Daily Bulletin

The Times Real Estate

.

  • Written by Gernot Heiser, Scientia Professor and John Lions Chair, UNSW

Australia’s parliament is considering legislation to give new powers to the Australian Criminal Intelligence Commission (ACIC) and the Australian Federal Police. These powers will allow them to modify online data, monitor network activity, and take over online accounts in some circumstances.

Last week, in a submission to parliament regarding the proposed powers, ACIC made an inaccurate and concerning claim about privacy and information security. ACIC claimed “there is no legitimate reason for a law-abiding member of the community to own or use an encrypted communication platform”.

Encrypted communication platforms, including WhatsApp, Signal, Facetime and iMessage, are in common use, allowing users to send messages that can only be read by the intended recipients. There are many legitimate reasons law-abiding people may use them. And surveillance systems, no matter how well-intentioned, may have negative effects and be used for different purposes or by different people than those they were designed for.

Read more: When is 'not a backdoor' just a backdoor? Australia's struggle with encryption

How surveillance can go wrong

Surveillance systems often produce unintended effects.

In 1849, the authorities at Tasmania’s Port Arthur penal colony built the Separate Prison, intended as a humane and enlightened method of imprisonment. Based on the ideas of Jeremy Bentham’s Panopticon, the design emphasised constant surveillance and psychological control rather than corporal punishment. However, many inmates suffered serious psychological problems resulting from the lack of normal communication with others.

From 2006 onwards, Facebook developed a privacy-invading apparatus intended to facilitate making money through targeted advertising. Facebook’s system has since been abused by Cambridge Analytica and others for political manipulation, with disastrous consequences for some democracies.

In 2018, Australia’s parliament passed the Telecommunications and Other Legislation Amendment (Assistance and Access) Act, with the ostensible purpose of helping police to catch terrorists, paedophiles and other serious criminals. The act gave the Australian Federal Police powers to “add, copy, delete or alter” material on computers. These powers were used the following year to raid the Australian Broadcasting Corporation in connection with a story on alleged war crimes in Afghanistan.

ACIC thinks there are no legitimate uses of encryption. They're wrong, and here's why it matters Australian Federal Police raided ABC offices in Sydney in 2019. David Gray / AAP

These examples demonstrate two facts about security and surveillance. First, surveillance may be used by people of any moral character. Second, a surveillance mechanism may be used by different people, or may achieve a completely different effect, from its original design.

We therefore need to consider what avoiding, undermining or even outlawing the use of encrypted platforms would mean for law-abiding members of the community.

Encryption limits the power of security agencies

There are already laws that decide who is allowed to listen to communications taking place over a telecommunications network. While such communications are generally protected, law enforcement and national security agencies can be authorised to intercept them.

However, where communications are encrypted, agencies will not automatically be able to retrieve the content of the conversations they intercept. The Telecommunications and Other Legislation Amendment (Assistance and Access) Act 2018 was passed to enable agencies to get assistance to try to maintain their ability to get access to the (unencrypted) content of communications. For example, they can ask that one or more forms of electronic protection be removed.

Read more: Facebook's push for end-to-end encryption is good news for user privacy, as well as terrorists and paedophiles

There are also federal, state and territory laws that can require people to assist law enforcement and national security agencies in accessing (unencrypted) data. There are also numerous proposals to clarify these laws, extend state powers and even to prevent the use of encryption in certain circumstances.

More surveillance power is not always better

While people may hold different views on particular proposals about state powers and encryption, there are some things on which we should all be able to agree.

First, facts matter. If the ACIC is wrong about lawful uses of encryption, its assertion should be withdrawn or discounted.

Second, people need both security and privacy. In fact, privacy can facilitate security (the more people know about you, the easier it is to trick you, track you and/or harm you).

Read more: You may be sick of worrying about online privacy, but 'surveillance apathy' is also a problem

Third, law enforcement and national security agencies need some surveillance powers to do their jobs. Most of the time, this contributes to the social good of public safety.

Fourth, more is not necessarily better when it comes to surveillance powers. We must ask what purpose the powers serve, whether they are reasonably necessary for achieving that purpose, whether they are likely to achieve the purpose, what negative consequences might result, and whether the powers are proportionate.

Lawful use of encrypted communication is common

We can only develop good policy in this area if we have the facts on lawful uses of encryption.

There are many good reasons for law-abiding citizens to use end-to-end encrypted communication platforms. Parents may send photos or videos of their children to trusted friends or relatives, but prefer not to share them with third parties. The explosion of telehealth during the COVID-19 pandemic has led many patients to clarify that they do not want their consultation with their doctor to be shared with an intermediary such as Facebook or Google (or Huawei or WeChat).

Even the New South Wales iVote online voting system — hardly a standout example of excessive security given that it contained a defect that potentially allowed vote manipulation to take place — advertises the use of end-to-end encryption to protect the privacy of votes in transit. The necessity of privacy to protect a citizen’s right to vote without coercion is one of the oldest examples of legal privacy requirements.

Undermining encryption will hurt legitimate users

As law-abiding citizens do have legitimate reasons to rely on end-to-end encryption, we should develop laws and policies around government surveillance accordingly. Any legislation that undermines information security across the board will have an impact on lawful users as well as criminals.

There will likely be significant disagreement in the community about where to go from there. But we have to get the facts right first.

We should not consider legislation to deliberately undermine the communications security of all individuals without acknowledging the potential harm this could cause to law-abiding citizens.

Authors: Gernot Heiser, Scientia Professor and John Lions Chair, UNSW

Read more https://theconversation.com/acic-thinks-there-are-no-legitimate-uses-of-encryption-theyre-wrong-and-heres-why-it-matters-160975

Business News

Insulation Solutions for Meeting Modern Industrial Standards

As global energy costs soar and environmental regulations tighten, industries face unprecedented pressure to optimise their operations while minimising their ecological footprint. Modern industrial ...

Daily Bulletin - avatar Daily Bulletin

How Australian Startups Should Responsibly Collect, Use and Store Customer Data?

Owing to the digital landscape, data is the most important currency in the market. From giant e-commerce sharks to small businesses, every company is investing heavily to responsibly collect data an...

Daily Bulletin - avatar Daily Bulletin

Revolutionising Connections - The Power of Customer Engagement Software

As time goes by, customer expectations keep on rising ever so rapidly. Businesses that must keep pace will need future-ready tools to deliver connectedness at every touchpoint. Customer engagement a...

Daily Bulletin - avatar Daily Bulletin

LayBy Deals