Note that FBI Director James Comey was specifically chosen by Barack Obama, and the President’s behavior to this point has indicated a strong bias toward the position that, “You don’t need to worry about privacy if you have nothing to hide.”
Thus I see Comey’s request for sabotaging the security of computers and mobile devices by requiring back doors to be a position explicitly supported by the whole administration, and as the saying goes, the Cossacks work for the Czar:
FBI Director James Comey has launched a new “crypto war” by asking Congress to update a two-decade-old law to make sure officials can access information from people’s cellphones and other communication devices.
The call is expected to trigger a major Capitol Hill fight about whether or not tech companies need to give the government access to their users’ data.
“It’s going to be a tough fight for sure,” Rep. James Sensenbrenner (R-Wis.), the Patriot Act’s original author, told The Hill in a statement.
He argues Apple and other companies are taking the privacy of consumers into their own hands because Congress has failed to pass legislation in response to public anger over the National Security Agency’s surveillance programs.
“While Director Comey says the pendulum has swung too far toward privacy and away from law enforcement, he fails to acknowledge that Congress has yet to pass any significant privacy reforms,” he added. “Because of this failure, businesses have taken matters into their own hands to protect their consumers and their bottom lines.”
“If this becomes the norm, I suggest to you that homicide cases could be stalled, suspects walked free, child exploitation not discovered and prosecuted,” he said last week.
Comey is asking that Congress update the Communications Assistance for Law Enforcement Act (CALEA), a 1994 law that required telephone companies to make it possible for federal officials to wiretap their users’ phone calls.
It’s a back door, much like the infamous Clipper chip, and the greatest effect of such a change would be to allow cyber-criminals to access your data, your machines, and your identity, because if they cripple security in the interest of law enforcement, criminals will avail themselves to the same technology.