<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Adam Molnar &#8211; Australian Privacy Foundation</title>
	<atom:link href="https://privacy.org.au/author/adam-molnar/feed/" rel="self" type="application/rss+xml" />
	<link>https://privacy.org.au</link>
	<description>Defending your right to be free from intrusion</description>
	<lastBuildDate>Wed, 16 Sep 2020 03:58:47 +0000</lastBuildDate>
	<language>en-AU</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://privacy.org.au/wp-content/uploads/2021/04/cropped-logo_horizontal2-32x32.png</url>
	<title>Adam Molnar &#8211; Australian Privacy Foundation</title>
	<link>https://privacy.org.au</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Regulatory arbitrage and transnational surveillance: Australia’s extraterritorial assistance to access encrypted communications</title>
		<link>https://policyreview.info/articles/analysis/regulatory-arbitrage-and-transnational-surveillance-australias-extraterritorial</link>
		
		<dc:creator><![CDATA[Monique Mann]]></dc:creator>
		<pubDate>Wed, 16 Sep 2020 03:58:47 +0000</pubDate>
				<category><![CDATA[External Links]]></category>
		<guid isPermaLink="false">https://privacy.org.au/?p=4405</guid>

					<description><![CDATA[This article examines developments regarding encryption law and policy within ‘Five Eyes’ (FVEY) countries by focussing on the recently enacted Telecommunications and Other Legislation Amendment (Assistance and Access) Act 2018 (Cth) in Australia. The legislation is significant both domestically and internationally because of its extraterritorial reach, allowing the development of new ways for Australian law enforcement and security agencies to access encrypted telecommunications via transnational designated communications providers, and allowing for Australian authorities to assist foreign counterparts in both enforcing and potentially circumventing their domestic laws. We argue that Australia is the ‘weak link’ in the FVEY alliance as - unlike other FVEY members - has no comprehensive enforceable human rights protections. Given this, there is a possibility for regulatory arbitrage in exploiting these new surveillance powers to undermine encryption via Australia.  <span class="excerpt-more"><a href="https://policyreview.info/articles/analysis/regulatory-arbitrage-and-transnational-surveillance-australias-extraterritorial">Read More</a></span>]]></description>
										<content:encoded><![CDATA[This article examines developments regarding encryption law and policy within ‘Five Eyes’ (FVEY) countries by focussing on the recently enacted Telecommunications and Other Legislation Amendment (Assistance and Access) Act 2018 (Cth) in Australia. The legislation is significant both domestically and internationally because of its extraterritorial reach, allowing the development of new ways for Australian law enforcement and security agencies to access encrypted telecommunications via transnational designated communications providers, and allowing for Australian authorities to assist foreign counterparts in both enforcing and potentially circumventing their domestic laws. We argue that Australia is the ‘weak link’ in the FVEY alliance as - unlike other FVEY members - has no comprehensive enforceable human rights protections. Given this, there is a possibility for regulatory arbitrage in exploiting these new surveillance powers to undermine encryption via Australia.  <span class="excerpt-more"><a href="https://policyreview.info/articles/analysis/regulatory-arbitrage-and-transnational-surveillance-australias-extraterritorial">Read More</a></span>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>APF joins a coalition of human rights groups and experts in calling on the Australian government to protect encryption</title>
		<link>https://privacy.org.au/wp-content/uploads/2018/07/Australia-Encryption-Coalition-Letter.pdf</link>
		
		<dc:creator><![CDATA[Monique Mann]]></dc:creator>
		<pubDate>Tue, 17 Jul 2018 04:11:36 +0000</pubDate>
				<category><![CDATA[Media Release]]></category>
		<guid isPermaLink="false">https://privacy.org.au/?p=3231</guid>

					<description><![CDATA[Today, the Australian Privacy Foundation joins with Electronic Frontiers Australia, Digital Rights Watch, Future Wise, and other domestic and international human rights organisations in asking the Australian government to not pursue legislation undermining encryption, and other tools, policies and technologies critical to protecting individual rights. The 76 organisations, companies, and individuals signatory to this open letter call on government officials to become proponents of digital security and work collaboratively to help law enforcement adapt to the digital era.

This letter was been initiated by global digital rights organisation Access Now. “Australia is facing a choice on cybersecurity and encryption: real security or false,” said Nathan White, Senior Legislative Manager at Access Now. “The country can either be the testing ground for policies that undermine privacy and security in the digital era, or it can be a champion for human rights, leveraging its relationships to raise cybersecurity standards for the next generation. The world is watching.” <span class="excerpt-more"><a href="https://privacy.org.au/wp-content/uploads/2018/07/Australia-Encryption-Coalition-Letter.pdf">Read More</a></span>]]></description>
										<content:encoded><![CDATA[Today, the Australian Privacy Foundation joins with Electronic Frontiers Australia, Digital Rights Watch, Future Wise, and other domestic and international human rights organisations in asking the Australian government to not pursue legislation undermining encryption, and other tools, policies and technologies critical to protecting individual rights. The 76 organisations, companies, and individuals signatory to this open letter call on government officials to become proponents of digital security and work collaboratively to help law enforcement adapt to the digital era.

This letter was been initiated by global digital rights organisation Access Now. “Australia is facing a choice on cybersecurity and encryption: real security or false,” said Nathan White, Senior Legislative Manager at Access Now. “The country can either be the testing ground for policies that undermine privacy and security in the digital era, or it can be a champion for human rights, leveraging its relationships to raise cybersecurity standards for the next generation. The world is watching.”



]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>MEDIA RELEASE: Australian Privacy Foundation “seriously alarmed” about recent revelations that would allow Australian Signals Directorate to spy on Australians with even less accountability</title>
		<link>https://privacy.org.au/2018/04/30/media-release-australian-privacy-foundation-seriously-alarmed-about-recent-revelations-that-would-allow-australian-signals-directorate-to-spy-on-australians-with-even-less-accountab/</link>
		
		<dc:creator><![CDATA[Adam Molnar]]></dc:creator>
		<pubDate>Sun, 29 Apr 2018 22:58:26 +0000</pubDate>
				<category><![CDATA[Media Release]]></category>
		<guid isPermaLink="false">https://privacy.org.au/?p=3098</guid>

					<description><![CDATA[The Australian Privacy Foundation is seriously alarmed about a recently revealed legislative proposal that would have Australia’s foreign signals intelligence agency, the Australian Signals Directorate (ASD), use its considerable powers to surveil, track, and hack Australian citizens without prior authorisation. This is a dangerous precedent that would remove an already inadequate oversight mechanism that our&#8230; <span class="excerpt-more"><a href="https://privacy.org.au/2018/04/30/media-release-australian-privacy-foundation-seriously-alarmed-about-recent-revelations-that-would-allow-australian-signals-directorate-to-spy-on-australians-with-even-less-accountab/">Read More</a></span>]]></description>
										<content:encoded><![CDATA[<p>The Australian Privacy Foundation is seriously alarmed about a recently revealed legislative proposal that would have Australia’s foreign signals intelligence agency, the Australian Signals Directorate (ASD), use its considerable powers to surveil, track, and hack Australian citizens without prior authorisation. This is a dangerous precedent that would remove an already inadequate oversight mechanism that our nation’s top foreign intelligence agency has in relation to the rule of law and democratic accountability. This revelation only reaffirms the need for a robust and comprehensive bill of rights that would provide vital judicial oversight and accountability of some the nation’s most powerful government agencies. While we acknowledge the important role that security intelligence agencies have, these efforts must never come at the expense of meaningful democratic accountability and the protection of Australia’s human rights.</p><p>

The APF would also like to issue a corrective to what appears to be a misleading understanding in media reports. While reports have correctly noted that the ASD presently has legal authority to monitor Australian citizens to assist domestic intelligence and law enforcement through agreement between the Director of the ASD and the Attorney-General, the reports incorrectly assert this is a form of “judicial authorisation”. An agreement between two heads of agency is a form of executive agreement that is non-compliant with the principles of rule of law. To erroneously suggest that this is a form of judicial authorisation is misleading, and ignores the present state of duress that rule of law is under in Australia.</p><p>

In response to these issues, the APF calls for:</p><ol><li>An immediate public denunciation by all Australian political parties of the proposal to decouple ASD activities from prior authorization by the AG.</li><li>A change in the existing status quo that authorises ASD assistance to domestic agencies based on executive authority between the heads of the agencies in favour of actual judicial authorisation that would uphold rule of law and provide meaningful democratic accountability.</li><li>That all political parties work together to introduce a comprehensive constitutional rights regime, especially given present day capacities for collection and analysis of digital information.</li><li>Enhanced resourcing and legal reform that ensures both the Independent National Security Legislation Monitor and Office of the Australian Information Commissioner are fit for purpose.</li></ol><p>

</p><p><strong>Contacts:</strong></p><table><tbody><tr><td>Adam Molnar</td><td>03 9244 3799</td><td>Adam.Molnar@privacy.org.au</td></tr></tbody></table>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Statement to the Parliamentary Joint Committee on Law Enforcement</title>
		<link>https://privacy.org.au/2018/03/30/statement-to-the-parliamentary-joint-committee-on-law-enforcement/</link>
		
		<dc:creator><![CDATA[Adam Molnar]]></dc:creator>
		<pubDate>Fri, 30 Mar 2018 06:45:28 +0000</pubDate>
				<category><![CDATA[Media Release]]></category>
		<guid isPermaLink="false">https://privacy.org.au/?p=3081</guid>

					<description><![CDATA[APF Vice Chair / Co-Chair of Surveillance Committee Dr Adam Molnar, and Co-Chair Surveillance Committee Dr Monique Mann recently gave evidence at the Joint Parliamentary Committee on Law Enforcement Inquiry on the impact of new and emerging information and communications technology. They emphasized the importance of not undermining or weakening encryption, and you can sign&#8230; <span class="excerpt-more"><a href="https://privacy.org.au/2018/03/30/statement-to-the-parliamentary-joint-committee-on-law-enforcement/">Read More</a></span>]]></description>
										<content:encoded><![CDATA[<p><em><strong>APF Vice Chair / Co-Chair of Surveillance Committee Dr Adam Molnar, and Co-Chair Surveillance Committee Dr Monique Mann recently gave evidence at the Joint Parliamentary Committee on Law Enforcement Inquiry on the impact of new and emerging information and communications technology. They emphasized the importance of not undermining or weakening encryption, and you can sign the petition to Save Crypto and Secure Australia here: </strong><a href="https://secureaustralia.org.au/"><strong>https://secureaustralia.org.au/</strong></a></em></p>

<p>Good morning. We would like to thank the committee secretary and the panel members for inviting us to provide evidence on the challenges of information communication technologies on law enforcement, on behalf of the Australian Privacy Foundation, <a href="https://digitalrightswatch.org.au">Digital Rights Watch Australia</a>, <a href="https://efa.org.au">Electronic Frontiers Australia</a> and <a href="https://futurewise.org.au">FutureWise</a>.</p>

<p>Innovations in technology are an important public policy issue that affect all aspects of society, and we are pleased that the panel is devoting attention to this issue.</p>

<p>In our opening statement we would like to reiterate some of the main points from our written submission and provide a brief response to points raised in the written submissions by other government and law enforcement agencies.</p>

<p>We note that almost every party that made a written submission raised the issue of encryption &#8211; highlighting that it is crucial for innovation and cyber security, and yet presenting some challenges for law enforcement.</p>

<p>Encryption is an important public policy issue that demands careful and nuanced consideration. Encryption tools, technologies, and services are essential to protect against harm and to shield our digital infrastructure and personal communications from unauthorized access. The ability to freely develop and use encryption provides the cornerstone for today’s global economy. Economic growth in the digital age is powered by the ability to trust and authenticate our interactions and communicate and conduct business securely, both within and across borders. Any attempt to weaken or undermine strong encryption poses serious risks to cyber security. While we recognise law enforcement’s legitimate interest in accessing communications, we are fundamentally opposed to any attempt to weaken encryption given the additional risks this would entail for a range of groups and sectors including banking and finance, government, and the general public.</p>

<p>Encryption does not pose a fatal investigatory hurdle, and by contrast, it is an essential component of cyber security. It protects against cybercrime which is estimated to cost between 1 billion and 17 billion annually. According to the Department of Home Affairs we already see reports of ransomware attacks doubling each year. Weakening encryption will undermine the security of information communication technologies for everyone and will exacerbate these issues. The absence of encryption facilitates easy access to sensitive personal data, including financial and identity information, by criminals and other malicious actors. Once obtained, sensitive data can be sold, publicly posted, or used to blackmail or embarrass an individual. Additionally, insufficiently encrypted devices or hardware are prime targets for criminals.</p>

<p>Given the collective economic and social good that encryption provides we urge the committee to pay attention to existing legal and technical capabilities that enable access to evidence on physical devices in ways that will not unnecessarily inflict the unintended consequences of weakening the security of all digital devices. We outline issues associated with undermining encryption at length on pages 11 to 15 of our written submission, and set forth the existing legal and technical capabilities to access evidence on page 14.</p>

<p>In addition to encryption, and as per our written submission, we also wish to comment on other areas that fall within the inquiry’s Terms of Reference including darkweb policing, Mutual Legal Assistance arrangements for accessing extraterritorial digital evidence and the importance of independent criminological research in these areas. We welcome the committee&#8217;s questions on these topics. In summary, law enforcement play an important role in public safety and security, though we contend that law enforcement use of new ICTs should be supported with evidence, consistent with international human rights standards, subject to robust oversight and proper checks and balances &#8211; including judicial &#8211; and uphold the rule of law.</p>


]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Cross-border access to data &#8211; EDRi delivers international NGO position to Council of Europe</title>
		<link>https://edri.org/cross-border-access-data-edri-delivers-international-ngo-position-council-europe/</link>
		
		<dc:creator><![CDATA[Adam Molnar]]></dc:creator>
		<pubDate>Fri, 22 Sep 2017 01:47:59 +0000</pubDate>
				<category><![CDATA[External Links]]></category>
		<category><![CDATA[International]]></category>
		<guid isPermaLink="false">http://privacy.org.au/?p=1339</guid>

					<description><![CDATA[Earlier this week, a global coalition of civil society organisations, including the Australian Privacy Foundation, submitted to the Council of Europe its comments on how to protect human rights when developing new rules on cross-border access to electronic evidence ("e-evidence"). The Council of Europe is currently preparing an additional protocol to the Cybercrime Convention. European Digital Rights (EDRi)'s Executive Director Joe McNamee handed the comments over to Mr. Alexander Seger, the Executive Secretary of the Cybercrime Convention Committee (T-CY) of the Council of Europe. <span class="excerpt-more"><a href="https://edri.org/cross-border-access-data-edri-delivers-international-ngo-position-council-europe/">Read More</a></span>]]></description>
										<content:encoded><![CDATA[Earlier this week, a global coalition of civil society organisations, including the Australian Privacy Foundation, submitted to the Council of Europe its comments on how to protect human rights when developing new rules on cross-border access to electronic evidence ("e-evidence"). The Council of Europe is currently preparing an additional protocol to the Cybercrime Convention. European Digital Rights (EDRi)'s Executive Director Joe McNamee handed the comments over to Mr. Alexander Seger, the Executive Secretary of the Cybercrime Convention Committee (T-CY) of the Council of Europe. <span class="excerpt-more"><a href="https://edri.org/cross-border-access-data-edri-delivers-international-ngo-position-council-europe/">Read More</a></span>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Poisoned water holes: the legal dangers of dark web policing</title>
		<link>https://privacy.org.au/2017/09/08/poisoned-water-holes-the-legal-dangers-of-dark-web-policing/</link>
		
		<dc:creator><![CDATA[Ian Warren]]></dc:creator>
		<pubDate>Fri, 08 Sep 2017 01:59:18 +0000</pubDate>
				<category><![CDATA[Commentary]]></category>
		<guid isPermaLink="false">http://privacy.org.au/?p=1285</guid>

					<description><![CDATA[As police operations move into online environments, new rules for digital evidence collection and exchange must be developed to assist prosecutions while preserving due process and human rights. Without proper checks, police could have significantly expanded scope to search homes and computers around the world. <span class="excerpt-more"><a href="https://privacy.org.au/2017/09/08/poisoned-water-holes-the-legal-dangers-of-dark-web-policing/">Read More</a></span>]]></description>
										<content:encoded><![CDATA[<span><a href="https://theconversation.com/profiles/ian-warren-390074">Ian Warren</a>, <em><a href="http://theconversation.com/institutions/deakin-university-757">Deakin University</a></em>; <a href="https://theconversation.com/profiles/adam-molnar-157177">Adam Molnar</a>, <em><a href="http://theconversation.com/institutions/deakin-university-757">Deakin University</a></em>, and <a href="https://theconversation.com/profiles/monique-mann-221915">Monique Mann</a>, <em><a href="http://theconversation.com/institutions/queensland-university-of-technology-847">Queensland University of Technology</a></em></span>

<p><em>This article is part of a series originally published on <a href="http://theconversation.com">The Conversation</a> on how law enforcement is fighting crime across digital borders.</em></p>

<p>Australian police are using <a href="http://www.csoonline.com/article/2614643/security/watch-out-for-waterhole-attacks----hackers--latest-stealth-weapon.html">&#8220;poisoned watering holes&#8221;</a> to investigate crime on the dark web. By taking over illegal marketplaces that traffic in child pornography or drugs, law enforcement are collecting information about criminals all over the world.</p>

<p>Of course, crimes that occur on the internet often cross international borders, but this situation is creating troubling new standards in transnational policing.</p>

<p>Research, <a href="https://eprints.qut.edu.au/102299/">including our own</a>, indicates that as police operations move into online environments, new rules for digital evidence collection and exchange must be developed to assist prosecutions while preserving due process and <a href="https://necessaryandproportionate.org/">human rights</a>.</p>

<p>Investigations on the <a href="https://theconversation.com/explainer-what-is-the-dark-web-46070">dark web</a> readily transcend geographic demarcations fundamental to the use of search warrants and the admissibility of evidence.</p>

<p>Some enforcement agencies have <a href="https://www.eff.org/deeplinks/2016/08/illegal-playpen-story-rule-41-and-global-hacking-warrants">conducted online investigations</a> and attempted to <a href="http://epublications.bond.edu.au/law_pubs/761/">access or transfer information</a> outside existing domestic and transnational legal frameworks. This is common <a href="https://motherboard.vice.com/en_us/article/mg79nb/australian-authorities-hacked-computers-in-the-us">in cases</a> involving dark web sites that distribute child exploitation material (CEM).</p>

<p>Without proper checks, police could have significantly expanded scope to search homes and computers around the world, even in cases not involving CEM.</p>

<h2>Watering holes and network investigative techniques</h2>

<p>The techniques used in online investigations can have potentially problematic legal standing.</p>

<p><a href="https://arstechnica.com/tech-policy/2017/05/creator-of-infamous-playpen-website-sentenced-to-30-years-in-prison/">Playpen</a> was a dark web site used to distribute CEM. The FBI seized the site in 2015, and obtained a warrant to continue its operation on a government server.</p>

<p>The FBI used a Network Investigative Technique (NIT), also known as <a href="https://policyreview.info/articles/analysis/computer-network-operations-and-rule-law-australia">Computer Network Exploitation</a>, to identify Playpen users. This distributed <a href="https://theconversation.com/after-wannacrypt-should-governments-stockpile-software-vulnerabilities-experts-respond-77717">malware</a> onto any computer used to log into the site.</p>

<p>The NIT enabled the FBI to identify the IP addresses, log-in times, and operating systems of around 150 computers located in the United States and more than 8,000 computers <a href="https://motherboard.vice.com/en_us/article/53d4n8/fbi-hacked-over-8000-computers-in-120-countries-based-on-one-warrant">located in 120 countries</a>. Up to <a href="https://www.casemine.com/judgement/us/5914abd5add7b049347399fb">215,000 registered Playpen users globally</a> could be affected.</p>

<p>According to the Electronic Frontier Foundation, Playpen is the largest known <a href="https://www.eff.org/deeplinks/2016/09/playpen-story-fbis-unprecedented-and-illegal-hacking-operation">US government hacking operation</a>. But it was authorised by a single warrant issued in Eastern Virginia.</p>

<p>Specialist online units in Australia, such as <a href="https://www.theguardian.com/society/2016/jul/13/shining-a-light-on-the-dark-web-how-the-police-ended-up-running-a-paedophile-site">Task Force Argos</a> in the Queensland Police Service, have also used &#8220;poisoned watering hole&#8221; tactics.</p>

<p>Australian convicted child sex offender <a href="http://www.abc.net.au/news/2016-02-26/paedophile-shannon-mccoole-gives-evidence-at-royal-commission/7203970">Shannon Grant McCoole</a>, who administered &#8220;The Love Zone&#8221; site, was apprehended after a tip from Danish police. Task Force Argos investigators then <a href="https://www.cdpp.gov.au/news/record-sentence-head-administrator-paedophile-site">effectively ran the site</a> &#8220;while feeding information to international law enforcement colleagues&#8221;.</p>

<p>The investigation identified many users located in other countries, including several who were <a href="https://motherboard.vice.com/en_us/article/mg79nb/australian-authorities-hacked-computers-in-the-us">prosecuted in the United States</a>.</p>

<p>Details of the warrant used in this investigation are unclear, which is common in cases involving CEM that result in guilty pleas.</p>

<h2>Darkweb investigations and the law</h2>

<p>There are some established methods for law enforcement sharing information across borders.</p>

<p><a href="https://mlat.info/">Mutual Legal Assistance Treaties (MLATs)</a> are similar to extradition treaties. States seeking access to digital evidence located offshore must first issue a formal request.</p>

<p>MLATs aim to protect the legal rights of people suspected of transnational or offshore offending. However, available US cases <a href="https://motherboard.vice.com/en_us/article/mg79nb/australian-authorities-hacked-computers-in-the-us">involving The Love Zone</a> do not appear to mention MLAT procedures.</p>

<p>This has troubling implications for the right to a fair trial.</p>

<p>It’s possible Task Force Argos informally communicated the IP addresses of US-based site users directly to US authorities. Queensland Police declined to comment on the warrant.</p>

<p>The geographic scope of the Playpen NIT warrant, on the other hand, is extremely unclear. <a href="https://www.aclu.org/report/challenging-government-hacking-criminal-cases?redirect=malware-report">Some US courts</a> have declared the NIT warrant to be valid only within Eastern Virginia.</p>

<p>At least one US court has ruled that warrants to search homes and seize computers outside of this district produced evidence viewed as the <a href="https://assets.documentcloud.org/documents/3533838/2017-03-23-44-US-v-Carlson-DMN.pdf">&#8220;fruit of the poisonous tree&#8221;</a>.</p>

<p>In other words, because the dark web’s infrastructure could only enable law enforcement to uncover the locations and identities of suspects through the defective NIT warrant, any physical evidence seized from a subsequent warrant to search a home was inadmissible.</p>

<p>However, some US courts seem willing to admit evidence from the Playpen NIT because the FBI is regarded by the courts as acting in <a href="https://www.ca10.uscourts.gov/opinions/16/16-1401.pdf">good faith</a> in both seeking and executing it.</p>

<h2>Legal geographies of online investigations</h2>

<p>Law enforcement agencies are keen to maintain secrecy of dark web CEM investigations. But there is concern from legal experts that informal police networks routinely operate outside of established MLAT procedures.</p>

<p>The MLAT process is slow, technical <a href="https://www.accessnow.org/whats-wrong-system-cross-border-access-data/">and cumbersome</a>. This may fuel the acceptance of questionable NITs and exchange of data between police to streamline transnational dark web investigations. But it could also undermine complex cyber-prosecutions and the fairness of criminal trials that rely on electronic evidence.</p>

<p>The informal exchange of criminal intelligence and use of malware is understandable where child welfare is at stake. But these investigative methods <a href="https://publicpolicy.googleblog.com/2015/02/a-small-rule-change-that-could-give-us.html">undercut current attempts</a> to preserve due process and digital security standards.</p>

<p><img decoding="async" src="https://counter.theconversation.edu.au/content/82833/count.gif?distributor=republish-lightbox-basic" alt="The Conversation" style="display: none !important;" width="1" hidden="" height="1" />Success in these types of investigations cannot solely be measured by prosecution and conviction rates. It should also be measured by the legality, ethics and transparency of transnational investigative procedures and the rules that underpin them.</p>

<p><span><a href="https://theconversation.com/profiles/ian-warren-390074">Ian Warren</a>, Senior Lecturer, Criminology, <em><a href="http://theconversation.com/institutions/deakin-university-757">Deakin University</a></em>; <a href="https://theconversation.com/profiles/adam-molnar-157177">Adam Molnar</a>, Lecturer, Criminology, <em><a href="http://theconversation.com/institutions/deakin-university-757">Deakin University</a></em>, and <a href="https://theconversation.com/profiles/monique-mann-221915">Monique Mann</a>, Lecturer, School of Justice, Researcher at the Crime and Justice Research Centre and Intellectual Property and Innovation Law Research Group, Faculty of Law, <em><a href="http://theconversation.com/institutions/queensland-university-of-technology-847">Queensland University of Technology</a></em></span></p>

<p>This article was originally published on <a href="http://theconversation.com">The Conversation</a>. Read the <a href="https://theconversation.com/poisoned-water-holes-the-legal-dangers-of-dark-web-policing-82833">original article</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The Australian government is importing spyware &#8211; Is that legal?</title>
		<link>https://privacy.org.au/2017/07/27/the-australian-government-is-importing-spyware-is-that-legal/</link>
		
		<dc:creator><![CDATA[Monique Mann]]></dc:creator>
		<pubDate>Thu, 27 Jul 2017 04:54:43 +0000</pubDate>
				<category><![CDATA[Commentary]]></category>
		<guid isPermaLink="false">http://privacy.org.au/?p=1032</guid>

					<description><![CDATA[An Australian Tax Office (ATO) staffer recently leaked on LinkedIn a step-by-step guide to hacking a smartphone.
The documents, which have since been removed, indicate that the ATO has access to Universal Forensic Extraction software made by the Israeli company Cellebrite. This technology is part of a commercial industry that profits from bypassing the security features of devices to gain access to private data. <span class="excerpt-more"><a href="https://privacy.org.au/2017/07/27/the-australian-government-is-importing-spyware-is-that-legal/">Read More</a></span>]]></description>
										<content:encoded><![CDATA[<h1>Spyware merchants: the risks of outsourcing government hacking</h1>
<p><a href="https://theconversation.com/profiles/monique-mann-221915">Monique Mann</a>, <em><a href="http://theconversation.com/institutions/queensland-university-of-technology-847">Queensland University of Technology</a></em>; <a href="https://theconversation.com/profiles/adam-molnar-157177">Adam Molnar</a>, <em><a href="http://theconversation.com/institutions/deakin-university-757">Deakin University</a></em>, and <a href="https://theconversation.com/profiles/ian-warren-390074">Ian Warren</a>, <em><a href="http://theconversation.com/institutions/deakin-university-757">Deakin University</a></em></p>
<p>An Australian Tax Office (ATO) staffer <a href="http://www.abc.net.au/news/2017-07-12/tax-office-slip-up-reveals-new-phone-hacking-capabilities/8698800">recently leaked</a> on LinkedIn a step-by-step guide to hacking a smartphone.</p>
<p>The documents, which have since been removed, indicate that the ATO has access to Universal Forensic Extraction software made by the Israeli company Cellebrite. This technology is part of a commercial industry that profits from bypassing the security features of devices to gain access to private data.</p>
<p>The ATO <a href="https://www.ato.gov.au/Media-centre/Media-releases/Second-Commissioner-s-Statement--ATO-digital-forensic-capability/">later stated</a> that while it does use these methods to aid criminal investigations, it “does not monitor taxpayers’ mobile phones or remotely access their mobile devices”.</p>
<p>Nevertheless, the distribution of commercial spyware to government agencies appears to be common practice in Australia.</p>
<p>This is generally considered to be lawful surveillance. But without proper oversight, there are serious risks to the proliferation of these tools, here and around the world.</p>
<h2>The dangers of the spyware market</h2>
<p>The spyware market is estimated to be worth <a href="https://www.forbes.com/sites/thomasbrewster/2017/02/16/government-iphone-android-spyware-is-the-same-as-seedy-spouseware/#2e300813455c">millions of dollars globally</a>. And as Canadian privacy research group Citizen Lab <a href="https://citizenlab.ca/2017/03/whos-watching-little-brother-checklist-accountability-industry-behind-government-hacking/">has noted</a>, spyware vendors have been willing to sell their wares to autocratic governments.</p>
<p>There are numerous examples of spyware being used by states with dubious human-rights records. These include the surveillance of journalists, political opponents and human rights advocates, including more recently by the <a href="https://citizenlab.ca/2017/06/reckless-exploit-mexico-nso/">Mexican government</a> and in the <a href="https://citizenlab.ca/2016/08/million-dollar-dissident-iphone-zero-day-nso-group-uae/">United Arab Emirates</a>. In Bahrain, the tools have reportedly been used to <a href="https://theintercept.com/2016/12/08/phone-cracking-cellebrite-software-used-to-prosecute-tortured-dissident/">silence political dissent</a>.</p>
<p>Commercial spyware often steps in when mainstream technology companies resist cooperating with law enforcement because of security concerns.</p>
<p>In 2016, for example, <a href="https://www.apple.com/customer-letter/">Apple refused</a> to assist the FBI in circumventing the security features of an iPhone. Apple claimed that being forced to redesign their products could undermine the security and privacy of all iPhone users.</p>
<p>The FBI eventually dropped its case against Apple, and it was <a href="https://www.theguardian.com/technology/2016/apr/21/fbi-apple-iphone-hack-san-bernardino-price-paid">later reported</a> the FBI paid almost US$1.3 million to a spyware company, <a href="http://www.reuters.com/article/us-apple-encryption-cellebrite-idUSKCN0WP17J">reportedly Cellebrite</a>, for technology to hack the device instead. This has never been officially confirmed.</p>
<p>For its part, <a href="http://www.cellebrite.com/Mobile-Forensics/News-Events/Press-Releases/cellebrite-announces-availability-of-mobile-device-forensics-solutions-through-federal-government-wide-procurement-vehicles">Cellebrite</a> claims on its website to provide technologies allowing “investigators to quickly extract, decode, analyse and share evidence from mobile devices”.</p>
<p>Its services are “widely used by federal government customers”, it adds.</p>
<h2>Spyware merchants and the Australian Government</h2>
<p>The Australian government has shown considerable appetite for spyware.</p>
<p><a href="https://www.tenders.gov.au/?event=public.advancedsearch.keyword&amp;keyword=Cellebrite">Tender records</a> show Cellebrite currently holds Australian government contracts worth hundreds of thousands of dollars. But the specific details of these contracts remain unclear.</p>
<p>Fairfax Media <a href="http://www.canberratimes.com.au/national/asic-ato-afp-and-defence-buy-services-of-phonehacking-company-cellebrite-20170622-gwwbnb.html">has reported</a> that the ATO, Australian Securities and Investment Commission, Department of Employment , Australian Federal Police (AFP) and Department of Defence all have contracts with Cellebrite.</p>
<p>The Department of Human Services <a href="https://www.tenders.gov.au/?event=public.cn.view&amp;CNUUID=07C42438-B724-7039-1F98A5667818BBA6">has had</a> a contract with Cellebrite, and <a href="http://www.canberratimes.com.au/national/centrelink-hacking-into-fraudsters-phones-20170627-gwzgqc.html">Centrelink</a> apparently uses spyware to hack the phones of suspected welfare frauds.</p>
<p>In 2015 <a href="http://www.abc.net.au/news/2015-07-28/wikileaks-reveals-australian-companies-selling-spyware/6652184">WikiLeaks released emails</a> from Hacking Team, an Italian spyware company. These documents revealed <a href="http://www.abc.net.au/news/2015-07-10/leaked-emails-expose-australian-government-agencies-hacking-team/6609276">negotiations with</a> the Australian Security and Intelligence Organisation (ASIO), the AFP and other law enforcement agencies.</p>
<h2>Laws and licensing</h2>
<p>In Australia, the legality of spyware use varies according to government agency.</p>
<p>Digital forensics tools are used with a warrant by <a href="https://www.ato.gov.au/About-ATO/Access,-accountability-and-reporting/In-detail/Our-approach-to-information-gathering/?page=2#Legislative_references">the ATO</a> to conduct federal criminal investigations. <a href="http://www.austlii.edu.au/au/legis/cth/consol_act/ca191482/s3e.html">A warrant</a> is typically required before Australian police agencies can use spyware.</p>
<p>ASIO, on the other hand, <a href="http://www.austlii.edu.au/au/legis/cth/consol_act/asioa1979472/">has its own powers</a>, and those under the <a href="http://www.austlii.edu.au/au/legis/cth/consol_act/taaa1979410/">Telecommunications (Interception and Access) Act 1979</a>, that enable spyware use when authorised by the attorney-general.</p>
<p>ASIO also has <a href="http://www.austlii.edu.au/au/legis/cth/consol_act/asioa1979472/s25a.html">expanded powers</a> to hack <a href="https://policyreview.info/articles/analysis/computer-network-operations-and-rule-law-australia">phones and computer networks</a>. These powers raise concerns about the adequacy of independent oversight.</p>
<p>International control of these tools is also being considered.</p>
<p>The <a href="http://www.wassenaar.org/">Wassenaar Arrangement</a>, of which Australia is participant, is an international export control regime that aims to limit the movement of goods and technologies that can be used for both military and civilian purposes.</p>
<p>But there are questions about whether this agreement can be enforced. Security experts also question whether it could criminalise <a href="https://www.wired.com/2015/06/arms-control-pact-security-experts-arms/">some forms of cybersecurity research</a> and limit the exchange of important <a href="https://www.privacyinternational.org/node/344">encryption technology</a>.</p>
<p>Australia has export <a href="http://www.defence.gov.au/ExportControls/DTC.asp">control laws</a> that apply <a href="http://www.defence.gov.au/ExportControls/ICT.asp#Overview">to intrusion software</a>, but the process lacks transparency about the domestic export of spyware technologies to overseas governments. Currently, there are few import controls.</p>
<p>There are also moves to regulate spyware through licensing schemes. For example, Singapore is <a href="https://www.csa.gov.sg/news/press-releases/mci-and-csa-seek-public-feedback-on-proposed-cybersecurity-bill">considering</a> a license for ethical hackers. This could potentially improve transparency and control of the sale of intrusion software.</p>
<p>It’s also concerning that “off-the-shelf” spyware is <a href="https://motherboard.vice.com/en_us/article/aeyea8/i-tracked-myself-with-dollar170-smartphone-spyware-that-anyone-can-buy">readily accessible</a> to the public.</p>
<h2>‘War on math’ and government hacking</h2>
<p>The use of spyware in Australia should be viewed alongside the recent announcement of Prime Minister Malcolm Turnbull’s so-called <a href="http://www.zdnet.com/article/labor-not-distancing-itself-from-turnbulls-war-on-maths/">war on maths</a>.</p>
<p>The prime minister has <a href="https://theconversation.com/australias-planned-decryption-law-would-weaken-cybersecurity-81028">announced laws</a> will be introduced obliging technology companies to intercept encrypted communications to fight terrorism and other crimes.</p>
<p>This is part of a general appetite to undermine security features that are designed to provide the public at large with privacy and safety when using smartphones and other devices.</p>
<p>Despite the prime minister’s <a href="https://www.computerworld.com.au/article/620329/no-one-talking-about-backdoors-says-pm-cyber-guy/">statements to the contrary</a>, these policies can’t help but force technology companies to build <a href="https://www.theregister.co.uk/2017/07/07/oz_governments_definition_of_backdoor/">backdoors</a> into, or otherwise weaken or undermine, encrypted messaging services and the security of the hardware itself.</p>
<p>While the government tries to bypass encryption, spyware technologies already rely on the inherent weaknesses of our digital ecosystem. This is a secretive, lucrative and unregulated industry with serious potential for abuse.</p>
<p><img decoding="async" src="https://counter.theconversation.edu.au/content/80891/count.gif?distributor=republish-lightbox-basic" alt="The Conversation" width="1" height="1" />There needs to be more transparency, oversight and strong steps toward developing a robust framework of <a href="https://citizenlab.ca/2017/03/whos-watching-little-brother-checklist-accountability-industry-behind-government-hacking/">accountability</a> for both the government and private spyware companies.</p>
<p><a href="https://theconversation.com/profiles/monique-mann-221915">Monique Mann</a>, Lecturer, School of Justice, Researcher at the Crime and Justice Research Centre and Intellectual Property and Innovation Law Research Group, Faculty of Law, <em><a href="http://theconversation.com/institutions/queensland-university-of-technology-847">Queensland University of Technology</a></em>; <a href="https://theconversation.com/profiles/adam-molnar-157177">Adam Molnar</a>, Lecturer in Criminology, <em><a href="http://theconversation.com/institutions/deakin-university-757">Deakin University</a></em>, and <a href="https://theconversation.com/profiles/ian-warren-390074">Ian Warren</a>, Senior Lecturer, Criminology, <em><a href="http://theconversation.com/institutions/deakin-university-757">Deakin University</a></em></p>
<p>This article was originally published on <a href="http://theconversation.com">The Conversation</a>. Read the <a href="https://theconversation.com/spyware-merchants-the-risks-of-outsourcing-government-hacking-80891">original article</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Advocates from five nations demand their governments respect strong encryption</title>
		<link>https://privacy.org.au/2017/07/02/advocates-from-five-nations-demand-their-governments-respect-strong-encryption/</link>
		
		<dc:creator><![CDATA[Adam Molnar]]></dc:creator>
		<pubDate>Sun, 02 Jul 2017 05:05:30 +0000</pubDate>
				<category><![CDATA[Media Release]]></category>
		<guid isPermaLink="false">http://privacy.org.au/wpfiles/?p=1004</guid>

					<description><![CDATA[Today, 83 organisations and individuals from Australia, Canada, New Zealand, the UK and the USA sent letters to their respective governments insisting that government officials defend strong encryption. The letter comes on the heels of a meeting of the “Five Eyes” ministerial meeting in Ottawa, Canada earlier this week. <span class="excerpt-more"><a href="https://privacy.org.au/2017/07/02/advocates-from-five-nations-demand-their-governments-respect-strong-encryption/">Read More</a></span>]]></description>
										<content:encoded><![CDATA[<p>Today, 83 organisations and individuals from Australia, Canada, New Zealand, the UK and the USA sent letters to their respective governments insisting that government officials defend strong encryption. The letter comes on the heels of a meeting of the “Five Eyes” ministerial meeting in Ottawa, Canada earlier this week.</p>
<p>The “Five Eyes” is a surveillance partnership of intelligence agencies consisting of Australia, Canada, New Zealand, the United Kingdom, and the United States. According to a joint communique issued after the meeting encryption and access to data was discussed. The communique stated that “encryption can severely undermine public safety efforts by impeding lawful access to the content of communications during investigations into serious crimes, including terrorism.”</p>
<p>In the letter organised by Access Now, CIPPIC, and researchers from Citizen Lab, 83 groups and individuals from the so-called “Five Eyes” countries wrote “we call on you to respect the right to use and develop strong encryption.” Signatories also urged the members of the ministerial meeting to commit to allowing public participating in any future discussions.</p>
<p>Read the letter in full &#8211; (<a href="https://www.indexoncensorship.org/2017/06/five-governments-strong-encryption/">web</a>) &#8211; (<a href="https://privacy.org.au/Papers/Coalition+Letter+to+5eyes+Govs.pdf">PDF</a>)</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
