A Comprehensive Overview of Government Hacking Worldwide
Journal
IEEE Access
Journal Volume
6
Pages
55053-55073
Date Issued
2018
Author(s)
Abstract
There has been an ongoing and heated public policy debate on the appropriate role of and limitations to government hacking in maintaining a proper balance of national security and privacy. Asserting that they are compelled to use government hacking tools to protect their countries and populations, law enforcement and government agencies are increasingly strident in expressing the importance of accessing and intercepting encrypted communication data. However, many non-governmental and civil society organizations and activists strongly oppose government hacking because they consider its methods and techniques are extremely invasive and potentially compromising to the fundamental right of privacy. They are also concerned that the implementation of hacking techniques or similar methods would weaken encryption standards and place the security of the Internet at risk. This paper presents an overview of the current status of government hacking and discusses challenges to lawful interception (LI) technology and rules. The current state of LI and government hacking in five countries is reviewed, and capability is assessed in terms of several widely publicized events, in an effort to analyze the limitations of current solutions. Finally, the open challenges to and future direction of government hacking are highlighted. © 2013 IEEE.
Subjects
Communication system and network security; government hacking; law enforcement; lawful interception; national security; privacy; social network services; surveillance
SDGs
Other Subjects
Computer crime; Computer privacy; Cryptography; Data privacy; Internet; Law enforcement; National security; Personal computing; Population statistics; Space surveillance; Standards; Telecommunication; Current status; Encrypted communication; Encryption standards; Government; Government agencies; Lawful interception; Security and privacy; Social network services; Network security
Type
journal article