on a particular comment thread. Credits can be purchased at the Techdirt Insider Shop »

Follow Techdirt

Techdirt Daily Newsletter

Ctrl-Alt-Speech

A weekly news podcast from
Mike Masnick & Ben Whitelaw

Subscribe now to Ctrl-Alt-Speech »
Techdirt Deals
Techdirt Insider Discord
The latest chatter on the Techdirt Insider Discord channel...
Loading...