Theresa May set to continue with encryption crackdown

PM pledges to push forward with controversial measures in minority government

government

Prime minister Theresa May still appears to be seeking to implement backdoors to encryption and regulate the internet after a snap election in which the Tories lost 13 seats.

In her first speech after winning the most number of Parliamentary seats, without winning an outright majority, May hinted that despite her reduced mandate, she still plans to give greater powers to the security services.

Speaking outside Downing Street after visiting the Queen for permission to form a minority government, she said: "[Our government]will work to keep our nation safe and secure by delivering the change that I set out following the appalling attacks in Manchester and London - cracking down on the ideology of Islamist extremism and all those who support it. And giving the police and the authorities the powers they need to keep our country safe."

Thatprevious speechon the terror attacks in Manchester and London sought to blame social networks for extremist propaganda and bidded for backdoors into encryptedmessaging tools. The tech industry called her comments "lazy", "embarrassing", and "disappointing".

Advertisement
Advertisement - Article continues below

Meanwhile, the Tory government's draft spying plans were leaked online last month, detailing its aims to enforce encryption backdoors in tech tools as well as extensive surveillance plans.

Executive director of the Open Rights Group, Jim Killock, said it would be a "distraction" for May to push on and instigate her terror and tech crackdown.

He said: "The government already has extensive surveillance powers. To push on with these extreme proposals for internet clampdowns would appear to be a distraction from the current political situation and from effective measures against terror."

"Conservative proposals for automated censorship of the internet would see decisions about what British citizens can see online being placed in the hands of computer algorithms, with judgements ultimately made by private companies rather than courts," he added. "Home Office plans to force companies to weaken the security of their communications products could put all of us at a greater risk of crime."

Killock claimed:"Both of these proposals could result in terrorists and extremists switching to platforms and services that are more difficult for our law enforcement and intelligence agencies to monitor.Given that the priority for all MPs is how the UK will negotiate Brexit, it will be especially hard to give the time and thought necessary to scrutinise these proposals."

These changes have been a key part of the Conservative campaign and her statement is seen as a reference to new powers to regulate what appears on the internet as set out on the page 79 of the Conservative manifesto.

It reads: "We will continue to push the internet companies to deliver on their commitments to develop technical tools to identify and remove terrorist propaganda. We do not believe there should be a safe space for terrorists to be able to communicate online and will work to prevent them from having this capability."

Paul Bernal, a lecturer of Law at University of East Anglia, claimed May's plans will make the internet a severely more restrictive place: "if you stop terrorists communicating safely, you stop all of us from communicating safely," he said.

Interestingly, Bernal also highlighted how the Conservative party seemed to be committing to keeping compliant with an EU law after the UK leaves the EU; the General Data Protection Regulation, which gives people more control over their data, andwhich comes into force in May 2018.

When combining May's response with the Investigatory Powers Act, Bernal said "it looks very much like a solid clampdown on internet freedom" and that "anyone interested in internet freedom should be very much disturbed".

Featured Resources

The IT Pro guide to Windows 10 migration

Everything you need to know for a successful transition

Download now

Managing security risk and compliance in a challenging landscape

How key technology partners grow with your organisation

Download now

Software-defined storage for dummies

Control storage costs, eliminate storage bottlenecks and solve storage management challenges

Download now

6 best practices for escaping ransomware

A complete guide to tackling ransomware attacks

Download now
Advertisement

Recommended

Visit/government-it-strategy/28305/ir35-news
Policy & legislation

Businesses urged to continue IR35 preparations despite Conservative review pledge

3 Dec 2019
Visit/security/354156/google-confirms-android-cameras-can-be-hijacked-to-spy-on-you
Security

Google confirms Android cameras can be hijacked to spy on you

20 Nov 2019

Most Popular

Visit/cloud/microsoft-azure/354230/microsoft-not-amazon-is-going-to-win-the-cloud-wars
Microsoft Azure

Microsoft, not Amazon, is going to win the cloud wars

30 Nov 2019
Visit/cloud/amazon-web-services-aws/354223/what-to-expect-from-aws-reinvent-2019
Amazon Web Services (AWS)

What to expect from AWS Re:Invent 2019

29 Nov 2019
Visit/business/business-strategy/354252/huawei-takes-the-us-trade-sanctions-into-its-own-hands
Business strategy

Huawei takes the US trade sanctions into its own hands

3 Dec 2019
Visit/hardware/354237/five-signs-that-its-time-to-retire-it-kit
Sponsored

Five signs that it’s time to retire IT kit

29 Nov 2019