FBI Director James Comey is holding back no punches in his quest to persuade American technology companies to hand over the encryption keys to their software that helps keep your data secure. Keeping my data out of the hands of thieves who might steal my Personally Identifiable Information for the purpose of identity theft is pretty important to me, so I question the efforts of James Comey and his attempt to compromise the integrity of these security mechanisms.
It’s important to understand what encryption is, and it is important to see why James Comey is concerned about terrorists using encryption to hide their communications. In cryptography, encryption is the process of encoding messages or information in such a way that only authorized parties can read it. Encryption will not prevent the interception of a message, but it will deny the content of the message to the interceptor. Simply put the process takes a message in plaintext, encrypts the message using an encryption algorithm, which generates ciphertext that can only be read if it is decrypted. The intended recipient of the message will use an encryption key to decrypt the message back to plaintext.
Encryption is used in a number of different ways. You can encrypt email messages
I will agree with Mr. Comey that terrorists do use encryption to hide communications between each other and that accessing that encrypted data could be beneficial to counterterrorism efforts. However, I unlike many, will not sacrifice my liberties for security. The N.S.A. and its warrantless wire taps demonstrated an abuse of power in the past, and I’m concerned that governments would use the power to decrypt messages at will or store and data mine encrypted communications of Americans. Mr. Comey will argue that suspect data would only be decrypted after getting a warrant, but that is questionable after considering the N.S.A. and previous warrantless wire taps.
If the U.S. government is serious about defending Americans against terrorist attacks,