<?xml version="1.0" encoding="utf8"?>
 <!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.0 20120330//EN" "http://jats.nlm.nih.gov/publishing/1.0/JATS-journalpublishing1.dtd"> <article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" article-type="review-article" dtd-version="1.0" xml:lang="en">
  <front>
    <journal-meta>
      <journal-id journal-id-type="publisher-id">JCSR</journal-id>
      <journal-title-group>
        <journal-title>Journal of Current Scientific Research</journal-title>
      </journal-title-group>
      <issn pub-type="epub">2766-8681</issn>
      <publisher>
        <publisher-name>Open Access Pub</publisher-name>
        <publisher-loc>United States</publisher-loc>
      </publisher>
    </journal-meta>
    <article-meta>
      <article-id pub-id-type="publisher-id">JCSR-21-3789</article-id>
      <article-id pub-id-type="doi">10.14302/issn.2766-8681.jcsr-21-3789</article-id>
      <article-categories>
        <subj-group>
          <subject>review-article</subject>
        </subj-group>
      </article-categories>
      <title-group>
        <article-title>The Battle for Backdoors and Encryption Keys </article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <name>
            <surname>Buresh</surname>
            <given-names>Donald L.</given-names>
          </name>
          <xref ref-type="aff" rid="idm1842018492">1</xref>
          <xref ref-type="aff" rid="idm1842017484">*</xref>
        </contrib>
      </contrib-group>
      <aff id="idm1842018492">
        <label>1</label>
        <addr-line>Morgan State University Cybersecurity and Policy Department</addr-line>
      </aff>
      <aff id="idm1842017484">
        <label>*</label>
        <addr-line>Corresponding Author</addr-line>
      </aff>
      <contrib-group>
        <contrib contrib-type="editor">
          <name>
            <surname>Shailendra</surname>
            <given-names>Dwivedi</given-names>
          </name>
          <xref ref-type="aff" rid="idm1842155244">1</xref>
        </contrib>
      </contrib-group>
      <aff id="idm1842155244">
        <label>1</label>
        <addr-line>OUHSC 975 NE 10th Street BRC-1407 Oklahoma City OK 73104.</addr-line>
      </aff>
      <author-notes>
        <corresp>
  Donald L. Buresh (PhD, JD, LL.M.)<addr-line>Morgan State University, Cybersecurity and Policy Department</addr-line>. <email>logansquaredon@sbcglobal.net</email></corresp>
        <fn fn-type="conflict" id="idm1849475276">
          <p>The authors have declared that no competing interests exist.</p>
        </fn>
      </author-notes>
      <pub-date pub-type="epub" iso-8601-date="2021-07-09">
        <day>09</day>
        <month>07</month>
        <year>2021</year>
      </pub-date>
      <volume>1</volume>
      <issue>3</issue>
      <fpage>13</fpage>
      <lpage>22</lpage>
      <history>
        <date date-type="received">
          <day>30</day>
          <month>03</month>
          <year>2021</year>
        </date>
        <date date-type="accepted">
          <day>06</day>
          <month>07</month>
          <year>2021</year>
        </date>
        <date date-type="online">
          <day>09</day>
          <month>07</month>
          <year>2021</year>
        </date>
      </history>
      <permissions>
        <copyright-statement>© </copyright-statement>
        <copyright-year>2021</copyright-year>
        <copyright-holder>Donald L. Buresh</copyright-holder>
        <license xlink:href="http://creativecommons.org/licenses/by/4.0/" xlink:type="simple">
          <license-p>This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.</license-p>
        </license>
      </permissions>
      <self-uri xlink:href="http://openaccesspub.org//jcsr/article/1657">This article is available from http://openaccesspub.org//jcsr/article/1657</self-uri>
      <abstract>
        <p>This paper argues that the use of backdoors in software is inherently counterproductive and leads to invasion of privacy, either by federal or state governments or by intrusive hackers. The essay outlines encryption’s nature, pointing out that a software backdoor is a secret means of ignoring data authentication. Several examples of known backdoors known to terrorists, criminals, and governments alike are highlighted. Arguments in favor and opposing backdoors are provided, where the Apple Computer, Inc. v. FBI controversy is discussed. Finally, the balancing of harms test as proposed by John Stuart Mill is introduced, where the article concludes that when balancing the opposing positions, the scale tips toward data encryption because an innocent party would suffer the most harm from the existence of a software backdoor.</p>
      </abstract>
      <kwd-group>
        <kwd>Apple Computer</kwd>
        <kwd>Inc. v. FBI</kwd>
        <kwd>Backdoors</kwd>
        <kwd>Balancing of Harms</kwd>
        <kwd>Ciphers</kwd>
        <kwd>Encryption Keys</kwd>
      </kwd-group>
      <counts>
        <fig-count count="0"/>
        <table-count count="0"/>
        <page-count count="10"/>
      </counts>
    </article-meta>
  </front>
  <body>
    <sec id="idm1841887820" sec-type="intro">
      <title>Introduction to Encryption </title>
      <p>In cryptography, encryption is a mechanism whereby a message or information is encoded to access the data, and unauthorized parties cannot obtain the data.<xref ref-type="bibr" rid="ridm1850438428">1</xref> Encryption does not prevent an individual from accessing data, but it does stop persons from getting the data’s content.<xref ref-type="bibr" rid="ridm1850443612">2</xref> With encryption, data is encrypted using a cipher.<xref ref-type="bibr" rid="ridm1850506612">3</xref> Typically, an encryption scheme employs a pseudo-random encryption key that is created by a pre-specified algorithm.<xref ref-type="bibr" rid="ridm1850448300">4</xref> Although it is logically possible to decrypt data without a key, it requires considerable technical skill that is usually beyond most people’s grasp.<xref ref-type="bibr" rid="ridm1850452476">5</xref></p>
      <p>Encryption keys can either be symmetric or asymmetric.<xref ref-type="bibr" rid="ridm1850514532">6</xref> When an encryption key is symmetric, the same key is used to encrypt and decrypt data.<xref ref-type="bibr" rid="ridm1850538436">7</xref> When an encryption key is asymmetric, one key is used to encode information, and another key is employed to decode data.<xref ref-type="bibr" rid="ridm1850548660">8</xref> The key used to encrypt data is a <italic>public key</italic>. It is available for everyone to use, whereas the key applied to decrypt information is called a <italic>private key</italic>, and only specific individuals possess this key.<xref ref-type="bibr" rid="ridm1850301356">9</xref> Diffie and Hellman first developed asymmetric keys in 1976.<xref ref-type="bibr" rid="ridm1850299700">10</xref> A popular asymmetric encryption methodology is <italic>Pretty Good Privacy</italic> (“PGP”) which Phil Zimmermann created in 1991.<xref ref-type="bibr" rid="ridm1850296820">11</xref> In 2010, the method was purchased by Symantec Corp. which updates PGP periodically.<xref ref-type="bibr" rid="ridm1850297828">12</xref></p>
      <p>Encryption has existed for thousands of years. Julius Caesar employed a rotating cylinder to form a simple substitution cipher.<xref ref-type="bibr" rid="ridm1850294876">13</xref> George Washington suggested using so-called “invisible ink” when communicating with his staff.<xref ref-type="bibr" rid="ridm1850293508">14</xref> During World War II, the Germans created an enigma machine that produced a polyalphabetic substitution cipher that changed daily.<xref ref-type="bibr" rid="ridm1850286756">15</xref> In 2007, the Computer Security Institute reported that 71 percent of firms employed encryption for some of their data transmissions, while 53 percent of companies surveyed encrypted their data held in storage.<xref ref-type="bibr" rid="ridm1850285748">16</xref></p>
      <p>Cyber-criminals have developed sophisticated attacks in response to encryption, encompassing cryptographic attacks, stolen ciphertext attacks, encryption key attacks, corporate insider attacks, data corruption attacks, data destruction attacks, and ransomware attacks.<xref ref-type="bibr" rid="ridm1850284164">17</xref> Defenses include data              fragmentation and active defense data protection technologies such as moving or mutating ciphertext, thereby ensuring that it is somewhat challenging to identify, steal, corrupt, or destroy.<xref ref-type="bibr" rid="ridm1850290140">18</xref></p>
      <p>One of the essential features of encryption is that it can be used to protect data in transit. Examples include data being transferred over the Internet, mobile telephones, wireless microphones, wireless intercom systems, Bluetooth devices, and even bank automatic teller machines.<xref ref-type="bibr" rid="ridm1850289348">19</xref> Data in transit can be intercepted, but it is pretty challenging to determine the data’s content when it is encrypted.<xref ref-type="bibr" rid="ridm1850268564">20</xref></p>
      <p>Even though data are encrypted, additional techniques are needed to verify whether a message is authentic.<xref ref-type="bibr" rid="ridm1850275188">21</xref> For example, digital signatures are used to ensure a message’s authenticity through a message authentication code (“MAC”).<xref ref-type="bibr" rid="ridm1850273532">22</xref> The issue is that a single system design error can be exploited in a successful attack.<xref ref-type="bibr" rid="ridm1850273244">23</xref> Furthermore, it sometimes happens that unencrypted information can be obtained without decrypting the data.<xref ref-type="bibr" rid="ridm1850271012">24</xref> The process employs software known as a Trojan after how Odysseus and the Greeks defeated the City of Troy in Homer’s epic poem, <italic>The Illiad</italic>.<xref ref-type="bibr" rid="ridm1850263620">25</xref> Data tampering can be avoided by employing digital signatures along with encryption.<xref ref-type="bibr" rid="ridm1850262324">26</xref></p>
    </sec>
    <sec id="idm1841859820">
      <title>What is a Backdoor?</title>
      <p>A backdoor is precisely what the word means. It is a secret method of ignoring data authentication or encryption so that the content of information can be accessed clandestinely.<xref ref-type="bibr" rid="ridm1850259948">27</xref> A backdoor can be part of a computer program; it can be a separate program or specific hardware.<xref ref-type="bibr" rid="ridm1850257500">28</xref>  One legitimate type of backdoor is where a manufacturer includes a mechanism in its software or device that allows the company to restore user passwords.<xref ref-type="bibr" rid="ridm1850259084">29</xref> A default password can also serve as a backdoor provided that a user does not alter the password.<xref ref-type="bibr" rid="ridm1850255700">30</xref></p>
      <p>Petersen and Turn first addressed computer subversion in a 1967 American Federation of Information Processing Societies (“AFIPS”) Conference paper.<xref ref-type="bibr" rid="ridm1850255052">31</xref> The authors talked about a collection of active infiltration attacks that employed “trap door” entry points into a computer system, sidestepping security and allowing seemingly carte blanche to assess data.<xref ref-type="bibr" rid="ridm1850253540">32</xref> Because of the beginning of public encryption keys, the term “trap door” yielded to the term “backdoor,” particularly in J.P. Anderson and D.J. Edwards’s work in 1979.<xref ref-type="bibr" rid="ridm1850254836">33</xref></p>
      <p>In a computer system where a user logs into a computer, a backdoor could be construed as a                hard-coded username and password.<xref ref-type="bibr" rid="ridm1850250444">34</xref> One application where this kind of backdoor has existed for years is telephone communication software.<xref ref-type="bibr" rid="ridm1850264412">35</xref> A traditional backdoor is symmetric, where anyone that discovers the backdoor can use it. In contrast, an asymmetric backdoor was pioneered by Young and Yung and can only be accessed by an individual who embeds the backdoor in a computer system.<xref ref-type="bibr" rid="ridm1850266140">36</xref> It is computationally intractable to find an asymmetric backdoor using a black-box query.<xref ref-type="bibr" rid="ridm1850229332">37</xref> This type of attack is known as            <italic>kleptography</italic>, and it can be implemented in hardware and software.<xref ref-type="bibr" rid="ridm1850243660">38</xref> A different kind of backdoor uses a compiler and a set of object-code library routines containing the back door.<xref ref-type="bibr" rid="ridm1850240996">39</xref> The backdoor becomes part of a program when it is compiled using the object-code library to form an executable program and was alluded to Thompson when he gave his Turing Award speech in 1984.<xref ref-type="bibr" rid="ridm1850241572">40</xref></p>
      <p>When a backdoor is open, it is somewhat difficult to close. One way to counter an attack using a backdoor is to rebuild the system from scratch, creating the executable code by employing a different compiler.<xref ref-type="bibr" rid="ridm1850238836">41</xref> In practice, this procedure is rarely done by end users due to their lack of computing sophistication.<xref ref-type="bibr" rid="ridm1850236892">42</xref> Better to create a clean system no matter how annoying this process may seem to be.<xref ref-type="bibr" rid="ridm1850236388">43</xref></p>
    </sec>
    <sec id="idm1841835148">
      <title>Examples of Backdoors</title>
      <p>There are a variety of known backdoors. The United States federal government has proposed that vendors create hardware backdoors so that law enforcement can access the computers and cell phones of known terrorists and other criminals.<xref ref-type="bibr" rid="ridm1850235308">44</xref> These backdoors include:</p>
      <p><italic>The Clipper Chip</italic> – This was a device designed by the National Security Agency (“NSA”) that employed a specialized chip known as <italic>Skipjack</italic> that would give law enforcement access to all encrypted data communications. The chip was introduced in 1993. It was promoted by the government as a voluntary plan but was not well received due to ideological reasons;<xref ref-type="bibr" rid="ridm1850235596">45</xref></p>
      <sec id="idm1841833564">
        <title>The Clipper Chip II </title>
        <p>This was a modification of the Clipper Chip, where it was suggested that the chip employ a 56-bit DES encryption methodology. However, in 1996, the chip failed to win business support because it was felt that 56-bit DES encryption was too weak to stop would-be hackers from successfully attacking devices that contained the chip;<xref ref-type="bibr" rid="ridm1850231708">46</xref> and</p>
      </sec>
      <sec id="idm1841831836">
        <title>Key Management Infrastructure or Clipper III </title>
        <p>This methodology focused on key management infrastructure which was based on the presumption that all public keys would possess a duly authorized certificate. This backdoor met with the same criticism that was levied at Clipper Chip II. Primarily, the proposed 56-bit DES encryption was too weak to ensure the security of an encryption key.<xref ref-type="bibr" rid="ridm1850233652">47</xref></p>
      </sec>
      <sec id="idm1841831044">
        <title>Historical Backdoors </title>
        <p>1. <italic>Back Orifice</italic> – This backdoor was created in 1998 by the Cult of the Dead Cow. It permitted Windows computers to be remotely controlled over a network;<xref ref-type="bibr" rid="ridm1850217268">48</xref></p>
        <p>2. <italic>The </italic><italic>Dual_EC_DRBG</italic> is a cryptographically secure pseudo-random number generator with a kleptographic private key backdoor that was deliberately put into the NSA’s software. This fact was publically announced in 2013;<xref ref-type="bibr" rid="ridm1850215900">49</xref></p>
        <p>3. <italic>Several unlicensed copies of WordPress plug-ins</italic> were found in March 2014 to possess several backdoors in JavaScript code;<xref ref-type="bibr" rid="ridm1850213812">50</xref></p>
        <p>4. <italic>Borland </italic><italic>Interbase</italic><italic> versions 4.0 through 6.0</italic> maintained a hard-coded backdoor that Borland software developers created. The server source code contained a compiled-in backdoor account (i.e., username: “politically” and password: “correct”) that was accessible over a network connection;<xref ref-type="bibr" rid="ridm1850213956">51</xref> and</p>
        <p>5. <italic>Juniper Networks</italic> contained a backdoor inserted in 2008 to the <italic>ScreenOS</italic> firmware from versions 6.2.0r15 to 6.2.0r18 and from versions 6.3.0r12 to 6.3.0r20. The backdoor provided a user with administrative privilege.<xref ref-type="bibr" rid="ridm1850209924">52</xref></p>
      </sec>
      <sec id="idm1841837380">
        <title>Arguments Favoring and Opposing Backdoors</title>
        <p>The first subsection discusses the               government’s arguments for installing backdoors, whereas the second subsection talks about why the industry opposes backdoors. The government’s statements are based on public safety issues. The industry urges that backdoors are either logically impossible or nullify existing security measures.</p>
      </sec>
      <sec id="idm1841836948">
        <title>Arguments Favoring Backdoors</title>
        <p>The arguments by the government in favor of technology companies implementing hardware or software backdoors are practical rather than ideological.<xref ref-type="bibr" rid="ridm1850223964">53</xref> The government argues that the federal government needs backdoors into these machines because it will make America safer by allowing law enforcement to easily capture and prosecute terrorists and other cybercriminals.<xref ref-type="bibr" rid="ridm1850222740">54</xref> The government claims will not enhance the ability to thwart the encryption algorithm. There would be a minimal impact on cybersecurity.<xref ref-type="bibr" rid="ridm1850221516">55</xref></p>
        <p>The argument has some merit when the various nation-states are asymmetrically employing                  cyber-attacks.<xref ref-type="bibr" rid="ridm1850219788">56</xref> In other words, militarily weaker states are using cyber espionage techniques to gather the information that could be used to help even the economic or military playing field.<xref ref-type="bibr" rid="ridm1850220868">57</xref> In particular, NSA director Michael Rogers observed that: “<sup>i</sup>f you look at the topology of <sup>the</sup> attack from North Korea against Sony Pictures Entertainment, it literally bounced all over the world before it got to California.”<xref ref-type="bibr" rid="ridm1850195628">58</xref> The implication was that if there were technological backdoors both in hardware and software, Sony Pictures together with the government would have substantially mitigated the effect of the attack.<xref ref-type="bibr" rid="ridm1850197284">59</xref> According to Rogers, the United States government is playing catch-up regarding cybersecurity.<xref ref-type="bibr" rid="ridm1850193828">60</xref></p>
        <p>Furthermore, Christopher Wray, the current director of the Federal Bureau of Investigation (“FBI”), pointed out that at the International Conference on Cyber Security that was held in New York City in 2018 that in 2017, the FBI seized 7,775 devices that it was unable to unlock because of encryption.<xref ref-type="bibr" rid="ridm1850194836">61</xref> Wray claimed that this was a significant public safety issue because the cases dealt with human trafficking,                        counterterrorism, organized crime, and child exploitation.<xref ref-type="bibr" rid="ridm1850190804">62</xref> What Wray desired is encryption that is secure from the outside world but is available only for law enforcement to exploit.<xref ref-type="bibr" rid="ridm1850192244">63</xref></p>
      </sec>
      <sec id="idm1841807700">
        <title>Arguments Opposing Backdoors</title>
        <p>According to Pfefferkorn, a severe problem with the government’s request is that the desired government’s technical requirements are either unclear or unknown.<xref ref-type="bibr" rid="ridm1850188644">64</xref> In both public speeches and interviews, both then Deputy Attorney General Rodney Rosenstein and the FBI</p>
        <p>Director Christopher Wray has requested technological changes in electronic devices that would facilitate improved law enforcement. Rosenstein has suggested that: “manufacturers could manage the exceptional-access decryption key the same way they manage the key used to sign software updates.<xref ref-type="bibr" rid="ridm1850190516">65</xref>” Wray has indicated that electronic devices should provide data security along with lawful access.<xref ref-type="bibr" rid="ridm1850188356">66</xref> The problem with both of these proposals is that they are pretty vague. Both Rosenstein and Wray were echoing their desire to gain access to electronic devices without the necessity of first obtaining a warrant. Both individuals were recommending that the key to the backdoor be held in safekeeping until law enforcement wanted to access the content of a device.<xref ref-type="bibr" rid="ridm1850202684">67</xref></p>
        <p>Pferrerkorn offered the following four arguments why Rosenstein’s and Wray’s requests do not make good sense.<xref ref-type="bibr" rid="ridm1850204412">68</xref> First, there are too many law enforcement agencies that would request the backdoor encryption keys for mobile devices.<xref ref-type="bibr" rid="ridm1850200308">69</xref> Demands for backdoor encryption keys could be made several times in a day.<xref ref-type="bibr" rid="ridm1850201964">70</xref> In other words, the backdoor encryption would no longer be secure because too many law enforcement people would know   what it was.<xref ref-type="bibr" rid="ridm1850199012">71</xref> The risk of loss could well be catastrophic.<xref ref-type="bibr" rid="ridm1850199660">72</xref> Second, cyber attackers would probably be able to obtain the key by spear-phishing and whaling.<xref ref-type="bibr" rid="ridm1850167708">73</xref> Third, the market share of cell phone sales, both in the United States and throughout the world, would decline because security could not be guaranteed.<xref ref-type="bibr" rid="ridm1850166628">74</xref> Finally, Pfefferkorn aptly pointed out that if the content of a communication is encrypted, law enforcement would have to break the                           content-encryption code to understand the content of the information on a computer or a mobile device.<xref ref-type="bibr" rid="ridm1850167924">75</xref></p>
        <p>Then there is the issue of metadata. In <italic>Carpenter</italic>, the Court opined that the government violated Carpenter’s Fourth Amendment rights in obtaining cell phone metadata without a warrant.<xref ref-type="bibr" rid="ridm1850163964">76</xref>Before <italic>Carpenter</italic>, the government could get cellphone metadata by merely asking for it from the cell phone provider, stating that the data was needed for an investigation. The ruling in <italic>Carpenter</italic> was relatively narrow because it did not opine on whether the cellphone user or the cellphone provider owned the metadata.<xref ref-type="bibr" rid="ridm1850163100">77</xref> Strangely, the cellphone user’s property rights were not discussed in the majority opinion even though property rights formed the basis of the Sixth Circuit judgment.<xref ref-type="bibr" rid="ridm1850162164">78</xref> The good news from <italic>Carpenter</italic> is contained Justice Gorsuch’s dissent, where he stated that cell phone metadata is the property of cell phone owners.<xref ref-type="bibr" rid="ridm1850159356">79</xref> His objection is insightful because if cell phone owners have a reasonable expectation of privacy, it is a small step to allowing individuals to control the data about themselves that others can see on the Internet. Currently, based on the sheer volume of metadata, law enforcement can quickly obtain and then infer the content of the data based solely on location metadata.<xref ref-type="bibr" rid="ridm1850161300">80</xref></p>
      </sec>
      <sec id="idm1841820012">
        <title>Issues with Backdoors and Encryption</title>
        <p>First, the government does not need backdoor technology because it already has the technology to break into computers and mobile devices. Second, when conducting a balancing of the harms test<xref ref-type="bibr" rid="ridm1850157772">81</xref> and applying Mill’s principles contained in <italic>On Liberty</italic>,<xref ref-type="bibr" rid="ridm1850158276">82</xref> it is apparent that backdoors do more harm than good.</p>
      </sec>
      <sec id="idm1841817636">
        <title>Counter Example to the Government’s Argument</title>
        <p>The government’s arguments in favor of backdoors are seemingly unpersuasive. Consider the <italic>Apple Computer v. FBI</italic> controversy of 2015-16. On December 2, 2015, Syed Rizwan Farook and Tashfeen Malik killed 14 people and injured 22 others while attacking a San Bernardino County Department of Public Health Christmas party and training event.<xref ref-type="bibr" rid="ridm1850155324">83</xref> Four hours later, they were both killed by the police in a shootout.<xref ref-type="bibr" rid="ridm1850153668">84</xref></p>
        <p>On February 9, 2016, the FBI revealed that it could not unlock Farook’s iPhone 5C cell phone.<xref ref-type="bibr" rid="ridm1850152660">85</xref> The FBI asked the National Security Agency (“NSA”) to hack the phone, but the NSA could not do it.<xref ref-type="bibr" rid="ridm1850183692">86</xref> The FBI then asked Apple to create a new version of the cell phone’s iOS operating system installed on the phone, disabling its security features. Apple refused because of its pro-security policies. The FBI then asked a federal court to require Apple to implement the operating system’s change under the All Writs Assistance Act of 1789, not a warrant nor a subpoena. Apple opposed the order, stating that no government agency had ever issued such a subpoena.<xref ref-type="bibr" rid="ridm1850183188">87</xref>Apple was given until February 26, 2016, to comply with the court order.88</p>
        <p>On February 19, 2016, the Department of Justice (“DOJ”) filed a new motion in federal court to compel Apple to comply with the February 9, 2016 court order.<xref ref-type="bibr" rid="ridm1850179300">89</xref> Because Farook was a San Bernardino County employee, the FBI asked the County to reset Farook’s iCloud password so that the data could be obtained directly from the cloud; however, this procedure prevented the cell phone from copying recent data to the cloud.<xref ref-type="bibr" rid="ridm1850178436">90</xref></p>
        <p>On March 28, 2016, the DOJ made it known that it had unlocked Farook’s iPhone, and the suit against Apple was withdrawn.<xref ref-type="bibr" rid="ridm1850175628">91</xref> In September 2016, the Associated Press, Vice Media, and Gannet Publishing filed a Freedom of Information Act (“FOIA”) lawsuit against the FBI, demanding that the government agency divulge the organization’s name that had hacked Farook’s iPhone.<xref ref-type="bibr" rid="ridm1850173396">92</xref> On September 30, 2017, a federal court granted the FBI’s motion for summary judgment, citing that the name of the company and the amount of money to the firm were national security secrets, thereby making the issue moot and no longer ripe for adjudication.<xref ref-type="bibr" rid="ridm1850173684">93</xref></p>
        <p>Based on this example, it is evident that the FBI does not need a backdoor to open up a cell phone.</p>
      </sec>
    </sec>
    <sec id="idm1841816052">
      <title>The Balancing of the Harms</title>
      <p>According to John Stuart Mill in his essay <italic>on Liberty</italic>, an individual has the freedom to think and to emote, including the freedom of speech.<xref ref-type="bibr" rid="ridm1850172604">94</xref> A person also has the freedom to follow one’s tastes (including immoral tastes) provided that no harm comes to others.<xref ref-type="bibr" rid="ridm1850169508">95</xref> Thirdly, people have the freedom to unite with others, provided that the individuals are adults, there is no compulsion, and no harm comes to others.<xref ref-type="bibr" rid="ridm1850169580">96</xref> These three principles promote encryption in communication because a person to think, emote, and speak without fear of governmental interference. Suppose electronic devices have backdoors where the government can intercept messages. In that case, there is the distinct possibility that people will be afraid to speak their minds to other for fear of governmental retribution.</p>
      <p>Mill’s objections to government intrusion promote encryption by private companies.<xref ref-type="bibr" rid="ridm1850169148">97</xref> The reason is that with encryption private firms will protect their customers’ data because the consequence of not protecting the data is an almost immediate loss of business and profits.<xref ref-type="bibr" rid="ridm1850124924">98</xref> Even if the government is better qualified to defend its citizens, Mill would argue that private organizations should protect customer data because, in the long-run, the profit motive will yield better results than government outcomes.<xref ref-type="bibr" rid="ridm1850124636">99</xref> Furthermore, the fact that a backdoor encryption key has the potential to encourage an over-reaching and                       over-powering government, Mill would argue that backdoors should be avoided.<xref ref-type="bibr" rid="ridm1850120388">100</xref></p>
      <p>Consider the <italic>balancing of the harms test</italic>.<xref ref-type="bibr" rid="ridm1850121396">101</xref> As the custodian of public safety, the government argues that it has a responsibility to protect American citizens.<xref ref-type="bibr" rid="ridm1850118156">102</xref>The harm to the average American is nebulous because very few individuals are exposed to terrorist attacks.<xref ref-type="bibr" rid="ridm1850119380">103</xref> In contrast, the existence of a backdoor in a computer operating system or a cell phone almost assures cybercriminals will breach that personal information.<xref ref-type="bibr" rid="ridm1850116356">104</xref> Thus, employing the balancing of the harms test, the harm to individuals is far more significant than the vague threats to public safety.</p>
      <p>Finally, encryption and private keys are much more often than not concerned with private      communications among citizens that have nothing to do with law enforcement.<xref ref-type="bibr" rid="ridm1850117796">105</xref> Also, according to Mill, most actions by individuals do not prejudice the interest of others.<xref ref-type="bibr" rid="ridm1850114412">106</xref> This means that for the innocent people who would be subjected to government intrusion into their privacy, a backdoor encryption key is a detriment, mainly if cyber-attackers were to discover the key and then use that knowledge for nefarious ends.<xref ref-type="bibr" rid="ridm1850114772">107</xref> If one considers Mill’s philosophy on liberty and government interference, it becomes readily apparent that Mill would be against backdoor encryption keys. In short, when employing a <italic>balancing of the harms test</italic>,<xref ref-type="bibr" rid="ridm1850115060">108</xref> in my opinion, Mill would be against backdoor encryption keys because an innocent individual is a party that would suffer the most harm from the existence of a backdoor. </p>
    </sec>
    <sec id="idm1841782548" sec-type="conclusions">
      <title>Conclusion</title>
      <p>Therefore, on practical grounds, the government does not need backdoor encryption keys. The <italic>Apple Computer v. FBI</italic> example demonstrates this conclusion. On ideological and philosophical       foundations, as espoused by Mill, there is no good reason for private industry to appease the government by giving it a backdoor encryption key that                        cyber-attackers would readily discover in short order.</p>
      <p>So why does the Justice Department insist that electronics manufacturers insert a backdoor into their products? The answer could be as simple as dollars and cents. The government does not want to pay a consultant or an employee to unlock a mobile device virtually on demand. It seems that the government wants instant access to a mobile device without expending any effort. There could be a nefarious reason that only a conspiracy theorist would imagine. It could be any one of the above reasons or even some other reason. Who knows? But one thing is for sure, the federal government knows.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ridm1850438428">
        <label>1.</label>
        <mixed-citation xlink:type="simple" publication-type="journal"><name><surname>Cryptography</surname><given-names/></name><article-title>Merriam-Webster’s Dictionary</article-title>
n.d., https://www.merriam-webster.com/dictionary/cryptography


</mixed-citation>
      </ref>
      <ref id="ridm1850443612">
        <label>2.</label>
        <mixed-citation xlink:type="simple" publication-type="journal"><name><surname>Schulz</surname><given-names>Greg</given-names></name><article-title>10 ways to secure your stored data, ComputerWorld</article-title><date><year>2006</year></date>
https://www.computerworld.com/article/2546352/data-center/top-10-ways-to-secure-your-stored-data.html


</mixed-citation>
      </ref>
      <ref id="ridm1850506612">
        <label>3.</label>
        <mixed-citation xlink:type="simple" publication-type="journal"><name><surname>Cipher</surname><given-names/></name><article-title>Merriam-Webster’s Dictionary</article-title>
n.d., https://www.merriam-webster.com/dictionary/cipher


</mixed-citation>
      </ref>
      <ref id="ridm1850448300">
        <label>4.</label>
        <mixed-citation xlink:type="simple" publication-type="journal"><institution>Ben Lynn,Pseudo-Random Number Generators, Stanford University</institution>
n.d., https://crypto.stanford.edu/pbc/notes/crypto/prng.html


</mixed-citation>
      </ref>
      <ref id="ridm1850452476">
        <label>5.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <article-title>Brooks Cunningham,No Private Key, No Problem. How to Decrypt SSL Traffic with Session Keys</article-title>
          <date>
            <year>2015</year>
          </date>
          <publisher-loc>Citrix,(February20,2015),https://www.citrix.com/blogs/2015/02/20/no-private-key-no-problem-how-to-decrypt-ssl-traffic-with-session-keys/</publisher-loc>
        </mixed-citation>
      </ref>
      <ref id="ridm1850514532">
        <label>6.</label>
        <mixed-citation xlink:type="simple" publication-type="journal"><article-title>Description of Symmetric and Asymmetric Encryption, Microsoft Support</article-title>
n.d., https://support.microsoft.com/en-us/help/246071/description-of-symmetric-and-asymmetric-encryption


</mixed-citation>
      </ref>
      <ref id="ridm1850538436">
        <label>7.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1850548660">
        <label>8.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1850301356">
        <label>9.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1850299700">
        <label>10.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <article-title>Whitfield Diffie &amp; Martin Hellman,New Directions in Cryptography, 22</article-title>
          <date>
            <year>1976</year>
          </date>
          <source>IEEE Transactions on Information Theory.(November1976)</source>
          <volume>6</volume>
          <fpage>644</fpage>
          <lpage>54</lpage>
        </mixed-citation>
      </ref>
      <ref id="ridm1850296820">
        <label>11.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
(2016).History, OpenPGP,(August15,2016),https://www.openpgp.org/about/history/


</mixed-citation>
      </ref>
      <ref id="ridm1850297828">
        <label>12.</label>
        <mixed-citation xlink:type="simple" publication-type="journal"><name><surname>Jeremy</surname><given-names/></name><article-title>Kirk,Symantec buys encryption specialist PGP for $300M, ComputerWorld</article-title><date><year>2010</year></date>
https://www.computerworld.com/article/2517739/security0/symantec-buys-encryption-specialist-pgp-for--300m.html


</mixed-citation>
      </ref>
      <ref id="ridm1850294876">
        <label>13.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <article-title>Dennis Luciano &amp; Gordon Prichett,Cryptology: From Caesar Ciphers to Public-KeyCryptosystems, 18 The College Mathematics Journal1,2-17,(January1987)</article-title>
          <date>
            <year>1987</year>
          </date>
          <publisher-loc>http://www.math.stonybrook.edu/~moira/mat331-spr10/papers/1987%20LucianoCryptology%20From%20Caesar%20Ciphers%20to.pdf</publisher-loc>
        </mixed-citation>
      </ref>
      <ref id="ridm1850293508">
        <label>14.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <article-title>Spy Techniques of the Revolutionary War</article-title>
          <publisher-loc>George Washington’s Mount Vernon, (n.d.), https://www.mountvernon.org/george-washington/the-revolutionary-war/spying-and-espionage/spy-techniques-of-the-revolutionary-war/</publisher-loc>
        </mixed-citation>
      </ref>
      <ref id="ridm1850286756">
        <label>15.</label>
        <mixed-citation xlink:type="simple" publication-type="book">
          <name>
            <surname>Stripp</surname>
            <given-names>Alan</given-names>
          </name>
          <article-title>Works, Nova: Public Broadcasting</article-title>
          <date>
            <year>1999</year>
          </date>
          <chapter-title>System,(November11,1999)</chapter-title>
          <publisher-loc>http://www.pbs.org/wgbh/nova/military/how-enigma-works.html</publisher-loc>
        </mixed-citation>
      </ref>
      <ref id="ridm1850285748">
        <label>16.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <name>
            <surname>Richardson</surname>
            <given-names>Robert</given-names>
          </name>
          <date>
            <year>2008</year>
          </date>
          <institution>Security Survey, Computer Services, Inc.http://i.cmpnet.com/v2.gocsi.com/pdf/CSIsurvey2008.pdf</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1850284164">
        <label>17.</label>
        <mixed-citation xlink:type="simple" publication-type="book">
          <name>
            <surname>Memmi</surname>
            <given-names>Gérard</given-names>
          </name>
          <name>
            <surname>Kapusta</surname>
            <given-names>Katarzyna</given-names>
          </name>
          <name>
            <surname>Lambein</surname>
            <given-names>Patrick</given-names>
          </name>
          <name>
            <surname>Qiu</surname>
            <given-names>Han</given-names>
          </name>
          <chapter-title>(2016).DataProtection: Combining Fragmentation, Encryption, and Dispersion, FinalReport,(November2016)</chapter-title>
          <publisher-loc>https://arxiv.org/ftp/arxiv/papers/1512/1512.02951.pdf</publisher-loc>
        </mixed-citation>
      </ref>
      <ref id="ridm1850290140">
        <label>18.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1850289348">
        <label>19.</label>
        <mixed-citation xlink:type="simple" publication-type="book">
          <name>
            <surname>Padgette</surname>
            <given-names>John</given-names>
          </name>
          <name>
            <surname>Scarfone</surname>
            <given-names>Karen</given-names>
          </name>
          <chapter-title>Lily Chen,Guide to Bluetooth Security:Special Publication 800-121 Revision 1, National Institute of Standards and Technology,(June2012),https://nvlpubs.nist.gov/nistpubs/legacy/sp/nistspecialpublication800-121r1.pdf</chapter-title>
        </mixed-citation>
      </ref>
      <ref id="ridm1850268564">
        <label>20.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <name>
            <surname>Sandra</surname>
            <given-names>Kay Miller</given-names>
          </name>
          <article-title>Fiber optic networks vulnerable to attack</article-title>
          <date>
            <year>2006</year>
          </date>
          <publisher-loc>TechTarget,(November15,2006), https://searchsecurity.techtarget.com/news/1230106/Fiber-optic-networks-vulnerable-to-attack</publisher-loc>
        </mixed-citation>
      </ref>
      <ref id="ridm1850275188">
        <label>21.</label>
        <mixed-citation xlink:type="simple" publication-type="journal"><name><surname>Message</surname><given-names>Authentication Code</given-names></name>

Investopedia, (n.d.), https://www.investopedia.com/terms/m/message-authentication-code.asp


</mixed-citation>
      </ref>
      <ref id="ridm1850273532">
        <label>22.</label>
        <mixed-citation xlink:type="simple" publication-type="journal"><name><surname>Dawn</surname><given-names>M</given-names></name><article-title>Turner,Whatis a Digital Signature - What it Does, How it Works, CryptoMathic</article-title><date><year>2015</year></date>
https://www.cryptomathic.com/news-events/blog/what-is-a-digital-signature-what-it-does-how-it-works


</mixed-citation>
      </ref>
      <ref id="ridm1850273244">
        <label>23.</label>
        <mixed-citation xlink:type="simple" publication-type="book">
          <name>
            <surname>Carter</surname>
            <given-names>Jerome</given-names>
          </name>
          <chapter-title>(2016).DiagnosticError, Results Management, and Software Design, EHR Science,(February20,2016)</chapter-title>
          <publisher-loc>https://www.ehrscience.com/2016/02/29/diagnostic-error-results-management-and-software-design/</publisher-loc>
        </mixed-citation>
      </ref>
      <ref id="ridm1850271012">
        <label>24.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <name>
            <surname>Brooks</surname>
            <given-names>Cunningham</given-names>
          </name>
          <name>
            <surname>supra</surname>
            <given-names/>
          </name>
          <volume>5</volume>
        </mixed-citation>
      </ref>
      <ref id="ridm1850263620">
        <label>25.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <article-title>What is a Trojan Virus? – Definition, Kaspersky Lab, (n.d.), https://usa.kaspersky.com/resource-center/threats/trojans and Homer &amp; Robert Fagles, The Illiad (Penguin Classics Reissue edition</article-title>
          <date>
            <year>1998</year>
          </date>
        </mixed-citation>
      </ref>
      <ref id="ridm1850262324">
        <label>26.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <name>
            <surname>Dawn</surname>
            <given-names>M Turner</given-names>
          </name>
          <name>
            <surname>supra</surname>
            <given-names/>
          </name>
          <fpage>22</fpage>
        </mixed-citation>
      </ref>
      <ref id="ridm1850259948">
        <label>27.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <name>
            <surname>Zetter</surname>
            <given-names>Kim</given-names>
          </name>
          <article-title>(2014).HackerLexicon: What Is a Backdoor?Wired,(December11,2014)</article-title>
          <publisher-loc>https://www.wired.com/2014/12/hacker-lexicon-backdoor/</publisher-loc>
        </mixed-citation>
      </ref>
      <ref id="ridm1850257500">
        <label>28.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1850259084">
        <label>29.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <name>
            <surname>Choudhary</surname>
            <given-names>Rajendra</given-names>
          </name>
          <article-title>(2016).How to Reset Windows Password through a Backdoor, Moonking Hackers Club,(January24,2016)</article-title>
          <publisher-loc>http://moonkinghackersclub.com/how-to-reset-windows-password-through-a-backdoor/</publisher-loc>
        </mixed-citation>
      </ref>
      <ref id="ridm1850255700">
        <label>30.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1850255052">
        <label>31.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <name>
            <surname>Petersen</surname>
            <given-names>H E</given-names>
          </name>
          <article-title>Rein Turn. (1967).SystemImplications of Information Privacy</article-title>
          <publisher-loc>Rand Corporation,(April1967), https://www.rand.org/pubs/papers/P3504.html</publisher-loc>
        </mixed-citation>
      </ref>
      <ref id="ridm1850253540">
        <label>32.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1850254836">
        <label>33.</label>
        <mixed-citation xlink:type="simple" publication-type="book">
          <name>
            <surname>Willis</surname>
            <given-names>H</given-names>
          </name>
          <article-title>Ware (ed.),SecurityControlsfor Computer Systems:</article-title>
          <date>
            <year>1979</year>
          </date>
          <chapter-title>Report of Defense Science Board Task Force on Computer Security - RAND Report</chapter-title>
          <fpage>609</fpage>
          <lpage>1</lpage>
        </mixed-citation>
      </ref>
      <ref id="ridm1850250444">
        <label>34.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <name>
            <surname>Zetter</surname>
            <given-names>Kim</given-names>
          </name>
          <name>
            <surname>supra</surname>
            <given-names/>
          </name>
          <article-title>note 27 and Rajendra Choudhary,supra, note 29</article-title>
        </mixed-citation>
      </ref>
      <ref id="ridm1850264412">
        <label>35.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <article-title> About 20 years ago, the author worked for a company tha developed telecommunications software that was sold to the major telecommunications companies. The software that was quality assured possessed a backdoor whereby an authorized individual within one of the telecommunications company could log in using the backdoor and examine the landline telephone conversations of the company’s customers. This was the first time that the author became aware that backdoors for software applications existed</article-title>
        </mixed-citation>
      </ref>
      <ref id="ridm1850266140">
        <label>36.</label>
        <mixed-citation xlink:type="simple" publication-type="book">
          <name>
            <surname>Young</surname>
            <given-names/>
          </name>
          <name>
            <surname>Yung</surname>
            <given-names/>
          </name>
          <article-title>Cryptovirology: extortion-based security threats and countermeasures</article-title>
          <date>
            <year>1996</year>
          </date>
          <chapter-title>Proceedings1996IEEE Symposium on Security and Privacy,(May6-8,1996),https://ieeexplore.ieee.org/document/502676/?reload=true</chapter-title>
        </mixed-citation>
      </ref>
      <ref id="ridm1850229332">
        <label>37.</label>
        <mixed-citation xlink:type="simple" publication-type="book">
          <name>
            <surname>Ilyes</surname>
            <given-names>Andrew</given-names>
          </name>
          <chapter-title>(2018).Black-boxAdversarialAttacks with Limited Queries and Information</chapter-title>
          <publisher-loc>Labstx, (April22,2018), https://www.labsix.org/limited-information-adversarial-examples/</publisher-loc>
        </mixed-citation>
      </ref>
      <ref id="ridm1850243660">
        <label>38.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <name>
            <surname>Kleptography</surname>
            <given-names/>
          </name>
          <article-title>Collins English Dictionary</article-title>
          <publisher-loc>(n.d.), https://www.collinsdictionary.com/us/submission/15694/Kleptography</publisher-loc>
        </mixed-citation>
      </ref>
      <ref id="ridm1850240996">
        <label>39.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <name>
            <surname>Thompson</surname>
            <given-names>Ken</given-names>
          </name>
          <article-title>Reflections on Trusting Trust</article-title>
          <date>
            <year>1984</year>
          </date>
          <source>Communications of the ACM: Turing Award Lecture,(August1984)</source>
          <publisher-loc>https://www.archive.ece.cmu.edu/~ganger/712.fall02/papers/p761-thompson.pdf</publisher-loc>
        </mixed-citation>
      </ref>
      <ref id="ridm1850241572">
        <label>40.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1850238836">
        <label>41.</label>
        <mixed-citation xlink:type="simple" publication-type="journal"><name><surname>David</surname><given-names>A Wheeler</given-names></name><name><surname>David</surname><given-names>A</given-names></name><article-title>Wheeler’s Page onFully Countering Trusting Trust through Diverse Double-Compiling (DDC) - Countering Trojan Horse attacks on Compilers, George Mason University: Author’s</article-title><date><year>2009</year></date>
Ph.D. Dissertation, (2009), https://www.dwheeler.com/trusting-trust/


</mixed-citation>
      </ref>
      <ref id="ridm1850236892">
        <label>42.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1850236388">
        <label>43.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1850235308">
        <label>44.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <name>
            <surname>Thompson</surname>
            <given-names>Iain</given-names>
          </name>
          <article-title>(2018).FBI says itcan&amp;apos;tunlock 8,000 encrypted devices, demands backdoors for America&amp;apos;s &amp;apos;public safety&amp;apos;, The Register,(January9,2018),https://www.theregister.co.uk/2018/01/09/fbi_boss_backdooring_encryption/</article-title>
        </mixed-citation>
      </ref>
      <ref id="ridm1850235596">
        <label>45.</label>
        <mixed-citation xlink:type="simple" publication-type="book">
          <name>
            <surname>Richard</surname>
            <given-names>A Spinello</given-names>
          </name>
          <article-title>Cyberethics: Morality and Law</article-title>
          <chapter-title>in Cyberspace 214-16 (Jones Bartlett Learning 5th</chapter-title>
        </mixed-citation>
      </ref>
      <ref id="ridm1850231708">
        <label>46.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <fpage>216</fpage>
          <institution>Id at</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1850233652">
        <label>47.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <source>Id</source>
          <volume>at</volume>
          <fpage>216</fpage>
          <lpage>18</lpage>
        </mixed-citation>
      </ref>
      <ref id="ridm1850217268">
        <label>48.</label>
        <mixed-citation xlink:type="simple" publication-type="journal"><name><surname>Richtel</surname><given-names>Matt</given-names></name><article-title>Hacker Group Says Program Can Exploit Microsoft Security Hole</article-title><date><year>1998</year></date><publisher-loc>The New York Times: Cybertimes</publisher-loc>
https://archive.nytimes.com/www.nytimes.com/library/tech/98/08/cyber/articles/04hacker.html


</mixed-citation>
      </ref>
      <ref id="ridm1850215900">
        <label>49.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <name>
            <surname>Zetter</surname>
            <given-names>Kim</given-names>
          </name>
          <article-title>(2013).Howa Crypto &amp;apos;Backdoor&amp;apos; Pitted The Tech World against the NSA</article-title>
          <publisher-loc>Wired,(September24,2013), https://www.wired.com/2013/09/nsa-backdoor/</publisher-loc>
        </mixed-citation>
      </ref>
      <ref id="ridm1850213812">
        <label>50.</label>
        <mixed-citation xlink:type="simple" publication-type="journal"><name><surname>Sinegubko</surname><given-names>Denis</given-names></name>

(2014).JoomlaPluginConstructor Backdoor, Securi.net,(April23,2014), https://blog.sucuri.net/2014/04/joomla-plugin-constructor-backdoor.html


</mixed-citation>
      </ref>
      <ref id="ridm1850213956">
        <label>51.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <name>
            <surname>Edwards</surname>
            <given-names>M</given-names>
          </name>
          <article-title>(2001).BorlandInterbaseServer Contains Backdoor Account, ITPro Today</article-title>
          <date>
            <year>2001</year>
          </date>
          <fpage>https://www.itprotoday.com/security/borland-interbase-server-contains-backdoor-account.</fpage>
        </mixed-citation>
      </ref>
      <ref id="ridm1850209924">
        <label>52.</label>
        <mixed-citation xlink:type="simple" publication-type="journal"><name><surname>Gallagher</surname><given-names>Sean</given-names></name><date><year>2015</year></date>
backdoor password in Juniper firewall code, ARS Technica,(December21,2015),https://arstechnica.com/information-technology/2015/12/researchers-confirm-backdoor-password-in-juniper-firewall-code/



</mixed-citation>
      </ref>
      <ref id="ridm1850223964">
        <label>53.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <name>
            <surname>Wertheimer</surname>
            <given-names>Linda</given-names>
          </name>
          <article-title>(Host),TheCybersecurityArgument For And Against Device Encryption</article-title>
          <publisher-loc>National Public Radio,(December26,2015), https://www.npr.org/2015/12/26/461095800/the-cybersecurity-argument-for-and-against-device-encryption</publisher-loc>
        </mixed-citation>
      </ref>
      <ref id="ridm1850222740">
        <label>54.</label>
        <mixed-citation xlink:type="simple" publication-type="book">
          <article-title>Eyragon Eidam,Privacy vs. Security:ExpertsDebate Merits of Each</article-title>
          <chapter-title>in Tech-Rich World, Government Technology,(June7,2017)</chapter-title>
          <publisher-loc>http://www.govtech.com/policy/Privacy-vs-Security-Experts-Debate-Merits-of-Each-in-Tech-Rich-World.html</publisher-loc>
        </mixed-citation>
      </ref>
      <ref id="ridm1850221516">
        <label>55.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1850219788">
        <label>56.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <name>
            <surname>Qiao</surname>
            <given-names>Liang Col</given-names>
          </name>
          <name>
            <surname>Wang</surname>
            <given-names>Xiangsui Col</given-names>
          </name>
          <date>
            <year>1999</year>
          </date>
          <institution>Unrestricted Warfare (Echo Point Books &amp; Media</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1850220868">
        <label>57.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1850195628">
        <label>58.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <article-title>Tom McCarthy,NSA directordefendsplan to maintain &amp;apos;backdoors&amp;apos; into technology companies, The Guardian,(February23,2015),https://www.theguardian.com/us-news/2015/feb/23/nsa-director-defends-backdoors-into-technology-companies</article-title>
        </mixed-citation>
      </ref>
      <ref id="ridm1850197284">
        <label>59.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1850193828">
        <label>60.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1850194836">
        <label>61.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <name>
            <surname>Iain</surname>
            <given-names>Thompson</given-names>
          </name>
          <name>
            <surname>supra</surname>
            <given-names/>
          </name>
        </mixed-citation>
      </ref>
      <ref id="ridm1850190804">
        <label>62.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <name>
            <surname>Id</surname>
            <given-names/>
          </name>
        </mixed-citation>
      </ref>
      <ref id="ridm1850192244">
        <label>63.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <name>
            <surname>Id</surname>
            <given-names/>
          </name>
        </mixed-citation>
      </ref>
      <ref id="ridm1850188644">
        <label>64.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <name>
            <surname>Pfefferkorn</surname>
            <given-names>Riana</given-names>
          </name>
          <article-title>(2018).The Risks of “ResponsibleEncryption”3, The Center for Internet and Society,(February2018),https://cyberlaw.stanford.edu/files/publication/files/2018-02-05%20Technical%20Response%20to%20Rosenstein-Wray%20FINAL.pdf</article-title>
        </mixed-citation>
      </ref>
      <ref id="ridm1850190516">
        <label>65.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
Id at 7


</mixed-citation>
      </ref>
      <ref id="ridm1850188356">
        <label>66.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
Id at 4


</mixed-citation>
      </ref>
      <ref id="ridm1850202684">
        <label>67.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1850204412">
        <label>68.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <name>
            <surname>Townsend</surname>
            <given-names>Kevin</given-names>
          </name>
          <article-title>(2018).TheArgumentAgainst a Mobile Device Backdoor for Government, Security Week,(February7,2018)</article-title>
          <publisher-loc>https://www.securityweek.com/argument-against-mobile-device-backdoor-government</publisher-loc>
        </mixed-citation>
      </ref>
      <ref id="ridm1850200308">
        <label>69.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1850201964">
        <label>70.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1850199012">
        <label>71.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1850199660">
        <label>72.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1850167708">
        <label>73.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1850166628">
        <label>74.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1850167924">
        <label>75.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1850163964">
        <label>76.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <article-title>(2018). See Carpenter v. United States, 585 U.S</article-title>
        </mixed-citation>
      </ref>
      <ref id="ridm1850163100">
        <label>77.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1850162164">
        <label>78.</label>
        <mixed-citation xlink:type="simple" publication-type="journal"><article-title>(2016). See United States v. Carpenter, 819 F.3d 880 (6th Cir, 2016)</article-title>
</mixed-citation>
      </ref>
      <ref id="ridm1850159356">
        <label>79.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>See United States v. Carpenter, 585 U.S. Gorsuch’s Dissent</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1850161300">
        <label>80.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1850157772">
        <label>81.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <article-title>Legal TheoryLexicon: Balancing Tests, Legal Theory Blog,(August4,2013),http://lsolum.typepad.com/legaltheory/2013/08/legal-theory-lexicon-balancing-tests.html</article-title>
        </mixed-citation>
      </ref>
      <ref id="ridm1850158276">
        <label>82.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <name>
            <surname>John</surname>
            <given-names>Stuart Mill</given-names>
          </name>
          <publisher-loc>On Liberty(JohnW.Parker&amp;Son1859)</publisher-loc>
        </mixed-citation>
      </ref>
      <ref id="ridm1850155324">
        <label>83.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <name>
            <surname>Amanda</surname>
            <given-names>Lee Myers</given-names>
          </name>
          <name>
            <surname>Justin</surname>
            <given-names/>
          </name>
          <article-title>Pritchard,14 dead, 17 wounded in California shooting; 2 suspects dead</article-title>
          <source>AP News,(December3,2015),https://apnews.com/e5660a0b4ae1436fb2c51354cef8f6db/california-police-respond-report-active-shooter</source>
        </mixed-citation>
      </ref>
      <ref id="ridm1850153668">
        <label>84.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1850152660">
        <label>85.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <name>
            <surname>Volz</surname>
            <given-names>Dustin</given-names>
          </name>
          <article-title>Mark Hosenball.FBI director says investigators unable to unlock San Bernardino shooter&amp;apos;s phone content</article-title>
          <publisher-loc>Reuters,(February9,2016),https://www.reuters.com/article/us-california-shooting-encryption-idUSKCN0VI22A</publisher-loc>
        </mixed-citation>
      </ref>
      <ref id="ridm1850183692">
        <label>86.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <name>
            <surname>McLaughlin</surname>
            <given-names>Jenna</given-names>
          </name>
          <name>
            <surname>NSALookingTo</surname>
            <given-names/>
          </name>
          <article-title>Exploit Internet Of Things, Including Biomedical Devices, Official Says,TheIntercept,(June10,2016)</article-title>
          <publisher-loc>https://theintercept.com/2016/06/10/nsa-looking-to-exploit-internet-of-things-including-biomedical-devices-official-says/</publisher-loc>
        </mixed-citation>
      </ref>
      <ref id="ridm1850183188">
        <label>87.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <name>
            <surname>Andrew</surname>
            <given-names>Blankstein JudgeForces</given-names>
          </name>
          <article-title>Apple to Help Unlock San Bernardino Shooter iPhone</article-title>
          <source>NBC News,(February16,2016),https://www.nbcnews.com/storyline/san-bernardino-shooting/judge-forces-apple-help-unlock-san-bernardino-shooter-iphone-n519701</source>
        </mixed-citation>
      </ref>
      <ref id="ridm1850182180">
        <label>88.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <name>
            <surname>Danny</surname>
            <given-names/>
          </name>
          <article-title>Yadron.Applesaysthe FBI is making access demands even China hasn&amp;apos;t asked for, The Guardian,(February19,2016),https://www.theguardian.com/technology/2016/feb/19/apple-fbi-encryption-battle-san-bernardino-shooting-syed-farook-iphone</article-title>
        </mixed-citation>
      </ref>
      <ref id="ridm1850179300">
        <label>89.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <name>
            <surname>Levine</surname>
            <given-names>Mike</given-names>
          </name>
          <article-title>Jack Date &amp; Jack Cloherty.DOJ Escalates Battle With Apple Over San Bernardino Shooter&amp;apos;s Phone</article-title>
          <publisher-loc>ABC News,(February19,2016),https://abcnews.go.com/US/doj-escalates-battle-apple-san-bernardino-shooters-phone/story?id=37056775</publisher-loc>
        </mixed-citation>
      </ref>
      <ref id="ridm1850178436">
        <label>90.</label>
        <mixed-citation xlink:type="simple" publication-type="journal"><article-title>Paresh Dave,Apple and feds reveal San Bernardino shooter&amp;apos;s iCloud password was reset hours after attack</article-title><date><year>2016</year></date><publisher-loc>Los Angeles Times</publisher-loc>
http://www.latimes.com/business/la-fi-tn-apple-fbi-call-20160219-story.html


</mixed-citation>
      </ref>
      <ref id="ridm1850175628">
        <label>91.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <name>
            <surname>Rubin</surname>
            <given-names>Joel</given-names>
          </name>
          <article-title>James Queally &amp; Paresh Dave,FBI unlocks San Bernardino shooter&amp;apos;s iPhone and ends legal battle with Apple, for now</article-title>
          <publisher-loc>Los Angeles Times,(March28,2016), http://www.latimes.com/local/lanow/la-me-ln-fbi-drops-fight-to-force-apple-to-unlock-san-bernardino-terrorist-iphone-20160328-story.html</publisher-loc>
        </mixed-citation>
      </ref>
      <ref id="ridm1850173396">
        <label>92.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <name>
            <surname>Brad</surname>
            <given-names/>
          </name>
          <article-title>Heath.Otherssue FBI for info on phone hack of San Bernardino shooter</article-title>
          <publisher-loc>USA Today,(September16,2016),https://www.usatoday.com/story/news/nation/2016/09/16/usa-today-lawsuit-fbi-iphone-hack-san-bernardino/90477540/</publisher-loc>
        </mixed-citation>
      </ref>
      <ref id="ridm1850173684">
        <label>93.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <name>
            <surname>Josh</surname>
            <given-names/>
          </name>
          <article-title>Gerstein,Judge: FBI can keep cost of iPhone hack secret</article-title>
          <publisher-loc>Politico(October1,2017),https://www.politico.com/blogs/under-the-radar/2017/10/01/judge-fbi-need-not-release-cost-of-iphone-hack-243338</publisher-loc>
        </mixed-citation>
      </ref>
      <ref id="ridm1850172604">
        <label>94.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <source>Mill 1859 at 18</source>
        </mixed-citation>
      </ref>
      <ref id="ridm1850169508">
        <label>95.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1850169580">
        <label>96.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1850169148">
        <label>97.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <source>Mill</source>
          <volume>1859</volume>
          <fpage>154</fpage>
          <lpage>155</lpage>
        </mixed-citation>
      </ref>
      <ref id="ridm1850124924">
        <label>98.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1850124636">
        <label>99.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1850120388">
        <label>100.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1850121396">
        <label>101.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <article-title>Legal Theory Lexicon: Balancing Tests,supra</article-title>
        </mixed-citation>
      </ref>
      <ref id="ridm1850118156">
        <label>102.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>US Const, Preamble</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1850119380">
        <label>103.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <name>
            <surname>Mueller</surname>
            <given-names>John</given-names>
          </name>
          <name>
            <surname>Why</surname>
            <given-names/>
          </name>
          <article-title>WeShouldn&amp;apos;tExaggerate the Scale of Terrorism</article-title>
          <publisher-loc>Time Magazine,(November1,2017),http://time.com/5006353/why-we-shouldnt-exaggerate-the-scale-of-terrorism/</publisher-loc>
        </mixed-citation>
      </ref>
      <ref id="ridm1850116356">
        <label>104.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <name>
            <surname>Kevin</surname>
            <given-names>Townsend</given-names>
          </name>
          <name>
            <surname>supra</surname>
            <given-names/>
          </name>
        </mixed-citation>
      </ref>
      <ref id="ridm1850117796">
        <label>105.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Mill 1859 at 130</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1850114412">
        <label>106.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1850114772">
        <label>107.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <institution>Id</institution>
        </mixed-citation>
      </ref>
      <ref id="ridm1850115060">
        <label>108.</label>
        <mixed-citation xlink:type="simple" publication-type="journal">
          <article-title>LegalTheoryLexicon: Balancing Tests, Legal Theory Blog,(August4,2013),http://lsolum.typepad.com/legaltheory/2013/08/legal-theory-lexicon-balancing-tests.html</article-title>
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>
