NCA complains that encryption hampers crime fighting

Agency argues that better encryption makes policing harder

The UK's National Crime Agency (NCA) thinks encryption gets in the way when it comes to fighting crime, saying such technological advances are making it harder for law enforcement agencies to find and take down criminals.

The organisation's annual assessment of serious crime in the UK explained that although encryption offers privacy for people, it's impacting how law enforcement authorities' efforts to fight criminals, specifically when it comes to collecting intelligence and evidence.

"This year's assessment shows that organised crime groups are exploiting digital technology, for instance using encryption to communicate, and dark web marketplaces to aid their activities," NCA director general Lynne Owens said.

Encryption became a growing problem for the NCA and other authorities as more communication tools - like WhatsApp - integrated it into their products, while more and more websites use the encrypted data transfer protocol HTTPS.

Advertisement
Advertisement - Article continues below

"Since 2010, communication service providers have migrated to encrypted services 'by default', a process that accelerated following the Snowden disclosures," read the National Strategic Assessment of Serious and Organised Crime 2018 report. "Now, the majority of internet traffic is encrypted and publicly available mobile device apps offer end-to-end encryption as standard."

These issues will only mount, it argued, making it harder for authorities to clamp down on criminal activity.

"The pace of these developments will continue to challenge law enforcement capability and resource, with narrowing options for mitigation," the report continued. 

However, unlike former home secretary Amber Rudd, the NCA stopped short of calling for tech companies to open backdoors into their encryption for government agencies, which critics claim would make products more susceptible to malicious hackers.

Featured Resources

The essential guide to cloud-based backup and disaster recovery

Support business continuity by building a holistic emergency plan

Download now

Trends in modern data protection

A comprehensive view of the data protection landscape

Download now

How do vulnerabilities get into software?

90% of security incidents result from exploits against defects in software

Download now

Delivering the future of work - now

The CIO’s guide to building the unified digital workspace for today’s hybrid and multi-cloud strategies.

Download now
Advertisement

Recommended

Visit/security/354156/google-confirms-android-cameras-can-be-hijacked-to-spy-on-you
Security

Google confirms Android cameras can be hijacked to spy on you

20 Nov 2019

Most Popular

Visit/cloud/microsoft-azure/354230/microsoft-not-amazon-is-going-to-win-the-cloud-wars
Microsoft Azure

Microsoft, not Amazon, is going to win the cloud wars

30 Nov 2019
Visit/cloud/amazon-web-services-aws/354223/what-to-expect-from-aws-reinvent-2019
Amazon Web Services (AWS)

What to expect from AWS Re:Invent 2019

29 Nov 2019
Visit/hardware/354232/raspberry-pi-4-owners-complain-of-broken-wi-fi-when-using-hdmi
Hardware

Raspberry Pi 4 owners complain of broken Wi-Fi when using HDMI

29 Nov 2019
Visit/mobile/google-android/354189/samsung-galaxy-a90-5g-review-simply-the-best-value-5g-phone
Google Android

Samsung Galaxy A90 5G review: Simply the best value 5G phone

22 Nov 2019