{"id":113412,"date":"2020-03-19T12:30:15","date_gmt":"2020-03-19T16:30:15","guid":{"rendered":"http:\/\/rbach.net\/?p=113412"},"modified":"2022-10-22T12:01:10","modified_gmt":"2022-10-22T16:01:10","slug":"covid-cover-for-power-grab-to-end-encryption","status":"publish","type":"post","link":"https:\/\/rbach.net\/index.php\/covid-cover-for-power-grab-to-end-encryption\/","title":{"rendered":"COVID Cover for Power Grab to End Encryption"},"content":{"rendered":"<p><a href=\"https:\/\/www.msnbc.com\/rachel-maddow-show\/lindsey-graham-abandons-pretense-independent-judiciary-n1217716\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-114753\" title=\"COVID Cover for Power Grab to End Encryption\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/grahm_trump.jpg?resize=100%2C76&#038;ssl=1\" alt=\"COVID Cover for Power Grab to End Encryption\" width=\"100\" height=\"76\" \/><\/a>Just in time for Independence day. Republican Senator Lindsey Graham (SC) led the U.S. Senate <a href=\"https:\/\/www.theverge.com\/2020\/7\/2\/21311464\/earn-it-act-section-230-child-abuse-imagery-facebook-youtube-lindsey-graham\" target=\"_blank\" rel=\"noopener noreferrer\">to approve the EARN IT Act<\/a>. The bill could end encryption and free speech as we know it, online. The <a href=\"https:\/\/www.eff.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">EFF<\/a> explains&#8230;<\/p>\n<p style=\"text-align: justify; padding-left: 30px;\"><em>The bill will create a new government commission, dominated by law enforcement agencies, and give it unprecedented power over websites both large and small. Attorney General Bill Barr and the DOJ have demanded for years that messaging services give the government special access to users\u2019 private messages. If EARN IT passes, Barr will finally get his wish\u2014law enforcement agencies will be able to scan every message sent online. The EARN IT Act (S. 3398) is anti-speech, anti-security, and unnecessary.<\/em><\/p>\n<p>The legislation is intentionally vague. The legislation gives this new commission unprecedented power. It can demand websites share nearly any information or do nearly anything it wants. <strong>It effectively makes encryption and protecting your privacy illegal.<\/strong><\/p>\n<h3 style=\"text-align: center;\">Do something this Fourth of July!<\/h3>\n<p><strong>1. \u00a0<\/strong><a href=\"https:\/\/u1584542.ct.sendgrid.net\/ss\/c\/P8Elou2Rvc0qoMPEUZrMXcOpy_XqN4R2ZGjoK-5zZnlJNfCXTn1dzJ3z-aPOVkjlHvqIdanlOvs3o9niyNGQUutwVEY-YKOr1mGGwMdgYD8jHjAdy6cLG7UKMMXDa9UBo6WUzMERhY1k4bX3QaomaZAIpmyC_FGUKxbMEiYAaqNr7ZQFJn3XUEZ_NM0kZIy6fOco8Qwlp5lYX0LFqgRSgvjyH8znVpgk58I1Un7h8TKgV7T_tGt7wMMQV5_NF4ePAkKw_OfBluvWhDPpMt5WvVWuUkLWpMAVL1YclvaxyrtRRVQ8G-7ppKhYx1YPD1MpbPemcVgnL8DwzXImq6LXhg\/334\/HWmGqV0SQhWROxh6NP-YIA\/h3\/yrG31CYAZFsBK4ed6r3qLioHmrlDbrvDSqTKo47rbic\" target=\"_blank\" rel=\"noopener noreferrer\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=https:\/\/u1584542.ct.sendgrid.net\/ss\/c\/P8Elou2Rvc0qoMPEUZrMXcOpy_XqN4R2ZGjoK-5zZnlJNfCXTn1dzJ3z-aPOVkjlHvqIdanlOvs3o9niyNGQUutwVEY-YKOr1mGGwMdgYD8jHjAdy6cLG7UKMMXDa9UBo6WUzMERhY1k4bX3QaomaZAIpmyC_FGUKxbMEiYAaqNr7ZQFJn3XUEZ_NM0kZIy6fOco8Qwlp5lYX0LFqgRSgvjyH8znVpgk58I1Un7h8TKgV7T_tGt7wMMQV5_NF4ePAkKw_OfBluvWhDPpMt5WvVWuUkLWpMAVL1YclvaxyrtRRVQ8G-7ppKhYx1YPD1MpbPemcVgnL8DwzXImq6LXhg\/334\/HWmGqV0SQhWROxh6NP-YIA\/h3\/yrG31CYAZFsBK4ed6r3qLioHmrlDbrvDSqTKo47rbic&amp;source=gmail&amp;ust=1593818970707000&amp;usg=AFQjCNHtT5aWQgw4-V5mIk5Z19Yx2xV1Kg\">Sign the Action Network petition to tell Congress<\/a>. \u201c<strong>Don\u2019t kill online encryption! Reject the dangerous EARN IT Act.<\/strong>\u201d<\/p>\n<p><strong>2. \u00a0<\/strong>Call 1 (813) 213-3989. You&#8217;ll be connected to your members of Congress so you can tell them. <strong>Vote NO on the EARN IT Act, and any attempt to spy on our digital communications.<\/strong><\/p>\n<p style=\"text-align: center;\">&#8212;<\/p>\n<p><a href=\"https:\/\/stopthecap.com\/2015\/07\/22\/wall-street-analyst-tells-congress-broadband-needs-to-be-more-than-just-profitable-to-spur-investment\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-113446\" title=\"COVID Cover for Power Grab\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/greedy-6.jpg?resize=90%2C80&#038;ssl=1\" alt=\"COVID Cover for Power Grab\" width=\"90\" height=\"80\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/greedy-6.jpg?resize=150%2C133&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/greedy-6.jpg?resize=75%2C67&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/greedy-6.jpg?w=490&amp;ssl=1 490w\" sizes=\"auto, (max-width: 90px) 100vw, 90px\" \/><\/a>In the midst of America closing up shop in fear over the <strong>COVID-19 pandemic<\/strong>, the <a href=\"https:\/\/www.politico.com\/news\/2020\/03\/12\/mitch-mcconnell-delays-senate-recess-127344\" target=\"_blank\" rel=\"noopener noreferrer\">U.S. government is not shutting down<\/a>. Why? Perhaps they figure that most of us are too preoccupied with toilet paper hoarding and missing March madness. They figure they can <strong>sneak in additional restrictions on our freedoms<\/strong>.<\/p>\n<p><a href=\"https:\/\/dissidentvoice.org\/2018\/04\/greater-of-two-evils-why-the-democratic-party-is-worse-than-the-republican-party-for-85-of-the-u-s-population\/wolves-in-sheep-clothing\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-113448\" title=\"Government plan to destroy online free speech and security\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/wolves-in-sheep-clothing.jpg?resize=100%2C84&#038;ssl=1\" alt=\"Government plan to destroy online free speech and security\" width=\"100\" height=\"84\" \/><\/a><a href=\"https:\/\/www.theverge.com\/authors\/casey-newton\" target=\"_blank\" rel=\"noopener noreferrer\">Casey Newton<\/a> at <em><a href=\"https:\/\/www.theverge.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">the Verge<\/a><\/em> is <a href=\"https:\/\/www.theverge.com\/interface\/2020\/3\/12\/21174815\/earn-it-act-encryption-killer-lindsay-graham-match-group\" target=\"_blank\" rel=\"noopener noreferrer\">tracking<\/a> the <strong><a href=\"https:\/\/www.judiciary.senate.gov\/press\/rep\/releases\/graham-blumenthal-hawley-feinstein-introduce-earn-it-act-to-encourage-tech-industry-to-take-online-child-sexual-exploitation-seriously\" target=\"_blank\" rel=\"noopener noreferrer\">Eliminating Abusive and Rampant Neglect of Interactive Technologies<\/a><\/strong> (\u201cEARN IT\u201d) Act EARN IT Act (<a href=\"https:\/\/assets.bwbx.io\/documents\/users\/iqjWHBFdfxIU\/rUwvwv0X.db8\/v0\" target=\"_blank\" rel=\"noopener noreferrer\">S. 3398<\/a>). The EARN IT BILL was the subject of a Senate hearing on 03\/12\/2020. The EARN IT Act was introduced by the <a href=\"https:\/\/web.archive.org\/web\/20200326212226\/https:\/\/time.com\/5802088\/lindsey-graham-self-quarantine-mar-a-lago\/\" target=\"_blank\" rel=\"noopener noreferrer\">self-quarantined<\/a> Trump supporter, Republican Sen. <strong><a href=\"https:\/\/www.lgraham.senate.gov\/public\/\" target=\"_blank\" rel=\"noopener noreferrer\">Lindsey Graham<\/a><\/strong>. The premise of the bill is that technology companies have to earn <a href=\"https:\/\/www.law.cornell.edu\/uscode\/text\/47\/230\" target=\"_blank\" rel=\"noopener noreferrer\">Section 230 protections<\/a>. This changes decades of precedent. The bill says tech firms have to earn Section 230 protections by complying with the politicians. Rather than being granted immunity by default by the <strong>Communications Decency Act.<\/strong><\/p>\n<h3>EARN IT Act designed to\u00a0hobble encryption<\/h3>\n<p><a href=\"https:\/\/www.cnet.com\/news\/why-your-privacy-could-be-threatened-by-a-bill-to-protect-children\/\" target=\"_blank\" rel=\"noopener noreferrer\">Experts<\/a> believe that the bill is the latest effort by the government to <strong>destroy online free speech and security.<\/strong> It is designed to\u00a0<strong>hobble encryption<\/strong> in the guise of child protection. Today, it is disguised as &#8220;<strong>Lawful access<\/strong>&#8221; in the U.S. government&#8217;s latest push against <strong>end-to-end encryption<\/strong>.\u00a0<a href=\"https:\/\/www.cnet.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><em>CNet<\/em><\/a> <a href=\"https:\/\/www.cnet.com\/news\/why-your-privacy-could-be-threatened-by-a-bill-to-protect-children\/\" target=\"_blank\" rel=\"noopener noreferrer\">defines<\/a> end-to-end encryption as a security technology that encodes your sensitive data. Data like passwords and financial and health information stored on your devices.<strong> Encryption protects your data from being viewed by employees of the company providing the service, and governments looking to spy on citizens<\/strong>.<\/p>\n<p><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright size-medium wp-image-113449\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Data_Encryption-2.gif?resize=150%2C85&#038;ssl=1\" alt=\"\" width=\"150\" height=\"85\" \/>The bill calls for tech companies to create an opening in their own encryption. An opening that only law enforcement agencies could use for investigations. <strong>The Feds have a long history of attacking encryption online<\/strong>. <em>CNet<\/em> explains that In 2017, the Justice Department called it &#8220;responsible encryption.&#8221; The feds wanted tech firms to provide encryption for everyone. But only if they hand over a special key that governments could use to snoop on communications. The FBI calls it the &#8220;<strong>Going Dark<\/strong>&#8221; problem. They claim investigations can hit a dead end because of encryption. Prosecutors have asked for <strong>backdoors to encryption<\/strong>. The Justice Department has called it &#8220;warrant-proof encryption.&#8221; The DoJ argues that encryption hinders law enforcement from keeping track of criminals or gathering evidence.<\/p>\n<h3>Protections under the First Amendment<\/h3>\n<p>Mr. Newton points out that it\u2019s not clear that companies have to \u201cearn\u201d what are already <strong>protections provided under the <a href=\"https:\/\/www.law.cornell.edu\/constitution\/first_amendment\" target=\"_blank\" rel=\"noopener noreferrer\">First Amendment<\/a><\/strong> to publish and to allow their users to publish, with very few legal restrictions. But if the EARN IT Act were passed, tech companies could be held liable if their users posted illegal content. This would represent a significant and potentially devastating amendment to Section 230, a much-misunderstood law that is considered a <strong>pillar of the internet and the <a href=\"https:\/\/www.emarketer.com\/content\/global-ecommerce-2019\" target=\"_blank\" rel=\"noopener noreferrer\">$26 Trillion businesses<\/a> that operate on top of it<\/strong>.<\/p>\n<p><a href=\"https:\/\/publicdomainvectors.org\/en\/free-clipart\/FBI-agent-vector-clip-art\/7208.html\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-113450\" title=\"bureaucratic set of best practices\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Gman-1.png?resize=95%2C87&#038;ssl=1\" alt=\"bureaucratic set of best practices\" width=\"95\" height=\"87\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Gman-1.png?resize=150%2C138&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Gman-1.png?resize=75%2C69&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Gman-1.png?resize=768%2C705&amp;ssl=1 768w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Gman-1.png?w=958&amp;ssl=1 958w\" sizes=\"auto, (max-width: 95px) 100vw, 95px\" \/><\/a>The EARN IT Act would require tech firms to <strong>adhere to a bureaucratic set of &#8220;best practices.&#8221;<\/strong> The &#8220;best practices&#8221; would drawn up by a newly created national commission. They would have to be approved by the <strong>attorney general<\/strong>, <strong>homeland security<\/strong>, and the chairman of the FTC.<\/p>\n<p>One of the <strong>&#8220;best practices&#8221; could be eliminating end-to-end encryption. <\/strong>That would deprive the world of a secure communications tool at a time when <a href=\"https:\/\/www.businessinsider.com\/economist-intelligence-unit-2017-democracy-index-worst-countries-2018-1?op=1\" target=\"_blank\" rel=\"noopener noreferrer\">authoritarian governments<\/a> are surging around the world. If the tech firms failed to eliminate end-to-end encryption, they could lose legal protection under <a href=\"https:\/\/web.archive.org\/web\/20231209211701\/https:\/\/www.protocol.com\/section-230-guide-under-siege\" target=\"_self\" rel=\"noopener noreferrer\">Section 230<\/a>.<\/p>\n<h3>Graham plan to weaken encryption<\/h3>\n<p>There is little doubt they plan to weaken encryption. Graham, says:<\/p>\n<p style=\"text-align: justify; padding-left: 30px;\"><em>Facebook is talking about end-to-end encryption which means they go blind &#8230; We\u2019re not going to go blind and let this abuse go forward in the name of any other freedom.<\/em><\/p>\n<p>Berin Szoka, president of think tank <a href=\"https:\/\/techfreedom.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">TechFreedom<\/a> <a href=\"https:\/\/www.bloomberg.com\/news\/articles\/2020-01-30\/lindsey-graham-proposal-could-expose-apple-facebook-to-lawsuits\" target=\"_blank\" rel=\"noopener noreferrer\">said<\/a>,<\/p>\n<p style=\"text-align: justify; padding-left: 30px;\"><em>DOJ could effectively ban end-to-end encryption.<\/em><\/p>\n<h3>Encryption backdoor<\/h3>\n<p>The problem with lawful access, is that the <strong>backdoor<\/strong> or key created for governments would essentially <strong>create an opening for everyone<\/strong>. The Feds have already proven <strong>they can&#8217;t keep their secrets secret<\/strong> &#8211; <a href=\"https:\/\/hothardware.com\/news\/eternalblue-hack-in-the-wild\" target=\"_blank\" rel=\"noopener noreferrer\">as EternalBlue<\/a> <a href=\"https:\/\/nakedsecurity.sophos.com\/2018\/05\/17\/cias-vault-7-mega-leak-was-an-inside-job-claims-fbi\/\" target=\"_blank\" rel=\"noopener noreferrer\">Vault7<\/a> and <a href=\"https:\/\/www.bbc.com\/news\/world-us-canada-23123964\" target=\"_blank\" rel=\"noopener noreferrer\">Snowden<\/a> have proved.<a href=\"https:\/\/web.archive.org\/web\/20201016235647\/https:\/\/sites.google.com\/site\/ddmwsst\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-113455\" title=\"Government backdoor would create an opening for everyone\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/vpn_attack-4.png?resize=298%2C191&#038;ssl=1\" alt=\"Government backdoor would create an opening for everyone\" width=\"298\" height=\"191\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/vpn_attack-4.png?resize=150%2C96&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/vpn_attack-4.png?resize=75%2C48&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/vpn_attack-4.png?w=171&amp;ssl=1 171w\" sizes=\"auto, (max-width: 298px) 100vw, 298px\" \/><\/a><\/p>\n<p><a href=\"https:\/\/web.archive.org\/web\/20240415214827\/https:\/\/www.sophos.com\/en-us\" target=\"_blank\" rel=\"noopener noreferrer\">Sophos<\/a> <a href=\"https:\/\/nakedsecurity.sophos.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Naked Security blog<\/a> <a href=\"https:\/\/nakedsecurity.sophos.com\/2020\/03\/13\/earn-it-act-threatens-end-to-end-encryption\/\" target=\"_blank\" rel=\"noopener noreferrer\">spoke<\/a> to <a href=\"https:\/\/web.archive.org\/web\/20220516082054\/https:\/\/cyberlaw.stanford.edu\/about\/people\/riana-pfefferkorn\" target=\"_blank\" rel=\"noopener noreferrer\">Riana Pfefferkorn<\/a>, Associate Director of Surveillance and Cybersecurity from The <a href=\"https:\/\/cyberlaw.stanford.edu\/\" target=\"_blank\" rel=\"noopener noreferrer\">Center for Internet and Society<\/a> at <a href=\"https:\/\/law.stanford.edu\/\" target=\"_blank\" rel=\"noopener noreferrer\">Stanford Law School<\/a> about EARN IT. Her <a href=\"https:\/\/web.archive.org\/web\/20220412225414\/http:\/\/cyberlaw.stanford.edu\/blog\/2020\/03\/earn-it-act-unconstitutional-fourth-amendment\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">analysis<\/a> says the proposed bill containing <strong>no tools to actually stop online child abuse<\/strong>. The bill would actually <strong>make it much harder to prosecute pedophiles. <\/strong>She explained that as it now stands, online providers including <a href=\"https:\/\/nakedsecurity.sophos.com\/2020\/01\/09\/apples-scanning-icloud-photos-for-child-abuse-images\/\">Apple<\/a>, <a href=\"https:\/\/nakedsecurity.sophos.com\/2018\/10\/26\/facebooks-stopped-8-7m-nude-images-of-children-in-3-months\/\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a> and <a href=\"https:\/\/nakedsecurity.sophos.com\/2018\/09\/05\/google-releases-free-ai-tool-to-stamp-out-child-sexual-abuse-material\/\" target=\"_blank\" rel=\"noopener noreferrer\">Google<\/a> proactively, and voluntarily, scan for child abuse images.<\/p>\n<p><a href=\"http:\/\/www.bcso-ma.us\/civilprocess.htm\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-113452\" title=\"protections against unreasonable search to get warrants before they search our digital content\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/supeona_served-1-e1584572842237-101x150.jpg?resize=74%2C110&#038;ssl=1\" alt=\"protections against unreasonable search to get warrants before they search our digital content\" width=\"74\" height=\"110\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/supeona_served-1-e1584572842237.jpg?resize=101%2C150&amp;ssl=1 101w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/supeona_served-1-e1584572842237.jpg?resize=50%2C75&amp;ssl=1 50w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/supeona_served-1-e1584572842237.jpg?w=250&amp;ssl=1 250w\" sizes=\"auto, (max-width: 74px) 100vw, 74px\" \/><\/a>The keyword is \u201cvoluntarily,\u201d Ms. Pfefferkorn says. Those platforms are all private companies, as opposed to government agencies, which are required by <strong>Fourth Amendment<\/strong> protections against unreasonable search to <strong>get warrants<\/strong> before they search our digital content.<\/p>\n<p style=\"text-align: justify; padding-left: 30px;\"><em>The reason that private companies like Facebook can, and do, do exactly that is that they are not the government, they\u2019re private actors, so the Fourth Amendment doesn\u2019t apply to them.<\/em><\/p>\n<h3>Agents of the state<\/h3>\n<p>Turning the private companies that provide those communications into \u201c<strong>agents of the state<\/strong>\u201d would, ironically, result in courts\u2019 suppression of evidence of the child sexual exploitation crimes targeted by the bill, she said.<\/p>\n<p style=\"text-align: justify; padding-left: 30px;\"><em>That means the EARN IT Act would backfire for its core purpose, while violating the constitutional rights of online service providers and users alike.<\/em><\/p>\n<p><em><strong>rb-<\/strong><\/em><\/p>\n<p><em><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-113453\" title=\" Department of Defense has explained that it depends on encryption\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/encrypt-2.jpg?resize=95%2C87&#038;ssl=1\" alt=\" Department of Defense has explained that it depends on encryption\" width=\"95\" height=\"87\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/encrypt-2.jpg?resize=150%2C138&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/encrypt-2.jpg?resize=75%2C69&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/encrypt-2.jpg?w=337&amp;ssl=1 337w\" sizes=\"auto, (max-width: 95px) 100vw, 95px\" \/>The U.S. <a href=\"https:\/\/www.defense.gov\" target=\"_blank\" rel=\"noopener noreferrer\">Department of Defense<\/a> has explained that it <a href=\"https:\/\/www.techdirt.com\/articles\/20191210\/06355643539\/defense-department-to-congress-no-wait-encryption-is-actually-good-dont-break-it.shtml\" target=\"_blank\" rel=\"noopener noreferrer\">depends on encryptio<\/a>n to protect its employees and sensitive data.<\/em><\/p>\n<p><em><a href=\"https:\/\/www.wyden.senate.gov\/\" target=\"_blank\" rel=\"noopener noreferrer\">Senator Ron Wyden<\/a>, a Democrat from Oregon criticized the bill for its potential effects on encryption.<\/em><\/p>\n<p style=\"text-align: justify; padding-left: 30px;\"><em>This bill is a transparent and deeply cynical effort by a few well-connected corporations and the Trump administration to use child sexual abuse to their political advantage, the impact to free speech and the security and privacy of every single American be damned.<\/em><\/p>\n<p><em>I am not a fan of Facebook, but they do provide millions of reports to the <a href=\"https:\/\/en.wikipedia.org\/wiki\/National_Center_for_Missing_%26_Exploited_Children\" target=\"_blank\" rel=\"noopener noreferrer\">National Center for Missing &amp; Exploited Children<\/a> every year. Sadly the amount of action taken by the Feds isn&#8217;t quite the same. It is due to a <strong>lack of resources and funding from the federal government<\/strong>, according to a <a href=\"https:\/\/www.nytimes.com\/interactive\/2019\/09\/28\/us\/child-sex-abuse.html\" target=\"_blank\" rel=\"noopener noreferrer\">New York Times report<\/a>.<\/em><\/p>\n<p><em>A better way to address the issue would be to <strong>give law enforcement more resources<\/strong>. Sen. Wyden argues that the EARN IT Act is a distraction from the Justice Department&#8217;s lack of funding and resources to handle online child exploitation.<\/em><\/p>\n<p><strong>Related article<\/strong><\/p>\n<ul>\n<li><a href=\"https:\/\/web.archive.org\/web\/20200625114002\/https:\/\/act.eff.org\/action\/protect-our-speech-and-security-online-reject-the-graham-blumenthal-bill\" target=\"_blank\" rel=\"noopener noreferrer\">Protect our Speech and Security Online: Reject the Graham-Blumenthal Bill<\/a>\u00a0(<a href=\"https:\/\/act.eff.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">EFF<\/a>)<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><em><a title=\"Ralph Bach\" href=\"https:\/\/rbach.net\/index.php\/new-resume\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ralph Bach<\/a>\u00a0has been in IT long enough to know better and has blogged from his\u00a0<a title=\"Bach Seat\" href=\"https:\/\/rbach.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bach Seat<\/a> about IT, careers, and anything else that catches his attention since 2005. You can follow him on <a class=\"broken_link\" href=\"http:\/\/www.linkedin.com\/in\/rb48334\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">LinkedIn<\/a>,\u00a0<a href=\"https:\/\/www.facebook.com\/ralph.bach.14\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>,\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/rbach48334\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>. Email the Bach Seat\u00a0<a href=\"mailto:\/\/bach.seat@gmail.com\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Politicians are taking another run at breaking encryption in EARN IT act &#8211; contact your senators and rep in DC and say NO<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[45],"tags":[3397,3419,3424,2670,266,824,3425,3248,45,3053],"class_list":["post-113412","post","type-post","status-publish","format-standard","hentry","category-politics","tag-3397","tag-covid-19","tag-earn-it","tag-ecommerace","tag-eff","tag-encryption","tag-first-amendment","tag-fourth-amendment","tag-politics","tag-ron-wyden"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/113412","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/comments?post=113412"}],"version-history":[{"count":33,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/113412\/revisions"}],"predecessor-version":[{"id":132439,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/113412\/revisions\/132439"}],"wp:attachment":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/media?parent=113412"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/categories?post=113412"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/tags?post=113412"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}