As schools embark on a year of virtual or hybrid learning, hackers are seeking to exploit weaknesses in systems largely unprepared to fend off attacks. States must take the lead by updating technology and training users.
There’s no way to give law enforcement and other good actors access to encrypted communications without also weakening encryption and giving criminals and malicious state actors easier access to sensitive data.
As schools embark on a year of virtual or hybrid learning, hackers are seeking to exploit weaknesses in systems largely unprepared to fend off attacks. States must take the lead by updating technology and training users.
ITIF hosted a discussion on the implications of current legislative proposals, the efficacy and feasibility of creating “backdoors” for law enforcement to access encrypted data, and the impact these requirements would have on law-abiding American citizens and businesses.
ITIF hosted a video webinar to discuss the cybersecurity risks facing workers, students, and organizations during the pandemic and how policymakers can help them become more resilient and better prepared to face future challenges.
Law enforcement authorities complain encryption makes it impossible for them to decipher the communications of criminals and terrorists, so they argue tech companies offering encrypted products and
Cyberattacks are on the rise at all levels of government, but many small jurisdictions do not have the resources to protect themselves. Their vulnerability affects states and the federal government, who must pitch in.
While law enforcement needs tools to protect the public, requiring companies to provide access to encrypted consumer data would have the unintended consequence of putting vulnerable populations at risk without solving law enforcement’s most significant challenges in using digital evidence.
The recent WhatsApp lawsuit shows the significant risk to individuals, as well as public trust, that comes from allowing commercial systems to remain exploitable.