iTnews

Four hour 'top secret' briefing used to press encryption law need

By Ry Crozier on Nov 26, 2018 6:15PM
Four hour 'top secret' briefing used to press encryption law need

Idea floated to limited use cases to counter-terrorism only.

Australian law enforcement agencies have pressed the case to fast-track elements of the encryption-busting bill during a four-hour “top secret” briefing to a joint parliamentary committee.

The closed-door briefing, held on Monday morning, was immediately followed by a much shorter public hearing with the same agencies, including ASIO, AFP and the Department of Home Affairs.

The Parliamentary Joint Committee on Intelligence and Security (PJCIS) said in a statement that it is “actively considering” Home Affairs Minister Peter Dutton’s demands “to accelerate its review” of the proposed laws.

Both Dutton and Prime Minister Scott Morrison want to ram the controversial legislation through parliament before Christmas.

The PJCIS said in a statement that it held “four hours of top secret classified briefings from agencies on the operational necessity of an urgent progression of the bill.”

It said that “the committee continues to operate in a cooperative and bipartisan fashion as it considers options for the remainder of its inquiry.”

One option was canvassed at the close of the public portion of today’s hearings: a truncation of the bill that would essentially reduce the grounds of its application - at least initially - to only counter-terrorism.

The bill currently offers a broad list of potential applications of the laws, covering national security and domestic and international criminal law.

The list has been truncated once already, with “protecting the public revenue” dropped after outage from a range of parties; it now appears the list could be pared back again to appease the government in its rush for passage of the proposed laws.

“It’s very much a counter-terrorism function that the government is concerned with in the short term, which is what drives the request for urgency,” Shadow Attorney-General Mark Dreyfus said.

“One of the options for the committee is to look at potentially an interim report, [and] interim processing of part of the bill, in order that the government’s stated purpose of urgency can be served, while the committee continues to consider the remainder of the bill and tries to deal with the multitude of concerns that have been expressed.”

Home Affairs chief Michael Pezzullo said that would be a matter for the committee and government to agree on.

However, he said that making the bill apply only to cases of counter-terrorism was “not a complex drafting change”.

Concerns raised with the bill by a range of parties - including telcos, cryptographic security experts, IT vendors and privacy experts - cover the technical feasibility of what is being sought, as well as the types of agencies that should get to use the bill if passed.

It was unclear how questions of technical feasibility would be solved if it was passed for limited use, nor how consideration of those aspects could safely be deferred by the PJCIS to a later date.

For example, what constitutes a systemic weakness or vulnerability in the bill is still undefined - a critical term that governs whether or not law enforcement is asking too much of a target organisation like an IT vendor or telco.

It wasn’t clear if this would be addressed before the bill was passed in any form, or whether its consideration would be deferred to avoid holding up the new laws from being used in counter-terrorism investigations.

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © iTnews.com.au . All rights reserved.
Tags:
decryption dutton encryption law pjcis security telco/isp top secret urgency

Partner Content

Beat the DDoS blackmails in 2021
Partner Content Beat the DDoS blackmails in 2021
Why companies fail at picking cloud modernisation partners
Partner Content Why companies fail at picking cloud modernisation partners
Shut the door on ransomware
Partner Content Shut the door on ransomware
MSI shows first laptops with Wi-Fi 6E, Nvidia RTX 30 graphics
Partner Content MSI shows first laptops with Wi-Fi 6E, Nvidia RTX 30 graphics

Sponsored Whitepapers

Five questions to ask before you upgrade to a SIEM solution
Five questions to ask before you upgrade to a SIEM solution
Effectively addressing advanced threats
Effectively addressing advanced threats
The risky business of open source
The risky business of open source
Ensure your e-signatures are legally binding
Ensure your e-signatures are legally binding
Mitigating open source risk in your organisation
Mitigating open source risk in your organisation

Events

  • On-Demand Webinar: How Poly and Microsoft are Embracing Future Work Environments
  • Beat the DDoS blackmailers in 2021
By Ry Crozier
Nov 26 2018
6:15PM
0 Comments

Related Articles

  • Australia's anti-encryption laws need judicial oversight: INSLM
  • Online account takeover powers sent to PJCIS for review
  • Australia setting itself up as Five Eyes' weakest link
  • Telstra frets network breakage, trust breaches from decryption laws
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

Australia Post is building a digital twin of its delivery network

Australia Post is building a digital twin of its delivery network

Google threatens to withdraw search engine in Australia

Google threatens to withdraw search engine in Australia

Trump pardons former Google self-driving car engineer

Trump pardons former Google self-driving car engineer

NBN Co runs fixed wireless tower on diesel generator for over two years

NBN Co runs fixed wireless tower on diesel generator for over two years

You must be a registered member of iTnews to post a comment.
Log In | Register
All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's Privacy Policy and Terms & Conditions.