{"id":1709,"date":"2016-07-28T08:42:39","date_gmt":"2016-07-27T22:42:39","guid":{"rendered":"https:\/\/blogs.qut.edu.au\/crime-and-justice-research-centre\/?p=1709"},"modified":"2016-07-28T08:42:39","modified_gmt":"2016-07-27T22:42:39","slug":"recently-published-as-surveillance-gets-smart-hackers-get-smarter","status":"publish","type":"post","link":"https:\/\/blogs.qut.edu.au\/crime-and-justice-research-centre\/2016\/07\/28\/recently-published-as-surveillance-gets-smart-hackers-get-smarter\/","title":{"rendered":"Recently Published: &#8220;As surveillance gets smart, hackers get smarter&#8221;"},"content":{"rendered":"<div class=\"fit-vids-style\">\u00ad<\/div>\n<p><s><\/s><img decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/theconversation.com\/assets\/conversation-logo-3ef91e0a2031c5d9350f37bac3cf5273ef6da3660ffaf7c422b9695f09b6f171.png\" alt=\"Conversation logo 3ef91e0a2031c5d9350f37bac3cf5273ef6da3660ffaf7c422b9695f09b6f171\" \/><\/p>\n<p style=\"text-align: justify\"><em>This post authored by CJRC researcher\u00a0<a href=\"http:\/\/staff.qut.edu.au\/staff\/mannm3\" target=\"_blank\">Dr. Monique Mann<\/a> and School of Justice PhD candidate <a href=\"https:\/\/twitter.com\/MPWils?lang=en\" target=\"_blank\">Michael Wilson <\/a>originally appeared on <a href=\"https:\/\/theconversation.com\/as-surveillance-gets-smart-hackers-get-smarter-62773\" target=\"_blank\">The Conversation\u00a0<\/a>on Thursday\u00a0July 28, 2016.<\/em><\/p>\n<p style=\"text-align: justify\">There is an escalating technological arms race underway between governments and <a href=\"http:\/\/nms.sagepub.com\/content\/7\/5\/625.short\">hacktivists<\/a>. As governments step up their surveillance, the hacktivists find new ways to subvert it.<\/p>\n<p style=\"text-align: justify\">This cat and mouse game has been described as a <a href=\"http:\/\/www.bbc.com\/news\/magazine-26581130\">crypto war<\/a> and it\u2019s been going on for decades.<\/p>\n<p style=\"text-align: justify\">Top secret documents released by <a href=\"https:\/\/theconversation.com\/au\/topics\/edward-snowden\">Edward Snowden<\/a> confirmed the extent of global internet surveillance by government agencies. For example, the United States National Security Agency (NSA) obtained access to systems maintained by <a href=\"https:\/\/www.theguardian.com\/world\/2013\/jun\/06\/us-tech-giants-nsa-data\">tech companies<\/a> and <a href=\"http:\/\/www.smh.com.au\/it-pro\/security-it\/edward-snowden-reveals-tapping-of-major-australianew-zealand-undersea-telecommunications-cable-20140915-10h96v.html\">intercepted undersea cables<\/a> to monitor global internet traffic.<!--more--><\/p>\n<h2 style=\"text-align: justify\">New laws, new powers<\/h2>\n<p style=\"text-align: justify\">The motivation behind the expansion of surveillance powers is to use intelligence gathering to improve security. We see this in recent Australian legislative developments.<\/p>\n<p style=\"text-align: justify\">Australian <a href=\"https:\/\/www.legislation.gov.au\/Details\/C2014A00108\">laws<\/a> allow the Australian Security Intelligence Organisation (<a href=\"https:\/\/www.asio.gov.au\/\">ASIO<\/a>) to infiltrate computer networks. Other new <a href=\"https:\/\/www.legislation.gov.au\/Details\/C2015A00039\">laws<\/a> require internet service providers (ISPs) to retain <a href=\"https:\/\/theconversation.com\/au\/topics\/metadata\">metadata<\/a> for two years.<\/p>\n<p style=\"text-align: justify\">A <a href=\"http:\/\/www.abc.net.au\/news\/2016-01-18\/government-releases-list-of-agencies-applying-to-access-metadata\/7095836\">range of government agencies<\/a> enjoy access without warrant, including many unrelated to criminal justice or national security.<\/p>\n<p style=\"text-align: justify\">But past experience shows how online surveillance can provoke hacktivists to develop and disseminate technologies that enhance privacy.<\/p>\n<p style=\"text-align: justify\">The <a href=\"https:\/\/www.penguin.com.au\/products\/9781863957717\/cypherpunk-revolutionary-julian-assange-short-black-9\">Cypherpunk<\/a> movement arose in direct opposition to state surveillance. They promoted privacy online and released <a href=\"http:\/\/www.pgpi.org\/\">cryptographic code<\/a> to thwart prying eyes.<\/p>\n<p style=\"text-align: justify\">Contemporary advocates for surveillance self-defence include the <a href=\"https:\/\/ssd.eff.org\/en\">Electronic Frontier Foundation<\/a> and Australian Greens Senator <a href=\"http:\/\/scott-ludlam.greensmps.org.au\/stopdataretention\">Scott Ludlam<\/a>.<\/p>\n<p style=\"text-align: justify\">Public figures like Snowden continue to raise awareness and provide advice on how to evade surveillance. Use of TOR, a network that allows people to browse the internet anonymously, <a href=\"http:\/\/www.theregister.co.uk\/2013\/08\/29\/tor_usage_up_by_more_than_100_in_august\/\">increased dramatically<\/a> following Snowden\u2019s revelations about NSA snooping.<\/p>\n<p style=\"text-align: justify\">The <a href=\"http:\/\/fortune.com\/2016\/04\/25\/snowden-encryption-james-clapper\/\">US Director of National Intelligence<\/a> said Snowden\u2019s disclosures accelerated the uptake of encryption by seven years. Just last week it <a href=\"https:\/\/www.theguardian.com\/us-news\/2016\/jul\/21\/phone-case-privacy-data-monitor-bluetooth-wifi-snowden-introspection-engine\">was reported<\/a> that Snowden is developing a new tool to show when mobile phone communications are being monitored.<\/p>\n<p style=\"text-align: justify\">What all this means is that technologies that enhance privacy are now readily available and widely used. There has already been a marked <a href=\"http:\/\/www.scmagazineuk.com\/encryption-increasingly-used-to-hide-attacks-says-new-report\/article\/478222\/\">increase in encrypted internet traffic<\/a>.<\/p>\n<p style=\"text-align: justify\">Even Australian Prime Minister <a href=\"http:\/\/www.abc.net.au\/news\/2015-03-03\/malcolm-turnbull-uses-secret-messaging-app-instead-of-sms\/6276712\">Malcolm Turnbull<\/a> admitted he used <a href=\"https:\/\/www.wickr.com\/\">Wickr<\/a> to encrypt communications.<\/p>\n<p style=\"text-align: justify\">Hacktivists have also launched cyber-attacks in protest to government activities and surveillance. Distributed denial-of-service attacks have been targeted at both government and corporate websites in response to <a href=\"http:\/\/www.bbc.com\/news\/uk-17648852\">email surveillance and extradition<\/a> and the <a href=\"https:\/\/wikileaks.org\/Protesters-against-WikiLeaks.html\">banking blocks<\/a> against WikiLeaks.<\/p>\n<h2 style=\"text-align: justify\">Encryption facilitates crime online<\/h2>\n<p style=\"text-align: justify\">Although arising from benevolent motives, these same tools can be used for more sinister purposes. Illicit marketplaces abound in the <a href=\"http:\/\/www.tandfonline.com\/doi\/full\/10.1080\/00396338.2016.1142085\">dark web<\/a>. Anyone can anonymously buy drugs, firearms, stolen identification or distribute child pornography online.<\/p>\n<p style=\"text-align: justify\">Hackers are now using encryption <a href=\"https:\/\/www.sonicwall.com\/whitepaper\/2016-dell-security-annual-threat-report8107907\">to defeat firewalls<\/a> and overcome anti-virus protection. This has resulted in an upsurge in malware attacks around the world.<\/p>\n<p style=\"text-align: justify\">The ability to conceal identities, communications and locations <a href=\"http:\/\/www.smh.com.au\/technology\/technology-news\/police-follow-the-silk-road-to-online-drug-marketplace-20120810-23ztk.html\">poses more challenges<\/a> for law enforcement and security agencies. It makes identifying offenders and accessing evidence even harder.<\/p>\n<p style=\"text-align: justify\">This means additional resources and new technical skills are needed. Earlier this year the Australian Government announced <a href=\"http:\/\/www.budget.gov.au\/2016-17\/content\/bp2\/html\/bp2_expense-20.htm\">A$230 million<\/a> in funding to implement the <a href=\"https:\/\/cybersecuritystrategy.dpmc.gov.au\/assets\/img\/PMC-Cyber-Strategy.pdf\">Cyber Security Strategy<\/a>. This outlines plans for increased intelligence and offensive cyber capabilities.<\/p>\n<p style=\"text-align: justify\">And so the arms race in the crypto-war continues.<\/p>\n<h2 style=\"text-align: justify\">Security through surveillance?<\/h2>\n<p style=\"text-align: justify\">Despite all this, questions remain about the success of blanket surveillance programs. There is currently no evidence to indicate this actually increases security.<\/p>\n<p style=\"text-align: justify\">We know surveillance can be effective under <a href=\"http:\/\/www.campbellcollaboration.org\/lib\/project\/49\/\">narrow conditions<\/a>, but only for specific crimes. Collecting too much information can also be a <a href=\"http:\/\/euc.sagepub.com\/content\/1\/3\/307.short\">barrier<\/a> to effective intelligence systems.<\/p>\n<p style=\"text-align: justify\">Recent terrorist attacks in Paris reveal how data retention programs that attempt to identify every possible threat are <a href=\"http:\/\/www.slate.com\/articles\/technology\/future_tense\/2015\/11\/the_paris_attacks_weren_t_stopped_by_metadata_surveillance_that_hasn_t_stopped.html\">not failsafe<\/a>. Security agencies become overwhelmed with data. Collecting as much information as possible about as many people as possible may be positively harmful.<\/p>\n<p style=\"text-align: justify\">Significant resources are being spent on strategies with questionable efficacy. These strategies impact privacy, provoke opposition and create new challenges to overcome.<\/p>\n<h2 style=\"text-align: justify\">The privacy-security paradox<\/h2>\n<p style=\"text-align: justify\">Governments are seeking to detect threats through surveillance. But hacktivists are responding to a perceived injustice. Namely, the invasion of the privacy of all internet users.<\/p>\n<p style=\"text-align: justify\">Successive governments <a href=\"http:\/\/www.abc.net.au\/news\/2014-09-22\/abbott-warns-of-shifting-balance-freedom-security\/5760818\">have argued<\/a> for the need to balance security and privacy. But there are both political and practical problems with this approach.<\/p>\n<p style=\"text-align: justify\"><a href=\"http:\/\/www.tandfonline.com\/doi\/abs\/10.1080\/08109020601030001\">Leading academics<\/a> argue security interests will always outweigh individual rights. But encroaching on the privacy of all internet users just antagonises hacktivists and inspires further development and use of tools to enhance privacy.<\/p>\n<p style=\"text-align: justify\">The security versus privacy trade-off becomes a self-defeating paradox.<\/p>\n<p style=\"text-align: justify\">So we need to rethink this balancing act in a way that respects the rights of internet users. The public needs to have confidence that their privacy is respected and that governments are collecting and using information appropriately.<\/p>\n<p style=\"text-align: justify\">Certainly governments have a responsibility for countering threats like terrorism. But it is important to realise that mass indiscriminate surveillance, and the development of technologies to circumvent it, are evolving together.<\/p>\n<p style=\"text-align: justify\">Governments may think they are smart in surveillance, but those evading it are even smarter.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u00ad This post authored by CJRC researcher\u00a0Dr. Monique Mann and School of Justice PhD candidate Michael Wilson originally appeared on The Conversation\u00a0on Thursday\u00a0July 28, 2016. There is an escalating technological arms race underway between governments and hacktivists. As governments step up their surveillance, the hacktivists find new ways to subvert it. This cat and mouse<\/p>\n","protected":false},"author":372,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1,9696,9712],"tags":[11583,11659,10245],"class_list":{"0":"post-1709","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-uncategorized","7":"category-publications","8":"category-staff","9":"tag-michaelwilson","10":"tag-surveillance","11":"tag-theconversation"},"acf":[],"_links":{"self":[{"href":"https:\/\/blogs.qut.edu.au\/crime-and-justice-research-centre\/wp-json\/wp\/v2\/posts\/1709","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.qut.edu.au\/crime-and-justice-research-centre\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.qut.edu.au\/crime-and-justice-research-centre\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.qut.edu.au\/crime-and-justice-research-centre\/wp-json\/wp\/v2\/users\/372"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.qut.edu.au\/crime-and-justice-research-centre\/wp-json\/wp\/v2\/comments?post=1709"}],"version-history":[{"count":4,"href":"https:\/\/blogs.qut.edu.au\/crime-and-justice-research-centre\/wp-json\/wp\/v2\/posts\/1709\/revisions"}],"predecessor-version":[{"id":1713,"href":"https:\/\/blogs.qut.edu.au\/crime-and-justice-research-centre\/wp-json\/wp\/v2\/posts\/1709\/revisions\/1713"}],"wp:attachment":[{"href":"https:\/\/blogs.qut.edu.au\/crime-and-justice-research-centre\/wp-json\/wp\/v2\/media?parent=1709"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.qut.edu.au\/crime-and-justice-research-centre\/wp-json\/wp\/v2\/categories?post=1709"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.qut.edu.au\/crime-and-justice-research-centre\/wp-json\/wp\/v2\/tags?post=1709"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}