Home Politics Deadlock in the use of Encryption technology between companies and Government agencies

Deadlock in the use of Encryption technology between companies and Government agencies


There is spectacular debate amongst the general public on the encryption scuffle amongst the law enforcement authorities and high technology industry.
There is a general sense prevailing about the ease of access on the private encrypted data of smartphones to the law enforcement organizations. The diversity of data in smartphones however has prompted the emergence of much better security protocols to be followed than ever before and encrypting the data is just about serving the purpose.
The ever mounting pressure on high tech companies by law enforcement agencies binds them by law to provide the desired information but encrypted communication is hard to access as no definite protocols for the same exists.
This particular fact has been a frustrating thorn for law enforcement agencies. Main reason for this lag is the considerable gap between rapidly increasing technological advances and provisions of law. This fact is hampering law enforcement agencies to reach to the roots of crime in order to fully eradicate terrorism. Law enforcement agencies have the authorization to access data but their inability to have required expertise to manipulate the data has been the major cause of concern.
There is a strong opposition towards the concept of enhanced security provision to the citizens at expense of weakened security measures in the electronic devices amongst tech companies. The concept is as lame as it gets that in order to protect citizens weaker controls be implemented so that the law enforcement agencies could access. This ideology further enhances the risks involved.
While few companies have shown their consent towards compromising the security protocol on encryption front, most are strictly against the concept and are not willing to show any flexibility in this regard.
The issue has transformed into a binary issue as most organizations seek answers to the demanding question of whether encryption will be available to specialist operating system developer or not in future. There is a view that hampering in this regard will leave the tool for crooked people and terrorists to use and excel in their unlawful endeavors thus compromising on the security of citizens.
A possible remedy to the solution is adopting more structured approach in handling encryption protocols by law enforcement institutions. Supercomputers are ideal tools to break encryption and none organization or sector has more supercomputers than government. The remedy is there, it is just the matter of allowing access to these resources to law enforcement agencies which could solve the long standing conflict. Implementation of this remedy will allow keeping the things much more private for the people while allowing government to access it as and when required.
Forced implementation to go for weak encryption structure within the high-tech industry can have long lasting effects all across globe. Impact of loose security protocols can have damaging effects as evidenced through many such incidents such as the news of vacuuming data on Internet by U.S government.
The Government however is still urging high-tech organizations to modify their existing encryption business model which may result in some losses for companies. They believe in encryption being more used as a marketing feature to attract audience instead of just limiting it to the technical side.
The standoff between Government and high-tech companies however continues as neither of them is willing to back off.