U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

Encryption and Evolving Technologies: Tools of Organized Crime and Terrorism

NCJ Number
174606
Journal
Trends in Organized Crime Volume: 3 Issue: 3 Dated: Spring 1998 Pages: 44-75
Author(s)
D E Denning; W E Baugh E,
Date Published
1998
Length
32 pages
Annotation
The impact of the proliferation and use of robust digital encryption technologies in law enforcement is assessed in terms of organized crime and terrorism.
Abstract
The focus is on criminal investigations rather than on foreign intelligence operations. Actual cases involving encryption provide information on the scope of the problem and methods used by law enforcement to deal with it. Findings from these cases suggest the total number of criminal cases involving encryption worldwide is at least 500. The threat posed by encryption to law enforcement, public safety, and national security is manifest in several ways: failure to obtain evidence needed for criminal investigations, failure to avert catastrophic or harmful attacks, and failure to obtain foreign intelligence vital to national security. Encryption can also delay criminal investigations, increase their costs, and require the use of investigative methods that may be dangerous or invade privacy. Trends in the encryption market of concern to law enforcement include the increasing integration of extremely strong encryption into commercial desktop applications and networks and the growing market for key recovery systems that protect owners of encrypted data from lost keys. Other tools that can be enhanced by encryption, including cloned cell phones and steganography, can be used to evade police detection, conduct surveillance, and intrude into computers and networks. Encryption policy options are discussed that concern export controls and regulations, and the U.S. encryption program to promote key recovery technologies through liberalized export controls, key recovery standards, and a voluntary licensing regime for key recovery agents is reviewed. The authors believe encryption is a critical international issue that demands a partnership between business and government and international collaboration. 35 references