HOME

TheInfoList



OR:

Human rights applied to encryption is a concept of freedom of expression where
encryption In cryptography, encryption is the process of encoding information. This process converts the original representation of the information, known as plaintext, into an alternative form known as ciphertext. Ideally, only authorized parties can decip ...
is a technical resource in the implementation of basic
human rights Human rights are Morality, moral principles or Social norm, normsJames Nickel, with assistance from Thomas Pogge, M.B.E. Smith, and Leif Wenar, 13 December 2013, Stanford Encyclopedia of PhilosophyHuman Rights Retrieved 14 August 2014 for ce ...
. With the evolution of the
digital age The Information Age (also known as the Computer Age, Digital Age, Silicon Age, or New Media Age) is a historical period that began in the mid-20th century. It is characterized by a rapid shift from traditional industries, as established during t ...
, the application of
freedom of speech Freedom of speech is a principle that supports the freedom of an individual or a community to articulate their opinions and ideas without fear of retaliation, censorship, or legal sanction. The right to freedom of expression has been recogni ...
becomes more controversial as new technologies and restrictions arise, along with governmental and commercial interests. From a human rights perspective, there is a growing awareness that encryption is a core component in realizing a free, open and trustworthy Internet. Human rights are
moral A moral (from Latin ''morālis'') is a message that is conveyed or a lesson to be learned from a story or event. The moral may be left to the hearer, reader, or viewer to determine for themselves, or may be explicitly encapsulated in a maxim. A ...
principles or norms that describe certain standards of human behavior and are regularly protected as
legal rights Some philosophers distinguish two types of rights, natural rights and legal rights. * Natural rights are those that are not dependent on the laws or customs of any particular culture or government, and so are ''universal'', ''fundamental'' and ...
in
municipal A municipality is usually a single administrative division having corporate status and powers of self-government or jurisdiction as granted by national and regional laws to which it is subordinate. The term ''municipality'' may also mean the go ...
and
international law International law (also known as public international law and the law of nations) is the set of rules, norms, and standards generally recognized as binding between states. It establishes normative guidelines and a common conceptual framework for ...
.James Nickel, with assistance from Thomas Pogge, M.B.E. Smith, and Leif Wenar, December 13, 2013, Stanford Encyclopedia of Philosophy
Human Rights
Retrieved August 14, 2014
They are commonly understood as inalienableThe United Nations, Office of the High Commissioner of Human Rights
What are human rights?
Retrieved August 14, 2014
fundamental rights "to which a person is inherently entitled simply because she or he is a human being", and which are "inherent in all human beings" regardless of their nationality, location, language, religion, ethnic origin or any other status. They are applicable everywhere and at every time in the sense of being
universal Universal is the adjective for universe. Universal may also refer to: Companies * NBCUniversal, a media and entertainment company ** Universal Animation Studios, an American Animation studio, and a subsidiary of NBCUniversal ** Universal TV, a ...
, and they are
egalitarian Egalitarianism (), or equalitarianism, is a school of thought within political philosophy that builds from the concept of social equality, prioritizing it for all people. Egalitarian doctrines are generally characterized by the idea that all hum ...
in the sense of being the same for everyone.
Cryptography Cryptography, or cryptology (from grc, , translit=kryptós "hidden, secret"; and ''graphein'', "to write", or ''-logia'', "study", respectively), is the practice and study of techniques for secure communication in the presence of adver ...
is a long-standing subject in the field of mathematics and
computer science Computer science is the study of computation, automation, and information. Computer science spans theoretical disciplines (such as algorithms, theory of computation, information theory, and automation) to Applied science, practical discipli ...
. It can generally be defined as "the protection of information and computation using mathematical techniques." In the
OECD The Organisation for Economic Co-operation and Development (OECD; french: Organisation de coopération et de développement économiques, ''OCDE'') is an intergovernmental organisation with 38 member countries, founded in 1961 to stimulate e ...
Guidelines,
encryption In cryptography, encryption is the process of encoding information. This process converts the original representation of the information, known as plaintext, into an alternative form known as ciphertext. Ideally, only authorized parties can decip ...
and cryptography are defined as follows: "Encryption" means the transformation of data by the use of cryptography to produce unintelligible data (encrypted data) to ensure its
confidentiality Confidentiality involves a set of rules or a promise usually executed through confidentiality agreements that limits the access or places restrictions on certain types of information. Legal confidentiality By law, lawyers are often required ...
. "Cryptography" means the discipline which embodies principles, means, and methods for the transformation of data to hide its information content, establish its authenticity, prevent its undetected modification, prevent its repudiation, and prevent its unauthorized use. Encryption and cryptography are often used synonymously, although "cryptographic" has a broader technical meaning. For example, a
digital signature A digital signature is a mathematical scheme for verifying the authenticity of digital messages or documents. A valid digital signature, where the prerequisites are satisfied, gives a recipient very high confidence that the message was created b ...
is "cryptographic," but not technically "encryption". The human rights aspects related to the availability and use of a technology of particular significance for the field of information and communication are recognized in many places. Freedom of expression is recognized as a human right under article 19 of the
Universal Declaration of Human Rights The Universal Declaration of Human Rights (UDHR) is an international document adopted by the United Nations General Assembly that enshrines the Human rights, rights and freedoms of all human beings. Drafted by a UN Drafting of the Universal De ...
and recognized in
international human rights law International human rights law (IHRL) is the body of international law designed to promote human rights on social, regional, and domestic levels. As a form of international law, international human rights law are primarily made up of treaties, ag ...
in the
International Covenant on Civil and Political Rights The International Covenant on Civil and Political Rights (ICCPR) is a multilateral treaty that commits nations to respect the civil and political rights of individuals, including the right to life, freedom of religion, freedom of speech, freedo ...
(ICCPR). Article 19 of the UDHR states that "everyone shall have the right to hold opinions without interference" and "everyone shall have the right to freedom of expression; this right shall include freedom to seek, receive and impart information and ideas of all kinds, regardless of frontiers, either orally, in writing or in print, in the form of art, or through any other media of his choice".


Overview

Since the 1970s, the availability of
digital computing A computer is a machine that can be programmed to carry out sequences of arithmetic or logical operations ( computation) automatically. Modern digital electronic computers can perform generic sets of operations known as programs. These pro ...
and the invention of
public-key Public-key cryptography, or asymmetric cryptography, is the field of cryptographic systems that use pairs of related keys. Each key pair consists of a public key and a corresponding private key. Key pairs are generated with cryptographic alg ...
cryptography has made encryption more widely available. Previously, strong versions of encryption were the domain of
nation-state A nation state is a political unit where the state and nation are congruent. It is a more precise concept than "country", since a country does not need to have a predominant ethnic group. A nation, in the sense of a common ethnicity, may inc ...
actors. However, since the year 2000, cryptographic techniques have been widely deployed by various actors to ensure personal, commercial, and
public sector The public sector, also called the state sector, is the part of the economy composed of both public services and public enterprises. Public sectors include the public goods and governmental services such as the military, law enforcement, infra ...
protection of information and communication. Cryptographic techniques are also used to protect the
anonymity Anonymity describes situations where the acting person's identity is unknown. Some writers have argued that namelessness, though technically correct, does not capture what is more centrally at stake in contexts of anonymity. The important idea he ...
of communicating actors and to protect
privacy Privacy (, ) is the ability of an individual or group to seclude themselves or information about themselves, and thereby express themselves selectively. The domain of privacy partially overlaps with security, which can include the concepts of a ...
more generally. The availability and use of encryption continues to lead to complex, important, and highly contentious legal policy debates. There are government statements and proposals on the need to curtail such usage and deployment in view of the potential hurdles it could present for access by government agencies. The rise of commercial services offering
end-to-end encryption End-to-end encryption (E2EE) is a system of communication where only the communicating users can read the messages. In principle, it prevents potential eavesdroppers – including telecom providers, Internet providers, malicious actors, and even ...
and the calls for restrictions and solutions in view of law enforcement access are pushing towards more and more debates around the use of encryption and the legal status of the deployment of cryptography more generally. Encryption, as defined above, refers to a subset of cryptographic techniques for the protection of information and
computation Computation is any type of arithmetic or non-arithmetic calculation that follows a well-defined model (e.g., an algorithm). Mechanical or electronic devices (or, historically, people) that perform computations are known as ''computers''. An es ...
. The
normative Normative generally means relating to an evaluative standard. Normativity is the phenomenon in human societies of designating some actions or outcomes as good, desirable, or permissible, and others as bad, undesirable, or impermissible. A norm in ...
value of encryption, however, is not fixed but varies with the type of cryptographic method that is used or deployed and for which purposes. Traditionally, encryption (cypher) techniques were used to ensure the confidentiality of communications and prevent access to information and communications by others and intended recipients. Cryptography can also ensure the authenticity of communicating parties and the integrity of communications contents, providing a key ingredient for enabling trust in the
digital environment A digital environment is an integrated communications environment where digital devices communicate and manage the content and activities within it. The concept is based on digital electronics systems which are integrated and implemented for a glo ...
. There is a growing awareness within human rights that encryption plays an important role in realizing a free, open, and trustworthy Internet. UN Special Rapporteur on the promotion and protection of the right to freedom of opinion and expression
David Kaye David Kaye may refer to: * David Kaye (voice actor) (born 1966), Canadian-American voice actor * David A. Kaye, actor who played Jesse Waingrow in the film ''3000 Miles to Graceland'' * David Kaye (footballer) (born 1959), English footballer * Dav ...
observed, during the Human Rights Council in June 2015, that encryption and anonymity deserve a protected status under the rights to privacy and freedom of expression: ''"Encryption and anonymity, today's leading vehicles for online security, provide individuals with a means to protect their privacy, empowering them to browse, read, develop and share opinions and information without interference and enabling journalists, civil society organizations, members of ethnic or religious groups, those persecuted because of their sexual orientation or gender identity, activists, scholars, artists and others to exercise the rights to freedom of opinion and expression."''


Encryption in media and communication

Two types of encryption in media and communication can be distinguished: # Encryption in media and communication could be used as a result of choice of a service provider or deployed by Internet users.
Client-side encryption Client-side encryption is the cryptographic technique of encrypting data on the sender's side, before it is transmitted to a server such as a cloud storage service. Client-side encryption features an encryption key that is not available to the servi ...
tools and technologies are relevant for
marginalized Social exclusion or social marginalisation is the social disadvantage and relegation to the fringe of society. It is a term that has been used widely in Europe and was first used in France in the late 20th century. It is used across discipline ...
communities, journalists and other online media actors practicing journalism as it becomes a way of protecting their rights. # Encryption provided by
service provider A service provider (SP) is an organization that provides services, such as consulting, legal, real estate, communications, storage, and processing services, to other organizations. Although a service provider can be a sub-unit of the organization t ...
s can prevent unauthorized third party access, but the service provider implementing it would still have access to the relevant user data. End-to-end encryption is an encryption technique that refers to encryption that also prevents service providers themselves from having access to the user's communications. The
implementation Implementation is the realization of an application, or execution of a plan, idea, model, design, specification, standard, algorithm, or policy. Industry-specific definitions Computer science In computer science, an implementation is a realiza ...
of these forms of encryption have sparked the most debate since the year 2000.


Service provider deployed techniques to prevent unauthorized third-party access

Amongst the most widely deployed cryptographic techniques is securing the
communications channel A communication channel refers either to a physical transmission medium such as a wire, or to a logical connection over a multiplexed medium such as a radio channel in telecommunications and computer networking. A channel is used for informat ...
between internet users and specific service providers from
man-in-the-middle In cryptography and computer security, a man-in-the-middle, monster-in-the-middle, machine-in-the-middle, monkey-in-the-middle, meddler-in-the-middle, manipulator-in-the-middle (MITM), person-in-the-middle (PITM) or adversary-in-the-middle (AiTM) ...
attacks, access by unauthorized third parties. These cryptographic techniques must be run jointly by a user and the service provider to work. This means that they require service providers, such as an online news publisher or a
social network A social network is a social structure made up of a set of social actors (such as individuals or organizations), sets of dyadic ties, and other social interactions between actors. The social network perspective provides a set of methods for an ...
, to actively integrate them into service design and implementation. Users cannot deploy these techniques unilaterally; their deployment is contingent on active participation by the service provider. The TLS protocol, which becomes visible to the normal internet user through the
HTTPS Hypertext Transfer Protocol Secure (HTTPS) is an extension of the Hypertext Transfer Protocol (HTTP). It is used for secure communication over a computer network, and is widely used on the Internet. In HTTPS, the communication protocol is enc ...
header, is widely used for securing online commerce,
e-government E-government (short for electronic government) is the use of technological communications devices, such as computers and the Internet, to provide public services to citizens and other persons in a country or region. E-government offers new ...
services and health applications as well as devices that make up networked infrastructures, e.g., routers, cameras. However, although the standard has been around since 1990, the wider spread and evolution of the technology has been slow. As with other cryptographic methods and protocols, the practical challenges related to proper, secure and (wider) deployment are significant and have to be considered. Many service providers still do not implement TLS or do not implement it well. In the context of
wireless Wireless communication (or just wireless, when the context allows) is the transfer of information between two or more points without the use of an electrical conductor, optical fiber or other continuous guided medium for the transfer. The most ...
communications, the use of cryptographic techniques that protect communications from third parties are also important. Different standards have been developed to protect wireless communications: 2G, 3G and 4G standards for communication between mobile phones, base stations and base stations controllers; standards to protect communications between mobile devices and wireless routers ('
WLAN A wireless LAN (WLAN) is a wireless computer network that links two or more devices using wireless communication to form a local area network (LAN) within a limited area such as a home, school, computer laboratory, campus, or office building ...
'); and standards for local computer networks. One common weakness in these designs is that the transmission points of the wireless communication can access all communications e.g., the
telecommunications provider A telephone company, also known as a telco, telephone service provider, or telecommunications operator, is a kind of communications service provider (CSP), more precisely a telecommunications service provider (TSP), that provides telecommunicat ...
. This vulnerability is exacerbated when wireless protocols only
authenticate Authentication (from ''authentikos'', "real, genuine", from αὐθέντης ''authentes'', "author") is the act of proving an assertion, such as the identity of a computer system user. In contrast with identification, the act of indicatin ...
user devices, but not the
wireless access point In computer networking, a wireless access point (WAP), or more generally just access point (AP), is a networking hardware device that allows other Wi-Fi devices to connect to a wired network. As a standalone device, the AP may have a wired co ...
. Whether the data is stored on a device, or on a local server as in the
cloud In meteorology, a cloud is an aerosol consisting of a visible mass of miniature liquid droplets, frozen crystals, or other particles suspended in the atmosphere of a planetary body or similar space. Water or various other chemicals may co ...
, there is also a distinction between 'at rest'. Given the vulnerability of cellphones to theft for instance, particular attention may be given to limiting service provided access. This does not exclude the situation that the service provider discloses this information to third parties like other commercial entities or governments. The user needs to trust the service provider to act in its interests. The possibility that a service provider is legally compelled to hand over user information or to interfere with particular communications with particular users, remains.


Privacy Enhancing Technologies

There are services that specifically
market Market is a term used to describe concepts such as: *Market (economics), system in which parties engage in transactions according to supply and demand *Market economy *Marketplace, a physical marketplace or public market Geography *Märket, an ...
themselves with claims not to have access to the content of their users' communication. Service Providers can also take measures that restrict their ability to access information and communication, further increasing the protection of users against access to their information and communications. The integrity of these
Privacy Enhancing Technologies Privacy-enhancing technologies (PET) are technologies that embody fundamental data protection principles by minimizing personal data use, maximizing data security, and empowering individuals. PETs allow online users to protect the privacy of their ...
(PETs), depends on delicate design decisions as well as the willingness of the service provider to be transparent and
accountable Accountability, in terms of ethics and governance, is equated with answerability, blameworthiness, liability, and the expectation of account-giving. As in an aspect of governance, it has been central to discussions related to problems in the ...
. For many of these services, the service provider may offer some additional features (besides the ability to communicate), for example contact list management—meaning that they can observe who is communicating with whom—but take technical measures so that they cannot read the contents of the messages. This has potentially negative implications for users, for instance, since the service provider has to take action to connect users who want to communicate using the service, it will also have the power to prevent users from communicating in the first place. Following the discovery of
vulnerabilities Vulnerability refers to "the quality or state of being exposed to the possibility of being attacked or harmed, either physically or emotionally." A window of vulnerability (WOV) is a time frame within which defensive measures are diminished, com ...
, there is a growing
awareness Awareness is the state of being conscious of something. More specifically, it is the ability to directly know and perceive, to feel, or to be cognizant of events. Another definition describes it as a state wherein a subject is aware of some inform ...
that there needs to be more investment in the
audit An audit is an "independent examination of financial information of any entity, whether profit oriented or not, irrespective of its size or legal form when such an examination is conducted with a view to express an opinion thereon.” Auditing ...
ing of widely used
code In communications and information processing, code is a system of rules to convert information—such as a letter, word, sound, image, or gesture—into another form, sometimes shortened or secret, for communication through a communication ...
coming out of the free and open software community. The pervasiveness of
business model A business model describes how an organization creates, delivers, and captures value,''Business Model Generation'', Alexander Osterwalder, Yves Pigneur, Alan Smith, and 470 practitioners from 45 countries, self-published, 2010 in economic, social, ...
s that depend on collection and processing of user data can be an obstacle for adopting cryptographic mechanisms for protecting information at rest. As
Bruce Schneier Bruce Schneier (; born January 15, 1963) is an American cryptographer, computer security professional, privacy specialist, and writer. Schneier is a Lecturer in Public Policy at the Harvard Kennedy School and a Fellow at the Berkman Klein Cente ...
, has stated: ''" rveillance is the business model of the Internet. This has evolved into a shockingly extensive, robust, and profitable surveillance architecture. You are being tracked pretty much everywhere you go on the Internet, by many companies and
data brokers A data broker is an individual or company that specializes in collecting personal data (such as income, ethnicity, political beliefs, or geolocation data) or data about companies, mostly from public records but sometimes sourced privately, and s ...
: ten different companies on one site, a dozen on another."'' Cryptographic methods play a key role in
online identity management Online identity management (OIM), also known as online image management, online personal branding, or personal reputation management (PRM), is a set of methods for generating a distinguished Web presence of a person on the Internet. Online identity ...
.
Digital credential Digital credentials are the digital equivalent of paper-based credentials. Just as a paper-based credential could be a passport, a driver's license, a membership certificate or some kind of ticket to obtain some service, such as a cinema ticket o ...
systems can be used to allow anonymous yet authenticated and accountable transactions between users and service providers, and can be used to build privacy preserving identity management systems.


End-user and community-driven encryption and collaborative services

The Internet allows
end-users In product development, an end user (sometimes end-user) is a person who ultimately uses or is intended to ultimately use a product. The end user stands in contrast to users who support or maintain the product, such as sysops, system administrat ...
to develop applications and uses of the network without having to coordinate with the relevant
internet service provider An Internet service provider (ISP) is an organization that provides services for accessing, using, or participating in the Internet. ISPs can be organized in various forms, such as commercial, community-owned, non-profit, or otherwise private ...
s. Many of the available encryption tools are not developed or offered by traditional service providers or organizations but by experts in the free and open software (FOSS) and Internet engineering communities. A major focus of these initiatives is to produce Privacy Enhancing Technologies (PETs) that can be unilaterally or collaboratively deployed by interested users who are ready, willing, and able to look after their own privacy interests when interacting with service providers. These PETs include standalone encryption applications as well as browser add-ons that help maintain the confidentiality of web-based communications or permit anonymous access to online services. Technologies such as keystroke loggers can intercept content as it is entered before encryption is applied, thereby falling short of offering protection. Hacking into information systems and devices to access data at or after the moment of
decryption In cryptography, encryption is the process of encoding information. This process converts the original representation of the information, known as plaintext, into an alternative form known as ciphertext. Ideally, only authorized parties can decip ...
may have the same effect.
Multi-party computation Secure multi-party computation (also known as secure computation, multi-party computation (MPC) or privacy-preserving computation) is a subfield of cryptography with the goal of creating methods for parties to jointly compute a function over their ...
(MPC) techniques are an example of collaborative solutions that allow parties, e.g.
NGOs A non-governmental organization (NGO) or non-governmental organisation (see spelling differences) is an organization that generally is formed independent from government. They are typically nonprofit entities, and many of them are active in h ...
with sensitive data, to do
data analytics Analytics is the systematic computational analysis of data or statistics. It is used for the discovery, interpretation, and communication of meaningful patterns in data. It also entails applying data patterns toward effective decision-making. It ...
without revealing their datasets to each other. All of these designs leverage encryption to provide privacy and security assurances in the absence of a trustworthy centralized authority. There are many developments in the implementations of crypto-currencies using blockchain protocols. These systems can have many benefits and these
protocol Protocol may refer to: Sociology and politics * Protocol (politics), a formal agreement between nation states * Protocol (diplomacy), the etiquette of diplomacy and affairs of state * Etiquette, a code of personal behavior Science and technology ...
s can also be useful for novel forms of contracts and electronic attestation, useful aids when legal infrastructure are not readily available. As to the protection of privacy related to payments, it is a common misconception that the cryptographic techniques that are used in
Bitcoin Bitcoin ( abbreviation: BTC; sign: ₿) is a decentralized digital currency that can be transferred on the peer-to-peer bitcoin network. Bitcoin transactions are verified by network nodes through cryptography and recorded in a public distr ...
ensure anonymous payments. The only protection offered by Bitcoin is
pseudonymity A pseudonym (; ) or alias () is a fictitious name that a person or group assumes for a particular purpose, which differs from their original or true name (orthonym). This also differs from a new name that entirely or legally replaces an individua ...
.


The cryptographic protection of metadata

The availability of
metadata Metadata is "data that provides information about other data", but not the content of the data, such as the text of a message or the image itself. There are many distinct types of metadata, including: * Descriptive metadata – the descriptive ...
(the information relating to a user's information and communications behavior) can pose a particular threat to users including information that can be observed by service providers through the provisioning of services: when, how frequently, how long, and with whom users are communicating. Metadata can also be used to track people geographically and can interfere with their ability to communicate anonymously. As noted by the
Berkman Center The Berkman Klein Center for Internet & Society is a research center at Harvard University that focuses on the study of cyberspace. Founded at Harvard Law School, the center traditionally focused on internet-related legal issues. On May 15, 2008, ...
report, metadata is generally not encrypted in ways that make it inaccessible for governments, and accordingly ''"provides an enormous amount of surveillance data that was unavailable before nternet communication technologiesbecame widespread."'' To minimize exposure of meaningful metadata, encryption tools may need to be used in combination with technologies that provide communication anonymity.


The Onion Router

The Onion Router, most commonly known as
Tor Tor, TOR or ToR may refer to: Places * Tor, Pallars, a village in Spain * Tor, former name of Sloviansk, Ukraine, a city * Mount Tor, Tasmania, Australia, an extinct volcano * Tor Bay, Devon, England * Tor River, Western New Guinea, Indonesia Sc ...
, offers the ability to access websites and online services anonymously. Tor requires a community of volunteers to run intermediary proxies which channel a user's communication with a website so that third parties cannot observe who the user is communicating with. Through the use of encryption, each proxy is only aware of part of the communication path meaning that none of the proxies can by itself infer both the user and the website she is visiting. Besides protecting anonymity, Tor is also useful when the user's ISP blocks access to content. This is similar as the protection that can be offered by a
VPN A virtual private network (VPN) extends a private network across a public network and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network. The be ...
. Service providers, such as websites, can block connections that come from the Tor network. Because certain malicious traffic may reach service providers as Tor traffic and because Tor traffic may also interfere with the business models, service providers may have an
incentive In general, incentives are anything that persuade a person to alter their behaviour. It is emphasised that incentives matter by the basic law of economists and the laws of behaviour, which state that higher incentives amount to greater levels of ...
to do so. This interference can prevent users from using the most effective means to protect their anonymity online. The Tor browser allows users to
obfuscate Obfuscation is the obscuring of the intended meaning of communication by making the message difficult to understand, usually with confusing and ambiguous language. The obfuscation might be either unintentional or intentional (although intent us ...
the origin and end-points of their communications when they communicate on the internet.


Obfuscation

Obfuscation, the automated generation of "fake" signals that are indistinguishable from users' actual online activities, providing users with a noisy "cover" under which their real information and communication behavior remains unobservable. Obfuscation has received more attention as a method to protect users online recently. TrackMeNot is an obfuscation tool for search engine users: the plugin sends fake search queries to the
search engine A search engine is a software system designed to carry out web searches. They search the World Wide Web in a systematic way for particular information specified in a textual web search query. The search results are generally presented in a ...
, affecting the ability of the search engine provider to build an accurate profile of the user. Although TrackMeNot and other search obfuscation tools have been found to be vulnerable to certain attacks that allow search engines to distinguish between user-generated and computer-generated queries, further advances in obfuscation are likely to play a positive role in protecting users when disclosure of information is inevitable, as in the case of search or
location-based service A location-based service (LBS) is a general term denoting software services which use geographic data and information to provide services or information to users. LBS can be used in a variety of contexts, such as health, indoor object search, ent ...
s.


Cryptography, law and human rights


Restrictions on cryptographic techniques

Recent incidents of terrorism have led to further calls for restrictions on encryption. Even though, in the interest of
public safety Public security or public safety is the prevention of and protection from events that could endanger the safety and security of the public from significant danger, injury, or property damage. It is often conducted by a state government to ensure ...
, there are many proposals to interfere with the free deployment of strong encryption, these proposals do not hold up against close scientific
scrutiny Scrutiny (French: ''scrutin''; Late Latin: ''scrutinium''; from ''scrutari'', meaning "those who search through piles of rubbish in the hope of finding something of value" and originally from the Latin "scruta," meaning "broken things, rags, or ...
. These proposals side-step a more fundamental point, related to what is at stake for users. More advanced security measures seem necessary for governments, considering the existing threat landscape for users of digital communications and
computing Computing is any goal-oriented activity requiring, benefiting from, or creating computing machinery. It includes the study and experimentation of algorithmic processes, and development of both hardware and software. Computing has scientific, e ...
. While many governments consider that encryption techniques could present a hurdle in the investigation of crime and the protection of
national security National security, or national defence, is the security and defence of a sovereign state, including its citizens, economy, and institutions, which is regarded as a duty of government. Originally conceived as protection against military atta ...
, certain countries, such as Germany or the
Netherlands ) , anthem = ( en, "William of Nassau") , image_map = , map_caption = , subdivision_type = Sovereign state , subdivision_name = Kingdom of the Netherlands , established_title = Before independence , established_date = Spanish Netherl ...
have taken a strong position against restrictions on encryption on the Internet. In 2016, the Ministers of the Interior of France and Germany jointly stated the need to work on solutions for the challenges law enforcement can face as a result of end-to-end encryption, in particular when offered from a foreign jurisdiction. In a joint statement, the European Agency for Network and Information Security (
ENISA The European Union Agency for Cybersecurity – self-designation ENISA from the abbreviation of its original name – is an agency of the European Union. It is fully operational since September 1, 2005. The Agency is located in Athens, Greece an ...
) and Europol have also taken a stance against the introduction of backdoors in encryption products. In addition, restrictions would have serious detrimental effects on
cyber security Computer security, cybersecurity (cyber security), or information technology security (IT security) is the protection of computer systems and networks from attack by malicious actors that may result in unauthorized information disclosure, the ...
, trade and
e-commerce E-commerce (electronic commerce) is the activity of electronically buying or selling of products on online services or over the Internet. E-commerce draws on technologies such as mobile commerce, electronic funds transfer, supply chain manageme ...
.


Encryption and the law: the broader landscape

Privacy and
data protection Information privacy is the relationship between the collection and dissemination of data, technology, the public expectation of privacy, contextual information norms, and the legal and political issues surrounding them. It is also known as data pr ...
legislation is closely related to the protection of human rights. There are now more than 100 countries with data protection laws. One of the key principles for the fair and lawful processing of personal information regulated by data protection laws is the principle of security. This principle implies that proper security measures are taken to ensure the protection of personal data against unlawful access by others than intended recipients. The European Union General Data Protection Regulation, which was adopted in 2016 and will enter in to force in 2018, contains an advanced set of rules with respect to the security of personal data. Encryption can be a
safeguard A safeguard, in international law, is a restraint on international trade or economic development to protect communities from development aggression or home industries from foreign competition. In the World Trade Organization (WTO), a member may t ...
against personal
data breach A data breach is a security violation, in which sensitive, protected or confidential data is copied, transmitted, viewed, stolen or used by an individual unauthorized to do so. Other terms are unintentional information disclosure, data leak, info ...
es for the UN, as it can facilitate the implementation of privacy and data protection by design. Cryptography has also been an essential ingredient for establishing the conditions for e-Commerce over the Internet. The OECD Principles were adopted to ensure that national cryptography policy would not interfere with trade and to ensure the conditions for international developments in e-Commerce.


International cryptography policy and human rights

The policy debate about encryption has a significant international dimension because of the international nature of the communications networks and the Internet as well as trade,
globalization Globalization, or globalisation (Commonwealth English; see spelling differences), is the process of interaction and integration among people, companies, and governments worldwide. The term ''globalization'' first appeared in the early 20t ...
and the national security dimensions. The OECD adopted a Recommendation Concerning Guidelines for Cryptography Policy on March 27, 1997. There are three components to this policy intervention of the OECD, which is primarily aimed at its Member Countries: a recommendation of the OECD Council, Guidelines for Cryptography Policy (as an Annex to the Recommendation) and a Report on Background and Issues of Cryptography Policy to explain the context for the Guidelines and the basic issues involved in the
cryptography law Cryptography is the practice and study of encrypting information, or in other words, securing information from unauthorized access. There are many different cryptography laws in different nations. Some countries prohibit export of cryptography so ...
and
policy debate Policy debate is an American form of debate competition in which teams of two usually advocate for and against a resolution that typically calls for policy change by the United States federal government. It is also referred to as cross-examinat ...
. The Principle most explicit about the connection to human rights is Principle 5 on the Protection of Privacy and Personal Data: ''"The fundamental rights of individuals to privacy, including secrecy of communications and protection of personal data, should be respected in national cryptography policies and in the implementation and use of cryptographic methods."''
UNESCO The United Nations Educational, Scientific and Cultural Organization is a specialized agency of the United Nations (UN) aimed at promoting world peace and security through international cooperation in education, arts, sciences and culture. It ...
, after consulting stakeholders, identified encryption as a relevant element for policy on privacy and freedom of expression. The Keystones Report (2015) articulates that ''"to the extent that our data can be considered representative of ourselves, encryption has a role to play in protecting who we are, and in preventing abuse of user content. It also allows for greater protection of privacy and anonymity in transit by ensuring that the contents (and sometimes also the metadata) of communications are only seen by the intended recipient."'' The report recognizes ''"the role that anonymity and encryption can play as enablers of privacy protection and freedom of expression"'', and proposes that UNESCO facilitate dialogue on these issues. The Necessary and Proportionate Principles developed and adopted by
civil society Civil society can be understood as the "third sector" of society, distinct from government and business, and including the family and the private sphere.integrity Integrity is the practice of being honest and showing a consistent and uncompromising adherence to strong moral and ethical principles and values. In ethics, integrity is regarded as the honesty and truthfulness or accuracy of one's actions. Inte ...
of
communications system A communications system or communication system is a collection of individual telecommunications networks, transmission systems, relay stations, tributary stations, and terminal equipment usually capable of interconnection and interoperati ...
s as one of its 13 principles. The principles themselves do not provide for explicit guidance on specific cryptographic policy issues such as backdoors or restrictions on the deployment of encryption. The guidance that is offered by the OECD principles and the recent positions of the UN Rapporteur on Encryption state the importance of encryption for the protection of human rights. While it does not give a definitive answer to the question of whether a mandate for encryption backdoors is to be considered incompatible with international law, it does point in that direction. Generally, the available guidance at the international level clarifies that when limitations are imposed on encryption, relevant human rights guarantees have to be strictly observed.


National level developments in selected countries


United States

There has been a broad, active and contentious policy debate on encryption in the US since the 1990s beginning with the "
Crypto Wars Attempts, unofficially dubbed the "Crypto Wars", have been made by the United States (US) and allied governments to limit the public's and foreign nations' access to cryptography strong enough to thwart decryption by national intelligence agencie ...
". This involved the adoption of the
Communications Assistance for Law Enforcement Act The Communications Assistance for Law Enforcement Act (CALEA), also known as the "Digital Telephony Act," is a United States wiretapping law passed in 1994, during the presidency of Bill Clinton (Pub. L. No. 103-414, 108 Stat. 4279, codified at 47 ...
(CALEA), containing requirements for telecommunications providers and equipment manufacturers to ensure the possibility of effective
wiretapping Telephone tapping (also wire tapping or wiretapping in American English) is the monitoring of telephone and Internet-based conversations by a third party, often by covert means. The wire tap received its name because, historically, the monitorin ...
. It also involved a debate over existing export controls on strong encryption products (considering their classification as munition) and a criminal investigation into cryptographic email software developer and activist
Phil Zimmermann Philip R. Zimmermann (born 1954) is an American computer scientist and Cryptography, cryptographer. He is the creator of Pretty Good Privacy (PGP), the most widely used email encryption software in the world. He is also known for his work in VoI ...
. The case was dropped and the general debate resolved after the
liberalization Liberalization or liberalisation (British English) is a broad term that refers to the practice of making laws, systems, or opinions less severe, usually in the sense of eliminating certain government regulations or restrictions. The term is used m ...
of export controls on most commercial products with strong encryption features and the transfer of these items from the U.S.A. Munitions List ( USML), administered by the
Department of State The United States Department of State (DOS), or State Department, is an executive department of the U.S. federal government responsible for the country's foreign policy and relations. Equivalent to the ministry of foreign affairs of other nati ...
, to the Commerce Control List (CCL), administered by the
Department of Commerce The United States Department of Commerce is an executive department of the U.S. federal government concerned with creating the conditions for economic growth and opportunity. Among its tasks are gathering economic and demographic data for bu ...
. The USA Department of Commerce maintains some controls over items on the CCL, including registration, technical reviews and reporting obligations, and continues to impose licensing and other requirements for sensitive encryption items and sales of such items to foreign governments. The debate ignited after the
Edward Snowden Edward Joseph Snowden (born June 21, 1983) is an American and naturalized Russian former computer intelligence consultant who leaked highly classified information from the National Security Agency (NSA) in 2013, when he was an employee and su ...
revelations and the well-documented increase in deployed encryption measures by Internet services, device makers and users, as well as a concerted call from the technical community and civil society to increase encryption use and security to address
mass surveillance Mass surveillance is the intricate surveillance of an entire or a substantial fraction of a population in order to monitor that group of citizens. The surveillance is often carried out by local and federal governments or governmental organizati ...
practices. The increased adoption of encryption by the industry has been received critically by certain government actors, the
FBI The Federal Bureau of Investigation (FBI) is the domestic Intelligence agency, intelligence and Security agency, security service of the United States and its principal Federal law enforcement in the United States, federal law enforcement age ...
in particular. This led to the widely reported
FBI–Apple encryption dispute The FBI–Apple encryption dispute concerns whether and to what extent courts in the United States can compel manufacturers to assist in unlocking cell phones whose data are cryptographically protected. There is much debate over public access ...
over the possibility to gain access to information on the iPhone in assistance to law enforcement. In 2016, several bills were introduced in the
US Congress The United States Congress is the legislature of the federal government of the United States. It is bicameral, composed of a lower body, the House of Representatives, and an upper body, the Senate. It meets in the U.S. Capitol in Washingto ...
that would place new limits encryption under USA law. The USA's legal system promotes and requires security measures to be implemented in the relevant contexts, including cryptographic methods of various kinds, to ensure security in commerce and trade. Relevant laws are the Federal Information Security Modernization Act (FISMA) of 2014, the Gramm-Leach-Bliley Act, the
Health Insurance Portability and Accountability Act The Health Insurance Portability and Accountability Act of 1996 (HIPAA or the Kennedy– Kassebaum Act) is a United States Act of Congress enacted by the 104th United States Congress and signed into law by President Bill Clinton on August 21, 1 ...
(HIPAA) and also the
Federal Trade Commission Act The Federal Trade Commission Act of 1914 was a United States federal law which established the Federal Trade Commission. The Act was signed into law by US President Woodrow Wilson in 1914 and outlaws unfair methods of competition and unfair acts ...
. These acts contain security requirements and thereby indirectly require or stimulate the use of encryption in certain circumstances. Finally, many state breach notification laws treat encrypted data as a safe harbor by exempting firms that have encrypted data from notice obligations. Constitutional considerations and
human rights Human rights are Morality, moral principles or Social norm, normsJames Nickel, with assistance from Thomas Pogge, M.B.E. Smith, and Leif Wenar, 13 December 2013, Stanford Encyclopedia of PhilosophyHuman Rights Retrieved 14 August 2014 for ce ...
play a role of significance in the USA debate about the legal treatment of encryption methods. Restrictions on distribution of cryptographic protocols, and the publication of cryptographic methods are considered an interference with the
First Amendment First or 1st is the ordinal form of the number one (#1). First or 1st may also refer to: *World record, specifically the first instance of a particular achievement Arts and media Music * 1$T, American rapper, singer-songwriter, DJ, and rec ...
, the USA constitutional safeguard protecting freedom of expression. The USA has particularly active and strongly developed civil society actors involved in cryptographic policy and practice. The United States of America is a primary site for cryptology research and engineering, development and implementation of cryptographic service innovations. There is an active community of Non-Governmental Organizations engaged in the national and international debate on encryption policy. The predominant interferences with strong encryption that take place or are being considered take place in the field of
national security National security, or national defence, is the security and defence of a sovereign state, including its citizens, economy, and institutions, which is regarded as a duty of government. Originally conceived as protection against military atta ...
,
law enforcement Law enforcement is the activity of some members of government who act in an organized manner to enforce the law by discovering, deterring, rehabilitating, or punishing people who violate the rules and norms governing that society. The term en ...
and
Foreign Affairs ''Foreign Affairs'' is an American magazine of international relations and U.S. foreign policy published by the Council on Foreign Relations, a nonprofit, nonpartisan, membership organization and think tank specializing in U.S. foreign policy and ...
. In this area and in answering the contentious question of whether and how lawful access to specific communications could be ensured, the US Government has internationally explained its policy as one aiming to ensure that 'responsibly deployed encryption' helps to ''"secure many aspects of our daily lives, including our private communications and commerce",'' but also ''"to ensure that malicious actors can be held to account without weakening our commitment to strong encryption"''.


Germany

As part of the global debate on encryption in the late 1990s, a debate also took place in Germany about the need and legitimacy of imposing a general ban on the encryption of communications because of the impact on criminal investigations. There were profound doubts concerning the constitutional
legitimacy Legitimacy, from the Latin ''legitimare'' meaning "to make lawful", may refer to: * Legitimacy (criminal law) * Legitimacy (family law) * Legitimacy (political) See also * Bastard (law of England and Wales) * Illegitimacy in fiction * Legit (d ...
as well as concerns about negative factual consequences of such a ban. In qualitative terms, a number of
fundamental rights Fundamental rights are a group of rights that have been recognized by a high degree of protection from encroachment. These rights are specifically identified in a constitution, or have been found under due process of law. The United Nations' Sustai ...
are considered to be affected by restrictions on encryption: the secrecy of telecommunications, expressions of the general right of personality and, indirectly, all communicative freedoms that are exercisable over the Internet. The
Federal Government A federation (also known as a federal state) is a political entity characterized by a union of partially self-governing provinces, states, or other regions under a central federal government (federalism). In a federation, the self-governin ...
set key points in 1999 for the German cryptographic policy which should especially provide confidence in the security of encryption instead of restricting it. Besides the statements of the German Minister of the Interior towards possible future restrictions, Germany aligns with the position of the UN Special Rapporteur David Kaye and adopts policies of non-restriction or comprehensive protection and only adopts restrictions on a case-specific basis. In November 2015 governmental representatives as well as representatives of the
private sector The private sector is the part of the economy, sometimes referred to as the citizen sector, which is owned by private groups, usually as a means of establishment for profit or non profit, rather than being owned by the government. Employment The ...
signed a "Charter to strengthen the trusted communication "(Charta zur Stärkung der vertrauenswürdigen Kommunikation) together, in which they stated: ''"We want to be Encryption Site No. 1 in the world"''. The
German Government The Federal Cabinet or Federal Government (german: link=no, Bundeskabinett or ') is the chief executive body of the Federal Republic of Germany. It consists of the Federal Chancellor and cabinet ministers. The fundamentals of the cabinet's or ...
has also used its foreign policy to promote international privacy standards. In particular, Germany, in a joint effort with Brazil, committed itself in the
Human Rights Council The United Nations Human Rights Council (UNHRC), CDH is a United Nations body whose mission is to promote and protect human rights around the world. The Council has 47 members elected for staggered three-year terms on a regional group basis. ...
for the appointment of an UN Special Rapporteur on Privacy. There are multiple examples of how there have been efforts by the government to implement encryption policy. They range from informal actions, to laws and regulations: The IT Security Act in 2015, the 'De-Mail' law. There are also several sector-specific rules for encryption and information security in Germany, like the Telecommunications Act (TKG). The
German Constitutional Court The Federal Constitutional Court (german: link=no, Bundesverfassungsgericht ; abbreviated: ) is the supreme constitutional court for the Federal Republic of Germany, established by the constitution or Basic Law () of Germany. Since its inc ...
has also provided valuable input for the international legal handling of encryption techniques with the IT basic right, with which, the constitutional court recognizes that parts of one's personality go into IT systems and therefore the applied protection has to travel with it.


India

There are a number of limitations on the free deployment of encryption by electronic communications services despite the fact that
Indian law The legal system of India consists of civil, common law and customary, Islamic ethics, or religious law within the legal framework inherited from the colonial era and various legislation first introduced by the British are still in effect in ...
and policy promotes and requires the implementation of strong encryption as a security measure, such as in
banking A bank is a financial institution that accepts deposits from the public and creates a demand deposit while simultaneously making loans. Lending activities can be directly performed by the bank or indirectly through capital markets. Because ...
, ecommerce and by organizations handling sensitive personal information. There is notable legal uncertainty about the precise legal scope of these license requirements and to what extent they could have legal effect on (the use of or deployment of ) services by the end-users of covered services. The encryption debate ignited publicly in India in 2008 after the Government published a draft proposal with a number of envisioned limitations on the use of encryption. The policy, issued under Section 84A of the Indian Information Technology (Amendment) Act, 2008 was short-lived, but worries remain about the lack of safeguards for privacy and freedom of expression that the draft illustrated. In response to the outcry, the Indian government first exempted ''"mass use encryption products, which are currently being used in web applications, social media sites, and social media applications such as WhatsApp, Facebook, Twitter etc."'' Soon thereafter, it withdrew the proposed policy and a new policy has not been made public yet. Section 84A of the Indian Information Technology (Amendment) Act, 2008 empowers the government to formulate rules on modes of encryption for the electronic medium. Legal commentators have noted the lack of transparency about what types of encryption use and deployment are permitted and required under Indian law, especially in the field of electronic communications services. Thus, the Central Indian Government has, in theory, a broad exclusive monopoly over electronic communications which includes the privilege to provide telecommunication and Internet services in India.


Brazil

After the Edward Snowden revelations in 2013, Brazil was at the forefront of a global coalition promoting the right to privacy at the UN and condemning USA mass surveillance. In recent events, Brazil has demonstrated diverse aims when it comes to the use and implementation of encryption. On the one side, the country is a leader in providing a legal framework of rules for the Internet. But it has also taken several measures that may be seen to restrict the dissemination of encryption technology. In 2015, in a process that was open for public comments and discussions, Brazil's legislator drafted a new privacy bill ("proteção de dados pessoais"), which was sent to Brazil's Federal Congress on May 13, 2016 and came into force as Bill 5276 of 2016. It regulates and protects
personal data Personal data, also known as personal information or personally identifiable information (PII), is any information related to an identifiable person. The abbreviation PII is widely accepted in the United States, but the phrase it abbreviates ha ...
and privacy, including online practices and includes provisions for more secure methods such as encryption on the treatment of personal data. The law also addresses security issues and a duty for companies to report any attacks and security breaches. With the Marco Civil (2014), that introduces principles like neutrality, the Brazilian Civil Rights Framework for the Internet, Brazil was one of the first countries to ever introduce a law, that aims at combining all Internet rules in one bundle. Brazil has a well-established e-government model: The Brazilian Public Key Infrastructure (Infraestrutura de Chaves Públicas Brasileira – ICP-Brasil). Since 2010 ICP-Brasil certificates can be partly integrated in Brazilian IDs, which can then be used for several services like tax revenue service, judicial services or bank related services. In practice, the ICP-Brasil digital certificate acts as a virtual identity that enables secure and unique identification of the author of a message or transaction made in an electronic medium such as the web. Brazilian courts have taken a stance against encryption in private messaging services by repeatedly ordering the blocking of the messaging service
WhatsApp WhatsApp (also called WhatsApp Messenger) is an internationally available freeware, cross-platform, centralized instant messaging (IM) and voice-over-IP (VoIP) service owned by American company Meta Platforms (formerly Facebook). It allows us ...
. Since it switched to a full end-to-end encryption, the service has been periodically blocked as a result of a court order in an attempt to make the company comply with demands for information.


African countries

The African (
Banjul Banjul (,"Banjul"
(US) and
), officially the City of Ba ...
) Charter on Human and People's Rights, was adopted in the context of the
African Union The African Union (AU) is a continental union consisting of 55 member states located on the continent of Africa. The AU was announced in the Sirte Declaration in Sirte, Libya, on 9 September 1999, calling for the establishment of the Africa ...
in 1981. A Protocol to the Charter, establishing the
African Court on Human and Peoples' Rights The African Court on Human and Peoples' Rights, also known simply as the African Court, is an international court established by member states of the African Union (AU) to implement provisions of the African Charter on Human and Peoples' Rights ...
was adopted in 1998 and came into effect in 2005. In the area of
information policy Information policy is the set of all public laws, regulations and policies that encourage, discourage, or regulate the creation, use, storage, access, and communication and dissemination of information. It thus encompasses any other decision-makin ...
, the African Union has adopted the African Union Convention on Cyber Security and Personal Data Protection. The provisions on personal data protection in this Convention generally follow the European model for the protection of data privacy and contains a number of provisions on the security of personal data processing. A civil society initiative has adopted a specific African Declaration on Internet Rights and Freedoms "to help shape approaches to Internet policy-making and governance across the continent".


Northern Africa

Different countries in the
North-Africa North Africa, or Northern Africa is a region encompassing the northern portion of the African continent. There is no singularly accepted scope for the region, and it is sometimes defined as stretching from the Atlantic shores of Mauritania in ...
n region have not seen a significant rise in legal actions aiming at the suppression of encryption in the transformations that started in 2011. Although legislation often dates back to before the transformations, the enforcement has become stricter since then. No difference in the position towards cryptography can be seen between the countries that had successful revolutions and went through regime changes and those that didn't.
Tunisia ) , image_map = Tunisia location (orthographic projection).svg , map_caption = Location of Tunisia in northern Africa , image_map2 = , capital = Tunis , largest_city = capital , ...
has several laws that limit online anonymity. Articles 9 and 87 of the 2001 Telecommunication Code ban the use of encryption and provide a sanction of up to five years in prison for the unauthorized sale and use of such techniques. In
Algeria ) , image_map = Algeria (centered orthographic projection).svg , map_caption = , image_map2 = , capital = Algiers , coordinates = , largest_city = capital , relig ...
, users have legally needed authorization for the use of cryptographic technology from the relevant telecommunications authority ARPT (Autorité de Régulation de la Poste et des Télécommunications) since 2012. In
Egypt Egypt ( ar, مصر , ), officially the Arab Republic of Egypt, is a transcontinental country spanning the northeast corner of Africa and southwest corner of Asia via a land bridge formed by the Sinai Peninsula. It is bordered by the Mediter ...
, Article 64 of the 2003 Telecommunication Regulation Law states that the use of encryption devices is prohibited without the written consent of the NTRA, the military, and national security authorities. In
Morocco Morocco (),, ) officially the Kingdom of Morocco, is the westernmost country in the Maghreb region of North Africa. It overlooks the Mediterranean Sea to the north and the Atlantic Ocean to the west, and has land borders with Algeria to ...
, the import and export of cryptographic technology, be it soft- or hardware, requires a
license A license (or licence) is an official permission or permit to do, use, or own something (as well as the document of that permission or permit). A license is granted by a party (licensor) to another party (licensee) as an element of an agreeme ...
from the government. The relevant law No. 53-05 (Loi n° 53-05 relative à l'échange électronique de données juridiques) went into effect in December 2007.


East Africa

There are no specific provisions in effect in countries in the East-African region restricting the use of encryption technology. As in other African countries, the main reason given for State surveillance is the prevention of terroristic attacks.
Kenya ) , national_anthem = "Ee Mungu Nguvu Yetu"() , image_map = , map_caption = , image_map2 = , capital = Nairobi , coordinates = , largest_city = Nairobi , ...
with its proximity to
Somalia Somalia, , Osmanya script: 𐒈𐒝𐒑𐒛𐒐𐒘𐒕𐒖; ar, الصومال, aṣ-Ṣūmāl officially the Federal Republic of SomaliaThe ''Federal Republic of Somalia'' is the country's name per Article 1 of thProvisional Constituti ...
, has cited this threat for adopting restrictive actions. The country has recently fast-tracked a Computer and Cybercrime Law, to be adopted in the end of 2016. In
Uganda }), is a landlocked country in East Africa East Africa, Eastern Africa, or East of Africa, is the eastern subregion of the African continent. In the United Nations Statistics Division scheme of geographic regions, 10-11-(16*) territor ...
a number of laws and ICT policies have been passed over the past three years, none of them however deal with encryption. In 2016, following the Presidential Elections, the Ugandan government shut down social networks such as Twitter, Facebook and WhatsApp.


West Africa

West-African countries neither limit the import or export of encryption technology, nor its use, most national and foreign companies still rely on the use of VPNs for their communication.
Ghana Ghana (; tw, Gaana, ee, Gana), officially the Republic of Ghana, is a country in West Africa. It abuts the Gulf of Guinea and the Atlantic Ocean to the south, sharing borders with Ivory Coast in the west, Burkina Faso in the north, and To ...
recently introduced a draft law aiming at intercepting electronic and postal communications of citizens, to aid crime prevention. Section 4(3) of the proposed bill gives the government permission to intercept anyone's communication upon only receiving oral order from a public officer. Recently the Nigerian Communications Commission has drafted a bill regarding Lawful Interception of Communications Regulations. If passed, the bill allows the interception of all communication without
judicial The judiciary (also known as the judicial system, judicature, judicial branch, judiciative branch, and court or judiciary system) is the system of courts that adjudication, adjudicates legal disputes/disagreements and interprets, defends, and app ...
oversight or court order and forces mobile
phone companies A telephone company, also known as a telco, telephone service provider, or telecommunications operator, is a kind of communications service provider (CSP), more precisely a telecommunications service provider (TSP), that provides telecommunicat ...
to store voice and
data communication Data transmission and data reception or, more broadly, data communication or digital communications is the transfer and reception of data in the form of a digital bitstream or a digitized analog signal transmitted over a point-to-point or ...
for three years. Furthermore, the draft plans to give the National Security Agency a right to ask for a key to decrypt all encrypted communication.


Southern Africa

Users in South Africa are not prohibited from using encryption. The provision of such technology, however, is strictly regulated by the Electronic Communications and Transactions Act, 2002.


Central Africa

Countries in Central Africa, like the
Democratic Republic of Congo The Democratic Republic of the Congo (french: République démocratique du Congo (RDC), colloquially "La RDC" ), informally Congo-Kinshasa, DR Congo, the DRC, the DROC, or the Congo, and formerly and also colloquially Zaire, is a country in ...
, the
Central African Republic The Central African Republic (CAR; ; , RCA; , or , ) is a landlocked country in Central Africa. It is bordered by Chad to the north, Sudan to the northeast, South Sudan to the southeast, the DR Congo to the south, the Republic of th ...
,
Gabon Gabon (; ; snq, Ngabu), officially the Gabonese Republic (french: République gabonaise), is a country on the west coast of Central Africa. Located on the equator, it is bordered by Equatorial Guinea to the northwest, Cameroon to the north ...
and
Cameroon Cameroon (; french: Cameroun, ff, Kamerun), officially the Republic of Cameroon (french: République du Cameroun, links=no), is a country in west-central Africa. It is bordered by Nigeria to the west and north; Chad to the northeast; the C ...
do not yet have a well-developed
legal framework A legal doctrine is a framework, set of rules, procedural steps, or test, often established through precedent in the common law, through which judgments can be determined in a given legal case. A doctrine comes about when a judge makes a ruling ...
addressing Internet policy issues. The Internet remains a relatively unregulated sphere.


Human rights legal framework related to cryptography


International instruments

While a very broad range of human rights is touched upon by
Digital Technologies Digital electronics is a field of electronics involving the study of digital signals and the engineering of devices that use or produce them. This is in contrast to analog electronics and analog signals. Digital electronic circuits are usually ...
, the human rights to freedom of expression (Art. 19 International Covenant on Civil and Political Rights CCPR and the right to private life (Art. 17 ICCPR) are of particular relevance to the protection of cryptographic methods. Unlike the Universal Declaration of Human Rights (UDHR) which is international '
soft law The term ''soft law'' refers to quasi-legal instruments (like recommendations or guidelines) which do not have any legally binding force, or whose binding force is somewhat weaker than the binding force of traditional law. Soft law is often contras ...
', the ICCPR is a
legally binding A contract is a legally enforceable agreement between two or more parties that creates, defines, and governs mutual rights and obligations between them. A contract typically involves the transfer of goods, services, money, or a promise to tran ...
international treaty A treaty is a formal, legally binding written agreement between actors in international law. It is usually made by and between sovereign states, but can include international organizations, individuals, business entities, and other legal perso ...
. Restrictions on the right to freedom of expression are only permitted under the conditions of Article 19, paragraph 3. Restrictions shall be provided for by law and they shall be necessary (a) for the respect of the rights or reputations of others or (b) for the protection of national security or of
public order In criminology, public-order crime is defined by Siegel (2004) as "crime which involves acts that interfere with the operations of society and the ability of people to function efficiently", i.e., it is behaviour that has been labelled criminal ...
or of
public health Public health is "the science and art of preventing disease, prolonging life and promoting health through the organized efforts and informed choices of society, organizations, public and private, communities and individuals". Analyzing the det ...
or morals. A further possibility for restriction is set out in Art. 20 ICCPR, In the context of limitations on cryptography, restrictions will most often be based on Article 19 (3)(b), i.e. risks for national security and public order. This raises the complex issue of the relation, and distinction, between security of the individual, e.g. from interference with personal electronic communications, and national security. The right to privacy protects against 'arbitrary or unlawful interference' with one's privacy, one's family, one's home and one's correspondence. Additionally, Article 17(1) of the ICCPR protects against 'unlawful attacks' against one's honor and reputation. The scope of Article 17 is broad. Privacy can be understood as the right to control information about one's self. The possibility to live one's life as one sees fit, within the boundaries set by the law, effectively depends on the information which others have about us and use to inform their behavior towards us. That is part of the core justification for protecting privacy as a human right. In addition to the duty to not infringe these rights, States have a positive obligation to effectively ensure the enjoyment of freedom of expression and privacy of every individual under their jurisdiction. These rights may conflict with other rights and interests, such as
dignity Dignity is the right of a person to be valued and respected for their own sake, and to be treated ethically. It is of significance in morality, ethics, law and politics as an extension of the Enlightenment-era concepts of inherent, inalienable ...
, equality or life and security of an individual or legitimate public interests. In these cases, the integrity of each right or value must be maintained to the maximum extent, and any limitations required for balancing have to be in law, necessary and proportionate (especially least restrictive) in view of a legitimate aim (such as the rights of others, public morals and national security).


Guaranteeing "uninhibited communications"

Encryption supports this mode of communication by allowing people to protect the integrity,
availability In reliability engineering, the term availability has the following meanings: * The degree to which a system, subsystem or equipment is in a specified operable and committable state at the start of a mission, when the mission is called for at a ...
and confidentiality of their communications. The requirement of uninhibited communications is an important precondition for freedom of communication, which is acknowledged by constitutional courts e.g.
US Supreme Court The Supreme Court of the United States (SCOTUS) is the highest court in the federal judiciary of the United States. It has ultimate appellate jurisdiction over all U.S. federal court cases, and over state court cases that involve a point of ...
and the
Federal Constitutional Court of Germany The Federal Constitutional Court (german: link=no, Bundesverfassungsgericht ; abbreviated: ) is the supreme constitutional court for the Federal Republic of Germany, established by the constitution or Basic Law () of Germany. Since its inc ...
as well as the
European Court of Human Rights The European Court of Human Rights (ECHR or ECtHR), also known as the Strasbourg Court, is an international court of the Council of Europe which interprets the European Convention on Human Rights. The court hears applications alleging that a ...
. More specifically, meaningful communication requires people's ability to freely choose the pieces of information and develop their ideas, the style of language and select the medium of communication according to their personal needs. Uninhibited communication is also a
precondition In computer programming, a precondition is a condition or predicate that must always be true just prior to the execution of some section of code or before an operation in a formal specification. If a precondition is violated, the effect of the s ...
for autonomous personal development. Human beings grow their personality by communicating with others.Tarlach McGonagle. The United Nations and Freedom of Expression and Information. chapter 1, p. 3. UN's first Special Rapporteur on Privacy, professor Joe Cannataci, stated that ''"privacy is not just an enabling right as opposed to being an end in itself, but also an essential right which enables the achievement of an over-arching fundamental right to the free, unhindered development of one's personality"''. In case such communication is inhibited, the interaction is biased because a statement does not only reflect the speaker's true (innermost) personal views but can be unduly influenced by considerations that should not shape communication in the first place. Therefore, the process of forming one's personality through
social interaction A social relation or also described as a social interaction or social experience is the fundamental unit of analysis within the social sciences, and describes any voluntary or involuntary interpersonal relationship between two or more individuals ...
is disrupted. In a complex society freedom of speech does not become reality when people have the right to speak. A second level of guarantees need to protect the precondition of making use of the right to express oneself. If there is the risk of
surveillance Surveillance is the monitoring of behavior, many activities, or information for the purpose of information gathering, influencing, managing or directing. This can include observation from a distance by means of electronic equipment, such as c ...
the right to protect one freedom of speech by means of encryption has to be considered as one of those second level rights. Thus, restriction of the availability and effectiveness of encryption as such constitutes an interference with the freedom of expression and the right to privacy as it protects private life and correspondence. Therefore, it has to be assessed in terms of
legality Legality, in respect of an act, agreement, or contract is the state of being consistent with the law or of being lawful or unlawful in a given jurisdiction, and the construct of power. According to the Merriam-Webster Dictionary, legality is 1 : ...
, necessity and purpose.


Procedures and transparency

Freedom of expression and the right to privacy (including the right to private communications) materially protect a certain behavior or a personal state. It is well established in fundamental rights theory that substantive rights have to be complemented by procedural guaranties to be effective. Those procedural guarantees can be rights such as the right to an effective remedy. However, it is important to acknowledge that those procedural rights must, similar to the substantive rights, be accompanied by specific procedural duties of governments without which the rights would erode. The substantial rights have to be construed in a way that they also contain the duty to make governance systems transparent, at least to the extent that allows citizens to assess who made a decision and what measures have been taken. In this aspect, transparency ensures accountability. It is the precondition to know about the dangers for fundamental rights and make use of the respective freedoms.


Security intermediaries

The effectuation of human rights protection requires the involvement of service providers. These service providers often act as
intermediaries An intermediary (or go-between) is a third party that offers intermediation services between two parties, which involves conveying messages between principals in a dispute, preventing direct contact and potential escalation of the issue. In law ...
facilitating expression and communication of their users of different kinds. In debates about cryptographic policy, the question of lawful government access – and the conditions under which such access should take place in order to respect human rights – has a vertical and national focus. Complexities of
jurisdiction Jurisdiction (from Latin 'law' + 'declaration') is the legal term for the legal authority granted to a legal entity to enact justice. In federations like the United States, areas of jurisdiction apply to local, state, and federal levels. Jur ...
in lawful government access are significant and present a still unsolved puzzle. In particular, there has been a dramatic shift from traditional lawful government access to
digital communications Data transmission and data reception or, more broadly, data communication or digital communications is the transfer and reception of data in the form of a digital bitstream or a digitized analog signal transmitted over a point-to-point or ...
through the targeting of telecommunications providers with strong local connections, to access through targeting over-the-top services with fewer or loose connections to the jurisdictions in which they offer services to users. In which cases such internationally operating service providers should (be able to) hand over user data and communications to local authorities. The deployment of encryption by service providers is a further complicating factor. From the perspective of service providers, it seems likely that cryptographic methods will have to be designed to account for only providing user data on the basis of valid legal process in certain situations. In recent years, companies and especially online intermediaries have found themselves increasingly in the focus of the debate on the implementation of human rights. Online intermediaries not only have a role of intermediaries between
Content Providers A value-added service (VAS) is a popular telecommunications industry{{cite web, url=http://www.prweb.com/releases/2013/11/prweb11284640.htm, title=Global Mobile Value Added Services (VAS) Market: Worldwide Industry Share, Investment Trends, Growth, ...
and users but also one of "Security Intermediaries" in various aspects. Their practices and defaults as regards encryption are highly relevant to the user's access to and effective usage of those technologies. Since a great amount of data is traveling through their routers and is stored in their clouds, they offer ideal points of access for the intelligence community and
non-state actor A non-state actor (NSA) are organizations and/or individuals that are not affiliated with, directed by, or funded by any government. The interests, structure, and influence of NSAs vary widely. For example, among NSAs are non-profit organizations, ...
s. Thus, they also, perhaps involuntarily, function as an interface between the state and the users in matters of encryption policy. The role has to be reflected in the human rights debate as well, and it calls for a comprehensive integration of security of user information and communication in the emerging
Internet governance Internet governance consists of a system of laws, rules, policies and practices that dictate how its board members manage and oversee the affairs of any internet related-regulatory body. This article describes how the Internet was and is currentl ...
model of today.


Internet universality


Human rights and encryption: obligations and room for action

UNESCO is working on promoting the use of legal assessments based on human rights in cases of interference with the freedom to use and deploy cryptographic methods. The concept of Internet Universality, developed by UNESCO, including its emphasis on
openness Openness is an overarching concept or philosophy that is characterized by an emphasis on transparency (behavior), transparency and decentralized decision-making, collaboration. That is, openness refers to "accessibility of knowledge, technology a ...
,
accessibility Accessibility is the design of products, devices, services, vehicles, or environments so as to be usable by people with disabilities. The concept of accessible design and practice of accessible development ensures both "direct access" (i. ...
to all, and multi-stakeholder participation. While these minimal requirements and good practices can be based on more abstract legal analysis, these assessments have to be made in specific contexts. Secure authenticated access to publicly available content, for instance, is a safeguard against many forms of public and private censorship and limits the risk of falsification. One of the most prevalent technical standards that enables secure authenticated access is TLS. Closely related to this is the availability of anonymous access to information. TOR is a system that allows the practically anonymous retrieval of information online. Both aspects of access to content directly benefit the freedom of thought and expression. The principle of
legal certainty Legal certainty is a principle in national and international law which holds that the law must provide those subject to it with the ability to regulate their conduct. The legal system needs to permit those subject to the law to regulate their condu ...
is vital to every juridical process that concerns cryptographic methods or practices. The principle is essential to any forms of interception and surveillance, because it can prevent unreasonable fears of surveillance, such as when the underlying legal norms are drafted precisely. Legal certainty may avert chilling effects by reducing an inhibiting key factor for the exercise of human rights, for UNESCO. Continuous innovation in the field of cryptography and setting and spreading new technical standards is therefore essential. Cryptographic standards can expire quickly as
computing power In computing, computer performance is the amount of useful work accomplished by a computer system. Outside of specific contexts, computer performance is estimated in terms of accuracy, efficiency and speed of executing computer program instruction ...
increases . UNESCO has outlined that education and continuous
modernization Modernization theory is used to explain the process of modernization within societies. The "classical" theories of modernization of the 1950s and 1960s drew on sociological analyses of Karl Marx, Emile Durkheim and a partial reading of Max Weber, ...
of cryptographic techniques are important.


Human rights and cryptographic techniques


Legality of limitations

The impact of human rights can only be assessed by analyzing the possible limitations that states can set for those
freedoms Political freedom (also known as political autonomy or political agency) is a central concept in history and political thought and one of the most important features of democratic societies.Hannah Arendt, "What is Freedom?", ''Between Past and F ...
. UNESCO states that national security can be a legitimate aim for actions that limit freedom of speech and the
right to privacy The right to privacy is an element of various legal traditions that intends to restrain governmental and private actions that threaten the privacy of individuals. Over 150 national constitutions mention the right to privacy. On 10 December 1948 ...
, but it calls for actions that are necessary and proportional. "UNESCO considers an interference with the right to encryption as a guarantee enshrined in the freedom of expression and in privacy as being especially severe if: • It affects the ability of key service providers in the media and communications landscape to protect their users' information and communication through secure cryptographic methods and protocols, thereby constituting the requirement of uninhibited communications for users of networked communication services and technologies. • The state reduces the possibility of vulnerable communities and/or structurally important actors like journalists to get access to encryption; • Mere theoretical risks and dangers drive restrictions to the relevant fundamental rights under the legal system of a state;• The mode of state action, e.g. if restrictions on fundamental rights are established through informal and voluntary arrangements, lead to unaccountable circumvention or erosion of the security of deployed cryptographic methods and technologies."


Sources


See also

*
Free speech Freedom of speech is a principle that supports the freedom of an individual or a community to articulate their opinions and ideas without fear of retaliation, censorship, or legal sanction. The rights, right to freedom of expression has been ...


References

{{Reflist Cryptography Human rights Freedom of speech Privacy Internet governance Encryption debate