The United Kingdom is no stranger to policy 聽debates over encryption. Since the early 2000s,聽U.K. lawmakers have debated encryption鈥檚 privacy聽and cybersecurity benefits, as well as the obstacles聽it can create for law enforcement and intelligence聽investigators. The recent increase in the availability聽of default device encryption and end-to-end聽messaging services (messaging apps where only聽the users have the keys to decrypt their messages)聽has led to growing concern by law enforcement聽and intelligence investigators about how best聽to address situations where only the subjects of聽investigations themselves may possess the keys to聽their encrypted data. These concerns have prompted聽renewed debate and lawmaking in the U.K. around聽encryption.
January 2015 saw the escalation of the encryption聽fight in a number of nations around the world,聽including the U.K. Not long after the introduction聽of default iPhone encryption in the U.S., and just聽days after the Charlie Hebdo shooting in Paris had聽renewed fears of terrorism across Europe, Prime聽Minister David Cameron spoke out. His comments聽suggested that there should be no 鈥渕eans of聽communication鈥 which 鈥渨e cannot read,鈥 and聽were widely interpreted to suggest a legal ban on聽end-to-end encrypted messaging apps.聽These聽remarks sparked concern that the U.K. government聽was mounting an anti-encryption policy push.聽That same week, Cameron reportedly pressed the聽issue in a visit with U.S. President Barack Obama,聽demanding greater cooperation from Silicon Valley聽companies to support the U.K.鈥檚 anti-terrorism聽efforts.聽
In this climate of increased attention to encrypted聽communications, the bill that would eventually聽become the Investigatory Powers Act (IPA)聽was introduced in Parliament in late 2015. The聽Investigatory Powers Bill (as it was called before it聽was passed into law) sought to authorize sweeping聽new surveillance powers while forcing internet聽service providers (ISPs) to retain their customers鈥櫬爎ecords for 12 months. Nicknamed the 鈥淪noopers鈥櫬燙harter鈥 by the press and civil society, the bill聽also explicitly authorized both targeted and聽mass computer hacking that a variety of British聽intelligence and law enforcement agencies had聽already been secretly engaging in for years. Most聽relevant to the current debate on encryption,聽it authorized cabinet ministers to issue secret聽orders to a broadly-defined set of communications聽service providers (CSPs) requiring that they create聽and maintain the capability to assist with lawful聽surveillance, including having the capability to聽decrypt their users鈥 encrypted communications. The聽final version of the bill passed in November 2016聽despite strong criticism from some of the world鈥檚聽biggest tech companies,聽a large number of civil聽society organizations, and three United Nations聽special rapporteurs.
The IPA came into force on December 30, 2016,聽but confusion over this law remains, primarily聽because it is still unclear whether, when, or how the聽government may use the IPA to compel providers聽to redesign their encrypted services to facilitate聽government access. Meanwhile, new domestic聽terrorist incidents, such as the March 2017 attack聽outside of the Houses of Parliament, prompted聽renewed statements against encryption from Home聽Secretary Amber Rudd, even before it was known聽if encryption played a role in the attacks. Theresa聽May, who was the IPA鈥檚 primary champion when she聽served as Home Secretary, is now Prime Minister,聽and her party鈥檚 manifesto for the recent election聽vowed to end safe spaces for terrorists online, which聽some have interpreted as referring to the use of聽encryption. Suffice to say, end-to-end messaging聽services and device encryption tools are likely to聽face resistance from government officials in the U.K.聽for the foreseeable future.
聽aims to summarize the state of the聽encryption debate in the U.K., in order to enable聽comparison with similar debates in the U.S.,聽Germany, and France, and to see what lessons聽from the British experience might be applied by聽advocates and policymakers that continue to聽defend encryption both in the U.K. and elsewhere.聽First, the paper will examine the U.K. laws and聽regulations in force today that impact encryption,聽trying to gauge the extent to which they may聽require the re-engineering of products to include聽backdoors or be used to prohibit encrypted products聽without backdoors (what we鈥檒l collectively call聽鈥渦ndermining encryption鈥).
The paper will then provide additional political聽background on the state of the debate, describing聽how it got to the point where it is now, identifying聽the parties to the debate and their arguments,聽and making predictions about the future of the聽U.K. encryption debate. It will end with strategic聽recommendations for advocates of encryption about聽how to address threats to encryption and how pro-encryption groups can be more effective.
国产视频 the Series
The right to use strong encryption technology鈥攍ike the encryption that secures your iPhone or protects your Whatsapp
messages鈥攊sn鈥檛 only under political attack in the United States. Governments in the United Kingdom, Germany, France, and other European countries have recently taken steps toward undermining encryption. In particular, a range
of government stakeholders have been pressing for service providers to re-engineer their encrypted products so that
they always hold a key to their users鈥 data鈥攐ften referred to as a 鈥渒ey escrow鈥 scheme, or 鈥渆xceptional access,鈥 or a
鈥渂ackdoor鈥濃攐r to simply not offer such products at all.聽
Although these local debates have engaged a wide range of policymakers, privacy advocates, and internet companies,
they鈥檝e been taking place largely in isolation from each other, with limited sharing of information, arguments, and
advocacy tactics between those countries鈥 policy communities. These papers will fill in some of those gaps by mapping
the legal landscape and political dynamics around encryption in various European capitals. This is the first of those
papers, focused on the . The other papers in the series cover the encryption
debates in Germany and France.