2017
DOI: 10.17645/mac.v5i1.805
|View full text |Cite
|
Sign up to set email alerts
|

Clipper Meets Apple vs. FBI—A Comparison of the Cryptography Discourses from 1993 and 2016

Abstract: This article analyzes two cryptography discourses dealing with the question of whether governments should be able to monitor secure and encrypted communication, for example via security vulnerabilities in cryptographic systems. The Clipper chip debate of 1993 and the FBI vs. Apple case of 2016 are analyzed to infer whether these discourses show similarities in their arguments and to draw lessons from them. The study is based on the securitization framework and analyzes the social construction of security threa… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
12
0
1

Year Published

2017
2017
2024
2024

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 12 publications
(13 citation statements)
references
References 8 publications
0
12
0
1
Order By: Relevance
“…One of the well known cases is Apple V/S FBI, as mentioned by Timberg, C. & Miller, G. [8], FBI -Director James B. Comey sharply criticized Apple and Google for developing forms of smartphone encryption so secure that law enforcement officials cannot easily gain access to information stored on the devices -even when they have valid search warrants‖. While, on another hand Schulze, M. [9] referred to a dual-edge sword: -encryption helps to protect the privacy of individuals and industry, but it also can shield criminals and terrorists importance of privacy.‖ However Shculze emphasized only on encryption, other privacy related tools and technologies can be treated equally. They do allow normal users in maintaining their privacy, while the same thing can be used by criminals in hiding their identity.…”
Section: Privacy or Anti-forensicsmentioning
confidence: 99%
“…One of the well known cases is Apple V/S FBI, as mentioned by Timberg, C. & Miller, G. [8], FBI -Director James B. Comey sharply criticized Apple and Google for developing forms of smartphone encryption so secure that law enforcement officials cannot easily gain access to information stored on the devices -even when they have valid search warrants‖. While, on another hand Schulze, M. [9] referred to a dual-edge sword: -encryption helps to protect the privacy of individuals and industry, but it also can shield criminals and terrorists importance of privacy.‖ However Shculze emphasized only on encryption, other privacy related tools and technologies can be treated equally. They do allow normal users in maintaining their privacy, while the same thing can be used by criminals in hiding their identity.…”
Section: Privacy or Anti-forensicsmentioning
confidence: 99%
“…Political science has been rather silent on the topic of CPs, most studies instead focusing more broadly on encryption and internet governance (Herrera, 2002;Monsees, 2020;Schulze, 2017;Myers West, 2018). Shifting the focus to the practices of CPs also allows the conceptual focus to shift away from institutions and towards more mundane and decentered practices.…”
Section: Introductionmentioning
confidence: 99%
“…his is important, since claims for higher regulation are made, even though regulation would only be truly efective if successfully implemented in all countries. Political efort to regulate the export of encryption or implementing weaker encryption is thus less discussed than debates occurring in the Us during the 1990s (Diie, Landau 1998;schulze 2017;steiger, schünemann, Dimmroth 2017).…”
mentioning
confidence: 99%