Coffee House

Mass surveillance is being undermined by the ‘Snowden effect’

2 June 2015

2:28 PM

2 June 2015

2:28 PM

We are in the middle of a Crypto war again. Perhaps we have always been in the middle of a Crypto war. Since the 70s, the right and ability to encrypt private communications has been fought over, time and again. Here in the UK, Cameron’s re-election has prompted reports of a ‘turbo-charged’ version of the so-called ‘Snoopers’ Charter’, extending further the powers of surveillance that the whistleblower Edward Snowden described as having ‘no limits’.

Two nights ago, the US Patriot Act expired. With it, at least officially, elements of the NSA’s bulk surveillance programme expired too. The law was passed in the wake of 9/11, in order to ‘strengthen domestic security’ and ‘broaden the powers of law-enforcement agencies with regards to identifying and stopping terrorists’. Section 215 of the Act had allowed the NSA to collect mobile phone data on millions of Americans. For the time being, that provision has gone. In the same week, the UN published a report saying encryption is ‘crucial for human rights’.

But the law is only half the story. Privacy advocates were, of course, cautious not to overstate the significance of the act’s suspension. But behind this caution, their successes are far more extensive than the symbolic demise of the Patriot Act. From the perspective of surveillance, the damage has already been done.

The ‘Snowden effect’, named after the whistleblower responsible for outing government surveillance in the US and UK, has brought more companies and technologists to the fight. Their purpose? To provide privacy tools that are powerful, open-source and accessible to the masses. And these groups are winning. As fears over our privacy continue to grow and the government talks about further extending surveillance capability, ordinary people are turning to these tools. What’s more, for the first time, they are beginning to be adopted on a massive scale.

Scale is a significant change, and a significant challenge to security services. Take Tor. Tor is a web browser-cum-network that scrambles your connections and makes your internet browsing more difficult to track. Both Tor and other publicly-available encryption tools always come with a caveat. Although frequently very powerful, especially in combination with one another, they are not perfect. With enough work and with the resources at the disposal of government organisations, a single user’s communications are at risk: the sheer firepower that the security services can use to break into secure channels means that a single suspect is up against it.

Subscribe from £1 per week


This is probably a good thing. If we believe our security services should have the resources to protect us from those who would plan acts of terrorism, for example, then they must be able to intercept the communications of suspects under investigation. Isis advise use of encryption to its supporters in order to protect their identities and whereabouts. Anders Breivik wrote a blog on it. If a suspect was under investigation we would rightly expect MI5 to use wiretaps and human surveillance, after all. Digital communications should be no different.

But what the mass uptake of this kind of software threatens is mass surveillance. Cracking one encryption key is difficult but possible. Cracking millions is a different proposition. Mass uptake of encryption and of VPNs – virtual private networks designed to hide your identity – is anathema to dragnet collection of data.

Take instant messaging, for example. It is estimated that the 700m users of the app WhatsApp currently send thirty billion messages a day. This alone poses a real challenge to those calling for those messages to be somehow ‘read’ and analysed; how on earth do you read 350,000 messages a second? Over the past few years the Centre for the Analysis of Social media at Demos has done a lot of work in partnership with the University of Sussex on ‘Natural Language Processing’, the science of teaching computers to find meaning in the words we use. Conclusion: it isn’t easy. Algorithms are never perfect, and they go out of date quickly as the way we speak changes.

But now, WhatsApp on Android is end-to-end encrypted, with the possibility of extending this to iOS. Thirty billion encrypted messages a day on one platform alone. True, the levels of encryption provided to a single user under investigation won’t stand up to security service surgery, but they will provide a strong barrier to understanding this data in bulk.

WhatsApp is owned by Facebook. Today, Facebook announced the site would allow its users to encrypt emails sent from the site to their personal accounts. It already provides a ‘dark web’ link which allows access through Tor. Whether its users will take advantage of this to increase their levels of security isn’t clear, but it is tacit approval of encryption from one of the biggest technology companies on the planet. And it isn’t just encrypted communications that are becoming more mainstream.

Hola is a peer-to-peer network. It claims to ‘provide everyone on the planet with freedom to access all of the Web’. Put simply, when you use it, your connection is routed through somebody else’s computer, and when you’re not using it, your computer is offered to others for the same purpose. It is wildly popular among those looking to dodge restrictions placed on, say, television shows. Recent estimates place its use at fifty million worldwide.

Hola has been the subject of some controversy of late: above all, they weren’t quite being straight up about the risks of letting somebody else use your internet connection. Nevertheless, it is the first example of a network that is both very difficult to monitor and censor that has really hit the mainstream by offering a slick and desirable service. The much more ethically-sound and established Tor browser has less than a tenth of its userbase, but is also growing. The Ethereum project is a similar attempt to decentralise the internet and take it out of the control of the government and big companies, making it more private and impossible to censor. It raised $12 million in crowd-funded support.

What this means for the security services, and our own security, is difficult to say. The UN has recognised the vital role these tools play in protecting those at risk of oppression. Human rights activists living under government oppression, for example, or citizens looking to bypass government censorship all rely on these tools daily to avoid persecution. In our recent Demos report with my colleague Jamie Bartlett we argue that there is a balance that must be struck in dealing with this kind of powerful technology.

But lack of dialogue between governments and cryptographers, the no-man’s land between the two sides of this crypto war, is deafening. As long as the security services remain silent and Snowden keeps talking, encryption and moves to protect private communication on the internet will accelerate. It is time the government joined the debate, not as enemies of privacy, but as level-headed, publicly accountable figures whose job it is to protect us from those who would do us harm.

Alex Krasodomski is a researcher at the Centre for the Analysis of Social Media at Demos. He can be found tweeting @akrasodomski


More Spectator for less. Subscribe and receive 12 issues delivered for just £12, with full web and app access. Join us.



Show comments
  • G B

    Teresa May stood up in Parliament to tell us how the new anti-terrorist powers had yielded many positive results and kept us safe. Now I suppose this information is sensitive and subject to security, but, why should we believe her because she says it is so. We know the government will spin whatever is expedient to support their encroachment on the privacy of the individual and they need to be stopped.

    • WTF

      When politicians like May stand up and tell us they are going to make criticism of religion a hate crime I don’t for a second believe anything she says is truthful.

      The ONLY cost effective and practical way of reducing terrorist threats from home grown Jihadists is to target the places they inhabit and to h*** with the wet liberals crying racism. Mass surveillance is not at all cost effective and its like trying to kill a fly with a gun, you cant see the terrorist for all the other chatter.

      Political Correctness has a lot to answer for in exposing law abiding citizens to threats from many sources and a good example is the liberal fascists objections to ‘stop and search’ in areas of high crime because of the ethnicity in those areas.

      In America many years ago New York had a serious problem with kids bringing knives and guns to school and people getting killed. The solution, ban all knives & guns from school and have airport style screening as the kids enter. I don’t recall any whining from the left claiming this was racists or against ‘human rights’ as it was the sensible thing to implement ‘stop and search’ at school.

      Now we have American inner cities like Baltimore with far more crime and killing BUT the liberal fascists get on the hobby horse claiming ‘stop and search’ is racially motivated conveniently forgetting that the areas where most of the killing is going on just happens to be an ethnic minority area.

      Home grown terrorism doesn’t start in Knightsbridge or the wealthy suburbs of Surrey, it starts in places like Luton, Leeds or Rotherham. Perhaps if the security spooks spent a bit more time targeting these areas for Jihadists than wasting time on mass data mining they’d be far more successful.

  • Fred Yang

    I believe that everyone should take responsibility for resisting tyranny and authoritarianism.

    this needs to be a collective effort people. Dont rely on others to defend these precious and hard won freedoms

    At the very least, you should be using Tor browser

    Ideally you should also be using Tails and GPG

  • Perseus Slade

    Narrow, focused surveillance is OK.
    Collecting everything and sieving it is not.

  • polistra24

    The law is not “half the story”. The law is utterly irrelevant. NSA and GCHQ do not use laws.

    In fact this whole kerfuffle is a red herring. We don’t need to worry about NSA and GCHQ. They are bloated bureaucracies that have grown to the point where they can’t and don’t USE the information they gather.

    We SHOULD be worrying about Google and Apple and Amazon, who unquestionably ANALYZE and USE the information they gather.

    Ask yourself: After you’ve written something nasty online, have you ever been arrested for it? No. Has Google popped an ad immediately and intelligently echoing what you just wrote? Yes.

    • Simon de Lancey

      Ask yourself: After you’ve written something nasty online, have you ever been arrested for it? No. Has Google popped an ad immediately and intelligently echoing what you just wrote? Yes.

      I have honestly never seen such a thing happen.

  • The Masked Marvel

    Tor was compromised by the FBI ages ago once they were able to exploit a known flaw in Firefox for which the Tor admin didn’t account. That’s how they caught ‘Dread Pirate Roberts’ and shut down (that incarnation of) Silk Road. Snowden used to advocate using Tor back when he was posting angry comments on Ars Technica. Oddly.

    Another obstacle to privacy citizens face is the way governments work with software and hardware companies to install backdoors. Tech companies faced a lot of backlash once people learned from some of Snowden’s stolen documents just how closely they worked together. And please do not mention Facebook in a discussion of privacy without reminding everyone how many violations of it they’ve committed, and likely will again.

  • WTF

    “With enough work and with the resources at the disposal of government organizations, a single user’s communications are at risk:”

    That’s the salient point as its targeted at an individual and not at the masses. No one except the most liberal of liberal fascists has ever had a problem with the security services ‘breaking’ the law against a known or highly suspected threat to national security and its been that way for centuries. It was the PC dogma of the left that has curbed targeted surveillance that has led the security agencies to target everyone at what is virtually a useless exercise as their efforts are diluted.

    I would be far more concerned that they aren’t doing what ever is necessary to stop a terrorist action that they know is going to take place and that includes using ‘extreme prejudice’ against the perpetrators before they can act.

  • itdoesntaddup

    I prefer to limit the legal licence we grant to our intelligence and policing services, and to ensure good oversight of the exercise of that licence. We know that they will operate outside the law (and that they have been doing so, hence the attempts to legitimise post hoc what they have been doing). Best that they restrain themselves only to cases where there is strong moral justification for doing so.

    If we need to assist them to avoid the haystacks from being too big to find the needles, perhaps we should start by being rather more selective about admitting immigrants – just as we did during the Cold War.

    • WTF

      Couldn’t agree more as they’re no different to kids who push the envelope or car drivers who exceed the speed limit. You have to set limits at a sensible level knowing full well some will go further than what has been laid down. A bit like telling your 15 year old daughter you want her home by 10 PM knowing full well she’ll get home by 11 PM. You set the limit below what you believe is acceptable knowing they’ll crank it up to that level anyway.

  • WTF

    Lets have a reality injection here over mass surveillance, control of the people and the security services or exposure of it by Snowden.

    I listened to republican Rand Paul debating this in the house and its clear that
    the NSA exceeded the powers given to them by the Patriot act as the supreme court ruled it so. We all know that if you give powers to authorities they will abuse those powers and ‘stretch’ them to use for political expediency rather than the purposes those powers were handed down. At a local level we see this in our daily lives where town halls have broken the law and overstepped their authority, we see it from the police on many occasions so its hardly surprising that the security agencies break the law as well.

    As to whether we should turn a blind eye or not its debatable. With the security boys we always hear claims that without their ability to break the law (they don’t call it that) they cant protect us, but that doesn’t stand up to scrutiny based on previous terrorist attacks. Virtually ALL major terrorist attacks or attempts in the west were known about by the spooks and not from mass data harvesting but through old fashioned leg work. However, despite seeing a threat beforehand it
    didn’t stop the London bombings nor save Lee Rigbys life. Additionally many terrorist attacks failed due to incompetence by the terrorists and not through electronic surveillance.

    Just recently the TSA airport security in the USA ran some tests to show how secure air safety was or not. The result, it was not that secure and for most
    frequent fliers like myself I was neither surprised nor particularly scared at the results. Flying carries an element of risk as does every activity but screen 100% of passengers in the dumb way they do, will NOT stop a determined terrorist trying to bring a plane down. There are too many holes in the system to plug with blanket surveillance or frisking at security check points.

    Wake up people, the ONLY effective way of countering domestic terrorism is to use
    profiling and target the most likely people who would do us harm. You don’t look for a Islamic Jihadist in a christian run kindergarten you look in a Mosque. You don’t collect 70 million peoples communications in the hope a computer program will find the terrorist buried there, you target communities that harbor these terrorists. At airports, you shouldn’t apply the same checks across the board because of political correctness, you should target the likely suspects for greater
    scrutiny.

    This scatter gun approach whether its ‘data mining’ by the NSA, no targeted security at airports or the UK’s lame attempts to ban encrypted communications
    will never really protect us and ONLY looking at the communities that harbor terrorism is an efficient use of man power and give better results.

    In summary, why should the MAJORITY of law abiding citizens be inconvenienced, have their privacy invaded just because political correctness and the liberal fascists stop us targeting the communities that harbor the source of these threats !

  • Fairly Educated Scot

    Mass surveillance is being undermined by the ‘Snowden effect’. Good.

    • WTF

      The good that might come out of this is that the security people use the saved time and resources and actually use it on targeting the real threats !

  • swatnan

    I want to know who’s watching our guardians.

Close
Can't find your Web ID? Click here