Modern Australian
Men's Weekly

.

ACIC thinks there are no legitimate uses of encryption. They're wrong, and here's why it matters

  • Written by Gernot Heiser, Scientia Professor and John Lions Chair, UNSW

Australia’s parliament is considering legislation to give new powers to the Australian Criminal Intelligence Commission (ACIC) and the Australian Federal Police. These powers will allow them to modify online data, monitor network activity, and take over online accounts in some circumstances.

Last week, in a submission to parliament regarding the proposed powers, ACIC made an inaccurate and concerning claim about privacy and information security. ACIC claimed “there is no legitimate reason for a law-abiding member of the community to own or use an encrypted communication platform”.

Encrypted communication platforms, including WhatsApp, Signal, Facetime and iMessage, are in common use, allowing users to send messages that can only be read by the intended recipients. There are many legitimate reasons law-abiding people may use them. And surveillance systems, no matter how well-intentioned, may have negative effects and be used for different purposes or by different people than those they were designed for.

Read more: When is 'not a backdoor' just a backdoor? Australia's struggle with encryption

How surveillance can go wrong

Surveillance systems often produce unintended effects.

In 1849, the authorities at Tasmania’s Port Arthur penal colony built the Separate Prison, intended as a humane and enlightened method of imprisonment. Based on the ideas of Jeremy Bentham’s Panopticon, the design emphasised constant surveillance and psychological control rather than corporal punishment. However, many inmates suffered serious psychological problems resulting from the lack of normal communication with others.

From 2006 onwards, Facebook developed a privacy-invading apparatus intended to facilitate making money through targeted advertising. Facebook’s system has since been abused by Cambridge Analytica and others for political manipulation, with disastrous consequences for some democracies.

In 2018, Australia’s parliament passed the Telecommunications and Other Legislation Amendment (Assistance and Access) Act, with the ostensible purpose of helping police to catch terrorists, paedophiles and other serious criminals. The act gave the Australian Federal Police powers to “add, copy, delete or alter” material on computers. These powers were used the following year to raid the Australian Broadcasting Corporation in connection with a story on alleged war crimes in Afghanistan.

ACIC thinks there are no legitimate uses of encryption. They're wrong, and here's why it matters Australian Federal Police raided ABC offices in Sydney in 2019. David Gray / AAP

These examples demonstrate two facts about security and surveillance. First, surveillance may be used by people of any moral character. Second, a surveillance mechanism may be used by different people, or may achieve a completely different effect, from its original design.

We therefore need to consider what avoiding, undermining or even outlawing the use of encrypted platforms would mean for law-abiding members of the community.

Encryption limits the power of security agencies

There are already laws that decide who is allowed to listen to communications taking place over a telecommunications network. While such communications are generally protected, law enforcement and national security agencies can be authorised to intercept them.

However, where communications are encrypted, agencies will not automatically be able to retrieve the content of the conversations they intercept. The Telecommunications and Other Legislation Amendment (Assistance and Access) Act 2018 was passed to enable agencies to get assistance to try to maintain their ability to get access to the (unencrypted) content of communications. For example, they can ask that one or more forms of electronic protection be removed.

Read more: Facebook's push for end-to-end encryption is good news for user privacy, as well as terrorists and paedophiles

There are also federal, state and territory laws that can require people to assist law enforcement and national security agencies in accessing (unencrypted) data. There are also numerous proposals to clarify these laws, extend state powers and even to prevent the use of encryption in certain circumstances.

More surveillance power is not always better

While people may hold different views on particular proposals about state powers and encryption, there are some things on which we should all be able to agree.

First, facts matter. If the ACIC is wrong about lawful uses of encryption, its assertion should be withdrawn or discounted.

Second, people need both security and privacy. In fact, privacy can facilitate security (the more people know about you, the easier it is to trick you, track you and/or harm you).

Read more: You may be sick of worrying about online privacy, but 'surveillance apathy' is also a problem

Third, law enforcement and national security agencies need some surveillance powers to do their jobs. Most of the time, this contributes to the social good of public safety.

Fourth, more is not necessarily better when it comes to surveillance powers. We must ask what purpose the powers serve, whether they are reasonably necessary for achieving that purpose, whether they are likely to achieve the purpose, what negative consequences might result, and whether the powers are proportionate.

Lawful use of encrypted communication is common

We can only develop good policy in this area if we have the facts on lawful uses of encryption.

There are many good reasons for law-abiding citizens to use end-to-end encrypted communication platforms. Parents may send photos or videos of their children to trusted friends or relatives, but prefer not to share them with third parties. The explosion of telehealth during the COVID-19 pandemic has led many patients to clarify that they do not want their consultation with their doctor to be shared with an intermediary such as Facebook or Google (or Huawei or WeChat).

Even the New South Wales iVote online voting system — hardly a standout example of excessive security given that it contained a defect that potentially allowed vote manipulation to take place — advertises the use of end-to-end encryption to protect the privacy of votes in transit. The necessity of privacy to protect a citizen’s right to vote without coercion is one of the oldest examples of legal privacy requirements.

Undermining encryption will hurt legitimate users

As law-abiding citizens do have legitimate reasons to rely on end-to-end encryption, we should develop laws and policies around government surveillance accordingly. Any legislation that undermines information security across the board will have an impact on lawful users as well as criminals.

There will likely be significant disagreement in the community about where to go from there. But we have to get the facts right first.

We should not consider legislation to deliberately undermine the communications security of all individuals without acknowledging the potential harm this could cause to law-abiding citizens.

Authors: Gernot Heiser, Scientia Professor and John Lions Chair, UNSW

Read more https://theconversation.com/acic-thinks-there-are-no-legitimate-uses-of-encryption-theyre-wrong-and-heres-why-it-matters-160975

Long Weekend Camping in the Yarra Ranges: Three Weekends of High Country Adventure

Yarra Ranges National Park, Victoria. Image by Mattinbgn (talk · contribs), CC BY 3.0, via Wikimedia CommonsVictoria’s Yarra Ranges offer keen trav...

Why Waste Management Solutions Are Essential For Modern Businesses

Managing waste responsibly has become a critical priority for organisations of all sizes, which is why waste management solutions play such an impo...

The Importance and Varieties of Ride-On Mower Tyres

Ride-on mowers are built to manage larger lawns with consistency and control. The quality and design of ride on mower tyres play a critical role in ...

Gain Peace Of Mind: The Undeniable Benefits Of A Ready First Aid Kit

Life in our vibrant communities, whether it's the bustling city or the quiet country town, is full of unexpected moments. From a scraped knee on the...

The Most Common Conveyor System Issues in Manufacturing

In modern manufacturing, conveyor systems play a central role in keeping production lines efficient, consistent, and cost-effective. When they operate...

How to Secure a Long-Term Rental in a Competitive Market

The rental market can be unpredictable and may present challenges if you’re not prepared. Initially, you might submit numerous applications and stil...

What Smart Investors Know About Real Estate

Many people think investing in property is just about buying a house and waiting for it to get expensive. While that can happen, the people who actual...

The Benefits of Seeking Help for Anxiety and Stress

Anxiety and stress have become common experiences in today’s fast-paced world, affecting people across all ages and lifestyles. From work pressures ...

How to Make the Most of Fashion Wholesale Options for Your Brand

If you want to grow a fashion brand without constantly reinventing the wheel, wholesale can be one of the smartest ways to scale. The key is knowing h...

How to Add Value to Your Home Before Selling

Selling a home is not just about putting up a sign and waiting for offers. It is about presenting a property that buyers instantly connect with and ar...

How Outdoor Play Enhances Learning and Wellbeing

You don’t need to be an expert to conclude that play is an essential part of growing up. When children aren’t restricted and kept indoors, they de...

How to Build Passive Income Through Real Estate

Building passive income is one of the most effective ways to create long-term financial security. While there are many investment opportunities availa...

DIY Guide to Replacing Small Parts in Your Laundry Machine

Finding a puddle or a broken washer is frustrating, but you don’t always need a professional. Many common issues are caused by tiny parts that are c...

Best Practices for Managing Your Warehouse Partner Relationships

Your warehouse partner is an important part of your business. They sit in the middle of your promises to customers. Yet, when they deliver what’s pr...

Benefits of Solar-Based Water Circulation Systems

Imagine your water system running all day without touching your electricity bill. No noise, no heavy cables, no stress when prices go up. Fantastic, r...

Benefits of Using an Outrigger Crane for Complex Lifts

Complex lifts aren’t the kind of jobs you improvise. You’re dealing with awkward shapes, serious weight, and sites that never seem designed for wh...

A Beginner's Guide to Website Ranking

If you have a website, you probably want people to find it. But building a website alone does not guarantee visitors. Millions of websites compete for...

How to Prepare Your Home for Holiday Guests

Welcoming holiday guests into your home is one of life’s great pleasures. Whether it’s Christmas lunch, a long weekend reunion, or interstate re...