The interest in the encryption originates from the background of technological know-how transforming business. Presently the rise to acquire communications has propagated on the progression of the encryption schemes to be able to protect the integrity of the data because it is been transferred electronically (Ball, Borger and Greenwald, 2013). There are a number of the security services that are involved with the encryption outside the problem of the privacy: confidentiality- that is the assurance which the events involved with the communication possess a distinctive understanding of the message; authentication- the guarantee which the parties required are who they say are. Encryption safeguards our information, specific whenever it is sitting on our computer systems and in the information facilities. This assist it whenever it is being transmitted around the World Wide Web (Ou, Chung, H.Y. and Sung, 2006). The protection of the information is important to everybody. The utilization of the encryption is most effective in case it is ubiquitous along with automatic. The two kind of the encryption that happen to be primarily used are the URLS on the browser along with the handset to the tower link for the mobile phone calls (Koops, 2006). The encryption needs to be allowed for everything by the delinquency, rather than a function you may switch on only when you are carrying out something you believe essential and even worth safeguarding (Koops, 2006). Encryption continues to be the most important security preserving technological innovation that is right now there in the world, one which is distinctly suited would be to protect against the bulk surveillance- this really is mainly done by the authorities to be able to manage on their populations in addition to their criminals who are searching for the susceptible victims. Through forcing both to focus on their attacks against individuals, we protect the society (Ou, Chung and Sung, 2006). It is important to note that just as much as encryption is important as well as crucial in protection of our data when utilized by the wrong people for instance the criminals the law enforcement officials could become incapable to prevent these people from committing crimes of extraordinary magnitude (Siegfried, Siedsma, Countryman and Hosmer, 2004). Existence of indestructible encryption could render these kinds of methods of the electronic surveillance worthless, even though the law enforcement authorities might intercept on the communication that are created by the criminals they may be not able to decipher on the encrypted messages. In this research I argue as to why the encryption should be restricted.
On the first issue as to why encryption should be restricted is to enable that illegal activities are not protected by the strong encryption and that the law enforcement agencies have the access of the data that can be used to fight crime and prevent the acts of terrorism (Scarfone, Souppaya and Sexton, 2007). In some tech industry it has been observed that they are encrypting data with strong encryption such that the companies are not able to access on the information of the customer to comply with the court orders and the warrants from the courts (Ball, Borger and Greenwald, 2013). The regulation of the encryption should require a licensing where only certain firms or individuals who meet the predetermined criteria are allowed to use the encryption. This this means it would allow illegal activities are protected from these encryption and the law enforcement are able to target the individual who break the law (Siegfried, Siedsma, Countryman and Hosmer, 2004).
Another issue is that through restricting of the encryption to allow the enforcement officials to regulate on the encryption for the good of the public safety through providing a back door to access the information that is encrypted in the special circumstances (Scarfone, Souppaya and Sexton, M., 2007). over the past it has been observed that criminals are using unbreakable encryption to communicate with one another which renders the methods of the surveillance to be useless, to an extent that the law enforcement officials are not able to intercept the communication that are made between the criminal as they are unable to decipher on the messages that are encrypted (Tavani and Moor, 2001). When there encryption are restricted the law officials are able to monitor on every communication that is made and as result be able to identify criminals that are conspiring to do harm and at the same time protect the public from the danger they pose through their criminal activities (Scarfone, Souppaya and Sexton, 2007). This would be a preventive measure of a criminal activity before it occurred.
Another issue for the need of restricting of the encryption would be to control as well as monitor on the strong encryption. According to the policy in the US companies are not allowed to exports the products that has a strong encryption, unless there has been the recovery features, which would allow the government to have access to the encryption keys (Scarfone, Souppaya and Sexton, 2007). The purpose of this would prevent the export of product which may pose threat to the national security. It would allow the organization to secure their own intellectual property from getting into the wrong hands. On a certain level this restriction would protect the information of the company which when fell on the wrong hands could compromise on their operation and their intellectual property rights in case it is stolen by the criminals.
The argument against the motion: encryption should not be restricted.
First it is important to understand that encryption is intended to protect individual’s data from the unwanted access, this is important to every individuals and not the selected few (Ou, Chung and Sung, 2006). Having an encryption has the ability of protecting our data as well as devices from the malicious attackers. What we should ask is that who determines what data is significant and what is not. We as the individuals should be given the opportunity when it comes to determing which of our data that deem important and worthy of being strongly encrypted (Ou, Chung and Sung, 2006). I an m of the opinion that individuals need to maintain some sort of the privacy in this age where we are being constantly tracked through the traffic cams or perhaps through the electronic footprint left on the internet. There is constant exposure of the possibility of personal data falling in the hands of the criminals. Encryption is important particularly in preserving on the individuals privacy, however it should not replace our security (Siegfried, Siedsma, Countryman and Hosmer, 2004). There are limitation as to where encryption does not protect our devices from being hacked, but rather facilitates on the protection of our data which we believe to be important and necessary for our privacy to remain much intact.
There are various regulations in effect worldwide which relates to the protection of the private and the sensitive data. This can be achieved through the encryption of the data, some of which has focused on the protection of the specific information in the industry. The widespread of the use of the encryption has been a necessary consequence of the revolution of the information. With the coming of the electronic communication on the computer networks, individuals need a way of ensuring the both the conversation and transaction has remained confidential. Nonetheless, as much as these encryption are providing privacy and protection of the data there are being used by the criminals and the terrorists to prevent the authorities from intercepting on their communication. In my view the encryption should be restricted. The reason for restricting on the encryption would to enable the law enforcement to have access and intercept the communication that are made between the criminal as they are unable to decipher on the messages that are encrypted. Moreover, it would make sure that all the illegal activities are not protected by the strong encryption as well as the law enforcement agencies.
Ball, J., Borger, J. and Greenwald, G., 2013. Revealed: how US and UK spy agencies defeat internet privacy and security. The Guardian, 6.
Koops, B.J., 2006. Should ICT regulation be technology-neutral?.
Ou, S.C., Chung, H.Y. and Sung, W.T., 2006. Improving the compression and encryption of images using FPGA-based cryptosystems. Multimedia Tools and Applications, 28(1), pp.5-22.
Scarfone, K., Souppaya, M. and Sexton, M., 2007. Guide to storage encryption technologies for end user devices. NIST Special Publication, 800, p.111.
Siegfried, J., Siedsma, C., Countryman, B.J. and Hosmer, C.D., 2004. Examining the encryption threat. International Journal of Digital Evidence, 2(3).
Tavani, H.T. and Moor, J.H., 2001. Privacy protection, control of information, and privacy-enhancing technologies. ACM SIGCAS Computers and Society, 31(1), pp.6-11