{"id":32108,"date":"2017-06-12T13:41:41","date_gmt":"2017-06-12T17:41:41","guid":{"rendered":"http:\/\/www.opensource.im\/uncategorized\/terrorists-are-using-encryption-our-laws-need-to-keep-up-with-the-technology-the-sydney-morning-herald.php"},"modified":"2017-06-12T13:41:41","modified_gmt":"2017-06-12T17:41:41","slug":"terrorists-are-using-encryption-our-laws-need-to-keep-up-with-the-technology-the-sydney-morning-herald","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/encryption\/terrorists-are-using-encryption-our-laws-need-to-keep-up-with-the-technology-the-sydney-morning-herald.php","title":{"rendered":"Terrorists are using encryption. Our laws need to keep up with the technology &#8211; The Sydney Morning Herald"},"content":{"rendered":"<p><p>    As we learn details from investigations into recent terrorist    attacks in Tehran, London, Jakarta and Manchester, a common    theme is emerging of terrorists using commercial encrypted    communications services to plan, support and commit terrorist    attacks.  <\/p>\n<p>    In Australia, the heads of ASIO and the Australian Federal    Police have warned of the challenges of \"going blind\" in their    attempts to lawfully keep up with criminal use of rapidly    evolving communications technology - a sentiment echoed by    their \"five eyes\" intelligence-sharing partners in the United    States, UK, Canada and New Zealand.  <\/p>\n<p>    The answer isn't just in keeping up with technical intrusion    methodologies  the modern-day equivalent of wire tapping. This    will, of course, always continue to play a part for    intelligence agencies. But encrypted communications bring    challenges and unintended consequences on another scale from    these previous technical interceptions.  <\/p>\n<p>    The recent \"Wannacry\" ransomware attack demonstrates the    hazards of the back-door approach: information on technical    vulnerabilities, first identified by western intelligence    agencies, wasobtained by others and used for criminal    purposes - harming both public services and business.  <\/p>\n<p>    Concerns about privacy are another reason to rethink how we go    about dealing with this challenge.  <\/p>\n<p>    In an age where most freely give much of their personal    information to global corporations, the paradox of public    demands for privacy from government is well known. But it is    incumbent on governments in liberal democracies to protect    human rights and privacy, in balance with the public interest.  <\/p>\n<p>    The importance of secure and confidential communication to    support a free press is also critical for legitimate    governments. This sets a high benchmark for balancing privacy    with the complex and global challenge that encrypted    communications poses to security.  <\/p>\n<p>        Get the latest news and updates emailed straight to your        inbox.      <\/p>\n<p>    We must be focused on the principles, not the technology.    Communications have evolved substantially from the phone, fax    and telegraph technology of the time when much of Australia's    existing telecommunications security legislation was    introduced. But the principles remain the same.  <\/p>\n<p>    Where an individual or group is using any form of    communications to support terrorism or other designated    criminal activity, this may be intercepted by specified    authorities and under appropriate authority.  <\/p>\n<p>    For Australia and the \"five eyes\" community in particular - and    other liberal democracies - this means that both our laws and    practices need to be updated to work in partnership with the    communications sector to ensure access when needed to prevent    and prosecute criminal activities, including terrorism.  <\/p>\n<p>    Just as the telecommunications sector already works closely    with intelligence and law enforcement to access \"wires\" and    call data, so the globalised communications sector is the key    to dealing effectively with terrorist use of current and    evolving communications and data technology.  <\/p>\n<p>    This means that these companies - whether headquartered in    Australia or overseas - must maintain visibility and access to    the service they are providing.  <\/p>\n<p>    Most businesses understand their shared responsibility for    security - including corporate responsibilities to not    facilitate crime - they just need to be involved as partners    with government in working out how to best do this. This is    where a multilateral approach is key: few of the major business    players are Australian.  <\/p>\n<p>    The laws regulating access to communications data would be, in    principle, the same as those currently in place for other forms    of telecommunications intercepts: companies ensuring data is    available to access if required, warrants being issued by the    appropriate authority such as the Attorney-General, with both    time limits and regular scrutiny and review through the    Inspector-General of Intelligence and Security, the Independent    National Security Legislation Monitor, parliamentary committees    and others.  <\/p>\n<p>    Encrypted communications are yet another valuable innovation    for our society and our economy. As our technology evolves, our    policies, practices and laws need to evolve with them.  <\/p>\n<p>    Jacinta Carroll ishead of the Australian    Strategic Policy Institute's Counter-Terrorism Policy    Centreand a former national security official in the    federal government.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Go here to read the rest:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.smh.com.au\/federal-politics\/political-opinion\/terrorists-are-using-encryption-our-laws-need-to-keep-up-with-the-technology-20170610-gwotyg.html\" title=\"Terrorists are using encryption. Our laws need to keep up with the technology - The Sydney Morning Herald\">Terrorists are using encryption. Our laws need to keep up with the technology - The Sydney Morning Herald<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> As we learn details from investigations into recent terrorist attacks in Tehran, London, Jakarta and Manchester, a common theme is emerging of terrorists using commercial encrypted communications services to plan, support and commit terrorist attacks. In Australia, the heads of ASIO and the Australian Federal Police have warned of the challenges of \"going blind\" in their attempts to lawfully keep up with criminal use of rapidly evolving communications technology - a sentiment echoed by their \"five eyes\" intelligence-sharing partners in the United States, UK, Canada and New Zealand. The answer isn't just in keeping up with technical intrusion methodologies the modern-day equivalent of wire tapping. <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[45],"tags":[],"class_list":["post-32108","post","type-post","status-publish","format-standard","hentry","category-encryption"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/32108"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=32108"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/32108\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=32108"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=32108"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=32108"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}