Text extracted via OCR from the original document. May contain errors from the scanning process.
THE ROLE OF
IN
AUSTRALIA
I I I
A MEMORANDUM
-
JANUARY 2018 -
The authors of this document are Lizzie O’Shea and
Elise Thomas, with support from Access Now and
assistance by Nathan White, Amie Stepanovich, and
the Access Now Policy Team.
Access Now defends and extends the digital rights of users at risk around
the world. By combining innovative policy, global advocacy, and direct
technical support, we fight for open and secure communications for all.
For more information, visit https://www.accessnow.org
ENCRYPTION IN AUSTR ALIA Executive Summary
U Encryption is essential to Australia’s modern
digital society, economy, and cyber security,
and it is only effective if it is strong and robust.
U Strong encryption serves Australia’s national
interests by protecting governments,
communities, and the economy from criminal,
terrorist, and state-sponsored attacks.
U Encryption will only become more important for
protecting Australian interests as technology
advances in the coming decades.
U The government is proposing to weaken encryption
in the name of fighting terrorism, however this policy
would create more security risks than it addresses.
U There are other policy options for dealing with
terrorist use of digital technology that are more
urgent and effective than weakening encryption.
3
ENCRYPTION IN AUSTRALIA Background to the Current Debate About Encryption
Encryption is a method for ensuring communications
between two parties remain private from everyone else,
including the carrier. Even if an encrypted communication
is intercepted by a third party, it cannot be read by anyone
except the people who are authorised to decrypt it.
Encryption is a foundational tool for the proper functioning
of the digital society and economy, and is used in a wide
range of settings, including banking, public service
delivery, and communications systems.
At various times governments have attempted to regulate
encryption, with little success. Most recently in the UK,
the government has introduced the Investigatory Powers
Act, which requires technology companies to assist
the government to decrypt messages where technically
feasible. It is unclear what this provision means in practice
for companies and individuals that rely on encryption.
The act is still being implemented, so it has not yet been
possible to observe how it will be used.
Prime Minister Malcolm Turnbull has stated that his
government wants to introduce a method for intercepting
and reading encrypted messages. In July 2017, he discussed
giving law enforcement this power for the purposes
of keeping the public safe from terrorism. In that same
press conference, former-Attorney General George
Brandis argued that the government’s surveillance powers
needed to be brought up to date by requiring that technology
companies cooperate with law enforcement. Attorney
General Brandis indicated that this initiative is part of
Australia’s participation in the Five Eyes, and confirmed
the government’s commitment to intelligence sharing
with these partners.
It is not clear how the government plans to implement
these changes in law. This uncertainty suggests that
the government does not appreciate the complexity
of the issues involved. Approaches proposed or used
in other countries include outright prohibitions on
encryption, escrow of encryption keys, or limitations
on the strength of encryption. Each of these has been
demonstrated to have serious risks. Two of the most
commonly discussed options in Australia have been to
require technology companies to build a ‘backdoor’ to
allow direct government access, or, conversely, to obligate
companies to build into systems the capacity to decrypt
the messages and then hand the information over to the
government. Attorney General Brandis has indicated
that mandating a backdoor is not the government’s plan,
however he has also stated in June 2017 that ‘if there are
encryption keys then those encryption keys have to be put
at the disposal of authorities.’
The reactions from experts and commentators have
highlighted deep problems with the government’s
general plan. Academics have outlined the flaws from
an engineering perspective. ‘Decrypting terrorists’
communications without undermining the security of
everyone else sounds great,’ wrote academics from the
University of Melbourne, ‘but this is not an engineering plan
and every known attempt has failed.’ Built-in weaknesses
in encryption systems are not features that can be
exploited only by the government; they can also be used
by criminals and foreign enemies. Information about any
backdoor will be highly valuable, and a honeypot for
hackers, making it hard to keep safe. In July 2017, private
health insurer Bupa notified tens of thousands of their
customers that their private information had been leaked
by a rogue employee – demonstrating the immense
security risks facing institutions charged with protecting
data. Journalists have also pointed out that the proposal is
unlikely to be effective for its intended purpose: terrorists
can, and likely will, move to other communication channels
that have strong encryption. Civil society organisations
have argued that police already have significant powers
to investigate terrorism and this proposed extension of
surveillance capabilities has not been justified.
The government’s Digital Economy Strategy, Cyber
Security Strategy, and International Cyber Engagement
Strategy each confirm the importance of digital
technologies and cyber security for Australia in the years
ahead. Encryption is a crucial element of all cyber security
strategies. The purpose of this paper is to demonstrate that
encryption is essential to the digital society, and encryption
is only effective if it is robust. A system of encryption
with a back door is like a chain with a fatally weak link
– the strength of the entire system is compromised and
it is only a matter of time before it breaks, jeopardising
the safety of everyone who relies on it. This risk has
profound implications for systems and infrastructure
that we rely on for our daily lives.
4
ENCRYPTION IN AUSTRALIA Encryption Today
Encryption plays a major role across many important
areas of Australian life, including national security
interests, the economy, and protecting the community,
individuals, service providers, and the private sector
from crime and other risks.
Encryption is essential to many
government activities
4 N AT I O N A L SEC U R I T Y
The integration of digital technology into almost all
government practices makes cyber security an essential
part of national security. The Australian Cyber Security
Centre (ACSC) notes that in 2017, all federal and state
government networks were ‘regularly targeted’ by actors
ranging from cybercriminals to state-sponsored
adversaries. Many states in our region are rapidly
developing their cyber capabilities for both defensive and
offensive purposes. The ACSC responded to 671 cyber
security incidents impacting government between
1 July 2016 and 30 June 2016. Encryption offers an
essential line of defence against such attacks.
look for softer targets to attack or disrupt, including
contractors and service providers. An attack on IT company
Deloitte may have allowed hackers to steal emails from
multiple US government departments. It has also been
recently revealed that Australian government contractors
have been successfully hacked and had large amounts of
data stolen. Defence and intelligence agencies, as well
as law enforcement, are especially likely to be targeted by
highly sophisticated and capable adversaries. Defending
information systems and deterring hackers requires strong
encryption at a range of levels, from major government
databases to personal devices of individual contractors.
4 E S SEN T I A L INF R A S T RU C T U R E
Operators of public infrastructure are also vulnerable.
In late 2016, a ransomware attack on the San Francisco
metro shut the ticketing system down for two days. A minor
computer glitch which stopped all trains across Melbourne
in July 2017, stranding thousands of passengers,
demonstrated how disruptive interference with these
systems could be. A deliberate and sustained attack on
major public transport systems, or the electricity grid as
has happened in Ukraine, could cause chaos in Australian
cities. These infrastructure systems are put at risk if they
are not protected by strong encryption.
4 G O V ER NMEN T DATA SE T S
Large government datasets, such as the MyGov system,
are highly tempting targets for malicious state actors and
cyber criminals. Earlier in 2017 it was discovered that
a hacker had infiltrated and stolen data from Medicare,
and was selling Australians’ personal information to
the highest bidder. Incidents such as this not only put
individuals at risk of crimes such as identity fraud, they
also damage the public’s trust in the government to keep
their data safe online. As various government bodies
continue to improve their digital services and consolidate
datasets, it is crucially important to protect these assets
using cyber security best practices, of which strong
encryption is one.
4 CONTR ACTORS AND SERVICE PROVIDERS
The range of potential targets is not limited to systems
directly operated by government. The ACSC has said that
as government defences improve, adversaries are likely to
Encryption is the lynchpin
of the modern financial system
4 B A NK IN G
The vast majority of the world’s money now exists only in
a digital format. Security is the key promise that banks
make to customers who deposit money with them. Banks
are obvious targets for cyber criminals, and ‘bank grade
security’ has become synonymous with best practice in
this field. Nonetheless, banks around the world have
fallen victim to hackers, with over a billion dollars stolen
in some cases. The increasing sophistication and ambition
of these modern bank robbers should serve as a warning
about the importance of supporting banks and financial
service providers to implement the strongest possible
cyber defences, including strong encryption.
5
ENCRYPTION IN AUSTRALIA Encryption Today
4 C A R D PAY MEN T S
Australians now make the majority of their purchases
digitally (using debit and credit cards) rather than paying
in cash. Encryption is central to card payments both
online and through point-of-sale machines such as
EFTPOS, because it protects sensitive customer data
like PINs from being stolen or intercepted. The Payment
Card Industry Security Standards Council, which includes
companies like Visa and MasterCard, requires anyone
processing card transactions to use strong encryption
under the Data Security Standards. These companies take
their responsibility to encrypt and protect customer data
extremely seriously. Accommodating a government policy
which undermines the strength of their encryption would
present a very challenging task for companies in the
payment card industry and the businesses that rely on it.
4 D I G I TA L C O MMER CE
The government’s Digital Economy Strategy estimates
that digital technologies could add up to $250 billion
to Australia’s GDP by 2025. In order for these benefits
to be realised, it is important that the technologies
which online businesses rely on are secure and align
with global standards. Poor cyber security practices
like weak encryption leave businesses vulnerable to
costly criminal attacks and stifle entrepreneurship in
Australia’s digital economy.
Encryption protects communications
and data sharing systems
4 IND I V ID UA L S
Data breaches, which lead to theft and exposure of the
data about individuals, can have significant personal,
professional, and legal ramifications. The hack
of ‘infidelity site’ Ashley Madison is just one example
in which leaked data impacted personal relationships,
damaged professional reputations, and exposed
individuals to risks such as identity theft. Consumers
rightfully expect that their personal data will be stored
securely, including through the use of strong encryption.
Encryption protects messages between individuals where
they would have a reasonable expectation of privacy, but
the issue is much larger than personal communications.
For example, the recent leak from credit reporting agency
Equifax has exposed at least 143 million people to the
risk of identity theft and other crimes. Consumers have
a reasonable expectation that messaging platforms and
storage systems for personal data will be kept secure,
including through the use of strong encryption.
4 CR I T I C A L SER V I CE S
Critically important service providers such as hospitals rely
on complex information technology systems for sharing
data about patients and services. They are regular targets
of cybercriminals. The WannaCry attack in May 2017 hit 16
UK hospitals, preventing them from accessing their patient
data system and leading to cancelled surgeries, diversion
of ambulances, and widespread disruption of medical
services. Protecting the ongoing operation of hospitals
and other vital services is a top priority and demands
the strongest defences technology can provide.
4 P R I VAT E SEC T O R
Private sector professionals and businesses with access
to sensitive or commercially valuable information
are prime targets for commercial espionage by both
local and international hackers. Small businesses are
also vulnerable, and it has been reported that 59% of
Australian businesses recorded cyber security breaches
in 2016. A report by IBM and the Ponemon Institute found
that the average total cost to an Australian business
which suffered a data breach in 2017 was $2.51 million.
The report found that malicious attacks are the most
common cause of data breaches. Motivations for attacks
on the Australian private sector range from international
espionage to intellectual property theft, according to
former head of the U.S. CIA Bill Hayden. Supporting
businesses and ensuring that Australia’s private sector
remains globally competitive must include allowing access
to the best possible defences against criminal attacks.
6
ENCRYPTION IN AUSTRALIA Encryption Tomorrow
The rapid pace of technological advancement means
that laws made today – which may remain in force for
years or decades to come – must consider not only
the present situation but also the foreseeable future.
As technology becomes ever more deeply embedded
into Australia’s economy, society, and national security,
encryption will only become more critical to the protection
of Australian interests.
Encryption is needed to create
a modern, competitive economy
Australian companies must be able to protect themselves
against crime and, in turn, attract international investment.
This requires that businesses use the highest possible
standards in cybersecurity. New financial technologies
such as the blockchain and cryptocurrencies as well as
the growth in other technology industries will only increase
the need for encryption. If development in encryption
is limited, companies deploying these technologies will
likely look elsewhere rather than invest in Australia.
Undermining encryption would put Australia at a
competitive disadvantage against other nations as their
cyber defences continue to improve.
Encryption is needed to prevent crime
and enable law enforcement
The frequency, seriousness, and sophistication of
cybercrime will grow in the coming decades. Strong
encryption is necessary to help keep the public safe from
both new kinds of crime, and traditional crimes aided by
new technology. It will also be needed by law enforcement
and intelligence agencies to defend themselves and
the public against criminal, terrorist, or state-sponsored
adversaries. As more data are collected and stored by
police, security, and intelligence agencies, the digital
assets and networks of these agencies will increasingly
come under threat from outside attackers. Protecting
the integrity of policing and intelligence systems is
crucially important for the safety of all Australians.
Encryption is needed for a safe,
prosperous modern society
The Internet of Things, smart cities, autonomous vehicles,
and a host of other exciting new technologies will play
a major role in Australian life over the coming decades.
In order for Australians to enjoy the benefits of these
new technologies, it is important to also guard against
the risks. Other countries, like China, are responding to
modern challenges by investing in quantum cryptography.
Australians deserve and expect protections of the highest
international standard to keep our communities safe in the
years to come.
7
ENCRYPTION IN AUSTRALIA Solving Problems Without Undermining Security
The Turnbull government has expressed concern about
terrorists using encryption to evade surveillance, but
this concern misses some important considerations.
The case for weakening encryption has not been made
out, especially in a context in which so many everyday
digital activities would be put at risk.
Weakening encryption will create more vulnerabilities
that can be exploited by criminals.
By aiming to weaken encryption, the government
will create more national security problems than it
addresses. The government has not made public its
plans for storing and protecting the information that it
will gather as part of building and using a backdoor or
other tool to bypass or limit encryption. Such valuable
information will be enticing to criminals. Consider that
recently the US Securities and Exchange Commission
disclosed that its central database was hacked, with
the information possibly used for insider trading
purposes. The government has not demonstrated that
it is prepared for similar such assaults.
Law enforcement and intelligence service already
have immense powers and capacity for surveillance.
This includes a mass data retention regime that is very
similar to a proposal rejected by the European Court
of Justice as being unnecessary and disproportionate.
This also includes powers to compel the production
of private encryption keys and passwords, as well
as powers to access computer infrastructure and
endpoints. The problem is not that law enforcement and
intelligence agencies lack surveillance powers.
There are clearly other, much larger problems that
are being encountered by law enforcement tackling
terrorism than access to encrypted communications.
Criminal investigations are currently being delayed by
months and even years as police struggle to find the right
expertise for examining information stored on devices.
Arguably, the more urgent priority is training of digital
forensic and cyber-crime specialists, and supporting
them to work in law enforcement.
The government should focus on the reform of Mutual
Legal Assistance Treaties (MLATs) instead of weakening
encryption to improve law enforcement process
MLATs between Australia and other countries include
arrangements for information sharing for law enforcement
purposes. These processes tend to be slow, opaque,
and inefficient. Reform of MLATs is an urgent priority
to ensure that intelligence is shared in a timely and
effective manner. It would allow intelligence agencies
to make better use of evidence they already have, rather
than encourage them to seek access to evidence they do
not yet have (like encrypted messages). The reform
of MLATs ought to be a focus of the government.
The government’s job is to develop policies that protect
national security without endangering public safety and
economic interests. The focus on weakening encryption
does not meet these requirements.
8
ENCRYPTION IN AUSTRALIA Conclusion
CONCLUSION
Strong encryption protects Australian interests and
keeps ordinary Australians safe. It serves the interests
of anybody who uses internet banking, shops online,
relies on modern public services, and expects their
personal information to be kept private. Weakening
encryption creates risks to the safety of everyone,
as well as businesses and public service providers.
It also sets Australia back relative to our global
competitors. Policies that undermine strong
encryption create more problems than they solve, and it
is critical that legislators and decision makers consider
the consequences before it is too late.
9