Walsh Report (cryptography)

Last updated

The Walsh Report was an Australian cryptography policy review undertaken for the Australian government by Gerard Walsh, initially released in 1996 and then withdrawn before its sale to the public. Electronic Frontiers Australia (EFA) obtained a redacted copy under freedom of information laws and published it on EFA's website. Subsequently, an unredacted copy was found and the redacted parts were added to the EFA copy.

Contents

Policy review

The Walsh Report was an Australian cryptography policy review undertaken at the request of the Secretary of the Attorney-General's Department [1] by Gerard Walsh, the former deputy director of the Australian Security Intelligence Organisation (ASIO). [2] The report included a broad analysis of cryptography issues from an Australian context. [3]

The report, titled Review of Policy relating to Encryption Technologies, is popularly called the Walsh Report. [2]

In his report, Walsh found that there was a lack of coordination in the government over the establishment of cryptography policy. Walsh also reported no clarity as to which department and which minister was responsible for cryptographic policy. Consequently, there was a danger that policy would be developed without being coordinated. [2]

The main advice given by Walsh in the report was that major legislative action to safeguard law-enforcement or national security was not required at the time.

No specific options were recommended in the report for legislation on cryptography, nor did the report recommend mandatory key recovery. [4]

Recommendations in the report for minor legislative and other actions included:

History

Background

Walsh was invited to undertake his review following on from the Barrett Report, which concluded: "while Australian agencies all report that encryption has not been a problem to date, it is likely to become one in the future." [1]

Initial issue

The Walsh Report was issued on 10 October 1996. [2]

Deposit copies

After being printed, deposit copies of the report were lodged by the Australian Government Publishing Service (AGPS) [5] [ dead link ] with around 40 university and public libraries under a free deposit scheme. [6]

Embargo

The report was listed for sale in January 1997 by AGPS. Three weeks later, Electronic Frontiers Australia (EFA) enquired why it was not actually available. [1]

In February 1997, [4] before the Walsh Report was publicly released, the Australian Attorney-General's Department embargoed it and withheld the report from commercial sale. [2] [5]

FOI request

In March 1997 EFA applied for the release of the Walsh Report under the Freedom of Information Act 1982. [1] [5] [7] [8]

Initially, the request was denied. Following a review that was requested by EFA, [1] in June 1997 [1] EFA obtained a copy of the Walsh Report that had been redacted [2] [3] on national security, [3] defence, international relations, internal working document, law enforcement and public safety grounds. [1]

EFA then published the redacted version of the Walsh Report on its website. [8]

Discovery of deposit copies

In December 1998 [5] an uncensored copy of the Walsh Report was discovered in the State Library of Tasmania by Nick Ellsmore, a university student in Hobart. [2] [6] [7] [9] [10] Ellsmore alerted EFA to the availability of the report. [1]

Publication of unredacted version

By comparing the redacted and unredacted copies it was possible to identify the censored sections of the report. [9]

EFA added the redacted parts to its copy on the Internet, [2] and highlighted them in red. [1]

Following the discovery of the uncensored copies of the Walsh report, The Australian newspaper revealed the censored recommendations. [6] Release of the complete report was also covered by Hobart's Mercury , Melbourne's Sun-Herald , The Sydney Morning Herald , many Internet news sites and radio stations in Perth and Sydney. [1]

Recall of deposit copies

On 10 February 1999, after The Australian's revelations, the Australian Government Information Service (AusInfo), the government publisher, wrote to the deposit libraries. The AusInfo letter, said that the "Attorney-General's Department wants all copies recalled" and asked that copies of the report be returned to AusInfo.

A spokesperson for Daryl Williams, the Attorney-General, said that the release of the Walsh report had been discussed with AusInfo, but denied that the Government initiated the recall.

In February 1999, EFA cryptography committee chairman, Greg Taylor, said: "The bumbling attempts to censor the [Walsh] report have only served to focus international attention on it". [6]

Censored parts

Redacted observations included:

The censored recommendations included:

Related Research Articles

Data Encryption Standard Early unclassified symmetric-key block cipher

The Data Encryption Standard is a symmetric-key algorithm for the encryption of digital data. Although its short key length of 56 bits makes it too insecure for applications, it has been highly influential in the advancement of cryptography.

Encryption Process of converting plaintext to ciphertext

In cryptography, encryption is the process of encoding information. This process converts the original representation of the information, known as plaintext, into an alternative form known as ciphertext. Ideally, only authorized parties can decipher a ciphertext back to plaintext and access the original information. Encryption does not itself prevent interference but denies the intelligible content to a would-be interceptor.

A cypherpunk is any individual advocating widespread use of strong cryptography and privacy-enhancing technologies as a route to social and political change. Originally communicating through the Cypherpunks electronic mailing list, informal groups aimed to achieve privacy and security through proactive use of cryptography. Cypherpunks have been engaged in an active movement since at least the late 1980s.

Communications security

Communications security is the discipline of preventing unauthorized interceptors from accessing telecommunications in an intelligible form, while still delivering content to the intended recipients.

<i>Bernstein v. United States</i> 1990s legal case involving Snuffle encryption

Bernstein v. United States is a set of court cases brought by Daniel J. Bernstein challenging restrictions on the export of cryptography from the United States.

Clipper chip Encryption device promoted by the NSA in the 1990s

The Clipper chip was a chipset that was developed and promoted by the United States National Security Agency (NSA) as an encryption device that secured "voice and data messages" with a built-in backdoor that was intended to "allow Federal, State, and local law enforcement officials the ability to decode intercepted voice and data transmissions." It was intended to be adopted by telecommunications companies for voice transmission. Introduced in 1993, it was entirely defunct by 1996.

Export of cryptography from the United States Transfer from the United States to another country of devices and technology related to cryptography

Export of cryptographic technology and devices from the United States was severely restricted by U.S. law until 1992. The law gradually became eased until around 2000, but some restrictions still remain today.

Electronic Frontiers Australia

Electronic Frontiers Australia Inc. (EFA) is a non-profit Australian national non-government organisation representing Internet users concerned with online liberties and rights. It has been vocal on the issue of Internet censorship in Australia.

Dorothy E. Denning American information security researcher

Dorothy Elizabeth Denning, born August 12, 1945, is a US-American information security researcher known for lattice-based access control (LBAC), intrusion detection systems (IDS), and other cyber security innovations. She published four books and over 200 articles. Inducted into the National Cyber Security Hall of Fame in 2012, she is now Emeritus Distinguished Professor of Defense Analysis, Naval Postgraduate School.

The Cyberspace Electronic Security Act of 1999 (CESA) is a bill proposed by the Clinton administration during the 106th United States Congress that enables the government to harvest keys used in encryption. The Cyberspace Electronic Security Act gives law enforcement the ability to gain access to encryption keys and cryptography methods. The initial version of this act enabled federal law enforcement agencies to secretly use monitoring, electronic capturing equipments and other technologies to access and obtain information. These provisions were later stricken from the act, although federal law enforcement agencies still have a significant degree of latitude to conduct investigations relating to electronic information. The act generated discussion about what capabilities should be allowed to law enforcement in the detection of criminal activity. After vocal objections from civil liberties groups, the administration backed away from the controversial bill.

Cryptography Practice and study of secure communication techniques

Cryptography, or cryptology, is the practice and study of techniques for secure communication in the presence of adversarial behavior. More generally, cryptography is about constructing and analyzing protocols that prevent third parties or the public from reading private messages; various aspects in information security such as data confidentiality, data integrity, authentication, and non-repudiation are central to modern cryptography. Modern cryptography exists at the intersection of the disciplines of mathematics, computer science, electrical engineering, communication science, and physics. Applications of cryptography include electronic commerce, chip-based payment cards, digital currencies, computer passwords, and military communications.

Key disclosure laws, also known as mandatory key disclosure, is legislation that requires individuals to surrender cryptographic keys to law enforcement. The purpose is to allow access to material for confiscation or digital forensics purposes and use it either as evidence in a court of law or to enforce national security interests. Similarly, mandatory decryption laws force owners of encrypted data to supply decrypted data to law enforcement.

CryptoParty (Crypto-Party) is a grassroots global endeavour to introduce the basics of practical cryptography such as the Tor anonymity network, I2P, Freenet, key signing parties, disk encryption and virtual private networks to the general public. The project primarily consists of a series of free public workshops.

Bullrun (decryption program) Code name of a decryption program run by the NSA

Bullrun is a clandestine, highly classified program to crack encryption of online communications and data, which is run by the United States National Security Agency (NSA). The British Government Communications Headquarters (GCHQ) has a similar program codenamed Edgehill. According to the BULLRUN classification guide published by The Guardian, the program uses multiple methods including computer network exploitation, interdiction, industry relationships, collaboration with other intelligence community entities, and advanced mathematical techniques.

Mass surveillance in Australia takes place in several network media including telephone, internet, and other communications networks, financial systems, vehicle and transit networks, international travel, utilities, and government schemes and services including those asking citizens to report on themselves or other citizens.

Crypto Wars

The Crypto Wars is an unofficial name for the attempts of the United States (US) and allied governments to limit the public's and foreign nations' access to cryptography strong enough to thwart decryption by national intelligence agencies, especially the National Security Agency (NSA).

FBI–Apple encryption dispute 2015-2016 public relations and legal dispute

The FBI–Apple encryption dispute concerns whether and to what extent courts in the United States can compel manufacturers to assist in unlocking cell phones whose data are cryptographically protected. There is much debate over public access to strong encryption.

J. Alex Halderman

J. Alex Halderman is professor of Computer Science and Engineering at the University of Michigan, where he is also director of the Center for Computer Security & Society. Halderman's research focuses on computer security and privacy, with an emphasis on problems that broadly impact society and public policy.

Human rights and encryption

Human rights applied to encryption is an important concept for freedom of expression as encryption is a technical resource of implementation of basic human rights.

References

  1. 1 2 3 4 5 6 7 8 9 10 11 12 Ellsmore, Nick (4 July 1999). "Cryptology: Law Enforcement & National Security vs. Privacy, Security & The Future of Commerce". cryptome.org/. Retrieved 25 August 2014.
  2. 1 2 3 4 5 6 7 8 9 10 Cryptography And Liberty 1999: An International Survey of Encryption Policy. Electronic Privacy Information Center. 1999. ISBN   1893044033 . Retrieved 10 July 2014.
  3. 1 2 3 Koops, Bert-Jaap (1998). The Crypto Controversy: A Key Conflict in the Information Society. Kluwer Law International. p. 2. ISBN   9041111433 . Retrieved 22 June 2014.
  4. 1 2 3 Koops, Bert-Jaap (February 2013). "Crypto Law Survey : Australia". cryptolaw.org/. Retrieved 25 August 2014.
  5. 1 2 3 4 "Australia - Walsh report on global cryptography debate". EU Legal Advisory Board News. January–February 1999. Retrieved 22 August 2014. In December 1998, several uncensored copies of the Walsh Report, which constitutes an important review of Australian cryptography policy, were found in public and university libraries in Australia. These are believed to be deposit copies lodged by the Australian Government Publishing Service (AGPS) after the report was printed but before the 1997 decision by the Attorney-General's Department to withhold it from commercial sale. In March 1997, Electronic Frontiers Australia (EFA), applied for release of the report under the 1982 Freedom of Information Act.
  6. 1 2 3 4 5 Tebbutt, Dan (23 Feb 1999). "Canberra suppresses IT report". news.com.au. Archived from the original on 1999-04-27. Retrieved 20 August 2014.
  7. 1 2 Yiacoumi, Roulla (13 January 1999). "Hidden report reveals crypto paranoia". APC Newswire. Archived from the original on 18 August 2000. Retrieved 22 August 2014. A university student in Tasmania has stumbled across a pivotal government report on cryptography which was mysteriously withdrawn from public view two years ago. ... Online civil liberties group Electronic Frontiers Australia applied for the report's release under the Freedom of Information Act in March 1997.
  8. 1 2 Jackson, Margaret; Hughes, Gordon (2001). Hughes on data protection in Australia. Lawbook Company. p. 319. ISBN   0455217270 . Retrieved 22 June 2014.
  9. 1 2 3 "Censored Report Recommends Australian Police Hack Web Sites". australia.internet.com. 4 January 1999. Retrieved 22 August 2014. Law enforcement agencies in Australia ought to be able to "hack" into corporate computer systems and change proprietary software to enable monitoring of communications, according to a 1996 report which had been censored by the Australian government but recently uncovered by a university student.
  10. Rogers, Matthew (15 January 1999). "Student exposes spying plans". The Mercury. Retrieved 22 August 2014. A HOBART university student has unearthed secret Federal Government plans to let Australia's top spy agencies hire computer hackers to break into the PCs of suspects.[ permanent dead link ]