Home / Blogs

Jakarta Declaration Calls on Governments to Recognize Legitimacy of Encryption

Today in Indonesia, media leaders gathered at UNESCO’s World Press Freedom Day event issued the “Jakarta Declaration” calling on governments of the world to recognize the importance of a free and independent media in creating “peaceful, just and inclusive societies”. The declaration calls on governments to take steps to support the freedom of the press, and, in the midst of the many actions was this statement:

34. Recognise the legitimacy of the use of encryption and anonymisation technologies;

As a long-time advocate for the widespread usage of encryption to protect our personal communication, I was extremely pleased to see this statement included in the declaration.

My colleague Constance Bommelaer wrote in detail yesterday about WHY encryption is so critical for journalists:

The future of the free press is at risk: encryption is part of the solution

She ends the piece with this call to action:

Governments have a role too. We invite them to adopt the SecureTheInternet principles and to support strong encryption, not only to ensure the safety of journalists, but also as a technology that already allows us to do our banking, conduct local and global business, run our power grids, operate communications networks, and do almost everything else.

As we celebrate World Press Freedom Day, we must remember that journalists and their sources are taking enormous risks right now in making sure crucial stories get told.

In today’s environment, where trust in online information is at an all-time low, we need free, safe and independent journalists more than ever. We all have a role to play, and encryption is one step to take us there.

We all DO have a role. And encryption is part of how we get there.

I encourage you all to share this news about the Jakarta Declaration; to share the Jakarta Declaration document itself; to learn more about encryption; and to help people understand why encryption is critical for securing our digital economy!

BLACK FRIDAY DISCOUNT - CircleID x NordVPN
Get NordVPN  [74% +3 extra months, from $2.99/month]
By Dan York, Author and Speaker on Internet technologies - and Senior Advisor at Internet Society

Dan is a Senior Advisor at the Internet Society but opinions posted on CircleID are his own. View more of Dan’s writing and audio here.

Visit Page

Filed Under

Comments

Your position is untenable Anthony Rutkowski  –  May 9, 2017 2:46 PM

The right of Nation States to demand access to electronic communications unencrypted has existed in treaty instruments since 1850 when networks were first interconnected across borders.  It persisted in every related global treaty instrument since that time and exists today.

Encrypting traffic also breaks the ability for network operators to comply with almost every compliance obligation as well as the ability to effectively manage their networks and provide cyber security to end users.

The protection of journalists is an important objective.  Doing it to advance your own personal or institutional views on encryption seems rather self serving.

We will have to agree to disagree Dan York  –  May 9, 2017 9:05 PM

Tony, you and I will just have to disagree on this one.

The facts are what they are Anthony Rutkowski  –  May 9, 2017 9:24 PM

We can agree that journalists deserve protection.  The public international law of communication networks has been well established for the past 117 years.  Ref. the extensive list of citations and treaty instruments.  The broad array of adverse effects of communication encryption on the wire are also well established.  See also the extensive citations to authoritative materials. 

If you somehow believe that there is some kind of alternative reality out there, it might be useful for readers to understand the basis for your disagreement, Dan.  It also seems disingenuous to take some agreed need like the protection of journalists and use it as a basis for advancing some personal or institutional view on encryption.

You are confusing legal facts with real-world facts. The Famous Brett Watson  –  May 10, 2017 8:01 AM

The public international law of communication networks has been well established for the past 117 years.
Just as well that technology hasn't changed in the last 117 years, then.

Which is the real world? Anthony Rutkowski  –  May 10, 2017 10:42 AM

The rather remarkable facts underlying the public international law provisions is the continuity of norms notwithstanding dramatically different technologies.  In many ways, the emergence of radiocommunication was more challenging than connectionless packet networks a/k/a internets.  The bottom line is that no rational Nation State is likely to ever eliminate a sovereign right to inspect electronic communication when its national security and infrastructure protection is dependent on the capabilities.

The real world is the one in which encryption is something individuals do. The Famous Brett Watson  –  May 10, 2017 12:24 PM

Packet switching isn't the issue. The issue, and the reality, is that parties can encrypt their communication without the cooperation or consent of the communications carrier. You spoke of "the right of Nation States to demand access to electronic communications unencrypted." You're conflating two issues: interception and encryption. Interception is a demand placed on the carrier by the government, but end-to-end encryption has nothing to do with the carrier. The "unencrypted" text is whatever enters the carrier's network and passes through the other side. So, are we talking about regulating carriers, or private individuals? There's a deadly serious difference between the two. You make it sound like this is all about telecommunications law, but you're introducing concept creep by applying the same idea to the data that users choose to communicate.

It is national security law Anthony Rutkowski  –  May 10, 2017 1:50 PM

Lawful Interception is NOT just a demand placed on carriers by government.  It is any lawful basis for accessing electronic communication and there are a wide array of requirements to do so both public and private.  See Design Requirements Ecosystem.  The requirements also include encryption, and that conflation has existed since 1850 and is found in every network related treaty instrument since then.  At that time, encryption was known as “secret language” and as can be found in the David Kahn Library, related books have existed since the dawn of printing.  See also, John Johnson’s The Evolution of British Sigint 1653-1939.

Anyone carrying electronic communication unless contracted otherwise, can demand access to encrypted content, defeat it, or prevent it including dumping the packets.  Government national security requirements can also override any contractual requirements. 

This is not scope creep.  It is part of international treaty provisions for the past 117 years, and no nation is likely to forfeit that sovereign right.  There is no absolute individual right to encrypted electronic communication, nor is that likely to ever occur.

Authoritarianism suits you. The Famous Brett Watson  –  May 10, 2017 6:00 PM

Authoritarianism suits you.

Systems of law suit me Anthony Rutkowski  –  May 10, 2017 9:29 PM

We are dealing with systems of law here that include conflicts among multiple objectives and needs.  The same systems of law enabled public global internetworks for the first time via the 1988 Melbourne treaty.  Other instruments provide protections to journalists.  Legal systems as an alternative to mayhem does suit me.

Fine, so long as you are candid about it being a matter of opinion. The Famous Brett Watson  –  May 11, 2017 3:40 PM

Believe it or not, I respect your opinion, even if I distrust it. The point is that Dan had it right in comment #2 -- that "we disagree" concludes the argument. You muddied the waters in comment #3 by posturing as though you had facts on your side. This is all an expression of political temperament, not a technical discussion based in facts. For the record, I believe in the rule of law, but it's a balancing act. The absence of law is the law of the jungle, but excessive law is the weapon of a tyrant. At this point in history, I'm more concerned about thought police than I am about nefarious communication, particularly since honest free expression is so much more easily targeted than a genuine bad actor.

Back to an untenable position Anthony Rutkowski  –  May 11, 2017 3:50 PM

You may be more concerned about thought police. However, most of the rest of the world weighs that balance differently - has they have for the past 117 years. There isn't much new here. And, by the way, the number of "genuine bad actors" are far more numerous by several orders of magnitude than those suffering because of their free expressions, and the consequences of not mitigating the adverse effects is also several orders of magnitude more serious. Your position is untenable, and this is far more than a matter of political viewpoint.

Asserted without evidence, and likewise dismissed. Done The Famous Brett Watson  –  May 11, 2017 5:44 PM

Asserted without evidence, and likewise dismissed. Done here.

Trolling from down under Anthony Rutkowski  –  May 11, 2017 8:17 PM

Without evidence? In what universe? It is also apparent from CircleID's own record, in your own words, you seem to argue in your 346 trolling comments (to 4 short blogs) that adverse consequences don't matter and that unfettered networks are better. That is a position unlikely to persuade most service providers, users, or Nation States. It's not worth arguing the matter, even with a "famous" person. :-)

Lobbying from a posture of moral superiority The Famous Brett Watson  –  May 12, 2017 7:59 AM

That is a position unlikely to persuade most service providers, users, or Nation States.
An important observation if one's aim is to impose one's values on others.
It's not worth arguing the matter ...
At last, something on which we are in full agreement.

just to put things into perspective ... Herbie Feinbein  –  May 11, 2017 2:10 PM

https://www.yaanatech.com/author/tony/
for those how did not know him.

Comment Title:

  Notify me of follow-up comments

We encourage you to post comments and engage in discussions that advance this post through relevant opinion, anecdotes, links and data. If you see a comment that you believe is irrelevant or inappropriate, you can report it using the link at the end of each comment. Views expressed in the comments do not represent those of CircleID. For more information on our comment policy, see Codes of Conduct.

CircleID Newsletter The Weekly Wrap

More and more professionals are choosing to publish critical posts on CircleID from all corners of the Internet industry. If you find it hard to keep up daily, consider subscribing to our weekly digest. We will provide you a convenient summary report once a week sent directly to your inbox. It's a quick and easy read.

Related

Topics

Threat Intelligence

Sponsored byWhoisXML API

DNS

Sponsored byDNIB.com

Brand Protection

Sponsored byCSC

IPv4 Markets

Sponsored byIPv4.Global

Domain Names

Sponsored byVerisign

New TLDs

Sponsored byRadix

Cybersecurity

Sponsored byVerisign