PG Logo
  • Business Insider
  • Gizmodo
  • Kotaku
  • OpenAir Cinemas
  • Pedestrian.TV
Logo Level Up Your Life
Subscribe
  • Life
    • Money
    • Home
    • Entertainment
    • Travel
    • Health
    • Design
    • View All Life
  • Work
    • Productivity
    • Communicate
    • Organise
    • Career
    • Business Travel
    • Security
    • Small Business & Startups
    • View All Work
  • Deals
  • Coupons
  • Makes Cents
  • Life
    • Money
    • Home
    • Entertainment
    • Travel
    • Health
    • Design
    • View All Life
  • Work
    • Productivity
    • Communicate
    • Organise
    • Career
    • Business Travel
    • Security
    • Small Business & Startups
    • View All Work
  • Deals
  • Coupons
  • Makes Cents

Want Lifehacker's email newsletter?

Follow us, subscribe and get in touch

  • Contact Lifehacker Australia
  • Facebook
  • Twitter
  • Instagram
  • Youtube
  • Linkedin
  • RSS

Recent Posts

What’s the Difference between ‘Dry Needling’ and Acupuncture?
Image: Getty
What’s the Difference between ‘Dry Needling’ and Acupuncture?
‘Christmas in a Cup’: How Mulled Wine Won Over Aussies as the Top Winter Drop
Image: Getty
‘Christmas in a Cup’: How Mulled Wine Won Over Aussies as...
Are You Embarrassed to Be Heterosexual? Say Hello to ‘Heteropessimism’
Image: Getty
Are You Embarrassed to Be Heterosexual? Say Hello to ‘Heteropessimism’
Men, You Have Pelvic Floors Too and Should Be Exercising Them Regularly
Image: iStock
Men, You Have Pelvic Floors Too and Should Be Exercising Them...
The Difference Between Emotional Neglect and Emotional Invalidation (and How They Affect Children)
Photo: MPIX, Shutterstock
The Difference Between Emotional Neglect and Emotional Invalidation (and How They...

Deals

PSA: All These EOFY Sales End At Midnight
Image: Mirel Kipioro

PSA: All These EOFY Sales End At Midnight

Save Up to $380 on These 6 Robot Vacuums and Put Your Housework on Autopilot
Image: eternalcreative
Save Up to $380 on These 6 Robot Vacuums and Put...
13 Big Brand Bargains From Ebay’s Massive EOFY Sale
Image: eBay
13 Big Brand Bargains From Ebay’s Massive EOFY Sale
From Anal Beads to Vibrators: These Are the Best EOFY Sex Toy Sales
Image: JuliaMikhaylova
From Anal Beads to Vibrators: These Are the Best EOFY Sex...
Clean Up This EOFY With up to $400 off Dyson’s Cordless Vacuums
Image: Amazon / Dyson
Clean Up This EOFY With up to $400 off Dyson’s Cordless...

Sponsored Articles

Here’s How Much Access Australian Police Already Have To Your Data

Share

Michael Wilson

Published 5 years ago: September 8, 2017 at 2:45 pm -
Filed to:data retention
featuremetadatapolice
Here’s How Much Access Australian Police Already Have To Your Data
Image: iStock

The Australian government wants new powers to access encrypted communications, but do they need them? Police and intelligence agencies already have significant abilities to access data about our emails, phone calls and text messages if we’re suspected of committing a crime, although it can be difficult to tell exactly what they’re doing with them.

The government argues existing interception capabilities are inadequate to protect national security. According to Attorney-General George Brandis, backdoor access to encrypted communications would redress the “degradation of our intelligence capability” to prevent terrorism.


Many Australians are unaware of current police and intelligence powers when it comes to accessing our data. As the government lobbies for new levels of access, that needs to change.

‘Backdoor’ access

The government’s proposal to compel technology companies to provide access to encrypted messaging services is modelled on laws passed by other members of the Five Eyes surveillance alliance, of which Australia is a member.

Deputy US Attorney-General Rod Rosenstein recently announced the Department of Justice intends to demand interception of encrypted communications. New Zealand already requires technology companies to grant access. In the UK, authorities may force decryption where it is technologically feasible.

As with our allies, it is unclear if Australia’s laws will require so-called “backdoor” vulnerabilities to be built into messaging applications like Facebook Messenger or WhatsApp.

They could compel access via decryption keys or they might enable remote access to devices for interception of communications “at the ends”.

In response, cryptographers argue it is not mathematically possible to access end-to-end encrypted messages via interception without undermining online privacy for everyone.

The current state of telecommunications surveillance

The government already has various powers to access metadata, the contents of digital conversations and computer networks.

The Attorney-General’s Department recently released its annual report on telecommunications surveillance.

Thanks to the Telecommunications (Interception and Access) Act (TIA Act), law enforcement and other agencies can access stored communications with a warrant. This can include “email, SMS or voice messages stored on a carrier’s network”. In other words, the contents of any communication not encoded via encryption.

Agencies may also apply for “preservation notices” to compel telecommunications companies to preserve data.

During the 2015-16 financial year, there were 712 warrants issued for access to stored communications. Data is not available about the types of offences these warrants were used for. It is also not clear how the telecommunications information was used in investigations.

The issue of metadata retention

A controversial 2015 amendment to the TIA Act requires telecommunication service providers to retain metadata for two years.

This allows authorised law enforcement agencies warrantless access to information about digital communications such as the recipient or time sent, but not their content.

However, some agencies that aren’t meant to be able to access metadata are still making requests under different legal regimes, according to the Communications Alliance, and there have already been reported breaches where an Australian Federal Police officer accessed a journalist’s metadata without an appropriate warrant.

The 2015-16 financial year was a grace period for service providers to comply with retention requirements. During this time, there were 332,639 authorisations by criminal law-enforcement agencies.

Authorisations occurred most for drugs or homicide investigations. It’s possible this may indicate police are relying on ready access to metadata rather than pursuing traditional investigatory methods.

Computer network operations

Recent amendments to the TIA Act also allow the Australian Security Intelligence Organisation (ASIO) and authorised law enforcement agencies remote access to entire computer networks.

These agencies may covertly invade a network to intercept communications at the point they are received. This works whether communications are encrypted or not.

These laws have been criticised as too broad, potentially undermining the privacy of Australians, and have dramatically expanded ASIO’s powers.

It is unclear how often these surveillance powers are exercised due to the secrecy provisions surrounding ASIO operations.

The need for additional surveillance capabilities?

It is clear that Australian law enforcement agencies already have extensive surveillance capabilities. And while many of the details remain secret, we do know these powers are frequently used.

It may be that Australia is becoming a test case for the introduction of broad new powers that mandate backdoors in an attempt to undermine encrypted technology more widely. Unlike other Western democracies such as the US or Canada, Australia has no constitutional protection for human or privacy rights.


In the meantime, Facebook argues that “weakening encrypted systems would mean weakening it for everyone.” We also know Apple has been lobbying the government to drop the proposal.

The ConversationTechnology companies need to fight back against a government that has considerable appetite to intercept private communications, but has not made a convincing case for why they need these new powers.

Michael Wilson, PhD Candidate, School of Justice, Faculty of Law, Queensland University of Technology and Monique Mann, Lecturer, School of Justice, Researcher at the Crime and Justice Research Centre and Intellectual Property and Innovation Law Research Group, Faculty of Law, Queensland University of Technology

This article was originally published on The Conversation.

More From Lifehacker Australia

  • Labor Has Backed An Encryption Bill With ‘Significant Outstanding Issues’
  • Australian Law Enforcement Doesn’t Deserve Access To More Data
  • New Encryption Laws May Have Unintended Consequences
  • The Government Says No Backdoors (Except For Them)
Share this Story
Get our Newsletter Subscribe

Comments

  • magani says:
    September 8, 2017 at 5:17 pm

    Judging by those tables, the NSW Police seem to have been busy, with the Victorians not too far behind. How many of those are fishing trips, I wonder?

    Log in to Reply

Log in to comment on this story!

Log in
There are no more articles to be viewed

© 2007 - 2022 Pedestrian Group

  • About
  • Advertise
  • Contact
  • Privacy Policy
  • Terms of Use

Log in to Lifehacker to:

  • Comment on stories

By logging in, you can access these features throughout our network.

Haven't registered? Sign up here
Lost your password? Click here to reset

Back to Login? Click here

Email newsletters will contain a brief summary of our top stories, plus details of competitions and reader events.

Back to Login? Click here

Subscribe to our newsletter!

Now you can get the top stories from Lifehacker delivered to your inbox. Enter your email below.

By subscribing you agree to our Terms of Use and Privacy Policy.