Loading…

Inside Risks: Keys Under Doormats

Twenty years ago, law enforcement organizations lobbied to require data and communication services to engineer their products to guarantee law enforcement access to all data. After lengthy debate and vigorous predictions of enforcement channels going dark, these attempts to regulate the emerging Int...

Full description

Saved in:
Bibliographic Details
Published in:Communications of the ACM 2015-10, Vol.58 (10), p.24
Main Authors: Abelson, Harold "Hal", Anderson, Ross, Bellovin, Steven M, Benaloh, Josh, Blaze, Matt, Diffie, Whitfield "Whit", Gilmore, John, Green, Matthew, Landau, Susan, Neumann, Peter G, Rivest, Ronald L, Schiller, Jeffrey I, Schneier, Bruce, Specter, Michael A, Weitzner, Daniel J
Format: Magazinearticle
Language:English
Subjects:
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by
cites
container_end_page
container_issue 10
container_start_page 24
container_title Communications of the ACM
container_volume 58
creator Abelson, Harold "Hal"
Anderson, Ross
Bellovin, Steven M
Benaloh, Josh
Blaze, Matt
Diffie, Whitfield "Whit"
Gilmore, John
Green, Matthew
Landau, Susan
Neumann, Peter G
Rivest, Ronald L
Schiller, Jeffrey I
Schneier, Bruce
Specter, Michael A
Weitzner, Daniel J
description Twenty years ago, law enforcement organizations lobbied to require data and communication services to engineer their products to guarantee law enforcement access to all data. After lengthy debate and vigorous predictions of enforcement channels going dark, these attempts to regulate the emerging Internet were abandoned. In the intervening years, innovation on the Internet flourished, and law enforcement agencies found new and more effective means of accessing vastly larger quantities of data. Today, they are again hearing calls for regulation to mandate the provision of exceptional access mechanisms. In this column, computer scientists and security experts, many of whom participated in a 1997 study of these same topics, explore the likely effects of imposing extraordinary access mandates. Computer scientists with extensive security and systems experience believe law enforcement has failed to account for the risks inherent in exceptional access systems. Based on their considerable expertise in real-world applications, they know such risks lurk in the technical details.
doi_str_mv 10.1145/2814825
format magazinearticle
fullrecord <record><control><sourceid>proquest</sourceid><recordid>TN_cdi_proquest_journals_1722657296</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>3838981761</sourcerecordid><originalsourceid>FETCH-LOGICAL-p98t-10d5a9bada8dfdec6e597d4b55f5e929b89bb50195c81a30d2c781eae146d39b3</originalsourceid><addsrcrecordid>eNotjU1LAzEUAIMouNbiX1jxHJuX7MuHN2mrlhYEac8l2fcWWnW3braH_nsLehrmMiPEHahHgAon2kPlNV6IAhCddAbcpSiUUiCV8_pa3OS8P6tCi4W4X7R5R1x-7PJnfiqXfMrlpiXuy1nX9d9xyLfiqolfmcf_HIn1y3w9fZOr99fF9HklD8EPEhRhDClS9NQQ15YxOKoSYoMcdEg-pIQKAtYeolGka-eBI0NlyYRkRuLhL3vou58j52G77459ez5uwWlt0elgzS_H-T2w</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>magazinearticle</recordtype><pqid>1722657296</pqid></control><display><type>magazinearticle</type><title>Inside Risks: Keys Under Doormats</title><source>EBSCOhost Business Source Ultimate</source><source>Association for Computing Machinery:Jisc Collections:ACM OPEN Journals 2023-2025 (reading list)</source><creator>Abelson, Harold "Hal" ; Anderson, Ross ; Bellovin, Steven M ; Benaloh, Josh ; Blaze, Matt ; Diffie, Whitfield "Whit" ; Gilmore, John ; Green, Matthew ; Landau, Susan ; Neumann, Peter G ; Rivest, Ronald L ; Schiller, Jeffrey I ; Schneier, Bruce ; Specter, Michael A ; Weitzner, Daniel J</creator><creatorcontrib>Abelson, Harold "Hal" ; Anderson, Ross ; Bellovin, Steven M ; Benaloh, Josh ; Blaze, Matt ; Diffie, Whitfield "Whit" ; Gilmore, John ; Green, Matthew ; Landau, Susan ; Neumann, Peter G ; Rivest, Ronald L ; Schiller, Jeffrey I ; Schneier, Bruce ; Specter, Michael A ; Weitzner, Daniel J</creatorcontrib><description>Twenty years ago, law enforcement organizations lobbied to require data and communication services to engineer their products to guarantee law enforcement access to all data. After lengthy debate and vigorous predictions of enforcement channels going dark, these attempts to regulate the emerging Internet were abandoned. In the intervening years, innovation on the Internet flourished, and law enforcement agencies found new and more effective means of accessing vastly larger quantities of data. Today, they are again hearing calls for regulation to mandate the provision of exceptional access mechanisms. In this column, computer scientists and security experts, many of whom participated in a 1997 study of these same topics, explore the likely effects of imposing extraordinary access mandates. Computer scientists with extensive security and systems experience believe law enforcement has failed to account for the risks inherent in exceptional access systems. Based on their considerable expertise in real-world applications, they know such risks lurk in the technical details.</description><identifier>ISSN: 0001-0782</identifier><identifier>EISSN: 1557-7317</identifier><identifier>DOI: 10.1145/2814825</identifier><identifier>CODEN: CACMA2</identifier><language>eng</language><publisher>New York: Association for Computing Machinery</publisher><subject>Data integrity ; Internet access ; Law enforcement ; Regulation</subject><ispartof>Communications of the ACM, 2015-10, Vol.58 (10), p.24</ispartof><rights>Copyright Association for Computing Machinery Oct 2015</rights><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>780,784,27925</link.rule.ids></links><search><creatorcontrib>Abelson, Harold "Hal"</creatorcontrib><creatorcontrib>Anderson, Ross</creatorcontrib><creatorcontrib>Bellovin, Steven M</creatorcontrib><creatorcontrib>Benaloh, Josh</creatorcontrib><creatorcontrib>Blaze, Matt</creatorcontrib><creatorcontrib>Diffie, Whitfield "Whit"</creatorcontrib><creatorcontrib>Gilmore, John</creatorcontrib><creatorcontrib>Green, Matthew</creatorcontrib><creatorcontrib>Landau, Susan</creatorcontrib><creatorcontrib>Neumann, Peter G</creatorcontrib><creatorcontrib>Rivest, Ronald L</creatorcontrib><creatorcontrib>Schiller, Jeffrey I</creatorcontrib><creatorcontrib>Schneier, Bruce</creatorcontrib><creatorcontrib>Specter, Michael A</creatorcontrib><creatorcontrib>Weitzner, Daniel J</creatorcontrib><title>Inside Risks: Keys Under Doormats</title><title>Communications of the ACM</title><description>Twenty years ago, law enforcement organizations lobbied to require data and communication services to engineer their products to guarantee law enforcement access to all data. After lengthy debate and vigorous predictions of enforcement channels going dark, these attempts to regulate the emerging Internet were abandoned. In the intervening years, innovation on the Internet flourished, and law enforcement agencies found new and more effective means of accessing vastly larger quantities of data. Today, they are again hearing calls for regulation to mandate the provision of exceptional access mechanisms. In this column, computer scientists and security experts, many of whom participated in a 1997 study of these same topics, explore the likely effects of imposing extraordinary access mandates. Computer scientists with extensive security and systems experience believe law enforcement has failed to account for the risks inherent in exceptional access systems. Based on their considerable expertise in real-world applications, they know such risks lurk in the technical details.</description><subject>Data integrity</subject><subject>Internet access</subject><subject>Law enforcement</subject><subject>Regulation</subject><issn>0001-0782</issn><issn>1557-7317</issn><fulltext>true</fulltext><rsrctype>magazinearticle</rsrctype><creationdate>2015</creationdate><recordtype>magazinearticle</recordtype><recordid>eNotjU1LAzEUAIMouNbiX1jxHJuX7MuHN2mrlhYEac8l2fcWWnW3braH_nsLehrmMiPEHahHgAon2kPlNV6IAhCddAbcpSiUUiCV8_pa3OS8P6tCi4W4X7R5R1x-7PJnfiqXfMrlpiXuy1nX9d9xyLfiqolfmcf_HIn1y3w9fZOr99fF9HklD8EPEhRhDClS9NQQ15YxOKoSYoMcdEg-pIQKAtYeolGka-eBI0NlyYRkRuLhL3vou58j52G77459ez5uwWlt0elgzS_H-T2w</recordid><startdate>20151001</startdate><enddate>20151001</enddate><creator>Abelson, Harold "Hal"</creator><creator>Anderson, Ross</creator><creator>Bellovin, Steven M</creator><creator>Benaloh, Josh</creator><creator>Blaze, Matt</creator><creator>Diffie, Whitfield "Whit"</creator><creator>Gilmore, John</creator><creator>Green, Matthew</creator><creator>Landau, Susan</creator><creator>Neumann, Peter G</creator><creator>Rivest, Ronald L</creator><creator>Schiller, Jeffrey I</creator><creator>Schneier, Bruce</creator><creator>Specter, Michael A</creator><creator>Weitzner, Daniel J</creator><general>Association for Computing Machinery</general><scope>JQ2</scope></search><sort><creationdate>20151001</creationdate><title>Inside Risks: Keys Under Doormats</title><author>Abelson, Harold "Hal" ; Anderson, Ross ; Bellovin, Steven M ; Benaloh, Josh ; Blaze, Matt ; Diffie, Whitfield "Whit" ; Gilmore, John ; Green, Matthew ; Landau, Susan ; Neumann, Peter G ; Rivest, Ronald L ; Schiller, Jeffrey I ; Schneier, Bruce ; Specter, Michael A ; Weitzner, Daniel J</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-p98t-10d5a9bada8dfdec6e597d4b55f5e929b89bb50195c81a30d2c781eae146d39b3</frbrgroupid><rsrctype>magazinearticle</rsrctype><prefilter>magazinearticle</prefilter><language>eng</language><creationdate>2015</creationdate><topic>Data integrity</topic><topic>Internet access</topic><topic>Law enforcement</topic><topic>Regulation</topic><toplevel>online_resources</toplevel><creatorcontrib>Abelson, Harold "Hal"</creatorcontrib><creatorcontrib>Anderson, Ross</creatorcontrib><creatorcontrib>Bellovin, Steven M</creatorcontrib><creatorcontrib>Benaloh, Josh</creatorcontrib><creatorcontrib>Blaze, Matt</creatorcontrib><creatorcontrib>Diffie, Whitfield "Whit"</creatorcontrib><creatorcontrib>Gilmore, John</creatorcontrib><creatorcontrib>Green, Matthew</creatorcontrib><creatorcontrib>Landau, Susan</creatorcontrib><creatorcontrib>Neumann, Peter G</creatorcontrib><creatorcontrib>Rivest, Ronald L</creatorcontrib><creatorcontrib>Schiller, Jeffrey I</creatorcontrib><creatorcontrib>Schneier, Bruce</creatorcontrib><creatorcontrib>Specter, Michael A</creatorcontrib><creatorcontrib>Weitzner, Daniel J</creatorcontrib><collection>ProQuest Computer Science Collection</collection><jtitle>Communications of the ACM</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Abelson, Harold "Hal"</au><au>Anderson, Ross</au><au>Bellovin, Steven M</au><au>Benaloh, Josh</au><au>Blaze, Matt</au><au>Diffie, Whitfield "Whit"</au><au>Gilmore, John</au><au>Green, Matthew</au><au>Landau, Susan</au><au>Neumann, Peter G</au><au>Rivest, Ronald L</au><au>Schiller, Jeffrey I</au><au>Schneier, Bruce</au><au>Specter, Michael A</au><au>Weitzner, Daniel J</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Inside Risks: Keys Under Doormats</atitle><jtitle>Communications of the ACM</jtitle><date>2015-10-01</date><risdate>2015</risdate><volume>58</volume><issue>10</issue><spage>24</spage><pages>24-</pages><issn>0001-0782</issn><eissn>1557-7317</eissn><coden>CACMA2</coden><abstract>Twenty years ago, law enforcement organizations lobbied to require data and communication services to engineer their products to guarantee law enforcement access to all data. After lengthy debate and vigorous predictions of enforcement channels going dark, these attempts to regulate the emerging Internet were abandoned. In the intervening years, innovation on the Internet flourished, and law enforcement agencies found new and more effective means of accessing vastly larger quantities of data. Today, they are again hearing calls for regulation to mandate the provision of exceptional access mechanisms. In this column, computer scientists and security experts, many of whom participated in a 1997 study of these same topics, explore the likely effects of imposing extraordinary access mandates. Computer scientists with extensive security and systems experience believe law enforcement has failed to account for the risks inherent in exceptional access systems. Based on their considerable expertise in real-world applications, they know such risks lurk in the technical details.</abstract><cop>New York</cop><pub>Association for Computing Machinery</pub><doi>10.1145/2814825</doi></addata></record>
fulltext fulltext
identifier ISSN: 0001-0782
ispartof Communications of the ACM, 2015-10, Vol.58 (10), p.24
issn 0001-0782
1557-7317
language eng
recordid cdi_proquest_journals_1722657296
source EBSCOhost Business Source Ultimate; Association for Computing Machinery:Jisc Collections:ACM OPEN Journals 2023-2025 (reading list)
subjects Data integrity
Internet access
Law enforcement
Regulation
title Inside Risks: Keys Under Doormats
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-06T21%3A17%3A37IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Inside%20Risks:%20Keys%20Under%20Doormats&rft.jtitle=Communications%20of%20the%20ACM&rft.au=Abelson,%20Harold%20%22Hal%22&rft.date=2015-10-01&rft.volume=58&rft.issue=10&rft.spage=24&rft.pages=24-&rft.issn=0001-0782&rft.eissn=1557-7317&rft.coden=CACMA2&rft_id=info:doi/10.1145/2814825&rft_dat=%3Cproquest%3E3838981761%3C/proquest%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-p98t-10d5a9bada8dfdec6e597d4b55f5e929b89bb50195c81a30d2c781eae146d39b3%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=1722657296&rft_id=info:pmid/&rfr_iscdi=true