Skip to Content

Do We Deserve Total Digital Privacy?

A quarter-century ago, a “protracted battle” over encryption began between law enforcement and civil-rights activists.
April 26, 2016

Digital technology offers, in principle, unprecedented privacy. It is possible to use a computer program to encode a message so that its meaning will be revealed only to someone possessing a digital key. Such ‘encryption’ serves two principal purposes: it ensures that only the person for whom the message is intended will read it, and it guarantees that the person who appears to have sent a message is indeed the actual sender. Without encryption, someone skilled in software manipulation can with relative ease impersonate someone else over the network. (Although virtually all systems require users to enter a password, hackers can run programs that quickly try dozens of likely passwords.)

Meanwhile, the law-enforcement community, seeing computer networks as the latest venue for criminals to conspire, may soon attempt to restrict domestic encryption directly. The proposal reflects the FBI’s concern that the new digital network will stymie attempts to conduct court-sanctioned surveillance. Old-fashioned telephone lines can be tapped with relative ease, says James K. Kallstrom, the FBI’s chief of investigative technology, since each voice conversation travels along its own wire loop. Although Kallstrom says that members of the law-enforcement community ‘only want to keep the same access we already have,’ the FBI’s proposal has raised a fury among civil libertarians. ‘Wiretapping is a necessary evil, but to treat it as an entitlement would be a great mistake,’ says Marc Rotenberg, director of Computer Professionals for Social Responsibility’s Washington office. Alan Westin, professor of public law and government at Columbia University, concurs: ‘It’s like saying that no private home may have thick steel doors because some day the police might want to kick the door in as part of a lawful criminal investigation.’

The FBI proposal marks an opening salvo in what could become a protracted battle between government agencies and civil-liberties advocates. But even those allied with the law-enforcement community admit that public demand will eventually bring encryption into widespread use, says Donn Parker of SRI International in Menlo Park, California. The question then becomes how to catch the bad guys without tapping their phone calls.”

Excerpted from “Of Bytes and Rights,” by senior editor Herb Brody, in the November/December 1992 issue of Technology Review.

Keep Reading

Most Popular

Large language models can do jaw-dropping things. But nobody knows exactly why.

And that's a problem. Figuring it out is one of the biggest scientific puzzles of our time and a crucial step towards controlling more powerful future models.

OpenAI teases an amazing new generative video model called Sora

The firm is sharing Sora with a small group of safety testers but the rest of us will have to wait to learn more.

Google’s Gemini is now in everything. Here’s how you can try it out.

Gmail, Docs, and more will now come with Gemini baked in. But Europeans will have to wait before they can download the app.

This baby with a head camera helped teach an AI how kids learn language

A neural network trained on the experiences of a single young child managed to learn one of the core components of language: how to match words to the objects they represent.

Stay connected

Illustration by Rose Wong

Get the latest updates from
MIT Technology Review

Discover special offers, top stories, upcoming events, and more.

Thank you for submitting your email!

Explore more newsletters

It looks like something went wrong.

We’re having trouble saving your preferences. Try refreshing this page and updating them one more time. If you continue to get this message, reach out to us at customer-service@technologyreview.com with a list of newsletters you’d like to receive.