Government should lift crypto export controls and repeal Net Censorship Legislation Dr Michael Baker Board Member, Electronic Frontiers Australia Sydney,

Slides:



Advertisements
Similar presentations
Do the anti-circumvention provisions of the Digital Millennium Copyright (DMCA) Act further or harm public interests?
Advertisements

IMPS Information Management and Policy Services Information Services Directorate A briefing for all University staff November 2004 New Information Legislation.
Cybercrime Conference Jakarta 19/20 March 2003 Joe McNamee European Perspective.
Tradition innovation Online Branding Kate Legg Solicitor.
The International Security Standard
Throwing Open the Doors: Strategies and Implications for Open Access Heather Joseph Executive Director, SPARC October 23, 2009 Educause Live 1.
Security Vulnerabilities and Conflicts of Interest in the Provider-Clearinghouse*-Payer Model Andy Podgurski and Bret Kiraly EECS Department & Sharona.
Net Neutrality, What Else? Wim Nauwelaerts Partner Hunton & Williams.
Electronic Commerce What is it?. What is a contract? A legally binding agreement between two or more people or organisations Terms of a contract may be.
Eneken Tikk // EST. Importance of Legal Framework  Law takes the principle of territoriality as point of departure;  Cyber security tools and targets.
Unlawful Internet Gambling Enforcement Act Final Rule Joseph Baressi June 3, 2009.
Consumers Online: Privacy, Security and Identity Professor Margaret Jackson and Marita Shelly Presentation to the RMIT Financial Literacy, Banking & Identity.
Information security An introduction to Technology and law with focus on e-signature, encryption and third party service Yue Liu Feb.2008.
Legal Issues and Export Controls Career-Ending Opportunities and Ways to Get Fitted for an Orange Jumpsuit David Lombard Harrison, Associate Vice President.
Chapter 10 White-Collar and Organized Crime. Introduction ► White-collar crimes – criminal offenses committed by people in upper socioeconomic strata.
Film,Video and Computer Games Classification Regulation.
MEDIA LAW Copenhagen University SESSION 10 Dirk VOORHOOF Ghent University (->contact)
The role of the Office of the Privacy Commissioner in telecommunications Andrew Solomon Director, Policy.
University of Pennsylvania Department of Bioengineering Security Concerns, Scientific Societies, and Globalization Kenneth R. Foster Department of Bioengineering.
Empowering Tomorrow’s Consumers Consumers International World Congress May Hong Kong World Bank Global Program on Consumer Protection & Financial.
SMART GRID: Privacy Awareness and Training – A Starting Point for Utilities October 2011 SGIP-CSWG Privacy Group 1.
Imperial College Web Review Imperial College.... An audience-focused realignment of our web strategy with our College strategy, our market, technology.
Encryption Export Controls in the US Preliminary Research.
Management of the Internet
Data Protection Paul Veysey & Bethan Walsh. Introduction Data Protection is about protecting people by responsibly managing their data in ways they expect.
Data Protection and Cybercrime The dilemma of Internet Service Providers CEENET Workshop 22 September 2002 Joe McNamee Regulatory Affairs Manager, EuroISPA.
Media and Public Health Law. Law of Defamation Defamation –Exposes an individual or an organization to hatred or contempt. –Lowers an individual in the.
Information Security Group DSD & E-Security DSD and E-Security Tim Burmeister Information Security Policy Defence Signals Directorate
New copyright challenges for the users digital works Dragutin Nemec Library of the Faculty of law in Zagreb LIBRARIES IN THE DIGITAL AGE (LIDA) 2007.
Chapter 17.3 Regulating the Internet. Internet Speech ► Free speech is a key democratic right. The Internet promotes free speech by giving all users a.
Planning and submitting a shadow report Charlotte Gage Women’s Resource Centre.
Online infringement of copyright - the Digital Economy Act June 2010 Robin Fry.
CS 4001Mary Jean Harrold1 Class 8 ŸQuestions about term paper—list of possible topics available later today ŸCommunications discussion ŸCommunications.
HIPAA PRIVACY AND SECURITY AWARENESS.
Intangible Technology Transfer and Catch-All Controls June 18, 2003 Timothy Clinton Export Policy Analyst U.S. Department of Commerce.
Privacy Codes of Conduct as a self- regulatory approach to cope with restrictions on transborder data flow Dr. Anja Miedbrodt Exemplified with the help.
1 National Electronic Commerce Strategies The Malaysian Experience Ho Siew Ching Ministry of International Trade and Industry Malaysia Expert Meeting on.
CLOUD AND SECURITY: A LEGISLATOR'S PERSPECTIVE 6/7/2013.
COPYRIGHT LAW 2004 Professor Fischer CLASS of April : TECHNOLOGICAL PROTECTION MEASURES.
1 Freedom of Information (Scotland) Act 2002 A strategic view.
CS 4001Mary Jean Harrold1 Class 24 ŸFreedom of speech in cyberspace ŸAssign ŸAssignment 8—due today ŸTerm paper—due 11/20.
Marketing Management Online marketing
2 nd International Summer School Risks and Challenges of the Network Society Karlstad University and HumanIT Theme: Service Provider Responsibility for.
Technology and Consumer Rights in Copyright By Dr. Michael Seadle Michigan State University Libraries.
National Smartcard Project Work Package 8 – Corporate Structures Report.
University of Murcia 8 June 2011 IPv6 in Europe Jacques Babot European Commission - DG INFSO Directorate, Emerging Technologies and Infrastructures.
The European influence on privacy law and practice Nigel Waters, Pacific Privacy Consulting International Dimension of E-commerce and Cyberspace Regulation.
Content Control. Extreme Regimes Myanmay (Burma) - Possession of modem without permission punishable by years gaol Cuba - Internet access only through.
EXPORT CONTROLS License Exclusions Eileen Nielsen Director of Sponsored Projects Compliance Office of Financial Services Harvard School of Public Health.
B UNDES W ETTBEWERBS B EHÖRDE SOFIA COMPETITION FORUM 12 TH N OVEMBER 2012.
 Ethics is a broad philosophical concept that goes beyond simple right and wrong, and looks towards "the good life".  Cyber Ethics deals with the philosophy.
Unlocking IP 2006 “Emerging Licence Models in the Schools Sector” National Education Access Licence for Schools (NEALS) Delia Browne National Copyright.
Copyright © 2007 Pearson Education, Inc. Slide 3-1 E-commerce Kenneth C. Laudon Carol Guercio Traver business. technology. society. Third Edition.
Ne Ad Developing and implementing corporate governance codes of best practice in MENA The Importance of the Consultation Process Ken Rushton, Nestor Advisors.
Aiia : voice of the digital economy ASR: voice of services in Australia Presented by Kaaren Koomen Director, Australian Services Roundtable Director (Alternate),
Data protection and compliance in context 19 November 2007 Stewart Room Partner.
APEC vs APT?: The struggle for regional privacy standards Graham Greenleaf ‘Terrorists & Watchdogs’ Conference, 8 September 2003.
Information Security Legislation Moving ahead Information Security 2001 Professional Information Security Association Sin Chung Kai Legislative Councillor.
Governance and Sovereignty: North American Perspectives Prepared by Michael Mac Neil For International Dimensions of Internet and e-Commerce Regulation,
University of Sunderland MSc HIM Computer Legislation.
Information and Network security: Lithuania Tomas Lamanauskas Deputy Director Communications Regulatory Authority (RRT) Republic of Lithuania; ENISA Liaison.
Australia’s civil space policy environment and the review of the Space Activities Act 1998 Dr Anne Byrne, General Manager, Manufacturing and Services Policy.
-1- WORKSHOP ON DATA PROTECTION AND DATA TRANSFERS TO THIRD COUNTRIES Technical and organizational security measures Skopje, 16 May - 17 May 2011 María.
Privacy and ‘Big Data’: the European perspective Human Subjects’ Protections in the Digital Age: IRB, Privacy and Big Data Peter Elias, University of Warwick.
Surveillance around the world
Privacy and Security in the Employment Relationship
Outcomes from the Review of the NIS
Cyber Issues Facing Medical Practice Managers
Presentation transcript:

Government should lift crypto export controls and repeal Net Censorship Legislation Dr Michael Baker Board Member, Electronic Frontiers Australia Sydney, 2 August

Introduction to help industry –lift crypto export controls since call for papers –Net censorship legislation to help industry and government –repeal Net censorship legislation

Looking at many forum topics Internet services for government Services for Government via the Internet Services for clients of the government, via the Internet What should the government do to help industry provide Internet services? How can the government run better via the Internet? What can the Government teach companies about the Internet? What is happening around the world and in the labs?

Crypto Summary Current Export Controls serve no useful purpose. Global effect is to risk information, security and communications privacy. De-regulation essential for E- Commerce.

Why is crypto important? Privacy - communications and stored data Authentication - E-commerce

Australian Public Policy Characterised by silence Players include Attorney-General, NOIE, DFAT, DSD, Defence No published policy on encryption Crypto export controls Walsh Report 1997 OECD Cryptography Principles supported

Walsh Report Title: Review of Policy Relating to Encryption Technologies Author: Gerard Walsh, former deputy director of ASIO Review conducted Jul-Aug 1996 Report printed by AGPS Feb 1997 for public comment Distribution stopped by A-G

Walsh Report - The Saga Censored copy obtained by EFA in June 1997 Published on Internet Media coverage: A-G claims not meant for public release Library deposit copies found Dec. 98

Walsh Report - The Saga Uncensored version published on Internet Jan 99 Ausinfo claims copyright infringement Feb 99. EFA affirms right to publish Ausinfo claim withdrawn

Walsh Report - The Detail "Design flaws" in US key recovery proposals. Export controls of dubious value Legalised "hacking" should be allowed to agencies. Such recommendations were censored for national security reasons.

Walsh Report - The followup Largely silence ! No further attempts at public debate ASIO Act Amendments 1999 implement "hacking" recommendation Internet facilitates surveillance LEA's - forget cryptanalysis, go for the plaintext ?

What Purpose Controls? Export controls are in place to prevent the export of (unauthorised) controlled goods and technologies. DEPARTMENT OF DEFENCE AUSTRALIAN EXPORT CONTROLS March

Policy Objective To prevent proliferation of strong cryptography for unlawful purposes.

The Official Rationale If you knew what we knew, you'd agree with us.

Failures of Current Policy Unenforceable Strong crypto already widespread Targets the law-abiding Intangible exports uncontrolled Increased risk of information warfare Chilling effect on E-commerce development

Other Policy Problems No policy guidelines available Case-by-case evaluation Key escrow/key recovery "encouraged" No industry consultation on policy No review of costs, benefits, risks

Dangers of government access Security Risk Liability Issues Risk of privacy infringement Risk of unlawful surveillance Costly Technological problems

Points of vulnerability Weaken the value of the encryption Less secure Difficult to use Key recovery requirements can be evaded Circumvent with double encryption Dangers of government access

Costly infrastructure Negatively affects industry's competitiveness Not feasible for ephemeral keys Deters overseas customers (Lotus Notes example) Disadvantages exporters Dangers of government access

What is Wassenaar? Basis for Australian DSGL 33 nations as signatory Replaced COCOM 1996 Not intended to impact on commerce Directed against offensive weapons Amended December

General Software Note Prior to 1998 exempted mass market and public domain software Now only exempts public domain Was previously ignored by 5 of the 33 signatories: USA, Russia, France, New Zealand, Australia

Scope of Wassenaar? Article 4, Initial Elements: Will not impede bona fide civil transactions Will not interfere with legitimate means of defence

Scope of Wassenaar? Cryptography is not a weapon Cryptography is a defensive tool

Intangible Exports Uncertain legal position Customs Act limitations Intangible goods difficult to distinguish from ideas Academic freedom issues UK has current proposals

Australia Disadvantaged The Wassenaar provisions are being flexibly interpreted by other countries, e.g. Ireland Germany Canada Israel (not a Wassenaar signatory) France

Inconsistency Current application of export controls is inconsistent internationally and is disadvantaging Australian business.

Are export controls effective? What is the policy objective? –preventing proliferation of strong cryptography for unlawful purposes –preventing widespread adoption of strong cryptography for lawful purposes Widely available. Has prevented development of global standards.

Cryptography is Widely Available The basic mathematical and algorithmic methods for strong encryption (without key recovery) are published and well known and can easily be implemented in software by any bright high-school student with access to a personal computer. Industry Canada Report

Cryptography is Widely Available Strong encryption software is already widely available on the Internet, for anyone to download, for free.

Controls impede adoption of crypto Fragmented market Reduces competition Counter to competition policy

No Support for Controls There is no popular consensus, outside the law enforcement or national security communities, that regulation of cryptography is needed

Organisations Opposing Controls Internet Architecture Board (IAB) Internet Engineering Steering Group (IESG) International Federation for Information Processing (IFIP) National Research Council, USA OECD

Institute of Electronics and Electrical Engineers (IEEE) American Association for the Advancement of Science The Internet Society (ISOC) Global Internet Liberty Campaign (GILC) Organisations Opposing Controls

Australian Computer Society (ACS) Australian Information Industry Association (AIIA) US Association for Computing Machinery (USACM) Americans for Computer Privacy (US industry lobby group) Organisations Opposing Controls

Alternatives to Controls Using court orders to gain access to keys Enforcing existing laws on surrender of information Gathering information by means other than examining encrypted files Cryptanalysis

What should government do? Current Export Controls serve no useful purpose De-regulation essential for E-Commerce Public policy debate needed Lift crypto export controls

Net Censorship Legislation Complaints based Prohibited content based on Film & Video video classification scheme Takedown orders on ICHs for prohibited content in Australia Blocking orders on ISPs for prohibited content outside Australia Industry Codes for ICHs and ISPs

Will it be effective? ABA's additional funding will only allow classification of small part of potentially prohibited material Easy to circumvent any blocking

Will it cause damage? Uncertainty for content providers Movement of content overseas Increased costs for ISPs, especially small ISPs Less competition Adverse effect on "balance of traffic" Increased costs Malaysia and Canada won't regulate

What ICHs & ICPs will have to do ICHs - respond to take down orders Content Providers - covered by matching state legislation Content Providers - beware “Adult themes”

What should government do? Amend legislation by removing –content classification –takedown orders –blocking orders Would gut the legislation Repeal the legislation

Conclusion What should the government do to help industry provide Internet services? Lift crypto export controls Repeal Net Censorship Legislation