Decrypting the Encryption Debate: a Framework for Decision Makers

Decrypting the Encryption Debate: a Framework for Decision Makers

ADVANCE COPY NOT FOR PUBLIC RELEASE BEFORE Feb. 15, 2018 11:00 a.m. EST PLEASE CITE AS A REPORT OF THE NATIONAL ACADEMIES OF SCIENCES, ENGINEERING, AND MEDICINE Decrypting the Encryption Debate: A Framework for Decision Makers Committee on Law Enforcement and Intelligence Access to Plaintext Information Computer Science and Telecommunications Board Division on Engineering and Physical Sciences A Consensus Study of PRE-PUBLICATION COPY—SUBJECT TO FURTHER EDITORIAL CORRECTION THE NATIONAL ACADEMIES PRESS 500 Fifth Street, NW Washington, DC 20001 This activity was supported by award number 2015-3078 from the William and Flora Hewlett Foundation, award number 15-109219-000-HRS from the John D. and Catherine T. MacArthur Foundation, and award number CNS-1555610 from the National Science Foundation. Any opinions, findings, conclusions, or recommendations expressed in this publication do not necessarily reflect the views of any organization or agency that provided support for the project. International Standard Book Number-13: International Standard Book Number-10: Digital Object Identifier: 10.17226/25010 Additional copies of this report are available for sale from the National Academies Press, 500 Fifth Street, NW, Keck 360, Washington, DC 20001; (800) 624-6242 or (202) 334-3313; http://www.nap.edu. Copyright 2018 by the National Academy of Sciences. All rights reserved. Printed in the United States of America Suggested citation: National Academies of Sciences, Engineering, and Medicine. 2018. Decrypting the Encryption Debate: A Framework for Decision Makers. Washington, DC: The National Academies Press. https://doi.org/10.17266/25010 PRE-PUBLICATION COPY—SUBJECT TO FURTHER EDITORIAL CORRECTION The National Academy of Sciences was established in 1863 by an Act of Congress, signed by President Lincoln, as a private, nongovernmental institution to advise the nation on issues related to science and technology. Members are elected by their peers for outstanding contributions to research. Dr. Marcia McNutt is president. The National Academy of Engineering was established in 1964 under the charter of the National Academy of Sciences to bring the practices of engineering to advising the nation. Members are elected by their peers for extraordinary contributions to engineering. Dr. C. D. Mote, Jr., is president. The National Academy of Medicine (formerly the Institute of Medicine) was established in 1970 under the charter of the National Academy of Sciences to advise the nation on medical and health issues. Members are elected by their peers for distinguished contributions to medicine and health. Dr. Victor J. Dzau is president. The three Academies work together as the National Academies of Sciences, Engineering, and Medicine to provide independent, objective analysis and advice to the nation and conduct other activities to solve complex problems and inform public policy decisions. The Academies also encourage education and research, recognize outstanding contributions to knowledge, and increase public understanding in matters of science, engineering, and medicine. Learn more about the National Academies of Sciences, Engineering, and Medicine at www.nationalacademies.org. PRE-PUBLICATION COPY—SUBJECT TO FURTHER EDITORIAL CORRECTION Consensus Study Reports published by the National Academies of Sciences, Engineering, and Medicine document the evidence-based consensus on the study’s statement of task by an authoring committee of experts. Reports typically include findings, conclusions, and recommendations based on information gathered by the committee and the committee’s deliberations. Each report has been subjected to a rigorous and independent peer-review process and it represents the position of the National Academies on the statement of task. Proceedings published by the National Academies of Sciences, Engineering, and Medicine chronicle the presentations and discussions at a workshop, symposium, or other event convened by the National Academies. The statements and opinions contained in proceedings are those of the participants and are not endorsed by other participants, the planning committee, or the National Academies. For information about other products and activities of the National Academies, please visit nationalacademies.org/whatwedo. PRE-PUBLICATION COPY—SUBJECT TO FURTHER EDITORIAL CORRECTION v COMMITTEE ON LAW ENFORCEMENT AND INTELLIGENCE ACCESS TO PLAINTEXT INFORMATION FRED H. CATE, Indiana University, Chair DAN BONEH, NAE,1 Stanford University FREDERICK R. CHANG, NAE, Southern Methodist University SCOTT CHARNEY, Microsoft Corp. SHAFRIRA GOLDWASSER, NAS,2 NAE), Massachusetts Institute of Technology DAVID A. HOFFMAN, Intel Corporation SENY KAMARA, Brown University DAVID KRIS, Culper Partners, LLC SUSAN LANDAU, Tufts University STEVEN B. LIPNER, NAE, SAFECode RICHARD LITTLEHALE, Tennessee Bureau of Investigation KATE MARTIN, Center for American Progress HARVEY RISHIKOF, Cybersecurity Legal Task Force, American Bar Association PETER J. WEINBERGER, Google, Inc. Staff JON EISENBERG, Study Director and Senior Director, Computer Science and Telecommunications Board KATIRIA ORTIZ, Associate Program Officer SHENAE BRADLEY, Administrative Assistant JANKI PATEL, Senior Program Assistant 1National Academy of Engineering. 2National Academy of Sciences. PRE-PUBLICATION COPY—SUBJECT TO FURTHER EDITORIAL CORRECTION vi COMPUTER SCIENCE AND TELECOMMUNICATIONS BOARD FARNAM JAHANIAN, Carnegie Mellon University, Chair LUIZ ANDRE BARROSO, Google, Inc. STEVEN BELLOVIN, Columbia University ROBERT F. BRAMMER, Brammer Technology, LLC EDWARD FRANK, Cloud Parity, Inc. LAURA HAAS, University of Massachusetts, Amherst MARK HOROWITZ, Stanford University ERIC HORVITZ, Microsoft Research VIJAY KUMAR, Univ. of Pennsylvania BETH MYNATT, Georgia Institute of Technology CRAIG PARTRIDGE, Raytheon BBN Technologies DANIELA RUS, Massachusetts Institute of Technology FRED SCHNEIDER, Cornell University MARGO SELTZER, Harvard University MOSCHE VARDI, Rice University KATHERINE YELICK, University of California, Berkeley Staff JON EISENBERG, Senior Director LYNETTE I. MILLETT, Associate Director SHENAE BRADLEY, Administrative Assistant EMILY GRUMBLING, Program Officer RENEE HAWKINS, Financial and Administrative Manager KATIRIA ORTIZ, Associate Program Officer JANKI PATEL, Senior Program Assistant For more information on CSTB, see its website at http://www.cstb.org. PRE-PUBLICATION COPY—SUBJECT TO FURTHER EDITORIAL CORRECTION Acknowledgement of Reviewers This Consensus Study Report was reviewed in draft form by individuals chosen for their diverse perspectives and technical expertise. The purpose of this independent review is to provide candid and critical comments that will assist the National Academies of Sciences, Engineering, and Medicine in making each published report as sound as possible and to ensure that it meets the institutional standards for quality, objectivity, evidence, and responsiveness to the study charge. The review com- ments and draft manuscript remain confidential to protect the integrity of the deliberative process. We wish to thank the following individuals for their review of this report: Kevin Bankston, Open Technology Institute, Alvaro Bedoya, Georgetown Law School, James Emerson, iThreat Cyber Group, Edward W. Felten, Princeton University, Eric Grosse, EHG Flight, LLC, Joseph Lorenzo Hall, Center for Democracy and Technology, Susan Hennessey, Brookings Institution, John C. (“Chris”) Inglis, United States Naval Academy, Kenn Kern, New York County District Attorney’s Office, Butler Lampson, Microsoft Corp., Josiah Landers, Rockland County, N.Y., District Attorney’s Office, Bruce W. McConnell, EastWest Institute, Deirdre K. Mulligan, University of California, Berkeley, Ronald L. Rivest, Massachusetts Institute of Technology, Peter Swire, Georgia Institute of Technology, and Marcus C. Thomas, Subsentio, LLC. Although the reviewers listed above provided many constructive comments and suggestions, they were not asked to endorse the conclusions or recommendations of this report nor did they see the final draft before its release. The review of this report was overseen by Robert F. Sproull, Univer- sity of Massachusetts, Amherst. He was responsible for making certain that an independent exam- ination of this report was carried out in accordance with the standards of the National Academies and that all review comments were carefully considered. Responsibility for the final content rests entirely with the authoring committee and the National Academies. vii PRE-PUBLICATION COPY—SUBJECT TO FURTHER EDITORIAL CORRECTION PRE-PUBLICATION COPY—SUBJECT TO FURTHER EDITORIAL CORRECTION Preface Government access to the plaintext of encrypted communications and stored data presents dif- ficult, important, and controversial issues that reveal conflicting values within the government and society at large. The debate over efforts to ensure that access is very polarized. Critics of government access, even as they acknowledge the importance of effective law enforcement, cite legal and prac- tical objections, including risks to security, privacy and civil liberties, and U.S. commercial interests. Government officials acknowledge the value of encryption to protect privacy and confidential infor- mation but also express the need to be able to access information relevant to investigations when properly authorized. To address these issues (Box P.1), the National Academies of Sciences, Engineering, and Medicine appointed the Committee on Law Enforcement and Intelligence Access to Plaintext

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    100 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us