Lawful hacking: toward a middle-ground solution to the going dark problem
Nguyen, Hoaithi Y.T.
MetadataShow full item record
This thesis examines the ongoing debate between law enforcement and the intelligence communities on one side, and the technology industry and privacy rights groups on the other, over the going dark problem. Going dark is a phenomenon created by ubiquitous use of end-to-end encryption over communication devices and Internet platforms, rendering those communications warrant-proof. End-to-end encryption means that only the sender and receiver of the message can read it, and no one in between. Even with a properly executed warrant or subpoena, law enforcement and intelligence agencies are unable to access the data they need because that data was encrypted. This thesis explores the historical, political and legislative developments that contributed to the rise of encryption in recent years, as well as constitutional doctrines that may be relevant to the public debate over possible policy solutions. Through the policy options analysis method, this thesis identifies lawful hacking as a middle-ground solution that policymakers should adopt in the short term. It also recommends that the U.S. government initiate a public education campaign to gain public support for some form of regulation concerning encryption in the future. The fundamental issue here is not only about the tension between privacy and security. The issue is also about who should make decisions with broad implications for the collective security: elected officials or the technology industry.
Approved for public release; distribution is unlimited
Showing items related by title, author, creator and subject.
Ware, Ryan T. (Monterey, California. Naval Postgraduate School, 2010-06);In this thesis, we attempt to analyze the effectiveness of defense-in-depth mechanisms. As an example of defense-indepth, we study two layers of encryption to protect network traffic. At a quick glance, two layers of ...
Melton, Jacob D. (Monterey, CA; Naval Postgraduate School, 2018-06);Cyber criminals are increasingly using malicious programs to take control of and exploit individuals’, businesses’, and governments’ data. A large portion of malware is a type called ransomware, which finds a way to restrict ...
Donahue, James L. (Monterey, California: Naval Postgraduate School, 2018-03);This thesis examines the encryption policies of Israel and China in an effort to determine whether their respective approaches effectively and reasonably address the issue of law enforcement access to encrypted devices in ...