ICSI in Lawfare Blog

Encryption and Combating Child Exploitation Imagery​
October 23, 2019 | Nicholas Weaver, Lawfare Blog (ICSI)

The current systems for detecting these child exploitation images rely on bulk surveillance by private companies, and even the most cursory encryption—with “exceptional access” or no—will eliminate this surveillance. If the government is serious about policy changes designed to keep this detection capability in the face of encryption, however, the best policy is not to weaken communication security but instead to mandate endpoint scanning of images as they appear on phones and computers.