Abstract

Our increasing reliance on digital technology for personal, economic, and government affairs has made it essential to secure the communications and devices of private citizens, businesses, and governments. This has led to pervasive use of cryptography across society. Despite its evident advantages, law enforcement and national security agencies have argued that the spread of cryptography has hindered access to evidence and intelligence. Some in industry and government now advocate a new technology to access targeted data: client-side scanning (CSS). Instead of weakening encryption or providing law enforcement with backdoor keys to decrypt communications, CSS would enable on-device analysis of data in the clear. If targeted information were detected, its existence and, potentially, its source would be revealed to the agencies; otherwise, little or no information would leave the client device. Its proponents claim that CSS is a solution to the encryption versus public safety debate: it offers privacy—in the sense of unimpeded end-to-end encryption—and the ability to successfully investigate serious crime. In this paper, we argue that CSS neither guarantees efficacious crime prevention nor prevents surveillance. Indeed, the effect is the opposite. CSS by its nature creates serious security and privacy risks for all society, while the assistance it can provide for law enforcement is at best problematic. There are multiple ways in which CSS can fail, can be evaded, and can be abused.

Details

Title
Bugs in our pockets: the risks of client-side scanning
Author
Abelson, Harold 1 ; Anderson, Ross 2 ; Bellovin, Steven M 3 ; Benaloh, Josh 4 ; Blaze, Matt 5 ; Callas, Jon 6 ; Whitfield Diffie 7 ; Landau, Susan 8 ; Neumann, Peter G 9 ; Rivest, Ronald L 1 ; Schiller, Jeffrey I 1 ; Schneier, Bruce 10 ; Teague, Vanessa 11 ; Troncoso, Carmela 12 

 Computer Science & Artificial Intelligence Lab, Massachusetts Institute of Technology , 77 Massachusetts Avenue, Cambridge, MA 02139 , United States 
 Computer Laboratory, University of Cambridge , JJ Thomson Avenue, Cambridge CB3 0FD , United Kingdom 
 Department of Computer Science and affiliate faculty, Law School, Columbia University , MC 0401, New York, NY 10027 , United States 
 Microsoft Research, One Microsoft Way , Redmond, WA 98052 , United States 
 Department of Computer Science and Law School, Georgetown University , 3700 O St NW, Washington, DC 20057 , United States 
 The Electronic Frontier Foundation , 815 Eddy Street, San Francisco, CA 94109 , United States 
 Gonville and Caius College, Cambridge University , United Kingdom 
 The Fletcher School and School of Engineering, Department of Computer Science Tufts University , 160 Packard Ave, Medford, MA 02155 , United States 
 Computer Science Lab, SRI International , 333 Ravenswood Ave, Menlo Park, CA 94025 , United States 
10  Harvard Kennedy School and The Berkman Klein Center for Internet & Society, Harvard University , 79 John F. Kennedy Street, Cambridge, MA 02138 , United States 
11  College of Engineering and Computer Science, Australian National University , Canberra, ACT 2600 , Australia 
12  SPRING Lab, Ecole Polytechnique Federale de Lausanne, Rte Cantonale , 1015 Lausanne , Switzerland 
Publication year
2024
Publication date
2024
Publisher
Oxford University Press
ISSN
20572085
e-ISSN
20572093
Source type
Scholarly Journal
Language of publication
English
ProQuest document ID
3168752228
Copyright
© The Author(s) 2024. Published by Oxford University Press. This work is published under https://creativecommons.org/licenses/by-nc/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.