Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020

Bills Digest No. 2, 2021-22
PDF version [715 KB]

Claire Petrie
Law and Bills Digest Section
22 July 2021


Contents

Purpose of the Bill
Structure of the Bill
Background
Committee consideration
Policy position of non-government parties/independents
Position of major interest groups
Financial implications
Statement of Compatibility with Human Rights
Key provisions
Schedule 1—Data disruption warrants
Schedule 2—Network activity warrants
Schedule 3—Account takeover warrants
Schedule 4—Controlled operations
Key issues


Date introduced:  3 December 2020
House:  House of Representatives
Portfolio:  Home Affairs
Commencement: Sections 1 to 3 commence on Royal Assent. Schedule 1 and Schedules 3–5 commence the day after Royal Assent. Schedule 2 commences immediately after commencement of Schedule 1.

Links: The links to the Bill, its Explanatory Memorandum and second reading speech can be found on the Bill’s home page, or through the Australian Parliament website.

When Bills have been passed and have received Royal Assent, they become Acts, which can be found at the Federal Register of Legislation website.

All hyperlinks in this Bills Digest are correct as at July 2021.

 

Purpose of the Bill

The primary purpose of the Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020 (the Bill) is to amend the:

  • Surveillance Devices Act 2004 (Cth) (SD Act) to create two new warrants—data disruption warrants and network activity warrants—which may be issued to law enforcement officers in the Australian Federal Police (AFP) and the Australian Criminal Intelligence Commission (ACIC) and
  • Crimes Act 1914 (Cth) to provide the framework for the new account takeover warrant, which may be issued to AFP and ACIC officers, and to provide that in granting or varying authorisation for controlled operations, an authorising officer does not need to be satisfied that illicit online content will be under the control of law enforcement at the end of the operation.

The Bill also makes consequential amendments to ten other Acts. These include amendments to the Inspector-General of Intelligence and Security Act 1986 (Cth) to provide the Inspector-General of Intelligence and Security with oversight over the AFP and ACIC in respect of activities related to network activity warrants.

Structure of the Bill

The Bill has five Schedules:

  • Schedule 1 amends the SD Act to provide for the issuing of data disruption warrants, and makes related amendments to the Telecommunications (Interception and Access) Act 1979 (TIA Act)
  • Schedule 2, Part 1 amends the SD Act to provide for the issuing of network activity warrants. Part 2 makes consequential amendments to ten Acts
  • Schedule 3 amends the Crimes Act to provide a framework for the issuing of account takeover warrants
  • Schedule 4 amends provisions of the Crimes Act in relation to controlled operations and
  • Schedule 5 makes minor amendments to the SD Act and TIA Act.

Background

The Bill is aimed at modernising Australia’s law enforcement and intelligence legal framework to better equip the AFP and ACIC to deal with serious cyber-enabled crime, and particularly aims to address the challenges posed by increasing criminal use of the dark web and anonymising technologies.[1] In its 2019 report on the Impact of New and Emerging Information and Communication Technology, the Parliamentary Joint Committee on Law Enforcement described the dark web as:

…that part of the internet that is hidden from the view of typical search engines such as Google and Yahoo, and is only accessible by means of additional networking protocols and special software.

The dark web allows users and website operators to remain anonymous or untraceable. It is sometimes used to facilitate cybercrime through dark web markets where those using them can purchase stolen information or illicit goods. Dr John Coyne explained:

The internet is comprised of two parts: the part that is indexed by search engines and that which isn't (the deep web). A small portion of this deep web is comprised of what has become known as the 'dark web'. In these areas of the internet exist secure networks of various sizes. These networks, and their data, are protected by a range of technology including encryption. Within some of these dark web networks are buyers and sellers who combine to create dark markets: more often than not dealing in illicit commodities.[2]

In its submission to the Parliamentary Joint Committee of Intelligence and Security’s (PJCIS) review of the Bill, the Department of Home Affairs states:

Criminals are using the dark web to commit serious crimes, including buying and selling stolen identities, trading in illicit commodities and producing and disseminating child abuse material. The encryption underpinning the dark web, and the increased use of anonymising technologies allow criminals, including terrorists and other malicious actors to hide from law enforcement. This has made committing serious crimes at volume and across borders easier than ever before.

Current electronic surveillance powers, while essential for investigating many aspects of online criminality, are not suitably adapted to identifying and disrupting serious crime where anonymising technologies are being used – including at scale – to conceal the identities and illegal activities of offenders…

This Bill addresses gaps in the current suite of electronic surveillance powers to enable the AFP and the ACIC to discover, target, investigate and disrupt the most serious of crimes, including child abuse, terrorism, and drug and firearms trafficking.[3]

Cyber Security Strategy

An emphasis on investigating and disrupting cyber crime, including on the ‘dark web’, forms part of Australia’s Cyber Security Strategy 2020, released in August 2020. As part of this Strategy, the Government committed to ensuring law enforcement has the necessary powers and capabilities to perform such activities.[4] This included a commitment to invest $124.9 million to strengthen law enforcement’s counter cyber crime capabilities, with $89.9 million of this intended for the AFP to ‘set up target development teams and bolster its ability to go after cyber criminals’.[5]

The Cyber Security Strategy emphasises the increasing scale and sophistication of cyber threats, in the context of greater reliance by Australians on the internet and internet-connected devices:

Between 1 July 2019 and 30 June 2020, the [Australian Cyber Security Centre (ACSC)] responded to 2,266 cyber security incidents at a rate of almost six per day. This does not include other incidents referred to the police and support organisations. The true volume of malicious activity in Australia is likely to be much higher. According to one expert analysis, cyber incidents targeting small, medium and large Australian businesses can cost the economy up to $29 billion per year, or 1.9% of Australia’s gross domestic product (GDP). Further, it is estimated that a four week interruption to digital infrastructures resulting from a significant cyber incident would cost the economy $30 billion (1.5% of Australia’s Gross Domestic Product) and around 163,000 jobs.[6]

The Strategy also includes a focus on increasing the cyber resilience of Australia’s critical infrastructure, with proposed reforms to the regulatory framework for critical infrastructure currently before Parliament.[7]

Richardson Review

The report of the Comprehensive Review of the Legal Framework of the National Intelligence Community (Richardson Review), led by Dennis Richardson, former head of ASIO, was released on 4 December 2020, together with the Commonwealth Government Response to the Comprehensive Review of the Legal Framework of the National Intelligence Community (Government Response), December 2020. The report made 203 recommendations, 13 of which were classified.

One recommendation was the enactment of a consolidated Electronic Surveillance Act, in which the existing SD Act, Telecommunications (Interception and Access) Act 1979, and parts of the Australian Security Intelligence Organisation Act 1979 (ASIO Act) are replaced with a single Act governing the use of federal telecommunications interception powers, covert access to stored communications, computers and telecommunications data, and the use of optical, listening and tracking devices.[8] The report noted that ‘reform of this nature will not be a simple or quick undertaking’ and would require two to three years of ‘very detailed work and drafting before being considered by Parliament’.[9] As part of this recommended reform, the report suggested the adoption of the oversight framework under the SD Act, which provides for the Commonwealth Ombudsman to oversee all aspects of each Commonwealth, state and territory agencies’ use of the powers under that Act.[10]

The report noted that the ‘need to disrupt security threats and criminal activity was a common theme in the Review’. It expressed doubt about the need for either ASIO or the AFP to be given a specific, legislated ‘disruption’ mandate, noting the ‘nebulous, and potentially very broad, nature of the concept of “disruption”’.[11]

The Government accepted most of the public recommendations, including the recommendation for a consolidated Electronic Surveillance Act. The Government Response stated:

The Government supports holistic reform of the legislative framework governing electronic surveillance and will develop legislation that achieves the principles and objectives underpinning each of Recommendations 76 to 132. However the policy development and drafting process requires a degree of flexibility, particularly as it is impossible to foresee all legal and operational issues that may arise in a rapidly evolving technological and national security environment. As such, the Bill ultimately put forward may not adopt the precise language of the Review. During this process, the Government will consult widely with key stakeholders including state and territory agencies, oversight bodies, public interest groups and the public.[12]

While proceeding with these broader plans for reform, the Department of Home Affairs states the current Bill is ‘intended to address specific and time critical gaps in the existing legal framework preventing law enforcement agencies from identifying and disrupting serious crime online, particularly that perpetuated on the dark web’.[13]

The Government Response disagreed with the Richardson Review’s position that the AFP does not need new powers to disrupt online offending. It argued that the current powers of both the ACIC and AFP are ‘increasingly ineffective against mass campaigns of cyber-enabled crime’, and that legislative reform is needed to enhance the ability of these agencies to discover and disrupt serious criminality online:

Such powers should be targeted at activities that have a direct and real impact on Australia’s most vulnerable and are usually orchestrated by the most sophisticated of criminal networks (eg. online child sexual abuse, the sale of illicit drugs and firearms and terrorism activities). Any new powers should also be proportionate to the identified risk, and subject to robust safeguards and oversight.[14]

The Government Response also emphasised the importance of ACIC—in addition to the AFP—in discovering serious and organised crime activity perpetrated online, pointing to ACIC’s criminal intelligence capabilities as enabling it to identify priority cybercrime and cyber-enabled crime targets.[15]

Committee consideration

Parliamentary Joint Committee on Intelligence and Security

The Bill has been referred to the Parliamentary Joint Committee on Intelligence and Security (PJCIS) for inquiry and report, with submissions due by 12 February 2021. Twenty-three submissions had been published at the time of writing, and a public hearing was held on 10 March 2021. Details are available at the inquiry homepage.

Senate Standing Committee for the Scrutiny of Bills

The Scrutiny of Bills Committee reported on the Bill on 29 January 2021.[16] The Committee noted that the authorisation of coercive search powers has the potential to unduly trespass on personal rights and liberties, and that any legislation enabling such powers should be tightly controlled, with sufficient safeguards. It raised a range of concerns about the Bill, and requested further advice from the Minister on all of these matters. The Minister’s response was considered by the Committee in its report dated 17 March 2021.[17] Key issues raised in these reports are set out below.

Authorisation of coercive powers

The Committee raised a number of concerns in relation to the Bill’s provision for authorisation of coercive powers under the proposed warrants:

  • the issuing authority for a data disruption or network activity warrant may be a nominated member of the Administrative Appeals Tribunal (AAT)—the Committee stated its ‘long-standing preference that the power to issue warrants authorising the use of coercive or intrusive powers should only be conferred on judicial officers’[18]
  • the explanatory memorandum does not provide sufficient explanation of why it is considered necessary and appropriate to issue each type of warrant for an initial 90-day period as opposed to a shorter period[19]
  • the Bill does not require, consistently across all warrants, that the issuing authority must consider whether the warrant is proportionate, as well as the extent of possible interference with the privacy of third parties[20]
  • the broad scope of offences which may be ‘relevant offences’ for the purposes of the warrants[21] and
  • provisions in the Bill that seek to correct the effect of a defect or irregularity in relation to a warrant or emergency authorisation do not provide guidance on the types of defects or irregularities the provisions are intended to relate to.[22]

The Minister’s response stressed the suitability of AAT members to assess applications for data disruption and network activity warrants due to their experience and independence.[23] In respect of the initial 90-day issue period, the Minister stated this was consistent with the period for surveillance device warrants and computer access warrants, and noted that this was a maximum period which could vary depending on the circumstances.[24] In relation to the factors to be considered when issuing the various warrants, the Minister stated that these considerations had been ‘specifically designed with regard to the objective and contemplated operation of each of the warrants’.[25]

The Committee reiterated its scrutiny concerns regarding the appropriateness of non-judicial office holders issuing data disruption and network activity warrants, and of not requiring the issuing authority to consider the extent of possible interference with the privacy of any person. It also requested the explanatory memorandum be amended to include information provided by the Minister.[26]

Emergency powers

The Committee also raised concern about provisions in the Bill which allow coercive action to be taken without a warrant—specifically, in emergency circumstances and in order to conceal things done to execute the warrant.[27]

The Minister’s response stated that an emergency authorisation will only be issued in circumstances where the level of seriousness and urgency is such that disruption of data or account takeover activity is ‘immediately necessary for dealing with that risk’. The Minister further noted that information gathered under an emergency authorisation is subject to strict use and disclosure provisions, and pointed to existing provisions in the SD Act providing for emergency authorisations in relation to surveillance devices and access to data held in a computer.[28] In respect of concealment activities, the Minister stated that concealment of the execution of the warrants in the Bill is ‘vital to the effective exercise of powers and maintaining the covert nature of the investigation or operation’, and that additional external approval requirements were not necessary as concealment activities are incidental to the granting of the original warrant.[29]

The Committee requested an addendum to the explanatory memorandum containing the key information provided by the Minister, and reiterated its concern about both the emergency authorisation and concealment provisions.[30]

Effect on third parties

The Committee further raised concerns about the Bill’s effect on the privacy rights of third parties, noting the potential for coercive powers in the Bill to adversely affect third parties who are not suspected of wrongdoing, through:

  • authorising entry onto third party premises and access to third party computers, communications and account-based data
  • compelling third parties to provide information through assistance orders and
  • the broad definition of ‘criminal network of individuals’.[31]

The Minister’s response noted the potential impact on the privacy of third parties, but noted that the issuing authority is required to undertake a proportionality test before deciding to issue a data disruption warrant or network activity warrant. The Minister further stated that the term ‘criminal network of individuals’ needs to be ‘broad enough to cover unwitting participants in criminal activity, so that this crucial intelligence can still be collected’.[32] 

The Committee requested key information provided by the Minister be added to the explanatory memorandum and reiterated its scrutiny concerns regarding these issues.[33]

Use of information obtained through warrant process

The Committee also expressed concern about the breadth of the exceptions to the restrictions on the use, recording or disclosure of protected information.[34] The Minister’s response stated that the exceptions provided for in the Bill:

… are necessary either to enable the warrants to be effective, or to enable strong oversight and accountability mechanisms, or to enable proper and appropriate judicial processes to be carried out, or to enable information sharing necessary for agencies to carry out their functions or in emergency circumstances.[35]

The Committee requested the information provided by the Minister be included in the explanatory memorandum, and left it to the Senate as a whole to decide the appropriateness of the proposed exceptions.[36]

Reversal of burden of proof

The Committee expressed concerns about provisions in the Bill enabling evidentiary certificates to be issued in connection with information obtained in connection with data disruption, network access or account takeover warrants, and their potential to, in reversing the evidential burden of proof, interfere with the common law right to be presumed innocent until proven guilty.[37] It also queried the reversal of the evidential burden of proof in connection with the offence for use or disclosure of protected information.[38]

The Minister’s response noted that evidentiary certificates will only cover factual matters including the manner in which evidence was obtained and by whom, and would not cover the actual evidence itself. The Minister noticed the certificates:

… will protect sensitive AFP and ACIC capabilities by preventing prosecutors from being required in the first instance to disclose the operation and methods of law enforcement unless a defendant seeks to dispute the veracity of the methods used to gather information against their interest. The courts will retain the ability to test the veracity of the evidence put before it should there be founded grounds to challenge the evidence.[39]

While noting the Minister’s advice, the Committee reiterated its concerns that evidentiary certificates may impose a ‘significant burden on persons seeking to challenge the validity of certain actions, in particular things done in the execution of warrants and steps taken to conceal them’. The Committee also noted the Minister’s response ‘indicates that evidentiary certificates may cover how evidence that goes directly to the culpability of an offence was obtained, even if the certificates may not cover the evidence itself’. The Committee requested key information be included in the explanatory memorandum and drew its scrutiny concerns to the attention of Senators.[40]

In respect of the reversal of the evidential burden of proof in connection with a protected information offence, the Minister advised that the Bill requires the defendant to adduce evidence that suggests a reasonable possibility they have not unlawfully used or disclosed protected information. The Minister noted the defendant would be best placed to explain their motivations when using or disclosing information, whereas to disprove the matter the prosecution would:

… need to understand the information held by the defendant, including the defendant's state of mind and motivations. This would be significantly more difficult and costly, if not impossible, for the prosecution to disprove.[41]

The Committee requested this information be added to the explanatory memorandum and stated that in light of the information provided by the Minister, it had no further comment.[42]

Delegation

The Committee additionally raised concerns about the broad delegation of administrative powers by the chief officer of ACIC.[43] The Minister advised that differences between the ACIC and AFP in the level of officer able to give an emergency authorisation reflects ‘differences in the organisational structures and staffing arrangements of those agencies’.[44] The Committee requested this information be included in the explanatory memorandum and reiterated its concerns.[45]

Policy position of non-government parties/independents

No non-government parties or independents appear to have commented on the Bill at the time of writing.

Position of major interest groups

Government agencies

The Commonwealth Ombudsman, responsible for oversight of law enforcement agencies’ use of certain covert powers, including those proposed in the Bill with respect to data disruption and account takeover warrants, has noted that the Department of Home Affairs consulted it throughout the Bill’s development and ‘incorporated the majority of our feedback’.[46] While it noted the Bill introduces oversight by the Inspector-General of Intelligence and Security (IGIS) over the AFP and ACIC in respect of network activity warrants, marking a ‘convergence of our offices’ stakeholder bases’, the Ombudsman stated it ‘considers this proposal consistent with the broader delineation of our respective roles’.[47] However, it raised concern about the consistency of certain powers across the different warrant schemes proposed in the Bill, stating:

In some instances, the Bill demonstrates a prioritisation of internal legislative consistency, rather than consistency between similar covert power types. It is our view that it may be more appropriate to align new covert powers more broadly with existing covert powers, particularly in regard to:

  • issuing officers for account takeover warrants
  • consideration of privacy impacts for data disruption warrants, and
  • requiring an affidavit in support of an account takeover warrant.[48]

The AFP supports the Bill, arguing that it will ‘enhance the options available to the AFP and the ACIC to overcome technological obstacles and take appropriate action against those who harm the Australian community’. It has stated that the proposed powers:

… while new in the context of the online environment, have an equivalent effect to existing law enforcement responses, and are appropriate when considering the complexity and increasingly global scale of cyber-enabled crime. There are also extensive oversight provisions, ensuring our use of these powers is transparent and held to a high standard.[49]

The ACIC also supports the Bill, arguing that the amendments will complement its existing powers by providing ‘new avenues to gather information and respond to serious crime occurring online and criminals using dedicated encrypted communication platforms’.[50] The ACIC stated:

While the [Telecommunications and Other Legislation Amendment (Assistance and Access) Act 2018] greatly assisted law enforcement to combat [serious and organised crime] groups at the time it was enacted, further advancements in agencies’ powers are required to meet technology developments. Criminal use of the Dark Web and anonymising technologies is a prime example of how powers available to Australian law enforcement must be updated to keep pace with developments in technology.[51]

The Inspector-General of Intelligence and Security (IGIS), which has oversight responsibilities in relation to the activities of Australia’s security agencies, noted that:

… in practice, there may not always be a clear delineation between IGIS’s oversight of the network activity warrant framework detailed in Schedule 2, and the Ombudsman’s oversight of the data disruption warrant and account takeover warrant frameworks in Schedules 1 and 3. IGIS notes, however, that the information sharing provisions, and the other provisions in Schedule 2 of the Bill, aimed at addressing concurrent jurisdiction between IGIS and other integrity bodies, is intended to ensure that the risk of duplication of oversight between IGIS and the Ombudsman is appropriately managed and minimised.[52]

The IGIS expressed concern that the ‘cascading definitions’ which determine the scope of the Bill are ‘complex and potentially unclear in scope’, and stated that this could create challenges for oversight.[53] It also raised concerns about the extent to which privacy implications may be considered in the issue of network activity warrants as well as the absence of a maximum timeframe for law enforcement agencies to report to the Minister.[54] The Office of the Australian Information Commissioner (OAIC) suggested that the Bill requires further consideration ‘to better ensure that any adverse effects on the privacy of individuals which result from these coercive powers are minimised, and that additional privacy protections are included in the primary legislation’.[55] It made seven recommendations for amendments to strengthen these protections.

Human rights, legal and civil liberties groups

A joint submission to the PJCIS inquiry by the Queensland Council for Civil Liberties, Liberty Victoria, Electronic Frontiers Australia and the Australian Privacy Foundation recommended the Bill be withdrawn, and not reintroduced until a ‘Federal enforceable human rights framework’ is introduced into Australian law.[56] It raised particular concern about the proposed data disruption warrants, arguing:

…it is a dangerous step to enable law enforcement to modify what would be evidence in a criminal proceeding. We appreciate that the intention is to frustrate and prevent the distribution of child exploitation material, as that is the example given in the Explanatory Memorandum; however, this inherently causes evidence to be altered and this needs to be addressed…

Secondly, law enforcement has a poor record of the consequences of modification or deletion of digital information. The Bill has few, if any, safeguards to protect innocent parties from adverse consequences associated with the disruption of data that may result in significant, though unintended, harm…[57]

The Law Council of Australia made a substantial submission to the inquiry, in which it expressed concern that the necessity of the proposed powers ‘has not been clearly or adequately established’, and that the Bill ‘proposes to reject a core recommendation’ of the Richardson Review, being that law enforcement agencies should not be conferred with specific cyber‑disruption powers in the nature of the proposed data disruption warrant regime.[58] The Law Council further argued that the scope of the proposed powers is ‘disproportionately broad compared to the threats of serious and organised cybercrime to which they are directed’.[59] It made 57 recommendations to amend the Bill, primarily to ensure the proportionality of the proposed measures.

The Human Rights Law Centre has similarly stated that Australia lacks a ‘robust human rights framework that would provide adequate protection against the abuse of the powers contained in this Bill’, and expressed concern about the disproportionate scope of the proposed powers and lack of evidence justifying the need for additional warrants beyond those currently available.[60]

The NSW Council for Civil Liberties has expressed concern with the breadth of the application of the proposed warrants, the ‘widening of spy agency remits to allow intelligence gathering on Australian citizens’, and the risk of abuse of power contained in the Bill.[61]

Telecommunications groups

Amazon Web Services (AWS), a cloud computing platform operating in and outside Australia, has noted that the data disruption and account takeover warrants proposed by the Bill are ‘formulated for fundamentally different objectives’ than current warrants; intended not for the purpose of gathering evidence but ‘to allow law enforcement agents to effectively stand in the (online) shoes of persons suspected of engaging in potential criminal activity’. It argues that the issue of such warrants will involve an ‘elevated risk to the liberty and privacy of citizens whose online accounts are impacted by law enforcement activities’.[62]

While not stating a clear position on the Bill, AWS made recommendations for improvements, including to clarify and constrain the scope of the assistance order powers, introduce a ‘good faith’ immunity for online account providers in relation to the execution of account takeover warrants, and restrict the power to issue warrants to judicial officers.[63]

The Communications Alliance has stated that its members (including carriers, carriage service providers, search engines and digital platforms) support the intent of the Bill, but believe that some aspects ‘require further work in order to meet the requisite tests of proportionality, effectiveness, practicality and feasibility’.[64] In particular, it recommended changes to require judicial issuing of warrants only, and for the issuing process to be ‘informed by independent technical advice’.[65]

Email provider Fastmail has expressed concern about the changes, arguing that data surveillance laws are not given effective oversight or accountability. It has called for better alignment across the different Acts which provide for coercive powers, and recommended the introduction of a consultation process where the target computer is not owned by the person suspected of the offence. It has also queried the potential interaction of the Bill with legislation relating to foreign law enforcement powers, such as the Mutual Assistance in Criminal Matters Act 1987 and the Telecommunications Legislation Amendment (International Production Orders) Bill 2020.[66]  

Twitter has stated support for the Government’s goal of disrupting bad actors and removing illegal content from the internet, but has ‘overarching concerns across the relevant sections of the Bill that these three types of warrants can be implemented without providing proper notification to service providers’.[67] Focusing primarily on account takeover warrants as most relevant to its own service, Twitter has expressed concern about the safeguards in place, noting that there is ‘no consideration or reference in the Bill of the implications of law enforcement agencies accessing a service without the knowledge of the service provider’, and about the use of magistrates rather than judges or AAT members to issue the warrants.[68] It raised concerns about the privacy concerns and rights of third party users who may interact with an account subject to an account takeover warrant, and urged the Government to ‘amend the Bill to reflect practices that are consistent with established norms of privacy, free expression, and the rule of law’.[69]

DIGI, an industry association founded by Google, Twitter and Verizon Media, argued that the Bill should be viewed as an extension of the Telecommunications and Other Legislation Amendment (Assistance and Access) Act 2018 (Assistance and Access Act) because the current Bill ‘provides law enforcement with greatly expanded powers that increases the incentive to use the tools available to them under the Assistance and Access Act’. It argued that the current reviews of the Assistance and Access Act should be completed before the Bill proceeds.[70] DIGI further argued the Bill ‘does not adhere to the principles of proportionality or necessity’, pointing to issues including the broad scope of the Bill and its potential impact on service providers, lack of provision for service provider notification of an access request; the potential impact on encryption; and lack of privacy protections and procedural fairness in place.[71]

The Australian Information Industry Association expressed support for the intent behind the legislation but recommended the Government ‘ensure that the guardrails and thresholds associated with this legislation are managed appropriately’, keeping in mind both the civil liberty implications of the Bill as well as the ‘feasibility and implications of assistance and compliance for the technology sector on both an individual and global level’.[72] It recommended amendments including the introduction of immunity from prosecution for assisting entities (and employees) who are acting in good faith, cost recovery for ‘private entities for the costs that they incur in implementing assistance orders’, and mandatory consultation with any relevant company, service provider or related entity before applying for a warrant.[73]

Other groups

The Cyber Security Co-operative Research Centre has expressed support for the measures in the Bill, arguing that while ‘undoubtably extraordinary’ they are ‘proportionate and appropriate in relation to the threat posed’ and accompanied by appropriate safeguards against the misuse of powers and legislative creep.[74]  

The Synod of Victoria and Tasmania, Uniting Church of Australia, supports the passage of the Bill, noting that it is ‘especially needed in light of technology corporations continuing to develop online tools that assist in carrying out’ serious crimes and human rights abuses facilitated online.[75] It has further stated that the AFP and ACIC must put into place policies, procedures and best practice guides to ensure full compliance with the requirements and safeguards contained within the Bill.[76]

The Carly Ryan Foundation, a harm prevention group aiming to promote internet safety and prevent crime against children, expressed support for the Government’s ‘commitment to innovating alternative pathways to reduce online crime’ and stated it supports ‘in principle the aims of the Bill to enhance law enforcement’s ability to protect children and disrupt crimes against children from occurring’. It further stated that it believes the Bill includes appropriate oversight and accountability of the warrant powers.[77]   

The Police Federation of Australia has stated it strongly supports the Bill, pointing to the need for police powers to ‘keep up with evolving criminal threats as crime is increasingly transferred to the digital world’.[78]

Concerns and commentary in respect of specific aspects of the Bill are discussed below under ‘Key issues’.

Financial implications

The Explanatory Memorandum states that the Bill will have no financial impact, as all financial impacts for the 2020–21 financial year will be met from existing appropriations. It states that any ongoing costs will be considered in future budgets.[79]

Statement of Compatibility with Human Rights

As required under Part 3 of the Human Rights (Parliamentary Scrutiny) Act 2011 (Cth), the Government has assessed the Bill’s compatibility with the human rights and freedoms recognised or declared in the international instruments listed in section 3 of that Act. The Government considers that the Bill is compatible.[80]

Parliamentary Joint Committee on Human Rights

The Parliamentary Joint Committee on Human Rights reported on the Bill on 3 February 2021.[81] The Committee noted the proposed powers and warrants in the Bill could promote multiple rights, by facilitating the investigation, disruption and prevention of serious crimes against persons, including protecting children from harm. However, the Committee also noted that the measures engage and limit other rights, in particular the right to privacy, by authorising the AFP and ACIC to take various actions which may interfere with a person’s privacy.[82] In assessing the proportionality of the measures, the Committee queried whether the safeguards in place were adequate, noting:

  • warrants may be issued not only by judicial officers but also by AAT members, who may not have all the attributes of permanent independent judicial authority[83]
  • the mandatory considerations for issuing authorities in granting warrants are not consistent across each warrant, with the issue of privacy limited to account takeover warrants and the issue of proportionality limited to network activity warrants[84]
  • it is unclear how statutory conditions on warrants which limit interference with data and property may interact with the ability for issuing authorities to specify things authorised by the warrant[85]
  • the broad range of exceptions to the statutory protections on the use or disclosure of protected information raise concerns about the adequacy of the safeguard
  • it is unclear whether the specified time of five years before which protected information must be destroyed is an appropriate period of time[86] and
  • the limited access to review and lack of provision for public interest monitors.[87]

The Committee also raised questions as to:

  • whether the measures in the Bill limit the right to an effective remedy for a person whose right to privacy is violated by the proposed warrants[88]
  • whether the provision for assistance orders is compatible with the right to privacy, noting that the issuing authority is not required to be satisfied the order is justifiable and proportionate with respect to all warrants (only data disruption warrants)[89]
  • whether, in allowing protected information obtained under the warrants to be disclosed to foreign countries in certain circumstances (such as in connection with the AFP’s existing functions under the Australian Federal Police Act 1979), the Bill interferes with the rights to privacy, life, and the prohibition against torture or cruel, inhuman or degrading treatment or punishment.[90]

The Committee stated it had not yet formed a concluded view on these matters and requested further advice from the Minister.

The Minister’s response was considered by the Committee in its report dated 17 March 2021.[91] The Minister advised:

  • by providing for the independent scrutiny of warrant applications, the Bill provides an ‘important mechanism’ in ensuring that warrants issued are reasonable and proportionate, and that the power is consistent with Australia’s international human rights obligations—however, international human rights law does not specifically require it to be a judicial authority that authorises investigatory powers. Additionally, decisions to issue a warrant are open to judicial review[92]
  • the considerations required to be taken into account by issuing authorities ‘have been specifically designed with regard to the objective and contemplated operation of each of the warrants’, each enabling some form of proportionality assessment[93]
  • the additional conditions an authority may impose go only to the conditions subject to which things may be done under the warrant (proposed subparagraph 27KD(1)(b)(ix) in the SD Act and proposed subparagraph 3ZZUQ(1)(b)(ix) of the Crimes Act); so the statutory conditions on warrants which limit interference with data and property are not overridden by any such additional conditions[94]
  • the exceptions to the restrictions on the use, recording or disclosure of protected information are designed to be limited to only that which is necessary[95]
  • the lack of provision for public interest monitors is consistent with the approach for surveillance device warrants and computer access warrants in the SD Act, with public interest monitors recognised under the TIA Act only currently existing within Victoria and Queensland[96]
  • under the Bill, persons of interest or those who are subject to the new covert warrants in the Bill do not have to be notified of the use of powers against them unless there is a specific requirement under law to do so, consistent with the practice for covert warrants under the SD Act and other relevant Commonwealth laws. While the use of a covert warrant will impact a person’s privacy, the limitation is reasonable, necessary and proportionate to safeguard the Australian community from serious crime, and balanced with strict safeguards including restrictions on the use and disclosure of information obtained under a warrant, and ‘robust oversight and reporting requirements’.[97]

The Committee concluded that ‘questions remain’ as to whether there are sufficient safeguards in place to ensure the proposed measures in the Bill are a proportionate limitation on the right to privacy, pointing in particular to the ability for AAT members to issue warrants and the absence of a requirement that privacy and proportionality be considered before all types of warrants are issued. The Committee also noted that some exceptions to the restrictions on the use and disclosure of protected information are broadly framed ‘which may weaken the safeguard value of these restrictions’, and noted the limited access to effective review given the covert nature of the powers. The Committee recommended amendments be made to assist the proportionality of the measure.[98]

On the issue of assistance orders, the Minister advised that the criteria to which the issuing authority must be satisfied prior to granting the order, reflect the criteria relevant to the supporting warrant—the Minister noted that this would ensure any activity required by the assistance order does not extend beyond the scope of the warrant.[99] The Committee recommended the strengthening of these criteria to assist the proportionality of the measure, by requiring the issuing authority to be satisfied the assistance order is ‘justifiable and proportionate, having regard to the relevant offences and the extent to which the privacy of any person is likely to be affected’.[100]   

In regard to information sharing with foreign governments, the Minister pointed to safeguards in place through the mutual assistance framework, with provision of any evidential material to a foreign country subject to the requirements of the Mutual Assistance in Criminal Matters Act 1987. The Minister also pointed to additional protections in place in the ACC Act as well as in ACIC and AFP policy.[101] The Committee concluded that questions remain about the strength of the safeguards in place and considered:

  • the proportionality of the measure with the right to privacy may be assisted by amendments to provide that when considering disclosure of protected information to a foreign country, an individual’s right to privacy is considered, and by requiring the authorised officer to be satisfied that adequate privacy protections are in place and
  • the compatibility of the measure with the right to life and the prohibition against torture or cruel, inhuman or degrading treatment or punishment may be assisted were the Bill amended to provide that where there are substantial grounds for believing there is a real risk that disclosure of information to a foreign country may expose a person to the death penalty or to torture or cruel, inhuman or degrading treatment or punishment, protected information must not be shared with that country.[102]

Key provisions

Schedule 1—Data disruption warrants

Schedule 1 of the Bill primarily amends the SD Act to provide for the issuing of data disruption warrants to allow law enforcement officers of the AFP or ACIC to obtain access to data held in a target computer and ‘disrupt’ this data, in order to frustrate the commission of a relevant offence. Item 13 of Schedule 1 inserts proposed Division 5 in Part 2 of the SD Act, setting out the requirements and features of such warrants.

The SD Act does not currently contain any simplified outlines to explain the provisions of the SD Act, and the Bill does not propose to insert a simplified outline for proposed Division 5 of Part 2.

What the warrant authorises

A data disruption warrant authorises the doing of specified things in relation to a ‘target computer’. These include using the computer, a telecommunications facility or other electronic equipment or data storage device to:

  • obtain access to data held in the target computer to determine whether it is covered by the warrant and
  • ‘disrupt’ this data at any time while the warrant is in force, where doing so is likely to assist in frustrating the commission of one or more relevant offences.[103]

Disrupting data held in a computer is defined as adding, copying, deleting or altering data held in the computer.[104]

The warrant may also authorise (amongst other things):

  • adding, copying, deleting or altering other data in the target computer, if necessary, to achieve one of the above purposes
  • using another computer or a communication in transit to access or disrupt the relevant data (if it is reasonable to do so)
  • intercepting a communication passing across a telecommunications system for the purpose of doing any thing specified in the warrant and
  • any other reasonably incidental thing.[105]

The warrant also authorises the doing of any thing reasonably necessary to conceal the fact that a thing has been done under the warrant.[106]

The warrant must authorise the use of necessary and reasonable force to do the things specified in the warrant, and must state whether entry to premises (where permitted) is authorised to be made at any time of the day or night, or only during stated hours.[107]

Restrictions on interference with lawful use of computer

The warrant may not authorise the disruption of data, or doing of a thing, that is likely to materially interfere with, interrupt or obstruct a communication in transit or other persons’ lawful use of a computer, unless it is necessary to do one or more of the things specified in the warrant. The warrant also may not cause other material loss or damage to other persons lawfully using a computer unless the loss or damage is ‘justified and proportionate’, having regard to the offences covered by the warrant.[108]

The Department states that while the SD Act already provides for computer access warrants which authorise similar activities, the purpose of the data disruption warrant is different:

Computer access warrants in the Surveillance Devices Act allow access to a computer but only for the purpose of gathering evidence. Data disruption warrants allow agencies to proactively remove content or redirect activity in order to prevent further harm from occurring. Unlike other warrants, the main purpose of activity undertaken through data disruption is not gathering evidence for a prosecution, but rather frustrating the commission of further offences.[109]

The AFP has stated that the warrants will provide it with ‘additional tools to be proactive in targeting and frustrating serious offending’, arguing that in situations where there are otherwise limited opportunities to identify, arrest and prosecute offenders, due to the lack of evidence or data to connect the offending to a specific location or individual, ‘the only option may be to take proactive disruptive action rather than investigative action, to prevent the continuation of the criminal activity’.[110]

Relevant offences

The term relevant offence is already defined under subsection 6(1) of the SD Act, and includes the following:

  • a federal offence, or state offence with a federal aspect,[111] punishable by a maximum term of at least three years imprisonment
  • certain specified offences under the Financial Transaction Reports Act 1988, Anti-Money Laundering and Counter-Terrorism Financing Act 2006, Fisheries Management Act 1991 and Torres Strait Fisheries Act 1984 and
  • an offence prescribed by the Regulations.[112]

This means that while most offences falling within the scope of the definition will be punishable by at least three years’ imprisonment, the Government may make Regulations prescribing any other offence as being a ‘relevant offence’.

Application requirements

Proposed section 27KA sets out the application requirements for a data disruption warrant. A law enforcement officer[113] of the AFP or ACIC may apply to an eligible Judge[114] or to a nominated AAT member[115] for the warrant if they suspect on reasonable grounds:

  • one or more relevant offences of a particular kind have been, are being, are about to be or are likely to be committed
  • those offences involve or are likely to involve data held in a target computer[116] and
  • disruption of data held in the target computer is likely to substantially assist in frustrating the commission of one or more relevant offences.

An application must usually be accompanied by an affidavit setting out the grounds on which the warrant is sought.[117] However, the affidavit requirement may be postponed by 72 hours after the making of the application in circumstances where immediate disruption of data is likely to ‘substantially assist’ in frustrating the commission of the relevant offence, and it is impracticable for an affidavit to be prepared or sworn before the warrant application is made.[118]

A target computer does not have to be a particular, identified computer—proposed subsection 27KA(6) states that it may be a particular computer, a computer on particular premises, or a computer associated with, used by or likely to be used by, a person (whose identity may or may not be known).

Issuing and revoking of warrant

To issue a data disruption warrant, an eligible Judge or nominated AAT member must be satisfied:

  • there are reasonable grounds for the suspicion founding the warrant application
  • the disruption of data to be authorised is justifiable and proportionate, having regard to the relevant offence(s)
  • in the case of an unsworn application, it would have been impracticable for an affidavit to have been sworn or prepared before the application was made and
  • in the case of a remote application,[119] it would have been impracticable for the application to have been made in person.[120]

Proposed subsection 27KC(2) sets out matters to which the Judge or AAT member must have regard in determining whether the warrant should be issued. These include the nature and gravity of the conduct; the likelihood that the authorised disruption will frustrate the commission of the relevant offence(s); the existence of any alternative means of frustrating the commission of the relevant offence(s); and any previous data disruption warrant issued in respect of the offence.

A warrant may only be issued for up to 90 days, though this can be extended by up to 90 days at a time on application by a law enforcement officer.[121] An eligible Judge or nominated AAT member may also vary any of the other terms of the warrant on application by a law enforcement officer.[122]

A data disruption warrant may be revoked by an eligible Judge or nominated AAT member on their own initiative at any time.[123] Where the chief officer of the relevant law enforcement agency is satisfied that access to, and disruption of data under the warrant is no longer required, they must revoke the warrant and take steps to ensure that access to and disruption of data is discontinued.[124]

Emergency authorisations

The SD Act currently provides for the issuing of emergency authorisations in lieu of warrants in certain circumstances, and for a limited period of time. Item 15 of Schedule 1 inserts proposed subsection 28(1C) to enable an AFP or ACIC officer to apply for emergency authorisation for the disruption of data, if the officer reasonably suspects:

  • an imminent risk of serious violence to a person or substantial damage to property exists
  • disruption of data is immediately necessary for the purpose of dealing with that risk
  • the circumstances are so serious and the matter is of such urgency that the disruption is warranted and
  • it is not practicable in the circumstances to apply for a data disruption warrant.

An application is made to an appropriate authorising officer,[125] who may give the emergency authorisation if satisfied there are reasonable grounds for the suspicion founding the application.[126] An emergency authorisation for disruption of data held in a computer is subject to the following conditions:

  • the authorisation must not be executed in a manner that results in damage to data, unless the damage is justified and proportionate, having regard to the risk of serious violence or substantial damage and
  • the authorisation must not be executed in a manner that causes a person to suffer a permanent loss of money, digital currency or property (other than data).[127]

The emergency authorisation may authorise anything that a data disruption warrant may authorise.[128]

Subsequent approval by Judge/AAT member

Existing subsection 33(1) provides that within 48 hours of an emergency authorisation being given, the appropriate authorising officer must apply to an eligible Judge or nominated AAT member for approval of the authorisation.

An eligible Judge or nominated AAT member may approve the emergency authorisation under proposed section 35B if satisfied there were reasonable grounds to suspect: a risk of serious violence to a person or substantial damage to property; disruption of data held in the target computer mentioned ‘may have helped to reduce the risk’; and it was not practicable in the circumstances to apply for a warrant.

If the Judge or AAT member does approve the giving of the emergency authorisation, they may issue a data disruption warrant that provides for the continued access to, and disruption of, data held in the relevant target computer, as if it were a standard application for a data disruption warrant. However, if satisfied that since the application for emergency authorisation, the activity that required access to, and disruption of data, has ceased, they may order the access and disruption activities also cease.[129]

If the Judge or AAT member does not approve the authorisation, they may order that access to, and disruption of data held in the relevant target computer cease.[130] While they may also order that any information obtained from the exercise of powers under the emergency authorisation be dealt with in a specified manner, they may not require the information be destroyed.[131] Furthermore, even if not satisfied that an emergency authorisation was warranted at the time of the application, the Judge or AAT member may issue a data disruption warrant if they are of the view that it is currently justified.[132]

Protected information offences

Part 6, Division 1 of the SD Act provides for restrictions on the use, communication and publication of protected information—this is defined under existing section 44, and includes any information obtained from the use of a surveillance device under a warrant or emergency authorisation, or obtained from access to data under a computer access warrant or emergency authorisation, as well as information relating to applications for, and issue of, such warrants/authorisations. It also includes information obtained by a law enforcement officer without the authority of—and in contravention of the requirement for—a warrant or authorisation.

A person commits an offence if they use, record, communicate or publish any protected information otherwise than as permitted by the SD Act. This is punishable by imprisonment for a maximum of two years, with an aggravated offence, punishable by imprisonment for a maximum of ten years, where the use, recording, communication or publication of the information endangers the health or safety of any person or prejudices the effective conduct of an investigation into a relevant offence.[133]

Item 28 of Schedule 1 amends section 44 to provide that protected information also includes any information (other than data disruption intercept information) obtained from access to, or disruption of data under, a data disruption warrant or relevant emergency authorisation.[134] Item 31 of Schedule 1 extends the definition to information obtained extraterritorially, purportedly under a data disruption warrant or emergency authorisation, but which does not comply with the requirements in respect of foreign country agreements (discussed further below).

Item 35 of Schedule 1 inserts proposed subsection 45(6A) which permits the communication of protected information by an Ombudsman official to an IGIS official for the purpose of the IGIS official exercising powers, or performing functions or duties, as an IGIS official.

Use as evidence

Proposed section 65C, inserted by item 51 of Schedule 1, provides that evidence obtained from access to, or disruption of data, under either a data disruption warrant or emergency authorisation, is admissible as evidence in a proceeding relating to a relevant offence.[135]

Records and reporting requirements

Secure record keeping

Existing section 46 of the SD Act requires records or reports comprising protected information to be kept in a secure place that is not accessible to people who are not entitled to deal with the record or report. Any such report or record must be destroyed as soon as practicable if it is not required for a civil or criminal proceeding or other authorised usage, or otherwise within five years after the making of the record or report. Items 36 to 38 of Schedule 1 amend section 46 to extend these requirements to data disruption intercept information.

Reporting to Minister and Ombudsman

Existing provisions in the SD Act require law enforcement agencies to report to the Minister on warrants issued and authorisations given under the Act,[136] and to notify the Ombudsman of certain things done under control order, control order access and computer access warrants.[137]

Item 40 of Schedule 1 inserts proposed subsection 49(2D) which sets out specific matters which must be included in a report to the Minister in relation to a data disruption warrant or emergency authorisation for disruption of data held in a computer. This includes:

  • the names of any persons involved
  • the benefit of the use of the warrant or authorisation in frustrating criminal activity
  • details of the access to, and disruption of, data under the warrant or authorisation and
  • compliance with any applicable conditions.

Item 41 of Schedule 1 inserts proposed section 49C to require the chief officer of a law enforcement agency to notify the Ombudsman of the issuing of a data disruption warrant if a thing mentioned in proposed subsection 27KE(2) (which sets out all activities which may be specified under the warrant) has been done. The notification must be done within seven days of the relevant thing done.

The AFP and Australian Crime Commission must also include in their annual report the kinds of offences targeted by data disruption warrants issued during the year in response to applications made by or on behalf of law enforcement officers of the agency.[138]

Protection of data disruption technologies or methods

Proposed section 47B provides that in a proceeding, a person may object to the disclosure of information on the grounds that the disclosure could ‘reasonably be expected to reveal details of data disruption technologies or methods’.[139] The person conducting or presiding over the proceeding may order that the information is not required to be disclosed if they are satisfied the ground of objection is made out, taking into account whether disclosure of the information is necessary for the fair trial of the defendant, or is in the public interest.[140]

If so satisfied, the person presiding over or conducting the hearing is required to make orders prohibiting or restricting publication of information that could reasonably be expected to reveal details of data disruption technologies or methods, except to the extent that the person considers the interests of justice require otherwise.[141]

This is the equivalent to existing provisions of the SD Act aimed at protecting surveillance device and computer access technologies and methods.[142]

Schedule 2—Network activity warrants

Schedule 2 primarily amends the SD Act to provide for the issuing of network activity warrants, authorising the AFP or ACC to access data held in computers that will substantially assist in the collection of intelligence that relates to criminal networks of individuals.

Item 9 of Schedule 2 inserts proposed Division 6 into Part 2 of the SD Act, dealing with the issuing of a network activity warrant.

What the warrant authorises

A network activity warrant authorises the doing of specified things in relation to a target computer. These may include:

  • entering specified premises and
  • using the target computer, a telecommunications facility, any other electronic equipment or a data storage device

for the purpose of obtaining access to data held in the target computer at any time while the warrant is in force, to determine whether the relevant data is covered by the warrant.[143] Data is covered by a warrant if access will substantially assist in the collection of intelligence in relation to the group and/or offences in relation to which the warrant applies.[144]

If necessary to achieve this purpose, the warrant may authorise adding, copying, deleting or altering other data in the target computer. Where reasonable in all the circumstances, having regard to any other equally effective methods of obtaining access to relevant data, the warrant may also authorise using any other computer or a communication in transit (including adding, copying, deleting or altering other data in the computer or communication) to access the relevant data.[145] It may also authorise intercepting communications, using surveillance devices, removing computers or other things from premises, for the purposes of doing any thing specified in the warrant, and may authorise any other reasonably incidental thing.[146]

As with a data disruption warrant, a network activity warrant must authorise the necessary and reasonable use of force against people and things, and if authorising entry to premises, must state whether this is confined to stated hours of the day or night or whether entry is authorised at any time.[147]

Action which cannot be authorised

The warrant may not authorise the addition, deletion or alteration of data, or doing of a thing, that is likely to materially interfere with, interrupt or obstruct a communication in transit or other persons’ lawful use of a computer, unless it is necessary to do one or more of the things specified in the warrant. The warrant also may not cause other material loss or damage to other persons lawfully using a computer—unlike under a data disruption warrant, there is no qualification that such loss or damage be permitted if it is ‘justified and proportionate’.[148]

The Department provides the following explanation of how a network activity warrant is different from existing warrants:

Existing warrants, such as computer access warrants in the Surveillance Devices Act, allow the collection of evidence, rather than intelligence. Network activity warrants allow agencies to target criminal networks about which very little is known to discover the scope of the network and its offending. Network activity warrants provide a discovery tool that can be used in conjunction with other investigatory powers to further a single investigation.[149]

Application requirements

Proposed section 27KK sets out the application requirements—the chief officer of the AFP or ACIC may apply to an eligible Judge or nominated AAT member for a warrant if they suspect on reasonable grounds:

  • a group of individuals is a criminal network of individuals and
  • access to data held in a computer used (or likely to be used) from time to time, by any of the individuals in the group will substantially assist in the collection of intelligence relating to the group or any of its members, which is relevant to the prevention, detection or frustration of one or more kinds of relevant offences.

For the purposes of the warrant application, it is immaterial whether: the identities of individuals in the group can be ascertained; the target computer or its location can be identified; or there are likely to be changes from time to time in the group’s composition.[150]

A warrant application must usually be accompanied by an affidavit setting out the grounds on which it is sought. However, the application may be made before an affidavit is prepared or sworn if the chief officer of the AFP or ACIC believes that immediate access to data held in the target computer will substantially assist in the collection of the relevant intelligence, and it is impracticable for an affidavit to be prepared or sworn before a warrant application is made.[151] The affidavit must subsequently be provided within 72 hours of making the application, whether or not the warrant has been issued.[152]

Criminal network of individuals

A criminal network of individuals is defined as a group of two or more individuals who are ‘electronically linked’ (each using the same electronic service as at least one other member in the group and/or communicating electronically with at least one other individual in the group) where one or more individuals in the group:

  • have engaged, are engaging or are likely to engage in conduct that constitutes a relevant offence or
  • have facilitated, are facilitating, or are likely to facilitate, the engagement by another person (whether or not they are in the group), in conduct that constitutes a relevant offence.

It is immaterial for the purpose of this definition, whether or not the identities of individuals in the group or the details of the relevant offences can be ascertained, or whether there are likely to be changes, from time to time, in the group’s composition.[153]

Issuing and revoking of warrant

An eligible Judge or nominated AAT member may issue a network activity warrant if they are satisfied of the following:

  • there are reasonable grounds for the suspicion founding the warrant application
  • in the case of an unsworn application—it would have been impracticable for an affidavit to be prepared or sworn before the application was made and
  • in the case of a remote application—it would have been impracticable for the application to have been made in person.[154]

In determining whether the warrant should be issued, the Judge or member must have regard to matters specified in proposed subsection 27KM(2)—these include the nature and gravity of the conduct constituting the kinds of offences in relation to which information will be obtained under the warrant; the extent to which access to data will assist in the collection of relevant intelligence; the proportionality of things authorised by the warrant against the likely intelligence value of any information sought to be obtained; the extent to which the execution of the warrant is likely to result in access to data of persons who are lawfully using a computer; and any previous network activity warrant issued in relation to the same group.

A warrant may only be issued for a maximum of 90 days,[155] though may be extended for a further 90 days multiple times.[156] An eligible Judge or nominated AAT member may also vary any of the terms of the warrant on application by a law enforcement officer.[157]

A network activity warrant may be revoked by an eligible Judge or nominated AAT member on their own initiative at any time.[158] Where the chief officer of the law enforcement agency is satisfied that access to data under the warrant is no longer required, they must revoke the warrant and take steps to ensure that access to data is discontinued.[159]

Protected information offences

Information obtained from access to data or use of a surveillance device under a network activity warrant (other than network activity warrant intercept information) is classified as protected network activity warrant information.[160] This term also captures: information relating to the warrant itself (such as application or expiry information); any information likely to enable identification of a criminal network of individuals (or individuals within the network) or a computer or premises specified in the warrant; or any other information obtained by a law enforcement officer in contravention of the requirement for a network activity warrant.[161]

Offences

It is an offence for a person to use, record, communicate or publish protected network activity warrant information other than as permitted under the SD Act, with a maximum penalty of two years’ imprisonment.[162] It is an aggravated offence, punishable by a maximum penalty of ten years’ imprisonment, where the use, recording, communication or publication of information:

  • endangers the health or safety of any person or
  • prejudices the effective conduct of an investigation into a relevant offence.[163]

Permitted use and disclosure

Proposed subsections 45B(4)–(10) set out circumstances in which protected network activity warrant information may be used, recorded or disclosed, without contravening one of the offence provisions. This includes:

  • where the information has been lawfully disclosed in proceedings in open court[164]
  • where the person believes that use or communication of the information is necessary to help prevent or reduce the risk of serious violence to a person or substantial damage to property[165]
  • where the communication is to the agency head of ASIO or an intelligence agency and is of information that relates or appears to relate to any matter within the functions of that organisation/agency[166]
  • for the collection, correlation, analysis or dissemination of criminal intelligence by the AFP or ACIC (other than where information was obtained from the use of a surveillance device under the warrant) or the making of reports in relation to criminal intelligence[167]
  • for the purposes of an IGIS official exercising powers or performing functions or duties in that capacity[168]
  • during the making of an application for a warrant (or for the variation or extension of a warrant)[169]
  • where the information is communicated between an Ombudsman official and IGIS official in their official capacities.[170]

Use as evidence

Protected network activity warrant information may not be admitted in evidence in any proceedings, other than as permitted under proposed section 45B.[171] In particular, proposed subsection 45B(10) provides that it may be admitted in evidence in:

  • a criminal proceeding for an offence against proposed subsections 45B(1) or (2) (relating to the unlawful use or disclosure of protected network activity warrant information) or
  • a proceeding that is not a criminal proceeding.[172]

Other exceptions include where

  • it is in connection with the administration or execution of the SD Act[173] or
  • it is necessary to do so for any of the purposes set out in proposed subsection 45B(5)—these include: in connection with a warrant application, or in a proceeding relating to an unlawful use or disclosure offence under proposed subsections 45B(1) or (2).

Records and reporting requirements

Network activity warrants are subject to similar record-keeping and reporting requirements under the SD Act to those which apply to data disruption warrants.

Proposed section 46AA, inserted by item 20 of Schedule 2, requires the chief officer of the AFP and ACIC to keep records and reports comprising protected network activity warrant information or network activity warrant intercept information in a secure place not accessible to people not entitled to deal with the record or report. Any such report or record must be destroyed as soon as practicable if it is not required for a civil or criminal proceeding or other authorised usage, or otherwise within five years after the making of the record or report. Proposed subsection 46AA(2) imposes the same requirements on other agencies which receive records or reports obtained in connection with a network activity warrant (other than the IGIS).

Schedule 3—Account takeover warrants

Schedule 3 amends the Crimes Act to provide for the issuing of account takeover warrants, authorising the AFP or ACIC to take control of an online account. Item 4 of Schedule 3 inserts proposed Part IAAC into the Crimes Act which contains the framework for issuing, using and monitoring account takeover warrants.

What the warrant authorises

An account takeover warrant must authorise the doing of specified things in relation to a target account.[174] It may authorise:

  • taking control of a target account at any time while the warrant is in force and
  • using a computer, a telecommunications facility, any other electronic equipment or a data storage device for this purpose

if doing so is necessary, in the course of the investigation to which the warrant relates, for the purpose of enabling evidence to be obtained of the commission of the alleged relevant offence(s) in respect of which the warrant was issued.[175]

Proposed section 3ZZUL provides that a person takes control of an online account if they take one or more steps that result in them having exclusive access to the account. The provision provides examples of such steps:

  • using existing account credentials (such as a username, password or PIN, security question or answer or biometric form of identification)[176] to alter one or more account credentials
  • removing a requirement for two-factor authentications and
  • altering the kinds of account credentials required to access or operate the account.

If necessary for the purpose of taking control of the target account, the warrant may also authorise:

  • accessing account-based data to which the target account relates
  • adding, copying, deleting or altering account credentials to which the target account relates or
  • adding, copying, deleting or altering data in a computer.[177]

It may also authorise:

  • using a communication in transit—and if necessary, adding, copying, deleting or altering data in the communication—if, having regard to other methods of taking control of the target account which are likely to be as effective, it is reasonable in all the circumstances to do so[178]
  • copying any relevant account-based data covered by the warrant and to which the target account relates, or copying any account credentials to which the target account relates[179]
  • any other reasonably incidental thing[180] and
  • any thing necessary to conceal the fact that a thing has been done under (or in relation to) the warrant.[181]

Action which cannot be authorised

The warrant may not authorise the addition, deletion or alteration of data, or doing of a thing, that is likely to materially interfere with, interrupt or obstruct a communication in transit or other persons’ lawful use of a computer, unless it is necessary to do one or more of the things specified in the warrant. The warrant also may not cause other material loss or damage to other persons lawfully using a computer—unlike under a data disruption warrant, there is no qualification that such loss or damage be permitted if it is ‘justified and proportionate’.[182]

The Department provides the following explanation of how the account takeover warrants are intended to be used in conjunction with existing powers:

There is no other explicit power in the Crimes Act authorising an officer to take control of an online account. The account takeover power only authorises the taking control of the account. If the agency needs to use the account in order to conduct other activities, such as using the account to represent themselves as the original account holder and communicate with others, another appropriate authorisation or warrant will have to be sought. Account takeover warrants are intended to be used in conjunction with other powers, for example controlled operations.[183]

Relevant offences

Relevant offence is defined in proposed section 3ZZUK as a ‘serious Commonwealth offence’ or ‘serious State offence that has a federal aspect’. These terms take on the same meaning as they have under existing Part IAB of the Crime Act, relating to controlled operations.

Existing section 15GE defines a serious Commonwealth offence as a Commonwealth offence that is punishable on conviction by imprisonment for a period of three years or more, and which involves a matter mentioned in subsection 15GE(2). This includes a wide range of matters, including theft, fraud, tax evasion, currency violations, controlled substances, illegal gambling, extortion, money laundering, bribery or corruption of a public official, bankruptcy and company violations, harbouring of criminals, forgery, illegal importation or exportation of fauna, espionage, sabotage or threats to national security, misuse of a computer or electronic communications, people smuggling, dealings in child abuse material, violence, and firearms. It also includes a matter prescribed by the regulations for the purpose of the provision. Subsection 15GE(3) further specifies that certain terrorism and child sex offences under the Criminal Code Act 1995 are ‘serious Commonwealth offences’.

A serious State offence that has a federal aspect means a State offence that has a federal aspect and which would be a serious Commonwealth offence if it were a Commonwealth offence.[184] State offences have a federal aspect where they potentially fall within Commonwealth legislative power (either because of the elements of the offence or the circumstances in which it was committed), or where the AFP’s investigation of them is incidental to its investigation of a Commonwealth or Territory offence.[185]

Application requirements

A law enforcement officer of the AFP or ACIC[186] may apply to a magistrate for the issue of an account takeover warrant if they suspect on reasonable grounds:

  • one or more relevant offences have been, are being, are about to be or are likely to be committed
  • an investigation into those offences is being, will be, or is likely to be conducted and
  • taking control of one or more online accounts (the ‘target accounts’) is necessary, in the course of that investigation, for the purpose of enabling evidence to be obtained of the commission of those offences.[187]

An application may be made by way of written application or, where the applicant has reason to believe the delay caused by making a written application may affect the success of the investigation, orally in person, or by telephone, email, fax or any other means of communication.[188] Regardless of the means by which the application is made, it must provide sufficient information to enable the magistrate to decide whether or not to issue the warrant.[189]

Issuing and revoking of warrant

A magistrate may issue an account takeover warrant if satisfied there are reasonable grounds for the suspicion founding the application for the warrant.[190] Proposed subsection 3ZZUP(2) sets out matters to which the magistrate must have regard in deciding whether a warrant should be issued—these include:

  • the nature and gravity of the alleged relevant offence(s) in respect of which the warrant is sought
  • the existence of any alternative means of obtaining the evidence sought to be obtained
  • the extent to which the privacy of any person is likely to be affected
  • the likely evidentiary value of any evidence sought to be obtained and
  • any previous account takeover warrant sought or issued in connection with the same online account or same alleged relevant offence(s).

A warrant may only be issued for up to 90 days, though can be extended for a further 90 days multiple times.[191]

A magistrate may vary the terms of a warrant on application by a law enforcement officer,[192] and may revoke a warrant on their own motion.[193] The chief officer of the relevant law enforcement agency must also revoke the warrant if satisfied that taking control of the account is no longer required.[194] If an account takeover warrant ceases to be in force, and it is lawful for the account holder to operate the account, the executing officer must take all reasonable steps to ensure the account holder is able to do so.[195]

Emergency authorisations

Proposed Division 3 of proposed Part IAAC provides for the issuing of emergency authorisations. These are similar to the emergency authorisations provided for in respect of data disruption warrants. A law enforcement officer may apply to an appropriate authorising officer for an emergency authorisation to take control of an online account, if in the course of an investigation into one or more relevant offences, the law enforcement officer reasonably suspects:

  • an imminent risk of serious violence to a person or substantial damage to property exists
  • taking control of the account is immediately necessary for the purpose of dealing with that risk
  • the circumstances are so serious and the matter is of such urgency that taking control of the account is warranted and
  • it is not practicable in the circumstances to apply for an account takeover warrant.[196]

The appropriate authorising officer may give the emergency authorisation if satisfied there are reasonable grounds for the suspicion founding the application.[197] An emergency authorisation is subject to the following conditions:

  • the authorisation must not be executed in a manner that results in damage to data, unless the data is justified and proportionate, having regard to the risk of serious violence or substantial damage to property and
  • the authorisation must not be executed in a manner that causes a person to suffer a permanent loss of money, digital currency or property (other than data).[198]

The emergency authorisation may authorise anything that an account takeover warrant may authorise.[199]

Subsequent approval by magistrate

The appropriate authorising officer must apply to a magistrate for approval of the authorisation within 48 hours of giving it.[200] Proposed section 3ZZVB sets out matters to which the magistrate must have regard before deciding the application for approval, ‘being mindful of the intrusive nature of taking control of the online account’.

The magistrate may either:

  • give the approval, if satisfied there were reasonable grounds to suspect that there was a risk of serious violence or substantial property damage, taking control of the online account may have helped reduce the risk and it was not practicable in the circumstances to apply for a warrant—and either:
    • issue an account takeover warrant as if the application for approval were an application for the warrant or
    • order the cessation of taking control of the online account, if satisfied the activity that required this has now ceased or
  • not approve the giving of the authorisation, in which case the magistrate may either:
    • order the cessation of taking control of the online account or
    • if of the view that the situation has changed such that the use of an account takeover warrant is now justified, issue a warrant as if the application for approval were an application for the warrant.[201]

The magistrate may make orders regarding the information obtained from or in relation to the exercise of powers under the emergency authorisation; however, they are not able to order the destruction of the information.[202]

Proposed section 3ZZVD provides that if an emergency authorisation is approved by a magistrate, any evidence obtained under it is not inadmissible in any proceeding only because the evidence was obtained prior to the approval.

Protected information offences

Proposed section 3ZZVH contains offences for unauthorised use or disclosure of protected information. The base offence is punishable by a maximum of two years’ imprisonment, while the aggravated offence (where the use or disclosure endangers the health or safety of any person, or prejudices the effective conduct of an investigation into a relevant offence) is punishable by a maximum of ten years’ imprisonment.

Protected information is any information obtained under an account takeover warrant or emergency authorisation, or information relating to the process of obtaining the warrant/authorisation.[203]

Proposed subsections 3ZZVH(3)–(5) set out the exceptions to the offence—that is, the circumstances in which the use or disclosure of protected information is permitted. This includes use or disclosure in connection with the AFP’s and ACIC’s functions; by a person who reasonably believes it to be necessary to help prevent or reduce the risk of serious violence to a person or substantial damage to property; in connection with legal proceedings arising out of or related to proposed Part IAAC; or in connection with the performance of functions or duties, or the exercise of powers, by a law enforcement officer or intelligence agency head/staff member; and for the purposes of the admission of evidence in a proceeding that is not a criminal proceeding.

Protection of account takeover technologies and methods

Proposed section 3ZZVK provides that in a proceeding, a person may object to the disclosure of information on the ground that its disclosure could reasonably be expected to reveal details of account takeover technologies or methods. The person presiding over the hearing, if satisfied the ground of objection is made out, may order that it not be disclosed. However, they must take into account whether disclosure is necessary for the fair trial of the defendant or is in the public interest.

This provision is similar to that proposed in respect of the disclosure of data disruption technologies and methods, discussed above.

Records and reporting requirements

Record keeping

The chief officer of the AFP or ACIC is required to secure every record or report comprising protected information, and ensure they are not accessible to people not entitled to deal with them. Any such record or report must be destroyed:

  • as soon as practicable after being made, if the chief officer is satisfied that no related civil or criminal proceeding has been or is likely to be commenced, and the material contained in the record or report is not likely to be required for another permitted purpose and
  • within five years of being made, and within each five years thereafter, unless, before the end of that period, the chief officer is satisfied that it is still required for one of the purposes above and certifies to that effect.[204]

The chief officers are also required to retain copies of all applications made for account takeover warrants, emergency authorisations and assistance orders, orders made, and relevant records.[205] 

Reporting

The chief officer of the AFP and ACIC must report every six months to the Minister and the Ombudsman on matters specified under proposed section 3ZZVL. These include:

  • the number of applications for account takeover warrants (and variations to warrants) made during the previous six months, and the number of applications approved and refused, as well as relevant dates of these
  • the number of warrants revoked during the previous six months, and dates of the revocations
  • for each warrant ceasing during the period—the date it ceased to be in force, whether it expired or was revoked, whether it was executed (and if so, details of this, including the benefit of the execution to the investigation of the relevant offence, and how the information obtained under the warrant was used), and if it was not executed, the reason for this
  • the number of applications for emergency authorisations made, and number of authorisations given or refused during the period, and the dates of these.

The chief officers must also report annually to the Minister providing account takeover warrant data from the previous financial year. This includes the types of relevant offences in respect of which warrants or emergency authorisations were sought, the number of arrests made on the basis (wholly or partly) of information obtained under warrants/authorisations, and the number of prosecutions commenced for relevant offences in which information obtained under warrants/authorisations was given in evidence (and the number in which a person was found guilty).[206]

Register of warrants

Proposed section 3ZZVP requires the chief officer of the AFP and ACIC to keep a register of applications for account takeover warrants and emergency authorisations made by the agency. This is to contain details including the date, the nature of the application, the name of the magistrate who issued or refused to issue the warrant/authorisation, name of the applicant, and details of any warrants/authorisations issued.

The register is specified not to be a legislative instrument.[207] The Explanatory Memorandum notes that this is intended to provide an overview for the Ombudsman who has the power to inspect records in respect of account takeover warrants.[208] This appears largely the same as the register requirements under existing section 53 of the SD Act, which will apply to data disruption and network activity warrants.

Compensation

Proposed section 3ZZWA provides that the Commonwealth is liable to pay compensation if a person suffers loss of or serious damage to property, or personal injury, in the course of or as a direct result of the execution of an account takeover warrant.  

This does not apply if the person suffered the loss, damage or injury in the course of, or as a direct result of, engaging in any criminal activity.[209]

Schedule 4—Controlled operations

Currently, Division 2 of Part IAB of the Crimes Act sets out the requirements for authorisation of controlled operations. This includes a requirement that, in granting or varying authority to conduct a controlled operation, an authorising officer (or where applicable, the AAT) must be satisfied that the operation will be conducted:

…in a way that ensures that, to the maximum extent possible, any illicit goods involved in the controlled operation will be under the control of an Australian law enforcement officer at the end of the controlled operation.[210]

Schedule 4 amends these provisions to specify that such a requirement does not apply to the extent that the controlled operation is conducted online, with the effect of this being that illicit goods or content involved in an online operation do not have to be under the control of law enforcement at the operation’s completion. The Explanatory Memorandum states that the amendments acknowledge:

…how easy data is to copy and disseminate, and that there may be limited guarantee that all illegal content (the illicit goods) will be under law enforcement’s control at the end of an operation conducted online.[211]

Key issues

Scope of Bill

Definition of relevant offence

The threshold for bringing offences within the scope of the warrant regimes has been a concern raised by the Scrutiny of Bills Committee and various stakeholders.

The Human Rights Law Centre (HRLC) has questioned the scope of the offences, disputing the claim in the Explanatory Memorandum that they target ‘activity of the most serious nature’.[212] The HRLC argues that the range of offences for which warrants may be sought is much broader than this, with the definitions of ‘relevant offence’ in both the SD Act and Crimes Act being sufficiently broad to capture ‘relatively minor criminal activities, such as theft, as well as the activities of individuals acting in the public interest, such as whistleblowers’.[213] It has recommended the Bill be amended to increase the maximum term of imprisonment specified in the definition of relevant offence, to ensure warrants are only available where their use is proportionate to the severity of the alleged offence.[214]

The joint submission to the PJCIS inquiry by the Queensland Council for Civil Liberties, Liberty Victoria, Electronic Frontiers Australia and the Australian Privacy Foundation (joint civil liberties submission) similarly pointed to the broad definition of relevant offence in the Crimes Act and expressed concern that the Bill’s powers will operate in contexts other than just national security. It recommended the definition be redrafted to include an exhaustive list of specific serious offences, and noted:

We respectfully accept that some of these offences may warrant the use of intrusive law enforcement power; however, we do not accept that the significant power authorised by the Bill should be applied to an existing definition of “serious commonwealth offence”. More specifically, we do not accept that State-authorised hacking is appropriate in the context of tax or bankruptcy offences. We are also concerned that the Bill’s operation can be further expanded by the executive, through the regulations prescribing a “relevant offence”.[215]

The NSW Council for Civil Liberties similarly recommended the application of the proposed warrants be restricted to the specific offences ‘which are ostensibly the areas of concern as set out by the Minister’: child sexual abuse, terrorism, trafficking of drugs and firearms.[216]

The Cyber Security Cooperative Research Centre considers that the three year minimum term of imprisonment is ‘sufficiently high and is indicative of serious criminal offending’. However, it also notes that under the Crimes Act the threshold ‘does cover a wide range of offences’, and suggests that consideration should be given within the legislation to clearly specify types of crime to which the warrants could apply.[217]

The Scrutiny Committee suggested that in light of the broad scope of the offences captured by the Bill, it should be an express requirement that the issuing authority for a warrant consider proportionality in deciding whether to issue the warrant, to ensure that the significant coercive powers authorised under the proposed warrants are only exercised where necessary and appropriate.[218]

Criminal network of individuals

The HRLC has raised concerns about the scope of the proposed network activity warrants, which authorise access to data held in a computer used (or likely to be used) from time to time, by any of the individuals in a criminal network of individuals. The HRLC has argued that the definition of this term (and the related definition of electronically linked network of individuals), outlined above under Key provisions, is ‘absurdly broad’. Its submission to the PJCIS inquiry notes:

On a broad, but not unreasonable, interpretation of these definitions, the effect is that a person who visits the same website as a person engaging in conduct facilitating or constituting a relevant offence is in a “criminal network of individuals”. This is regardless of whether the website or communication bears any relation to the offence, or whether the individuals have any knowledge of, involvement in or connection to the offence.[219]

The HRLC has argued that these definitions effectively mean that where a person engages in a relevant offence, every other user of any website they access, or app installed on their phone, ‘could potentially have their data accessed, changed or deleted, without their knowledge, consent or opportunity to object’.[220] It has suggested that ‘even on a narrower interpretation’, the provisions still offer expansive scope, and has recommended the ‘substantial redrafting’ of the definitions to prevent their application to individuals with no involvement in the commission or facilitation of a relevant offence.[221]

In contrast, the Cyber Security Cooperative Research Centre argued that the definition is fit-for-purpose, ‘especially as it relates to dispersed groups of persons communicating online’. It supported the fact that the definition does not require individuals within the group to consider themselves members, or that the group be formalised sufficiently to form a membership base, arguing ‘this is especially relevant in relation to, for example, dark web paedophile groups, which may be dispersed all over the world with members that ensure their identities remain obscured at all times’.[222]

Protection of parliamentary privileges and immunities

The Bill provides that the powers proposed in connection with each of the three warrants (including in relation to emergency authorisations) do not affect parliamentary privileges and immunities relating to each House of the Parliament and the members and committees of each House.[223]

Oversight mechanisms

The Bill proposes that the Commonwealth Ombudsman will have oversight over data disruption warrants and account takeover warrants, and the IGIS will have oversight over the use of network activity warrants.

Ombudsman

The Bill provides that the Commonwealth Ombudsman will have oversight over data disruption warrants, in the SD Act, and account takeover warrants, in the Crimes Act. The Ombudsman is excluded from an oversight role in relation to network activity warrants.[224]

Proposed Division 7 of proposed Part IAAC of the Crimes Act, inserted by item 4 of Schedule 3 of the Bill, provides the Ombudsman with the power to conduct inspections of AFP and ACIC records, and obtain relevant information, to assess the agencies’ compliance with the account takeover warrants regime.[225] These powers are largely the same as the Ombudsman’s inspection powers under Division 3 of Part 6 of the SD Act (which will apply to data disruption warrant records), as well as to the Ombudsman’s existing inspection powers in the Crimes Act in respect of delayed notification search warrants, control orders and controlled operations.[226]

Under both the Crimes Act and SD Act provisions, a person is not excused from complying with the Ombudsman’s request for assistance on the grounds that doing so would contravene a law, be contrary to the public interest or tend to incriminate the person, though restrictions apply to the further use or admissibility of any information provided.[227] Failure to comply with a request to attend before the Ombudsman, to provide information or answer questions, is an offence, punishable by a maximum of six months’ imprisonment.[228]

The Ombudsman must make a written report to the Minister every six months on the results of each inspection, which must subsequently be tabled in Parliament.[229]

Inspector-General of Intelligence and Security

The Bill provides the IGIS with oversight over the use of network activity warrants. Section 8 of the IGIS Act sets out the intelligence agency inquiry functions of the Inspector-General. Item 56 of Schedule 2 inserts proposed subsections 8(3A) and (3B) which extend these functions to include inquiring into matters—to the extent that they relate to an intelligence function of ACIC or the AFP—such as:

  • the agency’s compliance with federal, state and territory laws and with Ministerial directions or guidelines
  • the propriety of particular activities of the agency, and the effectiveness and appropriateness of its procedures relating to the legality or propriety of its activities
  • any matter that relates to an act or practice of that agency, referred to the IGIS by the Australian Human Rights Commission and
  • in relation to ACIC, the agency’s compliance with directions or guidelines, policies or other decisions made by the Board of ACIC or the Inter-Governmental Committee established by the Australian Crime Commission Act 2002.

Item 55 of Schedule 2 inserts a proposed definition of intelligence function into subsection 3(1) of the IGIS Act, which means:

  • the collection, correlation, analysis, production and dissemination of intelligence obtained by ACIC or the AFP from the execution of a network activity warrant or
  • the performance of a function, or exercise of a power, conferred on a law enforcement officer of ACIC or the AFP by the network activity warrant provisions of the SD Act.

Amendments to the SD Act require the chief officer of the AFP or ACIC to notify the IGIS of:

  • the issue of a network activity warrant, within seven days[230]
  • any extensions or variations to the warrant, within seven days[231]
  • the revocation of the warrant[232] and
  • a thing done to conceal the doing of a thing under the warrant (as provided for under proposed subsection 27KP(8)), where this is done more than 28 days after the warrant ceases to be in force.[233]  

The IGIS’s inspection functions are set out under section 9A of the IGIS Act. These are broad, and include conducting inspections of intelligence agencies as the Inspector-General considers appropriate for the purpose of giving effect to the objects of the Act. Item 65 of Schedule 2 inserts proposed subsection 9A(2) to provide that for the purposes of conducting an inspection of ACIC or the AFP, the Inspector-General and their staff may enter and remain on any premises (at all reasonable times); are entitled to reasonable facilities and assistance that the agency head is capable of providing; are entitled to full and free access at all reasonable times to any information, documents or property of the agency; and may examine, copy or take extracts from any information or documents.

Item 71 of Schedule 2 inserts proposed Part IIIA into the IGIS Act which provides for information sharing with integrity bodies—these are the Ombudsman, Australian Human Rights Commission, Information Commissioner, Integrity Commissioner and the Inspector-General of the Australian Defence Force.[234]

Call for a Public Interest Monitor

A number of submitters to the PJCIS inquiry called for additional oversight in the form of a Public Interest Monitor. The NSW Council for Civil Liberties argued that such an office should have the power to contest warrants, and would provide a ‘necessary counterbalancing of the extraordinary new powers’.[235]

Extraterritoriality

A data disruption warrant or network activity warrant may be issued in respect of data held in a computer in a foreign country or on a foreign vessel or aircraft that is outside of Australia, but only if an appropriate consenting official of the foreign country agrees to the access (and where applicable, disruption) to be authorised by the warrant.[236] As soon as practicable after the commencement of access to, or disruption of data held in a computer under the authority of a warrant issued in such circumstances, the chief officer of the relevant agency to which the warrant relates must give the Minister evidence in writing that the foreign official has agreed to the access (and, where applicable, disruption).[237]

The foreign country consent requirement does not apply where the persons responsible for executing the warrant will be physically present in Australia, and the location where the data is held is unknown or cannot reasonably be determined.[238] There are also exceptions where the vessel on which the relevant computer is located is:

  • outside Australia’s Territorial Sea but within Australia’s contiguous zone,[239] and the relevant offences to which the warrant relates are offences relating to the customs, fiscal, immigration or sanitary laws of Australia[240] or
  • outside Australia’s Territorial Sea but within the limits of the Australian fishing zone,[241] and the relevant offences to which the warrant relates are offences against specified provisions of the Fisheries Management Act 1991 or the Torres Strait Fisheries Act 1984.[242]

Evidence obtained as a result of extraterritorial computer access under a data disruption warrant is not admissible unless the court is satisfied the access or disruption was agreed to by an appropriate consenting official of the foreign country.[243]

Commentary

The joint civil liberties submission argued that extending the reach of Australian law enforcement outside of Australia raises due process risks for suspects located outside of Australia which may jeopardise prosecutions. The submission suggested that ‘in the absence of a clear transnational regulatory structure supporting transnational government hacking operations in cases where the physical location of the target computer and suspect is not known these proposed laws should be reconsidered’.[244]  

Twitter also expressed concern that the account takeover warrant can apply extraterritorially but does not have the same requirement to obtain the agreement of a consenting official in a foreign country. It stated:

If the Account Takeover Warrant is to be used to access an online account regardless of the location of the server, and executed without the knowledge of a service provider, or foreign official, then all due process requirements and safeguards that typically surround warrant processes have essentially been removed.[245]

Assistance orders

The proposed warrant regimes in respect of all three warrants provide for the making of assistance orders. The issuer (an eligible Judge or nominated AAT member, in the case of a data disruption or network activity warrant, and a magistrate in the case of an account takeover warrant), may, on application, make an assistance order requiring a specified person to provide any reasonable and necessary information or assistance to allow the law enforcement officer to:

  • in the case of a data disruption warrant, disrupt, access or copy data held in a computer subject to the warrant or emergency authorisation or convert the data into documentary or another intelligible form[246]
  • in the case of a network activity warrant, access data held in a computer subject to the warrant, copy data held in the computer onto a data storage device or convert data into documentary form or another form intelligible to the law enforcement officer[247] or
  • in the case of an account takeover warrant, take control of an online account that is the subject of the warrant or authorisation.[248]

The specified person must be either:

  • a person reasonably suspected of having committed a relevant offence
  • the owner or lessee of the computer or holder of the account, as applicable (or an employee or contractor of such a person)
  • a person who uses or has used the computer/account or
  • a current or former system administrator for the system including the computer, or for the electronic service to which the account relates.[249]

They must have relevant knowledge of the computer or account (as applicable), of the relevant computer network or electronic service to which the account relates, or of measures applied to protect data held in the computer or account-based data.[250]

A person failing to comply with an assistance order commits an offence if they are capable of doing so. There is a maximum applicable penalty of 10 years’ imprisonment and/or 600 penalty units ($133,200).[251]

Commentary on problems posed by compelling individuals to assist law enforcement

The HRLC has argued that the ability for law enforcement to compel individuals to answer questions or provide assistance that could expose them to legal ramifications ‘contradicts the right to freedom from self-incrimination, a longstanding legal doctrine that has been recognised in both common law and international human rights law’.[252] It has suggested that the wording of the proposed power is sufficiently broad to allow an assistance order to compel an individual to assist law enforcement to obtain evidence which is against their legal interest, and has recommended the Bill be amended to ensure adequate safeguards for the freedom against self-recrimination.[253]

The Communications Alliance has noted that communications platform providers could be captured in the potential net of ‘recipients’ of assistance orders, and has argued that such orders would be more appropriately directed at the business user of such platforms that holds or manages the relevant account, or the platform provider corporation, rather than an individual employee or officer. It has further stated:

If, as a last resort, an assistance order is directed at an individual employee or officer (rather than the business user or the platform corporation), this may give rise to a conflict between the order and the employee’s work responsibilities/terms of employment. It may also create difficult situations regarding the extent to which communications and approval within the employer organisation is prevented because of the legal constraints pertaining to protected information. The Bill should address these issues by requiring that the technology provider organisation be the target of technical assistance requests and, where an individual is compelled to provide assistance, by facilitating and paying for independent legal advice and to protect the employee from possible adverse consequences (both in terms of damages and employment) arising from compliance with the order.[254]

Amazon Web Services has recommended amendments to the assistance order provisions to:

  • make clear that where assistance is sought from an individual the assistance request should be both reasonable and proportionate, as is required under the Telecommunications and Other Legislation Amendment (Assistance and Access) Act 2018
  • require the issuing authority who considers an assistance order application to have to consider specified matters, including technical feasibility
  • include a prohibition against warrants being executed in a manner that would require a person to implement or build a systemic weakness into a form of electronic protection or prevent a person from rectifying a systemic weakness and
  • provide a defence for an individual who refuses to comply with an assistance order where doing so might breach a foreign law, or cause another person to breach a foreign law—it pointed to subsection 317ZB(5) of the Telecommunications Act 1997 as an example of such a defence.[255]

Twitter has stated it is unclear whether the legislation would require service providers and their employees to comply with assistance orders, and has argued that if so, such an order ‘is likely to place service providers, like Twitter, in a position where compliance would directly conflict with obligations under laws of other countries where they operate’.[256]

Inconsistency of warrant provisions

As noted above, the Commonwealth Ombudsman has suggested that a number of inconsistencies across the procedures and requirements for the three proposed warrant schemes, should be addressed. These include:

  • the vesting of authority in magistrates to issue account takeover warrants, rather than eligible Judges and nominated AAT members—the Ombudsman has noted that while magistrates are responsible for overseeing the use of overt powers in the Crimes Act, eligible Judges and nominated AAT members are more appropriate for the use of covert powers[257]
  • the absence of a requirement for issuers to consider privacy impacts when determining whether to issue a data disruption warrant[258]
  • the requirement for account takeover warrants to provide ‘sufficient information’ to enable the magistrate to make a determination, rather than an affidavit setting out the grounds of the application as is required for the data disruption and network activity warrants, as well as other current warrants under the Crimes Act and SD Act[259] and
  • the absence of a requirement for the AFP or ACIC to report on details of coercive assistance orders given in the course of executing data disruption and account takeover warrants, despite this being a requirement for network activity warrants.[260]

Judicial review

Decisions made in regard to warrants under the SD Act and Crimes Act are subject to judicial review, though not merits review. The Department’s submission to the PJCIS inquiry notes that a reference in the Statement of Compatibility with Human Rights in the Explanatory Memorandum to these powers being exempt from review under the Administrative Decisions (Judicial Review) Act 1977 is incorrect.[261]

However, the Department also notes:

As these are covert powers, in practice the challenge to these decisions will likely only be after the particular investigation has become overt. To make information available in order to bring about such a challenge, the Bill ensures that protected network activity warrant information (which are not for evidence collection and therefore have strict prohibitions on adducing information in evidence) may be admitted into evidence in proceedings that are not criminal proceedings. This is an important exception to the general secrecy provisions that apply to covert intelligence gathering activities. The Bill also applies the same exception to information gathered under an account takeover warrant.[262]

 


[1].      Department of Home Affairs, Submission to the Parliamentary Joint Committee on Intelligence and Security (PJCIS), Review of the Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020, 12 February 2021, p. 4.

[2].      Parliamentary Joint Committee on Law Enforcement (PJCLE), Impact of new and emerging information and communications technology, PJCLE, Canberra, April 2019, p. 23.

[3].      Department of Home Affairs, Submission to the PJCIS, Review of the Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020, op. cit., p. 4.

[4].      Department of Home Affairs (DoHA), Australia’s Cyber Security Strategy 2020, DoHA, Canberra, 2020, p. 14.

[5].      Ibid., p. 40.

[6].      Ibid., pp. 7, 10. Citations omitted.

[7].      Parliament of Australia, ‘Security Legislation Amendment (Critical Infrastructure) Bill 2020 homepage’, Australian Parliament website; C Barker, ‘Cyber security strategy’, Budget review 2020–21, Research paper, 2020–21, Parliamentary Library, Canberra, October 2020, pp. 75–77.

[8].      Comprehensive review of the legal framework of the national intelligence community, (Richardson Review), vol. 1, pp. 36, 44–46; vol. 2, Chapter 26 (Recommendation 75).

[9].      Richardson Review, op. cit., vol. 1, p. 44.

[10].    Ibid., pp. 45–46.

[11].    Ibid., p. 49.

[12].    Attorney-General’s Department (AGD), Commonwealth Government response to the Comprehensive Review of the Legal Framework of the National Intelligence Community, (Government Response), December 2020, pp. 23–24.

[13].    DoHA, Submission to the PJCIS, Review of the Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020, op. cit., p. 11.

[14].    AGD, Commonwealth Government response to the Comprehensive Review, op. cit., p. 42.

[15].    Ibid.

[16].    Senate Standing Committee for the Scrutiny of Bills, Scrutiny digest, 1, 2021, 29 January 2021, pp. 29–47.

[17].    Senate Standing Committee for the Scrutiny of Bills, Scrutiny digest, 5, 2021, 17 March 2021, pp. 120–155.

[18].    Senate Standing Committee for the Scrutiny of Bills, Scrutiny digest, 1, 2021, op. cit., p. 30.

[19].    Ibid., pp. 30, 33.

[20].    Ibid., pp. 31–33.

[21].    Ibid., pp. 32–33.

[22].    Ibid., pp. 32–33.

[23].    Senate Standing Committee for the Scrutiny of Bills, Scrutiny digest, 5, 2021, op. cit., pp. 121–122.

[24].    Ibid., pp. 122–123.

[25].    Ibid., pp. 124–126.

[26].    Ibid., pp. 127–129.

[27].    Senate Standing Committee for the Scrutiny of Bills, Scrutiny digest, 1, 2021, op. cit., pp. 33–36.

[28].    Senate Standing Committee for the Scrutiny of Bills, Scrutiny digest, 5, 2021, op. cit., pp. 130–132.

[29].    Ibid., pp. 132–133.

[30].    Ibid., pp. 133–135.

[31].    Senate Standing Committee for the Scrutiny of Bills, Scrutiny digest, 1, 2021, op. cit., pp. 36–40.

[32].    Senate Standing Committee for the Scrutiny of Bills, Scrutiny digest, 5, 2021, op. cit., pp. 136–139.

[33].    Ibid., pp. 139–141.

[34].    Senate Standing Committee for the Scrutiny of Bills, Scrutiny digest, 1, 2021, op. cit., pp. 41–42.

[35].    Senate Standing Committee for the Scrutiny of Bills, Scrutiny digest, 5, 2021, op. cit., pp. 142–145.

[36].    Ibid., pp. 145–146.

[37].    Senate Standing Committee for the Scrutiny of Bills, Scrutiny digest, 1, 2021, op. cit., pp. 43–45.

[38].    Ibid., pp. 45–46.

[39].    Senate Standing Committee for the Scrutiny of Bills, Scrutiny digest, 5, 2021, op. cit., pp. 147–148.

[40].    Ibid., pp. 150–152.

[41].    Ibid., pp. 152–153.

[42].    Ibid., p. 153.

[43].    Senate Standing Committee for the Scrutiny of Bills, Scrutiny digest, 1, 2021, op. cit., pp. 46–47.

[44].    Senate Standing Committee for the Scrutiny of Bills, Scrutiny digest, 5, 2021, op. cit., p. 154.

[45].    Ibid., pp. 154–155.

[46].    Commonwealth Ombudsman, Submission to the Parliamentary Joint Committee on Intelligence and Security (PJCIS), Review of the Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020, February 2021, p. 2.

[47].    Ibid., p. 2.

[48].    Ibid., p. 3.

[49].    AFP, Submission to the Parliamentary Joint Committee on Intelligence and Security (PJCIS), Review of the Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020, p. 4.

[50].    ACIC, Submission to the Parliamentary Joint Committee on Intelligence and Security (PJCIS), Review of the Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020, p. 2.

[51].    Ibid.

[52].    Inspector-General of Intelligence and Security (IGIS), Submission to the Parliamentary Joint Committee on Intelligence and Security (PJCIS), Review of the Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020, p. 6.

[53].    Ibid., pp. 8–9.

[54].    Ibid., pp. 9–11.

[55].    Office of the Australian Information Commissioner (OAIC), Submission to the Parliamentary Joint Committee on Intelligence and Security (PJCIS), Review of the Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020, 1 March 2021, pp. 2–3.

[56].    Queensland Council for Civil Liberties, Liberty Victoria, Electronic Frontiers Australia and the Australian Privacy Foundation, Joint submission to the Parliamentary Joint Committee on Intelligence and Security (PJCIS), Review of the Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020, p. 7.

[57].    Ibid., pp. 5–6.

[58].    Law Council of Australia, Submission to the Parliamentary Joint Committee on Intelligence and Security (PJCIS), Review of the Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020, 9 March 2021, p. 9.

[59].    Ibid., p. 10.

[60].    Human Rights Law Centre, Submission to the Parliamentary Joint Committee on Intelligence and Security (PJCIS), Review of the Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020, 18 February 2021, p. 4.

[61].    NSW Council for Civil Liberties (NSW CCL), Submission to the Parliamentary Joint Committee on Intelligence and Security (PJCIS), Review of the Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020, 5 February 2021, p. 3.

[62].    Amazon Web Services (AWS), Submission to the Parliamentary Joint Committee on Intelligence and Security (PJCIS), Review of the Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020, p. 2.

[63].    Ibid.

[64].    Communications Alliance, Submission to the Parliamentary Joint Committee on Intelligence and Security (PJCIS), Review of the Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020, 12 February 2021, p. 1.

[65].    Ibid., pp. 2–3.

[66].    Fastmail, Submission to the Parliamentary Joint Committee on Intelligence and Security (PJCIS), Review of the Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020, 12 January 2021.

[67].    Twitter, Submission to the Parliamentary Joint Committee on Intelligence and Security (PJCIS), Review of the Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020, 12 February 2021, pp. 4–5.

[68].    Ibid., pp. 5–6.

[69].    Ibid., pp. 7, 9.

[70].    DIGI, Submission to the Parliamentary Joint Committee on Intelligence and Security (PJCIS), Review of the Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020, 1 March 2021, p. 1.

[71].    Ibid., pp. 2–6.

[72].    Australian Information Industry Association, Submission to the Parliamentary Joint Committee on Intelligence and Security (PJCIS), Review of the Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020, 26 February 2021, p. 1.

[73].    Ibid., pp. 2–3.

[74].    Cyber Security Co-operative Research Centre, Submission to the Parliamentary Joint Committee on Intelligence and Security (PJCIS), Review of the Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020, p. 3.

[75].    Synod of Victoria and Tasmania, Uniting Church of Australia, Submission to the Parliamentary Joint Committee on Intelligence and Security (PJCIS), Review of the Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020, 12 February 2021, p. 1.

[76].    Ibid.

[77].    Carly Ryan Foundation, Submission to the Parliamentary Joint Committee on Intelligence and Security (PJCIS), Review of the Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020, p. 1.

[78].    Police Federation of Australia, Submission to the Parliamentary Joint Committee on Intelligence and Security (PJCIS), Review of the Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020, 12 February 2021.

[79].    Explanatory Memorandum, Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020, p. 9.

[80].    The Statement of Compatibility with Human Rights can be found at pp. 10–19 of the Explanatory Memorandum to the Bill.

[81].    Parliamentary Joint Committee on Human Rights, Human rights scrutiny report, 1, 2021, 3 February 2021, pp. 20–43.

[82].    Ibid., pp. 23–24.

[83].    Ibid., pp. 26–28.

[84].    Ibid., pp. 28–29.

[85].    Ibid., pp. 29–30.

[86].    Ibid., pp. 30–32.

[87].    Ibid., pp. 32–33.

[88].    Ibid., pp. 34–37.

[89].    Ibid., pp. 37–40.

[90].    Ibid., pp. 40­–43.

[91].    Parliamentary Joint Committee on Human Rights, Human rights scrutiny report, 3, 2021, 17 March 2021, pp. 63–112.

[92].    Ibid., pp. 70–72.

[93].    Ibid., pp. 72–75.

[94].    Ibid., p. 75.

[95].    Ibid., pp. 75–76.

[96].    Ibid., pp. 78–79.

[97].    Ibid., pp. 80–81.

[98].    Ibid., pp. 97–98.

[99].    Ibid., pp. 100–101.

[100].  Ibid., pp. 102–103.

[101].  Ibid., pp. 105–107.

[102].  Ibid., pp. 110–112.

[103]SD Act, proposed paragraph 27KE(2)(c).

[104].  Ibid., subsection 6(1) (proposed definition of disrupting data, inserted by item 8 of Schedule 1).

[105].  Ibid., proposed subsection 27KE(2).

[106].  Ibid., proposed subsection 27KE(9).

[107].  Ibid., proposed subsection 27KE(8).

[108].  Ibid., proposed subsection 27KE(7).

[109].  Department of Home Affairs (DoHA), ‘Data disruption warrants’, DoHA website, last updated 17 December 2020. 

[110].  AFP, Submission to the PJCIS, Review of the Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020, op. cit., pp. 9–10.

[111].  State offences have a federal aspect where they potentially fall within Commonwealth legislative power (either because of the elements of the offence or the circumstances in which it was committed), or where the AFP’s or ACIC’s investigation of them (as applicable), or ACIC’s undertaking of an intelligence operation relating to them, is incidental to the agency’s investigation of or intelligence operation relating to a Commonwealth or Territory offence: SD Act, section 7; Australian Federal Police Act 1979, section 4AA; Australian Crime Commission Act 2002, section 4A.

[112].  There are currently no regulations made under the SD Act.

[113].  Defined in SD Act, subsection 6(1) and subsection 6A(3) which contains a table of the various defined officers.

[114].  Defined in SD Act, subsection 6(1) and section 12.

[115].  Defined in SD Act, subsection 6(1) and section 13.

[116]SD Act, proposed subsection 27KA(6).

[117]SD Act, proposed subsection 27KA(3).

[118].  Ibid., proposed subsections 27KA(4) and (5).

[119]Proposed section 27KB authorises the making of a remote application (by telephone, fax, email or any other means of communication) where a law enforcement officer believes it is impracticable for the application to be made in person.

[120].  Ibid., proposed subsection 27KC(1).

[121].  Ibid., proposed subsection 27KD(2) and proposed paragraph 27KF(1)(a).

[122].  Ibid., proposed paragraph 27KF(1)(b).

[123].  Ibid., proposed section 27KG.

[124].  Ibid., proposed subsection 27KG(2) and section 27KH.

[125].  This is, for the AFP, the Police Commissioner, Deputy Commissioner or an authorised senior executive AFP employee, and for the ACIC, the CEO or an authorised executive level member of staff: SD Act, subsections 6(1) and 6A(4) and (6).

[126]SD Act, subsection 28(4).

[127].  Ibid., proposed subsection 28(5), inserted by item 17 of Schedule 1.

[128].  Ibid., proposed subsection 32(2B), inserted by item 18 of Schedule 1.

[129].  Ibid., proposed subsection 35B(2).

[130].  Ibid., proposed paragraph 35B(3)(a).

[131].  Ibid., proposed subsection 35B(4).

[132].  Ibid., proposed paragraph 35(3)(b).

[133].  Ibid., section 45. Data disruption intercept information is information obtained under a data disruption warrant by intercepting a communication passing over a telecommunications system—see definition inserted into the Telecommunications (Interception and Access) Act 1979 (TIA Act) by item 52 of Schedule 1 to the Bill and the signpost definition inserted into subsection 6(1) of the SD Act by item 8 of Schedule 1. The use of data disruption intercept information is governed by the TIA Act—see proposed section 63AD of the TIA Act, inserted by item 56 of Schedule 1.

[134].  Ibid., proposed paragraph 44(1)(ab).

[135].  Also see proposed paragraph 63AD(1)(d) of the Telecommunications (Interception and Access) Act 1979 (TIA Act), inserted by item 56 of Schedule 1.

[136].  Ibid., section 49.

[137].  Ibid., sections 49A, 49B.

[138].  Ibid., proposed paragraph 50(1)(eb), inserted by item 42 of Schedule 1.

[139].  Ibid., proposed subsection 47B(1), inserted by item 39 of Schedule 1. The term data disruption technologies or methods is defined in proposed subsection 47B(7).

[140].  Ibid., proposed subsections 47B(2) and (3).

[141].  Ibid., proposed subsections 47B(5) and (6).

[142].  Ibid., sections 47 and 47A.

[143]SD Act, proposed paragraphs 27KP(2)(a) and (c).

[144].  Ibid., proposed subsection 27KP(5) and proposed paragraph 27KK(1)(b).

[145].  Ibid., proposed paragraphs 27KP(2)(d) and (e).

[146].  Ibid., proposed paragraphs 27KP(2)(f), (h), (i) and (j).

[147].  Ibid., proposed subsection 27KP(7). See proposed subsection 27KE(8) of the SD Act, at item 13 of Schedule 1, for the equivalent provision in relation to a data disruption warrant.

[148].  Ibid., proposed subsection 27KP(6). See proposed subsection 27KE(10) of the SD Act, at item 13 of Schedule 1, for the comparable provision in relation to a data disruption warrant.

[149].  DoHA, ‘Network activity warrant’, DoHA website, last updated 17 December 2020.

[150].  Ibid., proposed subsection 27KK(2).

[151].  Ibid., proposed subsections 27KK(4), (5).

[152].  Ibid., proposed subsection 27KK(6).

[153]SD Act, subsection 6(1) (proposed definition of electronically linked group of individuals, inserted by item 3 of Schedule 2) and proposed section 7A (definition of criminal network of individuals), inserted by item 8 of Schedule 2.

[154].  Ibid., proposed subsection 27KM(1).

[155].  Ibid., proposed subsection 27KN(2).

[156].  Ibid., proposed paragraph 27KQ(1)(a), proposed subsection 27KQ(6).

[157].  Ibid., proposed paragraph 27KQ(1)(b).

[158].  Ibid., proposed section 27KR.

[159].  Ibid., proposed section 27KS.

[160].  Ibid., proposed section 44A, inserted by item 18 of Schedule 2. Network activity warrant intercept information is information obtained under a network activity warrant by intercepting a communication passing over a telecommunications system—see definition inserted into the Telecommunications (Interception and Access) Act 1979 (TIA Act) by item 112 of Schedule 2 to the Bill and the signpost definition inserted into subsection 6(1) of the SD Act by item 3 of Schedule 2. The use of network activity warrant intercept information is governed by the TIA Act—see proposed section 63AE of the TIA Act, inserted by item 116 of Schedule 2.

[161].  Ibid., proposed section 44A, inserted by item 18 of Schedule 2.

[162].  Ibid., proposed subsection 45B(1), inserted by item 19 of Schedule 2.

[163].  Ibid., proposed subsection 45B(2).

[164].  Ibid., proposed paragraph 45B(4)(b).

[165].  Ibid., proposed paragraph 45B(4)(c).

[166].  Ibid., proposed paragraphs 45B(4)(d) and (e).

[167].  Ibid., proposed paragraphs 45B(5)(a), (b) and (c).

[168].  Ibid., proposed paragraphs 45B(5)(h) and 45B(7)(b).

[169].  Ibid., proposed paragraphs 45B(5)(d), (e) and (f).

[170].  Ibid., proposed subsections 45B(8) and 45B(9).

[171].  Ibid., proposed subsection 45B(3).

[172].  Also see proposed paragraph 63AE(1)(d) of the TIA Act, inserted by item 116 of Schedule 2.

[173].  Ibid., proposed paragraph 45B(4)(a).

[174]Crimes Act, proposed subsection 3ZZUR(1).

[175].  Ibid., proposed paragraphs 3ZZUR(2)(a) and (b).

[176].  Ibid., proposed section 3ZZUK (definition of account credentials).

[177].  Ibid., proposed paragraph 3ZZUR(2)(c).

[178].  Ibid., proposed paragraph 3ZZUR(2)(d).

[179].  Ibid., proposed paragraphs 3ZZUR(2)(e) and (f).

[180].  Ibid., proposed paragraph 3ZZUR(2)(g).

[181].  Ibid., proposed subsection 3ZZUR(6).

[182].  Ibid., proposed subsection 3ZZUR(5). See proposed subsection 27KE(10) of the SD Act, at item 13 of Schedule 1, for the comparable provision in relation to a data disruption warrant.

[183].  DoHA, ‘Account takeover warrants’, DoHA website, last updated 17 December 2020.

[184].  Ibid., subsection 15GE(4).

[185].  Ibid., subsection 3(1) and section 3AA.

[186]Law enforcement officer is defined as the Commissioner, Deputy Commissioner, AFP employee, special member of the AFP or person seconded to the AFP, or the CEO or a member of the staff of the ACIC: proposed section 3ZZUK.  

[187]Crimes Act, proposed subsection 3ZZUN(1).

[188].  Ibid., proposed subsection 3ZZUN(2).

[189].  Ibid., proposed subsection 3ZZUN(3).

[190].  Ibid., proposed subsection 3ZZUP(1).

[191].  Ibid., proposed subsection 3ZZUQ(3), proposed section 3ZZUS.

[192].  Ibid., proposed section 3ZZUS.

[193].  Ibid., proposed subsection 3ZZUT(1).

[194].  Ibid., proposed subsection 3ZZUT(2) and section 3ZZUU.

[195].  Ibid., proposed section 3ZZUV. Executing officer is defined as the law enforcement officer named in the warrant as being responsible for executing the warrant, or if they do not intend to do so, another law enforcement officer whose name has been written in the warrant by the named, or last named, officer: proposed section 3ZZUK.

[196].  Ibid., proposed subsection 3ZZUX(1). An appropriate authorising officer is defined in proposed section 3ZZUM and is the same in substance as under the SD Act for both the AFP and ACIC.

[197].  Ibid., proposed subsection 3ZZUX(3).

[198].  Ibid., proposed subsection 3ZZUX(4).

[199].  Ibid., proposed subsection 3ZZUZ(1).

[200].  Ibid., proposed subsection 3ZZVA(1).

[201].  Ibid., proposed section 3ZZVC.

[202].  Ibid., proposed subsection 3ZZVC(4).

[203].  Ibid., proposed section 3ZZUK (definition of protected information).

[204].  Ibid., proposed section 3ZZVJ. There appears to be a drafting error in proposed subparagraph 3ZZVJ(b)(i), which relates to the destruction of a record or report containing material that ‘is not likely to be required in connection with an activity or purpose referred to in subsection 3ZZVH(2), (3) or (4)’. It appears that this should refer to subsections 3ZZVH(3), (4) or (5).

[205].  Ibid., proposed section 3ZZVN.

[206].  Ibid., proposed section 3ZZVM.

[207].  Ibid., proposed subsection 3ZZVP(4).

[208]Explanatory Memorandum, Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020, op. cit., p. 172.

[209]Crimes Act, proposed subsection 3ZZWA(2).

[210].  Ibid., paragraphs 15GI(2)(d), 15GQ(2)(d), 15GV(2)(d).

[211]Explanatory Memorandum, Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020, op. cit., p. 181.

[212]Explanatory Memorandum, Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020, op. cit., p. 14, cited in HRLC, Submission to the PJCIS, Review of the Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020, op. cit., p. 7.

[213].  HRLC, Submission to the PJCIS, Review of the Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020, op. cit., p. 7.

[214].  Ibid., p. 8.

[215].  Queensland Council for Civil Liberties, Liberty Victoria, Electronic Frontiers Australia and the Australian Privacy Foundation, Joint submission to the PJCIS, Review of the Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020, op. cit., pp. 4, 7.

[216].  NSW CCL, Submission to the PJCIS, Review of the Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020, op. cit., p. 6.

[217].  Cyber Security Cooperative Research Centre, Submission to the PJCIS, Review of the Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020, op. cit., p. 8.

[218].  Scrutiny of Bills Committee, Scrutiny digest, 1, 2021, op. cit., p. 32.

[219].  HRLC, Submission to the PJCIS, Review of the Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020, op. cit., p. 9.

[220].  Ibid.

[221].  Ibid., p. 10.

[222].  Cyber Security Cooperative Research Centre, Submission to the PJCIS, Review of the Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020, op. cit., p. 9.

[223]SD Act, proposed sections 27KJ and 36A (inserted by items 13 and 25 of Schedule 1, respectively) and proposed section 27KT (inserted by item 9 of Schedule 2); Crimes Act, proposed sections 3ZZUW and 3ZZVF (inserted by item 4 of Schedule 3).

[224]SD Act, proposed subsection 55(1A) inserted by item 28 of Schedule 2.

[225]Crimes Act, proposed sections 3ZZVQ, 3ZZVR and 3ZZVS.

[226].  Ibid., Division 7 of Part IAAA, Division 11 of Part IAAB, Division 4 of Part IAB.

[227].  Ibid., proposed section 3ZZVU; SD Act, section 57.

[228]Crimes Act, proposed section 3ZZVT; SD Act, subsection 56(6).

[229]Crimes Act, proposed section 3ZZVX; SD Act, section 61.

[230]SD Act, proposed subsection 27KM(3), at item 9 of Schedule 2.

[231]SD Act, proposed subsection 27KQ(7).

[232].  Ibid., proposed subsection 27KR(6), (7).

[233].  Ibid., proposed section 49D inserted by item 23 of Schedule 2.

[234]IGIS Act, subsection 3(1) (definition of integrity body, inserted by item 53 of Schedule 2).

[235].  NSW CCL, Submission to the PJCIS, Review of the Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020, op. cit., p. 6.

[236]SD Act, proposed section 43C (inserted by item 27 of Schedule 1, in respect of data disruption warrants) and proposed section 43E (inserted by item 11 of Schedule 2, in respect of network activity warrants).

[237]SD Act, proposed subsections 43C(7) and 43E(6).

[238]SD Act, proposed subsections 43C(4) and 43E(3).

[239].  The Contiguous Zone is a belt of water adjacent to the Territorial Sea, the outer limit of which does not exceed 24 nautical miles from the territorial sea baseline: Geoscience Australia, ‘Maritime boundary definitions’, Geoscience Australia website.

[240]SD Act, proposed subsection 43C(5) and 43E(4).

[241].  The Australian Fishing Zone means the waters adjacent to Australia within the outer limits of the exclusive economic zone, and the waters adjacent to each external territory within the outer limits of the exclusive economic zone, but does not include coastal waters of (or waters within the limits of) a State or internal Territory, or waters that are ‘excepted waters’: Geoscience Australia, ‘Maritime boundary definitions’, op. cit.

[242]SD Act, proposed subsection 43C(6) and 43E(5).

[243].  Ibid., proposed section 43D.

[244].  Queensland Council for Civil Liberties, Liberty Victoria, Electronic Frontiers Australia and the Australian Privacy Foundation, Joint submission to the PJCIS, Review of the Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020, op. cit., p. 7.

[245].  Twitter, Submission to the PJCIS, Review of the Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020, op. cit., pp. 7–8.

[246]SD Act, proposed subsection 64B(1), inserted by item 47 of Schedule 1.

[247].  Ibid., section 64A, as amended by item 30 of Schedule 2.

[248]Crimes Act, proposed subsection 3ZZVG(1), inserted by item 4 of Schedule 3.

[249]SD Act, paragraph 64A(2)(d), proposed paragraph 64B(2)(e); Crimes Act, proposed paragraph 3ZZVG(2)(b).

[250]SD Act, proposed paragraphs 64A(6A)(b)­­–(c) inserted by item 31 of Schedule 2 and 64B(2)(e)–(f); Crimes Act, proposed paragraphs 3ZZVG(2)(b)–(c).

[251]SD Act, subsection 64A(8), proposed subsection 64B(3); Crimes Act, proposed subsection 3ZZVG(3). A penalty unit is currently $222: Crimes Act 1914 (Cth), section 4AA; ‘Notice of indexation of the penalty unit amount’.

[252].  HRLC, Submission to the PJCIS, Review of the Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020, op. cit., p. 12.

[253].  Ibid., p. 13.

[254].  Communications Alliance, Submission to the PJCIS, Review of the Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020, op. cit., p. 4.

[255].  AWS, Submission to the PJCIS, Review of the Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020, op. cit., pp. 2–4.

[256].  Twitter, Submission to the PJCIS, Review of the Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020, op. cit., p. 8.

[257].  Commonwealth Ombudsman, Submission to the PJCIS, Review of the Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020, op. cit., p. 3.

[258].  Ibid.

[259].  Ibid., pp. 3–4.

[260].  Ibid., p. 4.

[261].  Department of Home Affairs, Submission to the PJCIS, Review of the Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020, op. cit., p. 23.

[262].  Ibid.

 

For copyright reasons some linked items are only available to members of Parliament.


© Commonwealth of Australia

Creative commons logo

Creative Commons

With the exception of the Commonwealth Coat of Arms, and to the extent that copyright subsists in a third party, this publication, its logo and front page design are licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 3.0 Australia licence.

In essence, you are free to copy and communicate this work in its current form for all non-commercial purposes, as long as you attribute the work to the author and abide by the other licence terms. The work cannot be adapted or modified in any way. Content from this publication should be attributed in the following way: Author(s), Title of publication, Series Name and No, Publisher, Date.

To the extent that copyright subsists in third party quotes it remains with the original owner and permission may be required to reuse the material.

Inquiries regarding the licence and any use of the publication are welcome to webmanager@aph.gov.au.

Disclaimer: Bills Digests are prepared to support the work of the Australian Parliament. They are produced under time and resource constraints and aim to be available in time for debate in the Chambers. The views expressed in Bills Digests do not reflect an official position of the Australian Parliamentary Library, nor do they constitute professional legal opinion. Bills Digests reflect the relevant legislation as introduced and do not canvass subsequent amendments or developments. Other sources should be consulted to determine the official status of the Bill.

Any concerns or complaints should be directed to the Parliamentary Librarian. Parliamentary Library staff are available to discuss the contents of publications with Senators and Members and their staff. To access this service, clients may contact the author or the Library‘s Central Enquiry Point for referral.