Secuzine

spot_img

Father of Molly Russell honoured with MBE for contributions to online child safety

Ian Russell acknowledged his contribution to online child safety through the establishment of the Molly Rose Foundation, reflecting on Molly's legacy. He emphasises the...

Data Protection vs. Criminal Investigations: DESP Encryption Technology Divides Experts

The DPA (Data Protection Act)’s Section 3 governs the processing of personal data by competent authorities for legal purposes. While law enforcement organizations push for access to encrypted data for criminal investigations, encryption is praised on one hand as a vital defense against online threats.

The processing of data by member state competent authorities for the following objectives is covered by this directive: protecting and preventing threats to public safety; preventing, investigating, detecting, and prosecuting criminal offenses. The seven principles for the legitimate processing of personal data are outlined in the GDPR. Organizing, arranging, storing, altering, consulting, using, communicating, combining, restricting, erasing, or destroying personal data are all considered processing.

800,944 reports of cybercrime were submitted to the FBI in 2022, down 5% from 2021, according to the FBI’s Internet Crime Report. The possible overall loss, however, jumped from $6.9 billion in 2021 to $10.2 billion in 2022. In 2022, the Consumer Sentinel Network of the Federal Trade Commission (FTC) received over 5.1 million reports, of which 21% were about identity theft and 46% were about fraud.

Privacy activists and encryption specialists contend that any attempt to make encryption less secure—for example, by putting in backdoors or employing shoddy algorithms—would result in flaws that hostile actors and cybercriminals might take advantage of. 

Law enforcement organizations assert that access to encrypted data is essential for the fight against terrorism, cybercrime, and other illicit acts. They contend that certain circumstances call for legal access to communications and data that have been encrypted, which could be essential evidence in investigations.

A conflict between data protection and criminal investigations highlights the tension between law enforcement and data security requirements. Maintaining encryption integrity while allowing authorized access for investigations remains a challenge.

Some IT firms are looking into solutions to bridge this gap while maintaining strong encryption and enabling legal access within the proper legal frameworks. End-to-end encryption, in which the key to decryption is only known to the sender and recipient, provides a potential compromise.

An agreement that takes into account the worries of both privacy advocates and law enforcement organizations is still difficult to come by. The debate over encryption technology and its function in data protection and criminal investigations is predicted to endure as technology continues to advance.