A Comprehensive Overview of Government Hacking Worldwide

There has been an ongoing and heated public policy debate on the appropriate role of and limitations to government hacking in maintaining a proper balance of national security and privacy. Asserting that they are compelled to use government hacking tools to protect their countries and populations, l...

Full description

Bibliographic Details
Main Authors: Chen-Yu Li, Chien-Cheng Huang, Feipei Lai, San-Liang Lee, Jingshown Wu
Format: Article
Language:English
Published: IEEE 2018-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/8470931/
_version_ 1818558661999460352
author Chen-Yu Li
Chien-Cheng Huang
Feipei Lai
San-Liang Lee
Jingshown Wu
author_facet Chen-Yu Li
Chien-Cheng Huang
Feipei Lai
San-Liang Lee
Jingshown Wu
author_sort Chen-Yu Li
collection DOAJ
description There has been an ongoing and heated public policy debate on the appropriate role of and limitations to government hacking in maintaining a proper balance of national security and privacy. Asserting that they are compelled to use government hacking tools to protect their countries and populations, law enforcement and government agencies are increasingly strident in expressing the importance of accessing and intercepting encrypted communication data. However, many non-governmental and civil society organizations and activists strongly oppose government hacking because they consider its methods and techniques are extremely invasive and potentially compromising to the fundamental right of privacy. They are also concerned that the implementation of hacking techniques or similar methods would weaken encryption standards and place the security of the Internet at risk. This paper presents an overview of the current status of government hacking and discusses challenges to lawful interception (LI) technology and rules. The current state of LI and government hacking in five countries is reviewed, and capability is assessed in terms of several widely publicized events, in an effort to analyze the limitations of current solutions. Finally, the open challenges to and future direction of government hacking are highlighted.
first_indexed 2024-12-14T00:15:12Z
format Article
id doaj.art-5368b910401a437cbbce75b7a7e4ab2b
institution Directory Open Access Journal
issn 2169-3536
language English
last_indexed 2024-12-14T00:15:12Z
publishDate 2018-01-01
publisher IEEE
record_format Article
series IEEE Access
spelling doaj.art-5368b910401a437cbbce75b7a7e4ab2b2022-12-21T23:25:35ZengIEEEIEEE Access2169-35362018-01-016550535507310.1109/ACCESS.2018.28717628470931A Comprehensive Overview of Government Hacking WorldwideChen-Yu Li0https://orcid.org/0000-0002-4036-3151Chien-Cheng Huang1Feipei Lai2San-Liang Lee3Jingshown Wu4Graduate Institute of Communication Engineering and Department of Electrical Engineering, National Taiwan University, Taipei, TaiwanDepartment of Information Management, National Taiwan University, Taipei, TaiwanComputer Science and Information Engineering and Electrical Engineering Departments, National Taiwan University, Taipei, TaiwanDepartment of Electronic Engineering, National Taiwan University of Science and Technology, Taipei, TaiwanGraduate Institute of Communication Engineering and Department of Electrical Engineering, National Taiwan University, Taipei, TaiwanThere has been an ongoing and heated public policy debate on the appropriate role of and limitations to government hacking in maintaining a proper balance of national security and privacy. Asserting that they are compelled to use government hacking tools to protect their countries and populations, law enforcement and government agencies are increasingly strident in expressing the importance of accessing and intercepting encrypted communication data. However, many non-governmental and civil society organizations and activists strongly oppose government hacking because they consider its methods and techniques are extremely invasive and potentially compromising to the fundamental right of privacy. They are also concerned that the implementation of hacking techniques or similar methods would weaken encryption standards and place the security of the Internet at risk. This paper presents an overview of the current status of government hacking and discusses challenges to lawful interception (LI) technology and rules. The current state of LI and government hacking in five countries is reviewed, and capability is assessed in terms of several widely publicized events, in an effort to analyze the limitations of current solutions. Finally, the open challenges to and future direction of government hacking are highlighted.https://ieeexplore.ieee.org/document/8470931/Communication system and network securitygovernment hackinglaw enforcementlawful interceptionsocial network servicessurveillance
spellingShingle Chen-Yu Li
Chien-Cheng Huang
Feipei Lai
San-Liang Lee
Jingshown Wu
A Comprehensive Overview of Government Hacking Worldwide
IEEE Access
Communication system and network security
government hacking
law enforcement
lawful interception
social network services
surveillance
title A Comprehensive Overview of Government Hacking Worldwide
title_full A Comprehensive Overview of Government Hacking Worldwide
title_fullStr A Comprehensive Overview of Government Hacking Worldwide
title_full_unstemmed A Comprehensive Overview of Government Hacking Worldwide
title_short A Comprehensive Overview of Government Hacking Worldwide
title_sort comprehensive overview of government hacking worldwide
topic Communication system and network security
government hacking
law enforcement
lawful interception
social network services
surveillance
url https://ieeexplore.ieee.org/document/8470931/
work_keys_str_mv AT chenyuli acomprehensiveoverviewofgovernmenthackingworldwide
AT chienchenghuang acomprehensiveoverviewofgovernmenthackingworldwide
AT feipeilai acomprehensiveoverviewofgovernmenthackingworldwide
AT sanlianglee acomprehensiveoverviewofgovernmenthackingworldwide
AT jingshownwu acomprehensiveoverviewofgovernmenthackingworldwide
AT chenyuli comprehensiveoverviewofgovernmenthackingworldwide
AT chienchenghuang comprehensiveoverviewofgovernmenthackingworldwide
AT feipeilai comprehensiveoverviewofgovernmenthackingworldwide
AT sanlianglee comprehensiveoverviewofgovernmenthackingworldwide
AT jingshownwu comprehensiveoverviewofgovernmenthackingworldwide