Home Government Tech Policy Senate passes motion not to water down encryption

Senate passes motion not to water down encryption

The Senate has approved a motion from the Australian Greens to support strong encryption, resist pushes to undermine encryption, and to use warrants and targeted surveillance to obtain information.

The party's digital rights spokesman, Senator Jordon Steele-John, said in a statement he was concerned about the Coalition Government’s plans to pursue decryption technology and ‘alternative powers and capabilities’ for government agencies, especially in the wake of the recent scandal involving Cambridge Analytica obtaining Facebook data.

Last month, Home Affairs Minister Peter Dutton said in a speech that the government planned to introduce legislation to ensure that companies, which provide communications services and devices in the country, were obliged to assist government when needed.

He claimed that ubiquitous encryption had become a "significant obstacle" to the investigation of terrorism offences.

Steele-John said he did not buy an assertion by Liberal Senator James McGrath statement that the Turnbull Government supported strong encryption technologies "given they’ve acknowledged they are actively pursuing decryption pathways".

He said he was, however, buoyed by the fact that the Labor Party and crossbench senators had backed the motion, pointing out that the same motion was voted down when proposed by Senator Scott Ludlam in 2016.

“Encryption technology is used by millions of people every day to manage financial transactions, to protect against identity theft and to keep their medical and other personal information safe, and developers of the technology should not be bullied by governments into making those protections weaker.

“In the wake of these data scandals, we should be strengthening our lacklustre privacy laws and reassuring Australians that their data and their identities will remain secure."

The passing of the motion on Tuesday night comes a day after the encryption debate was revived in the US, with a thinly disguised call for backdoors in encryption technology being made by the US Department of Justice.

LEARN HOW TO REDUCE YOUR RISK OF A CYBER ATTACK

Australia is a cyber espionage hot spot.

As we automate, script and move to the cloud, more and more businesses are reliant on infrastructure that has the high potential to be exposed to risk.

It only takes one awry email to expose an accounts’ payable process, and for cyber attackers to cost a business thousands of dollars.

In the free white paper ‘6 Steps to Improve your Business Cyber Security’ you’ll learn some simple steps you should be taking to prevent devastating and malicious cyber attacks from destroying your business.

Cyber security can no longer be ignored, in this white paper you’ll learn:

· How does business security get breached?
· What can it cost to get it wrong?
· 6 actionable tips

DOWNLOAD NOW!

RECOVERING FROM RANSOMWARE

Ransomware is a type of malware that blocks access to your files and systems until you pay a ransom.

The first example of ransomware happened on September 5, 2013, when Cryptolocker was unleashed.

It quickly affected many systems with hackers requiring users to pay money for the decryption keys.

Find out how one company used backup and cloud storage software to protect their company’s PCs and recovered all of their systems after a ransomware strike.

DOWNLOAD THE REPORT!

Sam Varghese

website statistics

A professional journalist with decades of experience, Sam for nine years used DOS and then Windows, which led him to start experimenting with GNU/Linux in 1998. Since then he has written widely about the use of both free and open source software, and the people behind the code. His personal blog is titled Irregular Expression.

 

Popular News

 

Telecommunications