Australia will push “thwarting the encryption of terrorist messaging” at a meeting of the Five Eyes nations in Canada this week. Attorney-General George Brandis and Minister for Immigration and Border Protection Peter Dutton said the need for cooperation from service providers regarding encryption will be raised as a “priority issue” in the security talks betweenAustralia, Canada, New Zealand, the United Kingdom and the United States. “As Australia’s priority issue, I will raise the need to address ongoing challenges posed by terrorists and criminals using encryption. These discussions will focus on the need to cooperate with service providers to ensure reasonable assistance is provided to law enforcement and security agencies,” Brandis said in a statement yesterday. Australia is likely to gain cautious support from other Five Eye member nations. While many back the concept of compelling tech firms to give them access to encrypted data, it is yet unclear how this will work in practice. Each nation must also consider past embarrassments in the area, and likely kick-back from privacy advocates and technology companies. Four Eyes’ view US: Before losing his position as FBI director, James Comey set out the position of the US with regards to encryption, saying an international agreement between governments could ease fears about IT products with government-mandated backdoors. “I could imagine a community of nations committed to the rule of law developing a set of norms, a framework, for when government access is appropriate,” he said at an address at the University of Texas at Austin, in March. Last year, the FBI publiclyfeudedwith Apple over gaining access to a locked iPhone from the San Bernardino shooter. Comey argued said the tech industry can find an approach that creates government access, while keeping malicious actors out. Comey was dismissed by President Donald Trump in May. In 2013, the NSA paid computer security firm RSA $10 million in secret to implement a “back door” into its encryption, a deal exposed in leaks made by Edward Snowden. Canada: In March, Dominic Rochon, chief privacy officer of Canada’s Communications Security Establishment (CSE, comparable to the Australian Signals Directorate) said in a speech that terrorists were “adaptive and tech-savvy” and used “powerful encryption to better avoid detection”. However, a recent national security federal consultation in the country saw majority opposition to weakening encryption technology. “If encryption is weakened or outlawed, criminals will continue to have access to it and it is law-abiding citizens who will suffer. That is a bad outcome,” the Information Technology Association of Canada noted in its submission. United Kingdom: UK Home Secretary Amber Rudd, speaking in the wake of a spate of terrorist attacks in the country, said that tech firms need to “limit the amount of end-to-end encryption that terrorists can use”. The UK has already passed its Regulation of Investigatory Powers Act which put into law a requirement for technology providers to provide the government with a backdoor into end-to-end encryption. However, the government is yet to detail how the act will work in practice and how it will compel overseas providers to comply. New Zealand: The government in New Zealand has not yet stated a firm position on expanding its powers around encryption. In February, Andrew Hampton, director of New Zealand’s Government Communication’s Security Bureau, spoke of the importance of the bureau being “transparent as possible” and accountable for its actions. Dispelling the myth that Five Eyes was a “shadowy intelligence sharing partnership”, Hampton said that it was“just not that shadowy”. “As with all of our activities, any sharing of intelligence with partners needs to be in accordance with New Zealand law and our international human rights obligations,” he said. Not a backdoor Earlier this month, Prime Minister Malcolm Turnbull said that encrypted messaging apps were frequently used by “criminals and terrorists” but “at the moment, much of this traffic is difficult for our security agencies to decrypt”. In a national security statement to the House of Representatives, Turnbull explained that the Five Eyes summit would be used to discuss how to prevent terrorists and criminals from operating “with impunity in ungoverned digital spaces online”. “This is not about creating or exploiting back doors, as some privacy advocates continue to say, despite constant reassurance from us. It is about collaboration with and assistance from industry in the pursuit of public safety,”he added. Related content opinion The Importance of Identity Management in Security By Charles Pelton Nov 28, 2023 5 mins Cybercrime Artificial Intelligence Data Management brandpost Sponsored by Rocket Software Why data virtualization is critical for business success Data is your most valuable resource—but only if you can access it fast enough to address present challenges. Data virtualization is the key. By Milan Shetti, CEO of Rocket Software Nov 28, 2023 4 mins Digital Transformation brandpost Sponsored by Rocket Software The hybrid approach: Get the best of both mainframe and cloud Cloud computing and modernization often go hand in hand, but that doesn’t mean the mainframe should be left behind. A hybrid approach offers the most value, enabling businesses to get the best of both worlds. By Milan Shetti, CEO Rocket Software Nov 28, 2023 4 mins Digital Transformation brandpost Sponsored by Rimini Street Dear Oracle Cloud…I need my own space Access results from a recent Rimini Street survey about why enterprises are rethinking their Oracle relationship and cloud strategy. By Tanya O'Hara Nov 28, 2023 5 mins Cloud Computing Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe