National Academies Press: OpenBook
« Previous: 1 Overview
Suggested Citation:"2 Welcome and Opening Remarks." National Academies of Sciences, Engineering, and Medicine. 2016. Exploring Encryption and Potential Mechanisms for Authorized Government Access to Plaintext: Proceedings of a Workshop. Washington, DC: The National Academies Press. doi: 10.17226/23593.
×

2

Welcome and Opening Remarks

The workshop opened with framing remarks delivered by Fred H. Cate, C. Ben Dutton Professor of Law at Indiana University Maurer School of Law and chair of the workshop planning committee. He began with an overview of the workshop’s goals and parameters.

Recognizing that the topic of encryption and government access has engendered lively debate and that attendees hold diverse perspectives, Cate expressed his hope that the workshop could help to move the conversation forward by exploring the different and sometimes conflicting views on the technologies involved in encryption and mechanisms for obtaining access to plaintext. He emphasized that the workshop will not produce recommendations of any sort and does not aim to achieve consensus among attendees. He also clarified that the workshop is not intended to grapple with the wide range of values involved in considerations about government access to plaintext or to be a forum for evaluating how the country should proceed with regard to policy or other actions.

Cate summarized the workshop’s purpose as elucidating the potential options in a technologically rigorous way and outlined the meeting’s four focus areas:

  1. The current encryption landscape,
  2. Encryption use cases and the feasibility of segmenting encryption policies,
  3. Security risks of architectures for enabling access to plaintext, and
  4. Technical and policy mitigations for inaccessible plaintext.

Later in the workshop, Cate brought attendees’ attention to a National Academies of Sciences, Engineering, and Medicine study currently under way titled “Law Enforcement and Intelligence Access to Plaintext Information in an Era of Widespread Strong Encryption: Options and Trade-offs,” which is intended to dive deeper into many of the topics being discussed at the workshop. That study is slated for completion in 2017.

Cate acknowledged the workshop sponsor, the Office of the Director of National Intelligence, which requested the workshop in an effort to bring together a wide range of perspectives to advance the discussion in a neutral forum. He also expressed gratitude to the workshop organizers, including the planning committee members and Computer Science and Telecommunications Board staff members, who worked quickly to organize in a matter of weeks a high-caliber workshop that would typically have taken months to plan.

Suggested Citation:"2 Welcome and Opening Remarks." National Academies of Sciences, Engineering, and Medicine. 2016. Exploring Encryption and Potential Mechanisms for Authorized Government Access to Plaintext: Proceedings of a Workshop. Washington, DC: The National Academies Press. doi: 10.17226/23593.
×
Page 2
Next: 3 Session 1. The Current Encryption Landscape »
Exploring Encryption and Potential Mechanisms for Authorized Government Access to Plaintext: Proceedings of a Workshop Get This Book
×
 Exploring Encryption and Potential Mechanisms for Authorized Government Access to Plaintext: Proceedings of a Workshop
Buy Paperback | $42.00 Buy Ebook | $33.99
MyNAP members save 10% online.
Login or Register to save!
Download Free PDF

In June 2016 the National Academies of Sciences, Engineering, and Medicine convened the Workshop on Encryption and Mechanisms for Authorized Government Access to Plaintext. Participants at this workshop discussed potential encryption strategies that would enable access to plaintext information by law enforcement or national security agencies with appropriate authority. Although the focus of the workshop was on technical issues, there was some consideration of the broader policy context, and discussion about the topics of encryption and authorized exceptional analysis frequently addressed open policy questions as well as technical issues. This publication summarizes the presentations and discussions from the workshop.

READ FREE ONLINE

  1. ×

    Welcome to OpenBook!

    You're looking at OpenBook, NAP.edu's online reading room since 1999. Based on feedback from you, our users, we've made some improvements that make it easier than ever to read thousands of publications on our website.

    Do you want to take a quick tour of the OpenBook's features?

    No Thanks Take a Tour »
  2. ×

    Show this book's table of contents, where you can jump to any chapter by name.

    « Back Next »
  3. ×

    ...or use these buttons to go back to the previous chapter or skip to the next one.

    « Back Next »
  4. ×

    Jump up to the previous page or down to the next one. Also, you can type in a page number and press Enter to go directly to that page in the book.

    « Back Next »
  5. ×

    Switch between the Original Pages, where you can read the report as it appeared in print, and Text Pages for the web version, where you can highlight and search the text.

    « Back Next »
  6. ×

    To search the entire text of this book, type in your search term here and press Enter.

    « Back Next »
  7. ×

    Share a link to this book page on your preferred social network or via email.

    « Back Next »
  8. ×

    View our suggested citation for this chapter.

    « Back Next »
  9. ×

    Ready to take your reading offline? Click here to buy this book in print or download it as a free PDF, if available.

    « Back Next »
Stay Connected!