The Texas-based email provider, specializing in encrypted email services, announced Thursday that it's immediately suspending its services. The crux of the issue is obliquely revealed in the statement by Lavabit's founder and owner Ladar Levison: "I have been forced to make a difficult decision: to become complicit in crimes against the American people or walk away from nearly ten years of hard work by shutting down Lavabit."
Most of us can't be sure what forced Levison's hand but the content and cryptic nature of his explanation speaks volumes. "As things currently stand," he wrote, "I cannot share my experiences over the last six weeks, even though I have twice made the appropriate requests."
One of Lavabit's 350,000 users is Edward Snowdon and, given the frenzied attacks against and investigations of this renowned whistle-blower, it's pretty clear what happened. "Reading between the lines," Wired's Kevin Poulsen writes, "it's reasonable to assume Levison has been fighting either a National Security Letter seeking customer information -- which comes by default with a gag order -- or a full-blown search or eavesdropping warrant."
If that's the case and LavaBit doesn't give up what's being demanded (probably Snowdown emails) Levison faces harsh criminal penalties. If he does give them up he contradicts the very purpose the provider was founded for in the first place and that would probably spell LavaBit's death. It's like forcing someone to play Russian Roulette with bullets in all the chambers. Except that one of those bullets is also aimed at our privacy and our ability to use the Internet the way it was intended.
Ladar Levison founded Lavabit in 2004 for one reason: to provide a simple and powerful encrypted email service to anybody who wanted one. People could sign up for a free account or a paid one; the only difference was the amount of storage available to the user on Lavabit's servers.
If there was any doubt about his intentions, Levison's most recent statements make them clear: he considers the indiscriminate collection and inspection of email to be a crime against the American people and he had the skills to develop protocols to resist it. A Lavabit user could send and receive email to an account protecting the content of the email through a powerful encryption algorithm that would turn the email contents into unreadable gibberish unless someone had the proper decryption code to read it as it was written. This is a very popular approach to email that uses, among other methods, an "identification key" installed on a computer that would trigger a "decryption" making the content readable. It's like the code used by spies in movies except more powerful and much more difficult to "crack". Anybody can install such encryption on their email account but Lavabit made it virtually automatic and stored email in encrypted form.
Many people are under the impression that encryption is used only by highly skilled techies and computer savvy communicators. But the fact that 350,000 people were using Lavabit's services belies that perception. In fact, Lavabit is only one of many services that provide such protection.
It's pretty clear that the government wants Ed Swowdon's email and when it noticed that Snowdon used a Lavabit email account to announce a press conference in Russia, they apparently came knocking on Lavabit's door. That's the door Levison is trying to close -- he's now huddled with lawyers figuring out how to resist this attack legally. That resistance is all too rare in this industry. For years now, the federal government has been forcing email providers to give up all kinds of information. In most cases, mainly involving large companies like Google or Verizon, the company does so willingly. But, even those who don't want to give it up are forced to by a bizarre and particuarly nasty Congressionally-approved measure called "The National Security Letter."
These letters, usually written by the FBI or the NSA, are government demands for information -- demands that do not require any prior approval by a court -- even the toothless and completely government-supportive Foreign Intelligence Surveillance Court (FISA). By law a National Security Letter must be "non-content seeking," so it's limited to phone records, email addresses and other identifiers. Some claim that the letters are sometimes much broader although the legally permitted information can set up targets for an investigation which can then be pursued with the other sources of data intelligence the government has.
For the most part, however, we don't know what's in those letters because, if you get one, you can't tell anyone about it. Nobody, not even family or friends let alone the people you work with (even if they are affected by the letter's demands) can ever be told you received a National Security Letter. If you do tell anyone, you go to jail. That prohibition--an astonishing violation of your First Amendment right of free speech, particularly considering that the letter is from a law enforcement agency, not a court--lasts forever unless you go to court and manage to get it lifted--something which rarely happens. But these letters are hardly rare. From 2003 to 2006 alone the Federal Bureau of Investigation issued 192,499 national security letter requests (and the frequency of their use has almost certainly increased since then.)
The other option Wired's Poulsen mentions -- a court order -- is also possible in this particular case. In the end, it doesn't make much difference because this is an attack that was sure to cause collateral damage.
The Facebook page Lavabit maintains, on which it reprinted the statement, is covered with responses that dramatize the blow this represents to the provider's hundreds of thousands of users. Not only have many of these people lost their primary email account, and loads of email and other information they confidently stored on Lavabit's servers, but many wonder if they are effectively losing the ability to send encrypted email.
The answer is "yes", no matter the government's basic intention. Even if the FBI (or whoever is doing this) isn't targeting encryption per se, it sure doesn't give a crap about protecting or respecting it. It's collateral damage -- attacking one "target" while carelessly destroying the ability of hundreds of thousands more to communicate securely.
(Note: You can view every article as one long page if you sign up as an Advocate Member, or higher).