03579nam 2200565 450 991080995050332120200520144314.00-309-47156-70-309-47154-0(CKB)4100000004837231(MiAaPQ)EBC5389609(Au-PeEL)EBL5389609(OCoLC)1032788096(BIP)062914429(EXLCZ)99410000000483723120180604d2018 uy 0engurcnu||||||||txtrdacontentcrdamediacrrdacarrierDecrypting the encryption debate a framework for decision makersWashington, DC :The National Academies Press,[2018]20181 online resource (xiv, 104 pages)Consensus study report0-309-47153-2 Encryption protects information stored on smartphones, laptops, and other devices - in some cases by default. Encrypted communications are provided by widely used computing devices and services - such as smartphones, laptops, and messaging applications - that are used by hundreds of millions of users. Individuals, organizations, and governments rely on encryption to counter threats from a wide range of actors, including unsophisticated and sophisticated criminals, foreign intelligence agencies, and repressive governments. Encryption on its own does not solve the challenge of providing effective security for data and systems, but it is an important tool.At the same time, encryption is relied on by criminals to avoid investigation and prosecution, including criminals who may unknowingly benefit from default settings as well as those who deliberately use encryption. Thus, encryption complicates law enforcement and intelligence investigations. When communications are encrypted "end-to-end," intercepted messages cannot be understood. When a smartphone is locked and encrypted, the contents cannot be read if the phone is seized by investigators.Decrypting the Encryption Debate reviews how encryption is used, including its applications to cybersecurity; its role in protecting privacy and civil liberties; the needs of law enforcement and the intelligence community for information; technical and policy options for accessing plaintext; and the international landscape. This book describes the context in which decisions about providing authorized government agencies access to the plaintext version of encrypted information would be made and identifies and characterizes possible mechanisms and alternative means of obtaining information.Consensus study report.Data encryption (Computer science)Computer networksSecurity measuresSocial aspectsPrivacy, Right ofUnited StatesCivil rightsUnited StatesData Encryption (Computer Science)ComputersData encryption (Computer science)Computer networksSecurity measuresSocial aspects.Privacy, Right ofCivil rights005.82Division on Engineering and Physical Sciences,Computer Science and Telecommunications Board,Committee on Law Enforcement and Intelligence Access to Plaintext Information,MiAaPQMiAaPQMiAaPQBOOK9910809950503321Decrypting the encryption debate3916852UNINA01127nam0 22002891i 450 UON0048855820231205105321.91120-11-44914-620180517d1994 |0itac50 bafreFR|||| |||||ˆL' ‰énonciation en linguistique françaiseDominique MaingueneauParisHachette1994158 p.19 cm.001UON001746382001 ˆLes ‰ Fondamentaux210 ParisHachette.30Linguistica franceseUONC049872FIFRParisUONL002984440Lingue romanze (Lingue neolatine) Francese21MaingueneauDominiqueUONV138532132287HachetteUONV247610650ITSOL20251114RICASIBA - SISTEMA BIBLIOTECARIO DI ATENEOUONSIUON00488558SIBA - SISTEMA BIBLIOTECARIO DI ATENEOSI FS 07229 SI FP 12525 5 Énonciation en linguistique française1727205UNIOR