Home Open Sauce Encryption: Turnbull continues his Man of La Mancha ways

Author's Opinion

The views in this column are those of the author and do not necessarily reflect the views of iTWire.

Have your say and comment below.

Encryption: Turnbull continues his Man of La Mancha ways

An exclusive report this morning says that Australian Prime Minister Malcolm Turnbull plans to ask US President Donald Trump to demand that US technology companies break into encrypted messages sent by suspected terrorists.

It is an indication that the publishing company, Fairfax Media, and the writer, Peter Hartcher, are prepared to print any kind of bunkum as long as it comes from a sufficiently "official" source.

Whether the statement makes sense or not is never the issue, it would appear. The reader is also given no indication that Turnbull is speaking nonsense.

Without any proof, Turnbull also told Hartcher: "The point is, what are the responsibilities that a WhatsApp or a Telegram or a Signal, what are the responsibilities they owe to public safety You have got a very real global threat where terrorist organisations, Islamist terrorist organisations, are using these digital platforms to do us harm."

Many reports in recent times have given people to believe that encryption can be turned on and off like a tap. Fairfax Media has led the way on such reports in recent times, a sad indicator that one of Australia's great publishing houses has sunk to a level where any nonsense is rushed into print as long as it sensational enough.

don quixote

To put it rather bluntly, short of rolling back encryption altogether, there is no way of ensuring that all people who are not behind bars do not have access to encryption.

Tom SulstonTom Sulston (right), a software delivery consultant who works for ThoughtWorks, agrees. "Given that the best encryption libraries are open source, that genie is out of the bottle," he said during an informal exchange with iTWire.

"While governments might choose to compel companies to put backdoors in their individual implementations, the library code remains secure," said Sulston, who recently addressed the Canberra press gallery on the tools journalists could use to help protect their sources from unwanted intrusion.

"So attempts to roll back encryption not only wouldn’t work, they’d punish ordinary citizens while criminals used other, un-backdoored tools, or simply move their communications to other jurisdictions."

Somehow, the Australian government, which can afford to pay any number of consultants steep fees, cannot find a man with the simple common sense that someone like Sulston has. Or is that because the kind of logic that Sulston dishes out would mean that Turnbull would be unable to bloviate as he has in the exclusive interview mentioned at the start of this piece?

Sulston was asked what was the best option for governments in the existing scenario. Pat came the answer: "Governments need to realise the limitations of technology – encryption tools are either broken or not. They can’t be compromised just for intelligence agencies and no-one else. There is a huge gap where our society has gone digital and our government has failed to understand what this means."

Unlike our good Prime Minister, Sulston also knows his limitations as a technologist. "I’m not a legal or security expert, so I don’t have strong (or relevant!) opinions on how governments should tackle terrorism," he confessed.

"But I do believe that their efforts to do so need to remain within the boundaries set by existing laws, including the Universal Declaration of Human Rights."

Turnbull would do well to contemplate the fact that the whole debate about encryption was brought to the fore by the US National Security Agency. Its blanket surveillance of Americans was exposed in 2013 by one Edward Snowden and this led US companies to do everything possible to convince their customers that their data was safe.

Microsoft went so far as to set up a data centre in Germany where it would not be subject to the remit of US laws.

Encryption is built into products like WhatsApp for a reason – the owners, in this case Facebook, want to attract more and more people with the selling point being that whatever they say is secure.

Try asking companies which are making billions hand over fist by offering such apps free, to cut back on encryption.

Empty promises can be made some of the time, but even Turnbull, who probably holds the record for the use of the words "innovative" and "agile" in recent times, should realise that you cannot blow hot air on encryption all the time and expect people not to become cynical as to the motives behind such talk.


Australia is a cyber espionage hot spot.

As we automate, script and move to the cloud, more and more businesses are reliant on infrastructure that has the high potential to be exposed to risk.

It only takes one awry email to expose an accounts’ payable process, and for cyber attackers to cost a business thousands of dollars.

In the free white paper ‘6 Steps to Improve your Business Cyber Security’ you’ll learn some simple steps you should be taking to prevent devastating and malicious cyber attacks from destroying your business.

Cyber security can no longer be ignored, in this white paper you’ll learn:

· How does business security get breached?
· What can it cost to get it wrong?
· 6 actionable tips



Ransomware is a type of malware that blocks access to your files and systems until you pay a ransom.

The first example of ransomware happened on September 5, 2013, when Cryptolocker was unleashed.

It quickly affected many systems with hackers requiring users to pay money for the decryption keys.

Find out how one company used backup and cloud storage software to protect their company’s PCs and recovered all of their systems after a ransomware strike.


Sam Varghese

website statistics

A professional journalist with decades of experience, Sam for nine years used DOS and then Windows, which led him to start experimenting with GNU/Linux in 1998. Since then he has written widely about the use of both free and open source software, and the people behind the code. His personal blog is titled Irregular Expression.


Popular News