{"id":107972,"date":"2025-03-19T13:10:59","date_gmt":"2025-03-19T17:10:59","guid":{"rendered":"https:\/\/cdt.org\/?post_type=insight&#038;p=107972"},"modified":"2025-03-25T12:13:16","modified_gmt":"2025-03-25T16:13:16","slug":"secrets-secrets-are-no-fun-the-united-kingdoms-secret-war-on-encryption","status":"publish","type":"insight","link":"https:\/\/cdt.org\/insights\/secrets-secrets-are-no-fun-the-united-kingdoms-secret-war-on-encryption\/","title":{"rendered":"<strong>Secrets, Secrets Are No Fun: the United Kingdom&#8217;s Secret War on Encryption<\/strong>"},"content":{"rendered":"\n<p><em>Late last week, <\/em><em>a <\/em><strong><em>secret<\/em><\/strong><em> tribunal in the U.K. <\/em><a href=\"https:\/\/www.bbc.com\/news\/articles\/c9vy0m8ggz3o\"><em>reportedly<\/em><\/a><em> held a <\/em><strong><em>secret<\/em><\/strong><em> hearing on an appeal by U.S. tech giant, Apple, of a <\/em><strong><em>secret<\/em><\/strong><em> order Apple reportedly received from the U.K. to compromise its users&#8217; privacy and cybersecurity worldwide.<\/em><\/p>\n\n\n\n<p>The British government is attacking encryption, and the casualties could include the privacy and cybersecurity of millions worldwide. The U.S. should demand that the U.K. withdraw its order, or else terminate the U.K.\u2019s&nbsp; unique access to the troves of user data it obtains from U.S. tech companies.&nbsp;<\/p>\n\n\n\n<p><strong>The U.K. Ambushes Encryption<\/strong><\/p>\n\n\n\n<p>Recent <a href=\"https:\/\/www.washingtonpost.com\/technology\/2025\/02\/07\/apple-encryption-backdoor-uk\/\">reports<\/a> suggest that the British Home Office has secretly issued a Technical Capability Notice (TCN) to Apple under the <a href=\"https:\/\/www.legislation.gov.uk\/ukpga\/2016\/25\/contents\">Investigatory Powers Act (IPA) of 2016<\/a>, commonly known as the \u201cSnoopers\u2019 Charter,\u201d compelling the company to introduce a backdoor into its end-to-end encrypted cloud storage service, \u201c<a href=\"https:\/\/www.apple.com\/newsroom\/2022\/12\/apple-advances-user-security-with-powerful-new-data-protections\/\">Advanced Data Protection<\/a>\u201d (ADP). The Snooper\u2019s Charter, <a href=\"https:\/\/cdt.org\/insights\/uk-investigatory-powers-bill-imperils-public-safety-by-undermining-data-sharing-with-the-us\/\">which has long<\/a> <a href=\"https:\/\/cdt.org\/insights\/written-evidence-to-the-public-bill-committee-regarding-investigatory-powers-bill\/\">concerned CDT<\/a>, <a href=\"https:\/\/www.legislation.gov.uk\/ukpga\/2016\/25\/section\/255\">prohibits<\/a> the recipient of a TCN from disclosing the existence or contents of the notice to anyone without the permission of the Secretary of State, so Apple can neither confirm, nor deny, the existence of the demand.&nbsp;<\/p>\n\n\n\n<p>Assuming the reports are true, such backdoor access would allow British officials to require Apple to provide in decrypted form content that any user \u2014 not only in the U.K., but worldwide \u2014 has uploaded to the cloud using ADP. This type of order has no known precedent in major democracies \u2014 for good reason.&nbsp;<\/p>\n\n\n\n<p>Introducing backdoors into end-to-end encryption means introducing systemic security flaws, as <a href=\"https:\/\/www.bsg.ox.ac.uk\/sites\/default\/files\/2021-11\/End-to-end%20Encryption%20Ciaran%20Martin%20Blavatnik%20School.pdf\">the U.K. knows<\/a>. Across the world, <a href=\"https:\/\/www.cdt.org\/wp-content\/uploads\/pdfs\/CALEAII-techreport.pdf\">cybersecurity experts agree<\/a> that there is no way to provide government access to end-to-end encrypted data without breaking end-to-end encryption. News of the U.K. order to Apple sparked <a href=\"https:\/\/www.globalencryption.org\/2025\/02\/joint-letter-on-the-uk-governments-use-of-investigatory-powers-act-to-attack-end-to-end-encryption\/\">global alarm<\/a>. Backdoors into encryption jeopardize all users\u2019 privacy and cybersecurity because criminals specifically look to exploit these vulnerabilities. Nevertheless, the U.K. has decided to ambush encryption with its notice. As President Trump put it: \u201c<a href=\"https:\/\/www.reuters.com\/technology\/trump-compares-uks-demand-apple-user-data-chinese-monitoring-2025-02-28\/\">That\u2019s something, you know, you hear about with China<\/a>.\u201d<\/p>\n\n\n\n<p>In the case of Apple, the world\u2019s second largest provider of mobile devices, introducing backdoor access into its encrypted cloud service would mean putting millions of users at risk. To make matters worse, the most harmful impact would fall on those who rely on encryption because they are already most vulnerable, including <a href=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2021\/05\/NNEDV_Survivor_FactSheet-EN.pdf\">domestic violence survivors<\/a>, <a href=\"https:\/\/www.lgbttech.org\/encryption-privacy-security\">LGBTQ+ persons<\/a>, and others. These risks must not be tolerated.<\/p>\n\n\n\n<p><strong>Apple Fights Back in the Shadows<\/strong><\/p>\n\n\n\n<p>Rather than capitulate to the U.K.\u2019s demand, Apple made the <a href=\"https:\/\/bsky.app\/profile\/cendemtech.bsky.social\/post\/3lipkdxitob22\">principled<\/a> <a href=\"https:\/\/support.apple.com\/en-us\/122234\">decision<\/a> to cease offering ADP in Great Britain, and it has <a href=\"https:\/\/www.bbc.com\/news\/articles\/c8rkpv50x01o\">reportedly appealed<\/a> the notice to the <a href=\"https:\/\/investigatorypowerstribunal.org.uk\/\">Investigatory Powers Tribunal<\/a>, which has the authority to review complaints against U.K. intelligence services. British law requires Apple to comply with the notice even while its appeal is pending. As a result, British authorities may insist that Apple build a backdoor to ADP even though it does not offer ADP in the U.K. Apple may challenge such a fully extraterritorial mandate as disproportionate under applicable law.&nbsp;<\/p>\n\n\n\n<p>To make matters worse \u2014 <em>again<\/em> \u2014 the entire review process is <em>also<\/em> shrouded in secrecy. Similar to how the recipient of a TCN is prohibited from disclosing the existence or contents of the notice, the Investigatory Powers Tribunal proceedings can be kept secret. This means the U.K. Home Office can place Apple, or any other service provider, under a strict gag order when it issues a TCN. The chilling result: the public does not know if other encrypted services have received such notices and, if so, which of them complied with those notices, putting user data at risk.&nbsp;<\/p>\n\n\n\n<p>This blatant lack of transparency severely inhibits public discourse, making it impossible for stakeholders \u2014 including cybersecurity experts, civil rights organizations, and the general public \u2014 to understand the full implications and challenge the U.K.\u2019s policy. Apple may or may not be the first recipient of a notice that requires undermining encryption, but it\u2019s unlikely to be the last. In any case, policies that affect millions of users and global cybersecurity ought not be fought out in the shadows.&nbsp;<\/p>\n\n\n\n<p><strong>Another CLOUD Looms in the U.S.<\/strong><\/p>\n\n\n\n<p>Despite the U.K. Home Office issuing the TCN under its own domestic law, the U.S. is not without means to respond. The <a href=\"https:\/\/www.justice.gov\/criminal\/criminal-oia\/cloud-act-agreement-between-governments-us-united-kingdom-great-britain-and-northern\">US-UK CLOUD Act Agreement<\/a> (Agreement) entered into effect under the authority of the U.S. <a href=\"https:\/\/www.congress.gov\/bill\/115th-congress\/house-bill\/4943\">CLOUD Act<\/a> and gives the U.S. substantial leverage over the U.K. in surveillance matters.&nbsp;<\/p>\n\n\n\n<p>The CLOUD Act allows U.S. providers to disclose user data directly to foreign states under the laws of those foreign states, with certain conditions. Those conditions include limiting disclosures to cases involving serious crimes, preventing disclosure of information of Americans or anyone physically located in the U.S., and most importantly, requiring that the U.S. has entered an executive agreement with the requesting state that certifies the state\u2019s laws and practices meet certain human rights standards. Countries with CLOUD Act agreements with the U.S. can bypass the cumbersome process under mutual legal assistance treaties (MLATs), as well as the probable cause requirement for compelled disclosure of communications content that applies in the MLAT context, and most importantly for the U.K., can engage in real time wiretapping of the users of U.S. tech companies, which MLAT processes and U.S. law do not otherwise permit. All CLOUD Act agreements are reciprocal, so the U.S. should enjoy the same benefits as partner states.&nbsp;<\/p>\n\n\n\n<p>So far, the U.S. has entered into only two CLOUD Act agreements: one with <a href=\"https:\/\/www.justice.gov\/criminal\/criminal-oia\/cloud-act-agreement-between-governments-us-and-australia\">Australia<\/a>, and one with the <a href=\"https:\/\/www.justice.gov\/criminal\/criminal-oia\/cloud-act-agreement-between-governments-us-united-kingdom-great-britain-and-northern\">U.K.<\/a>, which entered into force on October 3, 2022. So what can be done?<\/p>\n\n\n\n<p><strong>Light Through the CLOUD<\/strong><\/p>\n\n\n\n<p>The CLOUD Act, and the US-UK CLOUD Act Agreement, present a significant opportunity for the U.S. to meaningfully pressure the U.K. to withdraw its demand to Apple. <a href=\"https:\/\/www.law.cornell.edu\/uscode\/text\/18\/2523\">By law<\/a>, the US-UK CLOUD Act Agreement expires after five years unless renewed, which means the Agreement will expire in October 2027 unless renewed.&nbsp;<\/p>\n\n\n\n<p>The U.S. Department of Justice quietly <a href=\"https:\/\/www.documentcloud.org\/documents\/25551978-doj-report-to-congress-on-us-uk-cloud-act-agreement\/\">recertified<\/a> the US-UK CLOUD Act Agreement in November 2024, around the Thanksgiving congressional recess. The recertification report sent to Congress, which is required by the Act, provides <a href=\"https:\/\/www.lawfaremedia.org\/article\/first-insights-into-the-u.s.-u.k.-cloud-act-agreement\">several key insights<\/a> about the U.K.\u2019s conduct under the Agreement, not least that the U.K. issued more than 20,000 requests to U.S. service providers \u2014 almost all of which included wiretapping surveillance \u2014 while the U.S. issued a mere 63 to British providers. This dramatic imbalance owes to the geographic concentration of major service providers in the U.S., but it also demonstrates the overwhelming importance of the Agreement to the U.K. and its relative lack of importance to the U.S., and provides a powerful lever for the U.S. to wield. After all, the Trump Administration could, <a href=\"https:\/\/www.justice.gov\/criminal\/criminal-oia\/cloud-act-agreement-between-governments-us-united-kingdom-great-britain-and-northern\">under the terms of the Agreement<\/a>, unilaterally terminate it without cause and with only 30 days notice.&nbsp;&nbsp;<\/p>\n\n\n\n<p>The recertification report subtly hints that the DOJ knew about the TCN issued to Apple, or other attacks on encryption in the U.K. The report states that although new laws in the U.K., such as the <a href=\"https:\/\/bills.parliament.uk\/bills\/3508\">Investigatory Powers (Amendment) Act of 2024<\/a> that expanded surveillance authority under the IPA, did not violate the requirements of the CLOUD Act (per the DOJ), the DOJ had nonetheless \u201ctaken the opportunity [&#8230;] to remind the U.K. of the the statute\u2019s requirement that the terms of the Agreement shall not create any obligation that providers be capable of decrypting data or limitation that prevents providers from decrypting data.\u201d At a minimum, the DOJ should also have \u201ctaken the opportunity\u201d to warn Congress that the U.K. was preparing to use newly acquired powers under British law to undermine the security of Americans\u2019 encrypted data and those of people around the world.&nbsp;<\/p>\n\n\n\n<p><strong>The U.S. Seeks Answers<\/strong><\/p>\n\n\n\n<p>Congress has, in fact, taken steps to leverage the CLOUD Act and the US-UK CLOUD Act Agreement to seek answers from top U.S. and U.K. officials. In a <a href=\"https:\/\/www.documentcloud.org\/documents\/25545435-wyden-biggs-letter-to-dni-re-uk-backdoors\/\">letter<\/a> to the Director of National Intelligence (DNI), Tulsi Gabbard, Senator Ron Wyden (D-OR) and Representative Andy Biggs (R-AZ) urged the U.S. to \u201c[give] the U.K. an ultimatum: back down from this dangerous attack on U.S. cybersecurity, or face serious consequences.\u201d The letter also asked DNI Gabbard to provide Congress with unclassified answers to critical questions, like whether the Trump Administration had any awareness of the TCN.<\/p>\n\n\n\n<p>In her <a href=\"https:\/\/s3.documentcloud.org\/documents\/25545430\/dni-wyden-biggs-response.pdf\">response<\/a>, DNI Gabbard expressed that she shared a \u201cgrave concern about the serious implications of the United Kingdom, or any foreign country, requiring Apple or any company to create a \u2018backdoor\u2019 that would allow access to Americans personal encrypted data.\u201d She further noted that such a TCN would be a \u201cclear and egregious violation of Americans\u2019 privacy and civil liberties, and open up a serious vulnerability for cyber exploitation by adversarial actors,\u201d while committing to using her office to investigate the matter further.&nbsp;<\/p>\n\n\n\n<p>Most recently, a bipartisan group of members of Congress also <a href=\"https:\/\/www.wyden.senate.gov\/imo\/media\/doc\/bipartisan_congressional_letter_to_uk_ipt_on_apple_backdoorpdf.pdf\">urged<\/a> the IPT to open its hearing to the public, and former Secretary of Homeland Security Michael Chertoff said the U.K. should <a href=\"https:\/\/chertoffgroup.com\/michael-chertoff-britain-should-reconsider-its-move-to-break-encryption\/#:~:text=Backdoors%20introduce%20new%20potential%20vulnerabilities%20at%20risk%20of%20being%20exploited%20by%20hackers%2C%20such%20as%20malicious%20tradecraft%20that%20provide%20access%20to%20an%20otherwise%20%E2%80%9Csecure%E2%80%9D%20system.%20And%20once%20the%20capability%20is%20there%2C%20it%20is%20a%20matter%20of%20time%20until%20a%20nefarious%20actor%20moves%20to%20illicitly%20gain%20access%20to%20the%20same%20tool.\">reconsider its move to break encryption<\/a>.&nbsp;<\/p>\n\n\n\n<p>These actions are the appropriate first steps, but the DOJ should also weigh in and urge the U.K. to reverse course, and Congress should modify the CLOUD Act itself to preclude agreements with states whose laws authorize orders to compel decryption by providers of end-to-end encrypted services. Such providers cannot decrypt data or communications without introducing serious security vulnerabilities and, as Apple was here, could effectively be compelled to cease the offer of such service, to the detriment of cybersecurity in the U.S. and abroad. In the meantime, if the U.K. refuses to withdraw the order, the U.S. should terminate the Agreement.&nbsp;<\/p>\n\n\n\n<p class=\"has-text-align-center\">***<\/p>\n\n\n\n<p>The U.K.\u2019s secret war on encryption threatens global cybersecurity and sets a dangerous precedent for government overreach. With secret orders, secret appeals, and secret hearings, the U.K. is undermining public trust and digital safety from the shadows. The U.S. must continue to&nbsp; demand transparency and accountability. If the U.K. refuses to back down, Congress and the Trump administration should take decisive action to protect the security of Americans\u2019 data. Encryption is not just a policy debate\u2014it is a fundamental pillar of people\u2019s privacy and security, and it must be protected.<\/p>\n","protected":false},"featured_media":86100,"template":"","content_type":[7251],"area-of-focus":[7257,806,799],"class_list":["post-107972","insight","type-insight","status-publish","has-post-thumbnail","hentry","content_type-blog","area-of-focus-european-surveillance","area-of-focus-government-surveillance","area-of-focus-us-surveillance"],"acf":[],"_links":{"self":[{"href":"https:\/\/cdt.org\/wp-json\/wp\/v2\/insight\/107972","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cdt.org\/wp-json\/wp\/v2\/insight"}],"about":[{"href":"https:\/\/cdt.org\/wp-json\/wp\/v2\/types\/insight"}],"version-history":[{"count":2,"href":"https:\/\/cdt.org\/wp-json\/wp\/v2\/insight\/107972\/revisions"}],"predecessor-version":[{"id":107974,"href":"https:\/\/cdt.org\/wp-json\/wp\/v2\/insight\/107972\/revisions\/107974"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cdt.org\/wp-json\/wp\/v2\/media\/86100"}],"wp:attachment":[{"href":"https:\/\/cdt.org\/wp-json\/wp\/v2\/media?parent=107972"}],"wp:term":[{"taxonomy":"content_type","embeddable":true,"href":"https:\/\/cdt.org\/wp-json\/wp\/v2\/content_type?post=107972"},{"taxonomy":"area-of-focus","embeddable":true,"href":"https:\/\/cdt.org\/wp-json\/wp\/v2\/area-of-focus?post=107972"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}