Just as law enforcement can pursue a number of different alternatives to mandating encryption backdoors, so too can privacy advocates take steps beyond encrypting their data to ensure their privacy.
Latest in Aegis Paper Series
How the United States has pursued different norms to advance its interests in altering Chinese behavior in cyberspace.
This Aegis Series paper reviews the most recent encryption-related legislation in France, the United Kingdom, the Netherlands, Hungary, and Poland.
The public debate over encryption and Going Dark insufficiently addresses the issue of child sexual exploitation.
Jennifer Daskal examines the potential international side effects of the policies proposed in the encryption debate and highlights the need to proceed with care, and for centralized, executive-level review and monitoring of sought-after decryption orders, so as to better account for these effects.
Adam Segal examines the international pressures exerted on and by Chinese encryption laws and regulations.
If international discussions to address encryption occur, what will they look like, in what forums might they take place, and on what aspects of encryption will they focus? This Aegis Series paper looks at encryption through five different international lenses: human rights, law enforcement, intelligence, economics, and export controls. It evaluates the current views of US and foreign actors in each framework, describes international discussions (if any) that have transpired, and identifies factors that may drive outcomes.
This paper does not attempt to resolve either the ideological or factual disputes surrounding the international implications of U.S. encryption policy. Rather, it proposes key questions to stimulate and guide a more factually informed debate about the international human-rights consequences of domestic encryption policy.
Attribution of malicious cyber activities is a deep issue, about which confusion and disquiet can be found in abundance. This Aegis Series Paper reviews the literature on the subject and tries to synthesize the best aspects of these works with some original thoughts of the author’s own into a coherent picture of how attribution works, why it is both important and difficult, and how the entire process relates to policymaking.
The next round of surveillance reform is a time for the United States to go big – and to go global. We should get out of our defensive crouch and show the world how to balance robust intelligence capabilities with rules to protect privacy and civil liberties in the digital age.