Arguing for the proposition that strong encryption should be restricted to licensed users only.
Cryptography has been in use for thousands of years. One of the earliest recorded uses of written encryption dates back to 1900 BC, where an Egyptian scribe used a personal set of hieroglyphs to document an inscription (Kahn, 1967). Organized crime and terrorist organizations have long used innovative techniques to conceal their communications and interactions to stay ahead of the law, pass directions and instructions (Denning & Baugh, 1997; Diffie & Landau, 2007). Simple cryptographic algorithms such as the Ceaser Cipher have been, and always will be, accessible to the general public (Wagner, 2003). However, military and government grade cryptographic devices have been out of reach, if not difficult to obtain and use, due to the strict control in their distribution (Controlled Goods Program, 2015).
Commercial encryption technology, on the other hand, is available to anyone willing to invest in it. To actually control who purchases licenses for software or hardware would be challenging as purchases could be made through proxy organizations. However, there needs to be a concerted effort towards regulating the sale of encryption licenses to prevent, or severely limit, criminals and terrorist organizations from being able to utilize them with nefarious intent. Denning & Baugh (1997, p.86-87) states that encryption poses four levels of threat to law enforcement, public safety and national security. These are failure to obtain evidence to convict, failure to obtain intelligence vital for investigations, failure to avert catastrophic attacks and failure to collect foreign intelligence vital for national security assurance.
The usage of encryption technology by organizations that threaten national security makes it challenging for security organizations to interdict and collect signals and communication intelligence that could be used to deter terrorist acts against the nation. Additionally, as a matter of public safety, it is imperative that access to encryption technology is limited.
References
Controlled Goods Program. (2015, Sept 24). Retrieved from Public Works and Government Services Canada: http://ssi-iss.tpsgc-pwgsc.gc.ca/dmc-cgd/index-eng.html
Denning, D. E., & Baugh, E. W. (1997). Encryption and evolving technologies: Tools of organized crime and terrorism. Trends in Organized Crime, 3(1), 84-91. doi:10.1007/s12117-997-1149-1
Diffie, W., & Landau, S. (2007). Privacy on the line: The politics of wiretapping and encryption. MIT Press.
Kahn, D. (1967). The CodeBreakers. Macmillan.
Wagner, N. R. (2003). The laws of cryptography. Retrieved from http://www.cs.utsa.edu/~wagner/lawsbookcolor/laws.pdf
The Landing is a social site for Athabasca University staff, students and invited guests. It is a space where they can share, communicate and connect with anyone or everyone.
Unless you are logged in, you will only be able to see the fraction of posts on the site that have been made public. Right now you are not logged in.
If you have an Athabasca University login ID, use your standard username and password to access this site.
We welcome comments on public posts from members of the public. Please note, however, that all comments made on public posts must be moderated by their owners before they become visible on the site. The owner of the post (and no one else) has to do that.
If you want the full range of features and you have a login ID, log in using the links at the top of the page or at https://landing.athabascau.ca/login (logins are secure and encrypted)
Posts made here are the responsibility of their owners and may not reflect the views of Athabasca University.