Government efforts to access private communications are nothing new. In decades past, such attempts at prying were often justified on national security grounds.
However, policymakers today point to child safety and disinformation as reasons to limit privacy protections. Established democracies are often leading this charge, inadvertently paving the way for the world’s autocrats.
Yet people around the world are not taking these policies lying down. They speak out, using events such as Global Encryption Day to highlight the importance of privacy and security, not just for themselves, but for their communities and societies.
As vociferous opposition continues to stymie government efforts to expand surveillance powers, it has become clear that public pressure works.
Encryption, which scrambles digital data so that it can be read only by someone with the means to decode it, has become ubiquitous, because it keeps information confidential and secure while authenticating the identity of the person with whom one is communicating.
Today, billions of people use encryption to send digital messages and e-mails, transfer money, load Web sites and protect their data. The gold standard in security is “end-to-end” encryption (E2EE), as only the participants have access to the data — not even the service provider can decipher it.
Despite its immense value and global appeal, encryption is under threat worldwide. It is used by law-abiding citizens to protect themselves, but also by bad actors to hide their malicious activities. For this reason, law enforcement authorities oppose encryption designs, especially E2EE, that prevent them from accessing data.
Yet even after decades of research, there is still no known way to grant law enforcement access without undermining encryption’s privacy and security features. The makers of encrypted devices and services have therefore resisted calls to build in “backdoor” government access, which would make all of their users more vulnerable.
The harmful online activities that concern police do not happen only in encrypted spaces. Hate speech, disinformation and other objectionable content remain a pernicious problem on social-media platforms and other sites, motivating a worldwide legislative push to force tech companies to improve their services.
For example, the British Parliament recently passed the Online Safety Bill after several turbulent years during which pressure from civil society changed its scope significantly. The final version focuses mainly on the removal of illegal content and mitigating risks to children.
Yet the bill still has serious flaws. For example, Parliament failed to include language safeguarding encryption. Moreover, the law gives the British Office of Communications (Ofcom), which regulates information exchange, the authority to compel social media platforms and messaging services to mass scan their users’ files and communications for evidence of child sexual abuse.
No one contests that fighting child exploitation is immensely important, but Ofcom’s power covers E2EE messaging services, which by definition cannot be accessed by service providers. Thus, the only way these services could comply with an Ofcom order is by making fundamental changes to their encryption design.
In other words, the bill gives Ofcom the power to force service providers to undermine their own encryption. Apple, Meta and Signal have all promised to pull their E2EE apps from the UK rather than comply with any government order to diminish their users’ privacy and security.
In response, Ofcom has publicly vowed not to use its new authority, at least for now.
It did so with good reason: Important bodies have concluded that scanning technologies are not sufficiently accurate, would limit fundamental rights and would likely fail the proportionality test — the disadvantages would outweigh the advantages.
Furthermore, criminals could easily circumvent these controls by encrypting content using a separate application. Ofcom would be wise to tread carefully, lest it risk the privacy and security of Internet users for the sake of unproven and potentially ineffective technologies.
Ofcom’s (supposed) forbearance recalls Australian authorities’ conduct since the passage of a contentious 2018 law granting new governmental powers to compel communications providers to add backdoor access to their products. Civil society and cybersecurity experts raised alarms about the law’s dangers for privacy and security, and legislators said the bill was flawed, but it passed anyway.
Five years later, not a single compulsory notice has been issued. This might reflect a deliberate choice: Exercising such a power risks political blowback. Wield the sword too enthusiastically and it might be taken away; better to keep it sheathed in favor of other, less controversial tools.
Then again, government forbearance might also indicate that the controversial new power was unnecessary in the first place.
Public scrutiny of government powers keeps them in check. That is how a democracy is meant to work. In promising not to use its new tool, Ofcom appears to have grasped that the government’s legitimacy is at stake.
However, as the UK bill inspires similar legislation in other countries, some of which are less democratic and have a track record of weaponizing digital technologies against their citizens, this nuance is likely to be lost.
The first test will come in the EU, where legislators are fighting over a draft regulation to expand tech companies’ child safety obligations. Like the British bill, the proposed Child Sex Abuse Regulation (CSAR) has already gone through numerous revisions, as member states lock horns over protecting E2EE.
Derisively called “chat control,” the draft CSAR has been widely decried for potentially forcing European service providers to scan all public and private communications, which would amount to an illegal general monitoring obligation.
Recent reporting stoked these concerns by revealing that the European Union Agency for Law Enforcement Cooperation, requested unlimited access to and use of the data produced beyond the purposes identified in the regulation; it appears to have no intention of restraining itself.
Continued public pressure is necessary to push for reform of “the most criticized draft EU law of all time.”
If government surveillance is a concern in an established democratic entity such as the EU, what hope is there for beleaguered democracies such as Turkey, India and Brazil, much less autocracies?
Fortunately, the public movement in support of encryption is growing, with advocacy groups such as the Global Encryption Coalition leading the charge.
By engaging with civil society, technologists and the public, governments can design regulations that respect privacy, data security and freedom of expression while helping to protect users from harm. Doing so is the only way to make sure that the Internet works for everyone.
Riana Pfefferkorn is a research scholar at the Stanford Internet Observatory. Callum Voge is sirector of Government Affairs and Advocacy at the Internet Society.
Copyright: Project Syndicate
A return to power for former US president Donald Trump would pose grave risks to Taiwan’s security, autonomy and the broader stability of the Indo-Pacific region. The stakes have never been higher as China aggressively escalates its pressure on Taiwan, deploying economic, military and psychological tactics aimed at subjugating the nation under Beijing’s control. The US has long acted as Taiwan’s foremost security partner, a bulwark against Chinese expansionism in the region. However, a second Trump presidency could upend decades of US commitments, introducing unpredictability that could embolden Beijing and severely compromise Taiwan’s position. While president, Trump’s foreign policy reflected a transactional
Chinese President Xi Jinping (習近平) has prioritized modernizing the Chinese People’s Liberation Army (PLA) to rival the US military, with many experts believing he would not act on Taiwan until the PLA is fully prepared to confront US forces. At the Chinese Communist Party’s 20th Party Congress in 2022, Xi emphasized accelerating this modernization, setting 2027 — the PLA’s centennial — as the new target, replacing the previous 2035 goal. US intelligence agencies said that Xi has directed the PLA to be ready for a potential invasion of Taiwan by 2027, although no decision on launching an attack had been made. Whether
A chip made by Taiwan Semiconductor Manufacturing Co (TSMC) was found on a Huawei Technologies Co artificial intelligence (AI) processor, indicating a possible breach of US export restrictions that have been in place since 2019 on sensitive tech to the Chinese firm and others. The incident has triggered significant concern in the IT industry, as it appears that proxy buyers are acting on behalf of restricted Chinese companies to bypass the US rules, which are intended to protect its national security. Canada-based research firm TechInsights conducted a die analysis of the Huawei Ascend 910B AI Trainer, releasing its findings on Oct.
In honor of President Jimmy Carter’s 100th birthday, my longtime friend and colleague John Tkacik wrote an excellent op-ed reassessing Carter’s derecognition of Taipei. But I would like to add my own thoughts on this often-misunderstood president. During Carter’s single term as president of the United States from 1977 to 1981, despite numerous foreign policy and domestic challenges, he is widely recognized for brokering the historic 1978 Camp David Accords that ended the state of war between Egypt and Israel after more than three decades of hostilities. It is considered one of the most significant diplomatic achievements of the 20th century.