National Academies Press: OpenBook

Decrypting the Encryption Debate: A Framework for Decision Makers (2018)

Chapter: 3 The Role of Encryption in Protecting Privacy and Civil Liberties

« Previous: 2 Encryption and Its Applications
Suggested Citation:"3 The Role of Encryption in Protecting Privacy and Civil Liberties." National Academies of Sciences, Engineering, and Medicine. 2018. Decrypting the Encryption Debate: A Framework for Decision Makers. Washington, DC: The National Academies Press. doi: 10.17226/25010.
×

3

The Role of Encryption in Protecting Privacy and Civil Liberties

The availability of encryption has come to be recognized as intrinsically bound with rights to privacy, free speech, freedom of association, and freedom of religion, collectively referred to as civil liberties or human rights. Law enforcement agencies are charged with respecting civil liberties, even while working to provide safety and security, which allows individuals to exercise constitutionally protected freedoms.

Government officials concerned about the effects of encryption frequently warn that encryption will disable the government from acting in circumstances where it would be in the public interest to do so. At the same time, opponents of government restrictions on encryption warn about the harmful effects of such restrictions on commerce and on fundamental rights of privacy, speech, and free association, including in repressive regimes. The committee does not seek to resolve these competing claims. It does note, however, that legal and constitutional constraints frequently prevent the United States and many other governments from acting, even when there are competing public interests, and also that rights likewise are not usually absolute.

In the United States, as the Supreme Court has explained, privacy, free speech, freedom of association, and freedom of religion are essential to a functioning democracy, and there is often a convergence of First Amendment rights, Fourth Amendment protections against unreasonable search and seizure, and the protected zones of privacy that stem from these rights. In a case involving undisclosed wiretap surveillance, the Court stated:

Suggested Citation:"3 The Role of Encryption in Protecting Privacy and Civil Liberties." National Academies of Sciences, Engineering, and Medicine. 2018. Decrypting the Encryption Debate: A Framework for Decision Makers. Washington, DC: The National Academies Press. doi: 10.17226/25010.
×

Historically, the struggle for freedom of speech and press in England was bound up with the issue of the scope of the search and seizure power. . . . History abundantly documents the tendency of Government—however benevolent and benign its motive—to view with suspicion those who most fervently dispute its policies. Fourth Amendment protections become the more necessary when the targets of official surveillance may be those suspected of unorthodoxy in their political beliefs.1

The Court further described how the right to privacy is essential to protecting free speech rights:

The price of lawful public dissent must not be a dread of subjection to an unchecked surveillance power. Nor must the fear of unauthorized official eavesdropping deter vigorous citizen dissent and discussion of Government action in private conversation. For private dissent, no less than open public discourse, is essential to our free society.2

Concern about the effects of government surveillance is a recurring theme in U.S. history. The Church Committee’s 1976 report, which detailed abuses of intelligence information involving every president from Franklin Roosevelt through Richard Nixon, warns of the potential chilling effect of government surveillance:

When Government infringes those rights instead of nurturing and protecting them, the injury spreads far beyond the particular citizens targeted to untold numbers of other Americans who may be intimidated.3

Vice President Hubert Humphrey observed in 1967:

We act differently if we believe we are being observed. If we can never be sure whether or not we are being watched and listened to, all our actions will be altered and our very character will change.4

These dangers to free expression posed by government surveillance were also addressed in Justice Sonia Sotoymayor’s concurring opinion in United States v. Jones: “Awareness that the Government may be watching chills associational and expressive freedoms. And the Government’s

___________________

1United States v. United States District Court, 407 U.S. 297, 313-4 (1972).

2 Ibid., at 314.

3 Senate Select Committee to Study Government Operations with Respect to Intelligence Activities, 1976, Intelligence Activities and the Rights of Americans, Book II Report No. 94-755, U.S. Senate, April 26, https://www.intelligence.senate.gov/sites/default/files/94755_II.pdf, p. 290.

4 E.V. Long, 1967, The Intruders, with a foreword by Hubert H. Humphrey, p. viii.

Suggested Citation:"3 The Role of Encryption in Protecting Privacy and Civil Liberties." National Academies of Sciences, Engineering, and Medicine. 2018. Decrypting the Encryption Debate: A Framework for Decision Makers. Washington, DC: The National Academies Press. doi: 10.17226/25010.
×

unrestrained power to assemble data that reveal private aspects of identity is susceptible to abuse.”5

Since the explosion of Internet availability and electronic communications capability around the world, exercising of the freedoms of speech and belief, including the right to obtain information, depends more and more on the ability to access the Internet and communicate electronically.6 As electronic communications and Internet access are subject to electronic surveillance, the right to privacy for one’s political, religious, and other communications, opinions, and activities has become even more important.

In particular, as surveillance capabilities have increased, threats to the exercise of these fundamental rights have also increased. Repressive regimes have imposed outright censorship on the Internet and tried to prevent the use of electronic messaging by political opponents and powerful countries have attacked political actors in other countries.

These developments have led to the view that encryption, which protects the privacy of communications and sensitive information, has become an intrinsic part of the rights to freedoms of speech and belief.7 Some would also contend that regulation of encryption amounts to a restriction on the manner by which citizens represent their own expression. In practice, encryption has come to play a more and more critical role in the work of journalists, human rights advocates, lawyers, public activists, and private communities of faith and opinion.8

Even in democracies that recognize the rule of law, the ability to

___________________

5 132 S. Ct. 945, 956 (2012).

6 As explained by the United Nations Special Rapporteur on the promotion and protection of the right to freedom of opinion and expression,

The Internet has profound value for freedom of opinion and expression, as it magnifies the voice and multiplies the information within reach of everyone who has access to it. Within a brief period, it has become the central global public forum. As such, an open and secure Internet should be counted among the leading prerequisites for the enjoyment of the freedom of expression today. See David Kaye, 2015, Report of the Special Rapporteur on the Promotion and Protection of the Right to Freedom of Opinion and Expression: A/HRC/29/32, Report to the Human Rights Council, May 22, p. 5.

7 “Encryption and anonymity provide individuals and groups with a zone of privacy online to hold opinions and exercise freedom of expression without arbitrary and unlawful interference or attacks.” D. Kaye, 2015, Report of the Special Rapporteur on the Promotion and Protection of the Right to Freedom of Opinion and Expression: A/HRC/29/32, Report to the Human Rights Council, May 22, p. 7.

8 In the United States, most of the major media have adopted methods using encryption to enable secure communication between sources and journalists. (See for example, https://www.nytimes.com/newsgraphics/2016/news-tips/.) The State Department has recognized the use of encrypted communications by human rights advocates and political dissenters in repressive countries as so important that the U.S. government has provided important support for the use of encryption technology. See D. Kaye, 2015, Report of the Special Rapporteur on the Promotion and Protection of the Right to Freedom of Opinion and Expression: A/HRC/29/32, Report to the Human Rights Council, May 22.

Suggested Citation:"3 The Role of Encryption in Protecting Privacy and Civil Liberties." National Academies of Sciences, Engineering, and Medicine. 2018. Decrypting the Encryption Debate: A Framework for Decision Makers. Washington, DC: The National Academies Press. doi: 10.17226/25010.
×

engage in secure communications is an important protection for civil liberties. Moreover, those in such countries also face threats from actions sponsored by other nations as well as potentially from domestic political opponents. In addition, citizens of these democracies who travel in other countries are affected by the state of civil liberties and the rule of law there.

This report considers whether technical measures required by law to provide the government with access to specific plaintext pursuant to a valid and proper warrant could weaken the security of other encrypted information belonging to other individuals. If so, such measures may negatively impact the civil liberties or human rights of those individuals who are not targeted by the particular warrant. At a minimum, the availability of encryption for communications protects against the chill to free speech stemming from the fear of illegal government surveillance.9

There are also situations where law enforcement claims the legal right to obtain information without a warrant. In some of those situations, the Supreme Court has agreed with law enforcement, in others the Supreme Court has disagreed with law enforcement, and in still others, there remains some vagueness or uncertainty. Individuals may encrypt their information to safeguard against circumstances where the government does not have a warrant and the law regarding government access is unclear.

At the same time, as discussed in Chapter 4, criminals and terrorists use encryption to hide their activities from law enforcement and take actions that negatively impact the security of law-abiding individuals.

Solutions, therefore, must take into account both the needs for individuals to be able to have their privacy and civil liberties protected from intrusive government encroachment and individuals’ interests in protecting against both criminal actors and threats to national security.

__________________

9 Public perception of the risk of illegal government surveillance has been shaped by recent developments. For example, major thefts of documents from U.S. government agencies concerning their surveillance capabilities have generated widespread, although not always completely accurate, news coverage.

Suggested Citation:"3 The Role of Encryption in Protecting Privacy and Civil Liberties." National Academies of Sciences, Engineering, and Medicine. 2018. Decrypting the Encryption Debate: A Framework for Decision Makers. Washington, DC: The National Academies Press. doi: 10.17226/25010.
×
Page 32
Suggested Citation:"3 The Role of Encryption in Protecting Privacy and Civil Liberties." National Academies of Sciences, Engineering, and Medicine. 2018. Decrypting the Encryption Debate: A Framework for Decision Makers. Washington, DC: The National Academies Press. doi: 10.17226/25010.
×
Page 33
Suggested Citation:"3 The Role of Encryption in Protecting Privacy and Civil Liberties." National Academies of Sciences, Engineering, and Medicine. 2018. Decrypting the Encryption Debate: A Framework for Decision Makers. Washington, DC: The National Academies Press. doi: 10.17226/25010.
×
Page 34
Suggested Citation:"3 The Role of Encryption in Protecting Privacy and Civil Liberties." National Academies of Sciences, Engineering, and Medicine. 2018. Decrypting the Encryption Debate: A Framework for Decision Makers. Washington, DC: The National Academies Press. doi: 10.17226/25010.
×
Page 35
Next: 4 Information Needs of Law Enforcement and the Intelligence Community »
Decrypting the Encryption Debate: A Framework for Decision Makers Get This Book
×
Buy Paperback | $45.00 Buy Ebook | $36.99
MyNAP members save 10% online.
Login or Register to save!
Download Free PDF

Encryption protects information stored on smartphones, laptops, and other devices - in some cases by default. Encrypted communications are provided by widely used computing devices and services - such as smartphones, laptops, and messaging applications - that are used by hundreds of millions of users. Individuals, organizations, and governments rely on encryption to counter threats from a wide range of actors, including unsophisticated and sophisticated criminals, foreign intelligence agencies, and repressive governments. Encryption on its own does not solve the challenge of providing effective security for data and systems, but it is an important tool.

At the same time, encryption is relied on by criminals to avoid investigation and prosecution, including criminals who may unknowingly benefit from default settings as well as those who deliberately use encryption. Thus, encryption complicates law enforcement and intelligence investigations. When communications are encrypted "end-to-end," intercepted messages cannot be understood. When a smartphone is locked and encrypted, the contents cannot be read if the phone is seized by investigators.

Decrypting the Encryption Debate reviews how encryption is used, including its applications to cybersecurity; its role in protecting privacy and civil liberties; the needs of law enforcement and the intelligence community for information; technical and policy options for accessing plaintext; and the international landscape. This book describes the context in which decisions about providing authorized government agencies access to the plaintext version of encrypted information would be made and identifies and characterizes possible mechanisms and alternative means of obtaining information.

  1. ×

    Welcome to OpenBook!

    You're looking at OpenBook, NAP.edu's online reading room since 1999. Based on feedback from you, our users, we've made some improvements that make it easier than ever to read thousands of publications on our website.

    Do you want to take a quick tour of the OpenBook's features?

    No Thanks Take a Tour »
  2. ×

    Show this book's table of contents, where you can jump to any chapter by name.

    « Back Next »
  3. ×

    ...or use these buttons to go back to the previous chapter or skip to the next one.

    « Back Next »
  4. ×

    Jump up to the previous page or down to the next one. Also, you can type in a page number and press Enter to go directly to that page in the book.

    « Back Next »
  5. ×

    Switch between the Original Pages, where you can read the report as it appeared in print, and Text Pages for the web version, where you can highlight and search the text.

    « Back Next »
  6. ×

    To search the entire text of this book, type in your search term here and press Enter.

    « Back Next »
  7. ×

    Share a link to this book page on your preferred social network or via email.

    « Back Next »
  8. ×

    View our suggested citation for this chapter.

    « Back Next »
  9. ×

    Ready to take your reading offline? Click here to buy this book in print or download it as a free PDF, if available.

    « Back Next »
Stay Connected!