Police want to read encrypted messages, but they already have significant power to access our data (2024)

This article is part of a series on how law enforcement is fighting crime across digital borders. You can read the rest here.

The Australian government wants new powers to access encrypted communications, but do they need them?

Police and intelligence agencies already have significant abilities to access data about our emails, phone calls and text messages if we’re suspected of committing a crime, although it can be difficult to tell exactly what they’re doing with them.

The government argues existing interception capabilities are inadequate to protect national security. According to Attorney-General George Brandis, backdoor access to encrypted communications would redress the “degradation of our intelligence capability” to prevent terrorism.

Read more: Choose better passwords with the help of science

Many Australians are unaware of current police and intelligence powers when it comes to accessing our data. As the government lobbies for new levels of access, that needs to change.

‘Backdoor’ access

The government’s proposal to compel technology companies to provide access to encrypted messaging services is modelled on laws passed by other members of the Five Eyes surveillance alliance, of which Australia is a member.

Deputy US Attorney-General Rod Rosenstein recently announced the Department of Justice intends to demand interception of encrypted communications. New Zealand already requires technology companies to grant access. In the UK, authorities may force decryption where it is technologically feasible.

As with our allies, it is unclear if Australia’s laws will require so-called “backdoor” vulnerabilities to be built into messaging applications like Facebook Messenger or WhatsApp.

They could compel access via decryption keys or they might enable remote access to devices for interception of communications “at the ends”.

In response, cryptographers argue it is not mathematically possible to access end-to-end encrypted messages via interception without undermining online privacy for everyone.

Police want to read encrypted messages, but they already have significant power to access our data (1)

The current state of telecommunications surveillance

The government already has various powers to access metadata, the contents of digital conversations and computer networks.

The Attorney-General’s Department recently released its annual report on telecommunications surveillance.

Thanks to the Telecommunications (Interception and Access) Act (TIA Act), law enforcement and other agencies can access stored communications with a warrant. This can include “email, SMS or voice messages stored on a carrier’s network”. In other words, the contents of any communication not encoded via encryption.

Agencies may also apply for “preservation notices” to compel telecommunications companies to preserve data.

During the 2015-16 financial year, there were 712 warrants issued for access to stored communications. Data is not available about the types of offences these warrants were used for. It is also not clear how the telecommunications information was used in investigations.

The issue of metadata retention

A controversial 2015 amendment to the TIA Act requires telecommunication service providers to retain metadata for two years.

This allows authorised law enforcement agencies warrantless access to information about digital communications such as the recipient or time sent, but not their content.

However, some agencies that aren’t meant to be able to access metadata are still making requests under different legal regimes, according to the Communications Alliance, and there have already been reported breaches where an Australian Federal Police officer accessed a journalist’s metadata without an appropriate warrant.

The 2015-16 financial year was a grace period for service providers to comply with retention requirements. During this time, there were 332,639 authorisations by criminal law-enforcement agencies.

Authorisations occurred most for drugs or homicide investigations. It’s possible this may indicate police are relying on ready access to metadata rather than pursuing traditional investigatory methods.

Computer network operations

Recent amendments to the TIA Act also allow the Australian Security Intelligence Organisation (ASIO) and authorised law enforcement agencies remote access to entire computer networks.

These agencies may covertly invade a network to intercept communications at the point they are received. This works whether communications are encrypted or not.

These laws have been criticised as too broad, potentially undermining the privacy of Australians, and have dramatically expanded ASIO’s powers.

It is unclear how often these surveillance powers are exercised due to the secrecy provisions surrounding ASIO operations.

The need for additional surveillance capabilities?

It is clear that Australian law enforcement agencies already have extensive surveillance capabilities. And while many of the details remain secret, we do know these powers are frequently used.

It may be that Australia is becoming a test case for the introduction of broad new powers that mandate backdoors in an attempt to undermine encrypted technology more widely. Unlike other Western democracies such as the US or Canada, Australia has no constitutional protection for human or privacy rights.

Read more: End-to-end encryption isn't enough security for 'real people'

In the meantime, Facebook argues that “weakening encrypted systems would mean weakening it for everyone.” We also know Apple has been lobbying the government to drop the proposal.

Technology companies need to fight back against a government that has considerable appetite to intercept private communications, but has not made a convincing case for why they need these new powers.

Read other stories in this series:

  • Poisoned water holes: the legal dangers of dark web policing
  • It’s too hard to get the data of Australian criminals when it’s stored overseas
  • Virtual child p*rnography could both help and hinder law enforcement
Police want to read encrypted messages, but they already have significant power to access our data (2024)

FAQs

When data has been encrypted What does the recipient need to read the data? ›

Data encryption translates data into another form, or code, so that only people with access to a secret key (formally called a decryption key) or password can read it. Encrypted data is commonly referred to as ciphertext, while unencrypted data is called plaintext.

Who can read encrypted text messages? ›

With end-to-end encryption, your message is encrypted on your device and can only be decrypted by the recipient's device. This means that even the service provider can't access your message. Standard encryption secures your message between your device and the server.

What is the Lawful Access to encrypted Data Act? ›

The Lawful Access to Encrypted Data Act is a balanced solution that protects the constitutional rights of all Americans while providing law enforcement with the tools they need to access evidence necessary to address violent crime and national security threats.

Can a hacker read the contents of an encrypted message? ›

If a cybercriminal finds a vulnerability somewhere along the data transmission path, or by getting their hands on your data encryption keys, your encrypted enterprise data can still be hacked and your systems compromised.

How do you check data is encrypted or not? ›

Examining the storage medium or file properties lets you check if your data is encrypted. Encrypted data appears unreadable gibberish, making it inaccessible without the appropriate decryption key. Data encryption, in its simplest sense, is changing data into a code to avoid unauthorized access.

What happens when your data is encrypted? ›

Encryption is used to protect data from being stolen, changed, or compromised and works by scrambling data into a secret code that can only be unlocked with a unique digital key.

What is the legal right to access data? ›

The right of access, commonly referred to as subject access, gives individuals the right to obtain a copy of their personal data, as well as other supplementary information. It helps individuals to understand how and why you are using their data, and check you are doing it lawfully.

What is the Data Act access right? ›

According to the DA, users have the right to access their data and the data generated by them. If users expressly request this, the above-mentioned third parties must also be authorised to access the user's data.

Is it illegal to encrypt data? ›

One common misconception is that encryption itself is illegal. In reality, encryption is a widely accepted and legal security measure used across industries. However, the use of encryption may be subject to certain regulations, especially in high-security sectors or countries with strict encryption policies.

How do I know if my texts are encrypted? ›

1 Check the app

Other apps, like Android Messages or Samsung Messages, may use encryption only if both parties have the same app and enable a feature called chat or RCS. You can usually tell if an app is using encryption by looking for a lock icon, a blue bubble, or a verification code on the screen.

Can encrypted data be seen? ›

No one else can access your end-to-end encrypted data — not even Apple — and this data remains secure even in the case of a data breach in the cloud. If you lose access to your account, only you can recover this data, using your device passcode or password, recovery contact, or recovery key.

Are all text messages encrypted? ›

Simply put, the Short Message Service (SMS) does not have any encryption, making it inherently insecure. While mobile carriers do protect text messages, it's usually the very basic security of GSM or CDMA. This means it's possible for the network or anyone to intercept SMS messages and read them.

How is data accessible if it is encrypted? ›

After encryption, in order to read or use the concealed data, the code used during encryption must be known. This process is called decryption. Encryption and decryption are used to allow access to data only to those who have the code. To those who do not have the code, the data is unusable.

What is needed to decrypt encrypted data? ›

Decryption Key: To decrypt the data, the recipient or authorized user needs the corresponding decryption key. This key is generated by the encryption algorithm and is essential for reversing the encryption process.

What is the term for this process to read encrypted data the recipient must decipher it into a readable form? ›

Decryption is the process of converting an encrypted message back to its original (readable) format. The original message is called the plaintext message. The encrypted message is called the ciphertext message.

What is the process of decoding data that has been encrypted? ›

After the data is converted from plaintext to ciphertext, it can be decoded only through the use of the proper key. This key might be the same one used for encoding the data or a different one, depending on the type of algorithm -- symmetric or asymmetric. If it's a different key, it's often called a decryption key.

Top Articles
How to Make Your Own Faraday Cage
Capital Asset Management | University Procurement and Logistics
Katie Pavlich Bikini Photos
Gamevault Agent
Hocus Pocus Showtimes Near Harkins Theatres Yuma Palms 14
Free Atm For Emerald Card Near Me
Craigslist Mexico Cancun
Hendersonville (Tennessee) – Travel guide at Wikivoyage
Doby's Funeral Home Obituaries
Vardis Olive Garden (Georgioupolis, Kreta) ✈️ inkl. Flug buchen
Select Truck Greensboro
Things To Do In Atlanta Tomorrow Night
Non Sequitur
How To Cut Eelgrass Grounded
Pac Man Deviantart
Alexander Funeral Home Gallatin Obituaries
Craigslist In Flagstaff
Shasta County Most Wanted 2022
Energy Healing Conference Utah
Testberichte zu E-Bikes & Fahrrädern von PROPHETE.
Aaa Saugus Ma Appointment
Geometry Review Quiz 5 Answer Key
Walgreens Alma School And Dynamite
Bible Gateway passage: Revelation 3 - New Living Translation
Yisd Home Access Center
Home
Shadbase Get Out Of Jail
Gina Wilson Angle Addition Postulate
Celina Powell Lil Meech Video: A Controversial Encounter Shakes Social Media - Video Reddit Trend
Walmart Pharmacy Near Me Open
A Christmas Horse - Alison Senxation
Ou Football Brainiacs
Access a Shared Resource | Computing for Arts + Sciences
Pixel Combat Unblocked
Cvs Sport Physicals
Mercedes W204 Belt Diagram
Rogold Extension
'Conan Exiles' 3.0 Guide: How To Unlock Spells And Sorcery
Teenbeautyfitness
Weekly Math Review Q4 3
Facebook Marketplace Marrero La
Nobodyhome.tv Reddit
Topos De Bolos Engraçados
Gregory (Five Nights at Freddy's)
Grand Valley State University Library Hours
Holzer Athena Portal
Hampton In And Suites Near Me
Stoughton Commuter Rail Schedule
Bedbathandbeyond Flemington Nj
Free Carnival-themed Google Slides & PowerPoint templates
Otter Bustr
Selly Medaline
Latest Posts
Article information

Author: Zonia Mosciski DO

Last Updated:

Views: 5828

Rating: 4 / 5 (71 voted)

Reviews: 94% of readers found this page helpful

Author information

Name: Zonia Mosciski DO

Birthday: 1996-05-16

Address: Suite 228 919 Deana Ford, Lake Meridithberg, NE 60017-4257

Phone: +2613987384138

Job: Chief Retail Officer

Hobby: Tai chi, Dowsing, Poi, Letterboxing, Watching movies, Video gaming, Singing

Introduction: My name is Zonia Mosciski DO, I am a enchanting, joyous, lovely, successful, hilarious, tender, outstanding person who loves writing and wants to share my knowledge and understanding with you.