National Academies Press: OpenBook

Decrypting the Encryption Debate: A Framework for Decision Makers (2018)

Chapter: Appendix B Briefers to the Committee

« Previous: Appendix A Biographies of Committee Members
Suggested Citation:"Appendix B Briefers to the Committee." National Academies of Sciences, Engineering, and Medicine. 2018. Decrypting the Encryption Debate: A Framework for Decision Makers. Washington, DC: The National Academies Press. doi: 10.17226/25010.
×

B

Briefers to the Committee

NOVEMBER 11, 2016, WASHINGTON, D.C.

James A. Baker, Federal Bureau of Investigation

Matthew Blaze, University of Pennsylvania

Ernie Brickell, Intel Corporation (former)

Alan Davidson, U.S. Department of Commerce

Robert Litt, Office of the Director of National Intelligence

Paul Ohm, Georgetown University Law Center

Ronald Rivest, Massachusetts Institute of Technology

Peter Swire, Georgia Institute of Technology

JANUARY 30, 2017, PALO ALTO, CALIFORNIA

Andrew Crocker, Electronic Frontier Foundation

Jim Dempsey, University of California Berkeley School of Law

Jennifer Granick, Stanford Law School

Herb Lin, Stanford University

Bruce McConnell, EastWest Institute

Ray Ozzie, Microsoft Corporation (former)

Seth Schoen, Electronic Frontier Foundation

Alex Stamos, Facebook

Suggested Citation:"Appendix B Briefers to the Committee." National Academies of Sciences, Engineering, and Medicine. 2018. Decrypting the Encryption Debate: A Framework for Decision Makers. Washington, DC: The National Academies Press. doi: 10.17226/25010.
×

MARCH 30, 2017, WASHINGTON, D.C.

Christopher Kelly, Office of the Attorney General, Commonwealth of Massachusetts

James Lewis, Center for Strategic and International Studies

Marybeth Paglino, National Domestic Communications Assistance Center

APRIL 26, 2017, WASHINGTON, D.C.

Richard Ledgett, National Security Agency

Stefan Savage, University of California, San Diego

Suggested Citation:"Appendix B Briefers to the Committee." National Academies of Sciences, Engineering, and Medicine. 2018. Decrypting the Encryption Debate: A Framework for Decision Makers. Washington, DC: The National Academies Press. doi: 10.17226/25010.
×
Page 103
Suggested Citation:"Appendix B Briefers to the Committee." National Academies of Sciences, Engineering, and Medicine. 2018. Decrypting the Encryption Debate: A Framework for Decision Makers. Washington, DC: The National Academies Press. doi: 10.17226/25010.
×
Page 104
Decrypting the Encryption Debate: A Framework for Decision Makers Get This Book
×
Buy Paperback | $45.00 Buy Ebook | $36.99
MyNAP members save 10% online.
Login or Register to save!
Download Free PDF

Encryption protects information stored on smartphones, laptops, and other devices - in some cases by default. Encrypted communications are provided by widely used computing devices and services - such as smartphones, laptops, and messaging applications - that are used by hundreds of millions of users. Individuals, organizations, and governments rely on encryption to counter threats from a wide range of actors, including unsophisticated and sophisticated criminals, foreign intelligence agencies, and repressive governments. Encryption on its own does not solve the challenge of providing effective security for data and systems, but it is an important tool.

At the same time, encryption is relied on by criminals to avoid investigation and prosecution, including criminals who may unknowingly benefit from default settings as well as those who deliberately use encryption. Thus, encryption complicates law enforcement and intelligence investigations. When communications are encrypted "end-to-end," intercepted messages cannot be understood. When a smartphone is locked and encrypted, the contents cannot be read if the phone is seized by investigators.

Decrypting the Encryption Debate reviews how encryption is used, including its applications to cybersecurity; its role in protecting privacy and civil liberties; the needs of law enforcement and the intelligence community for information; technical and policy options for accessing plaintext; and the international landscape. This book describes the context in which decisions about providing authorized government agencies access to the plaintext version of encrypted information would be made and identifies and characterizes possible mechanisms and alternative means of obtaining information.

  1. ×

    Welcome to OpenBook!

    You're looking at OpenBook, NAP.edu's online reading room since 1999. Based on feedback from you, our users, we've made some improvements that make it easier than ever to read thousands of publications on our website.

    Do you want to take a quick tour of the OpenBook's features?

    No Thanks Take a Tour »
  2. ×

    Show this book's table of contents, where you can jump to any chapter by name.

    « Back Next »
  3. ×

    ...or use these buttons to go back to the previous chapter or skip to the next one.

    « Back Next »
  4. ×

    Jump up to the previous page or down to the next one. Also, you can type in a page number and press Enter to go directly to that page in the book.

    « Back Next »
  5. ×

    Switch between the Original Pages, where you can read the report as it appeared in print, and Text Pages for the web version, where you can highlight and search the text.

    « Back Next »
  6. ×

    To search the entire text of this book, type in your search term here and press Enter.

    « Back Next »
  7. ×

    Share a link to this book page on your preferred social network or via email.

    « Back Next »
  8. ×

    View our suggested citation for this chapter.

    « Back Next »
  9. ×

    Ready to take your reading offline? Click here to buy this book in print or download it as a free PDF, if available.

    « Back Next »
Stay Connected!