Footnotes

Definitions

[1]        Department of Home Affairs (DHA), Australian Border Force (ABF) and Attorney-General's Department (AGD), Submission 28, pp. 3−4.

[2]        'Cybercrime', Australian Criminal Intelligence Commission (ACIC), updated 17 July 2018, https://www.acic.gov.au/about-crime/organised-crime-groups/cybercrime (accessed 16 January 2019).

[3]        Australian Government, Australia's International Cyber Engagement Strategy, Barton, ACT, 2017, p. 23.

[4]        International Association of Prosecutors—Global Prosecutors E-Crime Network (GPEN), Submission 19, p. 4.

[5]        'The Internet of Things (IoT): An Overview', Internet Society, https://www.internetsociety.org/resources/doc/2015/iot-overview?gclid=EAIaIQobChMI9Zqf0siC4AIVFR4rCh3hPwVVEAAYAyAAEgL_gPD_BwE (accessed 23 January 2019).

[6]        'Cyber crime', Australian Federal Police, https://www.afp.gov.au/what-we-do/crime-types/cyber-crime (accessed 21 January 2019).

[7]        Telecommunications (Interception and Access) Act 1979 (Cth), section 6(1).

Chapter 1 - Introduction

[1]        Commonwealth of Australia, Department of Foreign Affairs and Trade, Australia's International Cyber Engagement Strategy, October 2017, p. 33, https://dfat.gov.au/
international-relations/themes/cyber-affairs/aices/pdf/DFAT%20AICES_AccPDF.pdf
(accessed 28 March 2019).

[2]        Joint Standing Committee on Trade and Investment Growth, Trade and the Digital Economy, 20 September 2018.

[3]        Senate Finance and Public Administration References Committee, Digital Delivery of Government Services, 27 June 2018.

[4]        Parliamentary Joint Committee on Intelligence and Security (PJCIS), Advisory Report on the Telecommunications and Other Legislation Amendment (Assistance and Access) Bill 2018, December 2018, Recommendation 1, p. 3 and Recommendation 16, p. 8.

[5]        PJCIS, Review of the Telecommunications and Other Legislation Amendment (Assistance and Access) Act 2018 with specific reference to Government amendments introduced and passed on 6 December 2018, https://www.aph.gov.au/Parliamentary_Business/Committees/Joint/Intelligence_and_Security/ReviewofTOLAAct (accessed 16 January 2019).

[6]        Software.org: the BSA Foundation, cited in 'IoT devices to reach 50 billion by 2020: Report', BGR, 14 July 2017, https://www.bgr.in/news/iot-devices-to-reach-50-billion-by-2020-report/ (accessed 24 January 2019).

[7]        Australian Bureau of Statistics (ABS), 8146.0 – Household Use of Information Technology, Australia, 2016–17, available: http://www.abs.gov.au/ausstats/abs@.nsf/mf/8146.0 (accessed 6 March 2019). 

[8]        ABS, 8153.0 – Internet Activity, Australia, June 2018, available: https://www.abs.gov.au/ausstats/abs@.nsf/mf/8153.0/ (accessed 6 March 2019). 

[9]        ABS, 8146.0 – Household Use of Information Technology, Australia, 2016–17, available: http://www.abs.gov.au/ausstats/abs@.nsf/mf/8146.0 (accessed 6 March 2019). 

[10]      Department of Home Affairs (DHA), Attorney-General's Department (AGD) and Australian Border Force (ABF), Submission 28, p. 9.

[11]      Commonwealth of Australia, Department of Industry, Innovation and Science, Australia's Tech Future: Delivering a strong, safe and inclusive digital economy, 19 December 2018, p. 6, https://www.industry.gov.au/sites/default/files/2018-12/australias-tech-future.pdf (accessed 12 February 2019).

[12]      Commonwealth of Australia, Department of the Prime Minister and Cabinet, Australia's Cyber Security Strategy: Enabling innovation, growth & prosperity, 2016, p. 14, https://cybersecuritystrategy.homeaffairs.gov.au/sites/all/themes/cybersecurity/img/PMC-Cyber-Strategy.pdf (accessed 5 December 2018).

[13]      Australian Criminal Intelligence Commission (ACIC), Cybercrime, updated 17 July 2018, https://www.acic.gov.au/about-crime/organised-crime-groups/cybercrime (accessed 16 January 2019).

[14]      International Association of Prosecutors—Global Prosecutors E-Crime Network (GPEN), Submission 19, p. 2.

[15]      DHA, AGD and ABF, Submission 28, pp. 6 and 9.

[16]      Cyber Security Research Centre (CSRC), Submission 8, p. 1.

[17]      ACIC, Connect, Discover, Understand, Respond: 2016−17 Annual Report, Canberra, 2017, p. 118, https://acic.govcms.gov.au/sites/g/files/net1491/f/acic_2016-17_annual_report.pdf?v=1508387578 (accessed 29 January 2019).

[18]      DHA, AGD and ABF, Submission 28, p. 6.

[19]      DHA, AGD and ABF, Submission 28, p. 10.

[20]      ACIC and Australian Institute of Criminology (AIC), Submission 29, p. 7.

[21]      ACIC and AIC, Submission 29, p. 7.

[22]      Wireless Internet Service Provider Association of Australia (WISPAU), Submission 17, p. 3.

[23]      DHA, AGD and ABF, Submission 28, p. 11.

[24]      DHA, AGD and ABF, Submission 28, p. 11.

[25]      CISCO, What is a VPN? – Virtual Private Network, https://www.cisco.com/c/en/us/
products/security/vpn-endpoint-security-clients/what-is-vpn.html
(accessed 19 February 2019).

[26]      Geo-blocking is used on websites to prevent shoppers in some countries from being able to buy products and services for cheaper overseas prices.

[27]      Bandwidth throttling is when an internet service provider detects and de-prioritises certain types of internet traffic.

[28]      Choice, How to find the best VPN service, https://www.choice.com.au/electronics-and-technology/internet/connecting-to-the-internet/buying-guides/vpn-services (accessed 6 March 2019). 

[29]      Dr John Coyne, Submission 4, p. 2.

[30]      For a summary of the many ways in which drones are used see Senate Rural and Regional Affairs and Transport References Committee, Current and future regulatory requirements that impact on the safe commercial and recreational use of Remotely Piloted Aircraft Systems (RPAS), Unmanned Aerial Systems (UAS) and associated systems, July 2018, pp. 4–6.

[31]      Dr John Coyne, Submission 4, p. 2.

[32]      The Customs (Prohibited Imports) Regulations 1956 prohibits the importation of signal jammers and drone jammers into Australia unless subject to an exemption.

[33]      Western Australia Police Force, Submission 31, p. 3.

[34]      Mr Matthew Loeb, Chief Executive Officer, ISACA, Committee Hansard, 29 March 2018, p. 13.

[35]      Mr Matthew Loeb, Chief Executive Officer, ISACA, Committee Hansard, 29 March 2018, p. 11.

[36]      Dr John Coyne, Submission 4, p. 3.

[37]      See for example, Bob Yirke, A small chemical reactor made via 3-D printing allows for making drugs on-demand, 19 January 2018, https://techxplore.com/news/2018-01-small-chemical-reactor-d-drugs.html (accessed 25 March 2019); David Morris, Army Unveils 3-D Printed Grenade Launcher, 11 March 2017, http://fortune.com/2017/03/11/3d-printed-grenade-launcher/ (accessed 25 March 2019).

[38]      Internet Society, The Internet of Things: An Overview, 15 October 2015, p. 4, https://www.internetsociety.org/resources/doc/2015/iot-overview?gclid=EAIaIQobChMI9Zqf0siC4AIVFR4rCh3hPwVVEAAYAyAAEgL_gPD_BwE (accessed 23 January 2019).

[39]      Internet Society, The Internet of Things: An Overview, 15 October 2015, (accessed 23 January 2019).

[40]      ACIC and AIC, Submission 29, p. 7; Software.org: the BSA Foundation, cited in BGR, IoT devices to reach 50 billion by 2020: Report, 14 July 2017, https://www.bgr.in/news/iot-devices-to-reach-50-billion-by-2020-report/ (accessed 24 January 2019).

Chapter 2 - Coordinating law enforcement across jurisdictions

[1]        International Association of Prosecutors—Global Prosecutors E-Crime Network (GPEN), Submission 19, p. 3.

[2]        GPEN, Submission 19, p. 3.

[3]        Government response, House of Representatives Standing Committee on Communications, Report on the Inquiry into Cyber Crime, p. 13, https://www.aph.gov. au/PARLIAMENTARY_BUSINESS/COMMITTEES/HOUSE_OF_REPRESENTATIVES_COMMITTEES?url=coms/reports.htm (accessed 4 December 2018).

[4]        Department of Home Affairs (DHA), 'Cybercrime', https://archive.homeaffairs.gov.au/about/crime/cybercrime (accessed 5 December 2018).

[5]        Ms Esther George, Lead Cybercrime Consultant, International Association of Prosecutors, Committee Hansard, 29 March 2018, p. 41.

[6]        Access Now, Mutual Legal Assistance Treaties, https://www.mlat.info/ (accessed 18 February 2019).

[7]        JV Tossini, 'The Five Eyes—The Intelligence Alliance of the Anglosphere', ukdj, 14 November 2017, https://ukdefencejournal.org.uk/the-five-eyes-the-intelligence-alliance-of-the-anglosphere/ (accessed 20 December 2018). See Chapter 4 for discussion of the Five Eyes Alliance Statement of Principles in relation to encryption.

[8]        DHA, Attorney-General's Department (AGD) and Australian Border Force (ABF), Submission 28, p. 6.

[9]        ISACA, Submission 13, [p. 2].

[10]      AGD, National Plan to Combat Cybercrime, 2013, p. 6.

[11]      Commonwealth of Australia, Department of Prime Minister and Cabinet, Australia's Cyber Security Strategy: Enabling innovation, growth & prosperity, 2016, p. 2, https://cybersecuritystrategy.homeaffairs.gov.au/sites/all/themes/cybersecurity/img/PMC-Cyber-Strategy.pdf (accessed 5 December 2018).

[12]      ISACA, Submission 13, [p. 2].

[13]      Commonwealth of Australia, Department of Prime Minister and Cabinet, Australia's Cyber Security Strategy: Enabling innovation, growth & prosperity, 2016, p. 5.

[14]      Commonwealth of Australia, Department of Prime Minister and Cabinet, Australia's Cyber Security Strategy: Enabling innovation, growth & prosperity, 2016, p. 15.

[15]      ISACA, Submission 13, [pp. 2−3].

[16]      DHA, AGD and ABF, Submission 28, p. 7; see also Mr Hamish Hansford, First Assistant Secretary, National Security and Law Enforcement Policy, DHA, Committee Hansard, 11 May 2018, p. 48.

[17]      Commonwealth of Australia, Department of Prime Minister and Cabinet, Australia's Cyber Security Strategy: Enabling innovation, growth & prosperity, 2016 p. 6.

[18]      Mr Andrew Colvin, Commissioner, Australian Federal Police (AFP), Committee Hansard, 22 February 2019, pp. 5−6.

[19]      Commonwealth of Australia, Department of Prime Minister and Cabinet, Australia's Cyber Security Strategy: Enabling innovation, growth & prosperity, 2016, p. 29.

[20]      Law, Crime and Community Safety Council, Communiqué, 19 May 2017, https://www.ag.gov.au/About/CommitteesandCouncils/Law-Crime-and-Community-Safety-Council/Documents/19-May-LCCSC-Communique.pdf (accessed 20 December 2018).

[21]      DHA, Cybercrime, https://archive.homeaffairs.gov.au/about/crime/cybercrime (accessed 5 December 2018).

[22]      Commonwealth of Australia, Department of Foreign Affairs and Trade, Australia's International Cyber Security Strategy, October 2017, https://dfat.gov.au/international-relations/themes/cyber-affairs/aices/pdf/DFAT%20AICES_AccPDF.pdf (accessed 28 March 2019).

[23]      Commonwealth of Australia, Department of Foreign Affairs and Trade, Australia's International Cyber Engagement Strategy, 2017, p. 32.

[24]      ISACA, Submission 13, [p. 4].

[25]      DHA, 'Cybercrime', https://archive.homeaffairs.gov.au/about/crime/cybercrime (accessed 5 December 2018).

[26]      DHA, AGD and ABF, Submission 28, p. 6.

[27]      DHA, AGD and ABF, Submission 28, p. 8.

[28]      DHA, AGD and ABF, Submission 28, p. 8.

[29]      Australian Commission for Law Enforcement Integrity (ACLEI), Submission 1, p. 1. The Law Enforcement Integrity Commissioner Act 2006 (the LEIC Act) gives the Integrity Commissioner power to examine witnesses on oath in coercive hearings. Agencies subject to the Integrity Commissioner's jurisdiction include the ACIC; the former Crim Trac Agency and the former National Crime Authority; the Australian Federal Police; Australian Transaction Reports and Analysis Centre; Department of Immigration and Border Protection/DHA; prescribed aspects of the Department of Agriculture and Water Resources; and other agencies with law enforcement functions.

[30]      ACLEI, Submission 1, p. 1.

[31]      ACLEI, Submission 1, p. 7. The agencies subject to the Integrity Commissioner's jurisdiction include the Australian Criminal Intelligence Commission (ACIC); AFP; Australian Transaction Reports and Analysis Centre (AUSTRAC); DHA, including Australian Border Force); prescribed aspects of the Department of Agriculture and Resources; and any other Australian government agency prescribed by regulation under the Law Enforcement Integrity Commissioner Act 2006.

[32]      ACIC and Australian Institute of Criminology (AIC), Submission 29, p. 3.

[33]      ACIC and AIC, Submission 29, p. 3.

[34]      Australian Cyber Security Centre, https://cyber.gov.au/about-this-site/about-acsc/ (accessed 20 February 2019).

[35]      Commonwealth of Australia, Department of the Prime Minister and Cabinet, Australia's Cyber Security Strategy, 2016, pp. 2−3.

[36]      ISACA, Submission 13, [p. 2].

[37]      Cyber Security Research Centre (CSRC), Submission 8, p. 11. The CSRC is a public, not-for-profit company through which the Cyber Security Cooperative Research Centre operates. See Cyber Security Cooperative Research Centre, https://www.cybersecuritycrc.org.au/ (accessed 31 January 2019).

[38]      AUSTRAC, Submission 30, p. 4.

[39]      See Appendix 4 for a list of Australian government agencies with existing cybercrime and cyber security responsibilities.

[40]      Commonwealth of Australia, Department of Communications and the Arts, Launch of the Office of the Children's eSafety Commissioner, 9 October 2015, https://www.communications.gov.au/departmental-news/launch-office-children%E2%80%99s-esafety-commissioner (accessed 8 March 2019).

[41]      Commonwealth of Australia, Office of the eSafety Commissioner, Role of the office, https://www.esafety.gov.au/about-the-office/role-of-the-office (accessed 8 March 2019). 

Chapter 3 - 'Going dark'

[1]        Australian Commission for Law Enforcement Integrity (ACLEI), Submission 1, p. 1.

[2]        Cyber Security Research Centre (CSRC), Submission 8, p. 6; International Association of Prosecutors, Global Prosecutors E-Crime Network (GPEN), Submission 19, p. 4.

[3]        CSRC, Submission 8, pp. 6−7.

[4]        Dr John Coyne, Submission 4, pp. 7−8.

[5]        CSRC, Submission 8, p. 6.

[6]        CSRC, Submission 8, p. 5.

[7]        CSRC, Submission 8, p. 1.

[8]        Department of Home Affairs (DHA), 'Cybercrime', https://archive.homeaffairs.gov.au/about/crime/cybercrime (accessed 20 December 2018).

[9]        ACLEI, Submission 1, pp. 1−2. See also Telecommunications (Interception and Access) Act 1979, Part 5—1A—Data retention, https://www.legislation.gov.au/Details/C2018C00503 (accessed 20 December 2018).

[10]      Australian Transaction Reports and Analysis Centre (AUSTRAC), New Australian laws to regulate cryptocurrency providers, 11 April 2018, http://www.austrac.gov.au/media/media-releases/new-australian-laws-regulate-cryptocurrency-providers (accessed 20 December 2018).

[11]      This legislation is discussed in more detail in Chapter 4. See Parliament of Australia, Telecommunications and Other Legislation Amendment (Assistance and Access) Bill 2018, https://www.aph.gov.au/Parliamentary_Business/Bills_Legislation/Bills_Search_Results/Result?bId=r6195 (accessed 12 December 2018). See Chapter 2 for further discussion about the Five Eyes Alliance.

[12]      DHA, Attorney-General's Department (AGD) and Australian Border Force (ABF), Submission 28, pp. 6 and 9.

[13]      AGD, National Plan to Combat Cybercrime, 2013, p. 4, https://sherloc.unodc.org/cld/lessons-learned/aus/national_plan_to_combat_cybercrime.html?lng=en (accessed 19 December 2018).

[14]      Australian Securities and Investment Commission (ASIC), Submission 11, p. 5.

[15]      Dr John Coyne, Committee Hansard, 29 March 2018, p. 6.

[16]      Lucy McNally and John Stewart, 'Australian Federal Police seize Phantom Secure phones as part of global crackdown', ABC News, 16 March 2018, available: https://www.abc.net.au/news/2018-03-16/afp-seize-phones-as-part-of-phantom-secure-crackdown/9555652 (accessed 18 March 2019).

[17]      Lucy McNally and John Stewart, 'Australian Federal Police seize Phantom Secure phones as part of global crackdown', ABC News, 16 March 2018.  

[18]      Lucy McNally and John Stewart, 'Australian Federal Police seize Phantom Secure phones as part of global crackdown', ABC News, 16 March 2018.

[19]      Dr John Coyne, Submission 4, p. 4.

[20]      ISACA, Submission 13, [p. 4].

[21]      DHA, AGD and ABF, Submission 28, p. 10. See Chapter 1 for further explanation of the 5G network.

[22]      Dr John Coyne, Committee Hansard, 29 March 2018, p. 6.

[23]      Mr Michael Phelan, Chief Executive Officer, Australian Criminal Intelligence Commission (ACIC) and Director, Australian Institute of Criminology (AIC), Committee Hansard, 11 May 2018, p. 48.

[24]      Mr Michael Phelan, Chief Executive Officer, ACIC & Director, AIC, Committee Hansard, 11 May 2018, p. 49.

[25]      I Warren, A Molnar and M Mann, 'Poisoned water holes: the legal dangers of dark web policing', The Conversation, 7 September 2017, https://www.news.com.au/technology/online/poisoned-water-holes-the-legal-dangers-of-dark-web-policing/news-story/
285655e36981515e35e2290360f9e646
(accessed 20 December 2018).

[26]      Drs Monique Mann, Adam Molnar, Ian Warren and Angela Daly, Australian Privacy Foundation, Digital Rights Watch Australia, Electronic Frontiers Australia, and Future Wise, Submission 23, p. 9.

[27]      Dr Monique Mann et al, Submission 23, p. 9. See also discussion of law enforcement challenges in relation to big data in Chapter 5.

[28]      Dr Monique Mann et al, Submission 23, p. 10.

[29]      Dr John Coyne, Submission 4, p. 4.

[30]      ASIC, Submission 11, p. 6.

[31]      Mr Nathan White, Senior Legislative Manager, Access Now, Committee Hansard, 11 May 2018, p. 2. Access Now represents over 300 individuals, organisations and companies from more than 50 countries. It advocates the development and use of secure communications tools and technologies and rejects policies that prevent or undermine the use of strong encryption.

[32]      Dr John Coyne, Committee Hansard, 29 March 2018, p. 5. 

[33]      Law Council of Australia, Submission 21, p. 7.

[34]      See for example Dr Monique Mann et al, Submission 23, p. 13; Access Now, Submission 14; Law Council of Australia, Submission 21, p. 8.

[35]      Scram Software, Submission 5, p. 3.

[36]      Ms Amy Stepanovich, US Policy Manager and Global Policy Council, Access Now, Committee Hansard, 11 May 2018, p. 4.

[37]      Ms Lizzie O'Shea and Ms Elise Thomas, Submission 15, p. 4.

[38]      Cortex IT Labs Pty Ltd, Submission 12, p. 2.

[39]      ACIC and AIC, Submission 29, p. 6.

[40]      GPEN, Submission 19, p. 5; CSRC, Submission 8, p. 6.

[41]      D Moore and T Rid, 'Cryptopolitik and the Darknet', Survival: Global Politics and Strategy, vol. 58, no. 1, 2016, https://www.tandfonline.com/doi/full/10.1080/
00396338.2016.1142085
(accessed 20 December 2018).

[42]      Mr Paul Templeton, Submission 32, p. 1. TOR or 'The Onion Routing project' refers to a type of software that allows users to use the internet anonymously. Onion routing is implemented by encryption, and is used for both legal and illegal purposes. See GPEN, Submission 19, p. 5.

[43]      CSRC, Submission 8, p. 6.

[44]      Dr James Martin, Submission 9, p. [3].

[45]      CSRC, Submission 8, p. 6.

[46]      CSRC, Submission 8, p. 9.

[47]      Dr James Martin, Submission 9, [p. 3].

[48]      United States (US) Department of Justice, 'First nationwide undercover operation targeting darknet vendors results in arrests of more than 35 individuals selling illicit goods and the seizure of weapons, drugs and more than $23.6 million', Media release, 27 June 2018, https://www.justice.gov/usao-mdpa/pr/first-nationwide-undercover-operation-targeting-darknet-vendors-results-arrests-more-35 (accessed 18 March 2019).

[49]      Hal Hodson, 'Silk Road bust hints at FBI's new cybercrime powers', New Scientist, 4 October 2013, https://www.newscientist.com/article/dn24345-silk-road-bust-hints-at-fbis-new-cybercrime-powers/ (accessed 18 March 2019).

[50]      The US Department of Justice, 'AlphaBay, the largest online 'dark market' shut down', Media release, 20 July 2017, https://www.justice.gov/opa/pr/alphabay-largest-online-dark-market-shut-down (accessed 18 March 2019).

[51]      Jeff Sessions, cited in 'AlphaBay, the largest online 'dark market' shut down'.

[52]      Australian Transaction Reports and Analysis Centre (AUSTRAC), Submission 30, p. 5. See also Chapter 1 for discussion of cryptomarkets.

[53]      AUSTRAC, Submission 30, p. 5.

[54]      ASIC, Submission 11, p. 5.

[55]      AUSTRAC, Submission 30, p. 5.

[56]      AUSTRAC, Submission 30, pp. 8−9.

[57]      CSRC, Submission 8, p. 7. See also GPEN, Submission 19, p. 5.

[58]      CSRC, Submission 8, p. 7. 

[59]      DHA, AGD and ABF, Submission 28, p. 9.

[60]      DHA, AGD and ABF, Submission 28, p. 16.

[61]      Mr Andrew Warnes, Assistant Secretary, Communications Security and Intelligence Branch, AGD, Committee Hansard, 11 May 2018, pp. 48−49.

[62]      DHA, AGD and ABF, Submission 28, p. 16.

[63]      CSRC, Submission 8, p. 6.

[64]      Dr David Irvine, Chair, CRSC, Committee Hansard, 29 March 2018, p. 23. 

[65]      The US Department of Justice, 'Deputy Attorney General Rod J. Rosenstein Delivers Remarks on Encryption at the United States Naval Academy', 10 October 2017, cited in ASIC, Submission 11, p. 6.

[66]      Western Australia Police Force (WA Police), Submission 31, p. 7.

[67]      Dr John Coyne, Committee Hansard, 29 March 2018, pp. 6–7.

[68]      Dr John Coyne, Committee Hansard, 29 March 2018, p. 7.

[69]      Nyman Gibson Miralis Defence Lawyers and Advisors, Submission 27, [p. 2].

[70]      GPEN, Submission 19, p. 5.

[71]      Dr John Coyne, Submission 4, p. 6.

[72]      Dr John Coyne, Committee Hansard, 29 March 2018, p. 4.

[73]      Mr Matthew Loeb, Chief Executive Officer, ISACA, Committee Hansard, 29 March 2018, p. 13.

[74]      ASIC, Submission 11, p. 6.

[75]      Scram Software, Submission 5, p. 3.

[76]      ASIC, Submission 11, p. 7.

[77]      ACIC and AIC, Submission 29, p. 8.

[78]      ACIC and AIC, Submission 29, p. 8; Mr Michael Phelan, Chief Executive Officer, ACIC, Committee Hansard, 11 May 2018, p. 45. See Chapter 2 for further discussion of Mutual Legal Assistance Treaties.

[79]      Mr Andrew Warnes, Assistant Secretary, Communications Security and Intelligence Branch, AGD, Committee Hansard, 11 May 2018, p. 45.

[80]      Mr Ramzi Jabbour, Deputy Commissioner, Capability, AFP, Committee Hansard, 11 May 2018, p. 45. 

[81]      Mr Ramzi Jabbour, Deputy Commissioner, AFP, Committee Hansard, 11 May 2018, p. 45. 

[82]      WA Police, Submission 31, p. 2.

[83]      Professor Dan Jerker B Svantesson, Submission 3, p. 8.

[84]      Professor Dan Jerker B Svantesson, Submission 3, p. 2.

[85]      WA Police, Submission 31, p. 2.

[86]      WA Police, Submission 31, p. 3.

[87]      WA Police, Submission 31, p. 3.

[88]      Mr Andrew Warnes, Assistant Secretary, Communications Security and Intelligence Branch,AGD, Committee Hansard, 11 May 2018, p. 45.

[89]      CSRC, Submission 8, p. 9.

[90]      Dr John Coyne, Committee Hansard, 29 March 2018, p. 6. See also Chapter 6 for further discussion of the challenges for law enforcement in securing electronic evidence.

[91]      ACLEI, Submission 1, p. 1.

[92]      ACLEI, Submission 1, p. 2.

[93]      ACLEI, Submission 1, p. 2.

[94]      ACLEI, Submission 1, p. 2.

[95]      ACLEI, Submission 1, p. 2.

[96]      ACLEI, Submission 1, p. 2.

[97]      Dr John Coyne, Submission 4, p. 8.

[98]      Dr John Coyne, Submission 4, p. 8. 'Silk Road' was an online marketplace operating in the dark web where buyers could browse the market anonymously using cryptocurrency. It was successfully shut down by US government agencies in 2013. More recently, the US Justice Department shut down AlphaBay, a dark website ten times the size of Silk Road. See ASIC, Submission 11, p. 4.

[99]      WA Police, Submission 31, p. 6.

[100]    WA Police, Submission 31, p. 7.

Chapter 4 - Responding to the encryption challenge

[1]        Australian Securities and Investments Commission (ASIC), Submission 11, p. 6.

[2]        Australian Criminal Intelligence Commission (ACIC) and Australian Institute of Criminology (AIC), Submission 29, p. 4.

[3]        ISACA, Submission 13, [p. 7].

[4]        Dr Monique Mann, Dr Adam Molnar, Dr Ian Warren and Dr Angela Daly, Australian Privacy Foundation, Digital Rights Watch Australia, Electronic Frontiers Australia and Future Wise, Submission 23, p. 11.

[5]        Dr Monique Mann et al, Submission 23, p. 12.

[6]        Department of Home Affairs (DHA), Attorney-General's Department (AGD) and Australian Border Force (ABF), Submission 28, p. 17.

[7]        DHA, 'Five Country Ministerial 2018: official communiqué', Media release, 30 August 2018, p. 3.

[8]        Five Country Ministerial/Quintet Meeting of Attorneys-General Australia 2018, 'Statement of principles on access to evidence and encryption', DHA, 30 August 2018, https://parlinfo.aph.
gov.au/parlInfo/search/display/display.w3p;query=Id%3A%22media%2Fpressrel%2F6345572%22
(accessed 21 January 2019).

[9]        DHA, 'Statement of Principles on Access to Evidence and Encryption', https://web.archive.org/
web/20180925154820/https://www.homeaffairs.gov.au/about/national-security/five-country-ministerial-2018/access-evidence-encryption
(accessed 22 January 2019).

[10]      DHA, 'Statement of Principles'.

[11]      Investigatory Powers Act 2016 (UK), http://www.legislation.gov.uk/ukpga/2016/25/contents; and Telecommunications (Interception Capability and Security) Act 2013 (NZ), http://www.legislation.govt.nz/act/public/2013/0091/latest/DLM5177923.html (all accessed 21 January 2019).

[12]      DHA, AGD and ABF, Submission 28, p. 17; see also Ms Esther George, Lead Cybercrime Consultant, International Association of Prosecutors, Committee Hansard, 29 March 2018, p. 46.

[13]      DHA, AGD and ABF, Submission 28, p. 17.

[14]      House of Representatives, Telecommunications and Other Legislation Amendment (Assistance and Access) Bill 2018, Explanatory Memorandum, pp. 2−3, https://www.aph.gov.au/
Parliamentary_Business/Bills_Legislation/Bills_Search_Results/Result?bId=r6195
(accessed 12 December 2018).

[15]      Parliamentary Joint Committee on Intelligence and Security (PJCIS), Joint statement by Chair and Deputy Chair, Media release, 22 November 2018, https://www.aph.gov.au/Parliamentary_
Business/Committees/Joint/Intelligence_and_Security/TelcoAmendmentBill2018/Media_Releases
(accessed 21 January 2019).

[16]      PJCIS, Advisory Report on the Telecommunications and Other Legislation Amendment (Assistance and Access) Bill 2018, December 2018, pp. 1−2, https://www.aph.gov.au/
Parliamentary_Business/Committees/Joint/Intelligence_and_Security/TelcoAmendmentBill2018/Report_1
(accessed 13 December 2018).

[17]      PJCIS, Advisory Report, p. 2.

[18]      PJCIS, Advisory Report, p. 2.

[19]      PJCIS, Advisory Report, Recommendation 1, p. 3 and Recommendation 16, p. 8. The Independent National Security Legislation Monitor is required to review its operation, effectiveness and implications after 18 months.

[20]      See Review of the Telecommunications and Other Legislation Amendment (Assistance and Access) Act 2018, https://www.aph.gov.au/Parliamentary_Business/Committees/Joint/
Intelligence_and_Security/ReviewofTOLAAct
(accessed 11 February 2019).

[21]      See, for example, P Smith, Y Redrup and A Tillett, '"As bad as Huawei": Australian encryption bill slammed after passing House of Reps', Financial Review, 6 December 2018, https://www.afr.com/technology/web/security/as-bad-as-huawei-australian-encryption-bill-slammed-after-passing-parliament-20181206-h18tk3; A Bogle, '"Outlandish" encryption laws leave Australian tech industry angry and confused', ABC News, 7 December 2018, https://www.abc.net.au/news/science/2018-12-07/encryption-bill-australian-technology-industry-fuming-mad/10589962 (all accessed 11 February 2019).

[22]      C Kruger, '"Negative for tech": Fitch slams encryption laws, Sydney Morning Herald, 13 December 2018, https://www.smh.com.au/technology/negative-for-tech-sector-fitch-slams-australia-s-new-encryption-laws-20181213-p50m55.html (accessed 20 December 2018).

[23]      Inspector-General of Intelligence and Security (IGIS), Submission 1.1, PJCIS, Review of the Telecommunications and Other Legislation Amendment (Assistance and Access) Act 2018, pp. 6−8. The overarching purpose of the IGIS’s activities is to ensure that each intelligence agency acts legally and with propriety, complies with ministerial guidelines and directives, and respects human rights.

[24]      Mr Mike Burgess cited in A Probyn, 'Spy chief argues encryption laws target terrorists, not everyday Australians, in "myth-busting" missive', ABC News, 12 December 2018, https://www.abc.net.au/news/2018-12-12/encryption-laws-mike-burgess-australian-signals-directorate/10612570 (accessed 20 December 2018).

[25]      DHA, AGD, and ABF, Submission 28, p. 16.

[26]      See for example, Dr Vanessa Teague, Melbourne School of Engineering, The University of Melbourne, Submission 2, [p. 3]; Dr John Coyne, Submission 4, p. 5; Pirate Party Australia, Submission 16, [pp. 6−7]; Dr Monique Mann, Co-Chair, Surveillance Committee, Board of Directors, Australian Privacy Foundation and Dr Adam Molnar, Vice-Chair, Australian Privacy Foundation, Committee Hansard, 29 March 2018, p. 16.

[27]      Dr Monique Mann et al, Submission 23, p. 12.

[28]      Dr Monique Mann et al, Submission 23, p. 13.

[29]      Dr Monique Mann et al, Submission 23, p. 14.

[30]      Mr Nathan White, Senior Legislative Manager, Access Now, Committee Hansard, 11 May 2018, p. 2.

[31]      Mr Nathan White, Senior Legislative Manager Access Now, Committee Hansard, 11 May 2018, p. 2.

[32]      Dr John Coyne, Committee Hansard, 29 March 2018, p. 5.

[33]      Law Council of Australia, Submission 21, p. 11.

[34]      Law Council of Australia, Submission 21, p. 8.

[35]      Dr Vanessa Teague, Melbourne School of Engineering, The University of Melbourne, Submission 2, [p. 2].

[36]      Dr Vanessa Teague, Melbourne School of Engineering, The University of Melbourne, Submission 2, [p. 3].

[37]      Ms Lizzie O’Shea and Ms Elise Thomas, Submission 15, pp. 1−2.

[38]      Digital Industry Group Incorporated (DIGI), Submission 20, p. 6.

[39]      Law Council of Australia, Submission 21, p. 7.

[40]      DHA, AGD and ABF, Submission 28, p. 9.

[41]      DHA, AGD and ABF, Submission 28, p. 16.

[42]      DHA, AGD and ABF, Submission 28, p. 16.

[43]      Gov.UK, Consultation outcome: Investigatory Powers Act 2016, available: https://www.gov.uk/government/consultations/investigatory-powers-act-2016 (accessed 19 March 2019). 

Chapter 5 - Operational challenges and vulnerabilities

[1]        International Association of Prosecutors—Global Prosecutors E-Crime Network (GPEN), Submission 19, p. 5. See Chapter 1 for further discussion of new and emerging ICTs and the implications for law enforcement.

[2]        Department of Home Affairs (DHA), Attorney-General's Department (AGD) and Australian Border Force (ABF), Submission 28, p. 9.

[3]        Dr John Coyne, Submission 4, p. 3.

[4]        Cyber Security Research Centre (CSRC), Submission 8, p. 10.

[5]        Western Australia Police Force (WA Police), Submission 31, p. 1.

[6]        WA Police, Submission 31, p. 1.

[7]        DHA, AGD and ABF, Submission 28, p. 9.

[8]        Australian Criminal Intelligence Commission (ACIC) and Australian Institute of Criminology (AIC), Submission 29, p. 4.

[9]        ACIC and AIC, Submission 29, p. 4.

[10]      Detective Inspector Tim Thomas, Assistant Divisional Officer for Technology Crime Services, WA Police, Committee Hansard, 29 March 2018, p. 30.

[11]      Detective Inspector Tim Thomas, Assistant Divisional Officer for Technology Crime Services, WA Police, Committee Hansard, 29 March 2018, p. 30.

[12]      Mr Matthew Loeb, Chief Executive Officer, ISACA, Committee Hansard, 29 March 2018, p. 12.

[13]      Detective Inspector Thomas John Shillito (John) Manley, Officer in Charge of the Victorian Joint Anti-Child Exploitation team, Victoria Police, Committee Hansard, 11 May 2018, p. 33.

[14]      Detective Inspector Thomas John Shillito (John) Manley, Officer in Charge of the Victorian Joint Anti-Child Exploitation team, Victoria Police, Committee Hansard, 11 May 2018, p. 34.

[15]      Digital Industry Group Incorporated (DIGI), Submission 20, p. 4.

[16]      Dr Adam Molnar, Vice Chair, Surveillance Committee, Australian Privacy Foundation, Committee Hansard, 29 March 2018, p. 19.

[17]      Mr Matthew Loeb, Chief Executive Officer, ISACA, Committee Hansard, 29 March 2018, p. 10.

[18]      Mr Alexandru Caciuloiu, Cybercrime Project Coordinator, Southeast Asia and the Pacific, United Nations Office on Drugs and Crime Regional Office for Southeast Asia and the Pacific, Committee Hansard, 11 May 2018, p. 39.

[19]      DHA, AGD and ABF, Submission 28, p. 6. Also see CSRC, Submission 8, p. 12.

[20]      Dr John Coyne, Committee Hansard, 29 March 2018, p. 2. 

[21]      CSRC, Submission 8, pp. 11−12.

[22]      CSRC, Submission 8, pp. 11−12.

[23]      Mr David Irvine, Chair, CSRC, Committee Hansard, 29 March 2018, p. 23.

[24]      CSRC, Submission 8, p. 2.

[25]      CSRC, Submission 8, pp. 13−14.

[26]      Mr David Irvine, Chair, CSRC, Committee Hansard, 29 March 2018, p. 23.

[27]      WA Police, Submission 31, pp. 1, 4.

[28]      DIGI, Submission 20, p. 3.

[29]      National Crime Agency (NCA), NCA Specials, available: http://www.nationalcrimeagency.gov.uk/careers/specials (accessed 21 March 2019).

[30]      NCA, NCA Specials: Frequently Asked Questions, 20 July 2017, available: http://www.nationalcrimeagency.gov.uk/publications/559-nca-specials-faq/file (accessed 21 March 2019). 

[31]      NCA, NCA Specials: Frequently Asked Questions, 20 July 2017. 

[32]      NCA, NCA Specials: Frequently Asked Questions, 20 July 2017. 

[33]      Mr Matthew Loeb, Chief Executive Officer, ISACA, Committee Hansard, 29 March 2018, p. 14.

[34]      Mr Matthew Loeb, Chief Executive Officer, ISACA, Committee Hansard, 29 March 2018, p. 14.

[35]      Mr Andrew Colvin, Commissioner, Australian Federal Police (AFP), Parliamentary Joint Committee on Law Enforcement (PJCLE), Australian Federal Police annual report, Committee Hansard, 22 February 2019, p. 5.

[36]      Mr Neil Gaughan, Deputy Commissioner, Operations, AFP, PJCLE, Committee Hansard, 22 February 2019, p. 6.

[37]      Mr Neil Gaughan, Deputy Commissioner, Operations, AFP, PJCLE, Committee Hansard, 22 February 2019, p. 6.

[38]      CSRC, Submission 8, p. 12.

[39]      ACIC and AIC, Submission 29, p. 9.

[40]      DHA, AGD and ABF, Submission 28, p. 12.

[41]      WA Police, Submission 31, p. 4. 

[42]      WA Police, Submission 31, p. 4. 

[43]      Dr John Coyne, Committee Hansard, 29 March 2018, p. 2. 

[44]      Dr Monique Mann, Dr Adam Molnar, Dr Ian Warren and Dr Angela Daly, Australian Privacy Foundation, Digital Rights Watch Australia, Electronic Frontiers Australia and Future Wise, Submission 23, p. 2.

[45]      CSRC, Submission 8, p. 9.

[46]      Mr Nathan White, Senior Legislative Manager, Access Now, Committee Hansard, 11 May 2018, p. 6.

[47]      DIGI, Submission 20, p. 4.

[48]      Mr Guy Carlisle, Chief Information Officer, Northern Territory Police, Fire and Emergency Services, Committee Hansard, 29 March 2018, p. 28.

[49]      WA Police, Submission 31, p. 3.

[50]      Dr John Coyne, Submission 4, p. 7.

[51]      Mr Matthew Loeb, Chief Executive Officer, ISACA, Committee Hansard, 29 March 2018, p. 9.

[52]      Ms Amie Stepanovich, United States Policy Manager and Global Policy Counsel, Access Now, Committee Hansard, 11 May 2018, p. 5.

[53]      Dr John Coyne, Submission 4, p. 7.

[54]      Dr John Coyne, Submission 4, p. 7.

[55]      ACIC and AIC, Submission 29, p. 11.

[56]      ACIC and AIC, Submission 29, p. 10.

[57]      ACIC and AIC, Submission 29, p. 10.

[58]      ACIC and AIC, Submission 29, p. 13. Also see Chapter 6 for further discussion of the National Criminal Investigation System.

[59]      GPEN, Submission 19, p. 3.

[60]      GPEN, Submission 19, p. 2.

[61]      GPEN, Submission 19, p. 3.

[62]      DHA, AGD and ABF, Submission 28, p. 14.

[63]      Dr John Coyne, Submission 4, p. 6.

[64]      Dr John Coyne, Submission 4, pp. 8−9.

[65]      Dr John Coyne, Submission 4, p. 5. See also Chapter 3 for discussion of the new operational reality for law enforcement.

[66]      Dr John Coyne, Submission 4, p. 8.

[67]      'The digital universe of opportunities: rich data and the increasing value of the Internet of Things', IDC, April 2014, https://www.emc.com/leadership/digital-universe/2014iview/executive-summary.htm (accessed 18 February 2019).

[68]      Mr Jonathon Bamford, Assistant Commissioner, Information Commissioner's Office, Uncorrected transcript of oral evidence given before the House of Commons Home Affairs Committee, 1 May 2007, available: https://publications.parliament.uk/pa/cm200607/cmselect/cmhaff/uc508-i/uc50802.htm (accessed 21 March 2019). 

[69]      Data to Decisions Cooperative Research Centre (D2D CRC), Submission 7, p. 2.

[70]      Ms Tania Churchill, Director, Enterprise Analytics, Australian Transaction Reports and Analysis Centre (AUSTRAC), Committee Hansard, 11 May 2018, p. 54.

[71]      CSRC, Submission 8, p. 10.

[72]      D2D CRC, Submission 7, pp. 4−8.

[73]      Confidential, Submission 33, p. 7–8.

[74]      Drs Monique Mann, Adam Molnar, Ian Warren and Angela Daly, Australian Privacy Foundation, Digital Rights Watch Australia, Electronic Frontiers Australia, and Future Wise, Submission 23, p. 18.

[75]      Dr Monique Mann et al, Submission 23, pp. 15−16.

[76]      Dr Adam Molnar, Vice-Chair, Australian Privacy Foundation, Committee Hansard, 29 March 2018, p. 17.

[77]      Dr Monique Mann, Co-Chair, Surveillance Committee, Board of Directors, Australian Privacy Foundation, Committee Hansard, 29 March 2018, p. 17.

[78]      Dr Monique Mann et al, Submission 23, pp. 9, 11.

[79]      Ms Tania Churchill, Director, Enterprise Analytics, AUSTRAC, Committee Hansard, 11 May 2018, p. 55.

[80]      Dr Lyria Bennett Moses, Project Leader, Law and Policy Program, D2D CRC, Committee Hansard, 11 May 2018, p. 13.

[81]      Dr Lyria Bennett Moses, Project Leader, Law and Policy Program, D2D CRC, Committee Hansard, 11 May 2018, p. 13.

[82]      Council of Australian Governments, Special Meeting of the Council of Australian Governments on Counter-Terrorism Communique, 5 October 2017, https://www.coag.gov.au/meeting-outcomes/special-meeting-council-australian-governments-counter-terrorism-communique (accessed 12 December 2018). The agreement included the signing of an Intergovernmental Agreement on Identity Matching Services.

[83]      Dr Monique Mann et al, Submission 23, pp. 16−17.

[84]      Dr Monique Mann et al, Submission 23, p. 15.

[85]      The existing National Automated Fingerprint Identification System remains in use. Mr Michael Phelan, Chief Executive Officer, ACIC, Australian Criminal Intelligence Commission annual report 2016−17, PJCLE, Committee Hansard, 29 November 2018, p. 4.

[86]      Law Council of Australia, Submission 21, pp. 12−13.

[87]      WA Police, Submission 31, p. 8.

[88]      WA Police, Submission 31, p. 8.

[89]      'The Internet of Things (IoT): An Overview', Internet Society, https://www.internetsociety.org/resources/doc/2015/iot-overview?gclid=EAIaIQobChMI9Zqf0siC4AIVFR4rCh3hPwVVEAAYAyAAEgL_gPD_BwE (accessed 23 January 2019).

[90]      CSRC, Submission 8, p. 6; DHA, AGD and ABF, Submission 28, p. 16.

[91]      South Eastern Centre Against Sexual Assault and Family Violence (South Eastern CASA), Submission 18, p. 3.

[92]      ACIC and AIC, Submission 29, p. 7.

[93]      South Eastern CASA, Submission 18, p. 2.

[94]      South Eastern CASA, Submission 18, p. 2.

[95]      DIGI, Submission 20, p. 2.

[96]      DIGI, Submission 20, p. 2.

[97]      South Eastern CASA, Submission 18, p. 4.

[98]      Ms Lizzie O'Shea and Ms Elise Thomas, Submission 15, p. 4.

[99]      Detective Inspector John Manley, Officer in Charge of the Victorian Joint Anti-Child Exploitation Team, Victoria Police, Committee Hansard, 11 May 2018, p. 35.

[100]    Mr Matthew Loeb, Chief Executive Officer, ISACA, Committee Hansard, 29 March 2018, p. 12. 

[101]    Law Council of Australia, Submission 21, pp. 12−13.

Chapter 6 - Strategic challenges and opportunities

[1]        Ms Esther George, Lead Cybercrime Consultant, International Association of Prosecutors (IAP), Committee Hansard, 29 March 2018, p. 40.

[2]        Mr Matthew Loeb, Chief Executive Officer, ISACA, Committee Hansard, 29 March 2018, p. 10.

[3]        European Union Agency for Network and Information Security (ENISA), 'ENISA: 15 years of building cybersecurity bridges together', Press release, 20 March 2019, available: https://www.enisa.europa.eu/news/enisa-news/enisa-15-years-of-building-cybersecurity-bridges-together (accessed 26 March 2019). 

[4]        ENISA, About ENISA, available: https://www.enisa.europa.eu/about-enisa (access 26 March 2019). 

[5]        Mr Matthew Loeb, Chief Executive Officer, ISACA, Committee Hansard, 29 March 2018, p. 10.

[6]        Mr Matthew Loeb, Chief Executive Officer, ISACA, Committee Hansard, 29 March 2018, p. 9.

[7]        Mr Matthew Loeb, Chief Executive Officer, ISACA, Committee Hansard, 29 March 2018, p.10. 

[8]        Mr Matthew Loeb, Chief Executive Officer, ISACA, Committee Hansard, 29 March 2018, p. 9.

[9]        Mr Matthew Loeb, Chief Executive Officer, ISACA, Committee Hansard, 29 March 2018, p. 9.

[10]      Australian Government, About the ACORN, available: https://www.acorn.gov.au/about-acorn (accessed 22 March 2019). 

[11]      Australian Government, About the ACORN, available: https://www.acorn.gov.au/about-acorn (accessed 22 March 2019).

[12]      Department of Home Affair (DHA), 'Cybercrime', https://archive.homeaffairs.gov.au/about/crime/cybercrime (accessed 5 December 2018).

[13]      Mr Michael Phelan, APM, Chief Executive Officer, Australian Criminal Intelligence Commission (ACIC) and Director, Australian Institute of Criminology, Committee Hansard, 11 May 2018, p. 44.

[14]      Detective Inspector Tim Thomas, Assistant Divisional Officer for Technology Crime Services, Western Australian Police (WA Police), Committee Hansard, 29 March 2018, pp. 29, 32.

[15]      A Morgan, C Dowling, R Brown et al, Evaluation of the Australian Cybercrime Online Reporting Network, Australian Institute of Criminology, October 2016, pp. 9−14, https://aic.gov.au/sites/default/files/2018/08/acorn_evaluation_report_.pdf (accessed 6 December 2018).

[16]      'National Criminal Intelligence System', ACIC.

[17]      Mr Michael Phelan, ACIC, PJCLE, ACIC annual report 2016−17, Committee Hansard, 29 November 2018, p. 3. Tranche 1 is focused on connecting the states and territories with real-time information enabling the ACIC to do the analytics.

[18]      ACIC and Australian Institute of Criminology (AIC), Submission 29, p. 13.

[19]      ACIC and AIC, Submission 29, p. 10.

[20]      Mr Michael Phelan, Chief Executive Officer, ACIC, Committee Hansard, 29 November 2018, p. 3.

[21]      Dr Lyria Bennett Moses, Project Leader, Law and Policy Program, Data to Decisions Cooperative Research Centre (D2D CRC), Committee Hansard, 11 May 2018, p. 9.

[22]      D2D CRC, Submission 7, p. 4.

[23]      Data to Decisions Cooperative Research Centre (D2D CRC), Submission 7, p. 3. The issue of big data is discussed further in Chapter 6.

[24]      Dr Sanjay Mazumdar, Chief Executive Officer, D2D CRC, Committee Hansard, 11 May 2018, p. 8.

[25]      DHA, Attorney-General's Department (AGD) and Australian Border Force (ABF), Submission 28, p. 6.

[26]      WA Police, Submission 31, pp. 1−2.

[27]      Victoria Police, Submission 35, [pp. 1−2].

[28]      Dr John Coyne, Committee Hansard, 29 March 2018, p. 1.

[29]      Dr John Coyne, Committee Hansard, 29 March 2018, p. 1.

[30]      Dr John Coyne, Submission 4, p. 8.

[31]      DHA, AGD and ABF, Submission 28, p. 9.

[32]      DHA, AGD and ABF, Submission 28, p. 11.

[33]      DHA, AGD and ABF, Submission 28, p. 11.

[34]      Mr Andrew Warnes, Assistant Secretary, Communications Security and Intelligence Branch, AGD, Committee Hansard, 11 May 2018, pp. 48–49.

[35]      Mr Michael Phelan, Chief Executive Officer, ACIC, Committee Hansard, 11 May 2018, p. 49. 

[36]      Senate Legal and Constitutional Affairs References Committee, Comprehensive revision of the Telecommunications (Interception and Access) Act 1979, March 2015, p. 11.

[37]      Parliamentary Joint Committee on Intelligence and Security, Report of the Inquiry into Potential Reforms of Australia's National Security Legislation, May 2013, p. xxv. 

[38]      WA Police, Submission 31, p. 8.

[39]      Commonwealth of Australia, Department of the Prime Minister and Cabinet, Australia's Cyber Security Strategy, 2016, pp. 2−3. See Chapter 3 for further details about CERT.

[40]      WA Police, Submission 31, p. 8.

[41]      Mr Matthew Loeb, Chief Executive Officer, ISACA, Committee Hansard, 29 March 2018, p. 10.

[42]      Mr Matthew Loeb, Chief Executive Officer, ISACA, Committee Hansard, 29 March 2018, p. 10.

[43]      Mr Matthew Loeb, Chief Executive Officer, ISACA, Committee Hansard, 29 March 2018, p. 11.

[44]      Ms Esther George, Lead Cybercrime Consultant, IAP, Committee Hansard, 29 March 2018, p. 45.

[45]      Mr Michael Phelan, Chief Executive Officer, ACIC, Committee Hansard, 11 May 2018, p. 52.

Appendix 4 - Government agencies with existing cybercrime and cyber security responsibilities[1]

[1]        Cyber Security Research Centre, Submission 8, pp. 19−20.