NCA complains that encryption hampers crime fighting

Agency argues that better encryption makes policing harder

The UK's National Crime Agency (NCA) thinks encryption gets in the way when it comes to fighting crime, saying such technological advances are making it harder for law enforcement agencies to find and take down criminals.

The organisation's annual assessment of serious crime in the UK explained that although encryption offers privacy for people, it's impacting how law enforcement authorities' efforts to fight criminals, specifically when it comes to collecting intelligence and evidence.

"This year's assessment shows that organised crime groups are exploiting digital technology, for instance using encryption to communicate, and dark web marketplaces to aid their activities," NCA director general Lynne Owens said.

Encryption became a growing problem for the NCA and other authorities as more communication tools - like WhatsApp - integrated it into their products, while more and more websites use the encrypted data transfer protocol HTTPS.

"Since 2010, communication service providers have migrated to encrypted services 'by default', a process that accelerated following the Snowden disclosures," read the National Strategic Assessment of Serious and Organised Crime 2018 report. "Now, the majority of internet traffic is encrypted and publicly available mobile device apps offer end-to-end encryption as standard."

These issues will only mount, it argued, making it harder for authorities to clamp down on criminal activity.

"The pace of these developments will continue to challenge law enforcement capability and resource, with narrowing options for mitigation," the report continued. 

However, unlike former home secretary Amber Rudd, the NCA stopped short of calling for tech companies to open backdoors into their encryption for government agencies, which critics claim would make products more susceptible to malicious hackers.

Featured Resources

BCDR buyer's guide for MSPs

How to choose a business continuity and disaster recovery solution

Download now

The definitive guide to IT security

Protecting your MSP and your customers

Download now

Cost of a data breach report 2020

Find out what factors help mitigate breach costs

Download now

The complete guide to changing your phone system provider

Optimise your phone system for better business results

Download now

Recommended

Data breach exposes widespread fake reviews on Amazon
data breaches

Data breach exposes widespread fake reviews on Amazon

7 May 2021
TsuNAME vulnerability could enable DDoS attacks on major DNS servers
distributed denial of service (DDOS)

TsuNAME vulnerability could enable DDoS attacks on major DNS servers

7 May 2021
What are SSH keys?
cyber security

What are SSH keys?

7 May 2021
Google’s about to push everyone into two-factor authentication
Security

Google’s about to push everyone into two-factor authentication

6 May 2021

Most Popular

KPMG offers staff 'four-day fortnight' in hybrid work plans
flexible working

KPMG offers staff 'four-day fortnight' in hybrid work plans

6 May 2021
Dell patches vulnerability affecting hundreds of computer models worldwide
cyber security

Dell patches vulnerability affecting hundreds of computer models worldwide

5 May 2021
16 ways to speed up your laptop
Laptops

16 ways to speed up your laptop

29 Apr 2021