Menu lock

Federal

May 11, 2017

Encryption is about to become the most important national security debate

The issue of accessing encrypted information hasn't gone away for governments -- but one politician says they need to secure greater trust from the public before giving themselves more powers.

Encyption security

More than virtually any other politician, when Anthony Byrne speaks on national security, it pays to listen. The former chair, now deputy chair, of Parliament’s Joint Committee on Intelligence and Security is plugged into not merely Australian security institutions — with whom he has an occasionally fractious relationship — but key US and UK ones as well.

We recommend

From around the web

Powered by Taboola

6 comments

Leave a comment

6 thoughts on “Encryption is about to become the most important national security debate

  1. James O'Neill

    There are a number of reasons why the government (and not just in Australia) does not want a committee with strong powers to provide oversight of its intelligence agencies and one of the most important is that those agencies do not stand up well to close and impartial scrutiny. We have only to look at the findings of the Church Committee in the US and subsequent history to see an example of this.
    It is well documented (although Crikey refuses to recognise the fact) that the intelligence agencies are themselves the perpetrators of terrorist acts, either directly or through their proxies. Any analysis that fails to recognise this fact seriously undermines its argument. For the inevitable sceptics, read Brzezinski’s book The Grand Chessboard, or simply google Operation Cyclone.
    The other point that undermines an argument is the mindless repetition of phrases such as “enemy states like Russia”. For a more balanced view listen for example to the weekly podcasts of Stephen Cohen who has the great virtue of knowing what he is talking about.

    1. Inner Space

      James O’neill – “It is well documented (although Crikey refuses to recognise the fact) that the intelligence agencies are themselves the perpetrators of terrorist acts,”
      Spot on, James. It’s so frustrating as an overview to the current world situation that people refuse to see this. If intelligence agencies were shut down tomorrow and their operations ceased, peace would reign upon the earth. Intelligence agencies never represent their host nations but seek to fulfill a hidden-hand international agenda by raising local conflicts to eradicate national sovereignty and existing power bases. Think Libya, think Syria, think Yemen, think Egypt, think anywhere in the world where there is conflict and there you find the signature false-flag. Journalists are either blind or purposely blinded.

  2. Kevin Cox

    The solution to access to citizen data is paradoxically greater privacy where the individual controls who sees what data about themselves. Technically it is relatively straight forward to build systems where data is held privately between parties who communicate and where both parties have to give permission for the data transmitted to be viewed by a third party. The so-called “dark web” operates this way and we can set up connections in the sunlit web to operate the same way. We don’t because the corporations of the world want to access data so they can profit from it. Almost overnight we could make the Internet resistant to hacking. We could become the only party who could see your own data. To access the data the law would need to provide a way for a security agency to “become us” and that act could be controlled by restrictions. In that case those who say they have nothing to hide can willingly give permission for an investigation agency to become them without the fear that others will see the data. It is not the police seeing our data that is the worry. It is the difficulty of preventing others seeing our data if the police are careless with it or their systems are hacked. The data retention approach is very inefficient, very costly, and not as effective as voluntary release of information when it is required for a valid purpose.

  3. Grumpy Old Sod

    Really Bernard! “Enemy states like Russia”. And pray tell, just what has Russia done to deserve our enmity? Has it declared war upon us for example by overthrowing a neighbouring state and installing a fascist government there that then attacks parts of itself that wish to reunite with Australia? I don’t think so. Has Russia surrounded us with nuclear missiles that some idiots there think should be used against us? Once again, I don’t think so. So how in god’s name do you define Russia as being an enemy state to us? Or do you let others do your thinking for you?

  4. Norm

    Geez, a lot of push for The Greens in today’s Crikey edition. Even if Helen’s was a little back-handed, along the lines that the marvellous Richard should keep a tighter rein on his women. Crikey!

  5. OwenM

    During the San Berdino case, Apple and the big tech companies stood their ground refusing to assist with the unlocking of an encrypted iPhone, stating that they did not want to intentionally introduce backdoors into their software. They have a point to some extent, but the reality is this stance was taken based on commercial interests. The real thing at stake here was cloud computing and the trust of their business customers.

    In essence Apple turned their belligerence into marketing, which frankly stinks when you consider that people were murdered in the incident.

    I do think we need encryption on all devices. I do not think encryption should have a backdoor or golden key which governments can use whenever they please. Nor do I think all encryption should be breakable. However I do think the legal ramifications of encryption around warrants around data need to be figured out.

    The San Berdino incident was an opportunity missed for tech companies to do the right thing, and work closely with lawmakers to ensure there’s a clear way forward if this ever happens again. (E.G. Law Encourcement hands Apple the iPhone with a warranty. Apple takes it away to their secure lab, unlocks the device, hands it back. Job done.)