8 Dec 2022

158

Backdoor Access to Encrypted Devices by Government Agencies

Format: APA

Academic level: College

Paper type: Essay (Any Type)

Words: 1273

Pages: 5

Downloads: 0

It is no doubt that companies such as Apple, Twitter, Amazon, Microsoft and Facebook provide important communication services to customers across the world. In light of the recent terrorist attacks, there have been suggestions on the need for the Federal Government to have backdoor access to encrypted devices and personal communication on such platforms. Such a request poses a big ethical dilemma to the companies as privacy of customer’s data is a top priority for them. There is the question of how granting such access can influence the businesses of these organizations. It is not ethical for government to have backdoor access to encrypted devices or unwarranted access to the users' private communications because it not only infringes on privacy but is also likely to worsen the relationship between civilians and law enforcement agencies. 

Granting the intelligence agencies in the United States access to encrypted devices through backdoors is most likely to expose the data of the users. Jacobsen (2017), argues that for such a proposal to be implemented, there is need for the preservation of the end-to-end encryption, while also giving then government access through the backdoor access. In such cases, cryptographic backdoors can be handled through the provision of the necessary keys with the federal law enforcement agencies as third parties. Such exceptional access still gives room for challenges and problems regarding the management of the unprecedented access to the company’s database since it has substantial risks, particularly to the private information of the users, which can be easily used and manipulated by hackers. Notably, the security of data remains to be the greatest threat posed by special access request by the various law enforcement agencies. According to Watney (2020), any access to the users' mobile devices, social media access, internet web browser history can offer so much information that would jeopardize the privacy of an individual. It is a significant problem that would be established by the government's backdoor access to the data stored by these organizations. Exposure and access to such crucial information of the users can create room for additional surveillance of the users' activities, which is such a significant threat to individual privacy in the country. Schulz (2016) reiterates that allowing the government to carry surveillance is a perfect opportunity for intellectual privacy, which establishes a behavior after close monitoring by the law agencies. The most evident challenge that comes with the backdoor access remains to be the reduction of public obscurity. People in public places always engage in controversial ideas that are aimed at expanding their political and moral imaginations (Schuster et al., 2017). Users can constantly engage in such ideas freely knowing that their actions are not being watched. Free social interactions among the people in society are crucial in the maintenance and development of mature and responsible consciousness. However, this will no longer be the case if the proposed laws are adopted and people will have limited freedom of interaction. 

It’s time to jumpstart your paper!

Delegate your assignment to our experts and they will do the rest.

Get custom essay

Notably, there have been recent security events of cyber-attacks and hacks on multiple internet-based avenues such as Facebook and Twitter. Such attacks can be enhanced through special access requests by federal law enforcement agencies. For instance, Facebook was recently the victim when its system was infiltrated by hackers who successfully gained access to most of the private profiles of Facebook users. The hacking instance and other cyber-related security cases on Facebook have sparked heated debates and calls for heightened security to internet-based information (Schulz, 2016). Nonetheless, the federal enforcement agencies request for backdoor access is only likely to create new platforms for data breaches of other third parties. Multiple crucial software vulnerabilities have often occurred, severely breaching the privacy of personal data and other vital information. Based on the increase of attacks on the internet and web-based platforms such as Facebook and Twitter, the frequent requests made by federal law enforcement agencies to access exceptional data of the users is wrong. It will facilitate the attacks on the users of these platforms, and the users may in the process lose their private and personal information to the attackers (Schulz, 2016). More specifically, the request by the law enforcement agencies to access to cryptographic protocols through the backdoors as a way to improve the data security will most likely create avenues for surveillance to nations hence increasing security threat levels. It is a step back on the data security that has displayed substantial growth over the years, despite the hackers increasing their strategies on data attacks. 

It is as well important to note that the introduction of the backdoor access by the federal law agencies in the United States is likely to weaken attitudes such as free social interactions of the people with the agencies. The citizens of the United States are always encouraged to freely engage and cooperate with federal law agencies to improve their duties in protecting the country and its people (Schuster et al., 2017). However, government surveillance through the backdoor access as requested by the federal law agencies is most likely to weaken the willingness of the citizens to cooperate and engage in public participation for improvement of the protection of the country and its people. ). The majority of the United States' citizens peruse, read and share issues with others through the internet platforms. However, this cannot be realized with the adoption of backdoor access since the safeguards provided by encryption are removed (Jacobsen, 2017). Discouragement of the people to engage in free public participation through such requests from federal law agencies is a big blow to the country's democratic ideals in the modern free world. 

Establishment of backdoors to create room for federal government access, particularly to the cryptographic protocols, will only create ripple effects which will be transmitted to companies running business on the platforms targeted (Schuster et al., 2017). For instance, consumers of these companies outside the United States may be unwilling to purchase technological products from the market in the United States since they are affiliated with government surveillance. 

Most of the supporters of the federal law agencies to get access to the cryptographic protocols to argue that it is a crucial step towards fighting terrorism. However, there is little evidence regarding use of backdoor access to help in the fight against terrorism. Koops and Kosta (2018), explain that end-to-end encryption remains to be one of the most crucial tools that the terrorists use in the prevention of the government access to their communications and plans. Several attempts have been made to use encryptions as the scapegoat for even attacks that did not involve end-to-end data encryptions such as the San Bernardino plot. Therefore, there is no evidence that terrorist attacks that have been targeted against the United States could have been prevented had there been weakened encryption in the communication platforms. Besides, there is no connection between the weakened data encryptions in communication avenues and the terrorist attacks. Koops and Kosta (2018) argue that the efforts made by digital intelligence in the United States have failed in the creation of a safer United States. 

The high rate of innovation and technology advancement has been crucial in the development of novel avenues that that facilitate human interactions and make it easy to conduct business. Some of these avenues include Twitter, Facebook, Google, Apple, Microsoft, Amazon and LinkedIn. These companies harbor a lot of personal information belonging to the individual users of these platforms and it is crucial that these organizations protect this information as much as possible to prevent unauthorized acess. The U.S law enforcement agencies have constantly advocated for such communications service and data providers to avail access to the government through backdoor access a move that I don’t agree with since it would lead to violation of individual privacy, it would also increase vulnerability of these platforms to attacks from hackers and it would disrupt businesses in a big way. 

References 

Jacobsen, K. M. (2017). Game of Phones, Data Isn't Coming: Modern Mobile Operating System Encryption and Its Chilling Effect on Law Enforcement. Geo. Wash. L. Rev., 85, 566. 

Koops, B. J., & Kosta, E. (2018). Looking for some light through the lens of "cryptowar" history: Policy options for law enforcement authorities against "going dark". Computer Law & Security Review, 34(4), 890-900. 

Schulz, W. (2016). Human rights and encryption. UNESCO Publishing. 

Schuster, S., Van Den Berg, M., Larrucea, X., Slewe, T., & Ide-Kostic, P. (2017). Mass surveillance and technology policy options: improving the security of private communications. Computer Standards & Interfaces, 50, 76-82. 

Siopi, M., Vlahavas, G., Karasavvas, K., & Vakali, A. (2020, October). DeCStor: A Framework for Privately and Securely Sharing Files Using a Public Blockchain. In International Conference on Discovery Science (pp. 280-293). Springer, Cham. 

Watney, M. (2020, July). Law Enforcement Access to End-to-End Encrypted Social Media Communications. In 7th European Conference on Social Media ECSM 2020 (p. 322). 

Illustration
Cite this page

Select style:

Reference

StudyBounty. (2023, September 16). Backdoor Access to Encrypted Devices by Government Agencies.
https://studybounty.com/backdoor-access-to-encrypted-devices-by-government-agencies-essay

illustration

Related essays

We post free essay examples for college on a regular basis. Stay in the know!

17 Sep 2023
Criminal Justice

Research in Criminal Justice

Research is the primary tool for progressing knowledge in different fields criminal justice included. The results of studies are used by criminal justice learners, scholars, criminal justice professionals, and...

Words: 250

Pages: 1

Views: 165

17 Sep 2023
Criminal Justice

The Art of Taking and Writing Notes in Law Enforcement

Every individual must seek adequate measures to facilitate input for appropriate output in daily engagements. For law enforcement officers, the work description involving investigations and reporting communicates the...

Words: 282

Pages: 1

Views: 183

17 Sep 2023
Criminal Justice

Justice System Issues: The Joseph Sledge Case

The Joseph Sledge case reveals the various issues in the justice system. The ethical issues portrayed in the trial include the prosecutor's misconduct. To begin with, the prosecution was involved in suppressing...

Words: 689

Pages: 2

Views: 252

17 Sep 2023
Criminal Justice

Victim Advocacy: Date Rape

General practice of law requires that for every action complained of there must be probable cause and cogent evidence to support the claim. Lack thereof forces the court to dismiss the case or acquit the accused. It...

Words: 1247

Pages: 4

Views: 76

17 Sep 2023
Criminal Justice

New Rehabilitation and Evaluation

Introduction The rate of recidivism has been on the rise in the United States over the past two decades. Due to mass incarceration, the number of people in American prisons has been escalating. While people...

Words: 2137

Pages: 8

Views: 140

17 Sep 2023
Criminal Justice

Justification of Reflections and Recommendations

Credible understanding and application of criminal justice require adequacy of techniques in analyzing the crime scene, documenting the shooting scene, and analysis of ballistic evidence. The approaches used in...

Words: 351

Pages: 1

Views: 127

illustration

Running out of time?

Entrust your assignment to proficient writers and receive TOP-quality paper before the deadline is over.

Illustration