iTnews
  • Home
  • News
  • Technology
  • Security

NSW ICAC asks for decryption and disruption powers

By Jeremy Nadel on Mar 23, 2022 12:15PM
NSW ICAC asks for decryption and disruption powers

Asks for end to 'patchwork' of legislation.

NSW ICAC has called for the power to decrypt communications, take control of online accounts and alter and delete data. 

The public service watchdog’s submission to Home Affairs' review of the electronic surveillance framework called to be listed as an interception agency by the Surveillance Legislation Amendment (Identify and Disrupt) Act (SLAID Act) and the Telecommunications and Other Legislation Amendment (Assistance and Access) Act. 

The review’s discussion paper said it was aiming to streamline the “patchwork” of acts governing how and which law enforcement and security agencies can intercept and surveil communications “with a single, streamlined and technology-neutral Act.”

ICAC said in its submission that it is defined as an interception agency by the Telecommunications Interception and Access Act 1979 (the TIA Act), which enables it to access metadata. 

However, it cannot take control of a person’s online account, add, copy, delete or alter online material to disrupt criminal activity because it is excluded from the SLAID Act. 

ICAC also cannot access communications sent over end-to-end encrypted services by issuing "requests" for voluntary assistance, or "notices" for compulsory assistance, to service providers because it is excluded from the TOLA Act.

“The omission of the Commission from powers afforded to other agencies produces detrimental and perverse outcomes, benefiting those who engage in serious crime and corruption,” ICAC said. 

The review’s discussion paper mentioned five agencies whose surveillance and interception powers it was considering extending, but ICAC was not among them. 

Examples of agencies whose powers the review said it was already considering extending included state and territory corrective services who the review might be granted the power to "access telecommunications data, for the purposes of monitoring criminal offenders.”

And the Australian Border Force who the review said could receive “the power to use tracking devices to investigate border-related measures.”

ICAC’s submission also expressed opposition to a proposal to increase the reporting requirements related to using the TIA Act to access journalists’ information.

The TIA Act requires agencies to obtain a journalist information warrant before accessing this information.

The safeguard aims to prevent the power from discouraging whistleblowing and public interest journalism.  

“The Commission [ICAC] sees reporting requirements for journalist information warrants already burdensome on agencies.” 

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © iTnews.com.au . All rights reserved.
Tags:
corruptionhome affairsicacindependent commission against corruptioninterceptnsw icacpublic service watchdogreview of the electronic surveillance frameworksecurityslaid act

Partner Content

Security "mindset shift" needed to protect organisations
Promoted Content Security "mindset shift" needed to protect organisations
Avoiding CAPEX by making on-premise IT more cloud-like
Promoted Content Avoiding CAPEX by making on-premise IT more cloud-like
The Great Resignation has intensified insider security threats
Promoted Content The Great Resignation has intensified insider security threats
Why Genworth Australia embraced low-code software development
Promoted Content Why Genworth Australia embraced low-code software development

Sponsored Whitepapers

Free eBook: Digital Transformation 101 – for banks
Free eBook: Digital Transformation 101 – for banks
Why financial services need to tackle their Middle Office
Why financial services need to tackle their Middle Office
Learn: The latest way to transfer files between customers
Learn: The latest way to transfer files between customers
Extracting the value of data using Unified Observability
Extracting the value of data using Unified Observability
Planning before the breach: You can’t protect what you can’t see
Planning before the breach: You can’t protect what you can’t see

Events

  • Forrester Technology & Innovation Asia Pacific 2022
By Jeremy Nadel
Mar 23 2022
12:15PM
0 Comments

Related Articles

  • Border Force searched more than 40,000 devices in five years
  • Australia's ID systems 'deficient', unfit for online: review
  • Gov pledges to mandate IoT cyber security standards
  • Service NSW told to tighten access controls after system misuse
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

Telstra deregisters 900MHz sites “hindering” Optus 5G rollout

Telstra deregisters 900MHz sites “hindering” Optus 5G rollout

Aussie Broadband nears end of NBN PoI fibre rollout

Aussie Broadband nears end of NBN PoI fibre rollout

Defence, DEWR drop $160m on Microsoft software, Azure

Defence, DEWR drop $160m on Microsoft software, Azure

Transport for NSW exits Global Switch data centre

Transport for NSW exits Global Switch data centre

Digital Nation

COVER STORY: How KPMG, Mirvac and ASX use blockchain to build trust in the property sector
COVER STORY: How KPMG, Mirvac and ASX use blockchain to build trust in the property sector
Megatrends shaping the next 20 years: CSIRO
Megatrends shaping the next 20 years: CSIRO
Criteo to fork out $94.7m for consent breaches
Criteo to fork out $94.7m for consent breaches
Australia will lose 11 percent of jobs to automation by 2040: Forrester
Australia will lose 11 percent of jobs to automation by 2040: Forrester
Domino’s invests in observability for zero contact delivery
Domino’s invests in observability for zero contact delivery
All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's Privacy Policy and Terms & Conditions.