Law Enforcement and National Security vs. Global Business Interests | INSS
go to header go to content go to footer go to search
INSS logo The Institute for National Security Studies, Strategic, Innovative, Policy-Oriented Research, go to the home page
INSS
Tel Aviv University logo - beyond an external website, opens on a new page
  • Campus
  • Contact
  • עברית
  • Support Us
  • Research
    • Topics
      • Israel and the Global Powers
        • Israel-United States Relations
        • Glazer Israel-China Policy Center
        • Russia
        • Europe
        • Antisemitism and Delegitimization
      • Iran and the Shi'ite Axis
        • Operation Roaring Lion
        • Iran
        • Lebanon and Hezbollah
        • Syria
        • Yemen and the Houthi Movement
        • Iraq and the Iraqi Shiite Militias
      • Conflict to Agreements
        • Israeli-Palestinian Relations
        • Hamas and the Gaza Strip
        • Peace Agreements and Normalization in the Middle East
        • Saudi Arabia and the Gulf States
        • Turkey
        • Egypt
        • Jordan
      • Israel’s National Security Policy
        • Military and Strategic Affairs
        • Societal Resilience and the Israeli Society
        • Jewish-Arab Relations in Israel
        • Climate, Infrastructure and Energy
        • Terrorism and Low Intensity Conflict
      • Cross-Arena Research
        • Data Analytics Center
        • Law and National Security
        • Advanced Technologies and National Security
        • Foreign Information Manipulation and Interference
        • Economics and National Security
    • Projects
      • Preventing the Slide into a One-State Reality
  • Publications
    • -
      • All Publications
      • INSS Insight
      • Policy Papers
      • Special Publication
      • Strategic Assessment
      • Technology Platform
      • Memoranda
      • Posts
      • Books
      • Archive
  • Database
    • Surveys
    • Spotlight
    • Maps
    • Dashboards
  • Events
  • Team
  • About
    • Vision and Mission
    • History
    • Research Disciplines
    • Chairman of the Board
    • Board of Directors
    • Fellowship and Prizes
    • Internships
  • Media
    • Communications
    • Video gallery
    • Press Releases
  • Podcast
  • Newsletter
  • Campus
Search in site
  • Research
    • Topics
    • Israel and the Global Powers
    • Israel-United States Relations
    • Glazer Israel-China Policy Center
    • Russia
    • Europe
    • Antisemitism and Delegitimization
    • Iran and the Shi'ite Axis
    • Operation Roaring Lion
    • Iran
    • Lebanon and Hezbollah
    • Syria
    • Yemen and the Houthi Movement
    • Iraq and the Iraqi Shiite Militias
    • Conflict to Agreements
    • Israeli-Palestinian Relations
    • Hamas and the Gaza Strip
    • Peace Agreements and Normalization in the Middle East
    • Saudi Arabia and the Gulf States
    • Turkey
    • Egypt
    • Jordan
    • Israel’s National Security Policy
    • Military and Strategic Affairs
    • Societal Resilience and the Israeli Society
    • Jewish-Arab Relations in Israel
    • Climate, Infrastructure and Energy
    • Terrorism and Low Intensity Conflict
    • Cross-Arena Research
    • Data Analytics Center
    • Law and National Security
    • Advanced Technologies and National Security
    • Foreign Information Manipulation and Interference
    • Economics and National Security
    • Projects
    • Preventing the Slide into a One-State Reality
  • Publications
    • All Publications
    • INSS Insight
    • Policy Papers
    • Special Publication
    • Strategic Assessment
    • Technology Platform
    • Memoranda
    • Posts
    • Books
    • Archive
  • Database
    • Surveys
    • Spotlight
    • Maps
    • Dashboards
  • Events
  • Team
  • About
    • Vision and Mission
    • History
    • Research Disciplines
    • Chairman of the Board
    • Board of Directors
    • Fellowship and Prizes
    • Internships
    • Privacy Policy and Terms of Use
  • Media
    • Communications
    • Video gallery
    • Press Releases
  • Podcast
  • Newsletter
  • Campus
  • Contact
  • עברית
  • Support Us
bool(false)

Publications

Home Publications INSS Insight Law Enforcement and National Security vs. Global Business Interests

Law Enforcement and National Security vs. Global Business Interests

INSS Insight No. 643, December 17, 2014

עברית
Yoram Hacohen
Three interesting processes are underway as a direct result of Edward Snowden’s revelations about the extent of the access by US security services to personal information stored and processed in the IT systems of global American companies. One of these processes is essentially technological, the second is legal, and the third is of a business nature. All three processes are designed to constrict access by American government agencies to personal information held by those companies, in their effort to preserve national security and enforce the law. These processes are likely to complicate law enforcement efforts and the fight against terrorism throughout the world, including Israel. The law enforcement and intelligence agencies must understand the opposing processes and interests – civilian, technological, and business – and make sure that on the one hand, these interests are not harmed unnecessarily, and on the other hand, preserve the ability to fight 21st century crime and terrorism.

Three interesting processes are underway as a direct result of Edward Snowden’s revelations about the extent of the access by US security services to personal information stored and processed in the IT systems of global American companies. One of these processes is essentially technological, the second is legal, and the third is of a business nature. All three processes are designed to constrict access by American government agencies to personal information held by those companies, in their effort to preserve national security and enforce the law.

In June 2013, Snowden, a systems administrator who worked for a subcontractor of the National Security Agency (NSA), gave Glenn Greenwald, a journalist at The Guardian, tens of thousands of documents that revealed the far-reaching extent to which American security agencies were collecting personal information from American-originated global companies such as Google, Facebook, Microsoft, Apple, and Yahoo. The documents indicate that with the approval of a special court for intelligence matters operating under the Foreign Intelligence Surveillance Act (FISA), computerized interfaces had been constructed for the automatic transfer of information from the companies to the NSA. According to Snowden, the transferred information included search requests for search engines, e-mail, instant messaging, video, VoIP calls, and documents, as well as information about each of these items (i.e., metadata such as sender, receiver, time of delivery, IP address, and so on). In addition, among Snowden’s more sensational disclosures was information about the NSA’s monitoring of world leaders, including leaders of friends of the US.

Ostensibly, Snowden’s revelations should have disturbed mainly civil rights activists anxious about violation of the constitutional rights of American and foreign citizens, such as the right to privacy, due process of law, and freedom of expression. Surprisingly however, the primary response has come from the global technology companies.

When Apple released its new version of its operating system for smartphones, IOS8, it announced that it would include an encryption mechanism for the instant messaging system and calls (iMessage and FaceTime) that would prevent the company from decoding the communications content and would not enable Apple to disclose information to law enforcement authorities. Google announced that it will have similar solution in the new version of its Android operating system. The WhatsApp application, acquired by Facebook, announced recently that it too was implementing an encryption mechanism of this sort in its messaging system. Google and Yahoo reported that they were taking steps to enable their customers to perform encryption in their respective e-mail services. Thus, more and more companies are announcing the implementation of technological means that would make the companies incapable of cooperating with the authorities and complying with orders from them, even if approved by the court.

At the same time, global companies are challenging federal orders in the legal sphere. Several months ago, Microsoft initiated a legal proceeding following an order issued by a local New York City judge at the request of the United States law enforcement authorities for information about its customers stored on the company’s servers in Ireland. These servers operate under a European jurisdiction, and Microsoft claimed that in certain aspects the US court order violates the rights of its customers under the European legal framework. Microsoft decided to take this order to the highest legal authority available to it for a ruling, asserting that the US government had no right to search and seizure for communications stored in a foreign country. This stance was supported in the legal process by other global corporations, among them Apple and Cisco.

The third area in which a change has apparently taken place is the realm of business. After years of developing business models based mainly on providing “free services,” such as Facebook, Google, and Twitter, which finance their operations through usage of users’ personal information for online advertising services, a market may be emerging based on providing privacy protection services. This process is just beginning, but venture capital funds report growth in the startups in this field.

The global companies’ motivation for introducing technological changes in their products such as encrypting their customers’ information, as well as challenging the requests for disclosure of such information, is due to their realization that their business is built on worldwide user trust. Anxiety about being perceived as collaborators with American intelligence and law enforcement agencies is forcing them to signal that customer interests everywhere around the globe are identified and secured. Businesses that provide privacy protection services may see an emerging market for products that protect against state and global corporations surveillance that collects large amounts of personal information.

The history of modern encryption shows that academic inventions and their business applications can be quite problematic for state agencies, as happened following the development of the Diffie-Hellman key exchange public-key cryptography in the 1970s (and the ensuing development of the RSA algorithm for generating encryption keys). Another example is the opposition to the Clinton administration idea in the 1990s to build an encryption device with a built-in backdoor into the hardware used for communications (the Clipper chip).

With this background, several processes are underway that are likely to affect the war against terrorism significantly, as well as law enforcement in cyberspace. The first process is continued development and implementation of encryption means that are subject to the exclusive control of the end user. These methods operate in a decentralized way, and do not require centralized management functions that can be monitored. In addition to the communications content, all these means may also conceal metadata, making it difficult to map and identify the activity taking place, and certainly to distinguish it from the innocent activity that accounts for most uses of the internet. Despite the recent success by American law enforcement authorities in dealing with criminal activity using the TOR anonymous service network, it required large scale resources, and the breaches found are likely to be closed.

The second process, signs of which began to appear immediately after Snowden’s disclosures, is the development of state-centered internet services, i.e., services for which legal jurisdiction and law enforcement authority lie with a sovereign state, since they operate solely within the sovereign state, and most of their users are its citizens. Evidence of such initiatives has been seen in Europe, Russia, and China. Beyond the business effect of this trend on global companies, the significance for law enforcement is that in order to obtain information from remote services for the purpose of fighting terrorism or law enforcement, agencies will require an international mechanism for assistance in law enforcement and intelligence – with all the political and international ramifications of this sort arrangement. Covert penetration of these services obviously incurs a risk of international tension, due to the infringement of sovereignty involved.

The third process is public pressure in various countries for clearer regulation of the authority and monitoring capabilities of the intelligence and law enforcement agencies at both the local and the international level. One indication of this was the initiative by Democratic senators, with support from the NSA, to define and circumscribe the NSA’s monitoring authority. The initiative was eventually rejected due to opposition by the Republican majority in the Senate. In addition, the European Commission is promoting regulation on privacy and protection of personal data, and the European Parliament passed a resolution in favor of measures to break up the “digital monopolies” (which are the attractive global vendors from which to collect data). Although these are ostensibly civilian matters, this initiative will also have a major impact, since it puts the volume of information collected in global information services in the spotlight.

These processes, insofar as they expand, are likely to challenge and complicate the effort at law enforcement and the fight against terrorism throughout the world, including Israel. Today, a significant part of the preparation for crime and terrorism takes place in cyberspace, and cyber terror and cybercrime activities are conducted in this venue. Access to this information at the preparatory stages for preventative purposes is critical. The law enforcement and intelligence agencies must understand the opposing processes and interests – civilian, technological, and business – and make sure that on the one hand, these interests are not harmed unnecessarily, and on the other hand the ability to fight 21st century crime and terrorism is maintained.
The opinions expressed in INSS publications are the authors’ alone.
Publication Series INSS Insight
TopicsAdvanced Technologies and National SecurityIsrael-United States RelationsLaw and National Security
עברית

Events

All events
Iran, US, Israel, and the Global Jewish Community
10 March, 2026
12:00 - 13:00
Shutterstock

Related Publications

All publications
Shutterstock
The Pentagon’s AI-First Doctrine and Its Implications for Modern Warfare: Lessons from the Conflict with Iran
How has the new US policy—under which AI is positioned as a foundational component in the chain of command, intelligence gathering, and the planning of complex operations—been reflected on the battlefield, and what conclusions should be drawn in Israel?
19/03/26
Shutterstock
Digital Sovereignty: A Conceptual Framework for Israel and Policy Recommendations
Digital sovereignty has, in recent years, become one of the central components of national power, economic resilience, and security. Artificial intelligence, cloud computing, data, and capital-intensive computing infrastructure constitute foundational elements for governmental, military, and economic activity. Accordingly, control over digital infrastructure is not merely a technological or economic issue but a strategic concern of the highest order. Israel, as a powerhouse of technological innovation, currently finds itself in a paradox. It is a leader in the development of advanced technologies and benefits from a highly developed technological ecosystem. At the same time, it is increasingly dependent on digital infrastructures controlled by foreign actors, including global cloud providers, semiconductor supply chains, and a regulatory framework that is not always aligned with the scale of investment, the risks involved, and the unique characteristics of strategic digital infrastructure. This situation presents Israel with a strategic challenge: how to preserve openness and innovation while ensuring control, resilience, and sovereignty over critical digital assets. This paper aims to present a conceptual framework for digital sovereignty, to identify principal policy challenges, and to propose an infrastructural and regulatory agenda for integrated implementation that balances public, economic, and security interests.  
23/02/26
Subsea Data Centers: An Opportunity for the State of Israel
What are the opportunities, risks, and challenges involved in establishing data centers—intended, in part, for AI applications—within the sea?
09/02/26

Stay up to date

Registration was successful! Thanks.
  • Research

    • Topics
      • Israel and the Global Powers
      • Israel-United States Relations
      • Glazer Israel-China Policy Center
      • Russia
      • Europe
      • Antisemitism and Delegitimization
      • Iran and the Shi'ite Axis
      • Operation Roaring Lion
      • Iran
      • Lebanon and Hezbollah
      • Syria
      • Yemen and the Houthi Movement
      • Iraq and the Iraqi Shiite Militias
      • Conflict to Agreements
      • Israeli-Palestinian Relations
      • Hamas and the Gaza Strip
      • Peace Agreements and Normalization in the Middle East
      • Saudi Arabia and the Gulf States
      • Turkey
      • Egypt
      • Jordan
      • Israel’s National Security Policy
      • Military and Strategic Affairs
      • Societal Resilience and the Israeli Society
      • Jewish-Arab Relations in Israel
      • Climate, Infrastructure and Energy
      • Terrorism and Low Intensity Conflict
      • Cross-Arena Research
      • Data Analytics Center
      • Law and National Security
      • Advanced Technologies and National Security
      • Foreign Information Manipulation and Interference
      • Economics and National Security
    • Projects
      • Preventing the Slide into a One-State Reality
  • Publications

    • All Publications
    • INSS Insight
    • Policy Papers
    • Special Publication
    • Strategic Assessment
    • Technology Platform
    • Memoranda
    • Database
    • Posts
    • Books
    • Archive
  • About

    • Vision and Mission
    • History
    • Research Disciplines
    • Chairman of the Board
    • Board of Directors
    • Fellowship and Prizes
    • Internships
    • Support
    • Privacy Policy and Terms of Use
  • Media

    • Communications
    • Video Gallery
    • Press Release
    • Podcast
  • Home

  • Events

  • Database

  • Team

  • Contact

  • Newsletter

  • עברית

INSS logo The Institute for National Security Studies, Strategic, Innovative, Policy-Oriented Research, go to the home page
40 Haim Levanon St. Tel Aviv, 6997556 Israel | Tel: 03-640-0400 | Fax: 03-744-7590 | Email: info@inss.org.il
Developed by Daat ,Yael Group.
Accessibility Statement
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.