Beruflich Dokumente
Kultur Dokumente
SYSTEMS
ARCHIVES ANNOUNCEMENTS SUBMISSIONS
Journal Help
Home > Volume 22, Number 2 - 6 February 2017 > Bay
USER
Username
Password
Remember me
Login
JOURNAL
CONTENT
Search
Search Scope
All
Search
Inspired by the 2016 case of the encrypted Apple iPhone used by alleged
terrorists in the San Bernardino, Calif. attack, this paper explores the Browse
question of whether the use of completely unbreakable encryption online By Issue
or off-line would be considered ethical by the political philosopher John By Author
Rawls. Rawls is widely acknowledged as having played an important role in By Title
how we perceive freedom and liberty in Western democracies today, and Other Journals
his work on justice, fairness and liberty appears to be a great source of
knowledge for politicians, policy-makers and activists. Several recent
events and threats to national security of a technological nature have FONT SIZE
raised ethical questions about the relationship between state and citizen
and how technological power should be divided between these two parties,
particularly when it comes to the right to privacy. However, in contrast
with a wide-spread perception of Rawls’ work, this article shows that there CURRENT ISSUE
are cases in which Rawls’ principles actually place a limitation on liberty in
these matters. This paper presents a thought experiment in which it
becomes clear that Rawls’ advocacy for liberty did not extend to cases in
which social cooperation in a well-ordered society would be obstructed.
Based on a study of Rawls’ work, the author concludes that whereas Rawls
would consider strong encryption both necessary and ethical, completely
unbreakable encryption would be considered a violation of social ARTICL E TOOL S
cooperation and thus indefensible for Rawls. Abstract
Contents
Print this
Introduction article
The San Bernardino iPhone
Breakable vs. unbreakable encryption Indexing
Encryption as obstruction of justice or civil disobedience metadata
Encryption as facilitator of free speech and privacy
Utilitarian arguments for encryption How to cite
The maximin rule item
Unbreakable encryption and maximin
Social cooperation vs. privacy Email this
The appropriateness of strong vs. unbreakable encryption article (Login required)
Conclusion
Email the
author (Login required)
ABOUT THE
AUTHOR
Introduction
Morten Bay
John Rawls is “widely considered the most important political philosopher
UCLA Department of
of the twentieth century” [1], not least for his contributions to the Information Studies
theoretical conceptions of liberty. When he received the National United States
Humanities Medal from then-President Bill Clinton in 1999, the president
said that Rawls had “placed our rights to liberty and justice upon a strong Morten Bay is a
and brilliant new foundation of reason” [2]. Indeed, Rawls is seen as the Ph.D. candidate in
most important thinker in centuries, when it comes to defending liberty Information Studies
through arguments of reason rather than (only) normative values. at UCLA. His
research interests
But the perception of Rawls as liberty’s staunchest defender may not be revolve around the
entirely in accordance with what he actually wrote in his substantial body Internet and other
of work. In fact, as I will argue in this paper, there are limits to the networks and how
they impact society,
freedoms and rights that a citizen can expect, even in the idealist version ethics, culture and
of society that Rawls constructs through theory. conceptions of reality
along diverse
A less-quoted aspect of Rawls’ theory is that there are cases where social avenues, ranging
cooperation must take precedence over individual liberties — an aspect from national
that can be at odds with the general perception of Rawls and his political security to the
liberalism. In my view, emerging technologies are presenting us with proliferation and
distribution of news,
ethical and political challenges that we have very little tradition or
data and
theoretical basis for meeting. The application of Rawls’ theories to these information. He has
new, technologically-born ethical paradoxes may be useful, particularly in written four books
questions of justice, fairness and liberty — Rawls’ main areas of concern. on these topics
Though the results of viewing these challenges through a Rawlsian lens which also are at the
may reveal a path forward for policy-makers and thinkers, this path will center of the work
also be a somewhat unexpected direction for those who view Rawls as he has done in his
merely a defender of liberty at all costs. For example, Rawls would most 20-year career as a
likely not side with those who argue that privacy is an irreducible right in a journalist.
society contingent on technological infrastructures, nor would he argue
that liberty must be constant within the same environment.
Apple declined to aid the FBI in breaking the security measures, as this,
according to Apple, would not only set a dangerous precedent, it could
potentially also put the unlocking software code in the hands of evildoers
who could use it to break into any iPhone in existence.
At its core, the Apple/FBI case became one where encryption inhibited law
enforcement from conducting what the FBI believed to be necessary
information-gathering operations. In other words, the encryption
represented, in practicality, an obstruction of justice. Apple’s refusal to
comply can also be seen as obstruction of justice or as civil disobedience,
depending on your initial view of the case (Jeong, 2016; Dupont, 2016).
Dichotomies such as this one riddle the entire encryption debate, but as
this paper will attempt to show, Rawls’ work may represent a path
forward.
Rawls is famous for his arguments against utilitarianism, and this is why it
is beneficial to look to his work when discussing encryption and regulation.
I would argue that Rawls’ maximin rule is a preferable approach to this
question, rather than the utilitarianism-tinted approaches put forth by
some participants in the discourse. When one looks at the problem
through the lens of Rawls’ maximin rule, it would seem that while strong
encryption can be a facilitator of the essential ability to present and
discuss ideas without retribution, unbreakable encryption would actually
have an almost opposing effect as it would be in violation of Rawls’
maximin rule and hence, inhibit social cooperation.
Rawls uses his maximin principle as a “heuristic tool” for choosing the
principles of justice in the basic structure. He stresses that this tool is not
a general tool for deciding on e.g., questions of morality, but only pertains
to principles of justice chosen in the original position [9]. He states the
maximin rule thus: “It tells us to identify the worst outcome of each
available alternative and then to adopt the alternative whose worst
outcome is better than the worst outcomes of all the other alternatives.”
[10] It may seem like stating the obvious that in choosing principles of
justice, you should choose the alternative that is least bad. But the
maximin rule, as mentioned above, is to be viewed as an alternative to
utilitarianism, in which principles are chosen that will maximize the good
for the largest amount of people in society, even if this means inequality
for some. Rawls illuminates the difference between principles based on the
maximin rule and utilitarianism by first stating some conditions under
which the maximin rule applies, and then showing how these conditions
are what makes maximin more just and fair than a utilitarian method of
choice.
The rule of law entails at least two things: That the institutions of
government follows it as narrowly as it is expected of the citizens they
govern, and that the rule of law is just. Both things would be in place in
Rawls’ (ideal) well-ordered society. Encrypting your online communication
or digital possessions with unbreakable cryptography, however, would be
an obstruction of justice in such a society, as it is indisputable that
encryption that is unbreakable by law enforcement operatives is a
hindrance to the operatives’ abilities to gather information. Even if there is
no meaningful information or digital objects within the encrypted container
or online communication, ruling that one piece of evidence out is progress
in terms of information-gathering as a tool to enforce the law. This kind of
obstruction would be deemed unethical under the maximin rule, in which
the question of unbreakable encryption boils down to this: What are the
worst outcomes of the alternatives regarding the use and legality of such
impenetrable protection of digital objects and online communication?
Within Rawls’ basic structure of society, basic liberties and rights are
secured for the citizen in the political sense, not in the more abstract
sense. Rawls’ concept of justice as fairness requires citizens to be engaged
in social cooperation. He sees the social cooperation of citizens as intrinsic
to the construction of a society ruled by fair justice, and defines two
‘moral powers’ by which citizens can express this social cooperation:
Since Rawls only writes about privacy directly in very few places,
Nissenbaum’s (2004) description of similar principles within informational
privacy may provide some clarification. Rawlsian privacy, as decribed
above, aligns somewhat with what Nissenbaum (2004) writes about as
contextual integrity within informational privacy. According to this concept,
two norms must be upheld in order for invasions or limitation of privacy to
be allowable. One is the appropriateness of sharing information.
Nissenbaum argues that it is appropriate to share health information with
your doctor, financial information with your bank, romantic information
with friends, etc. What is not appropriate to Nissenbaum is to cross those
lines, i.e., to reveal religious affiliations or financial status with your
employer or share romantic information with the bank. Or, more
importantly, that these lines are crossed without the individual’s
permission or voluntary participation. The other norm, or set of norms,
regards distribution and flow of information. Nissenbaum finds that in
some contexts, distribution and flow of private information can be
allowable, such as within medical or financial systems, but in most cases,
it requires the voluntary participation of the individual to whom the
information relates. According to Nissenbaum, to overstep the boundaries
of (informational) privacy, the privacy breach must be both appropriate
and the flow of information must be acceptable to the person it concerns.
If one of these norms are not upheld, the breach of privacy can be viewed
as unethical. Rawls and Nissenbaum share the notion that the basic
principles agreed upon (what in Nissenbaum’s terms would be deemed
appropriate) by the citizens of society and which each of them voluntarily
comply with and understand (Nissenbaum’s voluntary participation)
determine the restrictions of privacy.
Conclusion
Above, I have shown that even though encryption is a valid, useful and
perhaps even necessary tool to protect privacy under a Rawlsian societal
framework, unbreakable encryption is not, as it would be socially
uncooperative and a hindrance of justice to allow it. The question remains,
however, how you would even ensure that no encryption is ever
unbreakable, if you were to attempt the idealistic implementation of
Rawlsian justice as fairness.
Acknowledgements
The author would like to thank Dr. Leah Lievrouw for her extensive
commentary and advice as this paper was being developed.
Notes
10. Ibid.
13. The ‘veil of ignorance’ and ‘the original position’ are two of the most
central concepts in Rawls’ theory of justice. They represent a situation of
initial equality between citizens while they are creating the basic structure
of society. The ideal (and even to Rawls, utopian) construction of a just
society happens from the original position, in which no citizen has more
power or than another. The veil of ignorance is a tool presented by Rawls
which is to be used in the original position when deciding, through
reasoning, on the principles of the basic structure. By not taking prior
knowledge into account, Rawls argues, one is more likely to arrive at a
principle of justice which is fair and acceptable to all.
16. Rawls, 2001, p. 202, emphasis mine. This quote from Rawls’ (2005)
Political liberalism is also restated in his Justice as fairness (2001).
17. Rawls distinguishes between two types of autonomy, rational and full.
Rational autonomy is “acting solely from our capacity to be rational and
from the determinate conception of the good we have at any time” (Rawls,
2005, p. 306). That is, rational autonomy can be acting in rational
accordance with a doctrine of some sort, be it ethical, religious or other.
According to Rawls, however, this is not enough if one is to be a citizen
engaged in social cooperation: “Full autonomy includes not only this
capacity to be rational but also the capacity to advance our conception of
the good in ways consistent with honoring the fair terms of social
coopration; that is, the principles of justice” (Rawls, 2005, p. 306).
References
Whitfield Diffie and Susan Eva Landau, 2007. Privacy on the line: The
politics of wiretapping and encryption. Updated and expanded edition.
Cambridge, Mass.: MIT Press.
Brian Duignan (editor), 2010. The 100 most influential philosophers of all
time. New York: Britannica Educational Pub. in association with Rosen
Educational Services.
Quinn Dupont, 2016. “Opnion: Why Apple isn’t acting in the public’s
interest,” Christian Science Monitor (22 February), at
http://www.csmonitor.com/World/Passcode/Passcode-
Voices/2016/0222/Opinion-Why-Apple-isn-t-acting-in-the-public-s-
interest, accessed 14 January 2017.
Carl Ellison and Bruce Schneier, 2000. “Ten risks of PKI: What you’re not
being told about public key infrastructure,” Computer Security Journal,
volume 16, number 1, pp. 1–7.
Dan Froomkin and Jenna McLaughlin, 2016. “FBI vs. Apple establishes a
new phase of the crypto wars,” The Intercept (26 February), at
https://theintercept.com/2016/02/26/fbi-vs-apple-post-crypto-wars/,
accessed 14 January 2017.
David L. Schaefer, 2007. “Justice and inequality,” Wall Street Journal (23
July), at http://www.wsj.com/articles/SB118515408718974595, accessed
14 January 2017.
Alina Selyukh and Camila Domonoske, 2016. “Apple, the FBI And iPhone
encryption: A look at what’s at stake,” NPR (17 February), at
http://www.npr.org/sections/thetwo-way/2016/02/17/467096705/apple-
the-fbi-and-iphone-encryption-a-look-at-whats-at-stake, accessed 14
January 2017.
Michael Slezak, 2015. “Unhackable kernel could keep all computers safe
from cyberattack,” New Scientist (16 September), at
https://www.newscientist.com/article/mg22730392-600-unhackable-
kernel-could-keep-all-computers-safe-from-cyberattack-2/, accessed 14
January 2017.
Daniel Solove, 2011. “Why privacy matters even if you have ‘nothing to
hide’,” Chronicle of Higher Education (15 May), at
http://www.chronicle.com/article/Why-Privacy-Matters-Even-if/127461/,
accessed 14 January 2017.
John Villasenor, 2016a. “If Apple can create a backdoor to the iPhone,
could someone else?” Forbes (17 February), at
http://www.forbes.com/sites/johnvillasenor/2016/02/17/if-apple-can-
create-a-backdoor-to-the-iphone-could-someone-else/, accessed 14
January 2017.
John Villasenor, 2016b. “Some key issues in the Apple iPhone decryption
matter,” Forbes (21 February), at
http://www.forbes.com/sites/johnvillasenor/2016/02/21/some-key-issues-
in-the-apple-iphone-decryption-matter/, accessed 14 January 2017.
Christina Warren and Sergio Hernandez, 2016. “FBI finally hacks iPhone,
ending court battle with Apple,” Mashable (28 March), at
http://mashable.com/2016/03/28/fbi-cracks-san-bernardino-iphone/,
accessed 14 January 2017.
Kim Zetter, 2016. “Apple’s FBI battle is complicated. Here’s what’s really
going on,” Wired (10 February), at
https://www.wired.com/2016/02/apples-fbi-battle-is-complicated-heres-
whats-really-going-on/, accessed 14 January 2017.
Editorial history