preview

National Security: At What Price

analytical Essay
2046 words
2046 words
bookmark

National Security: At What Price Never has information played a more important role in society than it does today. The advent of the Internet has made the distribution and collection of information easier and faster than ever before. Today, the Internet is used for communications, shopping, management, and even financial transactions. Despite the slowing economy, recent years have seen a large increase in Internet usage by corporations, and research indicates that this trend will likely continue. Figures gathered by eMarketeer indicate that Internet based commerce will reach as high as $2.4 trillion by 2004 (B2B). With easy access to information from anywhere on the globe, safeguards must be taken to protect sensitive data from falling into the wrong hands. These measures include passwords, protected networks, and secure connections. While much has been accomplished in the area of network security, data encryption remains the most fundamental layer of protection. The goal of data encryption (or cryptography) is to render information unreadable to all except an authorized user (one who knows the password, also called the key). While there are many encryption algorithms and techniques, most involve the use of a "private key" which is the mathematical value that decodes the information. Without the key, a hacker has a chance of one in several trillion to correctly decode the information, making encryption a very effective method of data protection. While encryption fills a critical role in personal and corporate security, the technology can also be used by criminal and terrorist organizations. The same systems that protect your credit card number online can also be used to organize covert operations in safety.... ... middle of paper ... ... Wired News. March 31, 2002 . McCullagh, Declan. Senator Backs Off Backdoors. October 17, 2001. Wired News. March 31, 2002 . Quotations. n.d. FreedomWriter.com. March 31, 2002 . Schwartz, John. "Disputes on Electronic Message Encryption Take On New Urgency." September 25, 2001. The New York Times Company. February 28, 2002 . U.S. Encryption Policy. February 28, 2002. Center for Democracy and Technology. February 28, 2002 . U.S. Policy on Encryption Should Protect Our Right to Privacy. n.d. Americans for Computer Privacy. February 28, 2002 .

In this essay, the author

  • Cites abelson, hal, et al. the risks of key recovery, key escrow, and trusted third party encryption.
  • Describes bellovin, steven, et al. comments on the carnivore system technical review.
  • Describes blaze, matt, and steven bellovin's books on 'tapping tapping on my network door'.
  • Explains cdt policy post volume 7, number 11. october 26, 2001. center for democracy and technology.
  • Argues that the advent of the internet has made the distribution and collection of information easier and faster than ever before.
  • Explains the impact of a secret cryptographic standard on encryption, privacy, law enforcement, and technology.
  • Analyzes how mccullagh, declan, and senator backs off backdoors.
  • Cites schwartz, john, "disputes on electronic message encryption take on new urgency" and center for democracy and technology.
Get Access