Daily Bulletin

Men's Weekly

.

  • Written by Gernot Heiser, Scientia Professor and John Lions Chair, UNSW

Australia’s parliament is considering legislation to give new powers to the Australian Criminal Intelligence Commission (ACIC) and the Australian Federal Police. These powers will allow them to modify online data, monitor network activity, and take over online accounts in some circumstances.

Last week, in a submission to parliament regarding the proposed powers, ACIC made an inaccurate and concerning claim about privacy and information security. ACIC claimed “there is no legitimate reason for a law-abiding member of the community to own or use an encrypted communication platform”.

Encrypted communication platforms, including WhatsApp, Signal, Facetime and iMessage, are in common use, allowing users to send messages that can only be read by the intended recipients. There are many legitimate reasons law-abiding people may use them. And surveillance systems, no matter how well-intentioned, may have negative effects and be used for different purposes or by different people than those they were designed for.

Read more: When is 'not a backdoor' just a backdoor? Australia's struggle with encryption

How surveillance can go wrong

Surveillance systems often produce unintended effects.

In 1849, the authorities at Tasmania’s Port Arthur penal colony built the Separate Prison, intended as a humane and enlightened method of imprisonment. Based on the ideas of Jeremy Bentham’s Panopticon, the design emphasised constant surveillance and psychological control rather than corporal punishment. However, many inmates suffered serious psychological problems resulting from the lack of normal communication with others.

From 2006 onwards, Facebook developed a privacy-invading apparatus intended to facilitate making money through targeted advertising. Facebook’s system has since been abused by Cambridge Analytica and others for political manipulation, with disastrous consequences for some democracies.

In 2018, Australia’s parliament passed the Telecommunications and Other Legislation Amendment (Assistance and Access) Act, with the ostensible purpose of helping police to catch terrorists, paedophiles and other serious criminals. The act gave the Australian Federal Police powers to “add, copy, delete or alter” material on computers. These powers were used the following year to raid the Australian Broadcasting Corporation in connection with a story on alleged war crimes in Afghanistan.

ACIC thinks there are no legitimate uses of encryption. They're wrong, and here's why it matters Australian Federal Police raided ABC offices in Sydney in 2019. David Gray / AAP

These examples demonstrate two facts about security and surveillance. First, surveillance may be used by people of any moral character. Second, a surveillance mechanism may be used by different people, or may achieve a completely different effect, from its original design.

We therefore need to consider what avoiding, undermining or even outlawing the use of encrypted platforms would mean for law-abiding members of the community.

Encryption limits the power of security agencies

There are already laws that decide who is allowed to listen to communications taking place over a telecommunications network. While such communications are generally protected, law enforcement and national security agencies can be authorised to intercept them.

However, where communications are encrypted, agencies will not automatically be able to retrieve the content of the conversations they intercept. The Telecommunications and Other Legislation Amendment (Assistance and Access) Act 2018 was passed to enable agencies to get assistance to try to maintain their ability to get access to the (unencrypted) content of communications. For example, they can ask that one or more forms of electronic protection be removed.

Read more: Facebook's push for end-to-end encryption is good news for user privacy, as well as terrorists and paedophiles

There are also federal, state and territory laws that can require people to assist law enforcement and national security agencies in accessing (unencrypted) data. There are also numerous proposals to clarify these laws, extend state powers and even to prevent the use of encryption in certain circumstances.

More surveillance power is not always better

While people may hold different views on particular proposals about state powers and encryption, there are some things on which we should all be able to agree.

First, facts matter. If the ACIC is wrong about lawful uses of encryption, its assertion should be withdrawn or discounted.

Second, people need both security and privacy. In fact, privacy can facilitate security (the more people know about you, the easier it is to trick you, track you and/or harm you).

Read more: You may be sick of worrying about online privacy, but 'surveillance apathy' is also a problem

Third, law enforcement and national security agencies need some surveillance powers to do their jobs. Most of the time, this contributes to the social good of public safety.

Fourth, more is not necessarily better when it comes to surveillance powers. We must ask what purpose the powers serve, whether they are reasonably necessary for achieving that purpose, whether they are likely to achieve the purpose, what negative consequences might result, and whether the powers are proportionate.

Lawful use of encrypted communication is common

We can only develop good policy in this area if we have the facts on lawful uses of encryption.

There are many good reasons for law-abiding citizens to use end-to-end encrypted communication platforms. Parents may send photos or videos of their children to trusted friends or relatives, but prefer not to share them with third parties. The explosion of telehealth during the COVID-19 pandemic has led many patients to clarify that they do not want their consultation with their doctor to be shared with an intermediary such as Facebook or Google (or Huawei or WeChat).

Even the New South Wales iVote online voting system — hardly a standout example of excessive security given that it contained a defect that potentially allowed vote manipulation to take place — advertises the use of end-to-end encryption to protect the privacy of votes in transit. The necessity of privacy to protect a citizen’s right to vote without coercion is one of the oldest examples of legal privacy requirements.

Undermining encryption will hurt legitimate users

As law-abiding citizens do have legitimate reasons to rely on end-to-end encryption, we should develop laws and policies around government surveillance accordingly. Any legislation that undermines information security across the board will have an impact on lawful users as well as criminals.

There will likely be significant disagreement in the community about where to go from there. But we have to get the facts right first.

We should not consider legislation to deliberately undermine the communications security of all individuals without acknowledging the potential harm this could cause to law-abiding citizens.

Authors: Gernot Heiser, Scientia Professor and John Lions Chair, UNSW

Read more https://theconversation.com/acic-thinks-there-are-no-legitimate-uses-of-encryption-theyre-wrong-and-heres-why-it-matters-160975

Business News

How to Create a Consistent Brand Voice Across All Platforms

Having a strong brand voice is just as important as having a recognizable logo or visual style. Your brand voice is the personality behind your content—the tone, language, and emotional energy that ...

Daily Bulletin - avatar Daily Bulletin

The Biggest Mistakes New Stallholders Make (And How to Avoid Them)

Launching your first market stall is exciting — it’s a chance to showcase your products, meet customers face-to-face and test your business in a real-world environment. But while enthusiasm is high...

Daily Bulletin - avatar Daily Bulletin

The Hidden Reason Startups Rush Towards Content Marketing Support

Melbourne has become a place where new companies try bold ideas and move fast, and in this busy scene, many of them turn to a content marketing agency in Melbourne for the push they need. Many early-s...

Daily Bulletin - avatar Daily Bulletin

Speed Dating For Business
hacklink hack forum hacklink film izle hacklink หวยออนไลน์jojobetสล็อตเว็บตรงgamdom girişpadişahbetMostbetenjoybetjojobetcarros usadospin updizipalStreameastholiganbet girişbetofficecocktail glassesultrabet güncel girişpusulabetcasibompusulabetjojobet girişbetofficetipobetjojobetjojobetholiganbet色情 film izleholiganbetnakitbahisJojobet 1105matbet güncel girişmatbet güncel girişjojobet girişyakabet1xbet girişjojobetGrandpashabetvbetgobahisenjoybetcryptobetjojobet girişgiftcardmall/mygiftbetofficematbetmatadorbetbets10nerobettaraftarium24casibommadridbetbetciocasibomcasibomcasibomJojobetmadridbetkingroyalcasibomdeneme bonusumadridbetultrabetcasibom girişcasibomparmabetparmabetyakabetMarsbahisCasibomkingroyalsekabetDinamobetgobahisVdcasinobetpuanMarsbahisjokerbetbetoffice girişprimebahismeritkingprimebahistaraftarium24jojobetyakabetyakabetyakabetatlasbetwinxbetaresbetSahabet twittercasibomcasibomcolor pickerlunabetbetofficebetkolikcolor pickerbetsmove girişvaycasino girişgalabetgalabetgalabet girişmavibetbetsmoveคลิปหลุดไทยCasibomcasibomvaycasinodeneme bonusu veren siteleronwinonwin girişantalya escortultrabetAlanya escortgrandbettingjojobetmarsbahisbahsegelgrandbettingtimebetgrandbettingbetofficetimebetultrabetbets10pusulabetRoyal Reelsroyal reelsnorabahisstarzbet girişAntalya EscortjojobetJojobettürk ifşa izleNişantaşı EscortinterbahisinterbahisbettiltCrackstreamscasibomKalebetjojobetfixbetaviator gametimebettimebettimebetbahislionSohbet odalarıcasibomcasibomcasibomcrown155hb88super96pusulabetmeritbetbetasusholiganbetcasibomStreameast한국야동av한글자막สล็อตpornopadişahbetBetigmacasibomBetigmaBetlora girişgaziantep escortJojobet 1105spin2uneoaus96jojobetjojobetbettiltmatbetbetparkbets10ffpokiesgrandpashabet