Home / Blogs

Jakarta Declaration Calls on Governments to Recognize Legitimacy of Encryption

Dan York

Today in Indonesia, media leaders gathered at UNESCO's World Press Freedom Day event issued the "Jakarta Declaration" calling on governments of the world to recognize the importance of a free and independent media in creating "peaceful, just and inclusive societies". The declaration calls on governments to take steps to support the freedom of the press, and, in the midst of the many actions was this statement:

34. Recognise the legitimacy of the use of encryption and anonymisation technologies;

As a long-time advocate for the widespread usage of encryption to protect our personal communication, I was extremely pleased to see this statement included in the declaration.

My colleague Constance Bommelaer wrote in detail yesterday about WHY encryption is so critical for journalists:

The future of the free press is at risk: encryption is part of the solution

She ends the piece with this call to action:

Governments have a role too. We invite them to adopt the SecureTheInternet principles and to support strong encryption, not only to ensure the safety of journalists, but also as a technology that already allows us to do our banking, conduct local and global business, run our power grids, operate communications networks, and do almost everything else.

As we celebrate World Press Freedom Day, we must remember that journalists and their sources are taking enormous risks right now in making sure crucial stories get told.

In today's environment, where trust in online information is at an all-time low, we need free, safe and independent journalists more than ever. We all have a role to play, and encryption is one step to take us there.

We all DO have a role. And encryption is part of how we get there.

I encourage you all to share this news about the Jakarta Declaration; to share the Jakarta Declaration document itself; to learn more about encryption; and to help people understand why encryption is critical for securing our digital economy!

By Dan York, Author and Speaker on Internet technologies - and on staff of Internet Society. Dan is employed as a Senior Content Strategist with the Internet Society but opinions posted on CircleID are entirely his own. Visit the blog maintained by Dan York here.

Related topics: Cybersecurity, Networks, Policy & Regulation, Privacy

 
   

Don't miss a thing – get the Weekly Wrap delivered to your inbox.

Comments

Your position is untenable Anthony Rutkowski  –  May 09, 2017 7:46 AM PDT

The right of Nation States to demand access to electronic communications unencrypted has existed in treaty instruments since 1850 when networks were first interconnected across borders.  It persisted in every related global treaty instrument since that time and exists today.

Encrypting traffic also breaks the ability for network operators to comply with almost every compliance obligation as well as the ability to effectively manage their networks and provide cyber security to end users.

The protection of journalists is an important objective.  Doing it to advance your own personal or institutional views on encryption seems rather self serving.

We will have to agree to disagree Dan York  –  May 09, 2017 2:05 PM PDT

Tony, you and I will just have to disagree on this one.

The facts are what they are Anthony Rutkowski  –  May 09, 2017 2:24 PM PDT

We can agree that journalists deserve protection.  The public international law of communication networks has been well established for the past 117 years.  Ref. the extensive list of citations and treaty instruments.  The broad array of adverse effects of communication encryption on the wire are also well established.  See also the extensive citations to authoritative materials. 

If you somehow believe that there is some kind of alternative reality out there, it might be useful for readers to understand the basis for your disagreement, Dan.  It also seems disingenuous to take some agreed need like the protection of journalists and use it as a basis for advancing some personal or institutional view on encryption.

You are confusing legal facts with real-world facts. The Famous Brett Watson  –  May 10, 2017 1:01 AM PDT

The public international law of communication networks has been well established for the past 117 years.

Just as well that technology hasn't changed in the last 117 years, then.

Which is the real world? Anthony Rutkowski  –  May 10, 2017 3:42 AM PDT

The rather remarkable facts underlying the public international law provisions is the continuity of norms notwithstanding dramatically different technologies.  In many ways, the emergence of radiocommunication was more challenging than connectionless packet networks a/k/a internets.  The bottom line is that no rational Nation State is likely to ever eliminate a sovereign right to inspect electronic communication when its national security and infrastructure protection is dependent on the capabilities.

The real world is the one in which encryption is something individuals do. The Famous Brett Watson  –  May 10, 2017 5:24 AM PDT

Packet switching isn't the issue. The issue, and the reality, is that parties can encrypt their communication without the cooperation or consent of the communications carrier. You spoke of "the right of Nation States to demand access to electronic communications unencrypted." You're conflating two issues: interception and encryption. Interception is a demand placed on the carrier by the government, but end-to-end encryption has nothing to do with the carrier. The "unencrypted" text is whatever enters the carrier's network and passes through the other side.

So, are we talking about regulating carriers, or private individuals? There's a deadly serious difference between the two. You make it sound like this is all about telecommunications law, but you're introducing concept creep by applying the same idea to the data that users choose to communicate.

It is national security law Anthony Rutkowski  –  May 10, 2017 6:50 AM PDT

Lawful Interception is NOT just a demand placed on carriers by government.  It is any lawful basis for accessing electronic communication and there are a wide array of requirements to do so both public and private.  See Design Requirements Ecosystem.  The requirements also include encryption, and that conflation has existed since 1850 and is found in every network related treaty instrument since then.  At that time, encryption was known as "secret language" and as can be found in the David Kahn Library, related books have existed since the dawn of printing.  See also, John Johnson's The Evolution of British Sigint 1653-1939.

Anyone carrying electronic communication unless contracted otherwise, can demand access to encrypted content, defeat it, or prevent it including dumping the packets.  Government national security requirements can also override any contractual requirements. 

This is not scope creep.  It is part of international treaty provisions for the past 117 years, and no nation is likely to forfeit that sovereign right.  There is no absolute individual right to encrypted electronic communication, nor is that likely to ever occur.

Authoritarianism suits you. The Famous Brett Watson  –  May 10, 2017 11:00 AM PDT

Authoritarianism suits you.

Systems of law suit me Anthony Rutkowski  –  May 10, 2017 2:29 PM PDT

We are dealing with systems of law here that include conflicts among multiple objectives and needs.  The same systems of law enabled public global internetworks for the first time via the 1988 Melbourne treaty.  Other instruments provide protections to journalists.  Legal systems as an alternative to mayhem does suit me.

Fine, so long as you are candid about it being a matter of opinion. The Famous Brett Watson  –  May 11, 2017 8:40 AM PDT

Believe it or not, I respect your opinion, even if I distrust it. The point is that Dan had it right in comment #2 — that "we disagree" concludes the argument. You muddied the waters in comment #3 by posturing as though you had facts on your side. This is all an expression of political temperament, not a technical discussion based in facts.

For the record, I believe in the rule of law, but it's a balancing act. The absence of law is the law of the jungle, but excessive law is the weapon of a tyrant. At this point in history, I'm more concerned about thought police than I am about nefarious communication, particularly since honest free expression is so much more easily targeted than a genuine bad actor.

Back to an untenable position Anthony Rutkowski  –  May 11, 2017 8:50 AM PDT

You may be more concerned about thought police.  However, most of the rest of the world weighs that balance differently - has they have for the past 117 years.  There isn't much new here. 

And, by the way, the number of "genuine bad actors" are far more numerous by several orders of magnitude than those suffering because of their free expressions, and the consequences of not mitigating the adverse effects is also several orders of magnitude more serious.  Your position is untenable, and this is far more than a matter of political viewpoint.

Asserted without evidence, and likewise dismissed. Done The Famous Brett Watson  –  May 11, 2017 10:44 AM PDT

Asserted without evidence, and likewise dismissed. Done here.

Trolling from down under Anthony Rutkowski  –  May 11, 2017 1:17 PM PDT

Without evidence?  In what universe?

It is also apparent from CircleID's own record, in your own words, you seem to argue in your 346 trolling comments (to 4 short blogs) that adverse consequences don't matter and that unfettered networks are better.  That is a position unlikely to persuade most service providers, users, or Nation States.  It's not worth arguing the matter, even with a "famous" person. :-)

Lobbying from a posture of moral superiority The Famous Brett Watson  –  May 12, 2017 12:59 AM PDT

That is a position unlikely to persuade most service providers, users, or Nation States.

An important observation if one's aim is to impose one's values on others.

It's not worth arguing the matter ...

At last, something on which we are in full agreement.

just to put things into perspective ... Herbie Feinbein  –  May 11, 2017 7:10 AM PDT

https://www.yaanatech.com/author/tony/
for those how did not know him.

To post comments, please login or create an account.

Related Blogs

Related News

Explore Topics

Dig Deeper

Afilias Mobile & Web Services

Mobile Internet

Sponsored by Afilias Mobile & Web Services
Afilias

DNS Security

Sponsored by Afilias
Verisign

Cybersecurity

Sponsored by Verisign

Promoted Posts

Now Is the Time for .eco

.eco launches globally at 16:00 UTC on April 25, 2017, when domains will be available on a first-come, first-serve basis. .eco is for businesses, non-profits and people committed to positive change for the planet. See list of registrars offering .eco more»

Industry Updates – Sponsored Posts

Verisign Named to the Online Trust Alliance's 2017 Audit and Honor Roll

Attacks Decrease by 23 Precent in 1st Quarter While Peak Attack Sizes Increase: DDoS Trends Report

Leading Internet Associations Strengthen Cooperation

i2Coalition to Present Tucows CEO Elliot Noss With Internet Community Leadership Award

Verisign Releases Q4 2016 DDoS Trends Report: 167% Increase in Average Peak Attack from 2015 to 2016

Michele Neylon Appointed Chair Elect of i2Coalition

Verisign Q3 2016 DDoS Trends Report: User Datagram Protocol (UDP) Flood Attacks Continue to Dominate

2016 U.S. Election: An Internet Forecast

Government Guidance for Email Authentication Has Arrived in USA and UK

ValiMail Raises $12M for Its Email Authentication Service

MarkMonitor Supports Brand Holders' Efforts Regarding .Feedback Registry

Don't Gamble With Your DNS

Defending Against Layer 7 DDoS Attacks

Understanding the Risks of the Dark Web

New TLD? Make Sure It's Secure

Verisign Releases Q2 2016 DDoS Trends Report - Layer 7 DDoS Attacks a Growing Trend

How Savvy DDoS Attackers Are Using DNSSEC Against Us

Facilitating a Trusted Web Space for Financial Service Professionals

MarkMonitor Partners with CYREN to Deepen Visibility into Global Phishing Attacks

Verisign Named to the Online Trust Alliance's 2016 Honor Roll