Just in:
Global Green Shift Demands Trillion-Dollar Investment Surge // DP World Leads Coalition to Reduce Emissions through Chilling Standard Adjustment // TUMI Broadens Asia-Pacific Travel Retail Footprint // Czech pioneer builds largest solar power plant in Chile // CUHK Shines a Spotlight on Aisana Bassagarinova: A Rising Star from Kazakhstan Embarks on a Journey of Excellence // PolyU study reveals effectiveness of GBGI infrastructure in mitigating urban heat, proposing nine-stage framework for development of a sustainable city // Energy Giant Shell Reevaluates Emissions Reduction Targets // Paris’ Arab World Institute Marks Two Decades // Turning Salt Seas to Fresh Solutions: Desalination and the Fight for Water Security // Bayanat Soars in Q1 with AED 113 Million Revenue // Galaxy Macau, The World-class Luxury Integrated Resort Comes to the “Experience Macao Roadshow in Jakarta” // Quality Building Award 2024 Unveils Finalist List // Gulf Banks Set for Continued Profit Surge in 2024 // MoneyHero Group Named Among the HR Asia Best Companies to Work for in Asia, Hong Kong 2024 // Strategies for Succeeding in Online Trading Within the UAE’s Evolving Digital Economy // Tabreed Cools into Q1 2024 with Solid Revenue Growth // Explore Copenhagen’s Culinary Gem: Khun Juk Oriental, Winner of the 2023 Thai Select Signature Award and Esteemed Taittinger Ambassador // Etihad Airways and Abu Dhabi Businesswomen Council Empower Women Entrepreneurs // LiveSpo Pharma Emerges as Vietnam’s Pioneer at Vitafoods Europe 2024 // Dubai Authority Partners with Arab Media Forum to Champion Sustainability //

Strong Laws To Protect Encryption Are The Need Of The Hour

By Prachi Arya

“Encryption safeguards the personal security of billions of people and the national security of countries around the world.”

The opening statement on the About page of the Global Encryption Coalition (‘GEC’), which consists of 180 members from among civil society organisations, companies and individuals, captures the essence of encryption.

ADVERTISEMENT

Once considered a wartime necessity, encryption has steadily become the technological backbone for secure online communications, digital privacy and protection of national critical information infrastructure (‘CII’).

Indeed, it is crucial to protect data at a time when data breaches are only increasing. For instance, the Indian Computer Emergency Response Team (‘CERT-In’), a nodal executive agency which monitors cyber security incidents in India, has reported a steady increase in data breaches since 2017, in a response to a question in the Rajya Sabha.

Section 70 of the Information Technology Act, 2000 (‘IT Act’) defines CII as a “computer resource, the incapacitation or destruction of which shall have debilitating impact on national security, economy, public health or safety”.

Previously, the Union Government has notified the Unique Identification Authority of India-related facilities, assets and infrastructure as CII. Once declared as ‘protected system’ under section 70, any unauthorised persons accessing these resources may be jailed for up to 10 years, and fined.

Nonetheless, vulnerabilities are often exploited by malicious actors. For instance, in June 2021, a personal data breach of millions of public distribution system (‘PDS’) beneficiaries in Tamil Nadu, including Aadhaar details, was reported, after an online vendor claimed access to nearly 2 terabytes of PDS data on a hacker’s platform and demanded a payment of USD 1,950 in cryptocurrency for handing over the decryption code.

ADVERTISEMENT

Governments and law enforcement agencies (‘LEAs’) are also increasingly undermining encryption to tackle crimes and criminal communications. This includes the ‘going dark’ challenge wherein, with strong encryption protecting all kinds of data, criminals use online communications channels to hide their plans and activities. In such cases, LEAs struggle to read investigation-related information and actively oppose encryption.

The most worrying of these has been the Five Eyes alliance which is composed of the governments of the United States, the United Kingdom, Canada, Australia and New Zealand. It voices the views of many LEAs in its unequivocal belief that “privacy is not absolute”.

A 2020 joint statement released by the Five Eyes, India and Japan goes against not just end-to-end encryption, but also a range of encrypted services available, including device encryption, custom encrypted applications and encryption across integrated platforms, purportedly to deal with potential child sexual abuse material.

In another statement, on countering child sexual exploitation and terrorism, it stated that “tech companies should include mechanisms in the design of their encrypted products and services whereby governments, acting with appropriate legal authority, can gain access to data in a readable and usable format.”

Further, since 2019, India is part of an international working group to deal with criminals online which states: “According to the participants, encryption is designed with no means of lawful access; it allows terrorists, drug dealers, child molesters, fraudsters, and other criminals to hide incriminating evidence.”

Governments are trying to undermine encryption due to this issue through legislation, such as by introducing stipulations that erode strong end-to-end encryption deployed by many tech companies to protect consumer privacy and the integrity of personal communications. This includes tracing the first originator of messages on instant messaging freeware service Whatsapp. Since there is no way of knowing who may be subject to investigations, companies are required to store all communications in order to ascertain who said what, when they are required to do so.

However, broad surveillance adversely impacts anonymity on the internet, access to strong encryption, the issue of traceability, and laws on identifying the first originator of a message.

In 2018, Australia enacted the Assistance and Access Act, to allow LEAs access to messages on platforms like WhatsApp and Facebook. It enforced conditions on tech companies and service providers to build surveillance capabilities, such as through push notifications that download malware to a target’s computer or phone.

It was modelled after the U.K.’s Investigatory Powers Act 2016 (‘UK Act’), called the “Snoopers Charter” by its critics. The UK Act contains mandatory, broad and secret decryption obligations for service providers.

It allows for the U.K. government to order telecommunication providers to remove any electronic protection measure. Thanks to a series of cases by civil society organisations Liberty and Privacy International, the U.K. High Court of Justice found that it is unlawful for British security services like the Security Service, the Secret Intelligence Service and the Government Communications Headquarters, to obtain an individual’s communications data from telecom providers without prior independent authorisation, while carrying out criminal investigations.

However, it still allows indiscriminate snooping on people irrespective of whether they are suspected of crimes, although this is being appealed.

That the Australian law followed the footsteps of the UK Act is hardly unique. A similar trajectory is noticeable with other countries.

The first in the series of similar Asian laws came from the People’s Republic of China (‘PRC’) which took the big brother trope to its farthest extent. PRC is considered the world’s largest surveillance State. Under the Cybersecurity Law of the PRC, 2017, companies must store users’ data on local servers and decrypt the data on request from State authorities.

The vaguely worded law enables policing and monitoring of the entire population for an expansive list of ideas like political, social and religious beliefs, and the online activities of at-risk populations, such as Tibetans, Uyghurs and Chinese human rights defenders, for which they face draconian criminal penalties like being unlawfully and secretly detained.

In India, on January 25, 2020, a Rajya Sabha Ad-hoc Committee “to study the alarming issue of pornography on social media and its effects on children and society as a whole”, had submitted that the Information Technology (Intermediaries guidelines) Rules, 2011 should be modified to enable tracing of the originator of child sexual abuse-related messages shared on end-to-end encryption platforms.

Mandatory traceability requirements, often introduced through legislation, undermines encryption. It requires communication and social media apps to always be able to identify the first originator of any message, just in case law enforcement requires it in the future.

In May 2021, in the matter of WhatsApp LLC versus Union of India (2021), WhatsApp moved the Delhi High Court against the Union Government to halt the implementation of rules that mandate traceability, arguing that the requirements violated constitutionally guaranteed privacy protections. Notably, the government relied on similar moves by the governments of U.K., U.S., Australia, New Zealand, Canada and Brazil to justify its position.

According to WhatsApp: “In order to trace even one message, services would have to trace every message…That’s because there is no way to predict which message a government would want to investigate in the future. In doing so, a government that chooses to mandate traceability is effectively mandating a new form of mass surveillance. To comply, messaging services would have to keep giant databases of every message you send, or add a permanent identity stamp — like a fingerprint — to private messages with friends, family, colleagues, doctors, and businesses.”

Consequently, India’s latest Information Technology (Intermediary Guidelines and Digital Media Ethics Code) Rules, 2021 (‘IT Rules’) require large social media platforms to identify and disclose the “first originator” of a message pertaining to an “offence related to the sovereignty and integrity of India, the security of the State, friendly relations with foreign States, or public order, or of incitement to an offence relating to the above or in relation with rape, sexually explicit material or child sexual abuse material”.

These terms are overboard, and the same arguments have been used to deny the rights of vulnerable communities. For instance, national security is an ambiguous term that is often used by the Union Government to repel courts from hearing human rights cases.

This includes the prolonged suspension of internet in Jammu and Kashmir that impacted religious minorities (which came up in the Supreme Court matters of Anuradha Bhasin versus Union of India (2020) and Foundation for Media Professionals versus Union Territory of Jammu (2020)); and again the Pegasus spyware case, wherein the government allegedly used foreign mass surveillance technologies to infiltrate the phones of human rights defenders and political dissidents (which came up before the Supreme Court in Manohar Lal Sharma versus Union of India).

The latest attempt at introducing broad surveillance powers in the name of national security comes in the form of the Indian Telecommunication Bill, 2022 (‘the Bill’) which was released for public consultation by the Department of Telecommunications, Union Ministry of Communications in July. Stakeholder comments are invited till October 20.

The Bill seeks to provide a comprehensive telecommunications legal framework by replacing the existing Indian Telegraph Act, 1885, the Wireless Telegraphy Act, 1933 and the Telegraph Wires (Unlawful Possession) Act, 1950.

The Union Government has broad discretion under the Bill, which allows for interception and tracking during public safety and public emergency situations, and for national security, which may lead to an unfettered exercise of power, threatening the creation or a surveillance State.

Similar stipulations have threatened virtual private networks (‘VPN’). In April, CERT-In issued directions that mandate cloud service providers and cryptocurrency exchanges to log user data for five years, including user names, addresses, contact numbers, period of subscription, email and Internet Protocol addresses, and the purpose of using their services. The provisions are not applicable to corporate and enterprise VPNs.

Bangladesh has also floated a new draft legislation, the Bangladesh Telecommunication Regulatory Commission Regulation for Digital, Social Media and OTT Platforms (‘BTRC Rules’) which, among other things, makes it mandatory for messaging apps to enable traceability and identification of the first originator of any information.

One cannot help but notice the similarities between the Indian IT Rules and the Bangladeshi BTRC Rules. The Bangladeshi government had already reportedly increased its technical capacity to filter and block content, and conduct online surveillance on individuals under the National Telecommunication Monitoring Centre’s Content Blocking and Filtering Project, without a sufficient legal framework to protect against human rights abuses.

With 63 per cent of all people in the world being online following lockdowns related to COVID-19, according to the International Telecommunication Union, and nearly half of India’s population going digital, as per a report by the Internet and Mobile Association of India, the total number of people who may be surveilled through legislation is unprecedented.

Hasty legislation that rubber stamp government snooping en masse harken a new era of surveillance. While judicial intervention and opposition by civil society have helped curtail some surveillance activities, strong laws that protect encryption and curtail overbroad powers of LEAs are the need of the hour.

Until then, much like how LEAs are armed to collect more information than strictly necessary, it is important for human rights defenders and ordinary citizens alike, to arm themselves with the knowledge of the extent of online surveillance.

As Foucault said: “Knowledge is not for knowing: knowledge is for cutting.” When it comes to surveillance and encryption, knowledge works both ways.

October 21 is Global Encryption Day. Celebrate by being vocal about the need to protect and strengthen encryption, to make the Internet safer for everyone. (IPA Service)

Courtesy: The Leaflet

The post Strong Laws To Protect Encryption Are The Need Of The Hour first appeared on IPA Newspack.

ADVERTISEMENT

ADVERTISEMENT
Just in:
Kalba Sparks Creativity with Wood Plastic Arts Program // CUHK Shines a Spotlight on Aisana Bassagarinova: A Rising Star from Kazakhstan Embarks on a Journey of Excellence // Etihad Airways and Abu Dhabi Businesswomen Council Empower Women Entrepreneurs // Unprecedented Heat: February Shatters Global Temperature Records // Bayanat Soars in Q1 with AED 113 Million Revenue // Dubai Authority Partners with Arab Media Forum to Champion Sustainability // Andertoons by Mark Anderson for Fri, 17 May 2024 // Quality Building Award 2024 Unveils Finalist List // Clean Power for Adventure: BLUETTI Makes a Move into the Middle East Market // PolyU study reveals effectiveness of GBGI infrastructure in mitigating urban heat, proposing nine-stage framework for development of a sustainable city // Alarming Trajectory: Shipping Industry Faces Potential Surge in Greenhouse Gas Emissions // Turning Salt Seas to Fresh Solutions: Desalination and the Fight for Water Security // Galaxy Macau, The World-class Luxury Integrated Resort Comes to the “Experience Macao Roadshow in Jakarta” // Energy Giant Shell Reevaluates Emissions Reduction Targets // Czech pioneer builds largest solar power plant in Chile // Gulf Banks Set for Continued Profit Surge in 2024 // Green Dreams Need Green Light: IRENA Report Cautions on Attaining COP28’s Renewable Ambitions // Abu Dhabi Global Healthcare Week Concludes with Focus on Innovation // Strategies for Succeeding in Online Trading Within the UAE’s Evolving Digital Economy // TUMI Broadens Asia-Pacific Travel Retail Footprint //