Skip to main content
Donate Now

To: Senator the Hon. George Brandis
Attorney General of Australi

Hon. Christopher Finlayson
Attorney General of New Zealand

Hon. Ralph Goodale
Minister of Public Safety and Emergency Preparedness of Canada

Hon. John Kelly
United States Secretary of Homeland Security

Rt. Hon. Amber Rudd
Secretary of State for the Home Department, United Kingdom

 

CC: Hon. Peter Dutton, Minister for Immigration and Border Protection, Australia;

Hon. Ahmed Hussen, Minister of Immigration, Refugees, and Citizenship, Canada;

Hon. Jeff Sessions, Attorney General for the United States;

Hon. Jody Wilson-Raybould, Minister of Justice and Attorney General, Canada;

Hon. Michael Woodhouse, Minister of Immigration, New Zealand

 

To Ministers Responsible for the Five Eyes Security Community —

In light of public reports about this week’s meeting between officials from your agencies, the undersigned individuals and organizations write to emphasize the importance of national policies that encourage and facilitate the development and use of strong encryption. We call on you to respect the right to use and develop strong encryption and commit to pursuing any additional dialogue in a transparent forum with meaningful public participation.

This week’s Five Eyes meeting (comprised of Ministers from the United States, United Kingdom, New Zealand, Canada, and Australia) discussed “plans to press technology firms to share encrypted data with security agencies” and hopes to achieve “a common position on the extent of ... legally imposed obligations on … device-makers and social media companies to co-operate.”[1] In a Joint Communiqué following the meeting, participants committed to exploring shared solutions to the perceived impediment posed by encryption to investigative objectives.[2]

While the challenges of modern day security are real, such proposals threaten the integrity and security of general purpose communications tools relied upon by international commerce, the free press, governments, human rights advocates, and individuals around the world.

Last year, many of us joined several hundred leading civil society organizations, companies, and prominent individuals calling on world leaders to protect the development of strong cryptography. This protection demands an unequivocal rejection of laws, policies, or other mandates or practices—including secret agreements with companies—that limit access to or undermine encryption and other secure communications tools and technologies.[3]

Today, we reiterate that call with renewed urgency. We ask you to protect the security of your citizens, your economies, and your governments by supporting the development and use of secure communications tools and technologies, by rejecting policies that would prevent or undermine the use of strong encryption, and by urging other world leaders to do the same.

Attempts to engineer “backdoors” or other deliberate weaknesses into commercially available encryption software, to require that companies preserve the ability to decrypt user data, or to force service providers to design communications tools in ways that allow government interception are both shortsighted and counterproductive. The reality is that there will always be some data sets that are relatively secure from state access. On the other hand, leaders must not lose sight of the fact that even if measures to restrict access to strong encryption are adopted within Five Eyes countries, criminals, terrorists, and malicious government adversaries will simply switch to tools crafted in foreign jurisdictions or accessed through black markets.[4] Meanwhile, innocent individuals will be exposed to needless risk.[5] Law-abiding companies and government agencies will also suffer serious consequences.[6] Ultimately, while legally discouraging encryption might make some useful data available in some instances, it has by no means been established that such steps are necessary or appropriate to achieve modern intelligence objectives.

Notably, government entities around the world, including Europol and representatives in the U.S. Congress, have started to recognize the benefits of encryption and the futility of mandates that would undermine it.[7]

We urge you, as leaders in the global community, to remember that encryption is a critical tool of general use. It is neither the cause nor the enabler of crime or terrorism. As a technology, encryption does far more good than harm. We therefore ask you to prioritize the safety and security of individuals by working to strengthen the integrity of communications and systems. As an initial step we ask that you continue any engagement on this topic in a multi-stakeholder forum that promotes public participation and affirms the protection of human rights.

We look forward to working together toward a more secure future.

Sincerely,
83 civil society organizations and eminent individuals (Listed Below)

 

Organizations:

Access Now

Advocacy for Principled Action in Government

Amnesty International

Amnesty UK

ARTICLE 19

Australian Privacy Foundation

Big Brother Watch

Blueprint for Free Speech

British Columbia Civil Liberties Association (BCCLA)

Canadian Civil Liberties Association (CCLA)

Canadian Journalists for Free Expression (CJFE)

Center for Democracy and Techology

Centre for Free Expression, Ryerson University

Chaos Computer Club (CCC)

Constitutional Alliance

Consumer Action

CryptoAustralia

Crypto.Quebec

Defending Rights and Dissent

Demand Progress

Digital Rights Watch

Electronic Frontier Foundation

Electronic Frontiers Australia

Electronic Privacy Information Center

Engine

Equalit.ie

Freedom of the Press Foundation

Friends of Privacy USA

Future Wise

Government Accountability Project

Human Rights Watch

i2Coalition

Index on Censorship

International Civil Liberties Monitoring Group (ICLMG)

Internet NZ

Liberty

Liberty Coalition

Liberty Victoria

Library Freedom Project

My Private Network

New America’s Open Technology Institute

NZ Council for Civil Liberties

OpenMedia

Open Rights Group (ORG)

NEXTLEAP

Niskanen Center

Patient Privacy Rights

PEN International

Privacy International

Privacy Times

Private Internet Access

Restore the Fourth

Reporters Without Borders

Rights Watch (UK)

Riseup Networks

R Street Institute

Samuelson-Glushko Canadian Internet Policy & Public Interest

Clinic (CIPPIC)

Scottish PEN

Subgraph

Sunlight Foundation

TechFreedom

Tech Liberty

The Tor Project

Voices-Voix

World Privacy Forum

Individuals:

Brian Behlendorf | Executive Director, Hyperledger, at the Linux Foundation

Dr. Paul Bernal | Lecturer in IT, IP and Media Law, UEA Law School

Owen Blacker | Founder and director, Open Rights Group; founder, NO2ID

Thorsten Busch | Lecturer & Senior Research Fellow, University of St. Gallen

Gabriella Coleman | Wolfe Chair in Scientific and Technological Literacy at McGill University

Sasha Costanza-Chock | Associate Professor of Civic Media, MIT

Dave Cox | CEO, Liquid VPN

Ron Deibert | The Citizen Lab, Munk School of Global Affairs

Nathan Freitas | Guardian Project

Dan Gillmor | Professor of Practice, Walter Cronkite School of

Journalism and Mass Communication, Arizona State University Individuals

Adam Molnar | Lecturer In Criminology, Deakin University

Christopher Parsons | The Citizen Lab, Munk School of Global Affairs

Jon Penney | Research Fellow, The Citizen lab, Munk School of Global Affairs

Chip Pitts | Professorial Lecturer, Oxford University

Ben Robinson | Directory, Outside the Box Technology Ltd and Discovery Technology Ltd

Sarah Myers West | Doctoral Candidate at the Annenberg School for Communication and Journalism

J.M. Porup | Journalist

Lokman Tsui | Assistant Professor at the School of Journalism and Communication, the Chinese University of Hong Kong (Faculty Associate, Berkman Klein Center)

 

[1]https://www.nytimes.com/reuters/2017/06/25/technology/25reuters-australia-security-messaging.html and http://www.theage.com.au/federal-politics/political-news/how-the-turnbull-government-plans-to-access-encrypted-messages-20170609-gwoge0.html.

[2] https://www.publicsafety.gc.ca/cnt/rsrcs/pblctns/fv-cntry-mnstrl-2017/fv-cntry-mnstrl-2017-en.pdf

[3] We have included a copy of that statement and its signatories to this letter, which can also be found at https://securetheinternet.org.

[4] https://judiciary.house.gov/wp-content/uploads/2016/12/20161220EWGFINALReport.pdf. Such efforts will affect law-abiding individuals more aggressively than malicious actors as the latter are more likely to seek out and find secure cryptographic alternatives.

[5] Discouraging the use of encryption facilitates unauthorized access to sensitive personal data, including financial and identity information, by criminals and other malicious actors. Once obtained, sensitive data can be sold, publicly posted, or used to blackmail, exploit, or humiliate an individual. Finally, at a time of ever-growing cybersecurity threats, strong encryption tools are also necessary for the work of human rights activists across the globe. See, https://citizenlab.org/2017/06/reckless-exploit-mexico-nso/; See also http://www.ohchr.org/EN/HRBodies/HRC/RegularSessions/Session29/Documents/A.HRC.29.32_AEV.doc.

[6] Imposing limits on the availability of strong encryption technology or requiring device manufacturers and technology firms to assist governments in gaining access to encrypted data threatens the security of international commerce and business. Economic growth in the digital age is powered by the ability to conduct business securely—both within and across borders. The largest companies in the world rely on strong encryption to ensure trust, authenticate digital interactions, protect financial transactions and their own intellectual property, and maintain the confidentiality of user data. Compelling technology companies to undermine the security of their users will inevitably undermine customer trust in those services. https://www.nytimes.com/2014/03/22/business/fallout-from-snowden-hurting-bottom-line-of-tech-companies.html. States are equally reliant on strong encryption and technical security: encryption protects the integrity of critical national infrastructure, shields sensitive government data, and preserves the confidentiality of law enforcement and intelligence investigations.

[7] A statement on encryption-based challenges to investigative capabilities issued jointly by ENISA and Europol in 2016 concluded that “intentionally weaken[ing] technical protection mechanisms to support law enforcement will intrinsically weaken the protection against criminals as well.” https://www.europol.europa.eu/publications-documents/lawful-criminal-investigation-respects-21st-century-data-protection-europol-and-enisa-joint-statement-0. An Encryption Working Group of the United States House Judiciary & House Energy and Commerce Committees observed that “any measure that weakens encryption works against the national interest.” https://judiciary.house.gov/wp-content/uploads/2016/12/20161220EWGFINALReport.pdf. The former U.S. President’s Review Group on Intelligence and Communications Technology concluded in late 2013 that the Government should actively encourage, rather than discourage, widespread adoption of strong cryptography, a conclusion endorsed by many of the world’s largest technology companies. https://cdn.arstechnica.net/wp-content/uploads/2015/05/cryptoletter.pdf. In a draft 2017 report, the European Parliament’s LIBE committee has proposed requiring—rather than undermining—end-to-end encryption in electronic communication services: http://www.europarl.europa.eu/sides/getDoc.do?pubRef=-%2f%2fEP%2f%2fNONSGML%2bCOMPARL%2bPE-606.011%2b01%2bDOC%2bPDF%2bV0%2f%2fEN, proposed amendment 116. It should be noted that leading technical security experts have similarly concluded that exceptional state access to encrypted data cannot be achieved without a correlating exposure to malicious actors: https://www.schneier.com/academic/paperfiles/paper-keys-under-doormats-CSAIL.pdf.

Your tax deductible gift can help stop human rights violations and save lives around the world.

Region / Country
Tags

Most Viewed