Executive Summary
Encryption plays a critical role in data privacy and security by safeguarding online communications, enabling free speech, and protecting financial transactions, among other things. The Center for Cybersecurity Policy & Law, along with the vast majority of the cybersecurity community, believes weakening encryption would jeopardize the security, privacy, civil liberties, and vital social interests of every organization and individual.
While encryption protects individuals against crimes, like identity theft or unlawful surveillance, law enforcement and national security agencies argue that encryption makes it more challenging, or impossible, for law enforcement to investigate crimes and threats to public safety. Some argue, in the digital age, investigation necessarily requires digital evidence, including intercepted and decrypted communications related to public safety, terrorism, and child sex abuse materials (CSAM).
Opponents of encryption have framed this as a debate with two opposing sides, when we are actually united by a common cause against the same adversaries. Encryption protects everyone, including children and other vulnerable populations. Technology companies, including social media sites and messaging applications, do not want to be conduits to criminal activities or have illicit materials on their platforms.
The authors of this paper believe that it is time to rethink the conversation. As such, government and law enforcement must take a practical, incremental approach to policies and legislation that affect law enforcement and online security, rather than mandating ubiquitous surveillance that can circumvent encryption.
This paper will:
- Examine the historic discussion and arguments around encryption policy.
- Review recurring themes among proposals in the context of current policies and legislation.
- Establish how the modern encryption debate should proceed.
- Address the potential challenges should the discourse remain unaltered.
To download the paper in Japanese click here.
To download the paper in Korean click here.
To download the paper in Spanish click here.
To download the paper in Turkish click here.
Read Next
What States Can Learn from North Carolina’s Approach to Securing Government
As states across the country grapple with how to adopt AI responsibly, North Carolina offers a compelling case study - not because it has all the answers, but because it has built the institutional muscle to learn, adapt, and lead.
Developing a National Cybersecurity Strategy
Developing a national cybersecurity strategy is a critical investment a government can make to secure its future. This paper outlines the components and offers a framework with the tools to design, implement, and improve their strategies.
FedRAMP Signals Acceleration of Requirements for Machine-Readable Packages in the Rev5 Process
FedRAMP has proposed modifications to the Rev5 process in the newly published RFCs that could enact major changes and require Cloud Service Offerings to provide authorization packages in a “machine-readable format.”
