• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

The United States Government argues that without proper regulation of encryption, national security is threatened.

Extracts from this document...

Introduction

As the medium for communication has transitioned from traditional to digital means, cryptography has transpired into a controversial issue. Recent terrorist attacks have sparked a mass array of political activism in many forms in a plea to prevent future tragedies from occurring. Heightened sensitivity furthermore has emitted strengthened political regulation in the form of national security. Recent Senate initiatives involving cryptography have reiterated both sides of the ethical debate. No compromise currently exists in which cryptography can be safely be regulated while ceasing to overstep the boundaries outlined by the United States constitution. One side of the issue derives the interest of national security. The United States Government argues that without proper regulation of encryption, national security is threatened. On the other side, the rights of privacy are at stake. Advocates argue that Governmental regulation would open a new venue for invasion of personal privacy. Within Cryptology exists the the study of the encryption and decryption of data. Plaintext is the original document that is stored or transmitted via a computer. Ciphertext is the actual encrypted document. Encryption transfers the plaintext into ciphertext, whereas decryption performs the reverse operation. During the encoding, plaintext is combined with "keys" which are numbers or strings of characters known only to the sender and recipient. Ciphertext uses these "keys" to convert the data back into its original form. ...read more.

Middle

SKIPJACK's unique structure disallows today's shortcut methods of attack while still providing internal structure to protect national security objectives. With 1 trillion possible keys, SKIPJACK would take 400 billion years to try all of its keys amid today's modern processing power. Key Management Infrastructure (KMI) or Clipper III tried to reform certain aspects to allow private and public keys. KMI relied on certificate authorities to meet government access requirements. However like its antecedent, the KMI proposal was discarded. Despite these events the U.S. Government continues to argue that regulation of cryptography is essential to national security. After the September 11th attacks, Senator Gregg of New Hampshire stated "I am hopeful we can set up a regime that will be fair, that will be subject to the judicial controls necessary to protect the Constitutional rights of people who are law-abiding but will also give our intelligence community the access to the information they need when they know there is somebody out there using encryption technology for the purposes of pursuing a terrorist act in the United States." Although regulation of such encryption could possibly limit some of its uses for illegality, many argue that government has no right to interfere with private digital information. Cryptography is essential for online businesses to provide security to its users. ...read more.

Conclusion

By implementing this act, citizens are protected from the invasions of privacy that could result from the regulation of encryption. Cryptography will remain a controversial issue. Future tragedies involving ethical issues based on encryption will continue to ignite debate on whether cryptography should be regulated. Many mediums across digital firms can be used for both protective as well as criminal activities. Means of security originally used to protect will persistently be twisted by those seeking to harm. The underlying question that remains is whether regulation is more beneficial then deregulation. Personally I believe that the notion of regulating encryption at this phase of the global network is not feasible. Encryption is currently so widely distributed that regulation would hurt more people then it would protect. Regulating such a powerful tool for security in light of a few who abuse its power is unhealthy. The Fourth Amendment is applicable to a home file cabinet just as it is to files within a home computer. It would be elusive to believe that a standardized encryption could possibly be implemented and regulated in a way that eliminates its illegal usages. Although the digital age creates ambiguity within new constitutional mythology and interpretation, our foundational principles should continue to be taken in their original proper meaning. As the United States continues to expand its technological boundaries, it must nevertheless cease to preserve the constitution in its literal context. 1 ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Politics section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Politics essays

  1. Why is the government involved in the regulation of business activity ?

    By nationalising for example, the government gains a lot of control as the state employs the people and not people employed by private individuals. The fact that these people are now dependant of the state gives the state a lot of power.

  2. citizenship data task

    Start finalising the ideas All group members The whole group must have produced a written report on the activities that we are carrying out, and how we are going to conduct them 8. Make a list of all the resources that we need for each activity and hand them

  1. A Critical Evaluation of UK's ID Card schemeA Government's proposal to monitor its Citizens

    "Ministers hope the ID card Bill will be rushed through, possibly before the May 30th Bank Holiday" [4] 5. THE CATALYST FOR THE CARD'S INTRODUCTION It is no secret that for many years now, Mr Blair's recently re-elected Labour Party has always been in favour of introducing a national ID card.

  2. The Drug Policy in the United States

    Under the CSA there are also laws that control who can have certain drugs in their possession, and who can distribute certain drugs as well as in what amounts, "the CSA also creates a closed system of distribution for those authorized to handle controlled substances.

  1. The conflict may be classified as a strike for power between Taliban government and ...

    In rural areas the Taliban presence was very light, and traditional structures of governance, notably the jirga, coexisted with other local power-holders. In urban areas, the control of the Taliban was more direct, and not exercised through cohesive bureaucratic structures, but rather the religious police, known as the department for

  2. When is government interference with an individual's freedom justified?

    To those who believe that for an individual to be truly free he or she must be able actually to exercise his or her freedom(s), government interference will be necessary to make individuals truly free and will be justifiable on those grounds alone.

  1. Who Holds Power in the United Kingdom Today?

    'Egalatarian' ideas (i.e. socialism and democracy) are merely illusions, far from the truth of reality. Rather, elite theorists put forward the idea that elitism is the by-product of political apathy amongst the majority of the population. This lack of interest in politics is, and always has been an inherent characteristic within the structure of society.

  2. Civil Service Reform.

    that there are considerable limitations to the extent that Conservative reforms have met the three Es criteria. (ii) Management Initiatives : The Efficiency Unit and the FMI Two management innovations, introduced in the first years of Mrs Thatcher's first government continue to have significant impact on the character and operating

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work