• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH
Network Security, News

U.S. Wants Encryption Backdoor in Personal Devices

Major technology companies are fighting against U.S. Attorney General William Barr's suggestion that encryption backdoors be installed in personal devices, while users should just accept the risk of this potential mandate.

August 16, 2019 Jessica Messier Leave a Comment

In a speech earlier this month, U.S. attorney general William Barr said that users should be ok with the risks associated with encryption backdoors, including those that could affect their personal cybersecurity. That way, law enforcement will be able to access any encrypted communications needed for cases, Tech Crunch reports.

Barr said that the risks – including cyberattacks on personal data – are acceptable because he’s only referring to consumer products and services, like messaging, smart devices, email, etc., not “about protecting the nation’s nuclear launch codes.” He also said that in some cases, improved security can be achieved from “imposing a massive cost on society in the form of degraded safety,” reports Tech Crunch.

Barr’s comments come as encrypted messages continue to climb, now available in Apple products, Facebook, Instagram and other companies; increased encryption was sparked from the “abuse of access by the intelligence services” that followed the Edward Snowden revelations in 2013.

Law enforcement also claims that encryption inhibits their access to communications needed to prosecute criminals, Tech Crunch says, also known as “going dark.” However, despite critiques, security experts say that there isn’t a secure way to design “backdoor” access to encrypted messages for law enforcement without also creating a window of vulnerability for hackers to access users’ personal information.

Big Tech Puts People First

Tech Crunch says that the Barr isn’t the only one who has been calling on big tech companies to help give authorities access to encrypted information. Even still, those companies are pushing back. Major pushback started in the UK a couple of months ago, when UK intelligence agency GCHQ wanted to institute a ghost protocol that would have enabled them to listen in on users’ encrypted conversations.

Similar to the response Barr received during his speech, people weren’t having it, including Apple, Google, Microsoft and WhatsApp. The tech companies penned a letter against GCHQ’s proposal, stating that it “creates serious threats to digital security,” and undermines “the authentication process that enables users to verify that they are communicating with the right people, introduce potential unintentional vulnerabilities, and increase risks that communications systems could be abused or misused,” Tech Crunch says.

Despite support from these big tech companies, government officials may still find a way to avoid “going dark” – Barr didn’t rule out pushing legislation to force tech companies to build encryption backdoors, Tech Crunch says. As a result, decision makers should keep an eye on these cases to see how

If you enjoyed this article and want to receive more valuable industry content like this, click here to sign up for our digital newsletters!

Tagged With: Cyber Security, Legal, Mobile Device

Related Content:

  • Cloud, SASE, Aryaka How the Cloud is Redefining Media Production and…
  • Singlewire Software mass notification interview Singlewire Software on Mass Notification Solutions
  • URI catchbox 1 Catchbox Plus: The Mic Solution That Finally Gave…
  • Engaging virtual meeting with diverse participants discussing creative ideas in a bright office space during daylight hours Diversified Survey: Workplace AV Tech is Falling Short,…

Free downloadable guide you may like:

  • Download TechDecisions' Blueprint Series report on Security Awareness now!Blueprint Series: Why Your Security Awareness Program is Probably Falling Short

    Learn about the evolution of phishing attacks and best practices for security awareness programs to ensure your organization is properly prepared to defend against them in this report from TechDecisions' Blueprint Series.

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Latest Downloads

Practical Design Guide for Office Spaces
Practical Design Guide for Office Spaces

Recent Gartner research shows that workers prefer to return to the office for in-person meetings for relevant milestones, as well as for face-to-fa...

New Camera Can Transform Your Live Production Workflow
New Camera System Can Transform Your Live Production Workflow

Sony's HXC-FZ90 studio camera system combines flexibility and exceptional image quality with entry-level pricing.

Creating Great User Experience and Ultimate Flexibility with Clickshare

Working and collaborating in any office environment today should be meaningful, as workers today go to office for very specific reasons. When desig...

View All Downloads

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial IntegratorSecurity Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.