TechForward, welcome to this week’s Cutting Edge Technologies subject matter where we will layout for you an intense debate taking place in the U.S. about Encryption of information on your mobile device and law enforcement having a key to view the data on your mobile device regardless if it is private or not. My question to you is who is in the right position? To that end, let’s get it tech-cracking! Today and over the next two weeks I will continue writing on the series “Security and Encryption technologies” as well as convey how it applies to Cyber-Security (Internet & Mobile). For those who may or may not be on the Internet, in a Technology-Cloud, Tunnel or on a Mobile device note, “Security & Encryption” is not an option but rather a requirement in the digital spaces (Internet, WiFi, Clouds, Social Media, Email, Texting & IP phone calls). Without security, you, your data, family and business is at risk of being compromised in a negative way over both the short and long term(s). So we are on the same takeoff page if you will, allow me to establish the baseline or meaning of Encryption, then we will get into the discussion of “Who is Right” in the debate of “Encryption vs. Law Enforcement”. We will also nail down why there is in fact a debate between the two parties.
“Encryption” is a method of encoding messages or information in such a way that only authorized parties can read it. Encryption does not itself prevent interception, but rather denies the message content to the inceptor. In an encryption scheme, the message or information, referred to as “plaintext”, is encrypted using an encryption algorithm, generating “ciphertext” that can only be read if decrypted which is only enabled with the decryption-key. Encryption is commonly used to secure online banking, bill payments online, credit card processing (PCI Compliance) or when logging onto companies’ private networks to name a few. However, for the average computer users, encryption remains a mystery. Here is Tech-insights through TechForward to help the readership unlock the under and over-standing:
For example, during the week of July 6, 2015, the U.S. Federal Government & White House confirmed their Cyber-Security Network(s) were compromised noting, 21 Million to 22 Million current / former employees / contractor’s names, addresses, social security & phone numbers plus other personal information was taken in the “Cyber-Security Heist” of the year. I have one simple question; can the blind (U.S. Govt. Regulation Arm(s) (FCC / CyberSecurity / FBI / CIA / FTC / Finance / FERC) lead (regulate) the blind (general public of consumers, businesses & industries) and get it right “securely”? Had this data been Encrypted with Mobile Encryption Technologies then that data could have been compromised and taken for that matter however, the group(s) could not have read the data or in security industry terms “decipher / decrypt” the encrypted names, addresses, social security & phone numbers for future negative uses. This leads us to our subject matter of today. Who is Right in the debate of Encryption vs. Law Enforcement (We will have a live round table discussion at KCOH on the SMART Millennial Tech Hour ((Saturdays 10 – 11 CST)) on the All New KCOH 1230 & KCOH TV in the very near future – stay tuned).
Here is the basis and central issue of the debate of Encryption vs. Law Enforcement; in a nutshell, it is an intense debate of “privacy-rights”. I am a mobile phone user and owner where I own my device in tandem with all of the information residing on my mobile device. I have the right to secure my device in the same way I have the right to secure my homestead. However, due to Terrorism, Terrorists, Homeland Security, FBI, CIA, ICE, Sarbanes-Oxley etc. the Law Enforcement Communities feel they should have the right and ability to access encrypted communications (phone-mobile devices-email-texts-social media) in the name of foiling terrorist plots and / or criminal activities. Both Law Enforcement and National Security officials want the makers and producers of highly encrypted technologies to make available to them within the framework a way to decipher / decrypt all encrypted communication or in other words provide to them the “encryption key” (in simple terms that is like providing law enforcement door keys to every U.S citizen home / resident in the U.S.) so Law Enforcement can fully access all data / information on your iPhone, Android, Windows or mobile devices (secure and unsecure info).Can you say several violations and invasions of civil, human and privacy rights domestically / internationally? Who is right?
If you need Encryption or Security services as a consumer or company then please contact Mobile Encryption Technologies (http://www.mobile-encryption.net) or call 404-829-3066, a true Mobile Solution and Encryption firm.
We value your readership and hope this series will take your mind to next levels of thinking around both Security & Encryption Technologies.