Encryption

AI, Encryption, and Data Flows: Policy Imperatives for U.S. Leadership

Editor’s note: In February, The National Interest organized a symposium on the U.S.-China technology race amidst the emergence of DeepSeek and ongoing legal battles over TikTok. We asked a variety of experts the following...

How Pakistan Brought Cyberwar to Kashmir

India and Pakistan have fought four wars over Kashmir since 1947. In addition to the full-fledged conventional wars, Pakistan has sponsored and supported a proxy insurgency in Kashmir over the...

Preparation Is Key: How America Can Get Ahead of Q-Day

Referring to Q-Day, the day when quantum computers are powerful enough to break our current encryption, Arthur Herman, senior fellow at the Hudson Institute, once wrote the following: “Q-Day is...

Can Cyber Intelligence Collection Support Human Rights?

In November 2021, the Biden administration added Israel’s NSO Group to the U.S. Department of Commerce’s trade-restricted Entity List. Officially, this was because the organization had “engaged in activities that...

Baltimore Goes Dark: Police Scanner Encryption Creates New Danger

Police activity in Baltimore will soon be concealed by the shroud of an encrypted radio system. This new equipment will allow officers to work without worrying about whether a crafty criminal is...

iPhone War: The Justice Department Is Taking On Apple Over Encryption (Again)

In the wake of last month’s shooting at a Pensacola, Florida, naval base, Attorney General William Barr is putting pressure on Apple to help FBI investigators unlock two of the shooter’s iPhones....

Barr Wants Apple to Unlock Pensacola Shooter’s iPhone

Attorney General William Barr is pressing Apple for access to the two phones a gunman used before killing three sailors in Florida. Apple gave investigators materials from Second Lt. Mohammed...

Demanding Weaker Encryption To Help Law Enforcement Makes Us All Less Safe

This week, the Senate Judiciary Committee will hold a hearing examining a Groundhog Day issue in internet policy: Should the government require tech companies to redesign their systems so that...

Is It Time to Ban End-To-End Encryption?

Recently some of my AEI colleagues argued that “strong encryption is crucial to both Americans’ personal security and US national security.” They critiqued the Department of Justice’s (DOJ) renewed push...

Website Privacy Options Aren’t Much of a Choice Since They’re Hard to Find and Use

You’ve probably encountered a pair of shoes that won’t stop following you around the internet, appearing in advertisements on different sites for weeks. Today, the vast majority of advertising is...

WhatsApp Hacked and Bugs in Intel chips: What You Need to Know

It’s been a day of high-profile security incidents. First there was news the popular WhatsApp messenger app was hacked. Updated versions of WhatsApp have been released, which you should install...

Technology is Making Terrorists More Effective—And Harder to Thwart

In January, Director of National Intelligence Daniel Coats appeared before Congress to deliver the U.S. intelligence community’s most recent assessment of “worldwide threats” facing the United States. Of these, Coats’...