• Skip to primary navigation
  • Skip to main content
  • Skip to footer
  • Home
  • Advertise With Us
  • Contact
  • Cookie Policy
    • Privacy statement (CA)
    • Cookie policy (CA)
    • Privacy statement (UK)
    • Cookie policy (UK)
    • Privacy statement (US)
    • Cookie Policy (US)
    • Privacy statement (EU)
    • Cookie policy (EU)
    • Disclaimer

TechWalls

Technology News | Gadget Reviews | Tutorials

  • Reviews
  • Tech Guide
  • Home Improvement
  • Gadget & Apps
  • News

Should encryption be abolished after Paris attacks?

Updated on Nov 27, 2015 by Guest Authors

The heated debate over encryption is on, taken further by the recent series of attacks in Paris that some government officials blame on tech companies that sell encrypted devices such as Apple.

Now the anti-encryption law enforcement organizations have found a new inspiration to beef up their case against the one tool that keeps people’s privacy intact, at least in the digital world. They want smartphone manufacturers like Apple and Google to stop mass producing devices that have built-in encryption in them. If this was the case in the beginning, if there was no encryption at all, the Paris attacks could have been prevented, they said.

encryption1

Is the call fair enough and just to give way to law enforcers gaining access to users’ personal information? Should encryption be a double standard measure of security by letting governments have back door access?

The call comes from the International Association of Chiefs of Police and the National District Attorneys Association, who actually support devices with encryption, provided the government can have some means of gaining access to the encryption keys.

The groups are trying to take ground on historical facts, which they said show that industry used to comply with the demands of law enforcement for access to some pieces of evidence contained in a device or network in order to moderate the impact of advanced technology on criminal investigation.

But this is not the case now, according to them, leading to some deadly acts of terrorism such as the Paris attacks. Officials believe the terrorists, who claimed to be supporters of ISIS, have used devices with default encryption so that police authorities were not able to detect their plan ahead of time.

Not entirely. Investigations show that some unencrypted text messages were found in devices left in the vicinity. Furthermore, police have not found any evidence or indication that the attackers used encrypted communication to launch their coordinated attacks.

Still the International Association of Chiefs of Police and the National District Attorneys Association remain adamant in their conviction that law enforcement should be able to bypass the barrier that is the encryption in order to help deter criminal activities and terrorist attacks.

The National Security Agency, for its part, supports the use of partial keys to be handled by a number of agencies. But this could only be done by revising existing laws.

However, there are dire consequences from complicating how encryption works, and one of these consequences is actually leading to easily accessible encryption, experts warn.

Disclosure: We might earn commission from qualifying purchases. The commission help keep the rest of my content free, so thank you!

Footer

Review of the Waterpik Evolution and Nano Water Flosser Combo Pack

Transparent Shaving: The yoose ICE Electric Shaver Review

INKBIRD IBS-TH5 Review – Smart Thermo Hygrometer with E-Ink Display

LISEN MagSafe CD Phone Holder for Car Review

Follow TechWalls

YoutubeFacebookTwitterInstagram

Recent Posts

  • Review of the Waterpik Evolution and Nano Water Flosser Combo Pack
  • Transparent Shaving: The yoose ICE Electric Shaver Review
  • The Hidden Cost of Cryptocurrency: Bitcoin’s Energy and Water Footprint
  • Free Places To Sleep Inside Hong Kong Airport During Long Transits

Copyright © 2023 · All Rights Reserved

Manage Cookie Consent
We use technologies like cookies to store and/or access device information. We do this to improve browsing experience and to show personalized ads. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional cookies Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}