top of page

#2 Encryption


(Image Source: MeWe, 2015).


Encryption. Hearing this word makes me think of a secret or something hidden. But in relation to communication technology, the term describes the process of converting information or data into a code to protect confidentiality within computer systems via the internet and other networks. Modern encryption plays a vital role in preventing unauthorised access from a range of devices including using the ATM, buying something online, making a phone call and from using remote keys to unlock your car. But although our digital messages are being kept safe, does this mean that we are really safe?


The encryption technology used on social media platforms such as WhatsApp and Viber have been criticised for allowing terrorists to communicate secretly, plotting attacks that wouldn't be possible through communication by telephone, for example, Adrian Ajao who killed four people during the Westminster attacks, used WhatsApp to communicate just before the incident.


But although Governments agree that security services need to be able to access these communications for extreme circumstances, there is currently no way to access and decipher these encryptions in a way without jeopardising all safety. The major tech companies Apple and Google have used this reasoning as their main justification for refusing access, as CEO of Apple Tim Cook has stated,

"If you put a key under the mat for the cops, a burglar can find it, too. Criminals are using every technology tool at their disposal to hack into people’s accounts. If they know there’s a key hidden somewhere, they won’t stop until they find it", (TechCrunch, 2015).


In todays tutorial, Ben brought up a valid point related to this topic of encryption and privacy. He referred to the Orlando nightclub shooting in 2016, and asked us if we believe it is okay for the police to unlock the terrorists phone without warrant to investigate the case further?


In my personal opinion I believe due to the circumstances surrounding the situation, where a major tragic incident has occurred involving the deaths of innocent lives, the information from the phone might hold key information about others involved in the crime and bring justice regarding the case, therefore it is ethical and justified to access the information of his phone.


But then again, where do we draw the line of when is it acceptable and not to have full access to someones device without their consent?


Reference List:


TechCrunch. (2015). Apple’s Tim Cook Delivers Blistering Speech On Encryption, Privacy. [online] Available at: https://techcrunch.com/2015/06/02/apples-tim-cook-delivers-blistering-speech-on-encryption-privacy/ [Accessed 14 Jun. 2017].



bottom of page