Security Market Segment LS
Sunday, 13 January 2013 22:05

ASIO wants to hack third-party computers to get to their targets


ASIO wants to hack into all kinds of devices to further their security interests.

According to today's report, the Attorney General's Department is seeking enhanced powers for ASIO (Australian Security Intelligence Organisation) - Australia's domestic spying organisation - to be able to hack both the computers of suspected terrorists AND those of connected third parties. These third parties may be in such a position as to be a conduit for targeted malware to be delivered to the suspects' computers.

Despite the appearance of immediacy in the linked News Ltd report, this is based entirely on a response by the Attorney General's Department to questions raised during submissions to The House of Representative Committee overseeing "Inquiry into potential reforms of National Security Legislation" which seems to have been lodged in August or September of 2012.

This submission states:

Why should ASIO be empowered to hack third party computers that may belong to people who are not threats to national security?

The proposals would not involve hacking in the sense of authorising ASIO to examine the content of material. AGD notes the concerns raised in submissions to the Committee, for example from the Office of the Victorian Privacy Commissioner, that the proposal would allow surveillance of virtually unlimited services. However, the purpose of a warrant authorising the use of a third party computer would still be to access the computer of security interest, and the warrant would not authorise ASIO to obtain intelligence material from the third party computer or the communication in transit. The use of the third party computer is essentially like using a third party premises to gain access to a the premises to be searched where direct access is not possible. It involves no power to search or conduct surveillance on the third party.

Advances in technology have made it increasingly difficult for ASIO to execute its computer access warrants, particularly where a person of interest is security conscious and may use mechanisms that make it difficult to obtain access to the computer. Therefore, ASIO increasingly has to use innovative methods of achieving access to the computer of interest. In some cases, it may not be possible for ASIO to gain direct access to the relevant computer, and therefore ASIO may be unable to gather vital intelligence important in relation to security. The ability to use a third party computer or communication in transit for the purpose of executing a computer access warrant would enable ASIO to gain access to the relevant computer where direct access is not possible.

An Attorney general's Department spokesman said, it was proposed that ASIO would "use a third party computer for the specific purpose of gaining access to a target computer. The purpose of this power is to allow ASIO to access the computer of suspected terrorists and other security interests."

It was intended that the method would be used "in extremely limited circumstances and only when explicitly approved by the Attorney-General through a warrant. Importantly, the warrant would not authorise ASIO to obtain intelligence material from the third party computer."

This would, amongst other abilities, permit ASIO to make user of some web site as a conduit to deliver targeted snooping malware to the intended computer.

One would hope, with the third party's agreement.

Subscribe to ITWIRE UPDATE Newsletter here


The much awaited iTWire Shop is now open to our readers.

Visit the iTWire Shop, a leading destination for stylish accessories, gear & gadgets, lifestyle products and everyday portable office essentials, drones, zoom lenses for smartphones, software and online training.

PLUS Big Brands include: Apple, Lenovo, LG, Samsung, Sennheiser and many more.

Products available for any country.

We hope you enjoy and find value in the much anticipated iTWire Shop.



iTWire TV offers a unique value to the Tech Sector by providing a range of video interviews, news, views and reviews, and also provides the opportunity for vendors to promote your company and your marketing messages.

We work with you to develop the message and conduct the interview or product review in a safe and collaborative way. Unlike other Tech YouTube channels, we create a story around your message and post that on the homepage of ITWire, linking to your message.

In addition, your interview post message can be displayed in up to 7 different post displays on our the site to drive traffic and readers to your video content and downloads. This can be a significant Lead Generation opportunity for your business.

We also provide 3 videos in one recording/sitting if you require so that you have a series of videos to promote to your customers. Your sales team can add your emails to sales collateral and to the footer of their sales and marketing emails.

See the latest in Tech News, Views, Interviews, Reviews, Product Promos and Events. Plus funny videos from our readers and customers.


David Heath

David Heath has had a long and varied career in the IT industry having worked as a Pre-sales Network Engineer (remember Novell NetWare?), General Manager of IT&T for the TV Shopping Network, as a Technical manager in the Biometrics industry, and as a Technical Trainer and Instructional Designer in the industrial control sector. In all aspects, security has been a driving focus. Throughout his career, David has sought to inform and educate people and has done that through his writings and in more formal educational environments.

Share News tips for the iTWire Journalists? Your tip will be anonymous




Guest Opinion

Guest Reviews

Guest Research

Guest Research & Case Studies

Channel News