<br><div class="gmail_quote"><div dir="auto">On Tue, Jul 4, 2017 at 10:52 AM grarpamp <<a href="mailto:grarpamp@gmail.com">grarpamp@gmail.com</a>> wrote:<br></div><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><a href="https://arstechnica.com/tech-policy/2017/06/australia-to-target-encrypted-messaging-apps-at-upcoming-security-meeting/" rel="noreferrer" target="_blank">https://arstechnica.com/tech-policy/2017/06/australia-to-target-encrypted-messaging-apps-at-upcoming-security-meeting/</a><br>
<a href="https://www.theglobeandmail.com/news/politics/five-eyes-stress-sharing-information-to-battle-relentless-terrorist-plots/article35486286/" rel="noreferrer" target="_blank">https://www.theglobeandmail.com/news/politics/five-eyes-stress-sharing-information-to-battle-relentless-terrorist-plots/article35486286/</a><br>
<a href="https://www.eff.org/deeplinks/2017/06/five-eyes-unlimited" rel="noreferrer" target="_blank">https://www.eff.org/deeplinks/2017/06/five-eyes-unlimited</a><br>
<br>
This week, the political heads of the intelligence services of Canada,<br>
New Zealand, Australia, the United Kingdom, and the United States (the<br>
"Five Eyes" alliance) met in Ottawa.  The Australian delegation<br>
entered the meeting saying publicly that they intended to "thwart the<br>
encryption of terrorist messaging." </blockquote><div dir="auto">......</div><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
What might their plan be? Is this yet another attempt to ban<br>
encryption? A combined effort to compel ISPs and Internet companies to<br>
weaken their secure products? At least one leader of a Five Eyes<br>
nation has been talking recently about increasing international<br>
engagement with technology companies — with a list of laws in her back<br>
pocket that are already capable of subverting encryption, </blockquote><div dir="auto"><br></div><div dir="auto">How do they intend to continue to thwart criminal activities.  </div><div dir="auto">These encryption tools and processes were installed to thwart criminals from victimizing individuals, companies and nations.   </div><div dir="auto"><br></div><div dir="auto">At best eliminating encryption would improve after the fact vengeance and prosecution.  At worst it would allow the use of weakly secured channels to be used to hide the identity of real terrorists and cause law enforcement to think they arrested the correct individuals and falsely imprison or execute them with an "armed and dangerous" arrest warrant or drone strike. </div><div dir="auto"><br></div><div dir="auto">From my information bubble view criminal and national (CIA, Russian) hacking are indistinguishable from each other and in many cases share resources via dark web financial interactions if not management and guidance. </div><div dir="auto">The maps of these actions and groups like old time maps.. "there be dragons."</div><div dir="auto"><br></div><div dir="auto"><br></div></div><div dir="ltr">-- <br></div><div data-smartmail="gmail_signature">I be mobile, excuse my tipping!</div>