Moving the Encryption Policy Conversation Forward


Book Description

The group behind this paper—including former government officials, business representatives, privacy and civil rights advocates, law enforcement experts, and computer scientists—came together believing that more common ground is attainable and that the discussion can be best honed through specific, honest, and open-minded discussion among diverse perspectives. Our goals are: (1) to engage in and promote a more pragmatic and constructive debate on the benefits and challenges of the increasing use of encryption; (2) to identify specific areas where greater common ground may be possible; and (3) to propose potentially more fruitful ways to evaluate the societal impact, including both benefits and risks, of any proposed approaches that address the impasse over law enforcement access to encrypted data. We should highlight that we approach this issue from the point of view of stakeholders in the United States and discuss our framework for evaluating approaches in the U.S. context with policymakers at the national level as the target audience.







Secret History


Book Description

The first edition of this award-winning book attracted a wide audience. This second edition is both a joy to read and a useful classroom tool. Unlike traditional textbooks, it requires no mathematical prerequisites and can be read around the mathematics presented. If used as a textbook, the mathematics can be prioritized, with a book both students and instructors will enjoy reading. Secret History: The Story of Cryptology, Second Edition incorporates new material concerning various eras in the long history of cryptology. Much has happened concerning the political aspects of cryptology since the first edition appeared. The still unfolding story is updated here. The first edition of this book contained chapters devoted to the cracking of German and Japanese systems during World War II. Now the other side of this cipher war is also told, that is, how the United States was able to come up with systems that were never broken. The text is in two parts. Part I presents classic cryptology from ancient times through World War II. Part II examines modern computer cryptology. With numerous real-world examples and extensive references, the author skillfully balances the history with mathematical details, providing readers with a sound foundation in this dynamic field. FEATURES Presents a chronological development of key concepts Includes the Vigenère cipher, the one-time pad, transposition ciphers, Jefferson’s wheel cipher, Playfair cipher, ADFGX, matrix encryption, Enigma, Purple, and other classic methods Looks at the work of Claude Shannon, the origin of the National Security Agency, elliptic curve cryptography, the Data Encryption Standard, the Advanced Encryption Standard, public-key cryptography, and many other topics New chapters detail SIGABA and SIGSALY, successful systems used during World War II for text and speech, respectively Includes quantum cryptography and the impact of quantum computers




Transformations in Criminal Jurisdiction


Book Description

Can traditional approaches to criminal jurisdiction adapt to the new global reality of the digital era? In this innovative book, leading experts in criminal, international and internet law unite to address this fundamental question. They consider how jurisdictional regimes are orientated around concepts of territoriality and extraterritoriality, how these categories are increasingly blurred in the digital era, and how a range of jurisdictional transformations are occurring in the process. Part I presents novel doctrinal, empirical and theoretical perspectives on criminal jurisdiction, exploring how states are shaping and reimagining jurisdictional concepts in the crafting and interpretation of criminal offences, and the ramifications of increasing jurisdictional concurrency in state practice. Part II focuses on the investigative and enforcement powers of the state to assess how these issues are transforming traditional understandings of jurisdictional rules and boundaries, the challenges and opportunities that these present for law enforcement authorities, and the sorts of constraints and safeguards that may be necessary as a result. The picture that emerges is a world of jurisdictional rules in a state of flux, which demands the diversity of legal perspectives presented in this book for documenting, rationalising and moving beyond the transformations that are taking shape in modern statecraft.







Decrypting the Encryption Debate


Book Description

Encryption protects information stored on smartphones, laptops, and other devices - in some cases by default. Encrypted communications are provided by widely used computing devices and services - such as smartphones, laptops, and messaging applications - that are used by hundreds of millions of users. Individuals, organizations, and governments rely on encryption to counter threats from a wide range of actors, including unsophisticated and sophisticated criminals, foreign intelligence agencies, and repressive governments. Encryption on its own does not solve the challenge of providing effective security for data and systems, but it is an important tool. At the same time, encryption is relied on by criminals to avoid investigation and prosecution, including criminals who may unknowingly benefit from default settings as well as those who deliberately use encryption. Thus, encryption complicates law enforcement and intelligence investigations. When communications are encrypted "end-to-end," intercepted messages cannot be understood. When a smartphone is locked and encrypted, the contents cannot be read if the phone is seized by investigators. Decrypting the Encryption Debate reviews how encryption is used, including its applications to cybersecurity; its role in protecting privacy and civil liberties; the needs of law enforcement and the intelligence community for information; technical and policy options for accessing plaintext; and the international landscape. This book describes the context in which decisions about providing authorized government agencies access to the plaintext version of encrypted information would be made and identifies and characterizes possible mechanisms and alternative means of obtaining information.




The Effect of Encryption on Lawful Access to Communications and Data


Book Description

The Internet has become central to global economic activity, politics, and security, and the security environment has changed recently, as we face much more aggressive state actors in espionage. Terrorists and criminals find creative ways to leverage the latest technologies to evade security and privacy protections, but there may be technical and policy solutions that can balance national security and public safety with protection of privacy, civil liberties, and a functioning global Internet ecosystem.




U.S. Encryption Policy


Book Description




Encryption Security in a High Tech Era


Book Description




The Encryption Debate


Book Description