1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
|
.R1
short-label D.y
sort
.R2
.TL
\f[B]Cryptography, crime, terror, and surveillance
.AU
\f[R]Mohit Agarwal
.AI
March 2022
.LP
Modern encryption methods permit a level of privacy in communication
that has not before been seen: information that is encrypted cannot be
decrypted without the necessary keys, with algorithms such as RSA where security
is ensured by the large primes involved and the current intractability
of prime factorisation. This allows for communication that is
practically guaranteed to be private; a relatively new phenomenon in
communications. In the past, this has been seen with the one-time pad
{Rijmenants} which was cryptographically secure and used by both
the KGB and NSA, well beyond the use of the Enigma and Lorentz
machines by the Nazis which were both decrypted through
cryptanalysis methods during the Second World War. Today, however, secure
cryptographic methods are used not only by government backed agencies
in preventing or practising espionage, but by individual citizens who
are interested in their privacy, security, or are simply using a
computer program that happens to encrypt their communications. Naturally,
current availability of cryptography potentially allows malicious
actors such as criminals or terrorists to use encryption in order to
commit crimes or acts of terror. In response to the threats of
encryption and communications technology generally, governments have
engaged in signals intelligence (Sigint) such as phone line tapping.
Modern Sigint initiatives have become rather complex and
sophisticated and have grown greatly alongside the popular adoption of
information technology.
Part of government interest in Sigint is a direct response
to perceived threats, such as the PATRIOT Act in the US which followed
the 2001 terrorist attacks with the objective of strengthening
national security {PATRIOT ACT Congress}. Later, the FISA Amendments Act of 2008
further increased the powers of law enforcement to access
information, such as allowing the Attorney General and Director of
National Intelligence to gather information about individuals outside
the United States {H.R. FISA congress}. It was, however, the PATRIOT
Act and FISA Amendments Act that was the justification for large scale
surveillance including the government access of phone calls records of
customers of the Verizon network, including calls from the US to other
states as well as calls localised entirely within the US {guardian
greenwald verizon}{guardian NSA roberts}{times savage 2013}. State
sponsored Sigint programmes such as that in the US aims to respond to
encryption and other technological developments with the primary
interest of overcoming it in order to prevent terror and crime. These
measures have, however, had arguably limited effectiveness and have
violated the privacy of individuals who are not suspected to be a
threat to national security. Responses to encryption
will have significant consequences, given the
potential importance of the information being communicated and the
prevalence of electronic communication methods. Successful
Sigint and cryptanalysis by government agencies can
respond to modern threats of crime and terror. A failure of
responsible governance, however, may not only threaten the privacy of
individuals unnecessarily but also fail to respond to the ways in
which criminals and terrorists are using encryption, existing thereby
only as a tool of authoritarian control.
An argument is often made against allowing widespread use of
encryption and generally against widespread effective operations
security (OPSEC) in the public sector in the interest of
national security and the prevention of terror. With access to
communications and usage history, governments can gather significant
information on terrorists and use this intelligence against
terrorists. It is clear that intelligence and surveillance play a significant role in
counterterrorism. The 9/11 terrorist attacks are seen potentially as a
phenomenal failure of intelligence as detailed in The 9/11 Commission
report {#9/11 commission report}. The report explores the fact that
there was potentially knowledge to indicate a terrorist attack before
September 2001 (chapter 8). The report details institutional failures
and also emphasised the difficulty and importance of intelligence in
counterterrorism {intelligence and national security}. Graham{#CTC
terrorists} explores the use of encryption by terrorists which is
often cited as a reason for giving governments access to unencrypted
Internet communications so that suspicious activity can be flagged and
investigated in order to prevent a terror attack or in order to better
respond in the case of an attack. Graham describes the extensive use
of end-to-end encryption by terrorists in order to avoid
interception by the authorities. Due to U.S. usage of intercepted
communications to uncover and prevent a number of al-Qaeda plots, the
terrorist organisation and other terrorist groups have increasingly
used encrypted communications. A
significant factor is the use of non-mainstream software in the early use
of encryption by terrorists, including a program that built a wrapper
around the popular, secure, and open source PGP called \fIMujahedeen
Secrets\fR by al-Qaeda. Although now terrorists and criminals use widely
available, popular, and user-friendly software such as the Tails
operating system or Telegram, terrorist
organisations have shown an ability to make use of more obscure and
complicated systems, as well as to use publicly available source code in
order to construct software for operatives to use.
Although the issue of popular messaging technologies and their support
for \[oq]end-to-end encryption\[cq] is often discussed, the argument that the
introduction of end-to-end encryption by large companies such as
Facebook gives an advantage to criminals {conversation Facebook}{home
office} is arguably an invalid one. By preventing the usage of true
end-to-end encryption in industry, we will not be able to prevent
those attempting to evade the law from doing so, as shown in the case
of terrorist organisations who have used more obscure software in the
past and also in the case of the abundance of illegal activity that
occurs on the so-called \[oq]dark web\[cq] in the form of the trade of drugs and
child pornography among others {gulati deep web}. Instead, the
limitation of use of encryption on popular software will only decrease
the privacy of those uninterested in criminal activity and instead
using more popular software without regard for its security features
or lack thereof. The information exposed by Edward
Snowden in 2013 demonstrates that the US government has processed and
collected vast amounts of unencrypted data and possibly
continues to do so. In the case of unencrypted communication, the
problem remains and preventing end-to-end encryption will simply allow
governments to maintain the status quo of being able to intercept and
read all communications between their citizens and individuals outside
of their jurisdictions. Indeed, should end-to-end encryption continue,
perchance, to be opposed by governments both in the West and in
countries like China, it will arguably a method of allowing a
government to practise surveillance and of perpetuating a surveillance
state.
In the GDR (German Democratic Republic, also known as \[oq]East
Germany\[cq]), in order to conduct surveillance on behalf of the
ruling party {Jarausch}, the Stasi (\fIMinisterium für
Staatssicherheit\fR, or \[lq]Ministry for State Security\[rq]) relied
on a sprawling network of informants and agents. In particular,
informants \[en] who greatly outnumbered agents {Bruce 2014} \[en]
formed large parts of this network and were deeply integrated into the fabric of
society. This contributed to a far more complete surveillance state
and an atmosphere of terror amongst the people. Whilst in Nazi Germany
there may have been around one Gestapo agent for every 2300 citizens,
in the GDR it was closer to one informant or officer for every 63
citizens. Those living in the GDR often had experiences involving
investigation by the Stasi and there was clearly an understanding
amongst citizens that one had to be wary of an
informant or agent listening in {funder}. In modern Western society,
there is a similar collective understanding that governments
carry out surveillance on a massive scale on their own
citizens. A key distinction today, however, is that
this work is not carried out by a vast network of informants,
there are no kilometres of paper, and there are no
collections of film and photographs {The Federal Archives} documenting and aiding the
surveillance of the authorities. Instead, the level of surveillance
that large, secretive groups of individuals once had to carry out in
order to enable a surveillance state can be performed through
bureaucracies and technological methods. In modern times, governments
can operate with a very limited number of operatives \[oq]on the
ground\[cq] and instead focus attention on the giant amounts of data
they have for processing in order to make the findings they intend to:
be it crime, terrorism, or \[en] as was the case in the Gestapo and
Stasi \[en] descent.
.HLINE
.LP
As has occurred with technological developments in the past,
legislation will continue to follow developments relating to
information technology, such as the General Data Protection Regulation
in the European Union which has had significant influence in the
technology industry {EUR-Lex}{Harvard Downes}.
Yet encryption presents unique challenges to
lawmakers. Not only will encryption be difficult to regulate due to
its rapid development, but perhaps expressly due to its decentralised
nature, where a government cannot prevent the existence of software
that enables encryption that is open source and reproducible
internationally. Just as media piracy through torrents and access to
hidden services over Tor are able to evade regulation, regulation of
encryption may prove impossible. An arguably useful tool to the
authorities does exist in the hardware and infrastructure that users
of the Internet rely on. In the West, a small number of companies (such
as Intel, Nvidia, Arm and Apple) design and produce the majority of
hardware in a proprietary and closed source manner.
Concerns have already been expressed with regard to
the Intel Management Engine {Intel Management portnoy} that exists on
modern processors produced by Intel.
Arguments have been made that the Intel Management Engine already acts
as a backdoor for government agencies {TechRepublic backdoor}, and the potential is
clearly there for US government interests in mass data collection and
Sigint following 9/11 to lead to the introduction of backdoors in
popular technology. We are aware that in the case of the Intel
Management Engine a switch for disabling functionality is present for use by
US government authorities such as the NSA, demonstrating the level of
leverage the US government potentially has over organisations
including but not limited to Intel {register kill switch}{intel me
bleepingcomputer}. The potential exists for such systems to be built
into non-open hardware which most people \[en] even those using open
software \[en] use, leaving them open to exploitation from either
state or private actors. Furthermore, there is a visible interest in
increasing the presence of technologies on the hardware level,
including the aforementioned Intel Management Engine, the Trusted
Platform Module {TPM Verge}, and recently Microsoft's Pluton {pluton
goodin} subsystem which will be present on hardware sold in the future. This
variety of hardware within a single computer is a rather interesting
and potentially worrying development, particularly with the clear
level of influence, interest, and competitiveness both the US {US House
chip manufacturing bill} and Chinese governments have in their
respective national
chip manufacturing industries. In light of potential issues with
hardware, there have been developments in \[oq]open hardware\[cq].
RISC-V is an instruction set for processors from the University of
California at Berkeley; as opposed to Arm, Intel, and AMD processors,
RISC-V is an open standard for CPU design {case for RISC-V}. This allows for open
source CPU implementations, such as those designed at UC Berkeley, as
well as those from other parties, such as Alibaba Group {chen risc}. A
significant amount of existing software has been ported to the RISC-V
platform and alongside the Alibaba implementation for data centres,
the standard has been used by Google for a security module in the
\[oq]Pixel 6\[cq] smartphone {Pixel 6 Security Blog}. This attention and interest
potentially signals a shift towards increased demand for and utility
in open hardware for privacy, security or economic reasons. Another
poignant example of open hardware is the laptop created by the
manufacturer Framework Computer Inc, which is designed to be more
expandable, serviceable and repairable than other laptops available on
the market. The company and laptop gained significant media coverage
{Financial Times right to repair}{Wirecutter Framework} showing an
interest from the public in open hardware. An
argument can be made that such projects are for niche interest groups
only and that such solutions will never see the commercial success
seen by the larger, non-open manufacturers.
However, the clear adoption of standards such as RISC-V by large
institutions demonstrates quite the opposite: that open hardware will
continue to become increasingly prevalent and that currently popular
hardware with its susceptibility to surveillance will possibly have a
reduced presence in the future.
Movement towards open standards in both hardware and software
reveals a problem for law enforcement
agencies and counterterrorism forces. The tools of mass surveillance
that once enabled investigation into crime or terror such as reading
messages and e-mails, listening to calls or tracking location
may no longer be effective, thereby potentially
preventing such investigation to occur. For governments, this is
arguably the result of such heavy surveillance in the first place.
It is clear that knowledge such as the 2013 Snowden leaks had an impact
on the public and people are thereby more interested in
their privacy and preventing surveillance. Around the world,
individuals use tools to increase their privacy and anonymity when
using the Internet as well as to overcome censorship of information
by governments. A major exception to the availability of the free
Internet has been China, where the government has unparalleled and
unprecedented control over the flow of information over the Internet.
This has allowed the filtering of content, prevention from accessing
sites, and the blocking of the anonymity network Tor which would allow
users to circumvent measures put in place by the government
{firewall}{talbot tor china}{winter china tor}. Measures in China have
enabled the government to tightly control and monitor the flow of
information via the Internet; ensuring that citizens can only access
that which the ruling party should allow. Whether such draconian
measures could even be implemented in the more democratic West is
questionable, but the opportunity clearly exists for governments to
undermine the digital privacy of their citizens. Any such measures,
however, will face scrutiny from the media and public in Western
society and thereby open software such as Tor is used to freely share
significant amounts of information away from the observation of law
enforcement, allowing illegal activity to occur {gulati}. The reduced
ability for law enforcement to investigate crime will clearly have an
impact by allowing criminals to act with additional impunity. In
particular, the sharing of child sexual abuse material, trafficking and
other such crimes that are enabled by the Internet present reason for
concern.
It is, however, clear that the methods available to law enforcement are
not all exhausted due to technological change. Social engineering
methods; communications traffic analysis such as phone records;
metadata analysis from the underlying infrastructure of the Internet,
including public blockchains and Internet Service Provider data; and
traditional methods, such as searching for contraband goods are all
available to law enforcement despite measures used by criminals or
terrorists such as encryption. Indeed, one could argue that the
limitations on law enforcement investigations due to technology have a
limited impact on the efficacy of investigation, as other sources of
evidence have been effectively explored when encryption has been used,
particularly in the prevention of terror {Graham}. Thus, encryption
might only have a limited impact on law enforcement investigations
whilst having a serious impact on user privacy. Although encryption
can prevent some investigation the compromise is arguably acceptable
due to the net benefit encryption offers to society.
The rate of development in unconventional computing
methods is increasing rapidly. Effective quantum computing will
result in existing popular cryptographic algorithms such as RSA, which
is used for communications and digital signatures, no longer being
secure {Lily Chen quantum 2016}.
Significant research in recent years has shown
feasibility in current ideas surrounding quantum computing and
promising results in development towards quantum supremacy and the
future breakdown of current cryptographic methods.
Indeed, both in the US at Google {google supremacy nature} and in China
at a major university
{china quantum advantage}{science photons quantum advantage},
claims of \[oq]quantum supremacy\[cq] have been made,
suggesting that quantum computers will soon
become powerful enough to start making current encryption methods
obsolete.
Although this will not be an overnight transformation, changes
will be made by those implementing cryptography, both in the open
source space and in industry, as well as in government where
government agencies must act in order to protect their data. This
change will take place naturally and some have begun to
consider methods for post-quantum cryptography {nist alagic}.
Regulatory considerations about post-quantum cryptography are already
being made and arguments can be made that regulation should soon be written
that institutes standards and requirements in order to prepare for a
future with effective quantum computing {bruno post quantum}. Once
more, however, an issue reveals itself with the incongruity between
the speed of regulatory
change and the progress of technology. Changes will likely be made by
open software in order to maintain secure encryption, such as those
used by the open source web servers to encrypt Internet traffic, as
well as by large corporations such as Microsoft which provides
software used by many businesses and individuals. An issue may exist
in software that is less popular and legacy software which may not be
open to the scrutiny of open software and may lead to
vulnerabilities. Furthermore, the usage of post-quantum cryptography
by the public and the potential that it may help terrorists and
criminals to communicate might not be addressed in any meaningful way.
The lack of high level interest, initiative or funding from
governments has arguably prompted more independent development in the
public sphere:
the US National
Institute of Standards and Technology (NIST) made a public request for
nominations of post-quantum cryptographic algorithms {call for
proposals}, leading
to standards that will clearly influence future lawmaking.
This adoption of open processes and the
open auditing and implementation of future cryptographic standards is
most striking when compared with the \fIDual_EC_DRBG\fR algorithm.
This algorithm, which contained a vulnerability, was included in NIST
standards. The vulnerability allowed the NSA to potentially decrypt
Internet traffic such as e-mails. The NSA also allegedly paid
the firm RSA Security in order to implement the algorithm with its
backdoor in their
popular security products {menn nsa contract} and although the NSA
denies wrongdoing there was clearly NSA involvement with the company
that remains significant in the enterprise security space {goodin rsa
denial}{perlroth government}.
Individuals around the world have clearly expressed interest in
matters of privacy and encryption and open source software
allows those with the technical skills to become involved in the
development of technology that enables strong encryption and overcomes
state surveillance. Measures taken by governments to prevent this
development will doubtless be limited unless extreme actions such as
those seen in China are taken. Otherwise, development will continue to
occur in both free and non-free societies in support of individual
freedoms. The assertion of \[oq]Linus' law\[cq] that, \[lq]given enough eyeballs,
all bugs are shallow\[rq] creates a serious inability
for actors such as governments to engineer backdoors into software as
the NSA previously has or to prevent the development of
software altogether. On the other hand, the vast
majority of the software and hardware used by the general public is
proprietary. For many, this will continue to be the norm. Yet, the
pressure from increasing popular open source software will continue to
mount. The open source messaging platform \[oq]Signal\[cq] offers a
security oriented product and publishes requests they receive from
courts and law enforcement alongside their replies online {Signal
Grand Jury}{Ars Signal}. Demonstrating their respect for user privacy and that they are unable
to release data as they do not collect it is perhaps something that
users are finding more appealing. Indeed, when Apple refused to unlock
a phone for the FBI following a terrorist attack it gained
significant media attention and demonstrated that the defence of users'
privacy was a virtue for modern businesses, regardless of the fact
that the FBI was able to unlock the phone independently, which was
rather overlooked {Cook 2016}{FBI encryption Apple Guardian}. To
users today, both those with experience and
ability in technology and to the general public, privacy is
seemingly becoming a major selling point and a significant factor in the
way individuals chose to use technology.
Modern cryptographic algorithms are theoretically secure; the
underlying concepts mean that breaking the encryption to
intercept a communication is not possible in a reasonable amount of time
with current computational limits
and is, therefore, due to the nature of the algorithm, secure. This,
however, does not consider implementational flaws. Indeed,
implementational flaws are the ways in which modern exploits of
algorithms such as RSA occur, and methods such as timing
attacks and voltage level analysis attacks, as well as memory
attacks {Wong Timing attacks}{Barenghi Low Voltage}{RSA Key Cache} have
the potential to overcome any level of theoretical sophistication that
cryptographic algorithms may have, and simply give away information
such as keys. In addition to this, there can be
implementational issues in hardware, such as the recent Spectre
vulnerability which was discovered in 2018; revealing data to
an attacker due to flaws in speculative execution which speeds up processing in
modern processors. The vulnerability allowed for the attack of
cryptographic implementations such as GPG. This is potentially even
more concerning given that processor implementations are proprietary.
This flaw, which affects practically every modern processor and
indicates the potential for vulnerability in computer hardware, could be
exploited by any party with sufficient resources. Intel has released
multiple patches for Spectre, however, there remain concerns that
there is a potential for attacks in modern processors including new
processors made after 2018, and therefore potentially a real
threat to security {kocher spectre}.
The discussion of encryption and related technologies has arguably
limited impact. State actors such as the NSA will continue to act
against individual freedoms and attempt to find or introduce backdoors
in technology that is widely used as part of its actions purportedly
in the interest of national security. Although public reactions to
information such as the 2013 Edward Snowden releases have been very
strong, they have not had significant affects on legislature, the
funding received by the NSA, and quite possibly the level of
surveillance carried out by the NSA. Thus,
discussions in public or private spheres are unlikely to
influence decisions made inside already secretive agencies where
governments are ready to accept that sacrifices must be made for the
greater good. Of course, the issue arises when surveillance exists
that does not exist simply to protect a nation, but instead mass,
indiscriminate surveillance is carried out on citizens not suspected
of any criminal or terrorist activity such as the Tempora
programme in the United Kingdom {guardian fibre-optic},
however governments nonetheless
prove willing to fund the activities of surveillance agencies and will
seemingly continue to do so regardless of public opinion.
.HLINE
The executive summary of the 9/11 Commission Report {#9/11 commission
report} describes the September 2001 terrorist attacks as \[oq]a shock,
not a surprise\[cq]. In a similar light, the release of information
relating to mass surveillance and mishandling of data such as the 2013
Edward Snowden releases ought to also be potentially considered a
shock, not a surprise, given the level of data that both governments
and private organisations have access to and responsibility for.
Encryption enables people to trust companies and governments with
the handling of communications
such as e-mails and enables companies to be able to work with law
enforcement without compromising user privacy as encrypted data
cannot be read and is therefore useless to authorities.
The free market in the West
arguably has moved itself towards encrypted standards. Open source
initiatives have pioneered free implementations of secure
cryptographic standards, allowing any user to use these tools directly
in order to send information, such as the popular PGP
implementation GPG. Additionally, the open implementation of
cryptographic tools enables developers to integrate secure versions of
these tools into new programs, allowing for the easy development of
programs that allow encrypted communications. The demand for
cryptography in less popular open source applications is arguably
expected, yet there is nonetheless widespread adoption in more popular
software and proprietary software. Companies such as Facebook have
pushed for end-to-end encryption in their products and the software
industry at large has adopted encrypted standards such as
\f[R]HTTPS\fR.
The largest source of resistance to encryption is government
intervention. Government positions around the world which are opposed
to encryption seemingly have double standards. Just as the Enigma and
Lorentz machines were critical to the Nazi war effort in order to
conduct critical communications and the breaking of those ciphers were
critical to the Allies, encryption remains critical to government
communications and state sponsored espionage. Governments maintain up
to date cryptographic systems in order to keep their own
secure, yet fight hard against encryption in the name
of national security. In some ways this is a valid
argument: the availability of cryptography arguably lowers the
barrier to entry for terror or crime and reduces the ability law
enforcement has to deal with it. Nonetheless, it seems that reducing
the availability of encryption to the public would not decrease the
opportunity for criminals or terrorists to do harm.
Often we see two possible future realities: one with a perfect
surveillance state and police state ruled by fear and one with ultimate privacy and
total encryption. Both are open to significant abuse with those acting
on behalf of the ruling state violating the privacy, basic freedoms
and rights of the people in the former. In the latter criminals are able to use
technology both to hide their activities and enable their crimes
without fear of police interference; creating a near anarchic
existence. It seems that in the West, representations of the former in
dystopian cultural works such as those by George Orwell
or Margaret Atwood and journalistic coverage of
government surveillance and oppression in China form our view against
highly invasive state surveillance. Yet media coverage of criminals
and terrorists using technology and encryption, particularly following
events of terror; media and government discussing the risks of
technology; and the coverage of law enforcement using surveillance
tools to stop criminals shape our view of the latter scenario. I feel,
however, that this is a fallacious dichotomy that we have collectively
created. In the West, it seems that we have come too far for complete
surveillance to be effectively implemented, as the tools to overcome
such a regime already exist and there is a widespread sentiment of
resistance amongst the public and in governments and courts against
such invasive measures. Yet, even in a world of widespread encryption,
governments and law enforcement would demonstrably still be able to
conduct surveillance and investigation at some level. It is clear that
in the Internet age, it is no longer as easy to disguise or hide the
truth as it once was. Information has been shown extremely powerful in
subverting totalitarianism {Nicholson Cold War broadcast} and due to the
Internet regimes are less and less able to manipulate the truth. I
feel that the most interesting developments in the near future will be
how the Chinese government and people will react to developments in
technology and if the current state of surveillance, censorship and
propaganda will prevail as well as developments relating to encryption
and surveillance in the developing world wherever information
technology has not yet been widely available. In the West it seems
that a reasonable understanding is that being able to use encryption and
live without fear of ongoing surveillance relies on a people's will to
do so and enact such ideas in their own behaviour, even if certain
societal risks are accepted alongside that.
Our fear of crime and terror is justified but it seems that crime and
terror will find ways of existing regardless of policy that is not
excessively draconian. Terrorists are sometimes untrusting of modern
technology and prefer simply to meet in person, outside of the reach
of surveillance or Sigint. To fight crime and terror, it seems we must
turn to their root causes and ensure that ongoing deliberation and
logical dialectic on these complex issues shape policy in a manner
more informed and logical than simply engaging in such paranoid
measures as total mass surveillance or making encryption illegal or
difficult to access for the public.
.nr HY 0
.ad l
|