GOVERNMENTAL ACCESS TO ENCRYPTED INFORMATION - To What Extent and How to Achieve that Extent?

Hamid Turab Mirza

2008

Abstract

No body can deny the importance of encryption technology in today’s communications, with all the benefits it has also posed some threats, due to which, governments and regulatory bodies have great concern about encrypted information and have set out some policies and are still busy in regulating the wide spread use of encryption technology. In an attempt to control the encryption technology to make the society safe from the threats of terrorism and crime, governments have over shadowed the benefits of encryption technology for the privacy, liberty of the citizens and economic growth of the nation. There has been a lot of opposition and criticism on these policies, and society has objected to the demands of governments over encryption technology, and have demanded balanced solutions that should take safety within the context of free society and not otherwise.

References

  1. American Civil Liberties Union. (2004). “Echelon Watch”. American Civil Liberties Union. [Online]. New York: ACLU, American Civil Liberties Union. http://archive.aclu.org/echelonwatch/faq.html
  2. Akdeniz, Y. and Walker, C. (2000). “Whisper who dares: encryption, privacy rights and the new world disorder”. In: Akdeniz, Y., Walker, C. and Wall, D. (ed.), The Internet, Law and Society, pp. 317-348. Longman, 2000.
  3. Abelson, H., Anderson, R., Bellovin, Steven M., Benaloh, J., Blaze, M., Diffie, W., Gilmore, J., Neumann, Peter G., Rivest, Ronald L., Schiller, Jeffrey I. & Schneier, B. (1998). “The Risks Of 'Key Recovery,78 'Key Escrow,78 And 'Trusted Third-Party' Encryption”. Center for Democracy and Technology. [Online]. Washington : Center for Democracy and Technology. http://www.cdt.org/crypto/risks98/.
  4. Akdeniz, Y., Clarke, O., Kelman, A., Oram, A. (1997). “Cryptography and Liberty: 'Can the Trusted Third Parties be Trusted ? A Critique of the Recent UK Proposals'”. The Journal of Information, Law and Technology (JILT). [Online]. The Journal of Information, Law and Technology (JILT) 1997 (2). http://www2.warwick.ac.uk/fac/soc/law/elj/jilt/1997_2 /akdeniz/.
  5. Barrett, J. (2004). “An Enormous Waste of Money, A security expert argues that America is spending its money ineffectively in the fight against terrorism”. Newsweek, Inc. [Online]. MSNBC: 2004 Newsweek, Inc. 17 March 2004. http://www.msnbc.msn.com/id/ 4549661/
  6. Barth, Richard C. and Smith, Clint N. (1997). “International Regulation of Encryption: Technology Will Drive Policy”. In: Kahin, B. and Nesson, C. (ed.), Borders in Cyberspace: Information Policy and the Global Information Infrastructure, pp. 283-299. The MIT Press, 1997.
  7. Eden, P. (2000). “Electronic commerce - law and policy”. In: Akdeniz, Y., Walker, C. and Wall, D. (ed.), The Internet, Law and Society, pp. 349-369. Longman, 2000.
  8. France, Elizabeth. (1998). “Privacy and Openness: Data Protection, Privacy and Confidentiality”. In: McDonald, A. and Terrill, G. (ed.), Open Government, Freedom of Information and Privacy, pp. 45-66. London: Macmillan, 1998.
  9. Gaver, J. (2000). “Encryption: Why You Should Use it, Why the Feds Want it Stopped”. Action America. [Online]. Action America: Uncommon Insight into Common Issues. 10 October 1999. http:// www.actionamerica.org/privacy/encrypt.html.
  10. Hughes, Eric. (2001). “A Cypherpunk's Manifesto”. In: Schneier, B. & Banisar, D. (ed.). The Electronic Privacy Papers, Documents on the Battle for Privacy in the Age of Surveillance, pp. 285-287. John Wiley & Sons, 1997.
  11. Jayasekera, R. (2001). “Internet: Mass surveillance, Bug them all and let Echelon sort them out”. Index on Censorship. [Online]. Index on Censorship: for free expression. 8 November 2001. http:// www.indexonline.org/news/20011108_europe.shtml.
  12. Levi, M. (2001). “Between the risk and the reality falls the shadow, Evidence and urban legends in computer fraud (with apologies to T.S. Eliot)”. In: Wall, David S. (ed.), Crime and the Internet, pp. 44-58. London: Routledge, 2001.
  13. Martin, B. (1998). Information Liberation, Challenging the corruptions of information power. London: Freedom Press, 1998.
  14. Silverman, Debra L. (2000). “Freedom of Information: Will Blair be Able to Break the Walls of Secrecy in Britain?”. In: Vaughn, Robert G. (ed.), Freedom of Information, The International Library of Essays in Law & Legal Theory, Second Series, pp. 351-433. Ashgate Pub Co, 2000.
  15. Schneier, B. and Banisar, D. (1997). The Electronic Privacy Papers, Documents on the Battle for Privacy in the Age of Surveillance. John Wiley & Sons, 1997.
  16. The Center for Democracy and Technology. (2001). “U.S. Encryption Policy, Current Encryption Export Regulations”. Center for Democracy and Technology. [Online]. Washington : Center for Democracy and Technology. http://www.cdt.org/crypto/admin/.
  17. Townsend & Taphouse. (1998). Politics of Decryption, TECS, Intelligence Papers, Cracking DES [Online]. Townsend & Taphouse. http://www.itsecurity.com/ papers/crackdes2.htm.
  18. Wall, D. (2001). “Maintaining order and law on the Internet”. In: Wall, David S. (ed.), Crime and the Internet, pp. 167-183. London: Routledge, 2001.
  19. Walker, C., Wall, D. and Akdeniz, Y. (2000). “The Internet, law and society”. In: Akdeniz, Y., Walker, C. and Wall, D. (ed.), The Internet, Law and Society, pp. 3-24. Longman, 2000.
  20. Zimmermann, Philip R. (1995). The Offical PGP User's Guide. The MIT Press, 1995.
Download


Paper Citation


in Harvard Style

Turab Mirza H. (2008). GOVERNMENTAL ACCESS TO ENCRYPTED INFORMATION - To What Extent and How to Achieve that Extent? . In Proceedings of the Fourth International Conference on Web Information Systems and Technologies - Volume 2: WEBIST, ISBN 978-989-8111-27-2, pages 467-473. DOI: 10.5220/0001531604670473


in Bibtex Style

@conference{webist08,
author={Hamid Turab Mirza},
title={GOVERNMENTAL ACCESS TO ENCRYPTED INFORMATION - To What Extent and How to Achieve that Extent?},
booktitle={Proceedings of the Fourth International Conference on Web Information Systems and Technologies - Volume 2: WEBIST,},
year={2008},
pages={467-473},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0001531604670473},
isbn={978-989-8111-27-2},
}


in EndNote Style

TY - CONF
JO - Proceedings of the Fourth International Conference on Web Information Systems and Technologies - Volume 2: WEBIST,
TI - GOVERNMENTAL ACCESS TO ENCRYPTED INFORMATION - To What Extent and How to Achieve that Extent?
SN - 978-989-8111-27-2
AU - Turab Mirza H.
PY - 2008
SP - 467
EP - 473
DO - 10.5220/0001531604670473