ENCRYPTION AND PRIVACY: THREATS TO PUBLIC SAFETY?

Vic Wukovits Thursday, December 3, 2015 Comments Off on ENCRYPTION AND PRIVACY: THREATS TO PUBLIC SAFETY?
ENCRYPTION AND PRIVACY: THREATS TO PUBLIC SAFETY?

The world is aghast at the recent terrorist attacks in Paris. Officials in the US government are quick to direct attention to encryption software, without which, they claim, they would be able to better prevent terrorist plots.

True, without encryption, governments and technically inclined individuals would be able to easily intercept communications. However, encryption exists because we, as a people, have a right to privacy.

As computing and processing power has increased, the algorithms and methods used for encryption software have also improved significantly. Codes and code breakers have been used in communications for thousands of years. Modern messaging uses end-to-end encryption for the privacy of the users … all users.

There will always exist a small group of deviants who are using these technologies for nefarious purposes. Government agencies want unfettered access to all communications to better monitor these threats. The government wants to have backdoors in encryption software for the purposes of protecting the public. By that rationale, they should have a copy of everyone’s house key just in case they need to drop in to keep things safe.

Using these terrorist attacks as justification for government surveillance on the public is a skewed cause and effect argument. Recent efforts to force companies like Apple to unveil their encryption for the “best interests” of everyone have been thwarted by the encryption methods themselves. Apple removed itself from the equation by using “end-to-end” encryption, which prevents anyone except the sender and receiver from reading the messages sent between them. With end-to-end encryption, Apple doesn’t store the decryption keys and is unable to decipher the messages.

WhatsApp, a messaging software that is wildly popular in Europe and Asia, is also being lambasted for using end-to-end encryption. The app appears to have been used by some of the perpetrators of the Paris attacks.

Even messaging through a gaming system has come under scrutiny. Authorities found a Sony Playstation 4 (PS4) at the home of one of the perpetrators. Wild news stories spun off stating that terrorists are using the PS4 to plan attacks. The problem is that the Playstation network isn’t using end-to-end encryption, and Sony can monitor communications on its own network.

There’s nothing more damning to a logical argument than hard facts. But why let that stop a dozen news stories from stirring the pot?

Even if back doors are implemented in encryption software to give national security agencies access to better protect and serve, by no means will this solve the problem. If major encryption vendors comply, that doesn’t stop third-parties from coding their own messages. Open source and custom software are commonplace and widely used, and there is no stopping people from using whatever methods they want to maintain their privacy.

There is a fine line between public safety and privacy. Wide-sweeping draconian measures designed to eliminate all threats of terrorist acts is not the solution. History proves that there will always be another way to circumvent whatever methods are in place to prevent prying eyes. Codes are made to be broken.

Where we need to take care in is the liberties we relinquish in the name of maintaining our safety.

Comments are closed.