Muutke küpsiste eelistusi

Decrypting the Encryption Debate: A Framework for Decision Makers [Pehme köide]

  • Formaat: Paperback / softback, 118 pages, kõrgus x laius: 229x152 mm
  • Ilmumisaeg: 07-Jun-2018
  • Kirjastus: National Academies Press
  • ISBN-10: 0309471532
  • ISBN-13: 9780309471534
Teised raamatud teemal:
  • Formaat: Paperback / softback, 118 pages, kõrgus x laius: 229x152 mm
  • Ilmumisaeg: 07-Jun-2018
  • Kirjastus: National Academies Press
  • ISBN-10: 0309471532
  • ISBN-13: 9780309471534
Teised raamatud teemal:
Encryption protects information stored on smartphones, laptops, and other devices - in some cases by default. Encrypted communications are provided by widely used computing devices and services - such as smartphones, laptops, and messaging applications - that are used by hundreds of millions of users. Individuals, organizations, and governments rely on encryption to counter threats from a wide range of actors, including unsophisticated and sophisticated criminals, foreign intelligence agencies, and repressive governments. Encryption on its own does not solve the challenge of providing effective security for data and systems, but it is an important tool.



At the same time, encryption is relied on by criminals to avoid investigation and prosecution, including criminals who may unknowingly benefit from default settings as well as those who deliberately use encryption. Thus, encryption complicates law enforcement and intelligence investigations. When communications are encrypted "end-to-end," intercepted messages cannot be understood. When a smartphone is locked and encrypted, the contents cannot be read if the phone is seized by investigators.



Decrypting the Encryption Debate reviews how encryption is used, including its applications to cybersecurity; its role in protecting privacy and civil liberties; the needs of law enforcement and the intelligence community for information; technical and policy options for accessing plaintext; and the international landscape. This book describes the context in which decisions about providing authorized government agencies access to the plaintext version of encrypted information would be made and identifies and characterizes possible mechanisms and alternative means of obtaining information.



Table of Contents



Front Matter Summary 1 Introduction 2 Encryption and Its Applications 3 The Role of Encryption in Protecting Privacy and Civil Liberties 4 Information Needs of Law Enforcement and the Intelligence Community 5 Options for Accessing Plaintext 6 International Dimensions 7 A Framework for Evaluating Approaches to Access Plaintext Appendix A Biographies of Committee Members Appendix B Briefers to the Committee
SUMMARY
1(94)
1 Introduction
5(9)
Government Options
9(3)
Scope and Context for Access
12(1)
Evaluation Framework
12(2)
2 Encryption and Its Applications
14(18)
What Is Encryption?
15(3)
Designing Encryption
18(2)
Applications of Encryption
20(5)
Protecting Stored Files
20(1)
Full Disk Encryption
21(1)
Device Locking
22(1)
Virtual Private Networks
22(1)
Secure Web Browsing
23(1)
Secure Messaging
24(1)
Protecting Confidentiality in Cloud or Third-Party Computing
25(1)
Encryption and the Expanding Cyber Threat
25(7)
Cyber Threats
27(2)
The Role of Encryption and Other Forms of Cryptography in Cybersecurity
29(2)
The Limits of Encryption for Cybersecurity
31(1)
3 The Role of Encryption In Protecting Privacy and Civil Liberties
32(4)
4 Information Needs of Law Enforcement and the Intelligence Community
36(13)
Goals of Law Enforcement Officials and Intelligence Analysts
36(1)
The Volume and Diversity of Information Relevant to Law Enforcement and the Intelligence Community
37(3)
Encryption as an Impediment to Investigations
40(5)
The Practical Utility of Alternatives to Exceptional Access
45(4)
5 Options for Accessing Plaintext
49(29)
Options for Accessing Plaintext
49(1)
Legal Tools for Obtaining Plaintext within the Current Legislative Framework
50(6)
Compelled Disclosure of Biometric Identifiers or Passcodes
50(2)
Compelled Assistance by Third Parties and Related Issues
52(3)
Legal Aspects of Lawful Hacking
55(1)
Technological Approaches for Accessing Plaintext, Limitations, and Alternatives
56(17)
Approaches to Exceptional Plaintext Access
56(10)
Future Cryptographic Technologies
66(1)
Ways to Bypass a Plaintext Access Mandate
67(3)
Alternatives to Exceptional Access
70(3)
Enhanced Financial and Technical Support
73(3)
Legislation Mandating Access
76(2)
6 International Dimensions
78(5)
Effects of U.S. Actions on Other Countries and the International Market for U.S. Goods and Services
80(1)
Global Norms
81(2)
7 A Framework for Evaluating Approaches to Access Plaintext
83(12)
APPENDIXES
A Biographies of Committee Members
95(8)
B Briefers to the Committee
103