Five Eyes Surveillance Agencies Say Encryption Is Good, Except When It Keeps Them From Looking At Stuff
from the shorter-Five-Eyes:-we-like-encryption-that-doesn't-work dept
The Five Eyes nations -- UK, US, Australia, Canada, and New Zealand -- still think there's a way to create encryption backdoors (that they studiously avoid calling backdoors) that will let the good people in and the bad people out.
The backlash against government calls for backdoors has made these demands a bit more subdued in most Five Eyes countries. The UK government really doesn't seem to care and uses every terrorist attack as another reason to prevent law-abiding citizens from using secure encryption for their communications. Others members have taken a more measured approach, talking around the subject while legislative inroads continue unabated.
In the US, the periodic "going dark" discussions have taken on a (no pun intended) darkly comical tone as FBI and DOJ officials continue to claim harder nerding with solve the "problem" it has misrepresented for years.
The countries may be taking different approaches to undermining encryption, but they're all still looking to do this in the future if they can just find a way to sell it to the public without the actual nerds speaking up and ruining all their plans. The Register notes the Five Eyes surveillance partnership has delivered another ultimatum (that it won't call an ultimatum) about encrypted communications following a meeting in Australia. But it is taking care to couch its wants and desires in pretty words about the safety and security of the general public.
In an official communiqué on the confab, they claim that their inability to lawfully access encrypted content risks undermining democratic justice systems – and issue a veiled warning to industry.
The group is careful to avoid previous criticisms about their desire for backdoors and so-called magic thinking – saying that they have "no interest or intention to weaken encryption mechanisms" – and emphasise the importance of privacy laws.
But the thrust of a separate framework for their plans, the Statement of Principles on Access to Evidence and Encryption, will do little to persuade anyone that the agencies have changed their opinions.
"Privacy laws must prevent arbitrary or unlawful interference, but privacy is not absolute," the document stated.
And there it is. The only thing Five Eyes considers "absolute" is its supposed "right" to access contents of devices and communications. First, the confab talks about "mutual" cooperation, as though the tech industry is being unnecessarily resistant to undermining protections it provides to users. Five Eyes may not have the strength of conviction to actually demand encryption backdoors, but the wording here indicates what it wants is pretty much just a backdoor.
Providers of information and communications technology and services - carriers, device manufacturers or over-the-top service providers -– are subject to the law, which can include requirements to assist authorities to lawfully access data, including the content of communications. Safe and secure communities benefit citizens and the companies that operate within them.
This means key escrow or having encryption removed during transit so service providers can access contents of communications. Nothing about either plan makes users safer or less accessible to malicious parties not associated with the Five Eyes partnership.
The next section's headline makes it clear who's going to be answering to who:
Rule of law and due process are paramount
In other words, if you've got a warrant, I guess you're gonna come in I'll let you in. This appeal to authority says providers must subject themselves to pestering governments, even if it means harming their entire userbase just so the government can go after a few users. The nod to due process really means nothing, what with indefinite gag orders accompanying demands for communications and data, and an ongoing refusal by government agencies to discuss surveillance means and methods in open court. As long as parallel construction is still a thing, due process will never be given the respect it deserves.
So, Five Eyes may be trying to make it sound like the countries agree encryption is a valuable protection for its collective citizens, but what it really wants is the protection to be weakened to the point law enforcement -- and anyone else not governed by the rule of law -- can access it at will. No one's saying "backdoor," but they're all thinking it very loudly.
Thank you for reading this Techdirt post. With so many things competing for everyone’s attention these days, we really appreciate you giving us your time. We work hard every day to put quality content out there for our community.
Techdirt is one of the few remaining truly independent media outlets. We do not have a giant corporation behind us, and we rely heavily on our community to support us, in an age when advertisers are increasingly uninterested in sponsoring small, independent sites — especially a site like ours that is unwilling to pull punches in its reporting and analysis.
While other websites have resorted to paywalls, registration requirements, and increasingly annoying/intrusive advertising, we have always kept Techdirt open and available to anyone. But in order to continue doing so, we need your support. We offer a variety of ways for our readers to support us, from direct donations to special subscriptions and cool merchandise — and every little bit helps. Thank you.
–The Techdirt Team
Filed Under: backdoors, encryption, five eyes, surveillance
Reader Comments
Subscribe: RSS
View by: Time | Thread
Opportunities
[ link to this | view in chronology ]
Code Books
I see no reason all books should be completely outlawed, and if you wish to read a book, you must go to the library where a member of the police will make sure you aren't reading between the lines.
[ link to this | view in chronology ]
Five countries, five eyes.
They must be half blind to come up with proposals like this.
[ link to this | view in chronology ]
Re: Five countries, five eyes.
[ link to this | view in chronology ]
Re: Re: Five countries, five eyes.
Right off a cliff, yeah.
[ link to this | view in chronology ]
Re: Five countries, five eyes.
[ link to this | view in chronology ]
Zombie one-pager Alasdair Fox, 18 comments total since 2009!
Characteristic near 3 year gap after first comment, another gap near as long, and at best sparse.
That's your only interest in this piece! BRAINS! BRAINS!
Yet another Zombie to start the week! Words fail me, but HOOTS don't! HOOT, HOOT!
[ link to this | view in chronology ]
Re: Zombie one-pager Alasdair Fox, 18 comments total since 2009!
Even if this is proof of your worst nightmare ... what difference does it make to you?
[ link to this | view in chronology ]
Re: Re: Five countries, five eyes.
If only, if they were just stupid that could potentially be solved with enough education.
No, it would be a mistake to assume that they don't know what they're asking for. They know exactly what they are asking for and what it stands to do, they just don't care, whether that be because they're so focused on themselves and what they see as their job that it doesn't even cross their mind the massive negative impacts of others, or because they figure that the losses the public will be forced to make will be worth the gains they stand to make.
Sometimes assuming malice is the correct choice.
[ link to this | view in chronology ]
Why are the same people unnecessarily resistant to freedom of infomation laws, and reporting truthfully to government committees? It wouldn't be a case of privacy for us via secrecy laws, and no privacy for you because it makes it harder to do our jobs?
[ link to this | view in chronology ]
"Good" and "bad" are subjective. I think anyone trying to get into my data without my permission is a bad guy.
[ link to this | view in chronology ]
Re:
[ link to this | view in chronology ]
Re:
It's all subjective. Encryption, drugs, guns, politics, you name it. Regardless of how you paint the picture; Your talking about the removal of individual rights by the government, justified by the perceived safety to society as a whole.
Sit down, relax, you may feel a little pinch.... it's for your own good. :)
[ link to this | view in chronology ]
Re: Encryption, drugs, guns, politics, you name it.
Well, there is a big difference between encryption, which is a tool with lots of nonviolent, constructive uses (e.g. securing your online banking), and guns, which are purely destructive weapons.
[ link to this | view in chronology ]
Re: Re: Encryption, drugs, guns, politics, you name it.
Nice justification. Removal of individual rights knows no ideological bounds. Right, Left, Centrist, specific issues such as guns, drugs, or encryption... It's easy to create an argument that justifies taking away individual rights in protection of society as a whole, regardless of your political leanings. The Left will go after the guns, the Right abortion. The Irony is, they use the same argument "The protection of human life" to justify their position. I would argue the only thing were protecting in either case is; The status quo.
[ link to this | view in chronology ]
Re: Removal of individual rights knows no ideological bounds.
Funny you should say that, when the gun-rights advocates seem to want to ride roughshod all over your First Amendment just to safeguard their “right” to brandish dangerous weaponry in public.
[ link to this | view in chronology ]
Re: Re: Removal of individual rights knows no ideological bounds.
My point was; You get the hypocrisy on both sides. But with that aside; Taking away individual rights for safety or any other reason, regardless of where you stand politically, is a slippery slope. Doesn't matter what the topic is.
The Right; We love our guns, but violent video games are bad?
The Left; We hate guns, but we want the right to kill unborn children?
The Center; Do what you want, just don't tread on me?
In my opinion, All any of this shit does is keep people divided. I believe it's done on purpose, mainly to maintain the status quo.
[ link to this | view in chronology ]
Re: Re: Re: Removal of individual rights knows no ideological bounds.
When you begin with a blatantly false statement, only those already in your little box can be expected to believe you. Sad; especially when your wrap-up statement is 100% correct...
[ link to this | view in chronology ]
Re: Re: Re: Re: Removal of individual rights knows no ideological bounds.
I think your the one that needs to get their facts straight.
https://en.wikipedia.org/wiki/Gun_show_loophole
[ link to this | view in chronology ]
Gun Show Loophole
In California, some of the gun show loopholes are closed, and here in Cali, civilians aren't allowed magazines more than ten rounds.
But that means there are a lot of exchanges that occur privately, since an unregistered gun that is inherited or accidentally left by visiting family is not illegal (and a lot of weapon laws are very difficult to enforce.)
[ link to this | view in chronology ]
WhyWhyWhyWhyWhyWhy
As soon as these governments design their own back-doored encryption and make use of it for *ALL* of their own communications, firewalls, VPNs, etc, for at least 2 decades, then maybe, just maybe, we'll think about it.
Nah, nevermind, we never would.
But it would be hilarious to see how long their "backdoored" encryption lasted, probably about as long as game anti-pirating measures, perhaps even less.
Certainly the gaming industry and DVD-CSS and Blu-Ray encryption schemes are proof that any copy-protection / encryption with "back-doors" just won't work.
[ link to this | view in chronology ]
No matter how much the FBI, CIA, and friends hem and haw; regardless of how much legal hubris they might muster, the Truths of mathematics simply *will not* succumb to their threats.
I don't suppose we can say the same about Apple and others.
[ link to this | view in chronology ]
Re:
I hear this argument a lot and would like to address it. Mathematics isn't the issue. We already know how to make a mathematically-sound backdoor. That part is trivial.
The problem is the human element, i.e., we need to make sure only the "good guys" use it. Presently, we have no idea how to do that.
[ link to this | view in chronology ]
Re: Re:
And that would be what? Also, what does mathematically sound mean to you?
The whole back door thing is silly to begin with. Why bother with such obfuscation? Is it to make the user feel all cozy in their belief of data integrity? What is the advantage to a backdoor rather than simply using the front door? Anyone with the key has access ans anyone with access can modify.
Presently we have no idea ....
[ link to this | view in chronology ]
Re: Re:
What those people are saying is that in order to protect you and to solve crime, we will remove your privacy, while those we should be targeting can use illegal encryption to keep us out.
[ link to this | view in chronology ]
Re: Re:
Ad for making sure only the good guys have access to backdoors, the problem is even more fundamental: we don't even know how to define "the good guys."
[ link to this | view in chronology ]
Re: Re: Re:
It's not a mathematical solution, but it's mathematically sound. That is, we know how to encrypt our private keys so that only people with the government's private key can read them (or only someone with M of N keys). The problems with managing this master key are not mathematical in nature.
The Clipper Chip pretty much solved the mathematical problems. Its rejection should be read as a rejection of the very concept of key escrow. (One major mathematical "problem" was found: the escrowed key was protected by a 16-bit hash, so you could brute-force replace your escrowed key with random data. The encryption algorithm was a bit weak too, but it could be swapped out without changing the mathematics of the escrow.)
[ link to this | view in chronology ]
Re: Re: Re: Re:
This is exactly what I meant. "Mathematically sound" just means we know how to do math such that a key escrow system (for example) will correctly decrypt the cipher text. One example of a mathematically-sound encryption scheme that contains a backdoor is Dual_EC_DRBG.
[ link to this | view in chronology ]
Re: Re: Re: Re: Re:
[ link to this | view in chronology ]
Re: Re: Re: Re: Re: Re:
You'd think that that would be enough to drive the idea out of their heads, but sadly it doesn't even seem to phase them.
'Okay, say you get your totally-not-a-backdoor so that you can have 'lawful access'. Now what about that country over there that you don't particularly care for, what about the 'lawful access' they might want? It's not like the company you forced to grant you access will have any grounds to object when they demand the same. So, knowing that people you don't want access will almost certainly get it if you do, still willing to make (the public make) that sacrifice?'
[ link to this | view in chronology ]
Re: Re: Re: Re:
LOL - Say, I've got this bridge you may be interested in.
[ link to this | view in chronology ]
Re: Re: Re: Re: Re:
He's quite correct. He said "people with the government's private key". The problem is that the list of people with that key will not be confined to government for very long.
[ link to this | view in chronology ]
Re: Re: Re: Re: Re: Re:
[ link to this | view in chronology ]
sufficient time and resources
With some common encryption methods and a long enough key, that sufficient time could be in geological epochs for our best, fastest computer.
[ link to this | view in chronology ]
Re: Re: Re: Re: Re: Re: Re:
[ link to this | view in chronology ]
Re: Re: Re: Mathematically sound backdoors
As to how to make one, well, just encrypt the key according to your favorite backdoor algorithm along with the message.
For example: Let the message encryption key be Kmine. Let the gubmn't post their public encryption key PKgubmn't. Now encode Kmine with PKgubmn't. Now, if gubmn't needs to decrypt it, they simply decrypt the message key Kmine with PrivKgubmn't. It's mathematically sound (no key, no plaintext without *lots* of work), even if it is monumentally silly!
(Note that meanwhile, the gubmn't key has been stolen by the mafia, and they have *also* intercepted the message and acted on it.
[ link to this | view in chronology ]
Re: Re:
The issue when people discuss the truth or laws of mathematics is that inserting a second decryption vector significantly increases the threat of the Human Element. All key escrow and other schemes do is try to decrease the footprint of the second decryption vector.
If your house had two locks, and unlocking one lock would unlock the house, and the key to the second lock not in your control but publicly known to be held by a third party, that should be immediately concerning, because the physics of the lock mean that it doesn't matter who holds the key. No matter how many security mechanisms the third party says it has, they have a bunch of keys, or a master key, and therefore is a high profile target. Its a physics problem - the lock can't tell between good guys and bad guys, just if it has the right key. Adding that second lock will, by the laws of physics, weaken your home's security.
In the same way, adding that encryption backdoor will, mathematically, weaken the encryption. Even without the key, the theif has two locks to try to pick, not just one.
[ link to this | view in chronology ]
Re: Re: Re:
They are probably working on this right now, dreaming up scenarios in which this, in their minds, could be a solution to the problem they just created.
[ link to this | view in chronology ]
The ultimate target, with endless people aiming at it
No matter how many security mechanisms the third party says it has, they have a bunch of keys, or a master key, and therefore is a high profile target.
Not 'a' high profile target, the high profile target. If it's known that there exists a key that would allow you to bypass all of the encryption in a country thanks to it being mandatory that would be the #1 target of every group that could either use or sell that, such that no-amount of security would keep it safe.
Given the immense value something like that would have there would be nearly countless government and criminal agencies that would be willing to spare no expense in attaining it, such that if the security protecting it lasted a month I'd be highly surprised, and once it's out in the wild suddenly you'd have an entire county's security compromised, rather than individual devices and builds as it is now.
[ link to this | view in chronology ]
Re: Re:
The other side of that is to make sure the "bad guys" use the backdoored programs.
[ link to this | view in chronology ]
Re: Re: Re:
How is this accomplished?
[ link to this | view in chronology ]
Re: Re: Re: Re:
It would have to be done with laws. "Bad guys" won't follow those; but if they're using commercial software, and it contains mandatory backdoors, that's likely to trap the dumber ones. Of course, the mathematics of secure cryptography are well known and aren't going to disappear (nevermind "black-market" software and foreign imports), so the smarter criminals will always have secure communication.
[ link to this | view in chronology ]
Re: Re: Re: Re: Re:
The dumb crooks end up in prison,
the smart crooks end up in politics and/or big business.
[ link to this | view in chronology ]
Re: Re: Re: Re: Re: Re:
... and tell us they have a right to keep secrets from us, and they need non-backdoored crypto to do it.
[ link to this | view in chronology ]
Re: Re: Re: Re:
Easy, get them to use an Intel processor.
[ link to this | view in chronology ]
Except that there are no good guys with decryption.
I think they will need a very public demonstration of their amazing breakthru, a proof of concept, before forcing anyone to actually use it. But, of course, such logic will not be given any consideration because that might cause examination of their new draconian method of intimidation.
[ link to this | view in chronology ]
Re:
I think they will need a very public demonstration of their amazing breakthru, a proof of concept, before forcing anyone to actually use it
Before they have that "amazing breakthru" I think they might have better luck finding a unicorn.
[ link to this | view in chronology ]
Re: Re:
[ link to this | view in chronology ]
Re: Re: Re:
[ link to this | view in chronology ]
Re:
I wouldn't say that. Encryption isn't much good without decryption at some point.
[ link to this | view in chronology ]
Why is that a valid argument in the first place? Just because they get *some* of the data; we may as well ship the rest of our 1s and 0s en masse to the agents too?
[ link to this | view in chronology ]
Re:
[ link to this | view in chronology ]
Re:
Things worked in the past but that means that all their sources and methods have been exposed and are no longer useful. This new technique means they can sit in their cushy offices, get the bad guy (aka anyone they deem bad, evidence or no and that includes people they just don't like), and have coffee all at the same time.
[ link to this | view in chronology ]
Re: Re:
Encryption is an extension of privacy, a right guaranteed in the USA. That right to privacy itself has holes where investigation is required, via warrant for example. LE's problem now is that even a warrant can't help you break strong crypto. What they're asking for sounds reasonable when stated in this way.
However, the same nerds they're asking (nay, demanding) "nerd harder" can quickly tell them that the ask is not possible without killing encryption entirely. It seems to me that LE needs to "enforce harder" and find alternatives to breaking encryption. They shouldn't be asking us to make their jobs easier but rather escalate their skillsets to match the modern world. Today's encryption will not be the last hurdle for them to have to surmount and they need to prepare themselves for the future.
[ link to this | view in chronology ]
Re: Re: Re:
[ link to this | view in chronology ]
*sigh*
Something that I think of every so often when this topic comes up (which never happens). Authorities do NOT actually have the right to access information (which is an abstract thing) they ONLY have the right to seize physical 'evidence'.
If the last scholar of a dead language writes something in said language, and then dies, does the government have the authority to compel reality to translate it to English (HINT: the answer is 'no').
[ link to this | view in chronology ]
A distinction that's moot when they're jailing people who refuse to decrypt the seized evidence.
[ link to this | view in chronology ]
Privaacy??
What a wonderful idea..For all those in Jail for Sharing secrets or reporting Corp Crimes...I Salute you..
Its entertained me that a person in the military, Ha access to a radio channel that was Unencrypted, and Copied the data/information that was being sent back and forth, between nations..
NON-ENCRYPTED CHANNEL, that anyone could listen to..And this person gets put into jail(??)..
[ link to this | view in chronology ]
Governments who spy on dissidents and human rights lawyers .
It seems to change from day to day.
Agencys who have been shown to be willing to break the law and spy on us citizens the and western allies.Like merkel.
The world financial markets and banking system
depend on strong encryption .
Look at all the info private companys can get from
facebook,social networks, advertising networks
without breaking encryption.
Are the nsa not already using various tools and vunerability,s that hackers
use to hack into credit agencys etc
already.
Many private companys hardly seem to use even basic precautions for protecting user data .
The eu regulators are not perfect but they at least
brought in laws to protect user privacy
and encourage private companys to secure private user data.
[ link to this | view in chronology ]
Steganographic encryption
First on Uriel's list of points to bring up whenever our intelligence / law enforcement agencies start yearning for backdoors and forced decryption mandates:
Diligent criminals by which I mean most businesses will simply resort to encryption with stenographic properties which already exists in multiple commercial offerings. Data can be encrypted to look like unused disk sectors, and encryption blocks can be formatted with multiple catalogs, so that different passwords open:
~ The clean, nothing-here-but-business-expenses accounts
~ The dirty slush funds for big bribes accounts
~ A whole bunch of child porn
~ A whole bunch of balloon porn
Each without revealing that any of the other data exists.
This segways into the second point on Uriel's list, that any random, unformatted memory might be encrypted data, and any encrypted data may have multiple directories.
This can be used by prosecution in the US to pressure courts to force a guy to use the other password (and the other other password, and the other other other password) until he refuses to do so (id est no further directories exist) in order to get him incarcerated (for fourteen-plus years) for contempt.
Considering how they're misused, I already have contempt for US courts.
[ link to this | view in chronology ]
Re: Steganographic encryption
At least the important stuff.
Then turns on everything..
[ link to this | view in chronology ]
Duh! You answered your own question!
If the encryption is used to protect commercial information, then it has to stand up to the full might of the Chinese, Russian, Iranian, etc., intelligence agencies.
If the encryption is used to protect government information, ditto.
So the 5 Ayes think that commercial & government information needs to be put at risk, so that we can catch a drug user or two?
Only a few nanometers protect the information in the cellphone in your pocket from the Chinese, Russians, Iranians, etc. That protection has to be robust to keep those Chinese, Russians, Iranians, & cybercriminals from hacking your phone, screwing with the battery charging code, and blowing up your private parts.
(Five Eyes quickly grab their cellphones from their pockets and hurl them as far as possible!)
[ link to this | view in chronology ]
Free Unicorns that Poop Golden Eggs
Rule of law and due process are paramount
Any person believing that these Five-Eye governments care one iota about Rule of law and due process is entitled to a free unicorn that poops gold eggs.
The Five-Eyes global surveillance program is used for stealing industrial secrets, blackmail, insider stock trading tips and keeping tabs on your political opponents.
In nations that supposedly adhere to the limitations (ie Rule of law) placed upon their respective governments the term National Security Exemption, which is most often used to hide government malfeasance/misfeasance/non-feasance, would be relegated to the dustbin of history.
It is all very simple:
Private citizen means private communications unfettered by government snoops.
Public servant means transparent communications available for all to read/hear/watch.
Alas, we live in a world run by lunatics, thieves, murderers, torturers and moral busy bodies of every shape and size and the only way this will ever change is one individual person at a time realizing the great big shit sandwich we have been collectively biting into is really a great big shit sandwich.
[ link to this | view in chronology ]
This seems relevant to the hobbled-crypto convo
A recent Cracked article brings up the ban of Arabic numerals in Florence, Italy circa 1299CE for fear they'd be too useful to fraudsters and embezzlers. Theny only caught on throughput Europe in the 1500s.
Math is a dangerous disrupting technology.
[ link to this | view in chronology ]