- The Strategist - https://www.aspistrategist.org.au -

End-to-end encryption is good for democracies

Posted By on March 16, 2022 @ 12:30

Democracies need to accept the mainstream adoption of end-to-end encryption in popular messaging and communications applications like WhatsApp, Signal, iMessage and, in the future according to Meta [1], Facebook Messenger.

End-to-end encryption, where only the sender and recipient can see the contents of a message, has been around for a long time for people who wish to keep their communications private. It gained particular traction after Edward Snowden’s revelations of mass government surveillance in 2013. Its value has since been consolidated globally as a necessary technical response to the perceived surveillance excesses of technology companies and governments alike and can help protect the safety and rights of people around the world to express themselves freely.

But some liberal democratic governments are pushing back against its adoption by mainstream instant-messaging platforms, going so far as to launch an emotive advertising campaign against it [2] recently in the UK.

Broadly, the Australian government argues [3] that law enforcement and intelligence agencies are finding it harder to obtain usable content directly from the platforms because the platforms cannot decrypt and see the encrypted communications that transit their systems.

While Australia, together with the other Five Eyes countries, along with India and Japan, have stated [4] their support for strong encryption, in the same joint statement they also call for platforms to work with governments on technically feasible solutions to enable law enforcement (with appropriate legal authority) to have access to content in a readable and usable format. These two things are not mutually exclusive, except in when end-to-end encryption is being used. End-to-end encryption is specifically designed to prevent third parties from viewing the content of a communication, thus providing privacy to users.

There are other encryption architectures available for messaging systems, such as client-to-server encryption, but it is weak in terms of privacy because a third party with access to the server can read all communications. This is the architecture used in services such as WeChat, and previously in Zoom.

The seven countries have also argued that the move to implement end-to-end encryption would threaten the current practice of platforms without it to continue to proactively identify photos and videos for known child sexual abuse material and report it to authorities.

The problem is that, whether it’s liberal democratic governments monitoring communications for child sexual abuse material or authoritarian governments monitoring for what they deem politically sensitive content, both require decrypting communications (either on the device or on the server) to analyse for ‘harmful’ or ‘illegal’ content, resulting in a third party (and unintended recipient) accessing the encrypted content.

Unfortunately, as we’ve seen with other restrictions in freedom of expression online [5] by liberal democracies, authoritarian countries will use Western examples [6] when enacting their own policies to police content online. Western countries will be hard pressed to criticise those that censor political content if they themselves don’t support an environment in which strong encryption is the norm.

Fundamentally, any access by law enforcement to communications is an intrusion of privacy. Any liberal democratic government with that power needs to have and maintain the trust of its citizens. Even if the current government is trusted, future governments may not be. And given that there are cases in Australia alone of authorities using capabilities [7], powers [8] and data [9] in unexpected ways, there is cause for concern.

Technology companies also have a role to play. They have responsibilities to protect vulnerable users of their platforms, prevent their platforms from being used to facilitate crimes and harmful activities, and help law enforcement (with lawful requests). Together with governments, they should seek solutions that do not demonise or affect the integrity of end-to-end encryption.

Law enforcement doesn’t necessarily need unencrypted content to prosecute a crime. Metadata, which provides information about the communication, can be used to generate leads. But content makes gathering evidence to even obtain a warrant significantly easier.

As Tom Uren writes in his recent ASPI report, The future of assistance to law enforcement in an end-to-end encrypted world [10], there are options available to protect children using social media from harm. Platforms can use metadata and behavioural analysis to sound the alert when, for example, an adult is contacting multiple children that they haven’t had prior contact with. They can educate and encourage [11] children and parents to report suspicious content, which could provide unencrypted content for the platforms to analyse. Perhaps messages to and from children might not use end-to-end encryption by default.

Law enforcement agencies seeking access to evidence for a crime still have a wide array of tools in their belts. Police can access metadata from social media companies about users’ accounts or from service providers in Australia (such as ISPs) that are required to store certain metadata for two years [12]. Australian law enforcement can take over social media accounts [13] or apply for computer access warrants to obtain evidence [14] from devices on which data is usually unencrypted. These investigative techniques are more challenging and can’t necessarily be done at scale.

End-to-end encryption, especially in combination with anonymising software and the growing complexity of modern internet networks, which includes a move towards a decentralised Web 3.0 [15], does make the job of online policing more difficult.

We need to find a middle ground. There is a nuanced debate to be had about how users of online services can be protected both by law enforcement and by platforms, while at the same time governments ensure that the right to privacy, enforced with strong encryption, is not dismissed easily.



Article printed from The Strategist: https://www.aspistrategist.org.au

URL to article: https://www.aspistrategist.org.au/end-to-end-encryption-is-good-for-democracies/

URLs in this post:

[1] according to Meta: https://messengernews.fb.com/2022/01/27/express-yourself-in-messengers-end-to-end-encrypted-chats/

[2] an emotive advertising campaign against it: https://www.bbc.com/news/59964656

[3] Australian government argues: https://www.aph.gov.au/DocumentStore.ashx?id=321e46a3-5715-4344-87a5-66e52c3b1da9&subId=719437

[4] stated: https://www.justice.gov/opa/pr/international-statement-end-end-encryption-and-public-safety

[5] other restrictions in freedom of expression online: https://globalfreedomofexpression.columbia.edu/wp-content/uploads/2019/11/Analyse_The-Digital-Berlin-Wall-How-Germany-Accidentally-Created-a-Prototype-for-Global-Online-Censorship.pdf

[6] will use Western examples: https://www.politico.com/news/2021/09/09/china-hijacked-war-on-terror-511032

[7] capabilities: https://www.zdnet.com/article/oaic-determines-afp-trial-of-clearview-ai-interfered-with-privacy-of-australians/

[8] powers: https://www.theguardian.com/australia-news/2021/apr/28/ombudsman-says-act-federal-police-may-have-illegally-accessed-location-data

[9] data: https://www.smh.com.au/politics/federal/breach-of-trust-police-using-qr-check-in-data-to-solve-crimes-20210903-p58om8.html

[10] The future of assistance to law enforcement in an end-to-end encrypted world: https://www.aspi.org.au/report/future-assistance-law-enforcement-end-end-encrypted-world

[11] educate and encourage: https://www.esafety.gov.au/parents

[12] store certain metadata for two years: https://www.homeaffairs.gov.au/about-us/our-portfolios/national-security/lawful-access-telecommunications/data-retention

[13] take over social media accounts: https://www.afp.gov.au/news-media/media-releases/fast-facts-afp-powers-under-slaid-legislation

[14] computer access warrants to obtain evidence: https://www.legislation.gov.au/Details/C2022C00021

[15] Web 3.0: https://cointelegraph.com/blockchain-for-beginners/what-is-web-3-0-a-beginners-guide-to-the-decentralized-internet-of-the-future

Copyright © 2024 The Strategist. All rights reserved.