For example, one former regulator from the Commodity Futures Trading Commission (CFTC) has suggested that the second-most-popular cryptocurrency, Ethereum, is a security to which securities regulations should apply retroactively. However, this view has been recently contradicted by a top official at the Securities and Exchange Commission (SEC), who stated that the decentralized nature of the Ethereum network means its cryptocurrency does not fit the established definition of a security.
A clear, reasonable, and appropriate definition of what qualifies as a security would allow the market for cryptocurrencies to develop while also enabling securities regulators to properly fulfill their mission to protect investors; maintain fair, orderly, and efficient markets; and facilitate capital formation.
It’s not even, really, the latest round of the Crypto Wars—the long running debate about how law enforcement and intelligence agencies can adapt to the growing ubiquity of uncrackable encryption tools.
Cato scholar Julian Sanchezsays, “It’s a fight over the future of high-tech surveillance, the trust infrastructure undergirding the global software ecosystem, and how far technology companies and software developers can be conscripted as unwilling suppliers of hacking tools for governments.”
To persuade a judge to compel Apple’s assistance, the feds turned to a 1789 law, the All-Writs Act — in essence, a catchall empowering courts to issue orders that are necessary to carry out other legal functions. A search warrant for an apartment, for instance, might come with an order compelling the landlord to produce the key.
Traditionally, the All-Writs Act has been used to force companies to cough up information they already have about their own customers, like a phone company ordered to turn over a criminal suspect’s billing records.
1. This offers the government a way to make tech companies help with investigations.Law enforcement and intelligence agencies have for years wanted to require companies to build the government backdoors into secure devices and messaging apps. In the face of strong opposition from tech companies, security experts and civil liberties groups, Congress has thus far refused to do so. The government is seeking an entry point from the courts it hasn’t been able to obtain legislatively.
2. This public fight could affect private orders from the government. The precedent set in the public fight may help determine how ambitious the government can be in seeking secret orders that would require companies to produce hacking or surveillance tools meant to compromise their devices and applications.
4. The effects of a win for the FBI in this case almost certainly won’t be limited to smartphones. Armed with code blessed by the developer’s secret key, governments will be able to deliver spyware in the form of trusted updates to a host of sensor-enabled appliances. Don’t just think of the webcam and microphone on your laptop, but voice-control devices like Amazon’s Echo, smart televisions, network routers, wearable computing devices and even Hello Barbie.
A D.C.-based public policy research organization (or "think tank") dedicated to the values of individual liberty, limited government, free markets, and peace.