example.com
Verify you are human by completing the action below.
In an Oct. 11 statement from the DoJ, the agency\u00a0called<\/a>\u00a0on technology companies to work with the government to find a solution for strong data encryption with the means to allow the investigation of illegal activity and content. The department stated end-to-end encryption that hindered law enforcement from accessing certain content creates \u201csevere risks to public safety.\u201d<\/p>\n The statement was signed by the DoJ, the Home Department of the United Kingdom, the Australian Minister for Home Affairs, India, Japan, a New Zealand Member of Parliament and the Minister of Public Safety and Emergency Preparedness of Canada.<\/p>\n In particular, the DoJ stated such encryption \u2014 in which only the senders and receivers can access the data being sent \u2014 undermined law enforcement from \u201cinvestigating serious crimes\u201d and \u201cprotecting national security.\u201d In addition, a tech company\u2019s ability to identify and respond to child sexual exploitation and abuse, violent crime, and terrorist propaganda may be compromised, claimed the department.<\/p>\n Citing a 2019 report from the National Center for Missing and Exploited Children (NCMEC), the government agency implied end-to-end encryption needed to be implemented with a solution to safeguard children, or it would undermine the current system of reporting such exploitation.<\/p>\n “In 2018, Facebook Messenger was responsible for nearly 12 million of the 18.4 million worldwide reports of CSAM [child sexual abuse material to the NCMEC],\u201d the DoJ said, citing a 2019 statement from the WePROTECT Global Alliance. \u201cThese reports risk disappearing if end-to-end encryption is implemented by default, since current tools used to detect CSAM do not work in end-to-end encrypted environments.\u201d<\/em><\/strong><\/p>\n Elected officials in the United States have already acted to seek a legislative solution to investigating the illicit activities to which the DoJ referred.<\/p>\n In June, three Republican senators put forth a bill that would\u00a0outlaw end-to-end encryption for technology companies<\/a>, requiring device manufacturers and service providers to assist law enforcement by providing access to encrypted data. The bill, named The Lawful Access to Encrypted Data Act, is currently under review in the Committee on the Judiciary. There is also the EARN IT Act, a proposed bill that would require digital messages to first pass through\u00a0government-approved scanning software<\/a>\u00a0in order to monitor for malicious criminal activity.<\/p>\n Proponents of both bills have claimed their purpose would include protecting children from sexual abuse. However, many privacy advocates have heavily criticized the bills’ sponsors for what they perceive as the government encroaching on personal freedoms.<\/p>\n Though its statement focused on end-to-end encryption, the DoJ stated it would extend its efforts to \u201cdevice encryption, custom encrypted applications and encryption across integrated platforms.\u201d The government agency claimed it would hold a \u201crespect for privacy\u201d at the forefront of any legal framework.<\/p>\n \u201cWe challenge the assertion that public safety cannot be protected without compromising privacy or cyber security,\u201d<\/em><\/strong> the DoJ stated.<\/p>\n Source:\u00a0https:\/\/cointelegraph.com\/news\/data-encryption-a-threat-to-fighting-child-sexual-abuse-says-doj<\/a>\n