House of Representatives Committees

Chapter 5 Domestic and International Coordination

Introduction

5.1                   This chapter gives a broad outline of the national framework for coordinating cyber crime policy and existing mechanisms for international engagement.

5.2                   The chapter concludes that existing coordination mechanisms are heavily weighted toward national security and critical infrastructure. A more centralised and genuinely national approach is required to ensure that strategic responses to cyber crime that impact on the broader Australian society are as effective as possible.

Cyber Security Strategy

5.1                   Since 2001 the Australian Government’s approach to e-security has been governed by the E Security National Agenda. The policy was reviewed in 2004 and 2006. In 2008 a further review was initiated in response to the ‘increased level of cyber threat’ and rapid growth in the use of information and communication technology, including the roll out of the National Broadband Network.[1] On 23 November 2009 the Cyber Security Strategy was launched bringing together a number of existing e-security activities under the umbrella of one policy and introducing some new initiatives.[2]

5.2                   The Cyber Security Strategy emphasises the protection of national security, government computer systems and critical infrastructure. There will be a benefit to the public through the increased capacity to protect government computer systems and institutions, such as banks, and public utilities on which the whole community rely. However, the new computer response team, CERT Australia, does not receive complaints about cyber crime or providing technical assistance to the general public or small and medium sized businesses.

5.3                   In practice, the Cyber Security Strategy retains the previous emphasis on community education so that end users can better protect themselves against online crime. The Committee was told that community education alone is no longer a sufficient response to sophisticated cyber crime activities that impact the whole community. It was argued that there needs to be more importance attached to the needs of consumers and business generally and more strategic approaches to the inter-connected nature of cyber space.[3]

Domestic Policy Coordination

5.4                   Under the current arrangements, the Attorney-General’s Department (AGD) has primary responsibility for e-security policy across the Australian Government and is the lead agency for identity security and critical infrastructure.[4] The Committee was told that the E-Security Policy and Coordination Committee (ESPaC), a bi monthly interdepartmental committee chaired by AGD, provides a whole of government perspective on e-security policy and coordination.[5]

5.5                   Following the E Security Review the Committee has been renamed the Cyber Security Policy and Coordination Committee and its membership has been expanded. Membership is now comprised of the:

n  Australian Federal Police (High Tech Crime Operations);

n  Australian Government Information Management Office;

n  Australian Security Intelligence Organisation;

n  Defence Signals Directorate;

n  Department of Broadband, Communications and the Digital Economy (DBCDE);

n  Department of Defence; and

n  Department of the Prime Minister and Cabinet (PM&C).

5.6                   The Cyber Security Policy and Coordination Committee:

n  provides whole of government strategic leadership on cyber security;

n  determines priorities for the Australian Government;

n  coordinates the response to cyber security events; and

n  coordinates Australian government cyber security policy internationally.[6]

5.7                   The Committee formally reports on the progress of its annual work plan to the Deputy National Security Advisor on an annual basis. The Committee also coordinates the ‘provision of threat and security environment assessments to the National Security Committee of Cabinet, through the Secretaries Committee on National Security as required’.[7]

National Coordination of Cyber Space Policy

5.8                   The evidence demonstrated that Internet activity involves a range of policy areas, including criminal law, privacy, consumer protection, telecommunications, broadcasting, and corporation law. Consequently, there is a plethora of Commonwealth, State and Territory departments and agencies with responsibility for some aspect of the wider problem of cyber crime.

5.9                   In relation to policy, AGD has responsibility for criminal law and law enforcement policy but it does not have policy responsibility for cyber safety, privacy or consumer protection.[8] These areas fall variously to DBCDE, PM&C, and Treasury. State and Territory Governments are also responsible for a range of legal policy in criminal law, privacy, education, and consumer protection that impact on cyber crime.

5.10               Federal, State and Territory police forces enforce the laws against cyber crime. In addition, a range of civil regulatory bodies have an enforcement role in relation to different aspects of cyber crime activity:

n  Australian Communications and Media Authority (ACMA) administers the Australian Internet Security Initiative (botnet detection) and administers the Spam Act 2003 (Cth);

n  the Australian Competition and Consumer Commission (ACCC) hosts the ScamWatch website, and takes thousands of complaints of online fraud and scams, which it deals with in the context of misleading and deceptive trade under the Trade Practices Act 1974 (Cth);

n  State and Territory Fair Trade offices deal with these matters under State and Territory law;

n  the Federal Privacy Commissioner administers the Privacy Act 1988 (Cth), which regulates the collection and disclosure of personal information;

n  complementary privacy laws are administered by State and Territory Commissioners; and

n  corporations are regulated by the Australian Securities and Investment Commission (ASIC) under the Australian Securities and Investments Commissions Act 2001 (Cth) and the Corporations Act 200 (Cth).

5.11               Although difficult to avoid, this highly decentralised approach was regarded by some as an impediment to a nationally coordinated and strategic response to tackling the problem of cyber crime. For example,  Mr Alastair MacGibbon, Director Internet Safety Institute said:

… there no single institution in Australia (or for that matter anywhere else in the world) which has a whole-of-internet national view of eSecurity victimisation.[9]

5.12               The Cyber Space Law and Policy Centre (CLPC) said that as a consequence of this fragmentation legal policy and regulatory measures are ‘convoluted’ and unable to target the interlinked nature of cyber crime and its related activities.[10] The witness doubted whether Australian law could effectively deal with the commission of cyber crimes facilitated through a mix of these activities because ‘each one is categorised and dealt with by separate agencies (police, ACMA, and the ACCC) making investigation difficult or impossible’.[11]

5.13               Microsoft advocated that Australia consider a more expansive strategy and create a ‘cyber Tzar’ position located in PM & C and a strategy that engages ‘all elements of national power’:

When one recognises the breadth of the challenge and the need for a massively decentralised but coordinated response among the federal, state and territory agencies, we believe that the Committee should consider whether or not Australia’s national cyber security strategy and its implementation should be led by a single coordinating authority at the highest Executive level, like the Department of Prime Minister and Cabinet or through an appointed “cyber security czar”. As the Committee would be aware, the US is moving to a similar model, where their national cyber security strategy will be led and coordinated by the White House.[12]

5.14               Mr James Shaw, Director, Government Relations, Telstra Corporation Ltd., also advocated a centralised point within government to manage a more coordinated approach:

At the moment it is dealt with in a variety of areas of government. In their best endeavours they collaborate as best they can. A lot of that, though, is ad doc rather than done in a strategic sense from one point in government with an overall policy strategy agenda.[13]

5.15               To expand the reach of Australia’s e-security strategy, Telstra suggested the creation of a National Cyber Crime Advisory Committee ‘focussing on strategic leadership and information sharing between public and private sectors, federal, state and local entities’.[14] Such a Committee would comprise independent experts from a range of cyber space related areas, including consumers, to provide best advice on a range of cyber crime issues.[15]

5.16               The Australian Communications Consumer Action Network (ACCAN), also highlighted the need for a ‘more coordinated and rigorous approach’ to protecting online consumers.[16] It was suggested that Australia should adopt a similar approach to that of the UK and create an Office of Online Security, which can address the ‘multitude of economic and social implications of online security issues’.[17] The UK Office of Cyber Security operates within the Cabinet Office to provide strategic oversight.

5.17               ACCAN suggested that an Australian Office of Online Security should have responsibility for high level policy on cyber security and its impact on consumers, and report at ‘Cabinet level on improvements, research and further challenges in cyber security.’[18] The Office could, for example, set benchmarks for preinstalled security features for the sale of computers and work with DBCDE to develop a National Strategy for E-Security Awareness.

5.18               Mr Graham Ingram, Director, AusCERT, advocated a ‘cyber space’ perspective that integrates the relevant government agencies and clearly identifies the role and responsibilities of ISPs, Domain Name Registrars, and IT companies. He proposed that that these private stakeholders should all be part of a nationally coordinated effort to reduce e-security risks.[19]  Similarly, Mr Alastair MacGibbon, Director, Internet Safety Institute, also suggested that private companies, such as ISPs and Domain Name Registrars, have some responsibilities in this area.[20]

5.19               The whole Internet community needs to be brought together:

We need to have a national response, the same way as if we have a response to a pandemic. We need everyone to know what they are doing and having it coordinated. We do not have that strategic approach to this problem currently.[21]

5.20               Sophos also advocated a more holistic national approach that involves IT vendors, and ISPs in a concerted effort to deal with the problem of botnets:

With suitable Federal legislation, with mandated remediation or suspension, with national education initiatives, and with appropriate resources within government and ISPs, it would be possible to place additional pressure on these hijacked computers to be cleaned up. If successful, this would reduce the number of Australian-based bots, benefiting internet users not just in Australia, but all over the world.[22]

5.21               The role and responsibilities of ISPs and Domain Name Registrars and Resellers is discussed in Chapter 7.

Committee View

5.22               The Australian community’s increasing reliance on ICT and the Internet combined with the complexity of online crime poses a significant challenge to policy makers, law enforcement and regulatory authorities. As discussed in Chapter 2, the interconnectedness of cyber space means that both the legitimate and illegitimate use of these technologies crosses inter-state and international boundaries and blurs the distinctions between civil and criminal matters.

5.23               This has implications for the development of a nationally coordinated and integrated policy on cyber security, strategic approaches to legal regulation, and the development of systems that maximise expertise and resources. The Committee commends the efforts of regulators and agencies tackling the problems of malicious Internet use but notes that the system remains inherently complex and fragmented.

5.24               The current Cyber Security Strategy places significant emphasis on national security and the protection of critical infrastructure. These are important national objectives. However, the Committee is concerned that education and awareness raising is no longer sufficient on its own as a national strategic response to the problem of cyber crime that impacts on the wider Australian community.

5.25               The breadth and complexity of the problem justifies a more national and centrally coordinated strategy that takes a more comprehensive and integrated cyber space perspective.

 

Recommendation 3

That the Australian Government establish an Office of Online Security headed by a Cyber Security Coordinator with expertise in cyber crime and e-security located in the Department of Prime Minster and Cabinet, with responsibility for whole of Government coordination. The Office is to take a national perspective and work with State and Territory governments, as well as federal regulators, departments, industry and consumers.

That the Australian Government establish a National Cyber Crime Advisory Committee with representation from both the public and private sector to provide expert advice to Government.

International Engagement

5.26               The DBCDE submitted that:

Given the borderless nature of the internet, the isolated efforts of individual countries are not enough to effectively address global e- security challenges. Australia is actively working bilaterally and in key international forums to improve the international e-security environment. The main objective of this work is to assist countries that may be sources of e-security threats to improve their domestic response and to set in place international cooperative arrangements to address e-security threats.[23]

5.27               Similarly, the AGD outlined the importance of international engagement to promote coordinated international policy development, information sharing on cyber crime trends and response preparedness.[24]

5.28               The Departments identified a significant number of international fora in which Australia participates in and, in some cases, takes a leading role:

n  International Watch and Warning Network (IWWN) is an international forum for international cooperation and coordination on cyber information sharing and incident response. It is comprised of government cyber security policy makers, managers of computer security incident response teams with national responsibility and law enforcement representatives with responsibility for cyber crime matters.

n  Asia-Pacific Economic Cooperation Telecommunications and Information Working Group (APEC TEL) aims to improve telecommunications and information infrastructure in the Asia-Pacific region by developing and implementing appropriate telecommunications and information policies.

n  The DBCDE submitted that Australia is a key driver of e-security work in the APEC group and has led a number of projects including:

n  development of awareness raising materials for small business and consumers on wireless security and Voice Over Internet Protocol (VoIP) security;

n  a joint project with the United States within APEC TEL on e-security awareness raising which aims to develop a coordinated approach in the region;

n  participating actively in projects focused on ICT products and standards and hand-held mobile device security; and

n  joint projects between APEC TEL and the OECD on e-security issues. The two groups have developed an analytical report on malware. These projects ensure common policy approaches are developed over a wider number of countries which leads to better outcomes for consumers.

n  Meridian process brings together senior government officials from around the world who are policy makers on issues of critical information infrastructure protection (CIIP).

n  International Telecommunication Union (ITU) is the leading United Nations agency for information and communication technologies and is currently examining a range of e-security issues under its Global Cybersecurity Agenda. The ITU’s powers can bind member countries to take specific courses of action.

n  The DBCDE participated in the regional workshop on Frameworks for cybersecurity and critical information infrastructure protection in August 2007 in Vietnam. This representation has allowed Australia to play a part in the development of policy documents on these issues for developing countries.

n  The DBCDE held an ITU workshop on e-security and critical infrastructure protection in Brisbane in July 2008. This provided Australia with an opportunity to bring together Pacific Island countries to share e-security experiences and resources with these countries.

n  The ITU, with assistance from the Department, commissioned a scoping study on the feasibility of establishing a Computer Emergency Response Team for the Pacific Region (PacCERT). The first part of the study identified a definite need to develop a PacCERT, and found that a growing capability to deliver this already exists within the region. The second part of the study, relating to the implementation of a PacCERT, was to be finalised by the ITU in the second half of 2009. This work will include a detailed project plan covering staffing, location, funding, governance and the required linkages with other relevant parties, including domestic law enforcement authorities.

n  OECD Working Party for Information Security and Privacy (WPISP) provides a platform for pursuing international aspects of Australian communications policy relating to cyber security, critical infrastructure protection, authentication, privacy, malware and spam.

n  Australia currently chairs this Working Party and has been an active contributor in the development of common policy approaches to identity management, malware, critical infrastructure protection, cross border cooperation and privacy.

n  Australia was the primary author of the OECD’s Spam Toolkit which provided a multi-pronged strategy to deal with spam. This has improved international cooperation and information sharing on the issue of spam.

n  The Working Party was also the vehicle for launching the joint APEC-TEL/OECD work on malware. Current work includes consideration of:

n  identity management;

n  malware;

n  sensor-based environments;

n  privacy in light of technology, and globalisation; and  

n  APEC–OECD work on protection of children online.

n  Future work items may include work on generic best practice guidelines for ISPs to provide assistance to their customers on e-security matters. This work could build and potentially expand on work being done on the proposed Australian ISP E-Security Code of Practice.

n  International Multilateral Partnership against Cyber Threats (IMPACT) is a public-private initiative against cyber-terrorism led by Malaysia. It is the first global public-private initiative against cyber-terrorism and brings together governments, industry leaders and e-security experts.

n  orum of Incident Response and Security Teams (FIRST) conference brings together a variety of computer security incident response teams from government, commercial, and educational organisations. It aims to foster cooperation and coordination in incident prevention to stimulate rapid reaction to incidents, and to promote information sharing among members and the community at large. There is also an associated meeting of national computer emergency response teams (CERTs) known as SECOND that provides a mechanism for cooperation and collaboration to solve many of the issues that national CERTs share in common.[25]

Committee View

5.29               The problem of cyber crime is by its nature an international one and the Committee believes that Australia should maintain a high level of engagement in relevant international fora. However, it is important that resources should not be excessively diverted to these efforts at the expense of developing and implementing concrete measures to assist ordinary Australian consumers and businesses at home.


Law Enforcement Coordination

5.30               The following sections focus on the reporting of cyber crime to law enforcement authorities and consumer protection regulators. In particular, it discusses how to improve the reporting and investigation of cyber crime that impacts on end users and small and medium sized businesses. The coordination between Australian law enforcement authorities for investigation of cyber crime and training in the investigation of high tech crime are discussed. Finally, the issue of public-private intelligence sharing across a wider range of cyber crime types is canvassed.

Cyber Crime Reporting and Assistance

5.31               A key issue raised in evidence was the difficulty law enforcement agencies face in addressing complaints about cyber crime from end users. It was said that, in practice, ‘online consumers and to a lesser degree businesses, have been left to fend for themselves online’.[26] From a policing point of view, the problem of cyber crime was described as presenting ‘unique challenge for governments, particularly law enforcement and crime prevention agencies’.[27] There are several factors that need to be taken into account.

5.32               First, cyber crime is invariably cross jurisdictional, with victims and perpetrators, and sometimes the evidence, all in different jurisdictions. The NT Government said that crimes are ‘generally operated by overseas crime groups harvesting bank account details’ and transfer funds via ‘mules given instructions to send it overseas via Western Union’.[28] This makes close coordination between police forces within Australia and internationally essential.

5.33               Second, as noted above, the nature of cyber crime is highly complex and generally involves a series of interconnected conduct. The combination of activities (spam, malware, adware, spyware, phishing, fake and infected websites, email scams etc) are used together to steal financial credentials and personal identifying information, recruit money mules and ultimately to defraud, trick or steal money on an industrialised scale.[29]

5.34               The combination of these activities frequently engages both civil and criminal legal regimes and involves multiple agencies domestically and internationally.[30] The ACCC, for example, may receive a complaint about fraudulent conduct that also involves the proliferation of malware via spam emails in a phishing attack.[31] In practice, reporting of cyber crime or improper Internet use, if it occurs at all, is distributed across a variety of Commonwealth, State and Territory agencies and private institutions.

5.35               Third, cyber crime activities are generally organised on a large scale but individual incidents are frequently of a small value or have no immediately obvious destructive impact. Consequently, many crimes go undetected providing ‘high rewards’ for the criminal while attracting ‘little attention from police and regulators’.[32] The under-reporting of computer offences where data is compromised through the use of ICT and later used for theft, fraud or other offences is also problematic.[33]

5.36               Additionally, small value crimes often fall below the thresholds applied to trigger an investigation. The CLPC said:

Investigations and prosecution of many cyber crimes, in particular fraud, is often done on a balance of expenditure and impact. Most Australian states specify a minimum loss threshold, below which an investigation cannot be launched (e.g. $35,000).[34]

5.37               It is possible to commit:

… credit card fraud of $5 million dollars without attracting investigative attention providing that the amounts stolen per jurisdiction operate below whatever the budget threshold existing in the jurisdiction. Steal $10 from 100 people in NSW another $10 from 100 people in Victoria, another $10 from 1000 people in France, and so forth.[35]

5.38               Measuring the scale of identity crime is also ‘hampered by inadequate reporting practices’ because a larger proportion of crimes are reported to financial institutions.[36] This, in turn, presents difficulties for police and for policy makers. Dr Russell Smith agreed that there are ‘probably too many agencies involved in handling these … issues’ and the problem is exacerbated where people report these matters to multiple agencies and institutions:

They will go to their banks, card issuers, consumer affairs agencies, state and territory police and the Federal Police, and also places like ASIC and the ACCC. So there is a great need for coordination of information.[37]

5.39               Finally, the Committee was also told there is a tendency for Internet economic crimes to be given a ‘lower priority and resourcing by police than offline crimes of a similar magnitude’.[38] The ability of police forces, especially at the local level, to accept and respond to the plethora of online criminal activity is limited. The issue is further complicated by the mix of civil and criminal activity involved.

5.40               The result is a lack of capacity in the law enforcement system to aggregate those types of Internet crime that involve ‘small impact victimisation distributed across numerous jurisdictions’.[39] This stops law enforcement authorities from ‘seeing a true picture’ of the volume and scope of the cyber crime problem.[40] In turn, it allows criminal networks to benefit from aggregating the financial reward of dispersed activities, which may have no immediately obvious destructive effect.

5.41               The Committee was told the reason for setting up the first Australian High Tech Crime Centre (AHTCC) in 2003 was to overcome the fragmentation and develop a more coordinated approach. The AHTCC was an attempt by ‘Australian law enforcement agencies … to implement a collaborative approach to preventing and investigating technology enabled crime …’[41]

5.42               The purpose of the AHTCC was to coordinate:

… the information that is coming in so that all of those hundreds of small cases involving small amounts of money would go to one place, and then you would be able to see patterns emerging and put police resources into it.[42]

5.43               It was governed by a national board with high level representation from each of the State and Territory police forces.[43] The website provided information about a range of Internet crime types, and a system of pre-formatted crime reports for malware intrusions and DDOS attacks.[44]

5.44               One of the achievements of the AHTCC was the creation of the Joint Banking and Finance Sector Investigations Team (JBFSIT), to work collaboratively with the finance sector. The JBFSIT, which still exists, takes action against phishing sites targeting Australia financial institutions, mule recruitment sites and malware download sites.

5.45               In November 2007, the Ministerial Council for Police and Emergency Management endorsed the AHTCC becoming a business unit of the AFP.[45] The South Australian Police explained that:

Most State based law enforcement agencies provided staff and some funding to the AHTCC until it was disbanded in 2007. … Conflicting investigational priorities and an emphasis of addressing Commonwealth priorities to the detriment of State based investigations contributed to the eventual disbandment of the AHTCC in 2007.[46]

High Tech Crime Operations Centre

5.46               The new High Tech Crime Operations Centre (HTCOC) was established in March 2008 as a portfolio within the AFP. The Committee was told that a single portfolio now exists that consolidates all of the AFP ‘high-tech investigations arm and high-tech operations support resources’.[47] The role of the HTCOC is to:

n  provide a national coordinated approach to combating serious, complex and multi-jurisdictional technology enabled crimes, especially those beyond the capability of single jurisdictions;

n  ssist in improving the capacity of all jurisdictions to deal with technology enabled crime; and

n  support efforts to protect the National Information Infrastructure (NII).

5.47               The AFP stressed the importance of collaboration with the private sector, and with international partners via its network of AFP liaison officers. The JBFSIT continues to operate in Sydney and, in 2008, expanded to Melbourne. An example of this collaboration is with RSA, the Security Division of EMC. RSA submitted that the RSA Anti-Fraud Command Centre has shut down more than 150,000 phishing attacks and reduced the average shutdown time of attacks from 115 hours to five hours. The submitter told the Committee that:

At the request of Australia’s banks for the better good of consumers, RSA is working closely with the High Tech Crime Centre to shut down criminal activity such as phishing attacks.[48]

5.48               The AFP told the Committee that:

Collaboration with the financial sector is focused on prevention strategies to mitigate the impact of on-line consumers from phishing and malicious software. The analysis of data contained within the portal enables law enforcement to identify those responsible for online fraud activities.[49]

5.49               However, the offenders are ‘usually based offshore and collaboration with international partner agencies via the AFP International Network is fundamental to successful investigations and subsequent prosecution outcomes’.[50]

5.50               The effectiveness of these strategies is difficult to measures in terms of prosecutions alone, either in Australia or internationally. In one example, the AFP were successful when ‘online covert investigators identified a person attempting to sell a database online belonging to an Australian Domain Registrar’:

The database contained the compromised details of 70,000 Australian online consumers and 12,000 credit cards with an estimated financial exposure of $4.26 million.[51]

5.51               However, the AFP does not keep statistics on cyber crime reports or prosecutions that involve technology enabled crime. The Committee invited the Commonwealth Director of Public Prosecutions to make a submission to the inquiry, but none was forthcoming. The AGD provided basic statistics that show there has been an average of eight prosecutions annually over the past five years for computer offences under Part 10.7 of the Commonwealth Criminal Code. The majority of the forty-one recorded convictions over the past five years have resulted in fines and bonds, suggesting that these matters fall toward the less serious end of the scale. Five cases have involved imprisonment, and four cases attracted a suspended sentence.[52]

5.52               The Committee also noted CLPC’s criticism that Australia’s law enforcement strategy puts little emphasis on prosecuting botherders or addressing botnets:

To date there have been no public prosecutions in Australia of botnet herders. In fact, there is a paucity of prosecutions on the international front as well. Those botnet herders who have been prosecuted tend to come from the lower end of the cybercrime chain, and do not represent botnets run by organised crime groups.[53]

5.53               The CLPC advocated a more proactive approach that targets the dismantling of botnets, which provide the technical infrastructure to launch most of the cyber crime activities. As it was pointed out in Chapter 2, most botnets are self-replicating and self-sustaining and so there is also need for a cleanup process to prevent other criminals from taking over the botnet. The issue of remediation generally is discussed in Chapter 7.

Cyber Crime Reporting

5.54               The HTCOC is not a national focal point for the reporting of cyber crime and, in general, does not take a lead role in coordinating cyber crime investigations. A cyber crime could be reported to the AFP through the local Operations Monitoring Centre or AFP Headquarters. However, the activity must be sufficiently serious or reflect a Commonwealth priority to warrant AFP involvement.[54]

5.55               The AFP said that:

Public reporting is not standardised and public perceptions would be enhanced were a simple uniform system to be introduced. Thus far, public reporting of e-security threats has been facilitated through State and Territory Police, the AFP, and AusCERT. Many of these reports are lodged online via each agency’s respective website. However, cases reported are often low level incidents, and not usually critical enough to warrant AFP intervention.[55]

5.56               An incident that is small value and/or impacts only on one individual (or one company) will rank as a low impact crime and is likely to be referred to State or Territory police.[56] Consequently, the AFP does not have a dedicated facility for online reporting of cyber crime or a special hotline reporting number (except in relation to online child sex exploitation) for the general public.[57] The AFP website directs the public (including businesses) to local State or Territory police to report computer offences.[58] However, this is no guarantee that a complaint will be accepted or investigated, as the victim will be usually be asked to report it to the police force of the State where the perpetrator resides or may be referred to another agency, such as the ACCC.[59]

5.57               The Committee was told there is no easy or well known way for someone to report a cyber crime ‘whether it is to do with domain names or whatever’:[60]

People know how to report a normal sort of crime. … People who are victims of some sort of cybercrime do not know how or where to report it. If they do front up to their local police station or ring – presumably, it will not be 000 – some authority who they think should be able to take an investigation to the next step, in many cases they have no idea how to handle it either.[61]

5.58               Mr Paul Brooks, Director, Internet Society of Australia, also observed that cyber crime reporting between the hours of nine to five is inadequate and reporting methods need to be improved.[62] Mr David Ready, a private citizen, expressed his frustration that he was unable to report a phishing site hosted in Australia to the AFP and the Domain Name Registrar one Friday evening in 2006.[63] As Mr Ready pointed out, criminals do not work normal office hours, and, continuation of a fake currency website over the weekend exposed people worldwide to potential victimisation.[64]

5.59               Mr Paul Brooks also stressed that a reporting system must take account of those cases where, for example, an ISP account has been stolen and the user no longer has email. In these cases, complete reliance on an online reporting system would be no improvement.[65]

Recent Innovations in Cyber Crime Reporting

5.60               There have been some innovations with reporting online crime at the State level in recent years. The Queensland Police Fraud and Corporate Crime Group (FCCG) have worked on the problem of ‘Nigerian Fraud’ through operations Echo Track and Hotel Fortress. An important aspect of this work is the online reporting portal ‘for direct reference to the Nigerian Economic Financial Crime Commission and the Ghana Police’.[66] The Committee heard that these operations have so far led to in excess of ten arrests, and one prosecution, in Nigeria.[67]

5.61               The second example, also from Queensland, is the work of the FCCG in conjunction with eBay to establish the ‘eBay project’. The eBay project is a ‘national web based reporting system’ that enables members of the public to report online auction fraud via an ‘online reporting function, which includes pre-formatted statements’.[68] Initially the reporting system was only available to eBay users, but has now been extended to all online auction sites.  The system collects the essential facts and enables the project to identify potential crimes, making distinctions between civil and criminal matters, and referring offences to the relevant police agency. The project also provides police agencies with a single point of aggregated data. [69]

5.62               The Queensland Government implemented the project to relieve the burden on front line local police and to provide a more intelligence based approach to the problem:

Since the commencement of the eBay project in mid May 2007 there has been a steady acceleration in the number of on-line reports made. As a result the project has served as an invaluable intelligence gathering tool assisting police to identify serial offenders across jurisdictions. In Queensland alone, 788 complaints have been logged to date via this system. It is believed the e-Bay project will allow for more timely investigation and prosecutions by law enforcement agencies thereby limiting the time available for serious offenders to continue committing offences.[70]

Reporting to Consumer Protection Agencies

5.63               There have also been some developments in the field of consumer protection to facilitate cyber crime reporting. The website ScamWatch is hosted by the ACCC and functions as a point of access to the work of the Australasian Consumer Fraud Taskforce.[71]

5.64               ScamWatch is the national platform for disseminating information to the public on how to ‘recognise, avoid and report scams’.[72] The public can report a scam to the ACCC via the website and follow links to other State and Territory consumer protection agencies. However, the quality of fraud and scam reporting facilities across these agencies varies. There also appears to be limited capacity to aggregate data received via these reporting mechanisms as there is no comprehensive data collection from these sources.

5.65               To improve information sharing the Auzshare system was created in 2005. Auzshare is a secure online website and database used by the Australian and New Zealand consumer protection authorities to share depersonalised information about complaints, including scams.[73] It enables agencies to issue alerts to each other where there is a cross border issue.

5.66               However, it has also been noted that differing systems and approaches to, for example, categorisation of complaints, reduces the effectiveness of Auzshare.[74] The Productivity Commission’s review of the Australian consumer protection framework has also ‘highlighted the benefits of a linked complaints information system, and the need for comprehensive and consistent data provisions’.[75]

eConsumer.gov

5.67               In addition, the eConsumer.gov site provides a complaint portal where consumers from anywhere in the world can report a scam involving a foreign company that appears to be located in a member country.[76] The reporting facility is an initiative of the International Consumer Protection and Enforcement Network (ICPEN). The information contained in the ‘complaint is entered into Consumer Sentinel, a consumer complaint database maintained by the US Federal Trade Commission’.[77]

5.68               The data is accessible to certified government law enforcement and regulatory agencies in ICPEN-member countries and is used to ‘investigate suspect companies and individuals, uncover new scams, and spot trends in fraud’.[78] Information submitted through the online complaint form may be used to aggregate the data to analyse trends and statistics that may be released to the public.

5.69               These initiatives in both in the traditional criminal law and consumer protection areas demonstrate the potential for systems to improve public reporting on a range of cyber crime activity, and the opportunity to use that data to analyse large scale activity, support investigations, analyse trends and help measure the scale of the problem.

A New National Approach to Cyber Crime Reporting

5.70               Several submitters proposed the creation of a national body to establish a more coherent response to victims and improve strategic capacity to detect and pursue online crime. Dr Russell Smith told the Committee there are now central reporting agencies in the UK, the US and Canada and:

If they are adequately funded, I think they can make some inroads into solving some of the problems.[79]

5.71               In the US, the Internet Crime Complaints Centre provides an online reporting mechanism for the public to make complaints of cyber crime, especially online fraud, and functions as a clearing house on cyber crime.[80] The Centre is managed by the FBI and works closely with other bodies, such as the US Cyber Forensics and Training Alliance (NCFTA). The Federal Trade Commission and other agencies also take reports of various cyber crime types.

5.72               In the UK the Police Centre e-Crime Unit is located within the Serious and Organised Crime Agency (SOCA), with a remit to investigate serious e-crime.[81] However, it does not take reports from individual members of the public and the decentralised policing structure has made analysis at the national level difficult.[82] Under a recently adopted ACPO e-Crime Strategy the National Fraud Reporting Centre was designated as the national reporting centre for cyber crime.[83] As part of the National Fraud Strategy, investigators can now take cases that individually may not have been investigated but together represent significant loss.[84]

5.73               The NSW Government argued that consumers would benefit greatly from centralised cyber crime reporting:

At present, agencies such as ACMA and others provide an avenue for reporting some cyber crimes (eg spam), but the broad range of cyber-scams that now exist suggest that the community may be better served by providing a central point to refer suspected cyber-scams, rather than the segmented and ad-hoc arrangements currently in place.[85]

5.74               Detective Inspector William van der Graff commented that a lot of resources are devoted to the problem of online scams but there are few prosecutions:

I would like to see a national body that looks at this data and launches prosecutions of people internationally. I should say it is not necessarily easy. We are doing one at the moment and the people we are trying to track are very good. We may not meet with success in this case, but until we attempt it we do not know.[86]

5.75               The Queensland Government suggested a Centre, like the FBI Internet Crime Centre, complemented by an E Crime Mangers Group. The E Crime Mangers Group would have representation from each Australian policing agency.[87] It would promote national coordination, facilitate inter-jurisdictional operations, establish national standards and facilitate information sharing.[88]

5.76               AusCert and the Internet Safety Institute argued for a more integrated and consumer focused centre that can provide an Internet wide perspective to the problem.[89] To achieve a more effective response to the range of cyber crime activity will require a higher level of cooperation between civil and law enforcement agencies.[90]

5.77               In a recent paper for Australian Strategic Policy Institute, Mr Alastair MacGibbon, Director, Internet Safety Institute said that:

Australia needs an internet crime reporting and analysis centre for homes and businesses. The relevant federal law enforcement and consumer protection agencies are not constituted, staffed, or able to deal with the often small and seemingly inconsequential incidents of fraud, spam, scams, data loss, inappropriate content, or sometimes IT security incidents. We need an Internet ‘shopfront’ approach. A place for people to report matters, and to seek advice: a single consumer orientated destination, scaled for the Internet, which takes a national whole of government approach.[91]

5.78               In evidence to the Committee, Mr Alastair MacGibbon explained the purpose of centralised reporting would be to provide a one stop shop for the public and small businesses who believe they are a victim of cyber crime. It would operate on a 24 hour 7 day a week basis and be a combined public and private project. The aim would be to: provide a simple reporting mechanism for ordinary consumers: improve data collection, and intelligence analysis and sharing across police forces and other agencies; support targeted prosecutions; better identification of cyber crime trends; and provide education on e-security risks.[92]

5.79               The reporting system would provide for standardised first instance reporting and data collection on a range of cyber crime types. Police services would need to learn about large scale reporting, because these crime types involve large numbers of incidents that occur in a fragmented way.[93]

An internet crime reporting and analysis centre would be most successful as a public-private partnership which could allow real-time information flow between the government’s CERT Australia and the Cyber Security Operations Centre, giving Australia a more holistic view of Australia’s internet health, and improving our ability to respond to threats and rebound.[94]

5.80               The IT company, McAfee, expressed strong support for working with other partners to establish a centralised online reporting mechanism for the general public in Australia. In the US, McAfee has already launched the Cybercrime Response Unit (CRU), an online portal for consumers and small and medium sized businesses. The CRU provides education about online behaviours that lead to higher risks of cyber crime, and provides links to resources to report online crimes.[95]

5.81               The CRU includes free access to a ‘non-intrusive’ scanner that checks the PC to identify possible weaknesses in the owner’s computer and risky online behaviour. The scan produces a report with recommendations on what the user can to do protect themselves from online threats. The issue of remediation of infected machines is discussed in Chapter 7.

5.82               McAfee funds all aspects of the portal, including CRU staff to answer victims’ questions and clarify where to report the crime.[96] McAfee also told the Committee that it has developed close working relationships with US, European and British enforcement authorities. It shares intelligence on latest threat advice, and provides specific case support.[97]

5.83               On request by the Committee, McAfee expanded on the detail for a similar but more advanced model for Australia.[98] The company said it is willing to fund an Australian e-security portal that would also provide a ‘central gateway’ notifying appropriate agencies of incidents of cyber crime and:[99]

… is willing to provide additional resources to ensure that law enforcement, financial service providers, and telecom service providers have the intelligence from this portal that they need to use the information effectively.[100]

5.84               Central reporting would enable more effective use of resources and quicker response times through the:

… cross analysis of victim reports across Australian jurisdictions, combined with our Global Threat Intelligence or reputation-based scoring of cyber crimes and their websites globally… [101]

5.85               One of the benefits of central reporting is that it:

… could greatly enhance law enforcement’s ability to respond to only the immediate crimes and not spend as much time fielding general questions and following information that is not necessarily in and of itself, an online crime or one in which no usable information is available.[102]

5.86               The aim would be to provide a technical solution to e-crime reporting but, the company stressed, collaboration between Federal, State and Territory police forces would remain critical to ensure suitable action is taken in response to incident reports.[103]

5.87               Detective Superintendent Brian Hay, Queensland Police Service, suggested that such a reporting centre should sit with an agency outside of the law enforcement sphere:

A federal agency would be an appropriate body. If you look at the UK model, it has a non-law enforcement agency as the lead agency. The United Kingdom’s National Fraud Authority is the lead agency for the reporting portal, but it is not a law enforcement agency. So I would be looking at a federal agency that is not the police, because a lot of the issues that will come forward are very much consumer based issues.[104]

5.88               McAfee also suggested that monetary thresholds should be removed.[105]  By way of example, McAfee referred to the US Identity Theft Enforcement and Restitution Act,  passed in September 2008 to eliminate the previous threshold of $5,000.[106] Instead of filtering out complaints via a financial threshold that inhibit investigations, the model recognises the dispersed nature and impact of computer based identity crimes. The penalty provisions are also triggered by an estimate of the aggregated losses resulting from a crime that victimises more than one person.[107]

5.89               The Committee has no evidence that any Australian jurisdiction has legislated money thresholds. However, it was suggested that an explicit mechanism to ensure that cyber crime incidents, including small value crimes, can be multiplied across police forces may be necessary. The CLPC suggested that a Memorandum of Understanding or, if necessary, a legal provision, should be adopted between Australian police forces (and internationally) to facilitate the aggregation of shared intelligence.[108]

Committee View

5.90               The evidence highlighted two interrelated issues that arise from Australia’s current approach to the incidence of cyber crime and cyber crime reporting.

5.91               First, it is difficult for end users to know where to report an e-security incident (whether malware intrusions or identity fraud) and probably a degree of uncertainty over what redress is available. Under-reporting means that it is difficult to measure the size of the problem and, if reporting does occur, an incident could be reported to multiple agencies and private institutions.

5.92               The second and related issue is the lack of a nationally scaled institutionalised capacity to systematically collect and aggregate the intelligence data. There is no standardised method for receiving reports of e-crime from the general public or from companies that want to report. Nor is there any clear mechanism for sharing information on cyber crime reports between police forces, or between criminal and civil agencies such as the ACCC. This means lost opportunities for strategic intelligence analysis and detection of organised crime and support for prosecution in Australia or overseas.

5.93               A central reporting portal would enable reporting across the range of cyber crime types (malware, spam, phishing, scams, identity theft and fraud etc). Data collection and analysis would strengthen the detection of organised crime and support law enforcement efforts across jurisdictions. It would also provide existing agencies such as CERT Australia and the Cyber Security Operations Centre a more complete view of criminal activity on the Internet.

5.94               Where a consumer has suffered a malware intrusion, free access to scanning software and, where necessary, specialised IT assistance to remediate infected machines would help prevent re-victimisation. Remediation is discussed in Chapter 7. Information about cyber crime threats and e-security alerts, such as the Stay Smart Online alert service, and information about preventative e-security measures could also be integrated into the one body.

5.95               To maximise its effectiveness the body should be staffed by suitably qualified analysts and investigators, who could be dedicated or seconded from the various agencies, including the research staff from the Australian Institute of Criminology. Specialist banking and fraud investigators funded by the private sector will be integral and, in the Committee’s view, should be funded by the private sector.

 

Recommendation 4

That the Australian Government, in consultation with the State and Territory governments and key IT, banking and other industry and consumer stakeholders, develop a national online cyber crime reporting facility geared toward consumers and small and medium sized businesses.

This model should include the following features:

n  a single portal for standardised online receipt of cyber crime reports across a wide range of cyber crime types (e.g. malware, spam, phishing, scams, identity theft and fraud);

n  a 24/7 reporting and helpline;

n  no financial minimum to be applied to cyber crime reports;

n  systematic data collection that allows data to be aggregated;

n  referral to appropriate authorities and cooperation the on disruption and cyber crime and targeted prosecutions;

n  free access to scanning software to detect malware;

n  public information about cyber crime types and preventative measures to increase online personal security;

n  e-security alerts tailored to the needs of ordinary consumers and small and medium sized businesses; and

n  analysis of cyber crime methodologies and trends or cooperation with another body to perform that analysis.

 

Criminal Law Enforcement Coordination

5.96               The NSW Government contended that the HTCOC has a role to ‘provide a national approach to combating cyber-crime especially where the abilities of a particular jurisdiction are limited.’[109] However, the Tasmanian Government submitted that ‘since the closure of the AHTCC there has not been significant cross-jurisdictional coordination in relation to e-security risks’.[110]

5.97               The NT Government also said that:

It was hoped when the AHTCC was established in 2003 that it would provide a liaison with international police and help coordinate offences from the Australian end and refer them overseas. From an NT Police perspective the AHTCC appears to be focused primarily on internet banking fraud and is not in a position to offer substantial assistance in the other areas… [111]

5.98               The AFP considered that the former AHTCC was an ‘effective model for undertaking investigation and sharing information and expertise’ because it was a national body and provided a consistent approach.[112] While it aims to build on those relationships, Commander Gaughan agreed that coordination with State and Territory police is ‘where the difficulty currently lies’.[113]

5.99               The Australian Banking Association (ABA) argued that at the national level, the difficulties encountered in fighting cyber crime are not legal jurisdictional issues but ‘differing priorities between agencies on prevention, detection and prosecution’.[114] There is a ‘need for more coordination and cooperation between agencies in sharing vital information and intelligence risks (prevention)’.[115] At the present time there is no national centralised mechanism for coordinating these activities.[116]

5.100           Similarly, the South Australia Police said that there is no ‘coordinated medium for information to be exchanged about crime trends and methods’.[117] The re-establishment of the E-Crime Investigation Managers Committee under the auspices of Australian New Zealand Police Advisory Agency (ANZPAA) may improve information exchange. However, there was no suggestion that this alone would be sufficient.[118]

5.101           It was noted that the capacity of consumer protection and law enforcement agencies to respond varies across the jurisdictions. The highly technical nature of these crime types requires specialist skills and equipment.[119] Most State and Territory police forces have specialist investigators and some capacity for forensic analysis. The NSW Police has the NSW Police Fraud Squad Computer Crime Team and South Australia Police has a small Electronic Crime Section comprised of a manager, five investigators and four electronic evidence specialists.[120] But smaller jurisdictions, such as Tasmania, have less capacity to address the problem.[121]

5.102           The Tasmanian Government argued that cyber crime can only be properly addressed at the national level:

Many e-security issues affect consumers across Australia and internationally, and consequently it is not practical for State agencies to address them individually. Further, responses by individual states risks significant duplication of resources, which can be ill-afforded by small jurisdictions. This is especially the case with regard to highly technical problems such as those posed by the increasing criminal use of malware.[122]

5.103           The lack of national coordination means that cooperation between police forces operates on a case by case basis with police services across Australia ‘providing assistance or referrals to one another’.[123]

5.104           ‘Pending the development of a more formal coordination mechanism’, Tasmanian investigators have joined the AUSPOL email list hosted by AusCERT.[124] AUSPOL enables e-crime investigators to share information by posting ‘queries and information to their colleagues across the country.’[125]

Training and development

5.105           There was also a call from some police forces for a more coordinated approach to training and development, which the Committee was told is expensive and only happens on an ad hoc basis. South Australia Police argued that there is a lack of ‘consistency in the frequency and level of training provided to law enforcement detectives involved in investigating technology enabled crime’.[126] This area of crime requires regular upgrading of skills as new technologies means that ‘new investigative techniques are required’.[127] It was suggested that minimum standards should be set and processes established to ensure the capacity of the police to respond to technology enabled crime is maintained.[128]

5.106           The NSW Government proposed the creation of a National Cyber Crime Training Institute that could be the centre of training and skills development for police working in this field.[129] Detective Inspector William van der Graff, Coordinator, Computer Crime Team, Fraud Squad, NSW Police Force, argued that such a body would be an effective way of ensuring over the longer term that sufficient numbers of police officers are adequately skilled in this area.[130] Although a National Cyber Crime Training Institute would primarily serve the needs of law enforcement agencies, he suggested that it could potentially also provide training for other arms of government.[131]

5.107           AGD informed the Committee that the AFP offers electronic crime based training courses to other Commonwealth, State and Territory law enforcement agencies. The includes the AFP’s:

n  Internet Policing Program which provides training in the tactical use of the Internet including online conversations with suspects and advanced internet search techniques;

n  Child Protection Operations workshop which provides training for investigating online child sex offences and child sex tourism internationally with a focus on the nexus between international law enforcement, the AFP and State and Territory police; and

n  Management of Serious Crime course, a multi-agency, multi-jurisdictional program provided to a range of senior law enforcement practitioners across the Commonwealth and the States and Territories that includes a focus on cyber crime investigations.[132]

5.108           The AGD also told the Committee that the AFP is establishing a Technology Enabled Crime Centre of Excellence within its High Tech Crime Operations portfolio:

This Centre brings together technical, legal and other subject matter experts to provide the AFP and its partner agencies with a single point of contact on issues of technology enabled crime. The Centre is being formed in recognition of the increasing complexity of technology enabled crime and the need to deliver contemporary, specialist advice to investigators working on these matters.[133]

5.109           In June 2009, the AFP hosted the Australian High Tech Crime Conference with the University of Technology, Sydney and the Australian Institute of Criminology. Such conferences were said to be useful to develop and maintain links between law enforcement, the judiciary, the legal profession, academia, industry experts and government officials. AGD said:

The conference was successful in sharing information, ensuring a dialogue on key challenges, addressing investigative techniques and discussing legal and legislative issues relating to technology based crimes. The AFP will continue to host this conference annually.[134]

Committee View

5.110           The measures outlined by AGD will all contribute to building better law enforcement capacity and provide opportunities to share information and skills. However, the Committee believes that the proposal for an E Crime Managers Group and a National Cyber Crime Training Institute have considerable merit, and would go a long way toward ensuring a more effective harnessing of police resources.

5.111           The responsibility for developing and maintaining these structures should be shared across all Australian governments, to ensure that such measures are responsive to the needs of all jurisdictions.

 

Recommendation 5

That the Federal, State and Territory police forces establish an E Crime Managers Group to facilitate the sharing of information and cross jurisdiction cooperation.

Recommendation 6

That the Australian Government, in consultation with the State and Territory governments, industry and consumer organisations, develop a national law enforcement training facility for the investigation of cyber crime.

Public-Private Cyber Crime Intelligence Sharing

5.112           Many witnesses emphasised the importance of the government and private sector ‘working together to improve computer security’, both in relation to critical infrastructure and the wider area of cyber crime that impacts on Australian society more broadly.[135] The evidence indicated a need for intelligence sharing on a wider range of cyber crime types and this information to be both:

n  in real time operational intelligence; and

n  longer term analysis and information sharing within and between industries; and

n  be based on pre-sanctioned trusted information sharing networks.

5.113           As noted above, the Australia Government has recently established the DSD Cyber Security Operations Centre and, in collaboration with AusCERT, moved to bring computer emergency response team functions together under CERT Australia. The primary mechanism for public-private sharing of sensitive security related information remains the pre-existing Trusted Information Sharing Network for Critical Infrastructure Protection (TISN).[136]

5.114           Under the umbrella of the TISN, CERT Australia will now operate the three sectoral exchanges to share technical information in the:

n  banking sector;

n  communications sectors; and

n  wners and operators of control systems in power and water utilities.[137]

5.115           Witnesses made several points about the nature of the public-private collaboration. The first issue was the scope of the existing TISN, which is focused on national security and critical infrastructure. For example, Telstra said:

Within the current national critical infrastructure framework of the existing Trusted Information Sharing Network (TISN) … focus is specifically on the national security context of cyber crime (i.e. e-security). The existence of this framework may provide an opportunity to extend the TISN focus into cyber crime and its impact on Australian society more broadly.[138]

5.116           The ABA also expressed concern that the existing TISN does not cover all the types of cyber crime intelligence that interest the banking sector:

Strict boundaries between national security, critical infrastructure protection, financial crimes and other non-financial crimes may no longer be appropriate as the mechanisms used by cyber criminals are common to all.[139]

5.117           The ABA explained that they want to see a more integrated approach:

In terms of the traditional intelligence cycle this probably means the centralisation of the planning and direction, analysis and production functions with sharing of the collection, processing and dissemination functions.[140]

5.118           The ABA, advocated a ‘more formal arrangement for sharing intelligence with its Members’ and said that:

No governing body currently exists to allow strategic threats to be continually assessed between the public and private sectors (other than in the area of Critical Infrastructure) in this area.[141]

5.119           Given the interdependency of the public and private sectors, the ABA said this situation ‘places Australian institutions in both the public and private sector at a disadvantage when it comes to protecting Australian internet users’.[142]

5.120           Mr Richard Johnson, Chief Information Security Officer, Westpac Banking Corporation, told the Committee that while relationships have been developed with ‘segments of the banking industry, the AFP and some other government bodies, these relationships are effectively point-to-point, personal based relationships….’:

The large number of working groups, advisory groups, government agencies, departments and law enforcement bodies may be better served by a single point of coordination on cyber crime issues and information exchange.[143]

5.121           RSA also submitted that private industry associations and their security solution providing members cannot ‘gain the upper hand on their own’ and called for a more centralised and coordinated leadership from the Australian Government.[144]

5.122           In addition to the scope of the TISN, some witnesses commented on the nature of the trust relationship and indicated some concern about the timeliness of information. Mr Johnson, Westpac, said the key to trusted relationships is the ‘free and open bidirectional sharing of information and intelligence’.[145] The witness told the Committee there is a lack of formalised and pre-sanctioned trust relationships between government and industry and this has:

… left both groups effectively unsure of exactly what can be shared. Information that is shared is therefore redacted to such a point that it borders on being meaningless. In other words, we do not know what we do not know.[146]

5.123           Importantly, the apparent lack of pre-sanctioned relationships was said to affect the timeliness of sharing real time operational intelligence.        Mr Johnson, Westpac, explained that:

Timeliness of this information is critical to be effective. Cybercrime  threats, by their very nature, are given to evolve rapidly. Current information-sharing arrangements are dependent on multiple levels of clearance and release approval, severely limiting the usefulness of information that can be shared. A true national, trusted intelligence-sharing network is required, with preclearance of participants and of the information types which can be shared. This needs to operate in real time to match the nature of the threat. By sharing information and pooling data, analysis of the entire dataset can be performed and each participant will gain a holistic view of the common threat which today we can each only see from our own point of view.[147]

5.124           Symantec, a global IT security vendor, also provided comment on the TISN. In particular, Symantec said that trust, time and resources are the key to public-private cooperation and it was important for the relationship to be one of exchange. For example, offering participants exclusive cyber threat intelligence information that cannot be obtained elsewhere. Symantec also observed that private sector members need assurance on key issues such as:

n  the role and intention of authorities requesting information;

n  whether there is exposure to regulatory enforcement action;

n  protection of commercially sensitive information; and

n  the protection of privacy of consumers.[148]

5.125           The witness proposed that Australia consider enacting legislation to assure private sector participants that confidential, proprietary, and business-sensitive information is only used for the purpose for which is it shared. In particular, that the information is protected from public disclosure, regulatory action, and there are uniform procedures for receipt, care and storage of information. Symantec advised that, in the context of critical infrastructure, the US introduced the Critical Infrastructure Information Act 2002 to improve information sharing. An alternative would be formalised and enforceable data sharing and non-disclosure agreements, however, it was noted that these agreements are likely to still entail the possibility of regulatory and legal action.[149]

5.126           Further evidence from AGD opposed any specific legislation and argued that existing arrangements are adequate, and include legal remedies for breach of confidentiality. Private sector organisations sign a Deed of Confidentiality, which set out their obligations:

This ensures that information is properly managed and reasonably protected from unauthorised disclosure or use. Information that is provided to Government within the TISN is used for legitimate TISN purposes only. This information is not disclosed to other regulatory agencies, unless required by law. In such cases, the owners of the information would be given prompt notice and reasonable details of the circumstances involved should they wish to respond.[150]

5.127           Additionally, public sector officials sign a Government Representative Confidentiality Acknowledgement, which acknowledge their statutory and other legal and policy obligations for information handling.[151]

5.128           Symantec also suggested a standardised structure for the exchange of information that describes, categorise, prioritise information and have established channels for the escalation of security incidents. Two examples of messaging standards for information sharing purposes were the EU Messaging Standard for Sharing Security Information (MS3i), and the US National Information Exchange Model (NIEM).[152]

5.129           Symantec also proposed that appropriate house rules be established on participation in sector meetings. This was intended to ensure minimum levels of seniority and the involvement of decision makers to generate trust. The Warning, Advice and Reporting Point (WARP) in the UK was given as an example.[153]

5.130           The Committee also heard from Ms Alana Maurushat, Deputy Director, CLPC who advocated the creation of a body similar to the US National Cyber Forensics and Training Alliance (NCFTA).[154] The NCFTA is not a law enforcement agency. It operates as an intelligence hub receiving intelligence from companies and organisations that are victims of cyber crime (DDOS attacks, security breaches, fraud).[155]

5.131           The NCFTA can work across industry sectors to aggregate intelligence, assisting organisations to mitigate attacks, preserve digital evidence, and work with law enforcement to support prosecutions.[156] In her view, the creation of an ‘intelligence hub’ is ‘really important for Australia and what is grossly lacking’.[157]

5.132           Dr Paul Brooks, Director, Internet Society of Australia made the distinction between real time operational information and the longer term analysis:

When somebody notices that their equipment, their ISP or their home PC has been hacked, it requires different tools, a different level of investigative ability and a different organisations structure for them to be able to pick up the phone and get on a hotline to somebody who can within minutes identify what is going on a try and tack that back in real time to where it is coming from so you can actually catch the guys that are doing it.[158]

5.133           From an industry perspective, Mr Richard Johnson, Westpac Banking Corporation, submitted that in the US the Information Sharing and Analysis Centres (ISACs) are industry based centres that provide a real time information sharing network. This is operational intelligence on threats that are underway:

That is the kind of operation level intelligence we …  need to develop which then, for a strategic analysis purpose, could be fed into the research alliances.[159]

5.134           Mr Johnson also advised the Committee that the company has been involved in creating the Internet Commerce Security Laboratory, a joint research alliance with the Victorian Government, the University of Ballart and IBM, with support of the AFP. The Internet Commerce Security Laboratory is a research facility that performs data mining, data analysis and correlation to provide better leads, intelligence and information to support arrests.[160]

Committee View

5.135           The Committee considers that public-private cyber crime intelligence coordination is vital to achieve a more resilient Internet and ICT environment and ensure confidence in the digital economy. This view is also reflected in the Australian Government’s recent Cyber Security Strategy.

5.136           Under the Cyber Security Strategy, the new DSD Cyber Security Operations Centre is geared to detect and respond to aggressive cyber attacks on the ‘National Information Infrastructure’.[161] It supports non-government critical infrastructure through ASIO, AFP and AGD. CERT Australia obtains cyber threat intelligence and, through the three sector exchanges, shares technical information with the banking, utilities and communications sectors. This is in the context of national security and critical infrastructure protection.

5.137           However, the evidence to the Committee was that there is also a need to either:

n   widen the remit of CERT Australia and TISN to encompass a broader range of cyber time types; or, alternatively;

n  create separate and additional capacity through a joint public-private organisation to obtain, analyse and share technical real time actionable information.

5.138           The evidence indicates that Government leadership with significant private sector participation is needed to address the current lack of coordinated response to a wider range of cyber crime types that impact Australian society more generally.

5.139           A Government led initiative to develop a more coordinated approach to accessing and sharing real time operational data was a high priority for several witnesses. There was also consistent advocacy for some form of ‘intelligence hub(s)’ for analysis of methodologies and trends, and, where possible, support targeted prosecutions in Australia and internationally.

5.140           At first glance it might appear logical to integrate these functions into the same organisation. However, the evidence indicates that these functions are distinct and require different types of organisations albeit with close links. The former must be genuinely responsive and operate through a network of pre-sanctioned relationships in a clearly visible and accepted trust environment. This may require special legislation to provide the visibility necessary to build trust between government and the private sector and between competitors.

5.141           The latter is focused on the deeper and longer term analysis of methodologies and trends that can support industry preparedness. This could include cross industry intelligence sharing, private sector education on the preservation of digital evidence, and, where possible, support to targeted law enforcement action in Australia and overseas.

5.142           The Committee is aware that other countries face the same challenges and have useful experience to draw on. In the US, for example, a network of public-private Information Sharing and Analysis Centres provide real time operations intelligence for critical infrastructure. This approach might provide an effective model for intelligence sharing on the wider cyber crime types in Australia. The NCFTA is also a model for cross industry intelligence gathering and analysis. However, some steps have been taken in that direction with the creation of the Internet Commerce Security Laboratory.

 

Recommendation 7

That the Australian Government consult with major IT security vendors, academia and key industry stakeholders to develop:

n  options for establishing a coordinated public-private capacity to provide real time operational information on a wider range of cyber crime types that impact on Australian consumers;

n  an ‘intelligence hub’ that facilitates information sharing within and across industry sectors and provides:

n  longer term analysis on cyber crime methodologies across a range of cyber crime types;

n  education on the preservation of digital evidence; and

n  support to law enforcement agencies for targeted prosecutions in Australia and overseas.

 

 

We acknowledge the traditional owners and custodians of country throughout Australia and acknowledge their continuing connection to land, waters and community. We pay our respects to the people, the cultures and the elders past, present and emerging.

Aboriginal and Torres Strait Islander people are advised that this website may contain images and voices of deceased people.