adopt alternative approaches to policing, as
criminals cannot be completely prevented from
having an access to strong encryption and bypassing
the escrowed encryption, on the other hand extreme
policies will have drastic affect on the
developmental policies of the government to make
Britain a liberal society, a favorable location for e-
commerce and network development.
7 CONCLUSIONS
In this Information Age no one can deny the benefits
and importance of encryption, due to advancements
in technology the way people communicate has
changed and it is necessary that this communication
should be secure, encryption technology is used for
the same purpose. Today business and citizens
highly rely on the encryption technology for the
reliable communications, but with all the benefits
encryption has also posed the threats, fears that
criminals can also use the same technology for
carrying out their crime and it could be to the extent
of national security. Due to these threats
governments have shown their concerns and are
busy in developing policies and regulations to
control the wide spread of strong encryption, so that
they can intercept any communication when ever
they want to. For this reason different governments
have passed different regulations, these regulations
allow enforcement agencies to access or intercept
any communication or data. Apparently the reason
behind this is national security and law enforcement
for the public safety.
These regulations and proposals have a lot of
problems and loop holes, which have been highly
criticized by many societies. According to those
regulations every body using the strong encryption
software should submit his keys to some trusted
third party from which government or law
enforcement agencies could get the key and access
the private or confidential information without the
knowledge of the owner of that information or data.
This is clearly against the liberty and privacy rights
of the citizens, and will make the whole
communication system insecure for commercial
business in specific and private users in general.
Society has reacted to these demands of
governments to have access to private, confidential
information to this extent. It has been argued that
these policies are only taking in account the national
security and demands of law enforcement agencies
and are overshadowing the basic concept of liberal
and free society. Hence it is demanded that there
must be some balanced approach to this issue, which
is acceptable for the citizens, industry and
governments.
REFERENCES
American Civil Liberties Union. (2004). “Echelon
Watch”. American Civil Liberties Union. [Online].
New York: ACLU, American Civil Liberties Union.
http://archive.aclu.org/echelonwatch/faq.html
Akdeniz, Y. and Walker, C. (2000). “Whisper who dares:
encryption, privacy rights and the new world
disorder”. In: Akdeniz, Y., Walker, C. and Wall, D.
(ed.), The Internet, Law and Society, pp. 317-348.
Longman, 2000.
Abelson, H., Anderson, R., Bellovin, Steven M., Benaloh,
J., Blaze, M., Diffie, W., Gilmore, J., Neumann, Peter
G., Rivest, Ronald L., Schiller, Jeffrey I. & Schneier,
B. (1998). “The Risks Of ‘Key Recovery,’ ‘Key
Escrow,’ And ‘Trusted Third-Party’ Encryption”.
Center for Democracy and Technology. [Online].
Washington : Center for Democracy and Technology.
http://www.cdt.org/crypto/risks98/.
Akdeniz, Y., Clarke, O., Kelman, A., Oram, A. (1997).
“Cryptography and Liberty: ‘Can the Trusted Third
Parties be Trusted ? A Critique of the Recent UK
Proposals’”. The Journal of Information, Law and
Technology (JILT). [Online]. The Journal of
Information, Law and Technology (JILT) 1997 (2).
http://www2.warwick.ac.uk/fac/soc/law/elj/jilt/1997_2
/akdeniz/.
Barrett, J. (2004). “An Enormous Waste of Money, A
security expert argues that America is spending its
money ineffectively in the fight against terrorism”.
Newsweek, Inc. [Online]. MSNBC: 2004 Newsweek,
Inc. 17 March 2004. http://www.msnbc.msn.com/id/
4549661/
Barth, Richard C. and Smith, Clint N. (1997).
“International Regulation of Encryption: Technology
Will Drive Policy”. In: Kahin, B. and Nesson, C. (ed.),
Borders in Cyberspace: Information Policy and the
Global Information Infrastructure, pp. 283-299. The
MIT Press, 1997.
Cyber-Rights & Cyber-Liberties. (2000). “Interception
Capabilities 2000, Report to the Director General for
Research of the European Parliament (Scientific and
Technical Options Assessment programme office) on
the development of surveillance technology and risk of
abuse of economic information Regulations”. Cyber-
Rights & Cyber-Liberties. [Online]. Leeds: Cyber-
Rights & Cyber-Liberties. http://www.cyber-
rights.org/interception/stoa/ic2kreport.htm#Summary.
Eden, P. (2000). “Electronic commerce – law and policy”.
In: Akdeniz, Y., Walker, C. and Wall, D. (ed.), The
Internet, Law and Society, pp. 349-369. Longman,
2000.
France, Elizabeth. (1998). “Privacy and Openness: Data
Protection, Privacy and Confidentiality”. In:
WEBIST 2008 - International Conference on Web Information Systems and Technologies
472