{"id":29944,"date":"2020-10-12T11:45:27","date_gmt":"2020-10-12T08:45:27","guid":{"rendered":"https:\/\/forklog.com\/en\/?p=29944"},"modified":"2025-08-27T19:47:11","modified_gmt":"2025-08-27T16:47:11","slug":"us-doj-end-to-end-encryption-poses-serious-public-safety-risks","status":"publish","type":"post","link":"https:\/\/u1f987.com\/en\/us-doj-end-to-end-encryption-poses-serious-public-safety-risks\/","title":{"rendered":"US DOJ: End-to-End Encryption Poses Serious Public-Safety Risks"},"content":{"rendered":"<p>End-to-end encryption carries &#8220;serious risks to public safety&#8221;. The conclusion is contained in a statement signed by the U.S. Department of Justice as well as the agencies of the United Kingdom, Australia, Canada, New Zealand, India and Japan.<!--more--><\/p>\n<blockquote class=\\\"twitter-tweet\\\">\n<p dir=\\\"ltr\\\" lang=\\\"en\\\">International Statement: End-To-End Encryption and Public Safety <a href=\\\"https:\/\/t.co\/q7gvZfeHms\\\">https:\/\/t.co\/q7gvZfeHms<\/a><\/p>\n<p>\u2014 Justice Department (@TheJusticeDept) <a href=\\\"https:\/\/twitter.com\/TheJusticeDept\/status\/1315309397120352257?ref_src=twsrc%5Etfw\\\">October 11, 2020<\/a><\/p>\n<\/blockquote>\n<p><script async src=\\\"https:\/\/platform.twitter.com\/widgets.js\\\" charset=\\\"utf-8\\\"><\/script><\/p>\n<p>The department urged technology companies to work with authorities and to provide capabilities for monitoring illegal activity.<\/p>\n<p>The department contends that end-to-end encryption could undermine companies\u2019 ability to detect and respond to information about child sexual exploitation, violent crime, and propaganda for terrorism.<\/p>\n<p>The DOJ backed its position with data from the international WePROTECT alliance, which brings together authorities from 98 countries, technology companies and civil society organizations.<\/p>\n<blockquote>\n<p>\u201cIn 2018, Facebook Messenger identified nearly 12 million of 18.4 million messages related to child sexual abuse. The current tools used to detect such offenses do not work in end-to-end encrypted environments,\u201d the statement notes.<\/p>\n<\/blockquote>\n<p>The DOJ also says it should have access to \u2018devices, user applications and integrated platforms where end-to-end encryption is used\u2019. The agency pledged to respect privacy.<\/p>\n<p>Users saw in the DOJ&#8217;s initiative a violation of the First Amendment of the U.S. Constitution, which protects freedom of expression.<\/p>\n<blockquote class=\\\"twitter-tweet\\\">\n<p dir=\\\"ltr\\\" lang=\\\"en\\\">No. If you believe in the first paragraph, then it\u2019s easy to understand how backdoored encryption removes all digital freedom, allowing state oppression. Stop.<\/p>\n<p>\u2014 John Carvalho (@BitcoinErrorLog) <a href=\\\"https:\/\/twitter.com\/BitcoinErrorLog\/status\/1315322236040024068?ref_src=twsrc%5Etfw\\\">October 11, 2020<\/a><\/p>\n<\/blockquote>\n<p><script async src=\\\"https:\/\/platform.twitter.com\/widgets.js\\\" charset=\\\"utf-8\\\"><\/script><\/p>\n<p>Back in June, Zoom&#8217;s leadership said it would provide the FBI with access to users violating the law.<\/p>\n<p>Follow ForkLog news on <a href=\\\"https:\/\/www.facebook.com\/forklog\\\" target=\\\"_blank\\\" rel=\\\"nofollow noopener noreferrer\\\">Facebook<\/a>!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>End-to-end encryption carries &#8220;serious risks to public safety&#8221;. The conclusion is contained in a statement signed by the U.S. Department of Justice as well as the authorities of the United Kingdom, Australia, Canada, New Zealand, India and Japan.<\/p>\n","protected":false},"author":1,"featured_media":26216,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"select":"1","news_style_id":"","cryptorium_level":"","_short_excerpt_text":"","creation_source":"","_metatest_mainpost_news_update":false,"footnotes":""},"categories":[3],"tags":[1142,26],"class_list":["post-29944","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-and-analysis","tag-cryptography","tag-usa"],"aioseo_notices":[],"amp_enabled":true,"views":"21","promo_type":"1","layout_type":"","short_excerpt":"","is_update":"","_links":{"self":[{"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/posts\/29944","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/comments?post=29944"}],"version-history":[{"count":1,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/posts\/29944\/revisions"}],"predecessor-version":[{"id":29945,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/posts\/29944\/revisions\/29945"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/media\/26216"}],"wp:attachment":[{"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/media?parent=29944"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/categories?post=29944"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/tags?post=29944"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}