{"id":32109,"date":"2017-06-12T13:41:45","date_gmt":"2017-06-12T17:41:45","guid":{"rendered":"http:\/\/www.opensource.im\/uncategorized\/turnbull-govt-wants-to-force-companies-to-break-encryption-itnews.php"},"modified":"2017-06-12T13:41:45","modified_gmt":"2017-06-12T17:41:45","slug":"turnbull-govt-wants-to-force-companies-to-break-encryption-itnews","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/encryption\/turnbull-govt-wants-to-force-companies-to-break-encryption-itnews.php","title":{"rendered":"Turnbull govt wants to force companies to break encryption &#8211; iTnews"},"content":{"rendered":"<p><p>    The Australian government wants to introduce laws that would    force technology companies to ensure their systems are capable    of decrypting communications.  <\/p>\n<p>    The plan is a response to the use of encrypted communications    channels by terrorists, and follows in the footsteps of the    United Kingdom's moves to force communications operators to    make sure they canhand over encrypted messages to law    enforcement agencies.  <\/p>\n<p>    The UK's new 'technology capability notices' were proposed    following the Westminster terrorist attack. They impose    obligations on operators of communications services to ensure    they are technically able to hand over decrypted data in \"near    real time\" to the government.  <\/p>\n<p>    The Australian government over the weekend revealed its    intention to pursue a similar path, but is yet to work out much    of the detail of its plans.  <\/p>\n<p>    Attorney-General George Brandis specifically called out the    UK's technical capability notices when revealing the    government's plan to \"lift the legal obligations on device    makers and social media companies to co-operate with    authorities in decrypting communications\".  <\/p>\n<p>    He said current Commonwealth legislation 'doesn't go far    enough' to impose obligations of \"co-operation\" on technology    companies.  <\/p>\n<p>    \"Now I should also say of course, that in the first instance    the best way to approach this is to solicit the cooperation of    companies like Apple and Facebook and Google, and so on, and I    think there has been a change of the culture in the last year    or more,\" Brandis said.  <\/p>\n<p>    \"There is a much greater conscious proactive willingness on the    part of the companies to be cooperative but we need the legal    sanction as well.\"  <\/p>\n<p>    He insisted the government had no intention of forcing    technology companies to introduce backdoors in their products.  <\/p>\n<p>    \"A technical capability notice ... subject to tests of    reasonableness and proportionality, imposes upon them a greater    obligation to work with authorities where a notice is given to    them to assist in breaking a communication,\" Brandis told    Sky News.  <\/p>\n<p>    \"So thats not backdooring.\"  <\/p>\n<p>    But it is unclear how the government expects technology    companies to break encryption.  <\/p>\n<p>    The UK's new laws have been fiercely criticised as being vague    and giving communications providers no option but to build    backdoors into their systems.  <\/p>\n<p>    End-to-end encryption prevents the operators of Signal,    WhatsApp, Telegram and Apple's iMessage, among others, from    being able to simply hand over messages: the keys to decrypt    the information are held by those involved in the    communication.  <\/p>\n<p>    Because of this some have taken the UK law as an attempt by the    government tooutlaw end-to-end encryption.The UK    government has avoided answering questions on the matter.  <\/p>\n<p>    Brandis suggested to the Sydney Morning Heraldthat one    option would be to \"improve warrant-based access ... at the    sender or receiver ends\". However, this can largely only be    achieved through compromise of an end user device, or the    application.  <\/p>\n<p>    \"At one point or more of that process, access to the encrypted    communication is essential for intelligence and law    enforcement,\" Brandis told the SMH.  <\/p>\n<p>    \"If there are encryption keys then those encryption keys have    to be put at the disposal of the authorities.\"  <\/p>\n<p>    Brandis said the details of the plan would be nutted out at the    Five Eyes conference in Canada in two weeks' time.  <\/p>\n<p>    He indicated the government had not yet decided whether    warrants would be needed to access decrypted information, but    again referenced the UK technical capability notice model.  <\/p>\n<p>    A notice works as a first step to \"prepare the ground\" in case an operator    receives an interception warrant, ensuring they have the    technical ability to comply. It does not, of itself, require an    operator to conduct an interception.  <\/p>\n<p>    \"Thats a discussion that we need to have,\" Brandis said.  <\/p>\n<p>    \"The point at which a power is only exercised under warrant as    opposed to a power that resides without the requirement for a    warrant in law enforcement and intelligence will always be a    part of this discussion and thats one of the issues that will    be on the table at Five Eyes in Ottawa in a fortnights time.\"  <\/p>\n<p>    He claimed Australians would not be concerned at the privacy    implications involved in the government's plan because the    \"Facebook generation ... put more and more of their own    personal data out there\".  <\/p>\n<p>    \"I think that there is an entirely different attitude of    privacy among young people than there was perhaps a generation    or two ago. And I think the social media companies are    regardful of that as well. So let the civil liberties point of    view be heard, let legitimate privacy considerations always be    had regard to,\" Brandis said.  <\/p>\n<p>    \"But I think where the community is at at the moment is to    prioritise their concern about giving law enforcement and    intelligence agencies the tools they need to thwart terrorism,    and everyone knows that the internet and cyberspace are    important vectors for terrorists.\"  <\/p>\n<p>    Privacy and civil liberties advocates have warned that moves to    decrypt communications would simply push terrorists onto other    technology platforms whilst having negative consequences for    financial transactions, online commerce, and security of    personal data.  <\/p>\n<p>    A UK public bills parliamentary committee    highlighted several technical issues with the legislation and    said it should include a specific threshold that recognises it    is unreasonable to hand over decrypted content from end-to-end    encrypted channels.  <\/p>\n<p>    \"The damage to security may be done as soon    as a company finds itself having to comply with such a notice    and install a back door, whether or not it subsequently has to    provide data under warrant,\" the committee    said.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>More here:<br \/>\n<a target=\"_blank\" href=\"https:\/\/www.itnews.com.au\/news\/turnbull-govt-wants-to-force-companies-to-break-encryption-464861\" title=\"Turnbull govt wants to force companies to break encryption - iTnews\">Turnbull govt wants to force companies to break encryption - iTnews<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> The Australian government wants to introduce laws that would force technology companies to ensure their systems are capable of decrypting communications. <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[45],"tags":[],"class_list":["post-32109","post","type-post","status-publish","format-standard","hentry","category-encryption"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/32109"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=32109"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/32109\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=32109"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=32109"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=32109"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}