politics

In defence of the ‘Killer Phone’

"Killer Phones" - ABC 7.30, 5 March 2014

The ABC’s 7.30 has a report tonight on ‘uncrackable phones’ allegedly being used by bikies to commission murder. The segment was calmly and rationally titled ‘Killer Phone’, a reminder that Aunty’s flagship is not above tabloid sensationalism. It featured a parade of interviews casting doubt on these ‘uncrackable phones’, made by Phantom Secure, but not a single voice in defence of them.

‘Are these phones, for example, being used to kill?’ asks Dylan Welch, the reporter, bringing to mind James Bond’s proto-smartphone from Tomorrow Never Dies, which included a stun-gun amongst its many tricks.

Instead of a stun-gun, however, the ‘killer’ feature these phones offer is ‘military grade’ encryption, that is, the ability to encode communications so that only the intended recipient can decode them.

Let’s, right now, demystify the ‘powerful’ and ‘military grade’ encryption these phones use. Encryption per se is commonplace. Your internet banking connection is encrypted; your ATM transactions are encrypted in transit; your wifi network is encrypted. There is nothing sinister about this.

‘Military grade’ encryption is harder to tie down: the manufacturer’s website doesn’t specify what encryption they use, except that it uses ‘the same technology that government agencies and large corporations use to protect their communications’. That probably refers to AES encryption, which, incidentally, is also used by Skype when you call your parents on Mother’s Day.

The reporter goes on: ‘Phantom Secure phones are marketed as a legitimate business tool, but they are also increasingly popular among the criminal underworld.’

Now read that sentence back but replace ‘Phantom Secure phones’ with ‘Phones’, ‘Cars’, ‘Computers’ or ‘Reading and writing’.

Cars are marketed as a legitimate business tool, but they are also increasingly popular among the criminal underworld.

We’ve been here before, in the 1990s, when public availability of cryptography was a high-profile public policy issue in the United States. President Clinton, on the advice of the NSA, actively campaigned for the adoption of the ‘Clipper chip‘, a voice-encryption chip that included a ‘backdoor’ allowing the US government to decrypt any call. The proposal was ultimately defeated, for good reason: a backdoor for the authorities is a backdoor for anybody who has the right key. Similarly defeated were strict controls on the export of strong cryptography, as it became clear that the benefits of such encryption, available globally, outweighed the costs. The ubiquity of online commerce today probably owes much to that decision.

And yet the Australian Crime Commission (ACC) seems to want to revisit this question in Australia.

Every new technology must be evaluated in a critical light: it is trite, and naive, to note that technology is value-neutral, neither good nor evil. There are technologies we collectively choose to regulate, trading a little of our liberty for a lot of security: guns and other lethal weapons; nuclear fission; even ammonium nitrate fertilisers (from which bombs can be made).

But communications technologies should never be in that category (except perhaps in times of war, in the face of an existential threat). Yes, encrypted messaging makes it harder for law enforcement agencies to eavesdrop on conversations. But so does passing notes by hand. Or invisible ink. Or meeting in a crowded theatre. If Edward Snowden’s revelations taught us anything, it is that the state and its enforcers have a vast arsenal of techniques for collecting intelligence and evidence. Losing this one reduces security, a little. It strengthens liberty immeasurably. Snowden himself relied on the now-defunct encrypted email service Lavabit to communicate with journalists. Wikileaks uses encryption to protect vulnerable whistleblowers.

Liberty is built on a bedrock of free – and private – speech. Any attack on encrypted communication is an attack on communication itself. Indeed, acting head of the ACC, Paul Jevtovic, pretty much acknowledges this in response to that first, so very leading, question from the interviewer (a reminder: ‘Are these phones, for example, being used to kill?’). He replies

‘Encrypted communications, and communications more generally, are used across a range of criminal acts in this country…’ [emphasis added]

Perhaps the piece should have been titled “Killer Speech”.

(Note: I’m defending the concept of unregulated encryption, not the Phantom Secure product in particular. The hype-filled website and security-though-obscurity makes me pretty sceptical of their claims.)

ABC’s Q&A and (lack of) political party bias

Q&A is a live panel discussion show, filmed before a studio audience, produced by Australia’s ABC. It is virtually identical to BBC’s Question Time for British readers. A few months ago I noticed that all the transcripts are posted online, and I thought this would be an interesting way to analyse the political bias, and representativeness, of the show.

(more…)

UK Hansard Archive Bulk Download URL File (or When is Open Data Not)

I am currently working on a project that involves large scale analysis of various countries’ Hansards (this is, transcripts of parliamentary debate). In general, this is messy data. Recent transcripts have been produced, possibly natively, in a variety of XML or SGML formats. Earlier transcripts have, where available, been digitised from printed archives.

The UK Parliament has such a digitised archive, here.

Frustratingly though, although these zipped XML files are available, there is no bulk download option or simple FTP archive of them. Instead, the files are listed in a paged format. Worse, the pages are generated by a form submit using client side javascript, so standard spidering options like curl won’t work.

So, to save anyone else the pain, here is a link to a file I built that contains links to every file in this archive. I used the handy FormRequest feature of Scrapy, my favourite, heavily used, scraping tool.

https://github.com/econandrew/uk-hansard-archive-urls/blob/master/urls.txt

You can use this directly with wget -i urls.txt, although be warned, it has nearly 3000 files of just over 1MB each. You’re welcome.