Sunday, 23 February 2020 18:25

Govt security watchdog seeks additional oversight of encryption bill powers Featured

Govt security watchdog seeks additional oversight of encryption bill powers Pixabay

The government's Independent National Security Legislation Monitor, Dr James Renwick, has indicated he would support the security appeals division of the Administrative Appeals Tribunal having oversight of technical capability notices issued under the encryption law passed in 2018, and resolving any issue that could arise.

Dr Renwick held two days of hearings in Canberra on Thursday and Friday last week, meeting representatives of both government and industry.

There are three ways listed in the legislation by which law enforcement can get industry to aid in breaking encryption.

A technical assistance request or TAR allows for voluntary help by a company; its staff will be given civil immunity from prosecution.

An interception agency can then issue a technical assistance notice or TAN to make a communications provider offer assistance based on existing functionality.

Finally, a technical capability notice or TCN can be issued by the Attorney-General at the request of an interception agency. This will have to be also approved by the Communications Minister and will force a company to help law enforcement, by building functionality.

However a TCN cannot demand the decryption of information or removal of electronic protection in any system.

Dr Renwick said that what he had heard from technology companies was that using the AAT would give them more confidence in the process. To this end, he backed the addition of some technically qualified people to the AAT as part-time members.

He also suggested that a better definition was needed for the term "systemic weakness", adding that this would sit better within the text of law itself.

The encryption law, known as the Telecommunications and Other Legislation Amendment (Assistance and Access) Bill 2018, was passed on 6 December 2018.

A review was instituted by the Parliamentary Joint Committee on Intelligence and Security as soon as the bill was passed, with a reporting date of 3 April 2019. It was expected to make changes that would provide some solace to the technology industry.

But the panel then put off taking any decision, instead asking the Dr Renwick to review the law and report back by 1 March 2020.

In October 2019, Dr Renwick said he was extending the date for submissions to his review until 1 November. At the time he made this announcement, just 15 submissions had been received.

The date for his report to the PJCIS is now the end of June; the PJCIS will then issue its report by the end of September. Only after that will the government look at any changes to the law.

Among those who fronted the inquiry over the two days were the ASIO, the NSW Independent Commission Against Corruption, the Law Enforcement Conduct Commission of NSW, the Human Rights Commission, Internet Australia, Electronic Frontiers Australia, Atlassian, Access Now, Mozilla Corporation, the Communications Alliance, Ai Group, AIIA, AMTA, DIGI & ITPA, AustCyber, Law Council of Australia, The Allens Hub for Technology, Law & Innovation, the South Australian Independent Commissioner Against Corruption, BSA | The Software Alliance, the Australian Federal Police and the Department of Home Affairs.


As part of our Lead Machine Methodology we will help you get more leads, more customers and more business. Let us help you develop your digital marketing campaign

Digital Marketing is ideal in these tough times and it can replace face to face marketing with person to person marketing via the phone conference calls and webinars

Significant opportunity pipelines can be developed and continually topped up with the help of Digital Marketing so that deals can be made and deals can be closed

- Newsletter adverts in dynamic GIF slideshow formats

- News site adverts from small to large sizes also as dynamic GIF slideshow formats

- Guest Editorial - get your message out there and put your CEO in the spotlight

- Promotional News and Content - displayed on the homepage and all pages

- Leverage our proven event promotion methodology - The Lead Machine gets you leads

Contact Andrew our digital campaign designer on 0412 390 000 or via email



Security requirements such as confidentiality, integrity and authentication have become mandatory in most industries.

Data encryption methods previously used only by military and intelligence services have become common practice in all data transfer networks across all platforms, in all industries where information is sensitive and vital (financial and government institutions, critical infrastructure, data centres, and service providers).

Get the full details on Layer-1 encryption solutions straight from PacketLight’s optical networks experts.

This white paper titled, “When 1% of the Light Equals 100% of the Information” is a must read for anyone within the fiber optics, cybersecurity or related industry sectors.

To access click Download here.


Sam Varghese

website statistics

Sam Varghese has been writing for iTWire since 2006, a year after the site came into existence. For nearly a decade thereafter, he wrote mostly about free and open source software, based on his own use of this genre of software. Since May 2016, he has been writing across many areas of technology. He has been a journalist for nearly 40 years in India (Indian Express and Deccan Herald), the UAE (Khaleej Times) and Australia (Daily Commercial News (now defunct) and The Age). His personal blog is titled Irregular Expression.



Recent Comments