Encryption
A Thoughtful Response to Going Dark and the Child Pornography Issue
Rep. Anna Eshoo and Sen. Ron Wyden have written a thoughtful letter calling on law enforcement to employ currently available digital investigative capabilities.
Latest in Going Dark
Rep. Anna Eshoo and Sen. Ron Wyden have written a thoughtful letter calling on law enforcement to employ currently available digital investigative capabilities.
The Department of Justice wants access to encrypted consumer devices but promises not to infiltrate business products or affect critical infrastructure. Yet that's not possible, because there is no longer any difference between those categories of devices. Consumer devices are critical infrastructure. They affect national security. And it would be foolish to weaken them, even at the request of law enforcement.
According to the Pew Foundation, most Americans lock their cell phones, creating an obstacle for some law enforcement investigations—most notably, the FBI in its 2016 standoff with Apple over access to the San Bernardino attacker’s iPhone—and especially for state authorities, which have fewer resources than
The most recent purportedly serious proposal by a Western government to force technology companies to provide access to the content of encrypted communications comes from Ian Levy and Crispin Robinson of the Government Communications Headquarters, or GCHQ, the U.K.’s equivalent of the National Security Agency.
The so-called Crypto Wars have been going on for 25 years now.
Lawfare has run a series of posts concerning exceptional access.
This is part of a series of essays from the Crypto 2018 Workshop on Encryption and Surveillance.
This is part of a series of essays from the Crypto 2018 Workshop on Encryption and Surveillance.
In August 2018, the leading international academic conference on cryptography hosted a Workshop on Encryption and Surveillance. The workshop explored both legal and technical aspects of the ongoing debate over the impact of strong encryption and law enforcement surveillance capabilities. The workshop was co-chaired by Tim Edgar (Brown University), Joan Feigenbaum (Yale University), and me. As we described it at the time:
This is part of a series of essays from the Crypto 2018 Workshop on Encryption and Surveillance.
In any discussion of cyber security, details matter.