{"id":23854,"date":"2015-12-09T11:00:07","date_gmt":"2015-12-09T00:00:07","guid":{"rendered":"http:\/\/www.aspistrategist.ru\/?p=23854"},"modified":"2016-01-28T14:58:46","modified_gmt":"2016-01-28T03:58:46","slug":"we-cant-stop-life-with-encryption","status":"publish","type":"post","link":"https:\/\/www.aspistrategist.ru\/we-cant-stop-life-with-encryption\/","title":{"rendered":"\u2018We Can\u2019t Stop\u2019: Life with encryption"},"content":{"rendered":"
<\/a><\/p>\n In his recent Strategist<\/em> contribution, David Lang<\/a> nailed a critical, but sadly missing, dimension of the counter terrorism intelligence debate regarding encryption. David put it perfectly when he argued that encryption is a \u2018central contributor to the health of the global economy and business competition\u2019.<\/p>\n And in doing so he possibly rendered redundant Anthony Bergin\u2019s earlier argument<\/a> that the resolution of the encryption problem is about balancing civil liberties and national security in times of heightened threat. I agree with David that encryption is so essential to our economic and societal security that a compromise simply isn\u2019t possible.<\/p>\n But encryption being played as part of the security versus liberty debate is likely symptomatic of three bigger problems for intelligence collection managers: an over-reliance on single source intelligence collection, a preference for technical over human source intelligence and a failure of imagination in collection management.<\/p>\n All of those problems find their genesis in the 1970s. For intelligence and law enforcement agencies, the late 70s were a formative period for interception methodologies. By 1973 there was a telephone in almost three quarters of Australian homes<\/a>. By 1976, Australians had international subscriber dialing allowing global communications without having to access a switchboard operator: providing a new degree of privacy\u2014a point not lost on criminals and national security targets alike.<\/p>\n With new interception technologies in place in the 70s, law enforcement and intelligence agencies had access to a wealth of intelligence. But importantly there was a low likelihood of those authorities being detected collecting this intelligence. In comparison to human source, undercover and surveillance operations, telephone intercepts were a low risk activity.<\/p>\n The threats to privacy posed by telephone interception operations were recognised in Australia by the late 70s, leading to the passage of the Telecommunications (Interception and Access) Act 1979<\/em>. With the arrival of mobile phone technology in the 80s and 90s the collection of intelligence by telephone interception had become the default intelligence source for collection managers and police investigators alike. And naturally so: it provided, cheap, easy and low risk intelligence in real time.<\/p>\n Customers, from the halls of government to investigators in local police stations, became voracious consumers of raw intercept reporting, which allowed a fly on the wall perspective. That also led to a devaluation of human source intelligence which often has less direct access, is prone to interpretation and is less timely.<\/p>\n Broadly, the rise of telecommunication interception intelligence resulted in a decreased focus on human, imagery, technical and open-source intelligence capabilities. It also degraded a range of analytical tools such as traffic analysis<\/a>.<\/p>\n For law enforcement the problems started occurring with the arrival of Blackberry<\/a> and Viber. But the operational challenges of decrypting these particular platforms were symptomatic of a wider strategic reality. The Snowden leaks revealed that the US Government were using a patchwork of tools, backdoors and behind closed door relationships to counter encryption\u2014including efforts allegedly focused on undermining the further development of the technology. Despite these efforts governments could no longer develop decryption technologies fast enough to keep pace with the technology markets. And the evolving forms of internet based communication (such as Chatsecure, Cyrptocat, jitisi) have consistently outpaced<\/a> the available and emerging interception technology.<\/p>\n Federal Bureau of Investigation director, James Comey, has described this new operational reality in terms of interception intelligence sources ‘going dark’<\/a>. Alleged criminal and terrorist targets are now using increasingly sophisticated encryption services which prevent law enforcement and police agencies from intercepting their communications. The interception intelligence sources are no longer shining a light on the covert activities of these targets.<\/p>\n I don\u2019t believe that intelligence agencies want to be \u2018data-holics\u2019 as Anthony alleges. They just want access to real-time, low risk fly-on-the-wall intelligence.<\/p>\n