Cameron on a hiding to nothing if he really does want encrypted comms banPosted: January 15, 2015 | Author: hongkongblogger | Filed under: Uncategorized | Tags: cameron, charlie hebdo, cybercrime, encrypted communications, enisa, europol, FBI, imessage, infosecurity magazine, je suis charlie, prime minister, terrorist, tory party, whatsapp |Leave a comment
This week, prime minister David Cameron seemed to indicate that if he is elected this May he’ll do all he can to ensure strongly encrypted communications are banned in the UK.
Well, that’s the gist of what he said. More correctly, he made it clear that no form of comms should exist where, in extremis, the security services can’t eavesdrop on private conversations – to stop criminals, terrorists etc.
His comments have been widely criticised in the media and by the technology industry, and rightly so.
Although others including the FBI, US attorney general Eric Holder and even Europol have voiced concerns about encrypted communications, none have gone as far as Cameron – who is now apparently off to the US to try and get support for his plans from Barack Obama.
A few thoughts sprung to mind as I reported on this breaking story:
- If Cameron thinks he can take on the might of Apple, Google et al over this, he’s mistaken.
- His comments are at odds with European security agency Enisa which has just released a document praising encryption and calling for MORE privacy enhancing technologies (PETs), not fewer
- There’s no evidence that the Paris attacks would have been prevented if encrypted comms were banned
- The UK’s burgeoning tech industry will suffer
- UK business will react angrily if they can’t use strongly encrypted comms, as will UK entrepreneurs – it’s sending out a dreadful signal to potential investors in our supposedly liberal democratic country. Also, these are exactly the sort of traditional Tory supporters Cameron needs on side.
- If encrypted comms were banned, or backdoors were engineered into products so the security services could access them if needed, the bad guys would eventually find a way of exploiting them too.
- Terrorists and criminals will continue to use encrypted comms, downloaded from regions where they are still legal.
Sophos global head of security research James Lyne summed up the whole farce neatly in comments he sent me by email:
“Even if regulation was brought in to force legitimate companies to use encryption the government (in extremis) could intercept, unless they plan to build a great firewall of China (but even bigger and better – or sinister) to prevent people getting their hands on open source tools available in other countries it isn’t going to stop the darker side of the net from using it,” he told me.
“At the end of the day, terrorists will use any tools at their disposal to communicate, so this is unlikely to solve the real problem. The intention behind the statement was likely a little different to the way in which it has appeared but the suggestion as it stands would do the UK more harm than good and clearly lacks insight into how the internet works or how such controls might be implemented.”