Senate Judiciary Committee Chairman Lindsey Graham has introduced legislation that could weaken encryption for police investigations. Tom Williams-Pool/Getty Images. A group of Senate Republicans is looking to force tech companies to comply with « lawful access » to encrypted information, potentially jeopardizing the technology’s security features.
On Tuesday, Republican lawmakers introduced the Lawful Access to Encrypted Data Act, which calls for an end to « warrant-proof » encryption that’s disrupted criminal investigations. The bill was proposed by Sen. Lindsey Graham, chairman of the Senate Judiciary committee, along with Sens. Tom Cotton and Marsha Blackburn. If passed, the act would require tech companies to help investigators access encrypted data if that assistance would help carry out a warrant.
awmakers and the US Justice Department have long battled with tech companies over encryption, which is used to encode data. The Justice Department argues that encryption prevents investigators from getting necessary evidence from suspects’ devices and has requested that tech giants provide « lawful access. »
That could come in many ways, such as providing a key to unlock encryption that’s only available for police requests. The FBI made a similar request to Apple in 2016 when it wanted to get data from a dead terrorist’s iPhone in a San Bernardino, California, shooting case.
Giving access specifically to government agencies when requested is often referred to as an « encryption backdoor, » something tech experts and privacy advocates have long argued endangers more people than it helps.
End-to-end encryption protects billions of people from hackers, oppressive governments and abusive romantic partners by providing security measures that even the companies themselves aren’t able to crack. Creating a way for investigators to access that data raises concerns that the method could also open the door for hackers and criminals to abuse that exposure.
Source : Republicans push bill requiring tech companies to help access encrypted data
Mots-clés : cybersécurité, sécurité informatique, protection des données, menaces cybernétiques, veille cyber, analyse de vulnérabilités, sécurité des réseaux, cyberattaques, conformité RGPD, NIS2, DORA, PCIDSS, DEVSECOPS, eSANTE, intelligence artificielle, IA en cybersécurité, apprentissage automatique, deep learning, algorithmes de sécurité, détection des anomalies, systèmes intelligents, automatisation de la sécurité, IA pour la prévention des cyberattaques.
Bots et IA biaisées : une menace silencieuse pour la cybersécurité des entreprises Introduction Les…
Cloudflare en Panne : Causes Officielles, Impacts et Risques pour les Entreprises Le 5 décembre…
Introduction La cybersécurité est aujourd’hui une priorité mondiale. Récemment, la CISA (Cybersecurity and Infrastructure Security…
La transformation numérique face aux nouvelles menaces Le cloud computing s’impose aujourd’hui comme un…
Les attaques par déni de service distribué (DDoS) continuent d'évoluer en sophistication et en ampleur,…
Face à l'adoption croissante des technologies d'IA dans les PME, une nouvelle menace cybersécuritaire émerge…
This website uses cookies.