Toronto Star

Apple and Facebook fighting internatio­nal encryption battle

Regulation­s in Australia, U.K. make it easier for police to pressure companies for data

- ROBERT MCMILLAN AND DUSTIN VOLZ THE WALL STREET JOURNAL

Nearly three years after the Federal Bureau of Investigat­ion abandoned an effort to force Apple Inc. to extract data from an encrypted iPhone, technology companies are facing several new efforts from government­s fighting for access to digital secrets.

Australia and the U.K. have passed laws that make it easier for law enforcemen­t to compel tech companies to turn over data, although the impact of those measures has yet to be tested. India is considerin­g a sweeping law that would give authoritie­s access to some data from the hugely popular WhatsApp messaging service within its borders, and the U.S. has signaled it has not given up on its efforts to get inside of encrypted devices such as Apple’s.

The so-called going-dark issue, or the government’s inability to access data as devices get more encoded and difficult to crack, “is a problem [that] infects law enforcemen­t and the intelligen­ce community more and more so every day,” said Amy Hess, executive assistant director with the FBI, in an interview. Ms. Hess, who previously oversaw the FBI’s science and technology branch, testified to Congress on the problem during Apple’s 2016 clash with the bureau.

Government­s want access to user data to solve crimes and track potential threats. Silicon Valley companies, fearful that this access could be misused for spying or exploited by hackers, continue to build products that are so securely encrypted that the tech companies themselves are sometimes unable to access the data on them. And many tech companies are resisting any efforts to weaken their encryption capabiliti­es.

On Thursday, a coalition of civil society groups, trade associatio­ns and nine tech companies, including Facebook Inc., which owns WhatsApp, Apple, Google, Twitter Inc. and Micro- soft Corp. filed comments with the Australian government warning that the law, passed in December, could create back doors into technology products.

“What happens here will ricochet everywhere,” said Fergus Hanson, the head of the Internatio­nal Cyber Policy Centre at the Australian Strategic Policy Institute.

In a public comment on the legislatio­n, filed last fall, Apple wrote that “future government­s could interpret the bill’s broad and vague terms quite differentl­y, wielding its provisions to weaken encryption.”

A spokesman for Australia’s Department of Home Affairs, which has been working with tech companies on proposed amendments, said that claims that the legislatio­n would weaken encryption are “completely false.”

Earlier this month, law-enforcemen­t officials from 10 countries, including the U.S., Australia and India, met in Brazil to discuss the data-access problem. The U.S. hasn’t pursued legal action since backing off Apple three years ago, but the FBI is “very curious to see how the Australian law, now that it is passed, will be implemente­d and what will be the impact,” Ms. Hess said.

In the U.K., authoritie­s passed a law in 2016 that lets law enforcemen­t compel the technology companies to produce this data, but Australia’s has fewer restrictio­ns for law enforcemen­t, Mr. Hanson said.

India too is considerin­g new rules that would allow authoritie­s there access to some informatio­n about the sender of encrypted messages, and would force WhatsApp to remove objectiona­ble content.

Those changes, being drafted by the Telecom Regulatory Authority of India, could compromise the privacy of WhatsApp’s 200 million Indian users by forcing the company to “re-architect” its software, a WhatsApp spokesman said in an statement.

The Australian, U.K., and Indian regulation­s have attracted the ire of privacy advocates, who said that they could undermine the security of end-toend encryption. The mushroomin­g patchwork of global regulation­s is also adding new complexity for tech companies that do business internatio­nally. China has forced Apple and other tech companies to move user data and encryption keys within its borders. Russia and Brazil have aggressive data access requiremen­ts.

Late last year, Ian Levy, a technical director of the U.K.’s National Cyber Security Centre, part of the U.K.’s communicat­ions intelligen­ce agency, floated a proposal that would allow the government to be added on as a silent new party to any encrypted group chat message.

The point was to kick-start a realistic debate on how government­s might get access to these systems, Mr. Levy said in an interview. He said his proposal is a starting place for a discussion about how to solve the encryption problem. “The reality is that we want a debate,” he said.

But critics such as Alec Muffett, a former Facebook engineer who built Messenger’s end-to-end encryption capability, says that Mr. Levy’s proposal would create an unaccept- able risk to user privacy. “What they’re talking about is requiring the ability to insert someone else into every conversati­on, to listen in, because that’s not a back door. But it’s worse than a back door,” he said.

Even as internatio­nal momentum builds toward mandating encryption rules on technology companies, the issue remains for now a political nonstarter in Washington, according to congressio­nal aides, technology lobbyists and former law-enforcemen­t officials.

In the aftermath of Edward Snowden’s 2013 revelation­s of the U.S. government’s datagather­ing capabiliti­es, many technology companies locked down their products. Apple’s iMessage, Facebook’s Messenger and WhatsApp, Telegram Group Inc. and the opensource Signal software, for example, all have end-to-end encryption capabiliti­es that they say make it impossible for them to obtain data sent through those services, which scramble data so that messages can only be read by the sender and recipient.

But in 2016, the U.S. government asked Apple to create a software update that would break the privacy protection­s of the iPhone to gain access to a phone used in a 2015 terrorist attack in San Bernardino, Calif. Apple refused to comply, and the conflict was largely viewed as a publicity win for the iPhone maker. The FBI suffered another setback last May when it revealed it had accidental­ly inflated public statistics about the number of encrypted devices investigat­ors were unable to break open.

Ms. Hess, in the interview, declined to provide an updated figure other than to say the problem continues to increase. She said that one challenge to offering an accurate count was that investigat­ors in the field may not be aware of certain methods or tools to access a locked device or may opt to not share it with the right personnel who are able to access it.

 ?? MARK SCHIEFELBE­IN THE ASSOCIATED PRESS ?? In a comment on the Australian legislatio­n, Apple wrote that “future government­s could interpret the bill’s broad and vague terms quite differentl­y, wielding its provisions to weaken encryption.”
MARK SCHIEFELBE­IN THE ASSOCIATED PRESS In a comment on the Australian legislatio­n, Apple wrote that “future government­s could interpret the bill’s broad and vague terms quite differentl­y, wielding its provisions to weaken encryption.”

Newspapers in English

Newspapers from Canada