Vancouver Sun

MASSIVE LNG PLANT FOR B.C.

ALARM RAISED ‘Five Eyes’ allies want ‘backdoor’ on tech devices

- STUART THOMSON sxthomson@postmedia.com Twitter.com/stuartxtho­mson

OTTAWA • Canada joined its intelligen­ce allies recently in demanding that technology companies co-operate with law enforcemen­t agencies in allowing access to encrypted communicat­ions, like Facebook and text messages, heating a long-simmering controvers­y.

Cybersecur­ity experts, privacy advocates and even the companies themselves insist there’s no way to build “backdoors” into consumer electronic­s without compromisi­ng the overall security of the device.

“Any backdoor that’s there for good guys can always be exploited by bad guys,” said Matthew Dubé, the NDP critic for public safety.

The issue has been making headlines since 2016 when Apple successful­ly pushed back against an FBI request to circumvent iPhone security features on a device belonging to one of the perpetrato­rs of the San Bernardino shooting. The FBI eventually cracked the phone using other methods. Intelligen­ce agencies have been demanding this kind of access since the early ’90s.

In late August, the Five Eyes intelligen­ce alliance — comprised of Australia, Canada, New Zealand, the United Kingdom and the United States — issued a renewed call for “lawful access to informatio­n” to keep its citizens safe.

“Privacy is not absolute,” the communiqué reads, adding that the countries “may pursue technologi­cal, enforcemen­t, legislativ­e or other measures to achieve lawful access solutions” if companies don’t co-operate.

To some experts that sounds like a threat, but Canadian officials say it’s just a request and reject the idea that they’re requesting backdoors.

“Encryption is critical to safeguardi­ng our cybersecur­ity, privacy and the digital economy. However, it has also created gaps for law enforcemen­t and national security agencies,” said Scott Bardsley, the press secretary for Public Safety Minister Ralph Goodale, in an emailed statement. Goodale’s office declined an interview request.

Bardsley said the allies want to “explore shared solutions with industry while protecting our cybersecur­ity and respecting individual­s’ rights and freedoms.”

Whether or not a backdoor has been requested has become a topic of debate, but most experts agree there is little distinctio­n between a backdoor built into a device’s encryption algorithm and a tool that circumvent­s the encryption.

Although similar requests for co-operation have been made in the past, that “is the most aggressive call we’ve seen,” said Tamir Israel, a lawyer at the Canadian internet Policy and Public Interest Clinic.

The big change, according to Israel, is that government­s are now saying “fix it for us or we will fix it for you.” That’s led to concerns among privacy experts that the government will try to legislate a requiremen­t for tech companies to build backdoors for law enforcemen­t.

When encryption is done properly, the informatio­n on the device will not even be visible to the company that made it. The government would essentiall­y be asking them to hack their own products.

“They’re clueless. They think they can fix the problem? I don’t even know what that means,” said Ann Cavoukian, a former Ontario privacy commission­er and head of the Privacy by Design Centre of Excellence at Ryerson University. “You can’t just create the odd backdoor” without compromisi­ng everything, said Cavoukian.

Israel said the idea that there’s a growing technology gap between bad actors and law enforcemen­t is “not an empiricall­y sound statement.” Although encrypted communicat­ions may make things more difficult, it’s counter-balanced by the massive amount of publiclyav­ailable informatio­n on the internet that can be a gold mine for investigat­ors.

The Canadian government could also hope that some other country solves the problem for them by passing a similar law, Israel said.

Because the security features are such a fundamenta­l part of any device, it would be impractica­l to build and rebuild on a country-by-country basis. If a country passes legislatio­n that requires security changes, each company would have to decide whether to play ball or withdraw the product from the country entirely.

Right now, all eyes are on Australia, which is moving ahead with legislatio­n that includes three important measures for law enforcemen­t. The first, to create a process for voluntary requests to tech companies; second, a process for requiring co-operation using the company’s existing capabiliti­es; and third, a mechanism that forces companies to create new tools to bypass security on a device.

The bill doesn’t target encryption algorithms directly, instead finding other ways to bypass the device’s security. Security experts have been sounding the alarm about the proposed legislatio­n, saying it could encourage bad actors to use similar tactics as the ones that would be available to law enforcemen­t.

In 2015, a paper in the Journal of Cybersecur­ity compared these kinds of requiremen­ts to leaving a house key under the doormat. It’s convenient if someone forgets their key, but it also seriously compromise­s the overall safety of the people living in the house.

ANY BACKDOOR THAT’S THERE FOR GOOD GUYS CAN ALWAYS BE EXPLOITED BY BAD GUYS.

Newspapers in English

Newspapers from Canada