Skip to Content

White House and Department of Homeland Security Want a Way Around Encryption

The secretary for homeland security and the president’s cybersecurity advisor echo the NSA and FBI’s concerns about encryption.
April 22, 2015

The White House and U.S. Department of Homeland Security officials support arguments by the nation’s law enforcement and intelligence leaders that encryption technology should be restricted or modified to make it easier for the government to access private data.

Speaking at the world’s largest computer security event, the RSA conference, Jeh Johnson—the U.S. secretary for Homeland Security—said that strong encryption was hampering law enforcement and that workarounds were needed. At the same event, President Obama’s cybersecurity coӧrdinator said that the White House was looking into what methods could be required in encryption technology to give law enforcement and other agencies a way in.

The remarks come after FBI director James Comey called last year for unlocking mechanisms for systems like those that automatically encrypt data on Apple smartphones. Just last week, National Security Agency head Michael Rogers sketched out a system where companies would have to hand over encryption keys to his agency and others in government.

In a keynote speech at the RSA conference, Johnson cautioned the computer industry against widening the use of strong encryption. He likened the situation to a world in which the telephone had been introduced without an accompanying mechanism for law enforcement and intelligence agencies to tap phone calls. “Our inability to access encrypted information poses public safety challenges,” he said. “Encryption is making it harder for your government to find criminal activity.”

Johnson did not recommend specific technical solutions, but made it clear that he felt the government should have a way to circumvent or unwind encryption. He appealed to the computer network and security professionals in the audience to consider how it might be done. “We need your help to find a solution,” he said.

Johnson’s keynote came directly after an onstage discussion between several well-known cryptographers, including Ron Rivest, Adi Shamir, and Whitfield Diffie, who between them invented many of the methods and algorithms that have become the most commonly used way to protect online data. All warned that the idea of building government access methods into encryption systems is flawed.

“There’s lots of problems with this idea,” said Rivest, an MIT professor of electrical engineering and computer science who helped create the RSA encryption algorithm used to secure encrypted Web pages and Internet traffic. He and many other cryptography experts have previously warned that a “backdoor” in an encryption system created for the U.S. government could be discovered and used by others.

Rivest also argued that if the U.S required such a system, other countries would impose similar mandates. “Once the U.S. government has a door into your private data, it’s not just going to be the U.S. government that wants that, it’s going to be the U.K., Germany, China, and so on,” he said. “This is going to be a house with many, many doors with keys held by many, many parties.”

President Obama’s cybersecurity coӧrdinator Michael Daniel acknowledged those concerns at a meeting with reporters Tuesday afternoon. But he said that the White House was nonetheless investigating policies and technical measures that would give the government access to encrypted data, at the request of President Obama.

“If you have some way to have access in there, you have a vulnerability in the system,” conceded Daniel. “The question is can you do that in a way where the benefit outweighs the cost.” The White House is not yet committed to a policy either way, but encryption poses a definite challenge to national security and law enforcement agencies, he said.

When the White House might decide on a policy is unclear. “It’s going to take some time to work through this,” said Daniel.

Keep Reading

Most Popular

computation concept
computation concept

How AI is reinventing what computers are

Three key ways artificial intelligence is changing what it means to compute.

still from Embodied Intelligence video
still from Embodied Intelligence video

These weird virtual creatures evolve their bodies to solve problems

They show how intelligence and body plans are closely linked—and could unlock AI for robots.

seeing is believing concept
seeing is believing concept

Our brains exist in a state of “controlled hallucination”

Three new books lay bare the weirdness of how our brains process the world around us.

We reviewed three at-home covid tests. The results were mixed.

Over-the-counter coronavirus tests are finally available in the US. Some are more accurate and easier to use than others.

Stay connected

Illustration by Rose WongIllustration by Rose Wong

Get the latest updates from
MIT Technology Review

Discover special offers, top stories, upcoming events, and more.

Thank you for submitting your email!

Explore more newsletters

It looks like something went wrong.

We’re having trouble saving your preferences. Try refreshing this page and updating them one more time. If you continue to get this message, reach out to us at with a list of newsletters you’d like to receive.