Connect with us

Hi, what are you looking for?



Australia Wields Vast Decryption Powers Before Planned Review

Australian security agencies have begun using sweeping new powers to access encrypted communications, even before a promised review to address concerns from the likes of Google, Apple and Facebook.

Australian security agencies have begun using sweeping new powers to access encrypted communications, even before a promised review to address concerns from the likes of Google, Apple and Facebook.

The powers were granted under a new decryption law which was rushed through parliament in December amid fierce debate, and was seen as the latest salvo between governments and tech firms over national security and privacy.

Two months later, the Australian Federal Police have revealed that agents have already used it while investigating drug trafficking and child exploitation.

Under the fresh rules, refusal to grant authorities access to devices is punishable with up to 10 years in prison, and police told a parliamentary inquiry they had used that threat to compel two suspects to hand over their passwords.

Citing secrecy provisions in the law, police declined to say if they had used the new law to force device makers or telecommunications firms — including global giants like Apple — to break or bypass encrypted communications.

The same provisions bar industry from disclosing whether they have received such police demands, known as “compulsory notices”.

The government has argued the law was urgently needed to foil ongoing terrorist plots and intercept communications among other serious criminals.

Advertisement. Scroll to continue reading.

But opponents allege it punches a hole in global efforts to keep governments from eavesdropping on secure communications, like WhatsApp chats.

They also argue it could undermine security by creating vulnerabilities in encryption technologies, which could then be exploited by malicious actors.

– Threat to industry –

The legislation was adopted only after the conservative government agreed to reopen debate in the new year on amendments that would address widespread concerns among civil liberties advocates and tech industry experts that it was ill-conceived and too broad.

The Department of Home Affairs says the law is being progressively implemented and that in January it wrote to tech industry members for assistance in drawing up guidelines on how to use the new powers.

“The Department is also engaging with industry to dispel common misconception, build confidence and to reiterate the intended purpose and operation of the Act,” it said in a submission to the parliamentary inquiry.

But the tech industry appears far from reassured.

“There is no doubt there is an extremely broad coalition of stakeholders that are very concerned about the impact of this bill,” said John Stanton, chief executive of the Communications Alliance, which represents the Australian communications industry.

“It is not just industry, it is civil society and digital rights activists (too).”

Stanton warned the new law posed “an enormous threat” to export opportunities for Australian tech firms “because they can no longer provide any assurance that their gear hasn’t been tampered with by Australian security”.

“Even to say, ‘no, it hasn’t’, is an offence” under the law,” he added.

Industry groups have combined forces to present a joint submission to the latest inquiry proposing a series of amendments.

These include a higher threshold for using the law, which can currently be applied in any investigation of an offence carrying a maximum three-year jail term — a bar critics say is too low.

The industry also wants more precision about an element of the law barring authorities from forcing companies to introduce a “system vulnerability” into their products — a term they say is ambiguous.

Australia is widely seen as a global test case for such laws, with possible applications by other governments seeking to counter the growing use of encrypted messaging, notably Australia’s partners in the so-called “Five Eyes” intelligence alliance — the United States, Britain, Canada and New Zealand.

The ongoing review of these powers by parliament’s Joint Committee on Intelligence and Security may have set an Australian political record.

It was launched just nine days after the encryption legislation became law and reflects the haste with which it was rammed through.

The committee must complete its review by April 3, but any moves to then amend the legislation risk running up against the Australian electoral cycle, with a federal election due by mid-May.

Written By

AFP 2023

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join security experts as they discuss ZTNA’s untapped potential to both reduce cyber risk and empower the business.


Join Microsoft and Finite State for a webinar that will introduce a new strategy for securing the software supply chain.


Expert Insights

Related Content


No one combatting cybercrime knows everything, but everyone in the battle has some intelligence to contribute to the larger knowledge base.

Artificial Intelligence

Two of humanity’s greatest drivers, greed and curiosity, will push AI development forward. Our only hope is that we can control it.


The FBI dismantled the network of the prolific Hive ransomware gang and seized infrastructure in Los Angeles that was used for the operation.

Cybersecurity Funding

Los Gatos, Calif-based data protection and privacy firm Titaniam has raised $6 million seed funding from Refinery Ventures, with participation from Fusion Fund, Shasta...


The Hive ransomware website has been seized as part of an operation that involved law enforcement in 10 countries.


Many in the United States see TikTok, the highly popular video-sharing app owned by Beijing-based ByteDance, as a threat to national security.The following is...


Daniel Kelley was just 18 years old when he was arrested and charged on thirty counts – most infamously for the 2015 hack of...


Employees of Chinese tech giant ByteDance improperly accessed data from social media platform TikTok to track journalists in a bid to identify the source...