CAMBRIDGE, Ma. – Cambridge Cyber Summit by MIT – The NSA came out in support of encryption. But the stand was quickly challenged by the privacy advocates, who criticized the NSA agency for having a different definition of the word “encryption” than the rest.
The NSA general counsel, Glenn Gerstell, said in a statement that the agency “believes in strong encryption” while talking to the “Privacy vs. Security: Beyond the Zero-Sum Game” panel.
Related Article: How to hide browser history from ISP
Executive Director of Electronic Frontier Foundation (EFF), Cindy Cohn, an attendee of the panel took an aggressive stand and told the NSA that when speaking of the term encryption, it should use asterisks at the end of the encryption word.
Cohn said, “I have been in meetings with people from the FBI and NSA and when they say we believe strong encryption what they mean is strong encryption that only THEY have access to.”
“It sounds disingenuous; it seems that what they mean by strong encryption isn’t near the same as what the rest of us say,” Cohn said.
Gerstell backed the earlier statements made by the former director of the CIA and NSA, General Michael Hayden, and NSA Director Adm. Mike Rogers, when they both went to the public in support of encryption and admitted that robust crypto had given them challenges.
Gerstel explained that end-to-end encryption is not the end of all problems, people sometimes lose passwords of their encrypted computing devices and while resetting it they expose themselves to vulnerabilities, and these mishaps lead to opportunities to exploits.
The Panel, moderated by Ellen Nakashima of the Washington Post, quickly turned into privacy versus security discussion.
Related Article: Best VPN For Torrenting & p2p Filesharing
Gerstell told that “(encryption is) more of a law enforcement issue,” while referring to the difficulties the U.S. government faces when a terrorist group uses encrypted communication apps, and what the NSA go through to gain intelligence is more of “going spotty” rather than “going dark.” Gerstell told encryption shouldn’t be an “impenetrable wall” and there should be ways around it.
“The U.S. government shouldn’t be poking in the business of cracking the technology; rather it should help corporations to ensure security,” said Cindy Cohn.
While, the FBI v. Apple lawsuit lifted the debate of encryption. Rather, it agitated the topic for coming debates.
The MIT’s Internet Policy Research Initiative principal director of, Daniel Weitzner, interceded the discussion and said that “we’re getting tripped up” on the debate.
Weitzner said “Let’s find a solution… We should be discussing ways to which law enforcements can be useful with encryption.”
In the endnotes of the panel, Weitzner said that we’d never have perfectly secure systems, but end-to-encryption is going to be widespread, and the world needs to adapt.
Encryption Guides
- Guide: how to encrypt your internet traffic
- How to Encrypt your Email? (Encrypted Email Guide)
- 5 Best Free Encryption App For iPhone/iPad/iPod
- How To Encrypt Your Hard Drive? – Encryption Software 2016
- How To Encrypt A Folder – File In Windows OS (Guide)
- How To Encrypt Mac Folder – (complete guide)
- Fight against cyber crimes (be encrypted)
- Best Free VPN For Torrenting
- Best VPN for torrenting & P2P Filesharing
Share this article
About the Author
Rebecca James is an IT consultant with forward thinking approach toward developing IT infrastructures of SMEs. She writes to engage with individuals and raise awareness of digital security, privacy, and better IT infrastructure.
More from Rebecca JamesRelated Posts
Passengers’ Data Stored on User Devices, not on DigiYatra Storage, says India Govt
KEY TAKEAWAYS Unblocking streaming content from Amazon Prime is easy only if you know the reliable V...
NCSC Chief: Clear Rules Needed to Prevent Cyberspace Conflict and Struggle
A safe and secure digital world necessitates a clear definition and enforcement of international cyb...
‘Revive’ has been upgraded to a banking Trojan on Android
This month, Cleafy’s security researchers discovered a new Android Banking Trojan in the wild....
Asian Industrial Control Systems Targeted by Hackers Using the Shadowpad Backdoor
Unpatched Microsoft Exchange servers in various Asian countries were the target of an attack campaig...
Data Breaches Could Occur Due to Kubernetes Misconfigurations That Were Leaked.
Over 900,000 Kubernetes (K8s) have been discovered to be vulnerable to malicious scans and/or data-e...
Attacks by Cybercriminals Will Become the Main Threat in 2024. Privacy Issues Tendencies
Internet Privacy is the main Concern today Advertisers track your online activities and interf...