A Comprehensive Overview of Government Hacking Worldwide
There has been an ongoing and heated public policy debate on the appropriate role of and limitations to government hacking in maintaining a proper balance of national security and privacy. Asserting that they are compelled to use government hacking tools to protect their countries and populations, l...
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2018-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/8470931/ |
_version_ | 1818558661999460352 |
---|---|
author | Chen-Yu Li Chien-Cheng Huang Feipei Lai San-Liang Lee Jingshown Wu |
author_facet | Chen-Yu Li Chien-Cheng Huang Feipei Lai San-Liang Lee Jingshown Wu |
author_sort | Chen-Yu Li |
collection | DOAJ |
description | There has been an ongoing and heated public policy debate on the appropriate role of and limitations to government hacking in maintaining a proper balance of national security and privacy. Asserting that they are compelled to use government hacking tools to protect their countries and populations, law enforcement and government agencies are increasingly strident in expressing the importance of accessing and intercepting encrypted communication data. However, many non-governmental and civil society organizations and activists strongly oppose government hacking because they consider its methods and techniques are extremely invasive and potentially compromising to the fundamental right of privacy. They are also concerned that the implementation of hacking techniques or similar methods would weaken encryption standards and place the security of the Internet at risk. This paper presents an overview of the current status of government hacking and discusses challenges to lawful interception (LI) technology and rules. The current state of LI and government hacking in five countries is reviewed, and capability is assessed in terms of several widely publicized events, in an effort to analyze the limitations of current solutions. Finally, the open challenges to and future direction of government hacking are highlighted. |
first_indexed | 2024-12-14T00:15:12Z |
format | Article |
id | doaj.art-5368b910401a437cbbce75b7a7e4ab2b |
institution | Directory Open Access Journal |
issn | 2169-3536 |
language | English |
last_indexed | 2024-12-14T00:15:12Z |
publishDate | 2018-01-01 |
publisher | IEEE |
record_format | Article |
series | IEEE Access |
spelling | doaj.art-5368b910401a437cbbce75b7a7e4ab2b2022-12-21T23:25:35ZengIEEEIEEE Access2169-35362018-01-016550535507310.1109/ACCESS.2018.28717628470931A Comprehensive Overview of Government Hacking WorldwideChen-Yu Li0https://orcid.org/0000-0002-4036-3151Chien-Cheng Huang1Feipei Lai2San-Liang Lee3Jingshown Wu4Graduate Institute of Communication Engineering and Department of Electrical Engineering, National Taiwan University, Taipei, TaiwanDepartment of Information Management, National Taiwan University, Taipei, TaiwanComputer Science and Information Engineering and Electrical Engineering Departments, National Taiwan University, Taipei, TaiwanDepartment of Electronic Engineering, National Taiwan University of Science and Technology, Taipei, TaiwanGraduate Institute of Communication Engineering and Department of Electrical Engineering, National Taiwan University, Taipei, TaiwanThere has been an ongoing and heated public policy debate on the appropriate role of and limitations to government hacking in maintaining a proper balance of national security and privacy. Asserting that they are compelled to use government hacking tools to protect their countries and populations, law enforcement and government agencies are increasingly strident in expressing the importance of accessing and intercepting encrypted communication data. However, many non-governmental and civil society organizations and activists strongly oppose government hacking because they consider its methods and techniques are extremely invasive and potentially compromising to the fundamental right of privacy. They are also concerned that the implementation of hacking techniques or similar methods would weaken encryption standards and place the security of the Internet at risk. This paper presents an overview of the current status of government hacking and discusses challenges to lawful interception (LI) technology and rules. The current state of LI and government hacking in five countries is reviewed, and capability is assessed in terms of several widely publicized events, in an effort to analyze the limitations of current solutions. Finally, the open challenges to and future direction of government hacking are highlighted.https://ieeexplore.ieee.org/document/8470931/Communication system and network securitygovernment hackinglaw enforcementlawful interceptionsocial network servicessurveillance |
spellingShingle | Chen-Yu Li Chien-Cheng Huang Feipei Lai San-Liang Lee Jingshown Wu A Comprehensive Overview of Government Hacking Worldwide IEEE Access Communication system and network security government hacking law enforcement lawful interception social network services surveillance |
title | A Comprehensive Overview of Government Hacking Worldwide |
title_full | A Comprehensive Overview of Government Hacking Worldwide |
title_fullStr | A Comprehensive Overview of Government Hacking Worldwide |
title_full_unstemmed | A Comprehensive Overview of Government Hacking Worldwide |
title_short | A Comprehensive Overview of Government Hacking Worldwide |
title_sort | comprehensive overview of government hacking worldwide |
topic | Communication system and network security government hacking law enforcement lawful interception social network services surveillance |
url | https://ieeexplore.ieee.org/document/8470931/ |
work_keys_str_mv | AT chenyuli acomprehensiveoverviewofgovernmenthackingworldwide AT chienchenghuang acomprehensiveoverviewofgovernmenthackingworldwide AT feipeilai acomprehensiveoverviewofgovernmenthackingworldwide AT sanlianglee acomprehensiveoverviewofgovernmenthackingworldwide AT jingshownwu acomprehensiveoverviewofgovernmenthackingworldwide AT chenyuli comprehensiveoverviewofgovernmenthackingworldwide AT chienchenghuang comprehensiveoverviewofgovernmenthackingworldwide AT feipeilai comprehensiveoverviewofgovernmenthackingworldwide AT sanlianglee comprehensiveoverviewofgovernmenthackingworldwide AT jingshownwu comprehensiveoverviewofgovernmenthackingworldwide |