Letter to Prime Minister Turnbull re Encryption and Human Rights – Human Rights Watch (press release)

August 3, 2017 Hon. Malcolm Turnbull MP Prime Minister Parliament House CANBERRA ACT 2600

Re: Encryption and Human Rights

Dear Prime Minister Turnbull,

We write to urge you to support the use of strong encryption as essential to security and human rights in the digital age. We call on you to refrain from forcing technology companies to weaken the security of their products or banning the use of end-to-end encryption.

In a July 14 press conference on national security and encryption, you discussed challenges that Australian law enforcement and intelligence agencies faced in accessing encrypted data or communications, even with a lawful court order. You announced your intention to introduce legislation that will in particular impose an obligation upon device manufacturers and upon service providers to provide appropriate assistance to intelligence and law enforcement on a warranted basis, to access data in unencrypted form. While the conference released few details, you stated that the legislation would be modelled on the United Kingdoms Investigatory Powers Act and that you will seek a coordinated approach with international partners, including the Five Eyes intelligence alliance.

Governments have a human rights obligation to investigate and prosecute crime and thwart terrorist attacks. However, any policy response should not do more harm than good, while also be effective at achieving its aim. Forcing companies to weaken encryption or effectively forbidding the use of end-to-end encryption fails on both counts, and would undermine human rights worldwide.

Strong encryption is the cornerstone of cybersecurity in the digital age. Todays cybercriminals are increasingly sophisticated, targeting Internet companies, credit card and identity data, critical infrastructure, and even nation-state intelligence agencies.[1] Strong encryption built into private sector technology protects the dataand the human rights and securityof billions of Internet users worldwide against these growing security threats. You yourself have acknowledged that you use encrypted applications like Wickr and WhatsApp because traditional communication methods are not secure.[2]

Weakening encryption for any purpose effectively weakens it for every purpose, including malicious hacking, financial fraud, and for other illicit purposes. And unfortunately, weak or partial encryption provides not just weak or partial protection, but no protection at all against sophisticated repressive regimes and capable criminals. Some companies that manufacture encrypted apps or devices do not have the ability to disclose conversations or data to law enforcement because that information is encrypted end-to-end and companies do not have the decryption keys. A requirement of assured decryptability for all data would force such companies to redesign their products without security features like end-to-end encryption or to introduce deliberate vulnerabilities, or back doors, into their software.

The overwhelming consensus of information security experts, along with some former Five Eyes intelligence officials, is that there is no technical solution that would allow specific law enforcement agencies to decrypt communications without creating vulnerabilities that would expose all users to harm.[3] Europol has also warned that solutions that intentionally weaken technical protection mechanisms to support law enforcement will intrinsically weaken the protection against criminals as well.[4] Determined cybercriminals and rival foreign intelligence agencies will find and exploit such back doors, for profit or abuse. This would undermine cybersecurity for all users, including billions that are under no suspicion of wrongdoing.

For human rights defenders and journalists, the harm can be even more serious. Activists and media organizations with whom we work in places like Hong Kong, Vietnam, Thailand, and across the Middle East rely on encryption built into phones and chat applications to protect sources and victims from reprisals. In 2015, the UN special rapporteur on freedom of expression, David Kaye, recognized that encryption enables the exercise of freedom of expression, privacy, and a range of other rights in the digital age.[5] Countries like Russia, China, and Turkey need no encouragement, they are already blurring the line between human rights activism and terrorism in order to justify surveillance and repression of human rights activists.

While strong encryption may limit some existing surveillance capabilities, weakening such security features will only increase the vulnerability of billions of ordinary people to cybercrime, identify theft, and malicious hacking. Such harm would be broadly disproportionate to any gains in law enforcement capabilities that undermining encryption would achieve.

It is also unlikely that limiting strong encryption in Australiaor even in all Five Eyes countries would prevent bad actors from using it. As a recent global survey of encryption products confirms, terrorists and criminals could easily shift to the many available foreign alternatives that would not be subject to Australian law.[6]

Technology companies face an escalating digital arms race to secure their software and devices against cybercriminals, and encryption is a key part of their arsenal. Instead of hindering efforts to protect ordinary users, we urge your government to invest in modernizing investigation techniques and increasing resources and training in tools already at their disposal, consistent with human rights requirements.[7] For example, any limitations encryption poses to police capabilities are greatly offset by the explosion of new kinds of investigatory material enabled by the digital world, including location information and vast stores of metadata that are not encrypted. And encrypted data can often be accessed in unencrypted form through cloud-based backups or by directly accessing it on devices with hacking or forensic tools. Of course, these alternative approaches should also be necessary and proportionate to legitimate security goals, regulated in public law, and subject to strict safeguards to ensure respect for privacy and other rights.

Australias approach to encryption will be emulated by other countries facing similar challenges. Your government can demonstrate true leadership by adapting to a world with strong encryption instead of fighting the gains the private sector has made in shoring up security and human rights in the digital age.

Sincerely,

Elaine Pearson Australia Director

Cynthia Wong Senior Internet Researcher

CC:

Senator the Hon. George Brandis QC, Attorney-General

Mr. Michael Phelan APM, Acting Commissioner of the Australian Federal Police

[1] See, for example, Sam Thielman, "Yahoo hack: 1bn accounts compromised by biggest data breach in history," The Guardian, December 15, 2016, https://www.theguardian.com/technology/2016/dec/14/yahoo-hack-security-o... (accessed August 2, 2017); Nicole Perlroth & David Sanger, "Hacks Raise Fear Over N.S.A.s Hold on Cyberweapons," New York Times, June 28, 2017, https://www.nytimes.com/2017/06/28/technology/ransomware-nsa-hacking-too... (accessed August 2, 2017).

[2] Eliza Borrello, "Malcolm Turnbull confirms he uses Wickr, WhatsApp instead of unsecure SMS technology," ABC News, March 2, 2015, http://www.abc.net.au/news/2015-03-03/malcolm-turnbull-uses-secret-messa... (accessed August 2, 2017).

[3] Nicole Perlroth, "Security Experts Oppose Government Access to Encrypted Communication," New York Times, July 7, 2015, https://www.nytimes.com/2015/07/08/technology/code-specialists-oppose-us... (accessed August 2, 2017); Mike McConnell, Michael Chertoff and William Lynn, Why the fear over ubiquitous data encryption is overblown, July 28, 2015, https://www.washingtonpost.com/opinions/the-need-for-ubiquitous-data-enc... (accessed August 2, 2017); John Leyden, "Former GCHQ boss backs end-to-end encryption," The Register, July 10, 2017, https://www.theregister.co.uk/2017/07/10/former_gchq_wades_into_encrypti... (accessed August 2, 2017).

[4] Europol and ENISA joint statement, "On lawful criminal investigation that respects 21st Century data protection," May 20, 2016, https://www.enisa.europa.eu/publications/enisa-position-papers-and-opini... (accessed August 2, 2017).

[5] UN Human Rights Council, Report of the Special Rapporteur on the promotion and protection of the right to freedom of opinion and expression, David Kaye, A/HRC/29/32, May 22, 2015, http://ap.ohchr.org/documents/dpage_e.aspx?si=A/HRC/29/32 (accessed August 2, 2017).

[6] B. Schneier, K. Seidel, and S. Vijayakumar, A Worldwide Survey of Encryption Products, February 11, 2016, https://www.schneier.com/academic/archives/2016/02/a_worldwide_survey_o.... (accessed August 2, 2017).

[7] Orin Kerr and Bruce Schneier, Encryption Workarounds, March 20, 2017, https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2938033 (accessed August 2, 2017).

Read the rest here:
Letter to Prime Minister Turnbull re Encryption and Human Rights - Human Rights Watch (press release)

Why Rudd is wrong about online encryption – The Times

August 4 2017, 12:00am,The Times

Edward Lucas

Giving the state access to encrypted phones wont stop terrorist attacks and would weaken security for the rest of us

Encryption is one of the words that make most readers hurriedly turn the page. Yet if you ever use a plastic payment card, you benefit from it. If you ever let your personal details be stored on someone elses database, you rely on it. If you ever use a password on your computer, you use it. Contrary to the home secretarys assertion this week that strong encryption is not a priority for real people, these are applications that real people depend on.

Most people, perhaps even Amber Rudd, do not understand the maths behind encryption. But its effects are simple enough. The internet, a deeply insecure computer network, has become the central nervous system of modern civilisation. Encryption gives us the best chance of protecting

Read more from the original source:
Why Rudd is wrong about online encryption - The Times

China is Majorly Experimenting in the Cryptocurrency and Blockchain Space with NEO – Influencive

Brian D. Evans

Founder/CEO, Influencive.

Last week, certificate authorities in China quietly formed a partnership with NEO, which was formerly known as AntShares but has gone through a rebrand. The idea was to tie in real-world assets and smart-contracts in China in a major way, much like Ethereum did with their smart contracts but with a few differences.

NEO is currently getting marketed as the Ethereum of China. But they are taking it a step further by tying in real world assets. The big picture vision of NEO is to create an entire smart economy. This is where real world assets tie in and begin to become digitized. Essentially every asset could one day be digitally represented and tied into a smart economy. Their version of a smart economy also involves intelligently automating things like payments.

But when you start automating payments and using things in the realm of AI there are some important things to consider. The first roadblocks and hurdles in creating a true smart economy in places like China would be security issues and the decentralization issue with governments involved.

If this experiment is successful and if the power of China gets behind them, things could get interesting really fast. Having an entire country backing a cryptocurrency and blockchain platform could do wonderful things for the industry as a whole. If NEO is successful in a major way in bringing blockchain directly into mainstream use in China, and as long as the key concepts and purposes of blockchain stay intact it could make for very exciting times for the industry.

NEO is the talk of the cryptocurrency and blockchain space right now since their recent meeting at Microsofts headquarters in Beijing where this news first surfaced. NEO also recently partnered with Coindash, Bancor, Binance, Nest Fund, and Agrello.

If this means that an entire countrys government is about to back and support a blockchain platform and cryptocurrency it will at least make for some exciting times ahead.

The rest is here:
China is Majorly Experimenting in the Cryptocurrency and Blockchain Space with NEO - Influencive

Dash Cryptocurrency Calls on White-Hat Hackers to Vet its Blockchain – Finance Magnates

Dash, the cryptocurrency which was recentlyaccepted by Apple for the App Store,has contracted the services of Bugcrowdfor crowd-sourced security testing. This means thousands of cyber security researchers will be incentivized to identify critical software vulnerabilities within Dashs code and present them to the Dash Core Team.

Learn how to buy Bitcoin and Ethereum safely with our simple guide!

Jim Bursch, Director of Dash Incubator and Bugcrowds proposal creator said, Our goal is a safer, stronger network. We are talking about money the digital equivalent of cold, hard cash. Meaningful amounts of cash attract a powerful incentive for thieves on a global scale. The Dash project is like building a bank vault, and inviting elite bank robbers to participate in its design, so it cant be robbed by other criminals.

Dash Core CEO Ryan Taylor added, As Dash gains more mainstream attention, identifying and fixing vulnerabilities is absolutely imperative. Bug bounty programs attract fresh eyes to review code which ensures white-hat hackers help identify any security flaws. Providing strong incentives to attract experienced programmers is one of the many tools we have at our disposal to ensure the Dash codebase is as robust as possible.

Bugcrowd CEO Casey Ellis commented, Currently, there is a massive shortage in cybersecurity professionals pair this with an expanding attack surface and companies are at a major security disadvantage. We have amassed a solid resource of professional security researchers and years of experience managing highly complex programs. We are living in the era of digital transformation cryptocurrency is the next stage in this evolution. Given the globalization of the workforce, it stands to reason that the demand for cryptocurrency will grow.

Excerpt from:
Dash Cryptocurrency Calls on White-Hat Hackers to Vet its Blockchain - Finance Magnates

Edward Snowden: Russian crackdown on web freedom is ‘violation of human rights’ – International Business Times UK

Surveillance expert Edward Snowden, the former US National Security Agency (NSA) analyst turned leaker, has spoken out about the recent spike in internet censorship across Russia and China, saying the incoming ban of VPNs and proxies is a "violation of human rights".

On Sunday 30 July, Russian president Vladimir Putin signed a law which said any technology that could be used to access blacklisted websites including virtual private networks and online anonymisation software will be completely outlawed from 1 November 2017.

Separate legislation will require all messaging applications in the country to be able to identify users through phone numbers after 1 January next year.

Moscow officials argued that the unprecedented move was designed to block access to illegal content and not to restrict the web for law abiding citizens.

Not everyone agreed. "Banning the 'unauthorised' use of basic internet security tools makes Russia both less safe and less free. This is a tragedy of policy," Snowden commented on 30 July, via Twitter.

The NSA whistleblower (or criminal leaker, to some) currently lives in Russia with his partner after being granted asylum in 2013.

He continued: "If the next generation is to enjoy the online liberties ours did, innocuous traffic must become truly indistinguishable from the sensitive.

"Whether enacted by China, Russia, or anyone else, we must be clear this is not a reasonable 'regulation' but a violation of human rights."

The internet clampdown has been teased for months. In late April, it emerged that Russia's media watchdog was drafting the legislation to "completely prohibit" the use of anonymising software.

Firms that fail to abide by the rules would face hefty financial penalties, reports suggested.

And it is now clear the plans were not limited to Russia, with Chinese authorities also talking up moves to bolster its Great Firewall, the state censorship apparatus. In July 2017, Bloomberg reported that access to VPNs would be banned in China from February next year.

VPNs, and web browsing software such as Tor, are able to circumvent censorship and hide identities in a way that makes it difficult for authorities to track the locations of users. In the post-Snowden world, as state-backed spying hit the public consciousness, use of such tools rocketed.

Snowden, who could risk biting the hand that feeds by criticising the Russian state, warned: "For [those] working for major firms: note well this spread in China and Russia within the same week. Don't sleep on the trend." US tech giants have, so far, complied with the bans.

Read more

See the article here:
Edward Snowden: Russian crackdown on web freedom is 'violation of human rights' - International Business Times UK

Netflix documentary shows the depths of Russia’s doping regime – New York Post

Doublethink is defined as holding two contradictory beliefs in ones mind simultaneously, and accepting both of them. That word is from George Orwells novel 1984, a favorite of Russian scientist Dr. Grigory Rodchenkov, who was in a unique position to appreciate the term: As head of his countrys so-called anti-doping lab, Rodchenkov ran a stunningly duplicitous program of doping and outright fraud.

But he blows the whistle on all of it in Icarus, director Bryan Fogels new Netflix documentary, which starts out like Super Size Me and ends up evoking the Edward Snowden-centric Citizenfour.

Fogel, a cyclist, initially planned to film himself going on a doping regimen to achieve better results and show how the cheating is done. He enlists Rodchenkov after American doctors balk at helping and, almost accidentally, gets the charismatic scientist to admit that the Russians have been playing dirty for decades, with the full support of the state.

I could have never imagined that it was essentially going to end up exposing the biggest scandal in sports history, says Fogel, 44. It truly changes the last 40 years of Olympics history.

After sneaking Rodchenkov out of Russia, Fogel went with him to the New York Times, which ran a front-page story about the scope of the cheating at the 2014 Winter Olympics in Sochi, a cloak-and-dagger operation that involved swapping dirty urine for clean, the latter of which was stowed at a former KGB facility.

It was incredibly nerve-racking before the story became public, says Fogel, who reveals that Rodchenkov felt safer once the information was out in the open. Their fears were not unfounded: Within two weeks (in February 2016), two former Russian Anti-Doping Agency officials were found dead.

Rodchenkov has since gone into the federal witness-protection program. Through his attorney, Im being told hes OK, says Fogel. But his family is not able to leave Russia. Theyre under surveillance, they took their passports and seized most of the familys assets. But his wife and sister still have jobs, and Im told they are safe at this time.

As for whether sports will ever really be able to break free from doping and cheating, Fogel is unsure. It feels like were in a never-ending cat-and-mouse game between human evolution and technology and science, he says, and I think as long as there are billions of dollars in professional sports, human nature is always going to try to find an advantage.

Read more here:
Netflix documentary shows the depths of Russia's doping regime - New York Post

PayThink Innovation can take tokenization beyond simple encryption – PaymentsSource

Tokenization is the security process that most recently unlocked the mobile payments market, but the concept can be expanded.

All the major "OEM Pays" (Apple Pay, Samsung Pay etc.,) use the technology to secure the transmission of payment data between device and terminal. The process itself however, of replacing sensitive data with unique identifiers which retain the essential information but dont compromise security, can, in theory, be applied to any kind of transaction, from bank details, to health records, ID numbers, even to the idea of money itself.

The central idea is this: when tokenized, unlawfully intercepted payment authorization data is rendered valueless because it simply isnt there; it is replaced by a token. This means the data can, in effect, hide in plain sight.

A "smart" token takes this idea a step further. Its a regular token on steroids. It transmits the value and all the information needed to authorize the transaction together, in one go, including enhanced counterpart identity, transaction and invoicing data.

It consists of three layers: an asset, a set of rules, and a state. Lets break it down.

An asset is the source of value. Think of it as the "center" of the smart token. Typically, its a bank account, such as your current or savings account.

Surrounding this asset are a number of rules. These rules, which can be programmed by the issuer, dictate who can access the asset, at what time, for what purpose and under what set of circumstances.

Imagine youre buying a TV from Amazon. When you hit buy, your bank sends a smart token to Amazon which has the following rules: a 1000 payment limit and a two-week expiry date. In another transaction, the smart token issued in relation to the same asset (your bank account) could have completely different rules. If youre buying a series of weekly Pilates classes, the token may have a six-month duration, enabling your gym to regularly draw down on that token as each class takes place.

That is the great thing about rules. They are the flexible layer that allow smart tokens to create an almost infinite number of unique and secure digital payment types at a fraction of the cost of todays conventional payments infrastructure. Any existing payment method you can currently imagine, such as cash, credit card, cheques, and gift cards, can be emulated by a smart token, thanks to the rules. This is the flexibility that opens the door for banks.

Finally, a smart token has a state. This is the part of the token which tracks the value of the token according to its rules. After three months of Pilates classes, its the state that will record that 50% your payments have been made. The combination of asset, rules and state combine to provide banks with the power to tear up the rulebook and perform transactions faster and at a vastly reduced cost, without relying on third parties to validate the payment.

Marten Nelson is co-founder and vice president of marketing at Token.

Read more:
PayThink Innovation can take tokenization beyond simple encryption - PaymentsSource

Indonesia lifts threat to ban encrypted app Telegram – ABC News

The Indonesian government lifted its threat to ban the encrypted messaging app Telegram because it's taking steps to block "negative" content that includes forums for Islamic State group supporters. But it warned other sites could now face scrutiny.

Rudiantara, the Minister of Communications and Information Technology, who met Tuesday with Telegram co-founder Pavel Durov announced that "we have agreed to keep Telegram accessible."

Many other social media sites, messaging apps and file and video sharing systems are used Indonesia, he said, specifically mentioning Facebook and Google as platforms that could be scrutinized in the "near future."

Earlier this month, the ministry said it was preparing to shut down Telegram in Indonesia, where it has several million users, if it didn't develop procedures to block unlawful content including pro-Islamic State group discussion groups.

As a partial measure, it asked internet companies in the world's most populous Muslim nation to block access to 11 addresses offering the web version of Telegram. Durov apologized for failing to quickly respond to the Indonesian government's requests for apparent terror content to be blocked, blaming a miscommunication.

Rudiantara, who uses one name, said the ministry and Telegram will put in place standard operating procedures that improve the ability to "address the negative content in Telegram." The blocking measures against web Telegram could be lifted next week, he said.

Suspected militants arrested by Indonesian police have told authorities that they communicated with each other via Telegram and received orders and directions to carry out attacks through the app, including from Bahrun Naim, an Indonesian with the Islamic State group in Syria accused of orchestrating several attacks in the past 18 months.

Critics of the government's threat said it would make more sense to monitor the IS discussion groups for possible intelligence than banning the app.

Durov told reporters there would a line of direct communication between the ministry and top people in Telegram but also said he wouldn't have come to Indonesia if the government had made any requests that would require Telegram's encryption to be compromised.

"The basis of Telegram is a 100 percent promise of encryption. This is why our company exists," he said.

"We've discussed ways to block the public channels available for the propaganda of terrorism, which is something that we are committed to do globally, and particularly Indonesia," Durov said.

The free messaging service can be used as a smartphone app and on computers through a web interface or desktop messenger. Its strong encryption has contributed to its popularity with those concerned about privacy and secure communications in the digital era but also attracted militant groups and other criminal elements.

Durov said about 20,000 people sign up to use Telegram in Indonesia daily. It has at least 100 million users worldwide, a figure released by Telegram in February 2016.

See original here:
Indonesia lifts threat to ban encrypted app Telegram - ABC News

Software License Optimization: A Field Guide to Open Source … – Enterprise License Optimization Blog (blog)

By John Emmitt

Industry research shows that 95% of organizations use Open Source Software (OSS) in their mission critical applications. There are a number of reasons for this, including being able to develop applications faster and with higher quality. And, hey, its free, right? Last year (2016), there were 79 billion (with a 'B') downloads of OSS components!

At the same time, most organizations have no idea how much open source code they are actually using. In fact, the data says that organizations typically are aware of less than 10% of the open source software they are using.

For enterprises that are developing applications for internal use, OSS represents a potential security risk-- there are software vulnerabilities in many OSS components. Well known OSS exploits include Heartbleed, Ghost and Shellshock. How many of those 79 billion downloads had more than 1 software vulnerability? 1 out of every 16. That's more than 4.9 billion OSS components.

What can you do about this?

Many companies do the following to manage open source software use:

There is also license compliance risk when using OSS, particularly for companies that are developing applications for sale or use outside of their own organization. Depending on the open source license being used for a given OSS component, there are different requirements, including, in some cases, the requirement to release your source code to the public. This is the case for the GPL v2 and GPL v3 licenses, for example.

Here is a handy field guide to OSS licensing:

We have also put together a checklist for open source software license compliance:

You can download a copy of this field guide and compliance checklisthere.

To learn more about Flexera's FlexNet Code Insight product, please visit our website.

You might also be interested in our on-demand Webinar: The State of Open Source Software (OSS): 2016 Year in Review.

Here is the original post:
Software License Optimization: A Field Guide to Open Source ... - Enterprise License Optimization Blog (blog)

The Bitcoin Cash vs Bitcoin Battle Is Heating UpAnd That’s a Good Thing – Fortune

I am utterly fascinated by the recent, furious emergence of Bitcoin Cash.

For the unfamiliar, its a so-called fork of the original Bitcoin cryptocurrency that launched earlier this week and sent crypto-investors into a tizzy , trading the virtual coins up to hundreds of dollars each. At the time of this writing, one unit of Bitcoin Cash is valued at about $425an impressive sum for something thats existed for all of two and a half days.

Like a world religion, Bitcoin Cash was created from conflicta rift in the original Bitcoin community over technical details pertaining to the structure of the digital currencys underlying technology, the blockchain. And like a religion, the Bitcoin Cash splinter faction was immediately rejected by the establishmentin this case by Coinbase, the largest Bitcoin exchange on the planet.

You can almost picture a Bitcoin Cash enthusiastcall him Martin Lutherposting his 95-point screed to a cryptocurrency message board. Out of love for the truth and from desire to profit from it! he writes with zeal, punctuating the sentiment with a GIF of Aziz Ansari as the Parks and Recreation character Tom Haverford making it rain.

Bitcoin Cashs emergence hasnt eroded support for the original Bitcoin. Indeed, one Bitcoin is worth about $2,760 at the moment, more than its value a week and a month ago. Investors and technologists alike sense opportunity in the schism. (Look no further than the Chicago Board Options Exchange, which plans to launch its own bitcoin derivatives trading products next year, and the rabid interest in initial coin offerings , or ICOs.) Cryptocurrency, long the domain of hustlers and dealers, is growing into a legitimate enterprise. The original Bitcoin, launched in 2009, was merely the first chapter.

To which digital currency denomination will you be faithful? For me, its still far too early to tellbut Ive never been an early adopter of technology. A reformation is clearly underway in the crypto-community. Which doctrine(s) win out, well, thats up to you to decide.

This essay originated in Fortune's Data Sheet newsletter. Subscribe here .

Continue reading here:
The Bitcoin Cash vs Bitcoin Battle Is Heating UpAnd That's a Good Thing - Fortune