{"id":10784,"date":"2016-01-17T16:55:25","date_gmt":"2016-01-17T22:55:25","guid":{"rendered":"http:\/\/hcstx.org\/?p=10784"},"modified":"2016-01-17T16:55:25","modified_gmt":"2016-01-17T22:55:25","slug":"the-encryption-debate-is-privacy-more-important-than-national-security","status":"publish","type":"post","link":"https:\/\/thetacticalhermit.com\/index.php\/2016\/01\/17\/the-encryption-debate-is-privacy-more-important-than-national-security\/","title":{"rendered":"The Encryption Debate: Is Privacy More Important Than National Security?"},"content":{"rendered":"<p><em><strong>The title to this article IMHO, aims to make the reader CHOOSE SIDES as to what is more important, Privacy or National Security. I propose to you that the expectation of Privacy, which is clearly defined in the 4th Amendment, and the DEFENSE of that Right, is what makes the United States unique as a Democracy (at least for the time being) without it, who cares about National Security? Because who wants to defend a Nation that does not care about the rights of it&#8217;s citizens?Regardless of where you stand on this debate, keep that in mind as you read it. -SF<\/strong><\/em><\/p>\n<p>&nbsp;<\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter size-full wp-image-10782\" src=\"https:\/\/hcsblogdotorg.files.wordpress.com\/2016\/01\/binary.jpeg\" alt=\"binary\" width=\"284\" height=\"177\" \/><\/p>\n<p>&nbsp;<\/p>\n<p id=\"e0aa\" class=\"graf--p graf-after--figure\">Recently the debate over encryption systems has taken on new interest. To date, law enforcement has relied upon the ability to access communications data through \u201cback doors\u201d, enabling them to essentially by-pass restrictive security measures. The FBI and other administration officials have taken a supportive posture suggesting the Tech industry be required to include \u201cback doors\u201d in their software development.<\/p>\n<p id=\"f088\" class=\"graf--p graf-after--p\">So what exactly are \u201cback doors\u201d? Essentially, they are software gaps that exist embedded within the software by programmers as part of the development process. The Tech industry is in disagreement with law enforcement\u2019s suggestion to require this manner of access citing concerns over \u201cleaving the door open,\u201d so to speak, for fear of hackers infiltrating their systems and exfiltrating sensitive or private customer data.<\/p>\n<p id=\"5112\" class=\"graf--p graf-after--figure\">Law enforcement has maintained the usefulness of this \u201cback door\u201d access as an important investigative tool for identifying and tracking communications. Terror groups and individuals have demonstrated their proficiency and propensity to utilize multiple telecommunications and social media platforms like Facebook, Twitter, Google, etc. for nefarious purposes. In the interest of maintaining transparency, these communications records remain accessible to law enforcement typically through subpoena. The Tech industry continues to refuses to introduce these vulnerabilities into their heavily encrypted environment.<\/p>\n<p>This issue is likely to remain at the forefront of discussion, but it forces citizens and the business community to ask themselves\u200a\u2014\u200aWould they support the practice of data access by law enforcement to combat terror even though it meant a reduction in the level of privacy Americans have come to demand? We have to ask ourselves at some point, what is the level of our \u201cWillingness to Pay\u201d in order to safeguard our national security?<\/p>\n<p id=\"c0c5\" class=\"graf--p graf-after--p\">Government officials have yet to formally weigh in on the matter and Tech industry leaders such as Apple\u2019s Tim Cook have only publicly commented on the need to balance both \u201cprivacy and security.\u201d Inevitably, this \u201cbalance\u201d will likely leave one side of the conversation discontent over the final decision; however no current projection or time frame has been identified for legislative resolution on the matter.<\/p>\n<p id=\"0c0a\" class=\"graf--p graf-after--figure\">Recent tragedies and events occurring both internationally and here in the U.S. have illustrated the level of outrage by our citizens who have expressed their expectation to be kept safe and secure here in the homeland. At issue is the potential trade-off that lays in the decision to allow the federal government and law enforcement to gain access to communications data to aid in the early detection and prevention of attacks against our American way of life. Access and analysis by the intelligence community provides the capability to develop potentially valuable investigative intelligence. Interception of this intelligence early on yields the best opportunity for law enforcement to employ mitigation strategies to thwart and event before it occurs.<\/p>\n<p id=\"a84b\" class=\"graf--p graf-after--p\">It is understandable why the public may feel uncomfortable with this increasingly intrusive level of government and law enforcement oversight as a standard of practice. After all, this premise is in direct contradiction to society\u2019s staunch posture to preserve a citizen\u2019s right to privacy\u00a0.<\/p>\n<p id=\"0e82\" class=\"graf--p graf-after--p\">The decision to require the Tech industry to provide \u201cback door\u201d access to investigators is a tough call for legislative officials to wrestle with. Compelling arguments can be made in support of either position; however, in light of the increasingly more violent national and global threat picture of today, we must consider our options in the hopes we never have to learn the answer.<\/p>\n<p id=\"cbaf\" class=\"graf--p graf-after--p\">Additional details on this discussion can be found in the following article link:<\/p>\n<p id=\"a529\" class=\"graf--p graf-after--p\">Submitted anonymously by a member of Team plugged-in.<\/p>\n<p id=\"abac\" class=\"graf--p graf-after--p\"><a class=\"markup--anchor markup--p-anchor\" href=\"http:\/\/www.cnet.com\/news\/tim-cook-pushes-white-house-to-take-stand-on-encryption\/\" rel=\"nofollow\">http:\/\/www.cnet.com\/news\/tim-cook-pushes-<\/a><a class=\"markup--anchor markup--p-anchor\" href=\"http:\/\/www.cnet.com\/news\/tim-cook-pushes-white-house-to-take-stand-on-encryption\/\" rel=\"nofollow\">white-house-to-take-stand-on-encryption\/<\/a><\/p>\n<p class=\"graf--p graf-after--p\">Read the Original Article at<strong> <a href=\"https:\/\/medium.com\/homeland-security\/the-encryption-debate-is-privacy-really-more-important-than-national-security-65f340c5344c#.bytezfv1t\">Medium<\/a><\/strong><\/p>\n<p id=\"9dd5\" class=\"graf--p graf-after--p\">\n","protected":false},"excerpt":{"rendered":"<p>The title to this article IMHO, aims to make the reader CHOOSE SIDES as to what is more important, Privacy or National Security. I propose to you that the expectation of Privacy, which is clearly defined in the 4th Amendment, and the DEFENSE of that Right, is what makes the United States unique as a&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_newsletter_tier_id":0,"jetpack_publicize_message":"","jetpack_is_tweetstorm":false,"jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false}}},"categories":[2122,1704,13,74,1317,883,1814,65,272,3712],"tags":[545,3866,3867,1865,3868],"jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/posts\/10784"}],"collection":[{"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/comments?post=10784"}],"version-history":[{"count":0,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/posts\/10784\/revisions"}],"wp:attachment":[{"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/media?parent=10784"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/categories?post=10784"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/tags?post=10784"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}