NCA complains that encryption hampers crime fighting

Agency argues that better encryption makes policing harder

The UK's National Crime Agency (NCA) thinks encryption gets in the way when it comes to fighting crime, saying such technological advances are making it harder for law enforcement agencies to find and take down criminals.

The organisation's annual assessment of serious crime in the UK explained that although encryption offers privacy for people, it's impacting how law enforcement authorities' efforts to fight criminals, specifically when it comes to collecting intelligence and evidence.

"This year's assessment shows that organised crime groups are exploiting digital technology, for instance using encryption to communicate, and dark web marketplaces to aid their activities," NCA director general Lynne Owens said.

Encryption became a growing problem for the NCA and other authorities as more communication tools - like WhatsApp - integrated it into their products, while more and more websites use the encrypted data transfer protocol HTTPS.

"Since 2010, communication service providers have migrated to encrypted services 'by default', a process that accelerated following the Snowden disclosures," read the National Strategic Assessment of Serious and Organised Crime 2018 report. "Now, the majority of internet traffic is encrypted and publicly available mobile device apps offer end-to-end encryption as standard."

These issues will only mount, it argued, making it harder for authorities to clamp down on criminal activity.

"The pace of these developments will continue to challenge law enforcement capability and resource, with narrowing options for mitigation," the report continued. 

However, unlike former home secretary Amber Rudd, the NCA stopped short of calling for tech companies to open backdoors into their encryption for government agencies, which critics claim would make products more susceptible to malicious hackers.

Featured Resources

Unleashing the power of AI initiatives with the right infrastructure

What key infrastructure requirements are needed to implement AI effectively?

Download now

Achieve today. Plan tomorrow. Making the hybrid multi-cloud journey

A Veritas webinar on implementing a hybrid multi-cloud strategy

Download now

A buyer’s guide for cloud-based phone solutions

Finding the right phone system for your modern business

Download now

The workers' experience report

How technology can spark motivation, enhance productivity and strengthen security

Download now

Recommended

What is e-safety?
e safety

What is e-safety?

27 Jan 2021
Your essential guide to internet security
Security

Your essential guide to internet security

27 Jan 2021
Mimecast links breach to SolarWinds hackers
Security

Mimecast links breach to SolarWinds hackers

27 Jan 2021
TikTok vulnerability exposed private user data
data protection

TikTok vulnerability exposed private user data

26 Jan 2021

Most Popular

How to move Windows 10 from your old hard drive to SSD
operating systems

How to move Windows 10 from your old hard drive to SSD

21 Jan 2021
Hackers are actively exploiting three Apple iOS flaws
exploits

Hackers are actively exploiting three Apple iOS flaws

27 Jan 2021
16 ways to speed up your laptop
Laptops

16 ways to speed up your laptop

26 Jan 2021