iTnews

Govt moves to extend encryption-busting powers to anti-corruption agencies

By Justin Hendry on Feb 13, 2019 5:18PM
Govt moves to extend encryption-busting powers to anti-corruption agencies

Proposes changing 'interception agency' definition.

The federal government has revealed planned changes to Australia’s controversial encryption-busting legislation that will give anti-corruption bodies similar powers to other law enforcement agencies.

Amendments to the Assistance and Access Act introduced to parliament on Wednesday afternoon propose extending the industry assistance powers to eight additional agencies, including state corruption watchdogs.

The Australian Federal Police, Australian Crime Commission and state and territory police forces are the only law enforcement agencies afforded the powers as the Act currently stands.

This includes the ability to ask technology companies to create a vulnerability on "one or more target technologies that are connected with a particular person"

However the government wants to extend the definition of an ‘interception’ agency under the Act so that it includes the Australian Commission for Law Enforcement Integrity and state crime and corruption commissions in NSW, Victoria, Queensland, SA and WA.

It also would bring the definition of ‘interception agency’ into line with the definition under the Telecommunications (Intercept and Access) Act 1979.

The government said this will give the anti-corruption bodies the “tools – the form of industry assistance – to investigate serious crime, and law enforcement misconduct and corruption across the public sector”.

This includes both the ability to request assistance (technical assistance request) and compel assistance (technical assistance notice) from communications providers, as well as technical capability notices.

“As with law enforcement agencies currently covered by the Access and Assistance Act, investigative agencies and anti-corruption agencies face the same investigative challenges in the modern communications environment caused by the use of encryption to protect personal, commercial and government information,” the Telecommunications and Other Legislation Amendment (Miscellaneous Amendments) Bill 2019 states.

“Extending the technical assistance framework to investigate and anti-corruption agencies ensures that they have the same powers to seek assistance in the investigation of law enforcement misconduct and corruption in the public sector.”

The proposed extension comes as the Parliamentary Joint Committee on Intelligence & Security (PJCIS) reconsidered its interim position that state and territory commissions against corruption should be excluded from the powers late on Tuesday.

The bill also proposes that the requirement that the Independent National Security Legislation Monitor (INSLM) conduct a review into the “operation, effectiveness and implications” of the Assistance and Access Act be amended so it occurs “before the end of the 18-month period”.

“This Bill expedites the review so that it is conducted [INSLM] by the before the end of the 18 month period beginning on the day the Assistance and Access Act received Royal Assent,” the bill states, adding that this will “provide timely assurance” the Act is working as intended.

It is currently required to conduct the review “after the 18-month period beginning on the day the Assistance and Access Act receives Royal Assent”.

Labor also plans to introduce amendments to the Assistance and Access Act, though these are principally aimed at properly defining what constitutes a systemic weakness or vulnerability under the law.

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © iTnews.com.au . All rights reserved.
Tags:
australia bill decryption encryption law security

Partner Content

MSI shows first laptops with Wi-Fi 6E, Nvidia RTX 30 graphics
Partner Content MSI shows first laptops with Wi-Fi 6E, Nvidia RTX 30 graphics
MSI launches innovative new laptops
Partner Content MSI launches innovative new laptops
Improving returns from SD-WAN spending
Sponsored Content Improving returns from SD-WAN spending
NCS expands into Australia in partnership with Optus Enterprise
Sponsored Content NCS expands into Australia in partnership with Optus Enterprise

Sponsored Whitepapers

The risky business of open source
The risky business of open source
Mitigating open source risk in your organisation
Mitigating open source risk in your organisation
How to choose a WAF that's right for you
How to choose a WAF that's right for you
The global telco 5G cloud gaming opportunity
The global telco 5G cloud gaming opportunity
Building a ransomware remediation backup strategy
Building a ransomware remediation backup strategy

Events

  • On-Demand Webinar: How Poly and Microsoft are Embracing Future Work Environments
By Justin Hendry
Feb 13 2019
5:18PM
0 Comments

Related Articles

  • Home Affairs rejects claims anti-encryption laws conflict with US CLOUD Act
  • Australia gets world-first encryption busting laws
  • Senate pushes encryption fix for US CLOUD Act fracture
  • India and Japan join Five-Eyes push to break end-to-end encryption
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

Telstra pilots its first neurodiversity recruitment program

Telstra pilots its first neurodiversity recruitment program

Update Chrome or risk remote takeover, US govt warns

Update Chrome or risk remote takeover, US govt warns

Accellion hack behind Reserve Bank of NZ data breach

Accellion hack behind Reserve Bank of NZ data breach

Google unravels state-of-art Android and Windows exploit chains

Google unravels state-of-art Android and Windows exploit chains

You must be a registered member of iTnews to post a comment.
Log In | Register
All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's Privacy Policy and Terms & Conditions.