- The Oxford Handbook of U.S. National Security
- About the Editors
- Contributors
- Acknowledgments
- Foreword: U.S. National Security for the Twenty-First Century
- Introduction: Shape and Scope of U.S. National Security
- America’s Foreign Policy Traditions
- National Interests and Grand Strategy
- U.S. Foreign Policymaking and National Security
- Civil-Military Relations
- The Presidency and Decision Making
- The National Security Council: Is It Effective, or Is It Broken?
- The National Security Process
- Intelligence and National Security Decision Making
- Congress and National Security
- Diplomacy, the State Department, and National Security
- Development Assistance: Rationale and Applications
- Understanding and Improving U.S. Financial Sanctions
- The Political Economy of Security
- Budgeting for National Security
- Military Force Planning and National Security
- Military Operations and the Defense Department
- Alliances, Military Basing, and Logistics
- Homeland Security
- The United States and Iran: Challenges of Deterrence and Compellence
- U.S. Nuclear Strategy: The Search for Meaning
- International Cyber Conflict and National Security
- Encryption Wars: Who Should Yield?
- Space and National Security
- Human (In)Security
- Climate Change and Environmental Security
- Political Violence
- Women’s Participation in Political Violence
- International Terrorism
- Threats and Dangers in the Twenty-First Century
- International Rivalry and National Security
- Interstate Rivalry in East Asia
- The Transatlantic Security Landscape in Europe
- U.S. National Security in the Western Hemisphere
- Epilogue: Five Lessons for National Security Policymakers
- Index
Abstract and Keywords
All societies face a constant tug of war between protecting individual rights and ensuring the needs of various common goods, especially public safety and homeland security. At any point in time, one side or the other may gain too much power and must be scaled back. The chapter examines this issue by dealing with encryption, drawing on the lessons of the Crypto Wars of the 1990s and the legal case between Apple and the FBI in the wake of the San Bernardino terrorist attack in 2016. Beyond specifics, the chapter deals with a new, liberal communitarian approach, to sorting out where the balance lies between individual rights and the common good.
Keywords: cybersecurity, encryption, Crypto Wars, Apple, FBI
Amitai Etzioni is a university professor and Professor of International Relations at The George Washington University. He served as a Senior Advisor at the Carter White House; taught at Columbia University, Harvard University, and University of California, Berkeley; and served as president of the Society for the Advancement of Socio-Economics (SASE). A study by Richard Posner ranked him among the top 100 American intellectuals. Etzioni is the author of many books, including Security First (2007), Foreign Policy: Thinking Outside the Box (2016), and Avoiding War with China (2017). His most recent book, Happiness is the Wrong Metric: A Liberal Communitarian Response to Populism, was published by Springer in January 2018.
Access to the complete content on Oxford Handbooks Online requires a subscription or purchase. Public users are able to search the site and view the abstracts and keywords for each book and chapter without a subscription.
Please subscribe or login to access full text content.
If you have purchased a print title that contains an access token, please see the token for information about how to register your code.
For questions on access or troubleshooting, please check our FAQs, and if you can''t find the answer there, please contact us.
- The Oxford Handbook of U.S. National Security
- About the Editors
- Contributors
- Acknowledgments
- Foreword: U.S. National Security for the Twenty-First Century
- Introduction: Shape and Scope of U.S. National Security
- America’s Foreign Policy Traditions
- National Interests and Grand Strategy
- U.S. Foreign Policymaking and National Security
- Civil-Military Relations
- The Presidency and Decision Making
- The National Security Council: Is It Effective, or Is It Broken?
- The National Security Process
- Intelligence and National Security Decision Making
- Congress and National Security
- Diplomacy, the State Department, and National Security
- Development Assistance: Rationale and Applications
- Understanding and Improving U.S. Financial Sanctions
- The Political Economy of Security
- Budgeting for National Security
- Military Force Planning and National Security
- Military Operations and the Defense Department
- Alliances, Military Basing, and Logistics
- Homeland Security
- The United States and Iran: Challenges of Deterrence and Compellence
- U.S. Nuclear Strategy: The Search for Meaning
- International Cyber Conflict and National Security
- Encryption Wars: Who Should Yield?
- Space and National Security
- Human (In)Security
- Climate Change and Environmental Security
- Political Violence
- Women’s Participation in Political Violence
- International Terrorism
- Threats and Dangers in the Twenty-First Century
- International Rivalry and National Security
- Interstate Rivalry in East Asia
- The Transatlantic Security Landscape in Europe
- U.S. National Security in the Western Hemisphere
- Epilogue: Five Lessons for National Security Policymakers
- Index