Definitions
[1] Department
of Home Affairs (DHA), Australian Border Force (ABF) and Attorney-General's
Department (AGD), Submission 28, pp. 3−4.
[2] 'Cybercrime', Australian Criminal Intelligence
Commission (ACIC), updated 17 July 2018, https://www.acic.gov.au/about-crime/organised-crime-groups/cybercrime (accessed 16 January 2019).
[3] Australian
Government, Australia's International Cyber Engagement Strategy, Barton,
ACT, 2017, p. 23.
[4] International
Association of Prosecutors—Global
Prosecutors E-Crime Network (GPEN), Submission 19, p. 4.
[5] 'The
Internet of Things (IoT): An Overview', Internet Society, https://www.internetsociety.org/resources/doc/2015/iot-overview?gclid=EAIaIQobChMI9Zqf0siC4AIVFR4rCh3hPwVVEAAYAyAAEgL_gPD_BwE (accessed 23 January 2019).
[6] 'Cyber
crime', Australian Federal Police, https://www.afp.gov.au/what-we-do/crime-types/cyber-crime (accessed 21 January 2019).
[7] Telecommunications
(Interception and Access) Act 1979 (Cth), section 6(1).
Chapter 1 - Introduction
[1]
Commonwealth of Australia, Department of Foreign Affairs and Trade, Australia's
International Cyber Engagement Strategy, October 2017, p. 33, https://dfat.gov.au/
international-relations/themes/cyber-affairs/aices/pdf/DFAT%20AICES_AccPDF.pdf
(accessed 28 March 2019).
[2]
Joint Standing Committee on Trade and Investment Growth, Trade and
the Digital Economy, 20 September 2018.
[3]
Senate Finance and Public Administration References Committee, Digital
Delivery of Government Services, 27 June 2018.
[4]
Parliamentary Joint Committee on Intelligence and Security (PJCIS), Advisory
Report on the Telecommunications and Other Legislation Amendment (Assistance
and Access) Bill 2018, December 2018, Recommendation 1, p. 3 and
Recommendation 16, p. 8.
[5]
PJCIS, Review of the Telecommunications and Other Legislation
Amendment (Assistance and Access) Act 2018 with specific reference to
Government amendments introduced and passed on 6 December 2018, https://www.aph.gov.au/Parliamentary_Business/Committees/Joint/Intelligence_and_Security/ReviewofTOLAAct (accessed 16
January 2019).
[6]
Software.org: the BSA Foundation, cited in 'IoT devices to reach 50
billion by 2020: Report', BGR, 14 July 2017, https://www.bgr.in/news/iot-devices-to-reach-50-billion-by-2020-report/
(accessed 24 January 2019).
[7]
Australian Bureau of Statistics (ABS), 8146.0 – Household Use of
Information Technology, Australia, 2016–17, available: http://www.abs.gov.au/ausstats/abs@.nsf/mf/8146.0 (accessed 6 March 2019).
[8]
ABS, 8153.0 – Internet Activity, Australia, June 2018, available:
https://www.abs.gov.au/ausstats/abs@.nsf/mf/8153.0/
(accessed 6 March 2019).
[9]
ABS, 8146.0 – Household Use of Information Technology, Australia,
2016–17, available: http://www.abs.gov.au/ausstats/abs@.nsf/mf/8146.0
(accessed 6 March 2019).
[10]
Department of Home Affairs (DHA), Attorney-General's Department (AGD) and
Australian Border Force (ABF), Submission 28, p. 9.
[11]
Commonwealth of Australia, Department of Industry, Innovation and Science,
Australia's Tech Future: Delivering a strong, safe and inclusive digital
economy, 19 December 2018, p. 6, https://www.industry.gov.au/sites/default/files/2018-12/australias-tech-future.pdf
(accessed 12 February 2019).
[12]
Commonwealth of Australia, Department of the Prime Minister and Cabinet, Australia's
Cyber Security Strategy: Enabling innovation, growth & prosperity,
2016, p. 14, https://cybersecuritystrategy.homeaffairs.gov.au/sites/all/themes/cybersecurity/img/PMC-Cyber-Strategy.pdf
(accessed 5 December 2018).
[13]
Australian Criminal Intelligence Commission (ACIC), Cybercrime,
updated 17 July 2018, https://www.acic.gov.au/about-crime/organised-crime-groups/cybercrime
(accessed 16 January 2019).
[14]
International Association of Prosecutors—Global
Prosecutors E-Crime Network (GPEN), Submission 19, p. 2.
[15]
DHA, AGD and ABF, Submission 28, pp. 6 and 9.
[16]
Cyber Security Research Centre (CSRC), Submission 8, p. 1.
[17]
ACIC, Connect, Discover, Understand, Respond: 2016−17 Annual Report,
Canberra, 2017, p. 118, https://acic.govcms.gov.au/sites/g/files/net1491/f/acic_2016-17_annual_report.pdf?v=1508387578
(accessed 29 January 2019).
[18]
DHA, AGD and ABF, Submission 28, p. 6.
[19]
DHA, AGD and ABF, Submission 28, p. 10.
[20]
ACIC and Australian Institute of Criminology (AIC), Submission 29,
p. 7.
[21]
ACIC and AIC, Submission 29, p. 7.
[22]
Wireless Internet Service Provider Association of Australia (WISPAU), Submission
17, p. 3.
[23]
DHA, AGD and ABF, Submission 28, p. 11.
[24]
DHA, AGD and ABF, Submission 28, p. 11.
[25]
CISCO, What is a VPN? – Virtual Private Network, https://www.cisco.com/c/en/us/
products/security/vpn-endpoint-security-clients/what-is-vpn.html (accessed
19 February 2019).
[26]
Geo-blocking is used on websites to prevent shoppers in some countries
from being able to buy products and services for cheaper overseas prices.
[27]
Bandwidth throttling is when an internet service provider detects and de-prioritises
certain types of internet traffic.
[28]
Choice, How to find the best VPN service, https://www.choice.com.au/electronics-and-technology/internet/connecting-to-the-internet/buying-guides/vpn-services
(accessed 6 March 2019).
[29]
Dr John Coyne, Submission 4, p. 2.
[30]
For a summary of the many ways in which drones are used see Senate Rural
and Regional Affairs and Transport References Committee, Current and future
regulatory requirements that impact on the safe commercial and recreational use
of Remotely Piloted Aircraft Systems (RPAS), Unmanned Aerial Systems (UAS) and
associated systems, July 2018, pp. 4–6.
[31]
Dr John Coyne, Submission 4, p. 2.
[32]
The Customs (Prohibited Imports) Regulations 1956 prohibits the
importation of signal jammers and drone jammers into Australia unless subject
to an exemption.
[33]
Western Australia Police Force, Submission 31, p. 3.
[34]
Mr Matthew Loeb, Chief Executive Officer, ISACA, Committee Hansard,
29 March 2018, p. 13.
[35]
Mr Matthew Loeb, Chief Executive Officer, ISACA, Committee Hansard,
29 March 2018, p. 11.
[36]
Dr John Coyne, Submission 4, p. 3.
[37]
See for example, Bob Yirke, A small chemical reactor made via 3-D
printing allows for making drugs on-demand, 19 January 2018, https://techxplore.com/news/2018-01-small-chemical-reactor-d-drugs.html
(accessed 25 March 2019); David Morris, Army Unveils 3-D Printed Grenade
Launcher, 11 March 2017, http://fortune.com/2017/03/11/3d-printed-grenade-launcher/
(accessed 25 March 2019).
[38]
Internet Society, The Internet of Things: An Overview, 15 October
2015, p. 4, https://www.internetsociety.org/resources/doc/2015/iot-overview?gclid=EAIaIQobChMI9Zqf0siC4AIVFR4rCh3hPwVVEAAYAyAAEgL_gPD_BwE
(accessed 23 January 2019).
[39]
Internet Society, The Internet of Things: An Overview, 15 October
2015, (accessed 23 January 2019).
[40]
ACIC and AIC, Submission 29, p. 7; Software.org: the BSA
Foundation, cited in BGR, IoT devices to reach 50 billion by 2020: Report,
14 July 2017, https://www.bgr.in/news/iot-devices-to-reach-50-billion-by-2020-report/ (accessed 24 January
2019).
Chapter 2 - Coordinating law enforcement across jurisdictions
[1]
International Association of Prosecutors—Global
Prosecutors E-Crime Network (GPEN), Submission 19, p. 3.
[2]
GPEN, Submission 19, p. 3.
[3]
Government response, House of Representatives Standing Committee on
Communications, Report on the Inquiry into Cyber Crime, p. 13, https://www.aph.gov.
au/PARLIAMENTARY_BUSINESS/COMMITTEES/HOUSE_OF_REPRESENTATIVES_COMMITTEES?url=coms/reports.htm
(accessed 4 December 2018).
[4]
Department of Home Affairs (DHA), 'Cybercrime', https://archive.homeaffairs.gov.au/about/crime/cybercrime (accessed 5 December 2018).
[5]
Ms Esther George, Lead Cybercrime Consultant, International Association
of Prosecutors, Committee Hansard, 29 March 2018, p. 41.
[6]
Access Now, Mutual Legal Assistance Treaties, https://www.mlat.info/ (accessed 18 February 2019).
[7]
JV Tossini, 'The Five Eyes—The
Intelligence Alliance of the Anglosphere', ukdj, 14 November 2017,
https://ukdefencejournal.org.uk/the-five-eyes-the-intelligence-alliance-of-the-anglosphere/
(accessed 20 December 2018). See Chapter 4 for discussion of the Five Eyes
Alliance Statement of Principles in relation to encryption.
[8]
DHA, Attorney-General's Department (AGD) and Australian Border Force
(ABF), Submission 28, p. 6.
[9]
ISACA, Submission 13, [p. 2].
[10]
AGD, National Plan to Combat Cybercrime, 2013, p. 6.
[11]
Commonwealth of Australia, Department of Prime Minister and Cabinet, Australia's
Cyber Security Strategy: Enabling innovation, growth & prosperity, 2016,
p. 2, https://cybersecuritystrategy.homeaffairs.gov.au/sites/all/themes/cybersecurity/img/PMC-Cyber-Strategy.pdf
(accessed 5 December 2018).
[12]
ISACA, Submission 13, [p. 2].
[13]
Commonwealth of Australia, Department of Prime Minister and Cabinet, Australia's
Cyber Security Strategy: Enabling innovation, growth & prosperity, 2016,
p. 5.
[14]
Commonwealth of Australia, Department of Prime Minister and Cabinet, Australia's
Cyber Security Strategy: Enabling innovation, growth & prosperity, 2016,
p. 15.
[15]
ISACA, Submission 13, [pp. 2−3].
[16]
DHA, AGD and ABF, Submission 28, p. 7; see also Mr Hamish Hansford,
First Assistant Secretary, National Security and Law Enforcement Policy, DHA, Committee
Hansard, 11 May 2018, p. 48.
[17]
Commonwealth of Australia, Department of Prime Minister and Cabinet, Australia's
Cyber Security Strategy: Enabling innovation, growth & prosperity, 2016
p. 6.
[18]
Mr Andrew Colvin, Commissioner, Australian Federal Police (AFP), Committee
Hansard, 22 February 2019, pp. 5−6.
[19]
Commonwealth of Australia, Department of Prime Minister and Cabinet, Australia's
Cyber Security Strategy: Enabling innovation, growth & prosperity, 2016,
p. 29.
[20]
Law, Crime and Community Safety Council, Communiqué, 19 May 2017, https://www.ag.gov.au/About/CommitteesandCouncils/Law-Crime-and-Community-Safety-Council/Documents/19-May-LCCSC-Communique.pdf
(accessed 20 December 2018).
[21]
DHA, Cybercrime, https://archive.homeaffairs.gov.au/about/crime/cybercrime
(accessed 5 December 2018).
[22]
Commonwealth of Australia, Department of Foreign Affairs and Trade, Australia's
International Cyber Security Strategy, October 2017, https://dfat.gov.au/international-relations/themes/cyber-affairs/aices/pdf/DFAT%20AICES_AccPDF.pdf
(accessed 28 March 2019).
[23]
Commonwealth of Australia, Department of Foreign Affairs and Trade, Australia's
International Cyber Engagement Strategy, 2017, p. 32.
[24]
ISACA, Submission 13, [p. 4].
[25]
DHA, 'Cybercrime', https://archive.homeaffairs.gov.au/about/crime/cybercrime
(accessed 5 December 2018).
[26]
DHA, AGD and ABF, Submission 28, p. 6.
[27]
DHA, AGD and ABF, Submission 28, p. 8.
[28]
DHA, AGD and ABF, Submission 28, p. 8.
[29] Australian
Commission for Law Enforcement Integrity (ACLEI), Submission 1, p. 1.
The Law Enforcement Integrity Commissioner Act 2006 (the LEIC Act) gives
the Integrity Commissioner power to examine witnesses on oath in coercive
hearings. Agencies subject to the Integrity Commissioner's jurisdiction include
the ACIC; the former Crim Trac Agency and the former National Crime Authority;
the Australian Federal Police; Australian Transaction Reports and Analysis
Centre; Department of Immigration and Border Protection/DHA; prescribed aspects
of the Department of Agriculture and Water Resources; and other agencies with
law enforcement functions.
[30]
ACLEI, Submission 1, p. 1.
[31]
ACLEI, Submission 1, p. 7. The agencies subject to the Integrity
Commissioner's jurisdiction include the Australian Criminal Intelligence
Commission (ACIC); AFP; Australian Transaction Reports and Analysis Centre
(AUSTRAC); DHA, including Australian Border Force); prescribed aspects of the
Department of Agriculture and Resources; and any other Australian government
agency prescribed by regulation under the Law Enforcement Integrity
Commissioner Act 2006.
[32]
ACIC and Australian Institute of Criminology (AIC), Submission 29,
p. 3.
[33]
ACIC and AIC, Submission 29, p. 3.
[34]
Australian Cyber Security Centre, https://cyber.gov.au/about-this-site/about-acsc/
(accessed 20 February 2019).
[35]
Commonwealth of Australia, Department of the Prime Minister and Cabinet, Australia's
Cyber Security Strategy, 2016, pp. 2−3.
[36]
ISACA, Submission 13, [p. 2].
[37]
Cyber Security Research Centre (CSRC), Submission 8, p. 11. The
CSRC is a public, not-for-profit company through which the Cyber Security
Cooperative Research Centre operates. See Cyber Security Cooperative Research
Centre, https://www.cybersecuritycrc.org.au/
(accessed 31 January 2019).
[38]
AUSTRAC, Submission 30, p. 4.
[39]
See Appendix 4 for a list of Australian government agencies with existing
cybercrime and cyber security responsibilities.
[40]
Commonwealth of Australia, Department of Communications and the Arts, Launch
of the Office of the Children's eSafety Commissioner, 9 October 2015, https://www.communications.gov.au/departmental-news/launch-office-children%E2%80%99s-esafety-commissioner
(accessed 8 March 2019).
[41]
Commonwealth of Australia, Office of the eSafety Commissioner, Role of
the office, https://www.esafety.gov.au/about-the-office/role-of-the-office
(accessed 8 March 2019).
Chapter 3 - 'Going dark'
[1]
Australian Commission for Law Enforcement Integrity (ACLEI), Submission
1, p. 1.
[2]
Cyber Security Research Centre (CSRC), Submission 8, p. 6;
International Association of Prosecutors, Global Prosecutors E-Crime Network
(GPEN), Submission 19, p. 4.
[3]
CSRC, Submission 8, pp. 6−7.
[4]
Dr John Coyne, Submission 4, pp. 7−8.
[5]
CSRC, Submission 8, p. 6.
[6]
CSRC, Submission 8, p. 5.
[7]
CSRC, Submission 8, p. 1.
[8]
Department of Home Affairs (DHA), 'Cybercrime', https://archive.homeaffairs.gov.au/about/crime/cybercrime (accessed 20 December 2018).
[9]
ACLEI, Submission 1, pp. 1−2.
See also Telecommunications (Interception and Access) Act 1979, Part 5—1A—Data retention, https://www.legislation.gov.au/Details/C2018C00503 (accessed 20 December 2018).
[10]
Australian Transaction Reports and Analysis Centre (AUSTRAC), New
Australian laws to regulate cryptocurrency providers, 11 April 2018, http://www.austrac.gov.au/media/media-releases/new-australian-laws-regulate-cryptocurrency-providers
(accessed 20 December 2018).
[11]
This legislation is discussed in more detail in Chapter 4. See Parliament
of Australia, Telecommunications and Other Legislation Amendment (Assistance
and Access) Bill 2018, https://www.aph.gov.au/Parliamentary_Business/Bills_Legislation/Bills_Search_Results/Result?bId=r6195 (accessed 12 December 2018). See Chapter 2 for
further discussion about the Five Eyes Alliance.
[12]
DHA, Attorney-General's Department (AGD) and Australian Border Force
(ABF), Submission 28, pp. 6 and 9.
[13]
AGD, National Plan to Combat Cybercrime, 2013, p. 4, https://sherloc.unodc.org/cld/lessons-learned/aus/national_plan_to_combat_cybercrime.html?lng=en
(accessed 19 December 2018).
[14]
Australian Securities and Investment Commission (ASIC), Submission 11,
p. 5.
[15]
Dr John Coyne, Committee Hansard, 29 March 2018, p. 6.
[16]
Lucy McNally and John Stewart, 'Australian Federal Police seize Phantom
Secure phones as part of global crackdown', ABC News, 16 March 2018,
available: https://www.abc.net.au/news/2018-03-16/afp-seize-phones-as-part-of-phantom-secure-crackdown/9555652
(accessed 18 March 2019).
[17]
Lucy McNally and John Stewart, 'Australian Federal Police seize Phantom
Secure phones as part of global crackdown', ABC News, 16 March 2018.
[18]
Lucy McNally and John Stewart, 'Australian Federal Police seize Phantom
Secure phones as part of global crackdown', ABC News, 16 March 2018.
[19]
Dr John Coyne, Submission 4, p. 4.
[20]
ISACA, Submission 13, [p. 4].
[21]
DHA, AGD and ABF, Submission 28, p. 10. See Chapter 1 for further
explanation of the 5G network.
[22]
Dr John Coyne, Committee Hansard, 29 March 2018, p. 6.
[23]
Mr Michael Phelan, Chief Executive Officer, Australian Criminal
Intelligence Commission (ACIC) and Director, Australian Institute of
Criminology (AIC), Committee Hansard, 11 May 2018, p. 48.
[24]
Mr Michael Phelan, Chief Executive Officer, ACIC & Director, AIC, Committee
Hansard, 11 May 2018, p. 49.
[25]
I Warren, A Molnar and M Mann, 'Poisoned water holes: the legal dangers of
dark web policing', The Conversation, 7 September 2017, https://www.news.com.au/technology/online/poisoned-water-holes-the-legal-dangers-of-dark-web-policing/news-story/
285655e36981515e35e2290360f9e646 (accessed 20 December 2018).
[26]
Drs Monique Mann, Adam Molnar, Ian Warren and Angela Daly, Australian
Privacy Foundation, Digital Rights Watch Australia, Electronic Frontiers
Australia, and Future Wise, Submission 23, p. 9.
[27]
Dr Monique Mann et al, Submission 23, p. 9. See also discussion of
law enforcement challenges in relation to big data in Chapter 5.
[28]
Dr Monique Mann et al, Submission 23, p. 10.
[29]
Dr John Coyne, Submission 4, p. 4.
[30]
ASIC, Submission 11, p. 6.
[31]
Mr Nathan White, Senior Legislative Manager, Access Now, Committee
Hansard, 11 May 2018, p. 2. Access Now represents over 300
individuals, organisations and companies from more than 50 countries. It
advocates the development and use of secure communications tools and
technologies and rejects policies that prevent or undermine the use of strong
encryption.
[32]
Dr John Coyne, Committee Hansard, 29 March 2018, p. 5.
[33]
Law Council of Australia, Submission 21, p. 7.
[34]
See for example Dr Monique Mann et al, Submission 23, p. 13; Access
Now, Submission 14; Law Council of Australia, Submission 21, p.
8.
[35]
Scram Software, Submission 5, p. 3.
[36]
Ms Amy Stepanovich, US Policy Manager and Global Policy Council, Access
Now, Committee Hansard, 11 May 2018, p. 4.
[37]
Ms Lizzie O'Shea and Ms Elise Thomas, Submission 15, p. 4.
[38]
Cortex IT Labs Pty Ltd, Submission 12, p. 2.
[39]
ACIC and AIC, Submission 29, p. 6.
[40]
GPEN, Submission 19, p. 5; CSRC, Submission 8, p. 6.
[41]
D Moore and T Rid, 'Cryptopolitik and the Darknet', Survival: Global
Politics and Strategy, vol. 58, no. 1, 2016, https://www.tandfonline.com/doi/full/10.1080/
00396338.2016.1142085 (accessed 20 December 2018).
[42]
Mr Paul Templeton, Submission 32, p. 1. TOR or 'The Onion Routing
project' refers to a type of software that allows users to use the internet
anonymously. Onion routing is implemented by encryption, and is used for both
legal and illegal purposes. See GPEN, Submission 19, p. 5.
[43]
CSRC, Submission 8, p. 6.
[44]
Dr James Martin, Submission 9, p. [3].
[45]
CSRC, Submission 8, p. 6.
[46]
CSRC, Submission 8, p. 9.
[47]
Dr James Martin, Submission 9, [p. 3].
[48]
United States (US) Department of Justice, 'First nationwide undercover
operation targeting darknet vendors results in arrests of more than 35
individuals selling illicit goods and the seizure of weapons, drugs and more
than $23.6 million', Media release, 27 June 2018, https://www.justice.gov/usao-mdpa/pr/first-nationwide-undercover-operation-targeting-darknet-vendors-results-arrests-more-35
(accessed 18 March 2019).
[49]
Hal Hodson, 'Silk Road bust hints at FBI's new cybercrime powers', New
Scientist, 4 October 2013, https://www.newscientist.com/article/dn24345-silk-road-bust-hints-at-fbis-new-cybercrime-powers/
(accessed 18 March 2019).
[50]
The US Department of Justice, 'AlphaBay, the largest online 'dark market'
shut down', Media release, 20 July 2017, https://www.justice.gov/opa/pr/alphabay-largest-online-dark-market-shut-down
(accessed 18 March 2019).
[51]
Jeff Sessions, cited in 'AlphaBay, the largest online 'dark market' shut
down'.
[52]
Australian Transaction Reports and Analysis Centre (AUSTRAC), Submission
30, p. 5. See also Chapter 1 for discussion of cryptomarkets.
[53]
AUSTRAC, Submission 30, p. 5.
[54]
ASIC, Submission 11, p. 5.
[55]
AUSTRAC, Submission 30, p. 5.
[56]
AUSTRAC, Submission 30, pp. 8−9.
[57]
CSRC, Submission 8, p. 7. See also GPEN, Submission 19, p.
5.
[58]
CSRC, Submission 8, p. 7.
[59]
DHA, AGD and ABF, Submission 28, p. 9.
[60]
DHA, AGD and ABF, Submission 28, p. 16.
[61]
Mr Andrew Warnes, Assistant Secretary, Communications Security and
Intelligence Branch, AGD, Committee Hansard, 11 May 2018, pp. 48−49.
[62]
DHA, AGD and ABF, Submission 28, p. 16.
[63]
CSRC, Submission 8, p. 6.
[64]
Dr David Irvine, Chair, CRSC, Committee Hansard, 29 March 2018, p.
23.
[65]
The US Department of Justice, 'Deputy Attorney General Rod J. Rosenstein
Delivers Remarks on Encryption at the United States Naval Academy', 10 October
2017, cited in ASIC, Submission 11, p. 6.
[66]
Western Australia Police Force (WA Police), Submission 31, p. 7.
[67]
Dr John Coyne, Committee Hansard, 29 March 2018, pp. 6–7.
[68]
Dr John Coyne, Committee Hansard, 29 March 2018, p. 7.
[69]
Nyman Gibson Miralis Defence Lawyers and Advisors, Submission 27,
[p. 2].
[70]
GPEN, Submission 19, p. 5.
[71]
Dr John Coyne, Submission 4, p. 6.
[72]
Dr John Coyne, Committee Hansard, 29 March 2018, p. 4.
[73]
Mr Matthew Loeb, Chief Executive Officer, ISACA, Committee Hansard,
29 March 2018, p. 13.
[74]
ASIC, Submission 11, p. 6.
[75]
Scram Software, Submission 5, p. 3.
[76]
ASIC, Submission 11, p. 7.
[77]
ACIC and AIC, Submission 29, p. 8.
[78]
ACIC and AIC, Submission 29, p. 8; Mr Michael Phelan, Chief
Executive Officer, ACIC, Committee Hansard, 11 May 2018,
p. 45. See Chapter 2 for further discussion of Mutual Legal Assistance
Treaties.
[79]
Mr Andrew Warnes, Assistant Secretary, Communications Security and
Intelligence Branch, AGD, Committee Hansard, 11 May 2018, p. 45.
[80]
Mr Ramzi Jabbour, Deputy Commissioner, Capability, AFP, Committee
Hansard, 11 May 2018, p. 45.
[81]
Mr Ramzi Jabbour, Deputy Commissioner, AFP, Committee Hansard, 11
May 2018, p. 45.
[82]
WA Police, Submission 31, p. 2.
[83]
Professor Dan Jerker B Svantesson, Submission 3, p. 8.
[84]
Professor Dan Jerker B Svantesson, Submission 3, p. 2.
[85]
WA Police, Submission 31, p. 2.
[86]
WA Police, Submission 31, p. 3.
[87]
WA Police, Submission 31, p. 3.
[88]
Mr Andrew Warnes, Assistant Secretary, Communications Security and
Intelligence Branch,AGD, Committee Hansard, 11 May 2018, p. 45.
[89]
CSRC, Submission 8, p. 9.
[90]
Dr John Coyne, Committee Hansard, 29 March 2018, p. 6. See also
Chapter 6 for further discussion of the challenges for law enforcement in
securing electronic evidence.
[91]
ACLEI, Submission 1, p. 1.
[92]
ACLEI, Submission 1, p. 2.
[93]
ACLEI, Submission 1, p. 2.
[94]
ACLEI, Submission 1, p. 2.
[95]
ACLEI, Submission 1, p. 2.
[96]
ACLEI, Submission 1, p. 2.
[97]
Dr John Coyne, Submission 4, p. 8.
[98]
Dr John Coyne, Submission 4, p. 8. 'Silk Road' was an online
marketplace operating in the dark web where buyers could browse the market
anonymously using cryptocurrency. It was successfully shut down by US
government agencies in 2013. More recently, the US Justice Department shut down
AlphaBay, a dark website ten times the size of Silk Road. See ASIC, Submission
11, p. 4.
[99]
WA Police, Submission 31, p. 6.
[100] WA Police, Submission 31,
p. 7.
Chapter 4 - Responding to the encryption challenge
[1]
Australian Securities and Investments Commission (ASIC), Submission
11, p. 6.
[2]
Australian Criminal Intelligence Commission (ACIC) and Australian
Institute of Criminology (AIC), Submission 29, p. 4.
[3]
ISACA, Submission 13, [p. 7].
[4]
Dr Monique Mann, Dr Adam Molnar, Dr Ian Warren and Dr Angela Daly, Australian
Privacy Foundation, Digital Rights Watch Australia, Electronic Frontiers
Australia and Future Wise, Submission 23, p. 11.
[5]
Dr Monique Mann et al, Submission 23, p. 12.
[6]
Department of Home Affairs (DHA), Attorney-General's Department (AGD)
and Australian Border Force (ABF), Submission 28, p. 17.
[7]
DHA, 'Five Country Ministerial 2018: official communiqué', Media
release, 30 August 2018, p. 3.
[8]
Five Country Ministerial/Quintet Meeting of Attorneys-General Australia
2018, 'Statement of principles on access to evidence and encryption', DHA, 30
August 2018, https://parlinfo.aph.
gov.au/parlInfo/search/display/display.w3p;query=Id%3A%22media%2Fpressrel%2F6345572%22
(accessed 21 January 2019).
[9]
DHA, 'Statement of Principles on Access to Evidence and Encryption', https://web.archive.org/
web/20180925154820/https://www.homeaffairs.gov.au/about/national-security/five-country-ministerial-2018/access-evidence-encryption
(accessed 22 January 2019).
[10]
DHA, 'Statement of Principles'.
[11]
Investigatory Powers Act 2016 (UK), http://www.legislation.gov.uk/ukpga/2016/25/contents; and Telecommunications (Interception Capability and Security)
Act 2013 (NZ), http://www.legislation.govt.nz/act/public/2013/0091/latest/DLM5177923.html
(all accessed 21 January 2019).
[12]
DHA, AGD and ABF, Submission 28, p. 17; see also Ms Esther George,
Lead Cybercrime Consultant, International Association of Prosecutors, Committee
Hansard, 29 March 2018, p. 46.
[13]
DHA, AGD and ABF, Submission 28, p. 17.
[14]
House of Representatives, Telecommunications and Other Legislation
Amendment (Assistance and Access) Bill 2018, Explanatory Memorandum, pp.
2−3, https://www.aph.gov.au/
Parliamentary_Business/Bills_Legislation/Bills_Search_Results/Result?bId=r6195
(accessed 12 December 2018).
[15]
Parliamentary Joint Committee on Intelligence and Security (PJCIS), Joint
statement by Chair and Deputy Chair, Media release, 22 November 2018, https://www.aph.gov.au/Parliamentary_
Business/Committees/Joint/Intelligence_and_Security/TelcoAmendmentBill2018/Media_Releases
(accessed 21 January 2019).
[16]
PJCIS, Advisory Report on the Telecommunications and Other Legislation
Amendment (Assistance and Access) Bill 2018, December 2018, pp. 1−2, https://www.aph.gov.au/
Parliamentary_Business/Committees/Joint/Intelligence_and_Security/TelcoAmendmentBill2018/Report_1
(accessed 13 December 2018).
[17]
PJCIS, Advisory Report, p. 2.
[18]
PJCIS, Advisory Report, p. 2.
[19]
PJCIS, Advisory Report, Recommendation 1, p. 3 and Recommendation
16, p. 8. The Independent National Security Legislation Monitor is required to
review its operation, effectiveness and implications after 18 months.
[20]
See Review of the Telecommunications and Other Legislation Amendment
(Assistance and Access) Act 2018, https://www.aph.gov.au/Parliamentary_Business/Committees/Joint/
Intelligence_and_Security/ReviewofTOLAAct (accessed 11 February 2019).
[21]
See, for example, P Smith, Y Redrup and A Tillett, '"As bad as
Huawei": Australian encryption bill slammed after passing House of Reps', Financial
Review, 6 December 2018, https://www.afr.com/technology/web/security/as-bad-as-huawei-australian-encryption-bill-slammed-after-passing-parliament-20181206-h18tk3;
A Bogle, '"Outlandish" encryption laws leave Australian tech industry
angry and confused', ABC News, 7 December 2018, https://www.abc.net.au/news/science/2018-12-07/encryption-bill-australian-technology-industry-fuming-mad/10589962
(all accessed 11 February 2019).
[22]
C Kruger, '"Negative for tech": Fitch slams encryption laws, Sydney
Morning Herald, 13 December 2018, https://www.smh.com.au/technology/negative-for-tech-sector-fitch-slams-australia-s-new-encryption-laws-20181213-p50m55.html
(accessed 20 December 2018).
[23] Inspector-General
of Intelligence and Security (IGIS), Submission 1.1, PJCIS, Review of
the Telecommunications and Other Legislation Amendment (Assistance and
Access) Act 2018, pp. 6−8.
The overarching purpose of the IGIS’s activities is to ensure that each
intelligence agency acts legally and with propriety, complies with ministerial
guidelines and directives, and respects human rights.
[24]
Mr Mike Burgess cited in A Probyn, 'Spy chief argues encryption laws
target terrorists, not everyday Australians, in "myth-busting"
missive', ABC News, 12 December 2018, https://www.abc.net.au/news/2018-12-12/encryption-laws-mike-burgess-australian-signals-directorate/10612570
(accessed 20 December 2018).
[25]
DHA, AGD, and ABF, Submission 28, p. 16.
[26]
See for example, Dr Vanessa Teague, Melbourne School of Engineering, The
University of Melbourne, Submission 2, [p. 3]; Dr John Coyne, Submission
4, p. 5; Pirate Party Australia, Submission 16, [pp. 6−7]; Dr Monique
Mann, Co-Chair, Surveillance Committee, Board of Directors, Australian Privacy
Foundation and Dr Adam Molnar, Vice-Chair, Australian Privacy Foundation, Committee
Hansard, 29 March 2018, p. 16.
[27]
Dr Monique Mann et al, Submission 23, p. 12.
[28]
Dr Monique Mann et al, Submission 23, p. 13.
[29]
Dr Monique Mann et al, Submission 23, p. 14.
[30]
Mr Nathan White, Senior Legislative Manager, Access Now, Committee
Hansard, 11 May 2018, p. 2.
[31]
Mr Nathan White, Senior Legislative Manager Access Now, Committee
Hansard, 11 May 2018, p. 2.
[32]
Dr John Coyne, Committee Hansard, 29 March 2018, p. 5.
[33]
Law Council of Australia, Submission 21, p. 11.
[34]
Law Council of Australia, Submission 21, p. 8.
[35]
Dr Vanessa Teague, Melbourne School of Engineering, The University of
Melbourne, Submission 2, [p. 2].
[36]
Dr Vanessa Teague, Melbourne School of Engineering, The University of
Melbourne, Submission 2, [p. 3].
[37]
Ms Lizzie O’Shea and Ms Elise Thomas, Submission 15, pp. 1−2.
[38]
Digital Industry Group Incorporated (DIGI), Submission 20, p. 6.
[39]
Law Council of Australia, Submission 21, p. 7.
[40]
DHA, AGD and ABF, Submission 28, p. 9.
[41]
DHA, AGD and ABF, Submission 28, p. 16.
[42]
DHA, AGD and ABF, Submission 28, p. 16.
[43]
Gov.UK, Consultation outcome: Investigatory Powers Act 2016,
available: https://www.gov.uk/government/consultations/investigatory-powers-act-2016
(accessed 19 March 2019).
Chapter 5 - Operational challenges and vulnerabilities
[1]
International Association of Prosecutors—Global
Prosecutors E-Crime Network (GPEN), Submission 19, p. 5. See Chapter 1
for further discussion of new and emerging ICTs and the implications for law
enforcement.
[2]
Department of Home Affairs (DHA), Attorney-General's Department (AGD)
and Australian Border Force (ABF), Submission 28, p. 9.
[3]
Dr John Coyne, Submission 4, p. 3.
[4]
Cyber Security Research Centre (CSRC), Submission 8, p. 10.
[5]
Western Australia Police Force (WA Police), Submission 31, p. 1.
[6]
WA Police, Submission 31, p. 1.
[7]
DHA, AGD and ABF, Submission 28, p. 9.
[8]
Australian Criminal Intelligence Commission (ACIC) and Australian
Institute of Criminology (AIC), Submission 29, p. 4.
[9]
ACIC and AIC, Submission 29, p. 4.
[10]
Detective Inspector Tim Thomas, Assistant Divisional Officer for
Technology Crime Services, WA Police, Committee Hansard, 29 March 2018,
p. 30.
[11]
Detective Inspector Tim Thomas, Assistant Divisional Officer for
Technology Crime Services, WA Police, Committee Hansard, 29 March 2018,
p. 30.
[12]
Mr Matthew Loeb, Chief Executive Officer, ISACA, Committee Hansard,
29 March 2018, p. 12.
[13]
Detective Inspector Thomas John Shillito (John) Manley, Officer in Charge
of the Victorian Joint Anti-Child Exploitation team, Victoria Police, Committee
Hansard, 11 May 2018, p. 33.
[14]
Detective Inspector Thomas John Shillito (John) Manley, Officer in Charge
of the Victorian Joint Anti-Child Exploitation team, Victoria Police, Committee
Hansard, 11 May 2018, p. 34.
[15]
Digital Industry Group Incorporated (DIGI), Submission 20, p. 4.
[16]
Dr Adam Molnar, Vice Chair, Surveillance Committee, Australian Privacy
Foundation, Committee Hansard, 29 March 2018, p. 19.
[17]
Mr Matthew Loeb, Chief Executive Officer, ISACA, Committee Hansard,
29 March 2018, p. 10.
[18]
Mr Alexandru Caciuloiu, Cybercrime Project Coordinator, Southeast Asia and
the Pacific, United Nations Office on Drugs and Crime Regional Office for
Southeast Asia and the Pacific, Committee Hansard, 11 May 2018, p. 39.
[19]
DHA, AGD and ABF, Submission 28, p. 6. Also see CSRC, Submission
8, p. 12.
[20]
Dr John Coyne, Committee Hansard, 29 March 2018, p. 2.
[21]
CSRC, Submission 8, pp. 11−12.
[22]
CSRC, Submission 8, pp. 11−12.
[23]
Mr David Irvine, Chair, CSRC, Committee Hansard, 29 March
2018, p. 23.
[24]
CSRC, Submission 8, p. 2.
[25]
CSRC, Submission 8, pp. 13−14.
[26]
Mr David Irvine, Chair, CSRC, Committee Hansard, 29 March 2018, p.
23.
[27]
WA Police, Submission 31, pp. 1, 4.
[28]
DIGI, Submission 20, p. 3.
[29]
National Crime Agency (NCA), NCA Specials, available: http://www.nationalcrimeagency.gov.uk/careers/specials
(accessed 21 March 2019).
[30]
NCA, NCA Specials: Frequently Asked Questions, 20 July 2017,
available: http://www.nationalcrimeagency.gov.uk/publications/559-nca-specials-faq/file
(accessed 21 March 2019).
[31]
NCA, NCA Specials: Frequently Asked Questions, 20 July 2017.
[32]
NCA, NCA Specials: Frequently Asked Questions, 20 July 2017.
[33]
Mr Matthew Loeb, Chief Executive Officer, ISACA, Committee Hansard,
29 March 2018, p. 14.
[34]
Mr Matthew Loeb, Chief Executive Officer, ISACA, Committee Hansard,
29 March 2018, p. 14.
[35]
Mr Andrew Colvin, Commissioner, Australian Federal Police (AFP),
Parliamentary Joint Committee on Law Enforcement (PJCLE), Australian Federal
Police annual report, Committee Hansard, 22 February 2019, p. 5.
[36]
Mr Neil Gaughan, Deputy Commissioner, Operations, AFP, PJCLE, Committee
Hansard, 22 February 2019, p. 6.
[37]
Mr Neil Gaughan, Deputy Commissioner, Operations, AFP, PJCLE, Committee
Hansard, 22 February 2019, p. 6.
[38]
CSRC, Submission 8, p. 12.
[39]
ACIC and AIC, Submission 29, p. 9.
[40]
DHA, AGD and ABF, Submission 28, p. 12.
[41]
WA Police, Submission 31, p. 4.
[42]
WA Police, Submission 31, p. 4.
[43]
Dr John Coyne, Committee Hansard, 29 March 2018, p. 2.
[44]
Dr Monique Mann, Dr Adam Molnar, Dr Ian Warren and Dr Angela Daly, Australian
Privacy Foundation, Digital Rights Watch Australia, Electronic Frontiers
Australia and Future Wise, Submission 23, p. 2.
[45]
CSRC, Submission 8, p. 9.
[46]
Mr Nathan White, Senior Legislative Manager, Access Now, Committee
Hansard, 11 May 2018, p. 6.
[47]
DIGI, Submission 20, p. 4.
[48]
Mr Guy Carlisle, Chief Information Officer, Northern Territory Police,
Fire and Emergency Services, Committee Hansard, 29 March 2018, p. 28.
[49]
WA Police, Submission 31, p. 3.
[50]
Dr John Coyne, Submission 4, p. 7.
[51]
Mr Matthew Loeb, Chief Executive Officer, ISACA, Committee Hansard,
29 March 2018, p. 9.
[52]
Ms Amie Stepanovich, United States Policy Manager and Global Policy
Counsel, Access Now, Committee Hansard, 11 May 2018, p. 5.
[53]
Dr John Coyne, Submission 4, p. 7.
[54]
Dr John Coyne, Submission 4, p. 7.
[55]
ACIC and AIC, Submission 29, p. 11.
[56]
ACIC and AIC, Submission 29, p. 10.
[57]
ACIC and AIC, Submission 29, p. 10.
[58]
ACIC and AIC, Submission 29, p. 13. Also see Chapter 6 for further
discussion of the National Criminal Investigation System.
[59]
GPEN, Submission 19, p. 3.
[60]
GPEN, Submission 19, p. 2.
[61]
GPEN, Submission 19, p. 3.
[62]
DHA, AGD and ABF, Submission 28, p. 14.
[63]
Dr John Coyne, Submission 4, p. 6.
[64]
Dr John Coyne, Submission 4, pp. 8−9.
[65]
Dr John Coyne, Submission 4, p. 5. See also Chapter 3 for
discussion of the new operational reality for law enforcement.
[66]
Dr John Coyne, Submission 4, p. 8.
[67]
'The digital universe of opportunities: rich data and the increasing value
of the Internet of Things', IDC, April 2014, https://www.emc.com/leadership/digital-universe/2014iview/executive-summary.htm
(accessed 18 February 2019).
[68]
Mr Jonathon Bamford, Assistant Commissioner, Information Commissioner's
Office, Uncorrected transcript of oral evidence given before the House of
Commons Home Affairs Committee, 1 May 2007, available: https://publications.parliament.uk/pa/cm200607/cmselect/cmhaff/uc508-i/uc50802.htm
(accessed 21 March 2019).
[69]
Data to Decisions Cooperative Research Centre (D2D CRC), Submission 7,
p. 2.
[70]
Ms Tania Churchill, Director, Enterprise Analytics, Australian Transaction
Reports and Analysis Centre (AUSTRAC), Committee Hansard, 11 May 2018,
p. 54.
[71]
CSRC, Submission 8, p. 10.
[72]
D2D CRC, Submission 7, pp. 4−8.
[73]
Confidential, Submission 33, p. 7–8.
[74]
Drs Monique Mann, Adam Molnar, Ian Warren and Angela Daly, Australian
Privacy Foundation, Digital Rights Watch Australia, Electronic Frontiers
Australia, and Future Wise, Submission 23, p. 18.
[75]
Dr Monique Mann et al, Submission 23, pp. 15−16.
[76]
Dr Adam Molnar, Vice-Chair, Australian Privacy Foundation, Committee
Hansard, 29 March 2018, p. 17.
[77]
Dr Monique Mann, Co-Chair, Surveillance Committee, Board of Directors,
Australian Privacy Foundation, Committee Hansard, 29 March 2018, p. 17.
[78]
Dr Monique Mann et al, Submission 23, pp. 9, 11.
[79]
Ms Tania Churchill, Director, Enterprise Analytics, AUSTRAC, Committee
Hansard, 11 May 2018, p. 55.
[80]
Dr Lyria Bennett Moses, Project Leader, Law and Policy Program, D2D CRC, Committee Hansard,
11 May 2018, p. 13.
[81]
Dr Lyria Bennett Moses, Project Leader, Law and Policy Program, D2D CRC, Committee Hansard,
11 May 2018, p. 13.
[82]
Council of Australian Governments, Special Meeting of the Council of
Australian Governments on Counter-Terrorism Communique, 5 October 2017, https://www.coag.gov.au/meeting-outcomes/special-meeting-council-australian-governments-counter-terrorism-communique
(accessed 12 December 2018). The agreement included the signing of an
Intergovernmental Agreement on Identity Matching Services.
[83]
Dr Monique Mann et al, Submission 23, pp. 16−17.
[84]
Dr Monique Mann et al, Submission 23, p. 15.
[85]
The existing National Automated Fingerprint Identification System remains
in use. Mr Michael Phelan, Chief Executive Officer, ACIC, Australian
Criminal Intelligence Commission annual report 2016−17, PJCLE, Committee Hansard,
29 November 2018, p. 4.
[86]
Law Council of Australia, Submission 21, pp. 12−13.
[87]
WA Police, Submission 31, p. 8.
[88]
WA Police, Submission 31, p. 8.
[89]
'The Internet of Things (IoT): An Overview', Internet Society, https://www.internetsociety.org/resources/doc/2015/iot-overview?gclid=EAIaIQobChMI9Zqf0siC4AIVFR4rCh3hPwVVEAAYAyAAEgL_gPD_BwE
(accessed 23 January 2019).
[90]
CSRC, Submission 8, p. 6; DHA, AGD and ABF, Submission 28,
p. 16.
[91]
South Eastern Centre Against Sexual Assault and Family Violence (South
Eastern CASA), Submission 18, p. 3.
[92]
ACIC and AIC, Submission 29, p. 7.
[93]
South Eastern CASA, Submission 18, p. 2.
[94]
South Eastern CASA, Submission 18, p. 2.
[95]
DIGI, Submission 20, p. 2.
[96]
DIGI, Submission 20, p. 2.
[97]
South Eastern CASA, Submission 18, p. 4.
[98]
Ms Lizzie O'Shea and Ms Elise Thomas, Submission 15, p. 4.
[99]
Detective Inspector John Manley, Officer in Charge of the Victorian Joint
Anti-Child Exploitation Team, Victoria Police, Committee Hansard, 11 May
2018, p. 35.
[100] Mr Matthew Loeb, Chief
Executive Officer, ISACA, Committee Hansard, 29 March 2018, p. 12.
[101] Law Council of Australia, Submission
21, pp. 12−13.
Chapter 6 - Strategic challenges and opportunities
[1]
Ms Esther George, Lead Cybercrime Consultant, International Association
of Prosecutors (IAP), Committee Hansard, 29 March 2018, p. 40.
[2]
Mr Matthew Loeb, Chief Executive Officer, ISACA, Committee Hansard,
29 March 2018, p. 10.
[3]
European Union Agency for Network and Information Security (ENISA),
'ENISA: 15 years of building cybersecurity bridges together', Press release,
20 March 2019, available: https://www.enisa.europa.eu/news/enisa-news/enisa-15-years-of-building-cybersecurity-bridges-together
(accessed 26 March 2019).
[4]
ENISA, About ENISA, available: https://www.enisa.europa.eu/about-enisa
(access 26 March 2019).
[5]
Mr Matthew Loeb, Chief Executive Officer, ISACA, Committee Hansard,
29 March 2018, p. 10.
[6]
Mr Matthew Loeb, Chief Executive Officer, ISACA, Committee Hansard,
29 March 2018, p. 9.
[7]
Mr Matthew Loeb, Chief Executive Officer, ISACA, Committee Hansard,
29 March 2018, p.10.
[8]
Mr Matthew Loeb, Chief Executive Officer, ISACA, Committee Hansard,
29 March 2018, p. 9.
[9]
Mr Matthew Loeb, Chief Executive Officer, ISACA, Committee Hansard,
29 March 2018, p. 9.
[10]
Australian Government, About the ACORN, available: https://www.acorn.gov.au/about-acorn
(accessed 22 March 2019).
[11]
Australian Government, About the ACORN, available: https://www.acorn.gov.au/about-acorn
(accessed 22 March 2019).
[12]
Department of Home Affair (DHA), 'Cybercrime', https://archive.homeaffairs.gov.au/about/crime/cybercrime
(accessed 5 December 2018).
[13]
Mr Michael Phelan, APM, Chief Executive Officer, Australian Criminal
Intelligence Commission (ACIC) and Director, Australian Institute of
Criminology, Committee Hansard, 11 May 2018, p. 44.
[14]
Detective Inspector Tim Thomas, Assistant Divisional Officer for
Technology Crime Services, Western Australian Police (WA Police), Committee
Hansard, 29 March 2018, pp. 29, 32.
[15]
A Morgan, C Dowling, R Brown et al, Evaluation of the Australian Cybercrime
Online Reporting Network, Australian Institute of Criminology, October
2016, pp. 9−14, https://aic.gov.au/sites/default/files/2018/08/acorn_evaluation_report_.pdf
(accessed 6 December 2018).
[16]
'National Criminal Intelligence System', ACIC.
[17]
Mr Michael Phelan, ACIC, PJCLE, ACIC annual report 2016−17, Committee
Hansard, 29 November 2018, p. 3. Tranche 1 is focused on connecting
the states and territories with real-time information enabling the ACIC to do
the analytics.
[18]
ACIC and Australian Institute of Criminology (AIC), Submission 29,
p. 13.
[19]
ACIC and AIC, Submission 29, p. 10.
[20]
Mr Michael Phelan, Chief Executive Officer, ACIC, Committee Hansard,
29 November 2018, p. 3.
[21]
Dr Lyria Bennett Moses, Project Leader, Law and Policy Program, Data to
Decisions Cooperative Research Centre (D2D CRC), Committee Hansard, 11
May 2018, p. 9.
[22]
D2D CRC, Submission 7, p. 4.
[23]
Data to Decisions Cooperative Research Centre (D2D CRC), Submission 7,
p. 3. The issue of big data is discussed further in Chapter 6.
[24]
Dr Sanjay Mazumdar, Chief Executive Officer, D2D CRC, Committee Hansard,
11 May 2018, p. 8.
[25]
DHA, Attorney-General's Department (AGD) and Australian Border Force (ABF),
Submission 28, p. 6.
[26]
WA Police, Submission 31, pp. 1−2.
[27]
Victoria Police, Submission 35, [pp. 1−2].
[28]
Dr John Coyne, Committee Hansard, 29 March 2018, p. 1.
[29]
Dr John Coyne, Committee Hansard, 29 March 2018, p. 1.
[30]
Dr John Coyne, Submission 4, p. 8.
[31]
DHA, AGD and ABF, Submission 28, p. 9.
[32]
DHA, AGD and ABF, Submission 28, p. 11.
[33]
DHA, AGD and ABF, Submission 28, p. 11.
[34]
Mr Andrew Warnes, Assistant Secretary, Communications Security and
Intelligence Branch, AGD, Committee Hansard, 11 May 2018, pp. 48–49.
[35]
Mr Michael Phelan, Chief Executive Officer, ACIC, Committee Hansard,
11 May 2018, p. 49.
[36]
Senate Legal and Constitutional Affairs References Committee, Comprehensive
revision of the Telecommunications (Interception and Access) Act 1979, March
2015, p. 11.
[37]
Parliamentary Joint Committee on Intelligence and Security, Report of
the Inquiry into Potential Reforms of Australia's National Security Legislation,
May 2013, p. xxv.
[38]
WA Police, Submission 31, p. 8.
[39]
Commonwealth of Australia, Department of the Prime Minister and Cabinet, Australia's
Cyber Security Strategy, 2016, pp. 2−3.
See Chapter 3 for further details about CERT.
[40]
WA Police, Submission 31, p. 8.
[41]
Mr Matthew Loeb, Chief Executive Officer, ISACA, Committee Hansard,
29 March 2018, p. 10.
[42]
Mr Matthew Loeb, Chief Executive Officer, ISACA, Committee Hansard,
29 March 2018, p. 10.
[43]
Mr Matthew Loeb, Chief Executive Officer, ISACA, Committee Hansard,
29 March 2018, p. 11.
[44]
Ms Esther George, Lead Cybercrime Consultant, IAP, Committee Hansard,
29 March 2018, p. 45.
[45]
Mr Michael Phelan, Chief Executive Officer, ACIC, Committee Hansard,
11 May 2018, p. 52.
Appendix 4 - Government agencies with existing cybercrime and cyber security responsibilities[1]
[1]
Cyber Security Research Centre, Submission 8, pp. 19−20.