LEADER 03579nam 2200565 450 001 9910809950503321 005 20200520144314.0 010 $a0-309-47156-7 010 $a0-309-47154-0 035 $a(CKB)4100000004837231 035 $a(MiAaPQ)EBC5389609 035 $a(Au-PeEL)EBL5389609 035 $a(OCoLC)1032788096 035 $a(BIP)062914429 035 $a(EXLCZ)994100000004837231 100 $a20180604d2018 uy 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 00$aDecrypting the encryption debate $ea framework for decision makers 210 1$aWashington, DC :$cThe National Academies Press,$d[2018] 210 4$d2018 215 $a1 online resource (xiv, 104 pages) 225 1 $aConsensus study report 311 $a0-309-47153-2 330 8 $aEncryption protects information stored on smartphones, laptops, and other devices - in some cases by default. Encrypted communications are provided by widely used computing devices and services - such as smartphones, laptops, and messaging applications - that are used by hundreds of millions of users. Individuals, organizations, and governments rely on encryption to counter threats from a wide range of actors, including unsophisticated and sophisticated criminals, foreign intelligence agencies, and repressive governments. Encryption on its own does not solve the challenge of providing effective security for data and systems, but it is an important tool.At the same time, encryption is relied on by criminals to avoid investigation and prosecution, including criminals who may unknowingly benefit from default settings as well as those who deliberately use encryption. Thus, encryption complicates law enforcement and intelligence investigations. When communications are encrypted "end-to-end," intercepted messages cannot be understood. When a smartphone is locked and encrypted, the contents cannot be read if the phone is seized by investigators.Decrypting the Encryption Debate reviews how encryption is used, including its applications to cybersecurity; its role in protecting privacy and civil liberties; the needs of law enforcement and the intelligence community for information; technical and policy options for accessing plaintext; and the international landscape. This book describes the context in which decisions about providing authorized government agencies access to the plaintext version of encrypted information would be made and identifies and characterizes possible mechanisms and alternative means of obtaining information. 410 0$aConsensus study report. 606 $aData encryption (Computer science) 606 $aComputer networks$xSecurity measures$xSocial aspects 606 $aPrivacy, Right of$zUnited States 606 $aCivil rights$zUnited States 610 $aData Encryption (Computer Science) 610 $aComputers 615 0$aData encryption (Computer science) 615 0$aComputer networks$xSecurity measures$xSocial aspects. 615 0$aPrivacy, Right of 615 0$aCivil rights 676 $a005.82 712 02$aDivision on Engineering and Physical Sciences, 712 02$aComputer Science and Telecommunications Board, 712 02$aCommittee on Law Enforcement and Intelligence Access to Plaintext Information, 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910809950503321 996 $aDecrypting the encryption debate$93916852 997 $aUNINA