Court Orders Act of 2016 (CCOA)

“This draft bill is the most ludicrous, dangerous, technically illiterate tech policy proposal of the 21st century so far.” – Kevin Bankston, director of New America’s Open Technology Institute.1

Last week, privacy advocates and security experts widely denounced draft encryption legislation leaked to The Hill newspaper as a radical assault on privacy that would make the American people less safe.2, 3

The Compliance with Court Orders Act of 2016 (CCOA) would undermine Americans’ privacy, make encryption illegal and force companies to weaken the security of their products and services. We need to make sure this dangerous legislation doesn’t gain any traction in Congress.

Sign the petition: Stop the Burr-Feinstein attack on privacy and security. Click here to sign the petition.

The CCOA, which is being drafted by Senate Intelligence Committee Chair Richard Burr (R-AL) and Ranking Member Dianne Feinstein (D-CA), is bad policy for a number of reasons. It would:

  • Make end-to-end encryption illegal by requiring companies to provide “information or data” to the government “in an intelligible format” anytime they are served with a court order. It would also require companies to decrypt secure communications “in a timely manner” or give technical assistance to law enforcement agencies attempting to do so. As Sen. Ron Wyden said in a statement, “for the first time in America, companies who want to provide their customers with stronger security would not have that choice – they would be required to decide how to weaken their products to make you less safe.”4
  • Undermine Americans’ privacy by increasing the risk that their private information and information entrusted to businesses is accessed by criminals, hackers and government entities, both domestically and abroad.
  • Make American technology companies less competitive by making it illegal for them to offer secure communications protected by end-to-end encryption, which is currently relied upon by Google, Apple, Facebook, WhatsApp and countless other companies.6 Foreign companies would not be bound by this constraint. As the executive director of a trade group that represents thousands of app developers put it, “the senators might as well take a hatchet to the entire Internet economy.”7
  • Force platforms to censor applications by requiring license distributors to ensure that all “products, services, applications or software” they distribute are able to provide the content of communications to law enforcement agencies “in an intelligible format.” This would put Apple, Google and any other company that operates a platform for software applications in the untenable position of vetting every app to make sure they aren’t secure, and censoring those that are secure.8

Tell Congress: Reject legislation that would undermine our privacy and security. Click here to sign the petition.

As we saw with the FBI’s recent attempt to force Apple to create a backdoor to access San Bernardino shooter Syed Farook’s iPhone, law enforcement agencies are determined to undermine Americans’ privacy and security, and gain access to encrypted communications. The Obama administration’s sudden reversal in that case in March – which came only after it said a third party had helped it access the content of the phone without Apple’s help – doesn’t change its desire to force companies to weaken the security of their own products. Indeed, in an April 8 letter to a district court judge presiding over a separate case, the Department of Justice maintained that “the government continues to require Apple’s assistance in accessing the data that it is authorized to search by warrant.”9

As this debate continues to play out over the coming weeks and months, we need to forcefully reject the dangerous language in the draft Burr-Feinstein bill and any other legislation that would put Americans’ privacy and security at risk by undermining encryption.

Sign the petition to Congress: Stop the Burr-Feinstein attack on privacy and security. Click here to sign the petition.

Thanks for fighting to protect our privacy and security.

Josh Nelson, Campaign Manager
CREDO Action from Working Assets

Add your name:

Sign the petition ►
  1. Anti-Encryption Bill from Senators Burr and Feinstein Would Be Disastrous for Cybersecurity, Tech Economy,” Open Technology Institute, March 31, 2016.
  2. Cory Bennett, “Senate encryption bill draft mandates ‘technical assistance’,” The Hill, April 7, 2016.
  3. Jenna McClaughlin, “Bill That Would Ban End-to-End Encryption Savaged by Critics,” The Intercept, April 8, 2016.
  4. Wyden Statement on Draft Bill Requiring Companies to Undermine Strong Encryption,” April 8. 2016.
  5. Max J. Rosenthal, “Tech and Privacy Experts Erupt Over Leaked Encryption Bill,” Mother Jones, April 8, 2016.
  6. Andy Greenberg, “The Senate’s Draft Encryption Bill Is ‘Ludicrous, Dangerous, Technically Illiterate’,” Wired, April 8 2016.
  7. Dawn Chmielewski, “The New Encryption Bill Isn’t Finished and Silicon Valley Already Hates it,” Recode, April 6, 2016.
  8. Andy Greenberg, “The Senate’s Draft Encryption Bill Is ‘Ludicrous, Dangerous, Technically Illiterate’,” Wired, April 8 2016.
  9. Julian Chokkattu, “Apple vs. U.S. isn’t over yet; Feinstein-Burr ‘encryption bill’ draft surfaces,” Digital Trends, April 8, 2016.

About arnulfo

veterano del ciberespacio
This entry was posted in Security and tagged , , , , , , , . Bookmark the permalink.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s