Defending encryption doesn’t mean opposing targeted surveillance
[Commentary] David Omand, the former head of British spy agency GCHQ, said that if companies such as Apple and Google don’t abandon their end-to-end encryption efforts, intelligence services will have to employ more “close access” surveillance on people they suspect of evil deeds.
This means physical observation, or bugging rooms, or hacking into phones and computers. According to Omand, such actions are “more targeted but in terms of intrusion into personal privacy -- collateral intrusion into privacy -- we are likely to end up in an ethically worse position than we were before.” No, you’re not. Surreptitiously getting a key to a suspect’s communications is no more ethical than conducting close personal surveillance -- but in the big picture, the latter is vastly preferable. The Internet’s opportunities for surveillance efficiency create the potential for intelligence agencies to become too powerful. End-to-end encryption adds friction and acts as a counterbalance. It doesn’t make targeted surveillance impossible -- Omand himself noted that client device hacking and physical surveillance render encryption moot -- but it does make it more resource-expensive, and therefore discourages its overuse.
Defending encryption doesn’t mean opposing targeted surveillance