Chapter 6 Criminal and Law Enforcement Framework
Introduction
6.1
The chapter discusses the existing criminal law framework intended to combat
cyber crime and canvasses Australia’s possible accession to the Council of Europe
Convention on Cybercrime. The chapter concludes that Australian criminal law
(substantive and procedural) is well developed but that legal policy in this
field must ensure an appropriate focus on the transnational nature of cyber
crime and particular challenges of digital evidence. There is also a strong
case for a more strategic focus on the disruption of botnets and prosecution of
botherders that will require intense international cooperation.
Criminal Law
6.2
Over the last decade, successive Australian Governments have enacted specific
offences for the misuse of computers and telecommunications systems and online
sexual abuse of children in the Criminal Code Act 1995 (the Criminal
Code).[1]
6.3
The technological aspects of cyber crime also pose particular challenges
to the investigation of crimes against computers or that use communication
technologies.[2] In response to
these challenges the law now provides police authorities with specific powers
to obtain evidence to aid the investigation and prosecution of online offenders.[3]
6.4
The next section outlines some of the key provisions and canvasses witnesses’
views on the adequacy of existing offences. The procedural aspects are then
discussed in the following sections.
Computer Offences
6.5
The Cybercrime Act 2001 (Cth) introduced computer offences
into the Commonwealth Criminal Code Act 1995 (Criminal Code) with
maximum penalties ranging from two to ten years imprisonment.[4]
The offences address the problems of hacking, denial of service attacks and
malware intrusions. The offences follow those contained in the Model Criminal
Code recommended by the Model Criminal Code Officers Committee of the Standing
Committee of Attorneys-General (MCLOC).[5] A summary of the
provisions is set out in appendix D.
6.6
The Constitution does not grant the Commonwealth express power over
criminal activity per se, however, the Parliament can validly make laws
to create criminal offences and provide for their investigation, prosecution
and punishment, provided that the offences fall within, or are incidental to
the exercise of a constitutional head of power.[6] In the context of
cyber crime the Commonwealth offences apply only to the:
n protection of
Commonwealth computers and computer systems; and
n the commission of
crimes by means of a telecommunications service.[7]
6.7
However, State and Territory computer offences apply generally in the
respective jurisdictions and therefore provide national coverage.[8]
Identity Fraud Offences
6.8
The computer offences may be combined with Commonwealth or State or
Territory provisions that cover identity related crimes, such as fraud,
forgery, or dishonest dealing in personal financial information.[9]
6.9
The fabrication or misuse of identity has traditionally been treated as
an aspect of these primary offences. In March 2008, the MCLOC recommended the
introduction of specific identity fraud offences and a certificate for victims
to assist in re-establishing their credit worthiness. The model offences do not
require that a crime, such as theft, fraud, forgery or deception be perpetrated
but merely that there is an intention to commit or facilitate the commission of
an indictable offence.[10]
6.10
At the Commonwealth level, the House of Representatives passed the Law
and Justice Legislation Amendment (Identity Crimes and Other Measures) Bill
2008 (the Bill) on 23 February 2009 and, at the time of writing, the Bill
remains under consideration by the Senate. The
Bill inserts three identity fraud offences into a new Part 9.5 of the Criminal
Code. The offences are described in Appendix E.
6.11
The amendments also allow a person who has been the victim of identity
crime to apply to a magistrate for a certificate to show they have had their
identity information misused. The purpose of the certificate is to assist
victims ‘negotiating with financial institutions to remove fraudulent
transactions, and other organisations such as Australia Post, to clear up
residual problems with identity theft’.[11]
6.12
At the State level, both South Australia (SA) and Queensland have specific
identity theft/fraud offences.[12] In March 2009, the
Victorian Parliament passed the Crimes Amendment (Identity Crime) Act 2009
(Vic). By December 2009, NSW had passed the Crimes Amendment (Fraud,
Identity and Forgery Offences) Act 2009 (NSW). The WA Criminal Code
Amendment (Identity Crime) Bill 2009 is currently before the WA Parliament.[13]
There was no evidence indicating whether Tasmania, the Northern Territory or
the Australian Capital Territory have or are soon to adopt the model offences.
Commentary
6.13
The Australian Federal Police expressed the view that criminal offences
to tackle cyber crime are sufficient, the difficulty lies more in enforcement
and the trans-national nature of most cyber crime.[14]
The AGD also said that while some aspects of the law and law enforcement could
be strengthened existing Australian laws are ‘appropriate’.[15]
Nevertheless, some questions were raised about the breadth and uniformity of
the computer offences.
Technology Neutral Language
6.14
The Committee was told that computer offences need to be drafted in technology
neutral language to minimise repeated amendment of the Criminal Code.[16]
According to AGD, the Part 10.7 offences are drafted so as to apply as
technology evolves:
For example, the term “computer” was not defined to ensure
the computer offences will encompass new developments in technology, for
example, mobile phones that allow access to the Internet.[17]
6.15
The Internet Industry Association (IIA) were satisfied that legitimate
investigations carried out to determine the level of security of a client’s
system would not be caught by the offence provisions.[18]
However, Symantec were concerned that legitimate software suppliers must not be
inadvertently committing offences when ‘using tools/devices for legitimate
business purposes, e.g. conducting research, penetration testing, and/or
supplying patches for vulnerabilities’.[19]
6.16
It was suggested that ss.478.3 and 478.4 clarify that it is only a
criminal offence when the ‘device has been developed primarily, deliberately
and for the sole purpose of committing an offence’.[20]
Other factors that should be considered include:
n whether the device is
available on a wide scale commercial basis and sold through legitimate
channels;
n whether the device is
widely used for legitimate purposes with a substantial installation base; and
n the context in which
the device was used to commit the offence compared with its original intended
purpose.[21]
6.17
Symantec also questioned the scope of the term ‘data’ and argued that it
should be clarified so it is clear that it includes malicious devices and tools
and toolkits.[22]
6.18
A further question arose as to whether the placing and later
exploitation of a latent functionality in computer hardware or software without
the owner’s knowledge or consent was caught by existing criminal provisions.
The AGD assured the Committee that the computer offences adequately cover such
conduct.[23]
Uniformity of Commonwealth, State and Territory Provisions
6.19
Some witnesses raised concern about the apparent inconsistency of
computer offences across Australian jurisdictions. For example, Microsoft
Australia submitted that New South Wales, Victoria, South Australia, the
Northern Territory and the Australian Capital Territory have implemented the
Model Criminal Code and established computer offences materially similar to the
federal provisions.[24]
6.20
However, Queensland, Tasmanian and Western Australian regimes were
described as ‘less aligned with the Model Criminal Code; they appear to focus
on computer hacking and misuse offences’.[25] The Tasmanian Government
also noted that as most e-security threats involve the use of communications
technology, most of the reforms have been at the national level.[26]
The Australian Banker’s Association (ABA) said that:
Various provisions of the Model Criminal Code have, we
believe, been sporadically and not necessarily consistently implemented across
the Australian jurisdictions.[27]
6.21
In 2004 the Parliamentary Joint Standing Committee on the Australian
Crime Commission recommended that the Commonwealth, State and Territory
Attorneys-General give priority to implementing consistent cyber crime offence
and evidence legislation.[28] The ABA was critical
that this has not yet been fully realised.[29]
Committee View
6.22
The evidence to the Committee indicated that there has been considerable
reform in the criminal law to adapt Australia’s legal framework to the growth
of malicious attacks against computers and computer systems. More recently the
Attorneys-General have initiated improvements to ensure that identity
theft/fraud is properly criminalised.
6.23
However, there is a need to maintain responsiveness to cyber crime and a
dedicated cross jurisdictional working group is probably warranted. The idea
for a working group is discussed at the end of this chapter.
6.24
The Committee is concerned with the current issue of uniformity of
computer offences and those relating to identity fraud, which appears to be a
continuing matter of concern. Lack of uniformity in Australian law makes both
domestic and international cooperation more complex and inefficient. This is an
issue that requires attention by the Attorneys-General of the Commonwealth and
the State and Territory Governments.
6.25
On the scope of the existing provisions, the Committee believes that Symantec
has expressed a legitimate concern that IT corporations and their staff could
be exposed to possible criminal liability for possession, control, production
or supply of ‘data’ (ss.478.3 and 478.4). However, each of these offences
requires the prosecution to prove to the criminal standard (beyond reasonable
doubt) that the possession, control, production or supply of data was with
intent to commit a computer offence. The Committee considers that, when all the
elements are read together, the risk of mistaken prosecution or wrongful
conviction is extremely remote.
6.26
On a related point, the Committee notes that intercepting communications
is criminalised by the Telecommunications (Interception and Access) Act 1979
(Cth). Recently proposed amendments are intended to ensure public and private
network owners and operators can carry out ‘computer network protection’
activities such as using virus protection software without violating the
prohibition on interception.[30]
Recommendation 8 |
|
That the Federal, State and Territory Attorneys-General
review the existing computer and identity fraud provisions and, if necessary,
introduce or amend provisions to ensure consistency across all Australian
jurisdictions. |
Law Enforcement Powers to Obtain Digital Evidence
6.27
The AFP told the Committee that the major challenge to domestic and
foreign law enforcement agencies (LEAs) is the dynamic and trans-national
nature of cyber crime. Some of the current key issues are:
n the ability to
identify offenders who may be located in a different country to the victim and
who can use technology to disguise their identity;
n the ability to quickly
preserve, search and seize digital information, especially that protected by
encryption or located in another country; and
n the need for higher
levels of international cooperation than that generally required for more
traditional offline crimes.[31]
6.28
The convergence of new technologies, in particular, the growth of peer
to peer and mobile phone technology was also identified as an additional
challenge to shutting down botnets and collecting digital evidence for
prosecution.[32] In particular, the AFP
said that the ability of criminals to commit or facilitate offences through the
use of disposable ICTs - such as prepaid mobile and wireless communications and
free g-mail electronic addresses - will also restrict the ability of LEA’s to
obtain evidentiary material.[33]
Crimes Act 1914 (Cth) – Investigative Powers
6.29
Part IAA of the Crimes Act 1914 (Cth) contains provisions which
allow a law enforcement officer to search and seize electronic data. This
includes provision for police to obtain an order to compel a suspect to access
or provide assistance to access data that is evidence of the suspected offence.
For example, revealing encryption keys or decryption data to enable police to
obtain crucial evidence.[34]
6.30
It is currently an offence to fail to provide reasonable assistance to
an LEA officer to access data stored on a computer at a search warrant premises
(e.g. where the data is password protected or encrypted). The penalty is a
maximum of six months imprisonment. The AGD advised that the Crimes Legislation
(Serious and Organised Crime) Bill No.2 will amend the offence and increase the
penalty from six months to two years.[35]
6.31
The Crimes Act 1914 (Cth) also facilitates ‘undercover’
investigations. Part IAB allows a law enforcement officer to commit criminal
offences as part of a controlled operation to investigate offences (including
computer offences).[36] Part IAC allows law
enforcement officers to use a false identity to investigate computer and
telecommunications offences.[37]
Telecommunications (Interception and Access) Act 1979 (Cth)
6.32
The Telecommunications (Interception and Access) Act 1979 (Cth)
(TIA Act) has also undergone significant reform and allows for the interception
of communications and access to historic and real time data.[38]
However, the AFP said the capacity of some telecommunications carriers to
meet their obligations under the TIA Act is insufficient and inhibits
police investigations. In particular, some carriers have limited technical
capacity to provide information required of them under the TIA. This
information includes subscriber details, call log details and IP addresses.[39]
6.33
The TIA Act is administered by the Telecommunications and Surveillance
Law Branch of the AGD. The TIA Act created the Communications Access
Coordinator (CAC), who is the first point of contact for the telecommunications
industry, LEAs and national security agencies:
To assist industry to comply with their obligations, they are
required to provide an interception capability plan on an annual basis which is
assessed by law enforcement and national security agencies before being
approved by the CAC. These plans outline how industry will meet their
obligations under the TIA Act. The plans for 2009 have been approved and
carriers range from very large organisations such as Telstra or Optus to
smaller operators like Clear Networks. While some carriers have less
capability, the CAC works with carriers to ensure they improve their
capabilities as they grow their business.[40]
6.34
The Branch also administers an outreach program which ‘provides
extensive liaison and education for industry’:
The program involves the provision of legal advice to
industry on their obligations under the Act. Additionally, TSLB provides face
to face assistance for carriers, carriage service providers and ISPs. These
programs enable AGD to assist industry meet their obligations under the
legislation and provide a foundation of co-operation in the provision of
assistance to law enforcement.[41]
Surveillance Devices Act 2004 (Cth)
6.35
The NSW Police argued that remote access under warrant would allow for
surveillance at the point before encryption occurs:
A broader issue relating to cyber crime is police powers,
such as ‘remote access powers’. By allowing a warrant to be obtained for remote
access, law enforcement is more likely to be able to decipher encrypted data by
conducting surveillance at a point between the user and the encryption
interface. This would involve remotely accessing (or ‘hacking into’) a computer
via the internet to obtain transmissions of product passing over that computer
at a point at which it is unencrypted. This would require legislative
amendments both at a State and Commonwealth level.[42]
6.36
According to AGD this form of surveillance raises a range of technical,
legal and privacy issues which have to be assessed against existing laws. For
example, the use of a remote surveillance device may amount to interception
under the TIA Act or violate the Criminal Code.
6.37
Additionally, it is the TIA Act which provides a national regime to regulate
highly intrusive investigative powers, whereas the Surveillance Devices Act
2004 (Cth) does not provide a national regime. In turn, this raises
jurisdictional issues when such devices are deployed across inter-state
boundaries.[43]
6.38
The Committee was told that a working group, which includes NSW law
enforcement, government and other bodies, is currently considering these
issues.[44] There was no evidence as
to the timeframe for this work.
Admissibility of Evidence
6.39
The AFP also identified the need to demonstrate the chain of handling of
digital evidence and the lack of uniformity in evidence laws across Australian
jurisdictions as two challenges to the admission of digital evidence in
Australian courts. In particular, the ability to store, review and analyse voluminous
data and a lack of tools/systems to ‘robustly demonstrate chain of evidence
handling of digital media’ was an issue from a law enforcement point of view.[45]
6.40
The AGD agreed that practical handling of large volumes of complex
material takes time and resources to conduct the necessary analysis. The
analysis and presentation of digital evidence in court is made more complex if
it has been subject to encryption.[46] Nevertheless, cyber
crime, like other forms of crime must be established by admissible evidence.
The AGD said:
This includes proving continuity of digital evidence by
presenting evidence of the chain of handling. Such evidence may be detailed
given the involvement, for example, of computer forensic analysts, but this
forms a necessary part of proving matters before criminal courts.[47]
6.41
In relation to uniform evidence law, the AGD advised that the
Commonwealth, NSW, Victoria, Tasmania the ACT and Norfolk Island have adopted a
harmonised approach under the Uniform Evidence Acts regime developed through
the Standing Committee of Attorneys-General (SCAG).[48]
The Department said that SCAG has an ongoing role in the harmonisation of
evidence law.[49] There was no assessment
of the status of that work or the likelihood of achieving uniformity in the
near future.
Foreign business records
6.42
The NSW Police raised concern about the admissibility of records from,
for example, Microsoft and Gmail, which are classed as ‘business records’. It
was suggested that such evidence should be admissible by ‘information and
belief’ only rather than strict proof. Part 3 of the Foreign Evidence Act
1993 (Cth) provides a means of adducing foreign evidence obtained through
mutual assistance in Australian criminal proceedings. The AGD advised the
Committee that amendments to that Act, currently before the Senate, would
provide more flexibility in the testimony requirements but it will not go so
far as to only require admission on the basis of the ‘information and belief’
of a law enforcement officer.[50]
6.43
The Department stressed the importance of preserving ‘an appropriate
balance’ between individual rights and sufficient legal and judicial
flexibility to secure international crime cooperation. The Department also said
that its International Crime Cooperation Central Authority is experienced in
working closely with the US Department of Justice to ensure evidence obtained
from ISPs complies with the requirements for admission in Australian
proceedings.[51]
International Cooperation
6.44
In the context of international cooperation, the AFP’s evidence highlighted
two particular issues:
n lack of timely access
to evidence to identify offenders and for court proceedings; and
n inconsistent
legislation in different countries that undermine investigative methods and
prevent extradition and prosecution.[52]
6.45
AusCERT emphasised the importance when dealing with cyber crime for LEAs
to be able to quickly secure digital evidence, often in multiple jurisdictions,
to ensure that it is retained and the forensic quality of the evidence is
preserved.[53] However, the AFP
noted that getting information for forensic analysis from overseas ISPs and
telecommunication services is often too slow to indentify an offender. Data is
generally not received in time to be submitted to court and, in some cases, has
taken up to eighteen months unless the investigation is high profile. Much of
the international cooperation is done on a police to police basis because the
formal mutual assistance regime is slow and makes it difficult to obtain
evidence to identify offenders fast enough to enable a prosecution.[54]
6.46
Inconsistent legislation across countries can also mean that LEAs
methods are sometimes thwarted. For example, inconsistent telecommunications intercept
data retention laws can mean that evidence that would be available in Australia
is not available where the service or data holdings are based in a foreign
country.[55]
6.47
Inconsistent legislation or a lack of cyber crime offences can also mean
that individuals based overseas escape extradition and prosecution for cyber
offences because there is no similar offence in the country of origin (double
criminality test).[56]
6.48
According to AGD the government to government processes for mutual
assistance in criminal matters can take:
… from a few days or weeks in very urgent or less complex
cases, to several months or years in cases which require the collection of
extensive material, or which relate to complex investigations. In contrast,
requests for police-to-police assistance can sometimes be acted on much more
quickly.[57]
6.49
The AGD told the Committee that Australia is already a party to
approximately 25 bilateral treaties on mutual assistance in criminal matters.[58]
Further, a comprehensive review of Australia’s mutual assistance legal regime
was completed recently and an exposure draft of the Extradition and Mutual
Assistance in Criminal Matters Legislation Amendment Bill released for public
consultation in July 2009:
A key intent of the reforms in this Bill is to streamline and
modernise Australia’s laws to ensure the mutual assistance regime is able to
respond to advances in technology.[59]
6.50
Some of the proposed reforms include:
n provision for a
warrant to covertly access stored communications (such as email records) for
foreign law enforcement purposes; and
n allow the disclosure
of existing data, such as subscriber details and call charge records without
the need for a formal request from the foreign country (i.e. on a police to
police basis).[60]
6.51
The draft exposure Bill was said to contribute to Australia’s ability to
meet Convention obligations and the Department is assessing whether any
additional changes are needed to meet the international cooperation
obligations.[61]
6.52
In addition to these reforms, AGD agreed that participation in the
Council of Europe Convention on Cybercrime would increase Australia’s ability:
… to obtain international assistance from other parties to
the Convention in investigating potential cyber crime offences, particularly in
relation to accessing telecommunications.[62]
6.53
The Council of Europe Convention on Cybercrime is discussed below.
Committee View
6.54
The evidence indicated that there has been a considerable expansion in
police powers to ensure that LEAs are able to adapt investigative methods to
the high tech environment. There appears to be an ongoing program of legal
policy development in response to problems as they are identified. Some of
those reforms (identity fraud, foreign business records) were before the Parliament
during this inquiry. Reform of the mutual assistance regime to respond to new
technology was released for public consultation in July 2009. These measures go
some way to strengthening law enforcement capability in relation to high tech
crime.
6.55
However, the Committee is concerned that many Australian ISPs and
telecommunications carriers appear to be unable to meet their statutory obligations
under the TIA Act. The role and responsibilities of ISPs are discussed in the next
chapter, where it is noted there are between 500-600 ISPs currently in
operation in Australia alone. This problem is magnified when dealing with ISPs overseas,
especially where the laws on the retention of data vary.
International Legal Framework
6.56
As has been noted throughout this report, a significant portion of cyber
crime experienced by Australians originates from overseas. This makes
international cooperation critical to efforts to criminalise, detect, disrupt,
prevent, and ultimately to pursue effective law enforcement action.[63]
6.57
The UN International Telecommunications Union (ITU) is active on the
issue of cyber crime but there is no UN sponsored international treaty
dedicated to this specific subject matter. The Australian Bankers Association
(ABA) advocated a more proactive stance by Australia in international fora for
the development of an international legal regime targeting cyber crime.[64]
6.58
In particular, it argued for a review and, if necessary, an extension of
the existing UN Convention on Transnational Organised Crime (and relevant
bilateral agreements), to address the problem of cyber crime. The ABA also
expressed concerns about the adequacy of the implementation of that treaty,
including in the area of mutual legal assistance.[65]
Council of Europe Convention on Cybercrime
6.59
The most relevant international treaty on this subject is the Council of
Europe Convention on Cybercrime (the Convention), which is designed to promote
the harmonisation of national laws on cyber crime and to aid international law
enforcement cooperation.[66]
6.60
Mr Alexander Seger, Head of the Economic Crime Division, Council of
Europe informed the Committee that, although the Convention was developed by
the Council of Europe, it was designed to have global scope and Non-member
States of the Council of Europe have been encouraged to sign and ratify the
treaty.[67] The USA, Canada, Japan
and South Africa participated in the treaty’s preparation and have signed, and in
the case of the USA, have ratified the treaty:
By the end of June 2009, 26 countries were full parties to
the Convention, while an additional 20 had signed it and another 5 had been
invited to accede. A further 50 to 70 countries are using the Convention as a
guide and have or are in the process of adapting their cybercrime legislation
along the lines of this treaty.[68]
6.61
Any country can seek accession and then be invited to accede. Chile,
Costa Rica, the Dominican Republic, Mexico and the Philippines have been
invited to accede and it is expected that by the time of accession these
countries will have harmonised their national law with the Convention.[69]
6.62
Several witnesses urged the Committee to recommend that the Australian
Government seek accession to the Convention.[70] The Council of Europe emphasised that efficient
international cooperation is crucial to combat cyber crime and to secure
evidence on computer systems:
For that reason, the Convention contains a range of general
and specific measures to facilitate cooperation and allow the use of domestic
measures (such as the expedited preservation) also in relation to international
cooperation.[71]
6.63
To support the implementation of treaty obligations, the Council of
Europe has produced Guidelines for the Cooperation between Law Enforcement and
Internet Service Providers against Cybercrime.[72]
6.64
The Council of Europe also pointed out a number of other benefits
including the ability of States parties to participate in the Cybercrime
Convention Committee, which monitors treaty implementation and initiates future
work, such as the elaboration of additional protocols.[73]
Australia’s accession to the treaty would also serve as a positive example to
other countries in the Asia Pacific region.[74]
6.65
In preliminary comments on Australian law, the Council of Europe
observed that substantive offences appear to be already covered:
…although – perhaps due to the specifities of the Australian
legal system – a different approach seems to have been followed for some of
them. For example, in some Australian legal provisions different types of
conduct listed in the Convention have been combined (e.g. illegal access, data
interference, system interference) or individual provisions of the Convention
are reflected in several different provisions in Australia. This is compatible
with the Convention but may create difficulties in international cooperation
when applying dual criminality.[75]
6.66
In relation to procedural law and practice the Council of Europe
commented that:
…it seems that some tools (search and seizure, production
order etc) are available, while others are not (e.g. expedited preservation).[76]
6.67
The AGD told the Committee that Australia is already compliant with some
obligations contained in the Convention but:
There remain a number of complex issues that the Government
will need to consider, some of which may require significant legislative
amendment. The Australian Government is currently reviewing existing domestic
legislation to identify what action may be necessary to implement the
Convention in Australia’s domestic law, should it decide to become a party to
the Convention.[77]
6.68
Specifically, the AFP suggested that some amendments to the Telecommunications
(Interception and Access) Act 1979 (TIA Act) may be necessary.[78]
The Committee noted, for example, that intercept material obtained by police under
the TIA Act cannot be shared with foreign countries.[79]
6.69
The Council of Europe offered its assistance in conducting a detailed
analysis to assess whether Australian legislation and practice is fully in line
with the Convention.[80] Microsoft Australia also
provided the Committee with a study of computer security, privacy, spam and
online child safety laws in 14 countries across the Asia Pacific Region. The
study included analysis of Australian cyber crime laws benchmarked against the
Convention.[81]
6.70
The study found there was a strong alignment of Australia’s current
cyber crime framework with the Convention’s ‘core offences’ of data
interference; computer related forgery and fraud offences; and corporate
criminal liability for cyber crime.[82] However, it found that there
is scope to strengthen provisions on illegal access, system interference and
misuse of device offences.[83] Specifically, Microsoft Australia
said:
The Code’s unauthorised access offence only applies in
respect of data that is protected by an access control system (this
qualification is permitted by the Convention).
The Code’s data interference offence is likely to regulate a
broader range of conduct than its Convention counterpart due to its application
to reckless data interference as well as that caused intentionally.
…
The Code does not contain an equivalent to the Convention’s
system interference offence, but its unauthorised impairment of electronic
communications offence is targeted at denial of service attacks in the same way
that the Convention system interference offence is (at least in part).[84]
6.71
Finally, in respect of producing, supplying, possessing or procuring
data (which is defined as including computer programs) with intent to commit a
computer security offence, Microsoft said these ‘are best viewed as a partial
implementation of the Convention’s misuse of devices offence’.[85]
6.72
Overall, however, Microsoft Australia concluded that:
… Australia has demonstrated a solid commitment to robust
legislation, but could further strengthen some of these provisions in closer
alignment with the Cybercrime Convention. Australia has already been playing an
important role in achieving regional and global consistency. It is effectively
functioning as a policy bellwether for the region.[86]
6.73
Finally, the Cyber Space Law and Policy Centre (CLPC) pointed out that
some of the special evidence gathering obligations of the Convention raise
significant privacy issues. As Australia does not have a domestic Charter of
Rights and Freedoms against which such provisions can be independently
assessed, the CLPC advised that these provisions should be subject to careful
scrutiny before being implemented in Australia.[87]
Committee View
6.74
The transnational nature of cyber crime and the importance of
consistency in both the substantive offences and procedural law to strengthen
international cooperation make the review and, if necessary, amendment of
Australian laws an important priority for all Australian governments. The
Convention was finalised in 2001 and entered into force in 2004. At the time of
writing in 2010, 46 countries had either signed or signed and acceded or
ratified the Convention, including the USA, Australia’s major partner in
fighting transnational cyber crime.
6.75
The majority of evidence to the Committee indicates that Australian law
is already substantially aligned with the offence provisions and some
procedural aspects of the Convention. However, the Committee is concerned that
Australia’s progress has been too slow and is disappointed that AGD’s evidence
lacked a clear framework for action and specific timetable for seeking accession
to the Convention.
6.76
There is general agreement that Australians are benefitting from the
high level of ICT penetration into the Australian economy and increasing IT
literacy across the community. In light of the importance of ICTs, the
Committee believes that Australia governments should give priority to finalising
the internal review and necessary reforms and move expeditiously toward seeking
accession to the Convention. The shaping of Australian law to comply with the
Convention should also take into account Australia’s existing obligations under
the International Covenant on Civil and Political Rights.
6.77
Overall, however, the Committee believes that Australia’s participation
will strengthen international law enforcement cooperation and enable Australia
to participate in future treaty development and influence global legal regimes.
Participation in the treaty will also support Australia’s work in other
international fora and the Asia Pacific Region.
Recommendation 9 |
|
That the Federal Attorney-General, in consultation with
State and Territory counterparts, give priority to the review of Australian
law and practice and move expeditiously to accede to the Council of Europe
Convention on Cybercrime. |
Tackling Botnets
6.78
There is wide agreement among police, researchers, IT security companies
and governments around the world that botnets are the key tool for the
commission of cyber crime:
Botnets are said to be involved in most forms of cybercrime
and civil wrong ranging from sending spam, to denial of service attacks, to
child pornography distribution, to worm propagation, to click fraud, to
keylogging technology and traffic sniffing which captures passwords and credit
card information, and to mass identity theft.[88]
6.79
Similarly, Microsoft Australia emphasised that:
As online criminals increasingly access and control protected
networks of computers remotely and without authorisation, creating “botnets” of
literally hundreds of thousands of machines that are used to attack other
machines, perpetrate identity theft, spread spyware and malware, or disrupt
Internet functions, more needs to be done to identify, stop and prosecute these
criminals (“botherders”).[89]
6.80
The IIA argued that since the passage of the Cybercrime Act 2001
cyber crime has become more sophisticated and moved from one-off events to
organised crime on an industrial scale. Cyber crime now relies on thousands of
infected home computers exposing more general weaknesses in the current regime.[90]
From IIA’s perspective the problem is not the lack of a legal framework but the
inability of traditional institutions to respond to the complexity of cyber
crime. It was argued that tackling botnets requires a more concerted effort,
and the lack of prosecutions and light sentences has contributed to a lack of
community awareness of the problem.[91]
6.81
The IIA were not alone in this view. The CLPC, Microsoft and Sophos also
stressed the importance of tackling the botnet infrastructure, by identifying
and neutralising botnets and targeting botnet herders.[92]
6.82
As noted in Chapter 5, the CLPC was critical that law enforcement
strategy puts little emphasis on prosecuting botherders or addressing botnets
run by organised crime.[93] The CLPC said that ‘cyber
crime policy should place a significant emphasis on the disruption and
dismantling of botnets, as opposed to the mere prosecution of botnet herders’.[94]
6.83
In one case, the AFP identified distributed denial of service attacks
committed by botnets containing more than 100,000 compromised computers across
more than 120 countries:
…the ability of law enforcement to investigate and prosecute
individuals behind such attacks is often thwarted by the transnational nature
of the Botnet make up and control systems.[95]
6.84
The Committee was also told that to prosecute a person running a botnet
the police would need statements from potentially thousands of individuals that
the perpetrator did not have authority to enter and operate their computer.[96]
However, AGD disagreed and told the Committee that the Commonwealth Director of
Public Prosecutions is able to prosecute on the basis of representative
charges, which establish a course of conduct by the defendant together with
forensic evidence to show how the botnet operated.[97]
6.85
Fujitsu told the Committee, that in their view, there are gaps in the
law and policy that would support a more strategic approach. For example:
n insufficient
legislation that targets the criminal underground economy, the people involved,
and the tools they use to write malware;
n restrictions on the
deployment of tools to identify suspects; and
n lack of legislation
that allows law enforcement or other entities to deploy technical capability to
remove virus/trojans/malware from victims.[98]
6.86
David Jones, ThreatMetrix Pty Ltd also argued for a fresh look at cyber crime
laws to better respond to the current environment of botnets and compromised
hosts.[99]
6.87
In response to a question from the Committee about the ability to
conduct network wide strategies, the AGD advised that existing Criminal Code
Part 10.7 computer offences would be violated if an anti-malware program
intended to disinfect PCs were released to combat a widely distributed virus.[100]
Committee View
6.88
Since the introduction of computer offences the problem of cyber crime
has moved onto an industrial scale organised through loose networks. There was
a clear message that the IT security companies are unable to entirely protect
their customers and traditional law enforcement methods are unlikely to get on
top of this problem. Legal policy and law enforcement strategy also needs to:
n target the
underground cyber crime economy;
n target the
botherders;
n tackle botnets through
disruption; and
n remediate
compromised computers (See Chapter 7).
6.89
The Committee noted concerns that police lack sufficient tools to
identify offenders or deploy technical capability to remove malicious software.
In the Committee’s view, Australian LEAs must have the tools needed to work
with international partners in a concerted effort to tackle the botnet problem
and prosecute the members and leaders of organised criminal networks.
Recommendation 10 |
|
That Australia’s cyber crime policy strategically target the
underground economy in malicious IT tools and personal financial information;
the disruption of botnets and the identification and prosecution of
botherders. |
Future Initiatives
6.90
The NSW Government argued that, while it had introduced specific
computer and identity crime offences, this should ‘only be the beginning of
legislative reforms to tackle cyber crime’.[101] In particular, NSW
argued that the computer offences are ‘focused on the hardware rather than
cyberspace more generally’ and the identity crime offences are aimed at the
members of syndicates rather than the head of those organisations/networks that
develop the means to obtain the information.[102]
6.91
To maintain a coordinated and ongoing legislative reform effort, the NSW
Government recommended that a national cyber crime working group be established
to develop legislative initiatives for cyber crime for both Commonwealth and
State jurisdictions to implement.[103] The working group would
report to the appropriate Ministerial Council. It was suggested that this group
could also give further consideration as to whether Australia should become a
signatory to the Council of Europe Convention on Cybercrime. From NSW’s
perspective, the group should include a cross section of policy staff from
justice and law enforcement agencies, including significant input from the AFP
High Tech Crime Operations Centre.[104]
Committee View
6.92
There does not appear to be any existing dedicated cross jurisdictional
working group on cyber crime, although the Commonwealth may consult on specific
initiatives. Many issues would be dealt with via the Model Criminal Code
Officers Committee, which reports to SCAG. As noted above, the Committee is
satisfied there have been significant reforms in this area.
6.93
However, there is a need to remain responsive to the evolving nature of
cyber crime. Consequently, the Committee sees some merit in a specialist
working group dedicated to cyber crime that can be focused and responsive. In particular,
this group should put a high priority on facilitating international cooperation
in the investigation of organised criminal networks and the problem of botnets.
Recommendation 11 |
|
That the Commonwealth, State and Territory governments
establish a national working group on cyber crime to maintain an ongoing,
dedicated mechanism for the review and development of legislative responses
to cyber crime.
That the working group take a whole of cyberspace
perspective and consider relevant IT industry, consumer protection and
privacy issues as well as the criminal law. |