House of Representatives Committees


| Parliamentary Joint Committee on Intelligence and Security

Navigation: Previous Page | Contents | Next Page

Chapter 3 Telecommunications security

3.1                   The Terms of Reference to this inquiry state that the Government expressly seeks the views of the Committee on amending the Telecommunications Act 1997 to address security and resilience risks posed to the telecommunications sector.  This would be achieved by:

n  instituting obligations on the Australian telecommunications industry to protect their networks from unauthorised interference;

n  instituting obligations to provide Government with information on significant business and procurement decisions and network designs;

n  creating targeted powers for Government to mitigate and remediate security risks with the costs to be borne by providers; and

n  creating appropriate enforcement powers and pecuniary penalties.

3.2                   The Attorney-General’s Department (AGD) discussion paper notes that, with the pace of technological change, serious challenges to the security of telecommunications data have emerged:

Risks to the availability, confidentiality and integrity of our national telecommunications infrastructure can come from hardware vulnerabilities, accidental misconfiguration, external hacking and even trusted insiders.[1]

3.3                   The implications of this risk are significant, especially given that Australian businesses, individuals and public sector actors rely on telecommunication carriers and carriage service providers’ (C/CSPs) ability to store and transmit their data safely and securely, and to protect it from potential national security threats.  The discussion paper notes that:

Failure to effectively manage national security risks therefore has implications beyond individual C/CSPs; it is a negative externality affecting government, business and individual Australians.[2]

3.4                   The discussion paper further explains the significance of the telecommunications industry to national security:

While advances in technology and communications have resulted in unquestionable benefits to society and the economy, they have also introduced significant vulnerabilities, including the ability to disrupt, destroy, degrade or alter the functioning of our critical telecommunications infrastructure and the information held on it. A clear understanding of the current telecommunications environment is essential to identifying network vulnerabilities and managing them effectively. This includes the composition and operation of the telecommunications industry, national security risks, and the current regulatory environment.[3]

3.5                   The discussion paper cites the Director-General of ASIO’s speech at the Security in Government Conference on 7 July 2011 outlining how poor security of telecommunications information poses a threat to national security:

States, as well as disaffected individuals or groups, are able to use computer networks to view or siphon sensitive, private, or classified information for the purpose of, political, diplomatic or commercial advantage.

Individual records or files stored or transmitted on telecommunications networks may not be classified or particularly sensitive in and of themselves but, in aggregate, they can give foreign states and other malicious actors a range of intelligence insights not otherwise readily available. This threat extends to information vital to the effective daytoday operation of critical national industries and infrastructure, including intellectual property and commercial intelligence.[4]

3.6                   Furthermore, these threats come from a variety of sources:

…other nation states, acting in their own national interest; criminal syndicates, especially – but not exclusively – well-resourced organised crime networks, which in some cases operate transnationally, compounding the difficulty of detecting and disrupting their activities; business corporations seeking commercial advantage over competitors; political or other issue-specific motivated groups; cyber-vandals; and a catch-all of other malicious and non-malicious ‘hacktivists’.[5]

3.7                   These threats originate in many different countries. According to a recent study by McAfee:

36 percent of all attacks originated from the United States, 33 percent from China and 12 percent from Russia. Of the remainder, Germany, the UK and France accounted for no more than six percent.[6]

3.8                   The McAfee study also discussed the types of threats, finding that of the telecommunications infrastructure companies surveyed:

89 percent … had experienced infection by a virus or malware; 60 percent had experienced ‘theft of service’ attacks; 54 percent experienced ‘stealthy infiltration’ that targeted theft of data or the takeover of critical Supervisory Control and Data Acquisition control systems; approximately 20 percent experienced extortion through the targeting and infiltration of control systems; and 29 percent had experienced large scale distributed denial of service attacks, often several times a month, of which two thirds had impacted on operations.[7]

3.9                   To counter those threats, the discussion paper proposes the development and implementation of a ‘risk based regulatory framework to better manage’ these national security challenges to telecommunications security.[8]

3.10               The discussion paper proposes a package of reforms to the Telecommunications Act 1997 and associated legislation to establish this regulatory framework:

n  An industry-wide obligation on all C/CSPs to protect their infrastructure and the information held on it or passing across it from unauthorised interference to support the confidentiality, integrity and availability of Australia’s national telecommunications infrastructure;

n  A requirement for C/CSPs to provide Government, when requested, with information to assist in the assessment of national security risks to telecommunications infrastructure; and

n  Powers of direction and a penalty regime to encourage compliance.[9]

3.11               The discussion paper states that the desired outcomes of the proposed framework are that:

n  government and industry have a productive partnership for managing national security risks to Australia’s telecommunications infrastructure,

n  security risks relating to Australia’s telecommunications infrastructure are identified early, allowing normal business operations to proceed where there are no security concerns and facilitating expedient resolution of security concerns,

n  security outcomes are achieved that give government, business and the public confidence in their use of telecommunications infrastructure for both routine and sensitive activities,

n  the protection of information, including customer information and information about customers, contained on or transmitted across telecommunications networks is better assured, and

n  compliance costs for industry are minimised.[10]

Issues raised in evidence

Is there a need for an industry wide obligation to protect telecommunications?

3.12               Mr Mark Newton disputed the discussion paper’s contention that there is a need for Government intervention in the telecommunications industry for the purpose of national security advising that ‘it isn’t the role of carriers and carriage service providers (C/CSPs) to make business decisions in the intelligence community’s best interests’, rather: 

It’s the intelligence community’s job to stay sufficiently informed and organisationally nimble that they can accommodate C/CSPs’ business decisions without feeling a need to interfere in them.[11]

3.13               In a similar vein, Mr Daniel Black contended that telecommunications security was the Government’s responsibility:

Private industry values the privacy of its business and procurement decisions as much as the government values its “information about the national security environment”.   Instituting obligations in legislation is a crude mechanism and shows the government to industry relationship is broken that these meaningful private dialogues are not taking place to the level required.[12]

3.14               Macquarie Telecom disagreed that there is a need for Government intervention on the issue of security because it saw that providing security was already in the interests of service providers:

You could imagine that we would have a significant interest in ensuring that that information is kept secure and that it is retained and dealt with at a high level of security.  In that sense we wanted to bring it to the attention of the committee that the market is responding to the need for cyber security.  We are not saying that means that the entire Australian network and national security is in perfect hands, but we want to bring it to the attention of the committee that there are market responses going on that ought to be taken into account when thinking about what the broader regulatory arrangements should be that affect all players.[13]

3.15               Macquarie Telecom contended that industry-led self-regulation would be a more proportionate alternative regulatory intervention.  Self-regulation could involve a voluntary obligation to protect telecommunications infrastructure, networks and systems.  Macquarie Telecom further argued that an unenforceable industry code, informed by government guidelines, would be preferable for obtaining voluntary compliance.[14]

3.16               In contrast, the Commonwealth Privacy Commissioner (within the Office of the Australian Information Commissioner), Mr Timothy Pilgrim, agreed with the discussion paper’s objective of requiring telecommunications industry participants to protect information:

 The Office of the Australian Information Commissioner welcomes the fact that one of the desired outcomes of the framework is that the security of individuals’ personal information contained on or transmitted across telecommunication networks is better assured.

The OAIC supports the policy intention behind the proposal to introduce a regulatory framework that will address security and resilience risks posed to Australia’s telecommunications infrastructure.

The OAIC welcomes the fact that one of the desired outcomes of the framework is that the security of individuals’ personal information contained on or transmitted across telecommunication networks is better assured.[15]

3.17               In contrast to Macquarie Telecom, another telecommunications industry participant, Optus, favoured obligations being equally placed on all industry participants and expressed ‘cautious support’ for a legislated framework:

For a number of years Optus has engaged informally with national security agencies on matters relating to the security and resilience of its networks and business operations, including offshore operations.  Having regard to the positive aspects of this experience, Optus has formed the view that it is desirable to move to a more structured scheme, to ensure that the benefits and responsibilities are proportionately shared across the industry (for competitive and equity reasons). Optus provides “cautious support” for the implementation of a scheme.[16]

3.18               Optus’ cautious support was contingent on how the Government might design such a framework:

I want to emphasise that our caution arises more from the challenge of correctly calibrating the practical design of such a scheme (and the down-side risks of incorrectly calibrated arrangements), than fundamental concern about the principle.[17]

How should a telecommunications security model be structured?

3.19               The AGD discussion paper proposes a compliance framework, based on requiring industry participants to be able to demonstrate ‘competent supervision’ and ‘effective control’ over their networks.

3.20               Competent supervision refers to the ability of a service provider to maintain technically proficient oversight of the operations of their network, and the location of data; awareness of, and authority over, parties with access to network infrastructure; and a reasonable ability to detect security breaches or compromises.[18]

3.21               Effective control refers to the ability of a C/CSP to maintain direct authority or contractual arrangements which ensure that its infrastructure and the information held on it is protected from unauthorised interference.[19]

3.22               Optus agreed that this proposed framework could be effective:

We support the idea that a scheme should be targeted to achieve and verify outcomes, rather than be prescriptive about particular business practices, network designs or purchasing decisions. This aligns with the proposed approach of a scheme requiring carriers to demonstrate:

n  Competent supervision; and

n  Effective control.[20]

3.23               The Australian Mobile Telecommunications Association and Communications Alliance, representing the industry as a whole, preferred an outcomes-based approach to regulation:

The Associations agree that the regulatory framework should focus on security outcomes rather than technical requirements and that industry should be able to demonstrate compliance rather than have prescriptive obligations imposed.

Noting the importance of network security and resiliency in the digital age, the Associations on the whole welcomes the Government’s pragmatic security outcomes/objectives based approach as opposed to stipulating a requirement for Government approval of network architecture at a technical or engineering level.[21]

3.24               Similarly, the Commonwealth Privacy Commissioner, within the Office of the Australian Information Commissioner, agreed that a framework should be focussed on the end results, rather than a prescriptive government-led process:

The Office of the Australian Information Commissioner considers that such an outcomes-based regulatory framework would ensure that [service providers] have sufficient flexibility to respond to changes in telecommunications technology, whilst also ensuring that the Government remains responsible for ensuring that the overall protection of personal information is achieved.[22]

3.25               The Australian Mobile Telecommunications Association and Communications Alliance further argued that direct government control of the business decision-making process would be excessive:

A regulatory regime that mandates external controls over procurement and network design practices and requires extensive notification practices would certainly amount to an overly prescriptive level of intervention.

The Associations believe that such a regulatory framework would restrict the ability of network and infrastructure providers to cost-effectively implement platforms that are innovative, progressive and provide supplier differentiation. Controls over procurement would also unnecessarily increase timeframes for network rollouts, which would contradict the Governments advocacy for increased broadband deployment.[23]

Information sharing and compliance auditing

3.26               The AGD discussion paper states that Government would provide guidance to assist industry to understand and meet its obligations, and to inform Carriers/Carriage Service Providers (C/CSPs) how they can maintain competent supervision and effective control over their networks.  In order to monitor compliance with the obligations under a framework, C/CSPs would be required to demonstrate compliance to Government. This could be done by compliance assessments and audits, based on a risk assessment to inform the level of engagement required.[24]

3.27               In relation to the inherent risk of private sector entities being obliged to provide information to Government Mr Mark Newton observed that:

Businesses also need to be mindful of the fact that any information they provide to the Government can potentially be released (e.g., under Freedom of Information, subpoena, or leak), so it’s wise to be reluctant about sharing.[25]

3.28               The Committee observes that industry is required to provide similar network and service information to the Attorney-General’s Department under the interception capability obligations contained in the Telecommunications (Interception and Access) Act 1979.  That information is given statutory protection from disclosure to any other person without the written permission of the C/CSP concerned.[26]

3.29               Macquarie Telecom, in accepting that protecting the security of Australia’s telecommunications network infrastructure is in Australia’s national interest, noted that it was incumbent on Government to communicate with industry:

At the same time, C/CSPs and other players in the broader communications sector are highly motivated to ensure the security of their own network infrastructure, systems and data. With a clear alignment between the interests of industry players and the Government on the need for network infrastructure security, Macquarie believes a better outcome could be achieved with increased communication at a trusted level between industry and Government.[27]

3.30               The complementary roles that industry and government can play was highlighted by Vodafone Hutchison Australia:

n  The Government’s security agencies are best placed to outline what are actual and emerging security risks and provide clear guidance to the industry about effective protections and controls to mitigate these risks.

n  The telecommunications industry is best placed to determine what are the most appropriate operational and technical controls for their businesses.[28]

3.31               The Australian Mobile Telecommunications Association and Communications Alliance argued that industry participants need to know in advance of making their decisions what position and advice Government may have:

The Associations have proposed that requirements regarding networks and infrastructure need to be clearly defined so that industry can invest and deploy infrastructure with confidence and, without concern that government will raise objections once such networks are deployed.[29]

3.32               Telstra highlighted uncertainty in how risk assessments might work in practice:

What is not clear is whether these “risk assessments” would be subject to legislated timeframes so as to avoid delaying procurement or network design activities. It is also unclear if C/CSPs will have to implement the suggested outcomes of the “risk assessments” and if there are any penalties for not doing so.[30]

Remediation powers and a penalty regime

3.33               The AGD discussion paper proposes that the risk management framework for determining that Carriers and Carriage Service Providers (C/CSPs) will practice competent supervision and effective control of their systems will need to be underpinned by penalties and the ability of government to make directions to service providers:

Where potential issues of concern are identified, the preferred approach would be to engage with the relevant C/CSPs to establish whether national security concerns can be cooperatively addressed. Where this is not possible, one way to proportionately address various levels and forms of noncompliance could be to provide a graduated suite of enforcement measures (including the power of direction). The availability of enforcement measures would provide industry with greater incentive to engage cooperatively with Government.

Under such an approach, in cases where engagement with C/CSPs proves to be ineffective, or a blatant disregard of security information jeopardises the Government’s confidence in the security and integrity of Australia’s telecommunications infrastructure, powers of direction could provide a proportionate means to achieve compliance. [31]

3.34               The Australian Mobile Telecommunications Association and Communications Alliance in their joint submission were not convinced that it is yet necessary to create an interventionist or punitive compliance regime:  

With regard to the proposal for an amendment to the Act to allow for the creation of appropriate enforcement powers and associated pecuniary penalties, the Associations’ position is that development of a financial penalties framework is premature, and not conducive to the development of an appropriate level of trust, and a common vision on security and resiliency, between Government and service providers.[32]

3.35               Telstra argued that government already possesses the means to dissuade service providers from engaging in poor security practices:

Telstra believes the most sensible way to provide these incentives would be through the Government’s own procurement practices – i.e. Government to specify in requests for proposal/tender their security, resilience and integrity requirements for IT and communications services supplied to Government by C/CSPs.[33]

3.36               The Australian Mobile Telecommunications Association and Communications Alliance also argued that if the framework in the discussion paper was to be established as proposed, the framework should include avenues to appeal government decisions:

The Associations propose that it should include a facility for an appropriate and truly independent means of review or appeal to prevent arbitrary or unjust use of directions or penalties.[34]

Other considerations

Regulatory impacts

3.37               The Committee received some limited evidence about the potential regulatory impacts that the telecommunications security reform might have on industry. However, these points were not elaborated upon in submissions or in oral evidence to the Committee. The Australian Mobile Telecommunications Association and Communications Alliance in their joint submission stated:

Concerns previously raised by the Associations on the proposal to make legislative and regulatory changes to enhance the security and resilience of telecommunications network infrastructure, are as follows:

n  the potential for the proposed regime to bring providers into conflict with existing corporate regulations, particularly those relating to the disclosure of information;

n  the compatibility of the proposed regime with existing corporate governance where a providers activities might be driven by decisions made outside of Australia. Many operators have global or regional supply arrangements which would in effect become invalid under the proposed regime. This would result in costs to operators in the amount of many millions of dollars as a result of having to break regional/global supply contracts;

n  impacts on competition in the market-place and risk that proposed requirements may create a barrier to entry for new, lower cost providers and could eliminate some of those already in the market, resulting in decreased market competition on pricing and general consumer detriment;

n  the absence, to date, of any protection/indemnity to civil action for providers who have acted in good faith under the requirements of the proposed amendments;

n  the fact that the rapidly changing technology landscape, where potential vulnerabilities now exist at the physical, network and application layers, has not been sufficiently taken into account, specifically with regards to the concept of “critical infrastructure”; and

n  the need to engage further with industry on possible regulatory alternatives: such as a set of guidelines to provide guidance for providers in the areas of procurement and network design; a process for Government-industry engagement where a high risk event is identified and a framework for periodic reporting to Government agencies on the security measures being taken by providers.[35]

Data breach notifications

3.38               The Privacy Commissioner, within the Office of the Australian Information Commissioner (OAIC), raised the potential introduction of a compulsory data breach notification regime to supplement security arrangements:

While notification of a data breach is currently not required by the Privacy Act, the OAIC suggests that it be considered as part of the proposed framework as an important mitigation strategy against privacy risks.  It may also assist in promoting transparency and trust for C/CSPs.

The OAIC suggests that the implementation of an effective mechanism for ensuring that industry has taken reasonable steps to mitigate security risks is essential and will assist in achieving the necessary levels of transparency and accountability. In the event that there is a complaint to the OAIC, access to any compliance assessments and audits of the Government under the proposed regime would assist the OAIC in its investigation of the matter.[36]

3.39               Similarly, the Australian Mobile Telecommunications Association and Communications Alliance, in their joint submission, contended that a cyber-attack reporting regime would be preferable to the penalty and remediation regime proposed in the discussion paper:

An alternative, and preferable, approach would be to require a reporting regime relating to cyber-attacks on Australian networks with noticeable operational impact by service providers as opposed to a system which enforces penalties on those providers. Where service providers can demonstrate implementation of reasonable minimum network security measures then imposition of a penalty based instrument would seem to be punishing those service providers who have taken steps to ensure, within their control, that a certain level of precaution has been exercised at a network level.[37]

3.40               Senetas, a private sector security consultant, was also of the view that the government make data breach notification mandatory for C/CSPs.[38]

Free trade commitments

3.41               Australia’s free trade commitments require any barriers to trade to be no more trade-restrictive than necessary to fulfil the legitimate objective of protecting national security.  Huawei Australia cautioned that a legislative framework that targets particular vendors or vendors from particular countries could also raise concerns about free trade commitments:

Under the General Agreement on Tariffs and Trade (GATT), World Trade Organisation (WTO) members are essentially required not to discriminate against imported products on the basis of their country of origin.  If the Network Security Reforms result in discrimination against vendors on the basis of their country of origin, it is likely that this would place Australia in breach of its WTO obligations under the GATT.[39]

Committee comment

3.42               The Committee understands the rationale of the Telecommunications Sector Security Reform proposal and notes the warm, if cautious support, of most industry submitters.

3.43               There are threats to Australia’s national security that can be effected through the telecommunications systems. The industry itself is best placed to deal with those threats, however, it cannot protect its systems and infrastructure of which it is ignorant or that it does not understand. As well, there is the problem of participants which ignore, or fail to take them sufficiently seriously. The relevant threat information is held by government.  Where appropriate, there is therefore a need for Government to share threat information with industry in order for industry participants to make informed decisions about their procurements and outsourcing arrangements. 

3.44               Conversely, it would not be possible for government and industry to have effective or guided discussions without industry providing essential background information to government with which it can assess threats.  The greatest improvements to telecommunications sector security would come through dialogue – with both industry and Government exchanging useful, and sensitive, information.

3.45               The Committee is of the view that it will be necessary to encourage service providers to engage with Government and to accept the advice given to them.  Although there are currently indirect incentives for service providers to protect their customers’ information (such as public relations damage), commercial interests will not always align with the national interest.  

3.46               To account for those instances were advice is not acted upon and where national security is threatened, the Committee agrees that Government should create a scheme including the capacity for Government to direct service providers to take certain remediation actions.

3.47               The Committee believes there cannot be an effective and equitable security regime without enforcement mechanisms.

Interaction between data retention and telecommunications security

3.48               The Privacy Commissioner drew the Committee’s attention to the need to consider telecommunications sector security reform for telecommunications data that is held under any potential data retention regime:

The OAIC notes that ensuring that Australian telecommunications networks are protected by an effective security framework is particularly important given the proposals relating to data retention.[40]

3.49               The Committee agrees with the Privacy Commissioner that there is a clear need to secure information or data that is stored, given that there are already large volumes of telecommunications information held by telecommunications providers.

3.50               The Committee is, therefore, of the view that an infrastructure and information security regime should be introduced whether or not Government chooses to introduce a data retention regime.

Regulatory impacts

3.51               As highlighted by the Australian Mobile Telecommunications Association and Communications Alliance, a Regulation Impact Statement should consider further issues that were not examined in detail in submissions or in evidence given at hearings to this inquiry.  Such issues should include:

n  the interaction of the proposed regime with other corporate regulations;

n  the compatibility of the proposed regime with existing corporate governance where a provider’s activities might be driven by decisions made outside of Australia; 

n  consideration of an indemnity to civil action for service providers who have acted in good faith under the requirements of the proposed framework; and

n  impacts on competition in the market-place, including:

§  the potential for  proposed requirements may create a barrier to entry for lower cost providers;

§  the possible elimination of  existing lower cost providers from the market, resulting in decreased market competition on pricing; and

§  any other relevant effects.

 

Recommendation 19

 

The Committee recommends that the Government amend the Telecommunications Act 1997 to create a telecommunications security framework that will provide:

n  a telecommunications industry-wide obligation to protect infrastructure and the information held on it or passing across it from unauthorised interference;

n  a requirement for industry to provide the Government with information to assist in the assessment of national security risks to telecommunications infrastructure; and

n  powers of direction and a penalty regime to encourage compliance.

The Committee further recommends that the Government, through a Regulation Impact Statement, address:

n  the interaction of the proposed regime with existing legal obligations imposed upon corporations;

n  the compatibility of the proposed regime with existing corporate governance where a provider’s activities might be driven by decisions made outside of Australia; 

n  consideration of an indemnity to civil action for service providers who have acted in good faith under the requirements of the proposed framework; and

n  impacts on competition in the market-place, including:

§  the potential for proposed requirements to create a barrier to entry for lower cost providers;

§  the possible elimination of existing lower cost providers from the market, resulting in decreased market competition on pricing; and

§  any other relevant effects.

 

 

 

We acknowledge the traditional owners and custodians of country throughout Australia and acknowledge their continuing connection to land, waters and community. We pay our respects to the people, the cultures and the elders past, present and emerging.

Aboriginal and Torres Strait Islander people are advised that this website may contain images and voices of deceased people.