accused of facilitating communication of terrorists, data encryption is in the crosshairs of the Interior Ministers of the European Union.
encryption of communications on certain messengers did not finish embarrass the authorities. Tuesday morning, the Interior Minister Bernard Cazeneuve and his German counterpart Thomas de Maizière presented a joint initiative to strengthen the fight against terrorism in Europe. This plan has three components, one of which dedicated to encryption. Both ministers want especially to propose to the European Commission a law subjecting them online messaging services to the same obligations that telecom operators to force them to work as part of terrorism investigations.
This proposal is not new. Last week, Reuters said that the European Commission wanted to extend the messaging applications or appeals on Internet safety rules and confidentiality applied to telecom operators. In France, they should enable the interception of data of their users as part of judicial investigations or on-demand intelligence. Bernard Cazeneuve said Tuesday will require service online “uncooperative” to “remove illegal content or decrypt messages as part of criminal investigations, as their headquarters in Europe or not.”
Regular collaboration
Web Companies already working with authorities in moderation illegal content. In France, Facebook, YouTube and Twitter are considered hosts. They are obliged to react if a clearly illegal content is reported to them. Social networks are also called upon to collaborate regularly with the authorities under investigation for their transmit data about a user or disturbing messages. In 2015, Facebook received 2711 inquiries from authorities. He responded positively to 54% of them. The social network also blocked 37,695 illegal, 32,100 of which related to the terrorist attacks of 13 November 2015. There are still bad students as Telegram, an application used by some militants of the Islamic State to which States will feature full sanitary privs “of no interlocutor “who request information, according to Bernard Cazeneuve
” “ALSO READ:. Terrorism: how the authorities can spy on a smartphone or PC
the issue of encryption is more complex. This encryption method is used by many online services or electronic manufacturers to protect the data of their users: it is used in banks, to protect financial transactions, such as consumer email applications such as WhatsApp. Apple default figure content iPhone. This generalization encryption is seen with suspicion by many authorities worldwide, who accuse the technology to facilitate communication of terrorist groups and complicate investigations about them. “The operated exchanges must be identified and used in judicial proceedings,” argued Bernard Cazeneuve Tuesday.
An impossible decryption
The principle of encryption called “tip-out to-end “used by some messaging applications, is that only people from across a conversation could decipher his messages. This means that companies that provide encrypted services themselves have no access to exchanges between users. We can not force them to decrypt these messages because they do not have the key. The case has already submitted to Apple. Early this year, a judge called the company access to the encrypted contents of the phone one of the authors of the massacre of San Bernadino. Apple is unable to comply with this order, since not having the unlock code, justice has called him a tool to access the phone without passing through the entry of a password. The company refused, saying that he ordered the creation of a “back door” ( “backdoor”) so that the authorities can freely access the data of all users.
This is those situations that fear encryption defenders in Europe. On Monday, a group of numerical figures, including the presidents of the CNIL and the National Digital Council, warned the risks of government to use backdoors. “Experts (…) agree: it is technically impossible to ensure that such access will be available for the benefit of persons”, he explains. “At any time, they can become true open doors for hackers organizations, mafia and terrorists. Generalize installing backdoors disastrous would thus weaken the security and freedom of all users. “
According to them,” limit encryption to the public then return to give in monopoly organizations who will abuse it. “instead, they call for more cooperation with suppliers of products and secure services to better exploit the information they already have, such as metadata, which they rarely encrypted. “Before consider establishing new legislative, perhaps would it be wise to ensure that security services fully exploit the many opportunities that were offered to them by the legislature,” said the group.
No comments:
Post a Comment