Six Reasons Why Encryption Back Doors Won’t Deter Terrorists
Blog Article Published: 11/20/2015
By Willy Leichter, Global Director of Cloud Security, CipherCloud Last week’s tragic events in Paris, and fears over similar terrorist attacks around the world, have revived a long-standing debate. Early evidence suggests that the terrorists used a readily available encryption app to hide their plans and thwart detection by law enforcement. This has led to finger-pointing by intelligence officials and politicians demanding that something be done to control this dangerous technology. Keep in mind that the terrorists also used multiple other dangerous technologies including consumer electronics, explosives, lots of guns, cars, trains and probably airplanes – but these are better understood and attract less grandstanding about controlling them. Setting aside the obvious privacy concerns, the argument for weakening encryption ignores a basic question – can this technology really be controlled? More specifically, those arguing for diluted encryption are demanding “back doors” that would allow easier access by law enforcement. For many reasons, this idea simply won’t work and will have no impact on bad guys. It also could have serious unintended negative consequences. Here are a few reasons why:
- Encryption = Keeping Secrets
- Who Keeps the Keys to the Back Door?
- Keys to the Back Doors Can Easily Get into the Wrong Hands
- To Control Encryption You Need to Control Math
- The Tools Do Not Cause the Actions
- Neutering Encryption Will Hurt Legitimate Businesses
Share this content on your favorite social network today!