
- English
- ePUB (mobile friendly)
- Available on iOS & Android
About this book
Encryption protects information stored on smartphones, laptops, and other devices - in some cases by default. Encrypted communications are provided by widely used computing devices and services - such as smartphones, laptops, and messaging applications - that are used by hundreds of millions of users. Individuals, organizations, and governments rely on encryption to counter threats from a wide range of actors, including unsophisticated and sophisticated criminals, foreign intelligence agencies, and repressive governments. Encryption on its own does not solve the challenge of providing effective security for data and systems, but it is an important tool.At the same time, encryption is relied on by criminals to avoid investigation and prosecution, including criminals who may unknowingly benefit from default settings as well as those who deliberately use encryption. Thus, encryption complicates law enforcement and intelligence investigations. When communications are encrypted "e;end-to-end, "e; intercepted messages cannot be understood. When a smartphone is locked and encrypted, the contents cannot be read if the phone is seized by investigators.Decrypting the Encryption Debate reviews how encryption is used, including its applications to cybersecurity; its role in protecting privacy and civil liberties; the needs of law enforcement and the intelligence community for information; technical and policy options for accessing plaintext; and the international landscape. This book describes the context in which decisions about providing authorized government agencies access to the plaintext version of encrypted information would be made and identifies and characterizes possible mechanisms and alternative means of obtaining information.
Tools to learn more effectively

Saving Books

Keyword Search

Annotating Text

Listen to it instead
Information
Table of contents
- COVER PAGE
- TITLE PAGE
- COPYRIGHT PAGE
- TABLE OF CONTENTS
- SUMMARY
- 1 INTRODUCTION
- 2 ENCRYPTION AND ITS APPLICATIONS
- 3 THE ROLE OF ENCRYPTION IN PROTECTING PRIVACY AND CIVIL LIBERTIES
- 4 INFORMATION NEEDS OF LAW ENFORCEMENT AND THE INTELLIGENCE COMMUNITY
- 5 OPTIONS FOR ACCESSING PLAINTEXT
- 6 INTERNATIONAL DIMENSIONS
- 7 A FRAMEWORK FOR EVALUATING APPROACHES TO ACCESS PLAINTEXT
- APPENDIXES
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app