Europol seeks evidence of encryption on crime enforcement as it steps-up pressure on Big Tech
www.computerweekly.com
European Unionmember states have been asked to gather examples of how encryption technologies are frustrating criminal investigations as police and governments step-up demands for lawful access to end-to-end encrypted messaging services.Europol aims to gather evidence to show how encrypted communication services supplied by tech companies including WhatsApp, Meta and Signal are exploited by criminals to hide their tracks, the agency has confirmed.According to a European Commission working group, law enforcement agencies have struggled to quantify the challenges that end-to-end encryption poses in monitoring the communications of criminals and terrorists, as it has not been possible to collect data.Known examples include the case of Khalid Masood, who conducted the London Bridge attack in 2017, killing 29 people and injuring six.Minutes before the attack, it emerged that he had sent a PDF document entitled Jihad to a large number of his contacts on WhatsApp and Apples iMessage, both of which are encrypted by default.In another case, UK police say their investigation into a rape was hindered because the suspects had used WhatsApp to send encrypted messages.The European Commission confirmed last night that it was seeking to gather examples from European states to show how encryption has disrupted police investigations. A spokesperson said it was not yet clear whether the examples would be released publicly.The move comes as Europols director general, Catherine De Bolle, stepped up public pressure on Big Tech during the World Economic Forum in Davos, Switzerland, calling in a newspaper interview for them to give law enforcement access to encrypted communications and data.De Bolle told the Financial Times that Big Tech companies had a social responsibility to give police access to encrypted messages that were being used by criminals to protect their identity. She claimed that tech companies that did not comply could threaten democracy in Europe.Her comments show the width of the gap between tech companies, computer experts and cryptographers, and police and intelligence agencies. Technology experts argue that any attempt to weaken encryption would put the public and businesses at greater risk from cyber criminals.The European Commissions high level working group, argues that while encrypted apps and devices protect the privacy of legitimate users, they also allow criminals to hide their identities, market illegal products and services, and launder money without detection.Police should be granted lawful and strictly controlled effective access to data, it said. Law enforcement should also be involved in standards bodies to ensure that products are shaped to ensure that the technical requirements of law enforcement are taken into account at an early stage.Cooperation between companies and law enforcement is inadequate and deficient, and needs to be supplemented by clear rules, the groups November 2024 report said. Without clear and enforceable legal obligations, companies are often unable to assist law enforcement in accessing data.The high-level group found the interception of telecommunications is an essential tool in investigations, but its effectiveness has decreased following the take-up of encrypted messaging apps, including WhatsApp, Facebook and WeChat, which account for 97% of messages.Law enforcement experts have suggested a cautious approach, according to the working group. Technology companies should not be asked to integrate into any system likely to systematically weaken encryption for all users of the service. Lawful access should be targeted on a communication by communication basis.There is a need to advance gradually and involve tech companies, cyber security and privacy experts given the potential risks and the sensitivity around public debate, the report argues.De Bolle said that in the physical world, when police have a warrant to search a house, and the door is locked with the criminal inside, the public would demand that police should be able to enter the house. The same principles should apply to messages and data that are locked inside encryption, she argued.European police chiefs and the UKs National Crime Agency warned in a declaration in April 2024 that privacy measures including end-to-end encryption would stop law enforcements ability to prosecute the most serious crimes, including child sexual abuse, drug trafficking, human trafficking, murders, economic crimes, and terrorism.According to the declaration, signed by 32 countries, police chiefs were deeply concerned that end-to-end encryption would undermine the ability of law enforcement and tech companies to detect crime.Companies will not be able to respond effectively to a lawful authority, the declaration states. Nor will they be able to identify or report illegal activity on their platforms. As a result, we will simply not be able to keep the public safe.The police chiefs said they did not accept that there was a binary choice between cyber security and privacy, and public safety, arguing that technical solutions existed that would allow both, if industry and governments were flexible.However, police and government claims that it is possible to provide law enforcement with access to encrypted communications are disputed by technology companies and cryptographic experts.According to security expert Bruce Schneier, Chinese hackers appear to have accessed backdoors used by the US government to execute wire-tapping requests to breach US telecoms networks in the Salt Typhoon attack, posing major security risks to the country.Many of the worlds top computer scientists and cryptographers warned in 2017, for example, that proposals by Apple to scan encrypted messages for illegal content on behalf of law enforcement were unworkable, vulnerable to abuse, and a threat to safety and security.Amandine Le Pape, co-founder of encrypted messaging service Matrix, which is used by police forces, governmentsand military organisations in Europe, told Computer Weekly that degrading encryption to provide access to law enforcement would weaken security for everyone, including police forces.I feel that weakening encryption is a threat to democracy because that gives the opportunity to any state to spy on their citizens, she said. Maybe we can trust our European governments today, but what about tomorrow?Le Page said there are ways for law enforcement to investigate crimes without having to break into encryption, which include monitoring unencrypted chats, social media and analysing meta data from communications.The Matrix founder said that under De Bolles analogy of a locked door in a house, providing law enforcement access to encrypted messages was the equivalent to weakening the lock on the door.If the house has no door, then anyone can come into it, whether its the police or criminals wanting to break in, she said.Cryptowars: Read more about the debate on encryptionCrime agency criticises Meta as European police chiefs call for curbs on end-to-end encryption.ech companies remain concerned about the impact of the bills spy clause, which could require them to scan encrypted messages.Technology companies say reassurances by government ministers that they have no intention of weakening end-to-end encrypted communication services do not go far enough.BCS, The Chartered Institute for IT, argues the government is seeking a technical fix to terrorism and child abuse without understanding the risks and implications.Government boosts protection for encryption in Online Safety Bill but civil society groups remain concerned.CEO of encrypted messaging service Element says Online Safety Bill could pose a risk to the encrypted comms systems used by Ukraine.Tech companies and NGOs urge rewrite of Online Safety Bill to protect encrypted comms.Protecting children by scanning encrypted messages is magical thinking, says Cambridge professor.Proposals for scanning encrypted messages should be cut from Online Safety Bill, say researchers.GCHQ experts back scanning of encrypted phone messages to fight child abuse.Tech companies face pressure over end-to-end encryption in Online Safety Bill.EU plans to police child abuse raise fresh fears over encryption and privacy rights. IT professionals wary of government campaign to limit end-to-end encryption.John Carr, a child safety campaigner backing a government-funded campaign on the dangers of end-to-end encryption to children, says tech companies have no choice but to act.Information commissioner criticises government-backed campaign to delay end-to-end encryption.Government puts Facebook under pressure to stop end-to-end encryption over child abuse risk.Former UK cyber security chief says UK government must explain how it can access encrypted communications without damaging cyber security and weakening privacy.Barnardos and other charities begin a government-backed PR campaign to warn of dangers end-to-end encryption poses to child safety. The campaign has been criticised as one-sided.Apples plan to automatically scan photos to detect child abuse would unduly risk the privacy and security of law-abiding citizens and could open up the way to surveillance, say cryptographic experts.Firms working on UK governments Safety Tech Challenge suggest scanning content before encryption will help prevent the spread of child sexual abuse material but privacy concerns remain.Private messaging is the front line of abuse, yet E2EE in its current form risks engineering away the ability of firms to detect and disrupt it where it is most prevalent,claims NSPCC.Proposals by European Commission to search for illegal material could mean the end of private messaging and emails, says MEP.
0 Comentários
·0 Compartilhamentos
·60 Visualizações