{"id":57060,"date":"2023-04-21T08:19:43","date_gmt":"2023-04-21T08:19:43","guid":{"rendered":"https:\/\/alecmuffett.com\/?p=57060"},"modified":"2023-04-21T18:32:53","modified_gmt":"2023-04-21T18:32:53","slug":"how-the-onlinesafetybills-ofcom-surveillance-measures-can-will-bring-about-public-emasculation-of-the-uk-government-and-a-kind-of-cyberbrexit-effect-ht-ciaranmartinoxf-allanofhallam-wongmj","status":"publish","type":"post","link":"https:\/\/alecmuffett.com\/article\/57060","title":{"rendered":"How the #OnlineSafetyBill&#8217;s OFCOM surveillance measures can (will?) bring about public emasculation of the UK Government and a kind of #CyberBrexit effect (HT: @ciaranmartinoxf @allanofhallam @wongmjane @jamesrbuk)"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">Background<\/h2>\n\n\n\n<p>So I have been reading two recent think-pieces:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>By <a href=\"https:\/\/www.ft.com\/content\/96964279-8011-4d46-9b90-69e016d39e7f\">Ciaran Martin in the FT<\/a> (paywalled, there is <a href=\"https:\/\/archive.is\/FfAFd\">an illegitimate copy archived<\/a>) which broadly discusses the pros and cons of the Government arrogating to itself \u2014 note: its parochial, <em>British,<\/em> self \u2014 the power to mandate client-side filtering of sent and received messages by means of <em>obligate Government spyware<\/em>, and then Mr Martin challenges the Government to describe up-front how it will use those powers so that parliamentarians can see for themselves before passing the powers.<\/li>\n\n\n\n<li>By <a href=\"https:\/\/www.regulate.tech\/online-safety-bill-and-encryption-20th-april-2023\/\">Richard Allan, Baron Allan of Hallam, in his podcast-related blog<\/a>, broadly outlining the same battleground and framing the debate (soon to occur in the House of Lords) in spite of Martin&#8217;s piece, somewhat as being the Home Office seeking wrestling leverage over the platforms:<\/li>\n<\/ol>\n\n\n\n<p class=\"has-pale-cyan-blue-background-color has-background\">Security services are in the market for as much information as they can get and if <strong>the threat of a decryption order may encourage a hesitant company to offer other useful data in order to avoid this being carried out then they will see this as a useful tool.<\/strong><\/p>\n\n\n\n<p>My emphasis. Hallam further writes in the blogpost:<\/p>\n\n\n\n<p class=\"has-pale-cyan-blue-background-color has-background\">As policy makers, this is a situation where \u2018cakeism\u2019 is not the answer and we have to make a choice \u2013 either a) to allow companies to offer genuinely secure end-to-end encrypted communications to people in the UK, or b) to make it clear that the only messaging services on offer will allow some third parties to access your messages without your consent.<br \/><br \/>I believe that <strong>the UK Government is still closer to the first position as it is nervous about losing public support if it went fully down the second path and services started to withdraw from the UK market<\/strong>, but with two provisos.<br \/><br \/>First, if another mainstream country did manage to force service providers to compromise their encryption and they did not withdraw from those markets, then the UK would be encouraged to follow suit.<br \/><br \/>Second, the UK Government may feel more comfortable issuing orders that would effectively prevent a currently unencrypted service from making the transition to become end-to-end encrypted if it feels this would not lead to withdrawal from the market.<br \/><br \/>We should also note that <strong>there is a strong \u2018game of chicken\u2019 dynamic in all of this that could lead to someone being run over<\/strong> if there are miscalculations on either the government or the industry side.<\/p>\n\n\n\n<p>He&#8217;s right \u2014 there&#8217;s a global hope that someone will cause the &#8220;Tech Platform E2EE Consensus&#8221; to crack \u2014 but there&#8217;s also something here which has been forgotten: <\/p>\n\n\n\n<p><em>This <\/em>game of chicken is being played in public, and the zealots on both side are watching.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">This Game is Different: It&#8217;s Played in Public<\/h2>\n\n\n\n<p>Spying is traditionally done in secret \u2014&nbsp;I&#8217;ve posted <a href=\"https:\/\/alecmuffett.com\/alecm\/e2e-primer\/\">an entire E2EE primer<\/a> which can help provide examples \u2014&nbsp;but what I would like to highlight here is the <a href=\"https:\/\/www.legislation.gov.uk\/ukpga\/2016\/25\/section\/253\"><strong>Technical Capability Notice<\/strong> of the Investigatory Powers Act 2016<\/a> and <a href=\"https:\/\/www.legislation.gov.uk\/ukdsi\/2018\/9780111163610\">further legislation<\/a>, where I would like to make a single observation:<\/p>\n\n\n\n<p class=\"has-luminous-vivid-amber-background-color has-background\">When a company or person is <a href=\"https:\/\/www.legislation.gov.uk\/uksi\/2018\/353\/pdfs\/uksiem_20180353_en.pdf\">coerced with a Technical Capability Notice<\/a> to provide access to communications, they are meant to do so <em><a href=\"https:\/\/www.legislation.gov.uk\/ukdsi\/2018\/9780111163610\">in such a manner that the risk of any unauthorised persons becoming aware of any matter within section 57(4) of the Act is minimised, in particular by ensuring that apparatus, systems or other facilities or services, as well as procedures and policies, are developed and maintained in accordance with security standards or guidance specified in the notice<\/a><\/em><\/p>\n\n\n\n<p>In short: compliance with a TCN and collusion towards leaking message content, is meant to be secret\u2026 but the Android and iOS ecosystems do not work that way. The world of  big platform applications is not like telephone companies where a wiretap can be surreptitiously plugged into someone&#8217;s line by a discreet visitor to the local phone exchange.<\/p>\n\n\n\n<p>Instead: the world is watching, and there are people \u2014 notably the respected <a href=\"https:\/\/wongmjane.com\/blog\">Jane Manchun Wong<\/a> \u2014&nbsp;who practically make a livelihood by digging through applications and surfacing the creation of new, test, or additional features which appear in the wild.<\/p>\n\n\n\n<p>If code is developed&nbsp;\u2014 if client-side-scanning code is added to an app \u2014 it will be discovered, leaked, and publicised.<\/p>\n\n\n\n<p>And then the fun will start.<\/p>\n\n\n\n<p>The platforms \u2014 even more than Hallam&#8217;s perspectives on Government \u2014&nbsp;do not want to be seen to be compromising their global privacy ethics for some parochial (e.g. merely &#8220;British&#8221;)  purpose; and they also know that <a href=\"https:\/\/alecmuffett.com\/article\/15902\">there is greater good to end-to-end encryption than even the statistics of actual abused children count against<\/a>. <\/p>\n\n\n\n<p>Thus, they are extremely motivated to not add <em>&#8220;British-Government Client-Side Scanning Code&#8221;<\/em> to their application, where the likes of Wong (et al) will discover it and publicise it to the world. <\/p>\n\n\n\n<p>Therefore: if the UK Government does pass legislation empowering OFCOM to demand client-side scanning, but it is <em>never implemented<\/em> and <em>never turns up<\/em> in the applications\u2026 what happens next?<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What Happens Next\u2026<\/h2>\n\n\n\n<p>To get us to this point <a href=\"https:\/\/www.rollingstone.com\/culture\/culture-news\/revealed-uk-government-publicity-blitz-to-undermine-privacy-encryption-1285453\/\">the Home Office has been stoking a bunch of child-safety charities<\/a>, telling them that <a href=\"https:\/\/alecmuffett.com\/article\/15742\">encryption is their biggest bugbear<\/a> and that combating privacy for adults is a disproportionate &#8220;win&#8221; that will keep children safe.<\/p>\n\n\n\n<p>In the process they have created an information security analogue of UKIP: a small band of zealots with ill-defined goals who are kicking back against what they perceive as a monstrous hugely-funded monolith which impinges upon their lives in every way. <\/p>\n\n\n\n<p>&#8220;Tech&#8221;, to them, is the new <em>&#8220;Europe&#8221;<\/em> and the &#8220;Platform Duty of Care&#8221; is the new <em>&#8220;Brexit,&#8221;<\/em> i.e. they want to &#8220;hurt tech&#8221; by harming themselves and everyone else in the process of achieving their halcyon goals of <em>&#8220;saving children&#8221;<\/em>.<\/p>\n\n\n\n<p>So the NSPCC and other charities \u2014&nbsp;doubtless heralded by <a href=\"https:\/\/www.telegraph.co.uk\/duty-of-care-campaign\/\">Charles Hymas in the Telegraph<\/a> \u2014 because this all happens and will be visible to the public, are <em><strong>going to see the utter lack of delivery of what they demanded the Government should achieve<\/strong><\/em> and we shall be thrown into several years of OFCOM and the Home Office being harangued to <strong>&#8220;Get Child Safety Done!&#8221;<\/strong><\/p>\n\n\n\n<p>That will not look good at the time of the next election. <\/p>\n\n\n\n<p>If Martin and Hallam are right and the Government are largely pursuing these powers in order to hang them as a Damoclean sword over the tech companies as leverage for &#8220;other&#8221; goals, perhaps they would like to consider the fact that this time the fact that the platforms have <em><strong>not <\/strong><\/em>knuckled-under will be public, and that the people they have exploited to get this far will actually turn to bite them.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Postscript<\/h2>\n\n\n\n<p>I suppose that the inevitable stage after the Tory government are roasted in the press for being demonstrably &#8220;weak on tech&#8221; is that either they crack down and the platforms abandon the UK \u2014 if they have not done so already \u2014 or else Labour promise to be <em><a href=\"https:\/\/news.sky.com\/story\/tough-on-crime-tough-on-causes-of-crime-labour-evokes-tony-blair-in-policing-plans-12812309\">&#8220;tough on tech and tough on the causes of tech&#8221;<\/a><\/em> \u2026and bring in something <em>even more<\/em> draconian. <\/p>\n\n\n\n<p>This is how we get to &#8220;V for Vendetta,&#8221; no?<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Background So I have been reading two recent think-pieces: Security services are in the market for as much information as they can get and if the threat of a decryption order may encourage a hesitant company to offer other useful data in order to avoid this being carried out then they will see this as [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":57063,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"activitypub_content_warning":"","activitypub_content_visibility":"","activitypub_max_image_attachments":3,"activitypub_interaction_policy_quote":"anyone","activitypub_status":"","footnotes":""},"categories":[1],"tags":[410,700,574,762],"class_list":["post-57060","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorised","tag-end-to-end-encryption","tag-noplacetohide","tag-online-safety","tag-online-safety-bill"],"jetpack_featured_media_url":"https:\/\/alecmuffett.com\/wp-content\/uploads\/2023\/04\/Screenshot-2023-04-21-at-08.34.22.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/alecmuffett.com\/wp-json\/wp\/v2\/posts\/57060","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/alecmuffett.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/alecmuffett.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/alecmuffett.com\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/alecmuffett.com\/wp-json\/wp\/v2\/comments?post=57060"}],"version-history":[{"count":15,"href":"https:\/\/alecmuffett.com\/wp-json\/wp\/v2\/posts\/57060\/revisions"}],"predecessor-version":[{"id":57381,"href":"https:\/\/alecmuffett.com\/wp-json\/wp\/v2\/posts\/57060\/revisions\/57381"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/alecmuffett.com\/wp-json\/wp\/v2\/media\/57063"}],"wp:attachment":[{"href":"https:\/\/alecmuffett.com\/wp-json\/wp\/v2\/media?parent=57060"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/alecmuffett.com\/wp-json\/wp\/v2\/categories?post=57060"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/alecmuffett.com\/wp-json\/wp\/v2\/tags?post=57060"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}