Australia's Planned Decryption Law Would Weaken Cybersecurity

Image: iStock

The Australian government plans to introduce new legislation forcing companies such as Google and Facebook to de-crypt messages in the name of fighting terrorism and other crimes. But the move will have serious implications for cybersecurity.

In a press conference on Friday, Prime Minister Malcolm Turnbull said the law would impose an obligation on technology companies to be able to provide Australian security agencies with access to encrypted user communications.

Both he and Attorney-General George Brandis have insisted they are not asking for “back doors” to be built into encryption software. Yet they have not detailed how their goal can be achieved otherwise.

Take an end-to-end encrypted messaging service like Signal. A server scrambles the original message, and the text can be de-scrambled only by a “key” that exists on the recipient’s phone. The company never sees the plaintext.

The government’s message is that it’s only trying to keep the country safe, but this masks a great deal of complexity.

Cybersecurity is always a trade-off. Weakening security in one area to protect against terrorist attacks on the ground could increase the risk of cyberattacks by terrorists and hostile nations, and increase the likelihood of cybercrime.

Can Australia follow the UK’s lead?

The attorney-general indicated that Australia would follow the UK’s lead in the proposed law, and especially its Investigatory Powers Act, which became law in 2016.

Although the UK has been held up as an example to follow, it hasn’t managed to actually get its version of the law working yet, nor has it decided how decryption would be achieved.

Also known as the “Snooper’s Charter”, the law gives UK intelligence agencies and law enforcement the ability to carry out both targeted and bulk surveillance of communications data.

Most importantly, the UK act requires that telecommunication operators “provide and maintain the capability to disclose, where practicable, the content of communications or secondary data in an intelligible form and to remove electronic protection”.

Despite the UK having passed the law, there has been little public discussion about how technology companies would actually do this, nor what would happen if they failed to comply.

Could tech companies comply even if they wanted to?

In 2015, a group of cybersecurity experts debated how technology companies could comply with laws such as those proposed in both the UK and Australia.

The academics and industry researchers outlined the significant risks of a number of approaches that would allow specific agencies access to unencrypted information.

One approach, for example, involves using special keys provided by a government agency to encrypt a copy of all messages. This would allow users to continue to use end-to-end encryption of messages, but government agencies could always access their own versions of the messages when necessary.

The obvious risk with this is that if the “master key” was lost or stolen, everyone’s communications would be compromised.

Creating individual keys and putting them in a “key escrow”, effectively a large database, would also be insecure and technically impractical.

Another approach would be to weaken the encryption to such an extent that it would be feasible for someone with a large enough computer to break if necessary. Again, this would give foreign governments and well resourced criminals the same capability, rendering the communication unsecured.

Decreasing security increases risk in other areas

The Australian government, like other nations, has a Cyber Security Strategy that lays out how it aims to protect the country, its critical infrastructure and its population.

Strong encryption and the ability to communicate securely is a fundamental part of this strategy. Undermining this capability by making all communications open to a large number of people and organisations within the government significantly increases the risks of compromise by hostile actors like foreign nation states and organised criminals.

These risks are not being discussed as part of the fight against terrorism but are real nonetheless. The leaking of secrets from US agencies like the NSA and CIA demonstrates that even the most powerful organisations are not able to guarantee the security of sensitive information.

The only thing stopping hostile actors from getting access to encrypted information and communications on a large scale currently is the fact that the keys are not held centrally.

Terrorists will just shift the way they do things

While it is clear that being able to read encrypted messages would be an advantage for law enforcement and security in the short term, terrorists and criminals would quickly shift to other non-regulated forms of encryption.

The open source Tor network, for example, is currently not controlled by a company or government and criminals and terrorists already use the dark web to communicate and trade illegal goods and services.

Nothing was said about the dark web on Friday, although this is arguably a bigger problem from a security perspective than the use of social media messaging apps.

The ConversationBut even if Tor was blocked in some way, there is a raft of encryption software that can be easily deployed by those who want to protect their communications from the government.

David Glance, Director of UWA Centre for Software Practice, University of Western Australia

This article was originally published on The Conversation. Read the original article.

WATCH MORE: Tech News


Comments

    They'll either just ignore any such legislation or move their operations offshore and take their tax (what little they pay) with them. Gummint will then get ISPs to DNS block them, everyone will either circumvent the block (incredibly easily) or move to any number of alternatives - fragmenting the systems in use and making it even harder for intelligence to keep up.
    All in all, a colossal waste of time and money.
    But y'know, they'll just keep shouting "because terrorists" until they get their way.

    At a guess I'd say that the PM expects the call for a backdoor to fail so that, in response, they can enact despot-type surveillance instead.

    they cant even keep our centrelink details private and they want to weaken security even more?

    I think you'll find that the government will fight tooth and nail to not to keep a master key or mandate how this law should be implemented.

    Essentially, the government doesn't how how tech companies do it, they just want access to the data.

    This will be so that noone can blame if an encryption key is stolen or if a company implements a poor solution to the problem.

    The reason I believe this is because it has never told the telcos or ISPs what data storage methods to use in their businesses, or told them how to implement the GSM standards. The law just days companies have to comply with warrants and facilitate access and that each company can charge the government back the cost of whatever method they choose to implement.

    As for 'weakening encryption' technically yes, it's true, but practically speaking everyone was happy with Apple circa 2014 when Apple changed from holding their own master keys to hiding the master key in each device. Facebook Messenger only changed in 2016 from memory.

    The world wasn't burning on fire only a few short years ago and there's no reason to think that it would again if the same system was reimplemented.

Join the discussion!

Trending Stories Right Now