Skip to main content
  • Sections
  • Search

Center for Strategic & International Studies

User menu

  • Subscribe
  • Sign In

Topics

  • Cybersecurity and Technology
    • Cybersecurity
    • Intelligence, Surveillance and Privacy
    • Military Technology
    • Space
    • Technology and Innovation
  • Defense and Security
    • Counterterrorism and Homeland Security
    • Defense Budget
    • Defense Industry, Acquisition, and Innovation
    • Defense Strategy and Capabilities
    • Geopolitics and International Security
    • Long-Term Futures
    • Missile Defense
    • Space
    • Weapons of Mass Destruction Proliferation
  • Economics
    • Asian Economics
    • Global Economic Governance
    • Trade and International Business
  • Energy and Sustainability
    • Climate Change and Environmental Impacts
    • Energy and Geopolitics
    • Innovation and New Energy Sources
    • Markets, Trends, and Outlooks
  • Global Health
    • Family Planning, Maternal and Child Health, and Immunizations
    • Multilateral Institutions
    • Health and Security
    • Infectious Disease
  • Human Rights
    • Civil Society
    • Transitional Justice
    • Human Security
  • International Development
    • Food and Agriculture
    • Governance and Rule of Law
    • Humanitarian Assistance
    • Private Sector Development
    • U.S. Development Policy

Regions

  • Africa
    • North Africa
    • Sub-Saharan Africa
  • Americas
    • Caribbean
    • North America
    • South America
  • Arctic
  • Asia
    • Afghanistan
    • Australia, New Zealand & Pacific
    • China
    • India
    • Japan
    • Korea
    • Pakistan
    • Southeast Asia
  • Europe
    • European Union
    • NATO
    • Post-Soviet Europe
    • Turkey
  • Middle East
    • The Gulf
    • Egypt and the Levant
    • North Africa
  • Russia and Eurasia
    • The South Caucasus
    • Central Asia
    • Post-Soviet Europe
    • Russia

Sections menu

  • Programs
  • Experts
  • Events
  • Analysis
    • Blogs
    • Books
    • Commentary
    • Congressional Testimony
    • Critical Questions
    • Interactive Reports
    • Journals
    • Newsletter
    • Reports
    • Transcript
  • Podcasts
  • iDeas Lab
  • Transcripts
  • Web Projects

Main menu

  • About Us
  • Support CSIS
    • Securing Our Future
Photo: Adobe Stock
Report
Share
  • LinkedIn
  • Facebook
  • Twitter
  • Email
  • Printfriendly.com

The Effect of Encryption on Lawful Access to Communications and Data

February 8, 2017

ISBN# 978-1-4422-7995-7 (pb); 978-1-4422-7996-4 (eBook)
CSIS/Rowman & Littlefield
Download the Report



Purchase a print version

Many have drawn parallels between today’s debate over “Going Dark” and the “Crypto Wars” of the 1990s, but much has changed since then. First, the Internet has become central to global economic activity, politics, and security. The security environment has changed, as we face much more aggressive state actors in espionage. The Snowden revelations in 2013 damaged the credibility of U.S. tech companies operating abroad, and any requirement that they facilitate U.S. government access to their customers’ communications could affect their international competitiveness.

Terrorists and criminals find creative ways to leverage the latest technologies to evade law enforcement. Technology continues to evolve, making unrecoverable encryption easier for individuals to obtain and use. Furthermore, any U.S. policy on encryption might set a precedent that other countries would be tempted to follow. While the debate thus far has pitted privacy and individual security against the critical task of stopping criminals and terrorists, there may be technical and policy solutions that can balance national security and public safety with protection of privacy, civil liberties, and a functioning global Internet ecosystem.

Downloads
Download PDF file of "The Effect of Encryption on Lawful Access to Communications and Data"
Written By
James Andrew Lewis
Senior Vice President and Director, Technology Policy Program
Denise E. Zheng
Senior Associate (Non-resident), Technology Policy Program
William A. Carter
Deputy Director and Fellow, Technology Policy Program
Purchase
Media Queries
Contact H. Andrew Schwartz
Chief Communications Officer
Tel: 202.775.3242

Contact Emma Colbran
Communications Associate and Program Coordinator
Tel: 202.775.3211
Related
Cybersecurity, Cybersecurity and Governance, Cybersecurity and Technology, Intelligence, Surveillance and Privacy, Intelligence, Surveillance, and Privacy, Technology Policy Program, The Effect of Encryption on Lawful Access to Communications and Data

Most Recent From James Andrew Lewis

Upcoming Event
China's Pursuit of Semiconductor Independence
February 28, 2019
Report
The Cybersecurity Workforce Gap
By William Crumpler, James Andrew Lewis
January 29, 2019
On Demand Event
Dawn of the Code War
January 15, 2019
Report
Comments to the Department of Commerce, Bureau of Industry and Security
By James Andrew Lewis
January 9, 2019
Commentary
Fly Me to the Moon
By James Andrew Lewis
January 3, 2019
Commentary
Building the Great Wall of Texas
By James Andrew Lewis
December 21, 2018
Report
How 5G Will Shape Innovation and Security
By James Andrew Lewis
December 6, 2018
Report
Technological Competition and China
By James Andrew Lewis
November 30, 2018
View all content by this expert
Footer menu
  • Topics
  • Regions
  • Programs
  • Experts
  • Events
  • Analysis
  • Web Projects
  • Podcasts
  • iDeas Lab
  • Transcripts
  • About Us
  • Support Us
Contact CSIS
Email CSIS
Tel: 202.887.0200
Fax: 202.775.3199
Visit CSIS Headquarters
1616 Rhode Island Avenue, NW
Washington, DC 20036
Media Queries
Contact H. Andrew Schwartz
Chief Communications Officer
Tel: 202.775.3242

Contact Emma Colbran
Communications Associate and Program Coordinator
Tel: 202.775.3211

Daily Updates

Sign up to receive The Evening, a daily brief on the news, events, and people shaping the world of international affairs.

Browse more CSIS Newsletters

Newsletter Subscription
Follow CSIS
  • Facebook
  • Twitter
  • LinkedIn
  • YouTube
  • Instagram

All content © 2019. All rights reserved.

Legal menu
  • Credits
  • Privacy Policy
  • Reprint Permissions