<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Ian Warren &#8211; Australian Privacy Foundation</title>
	<atom:link href="https://privacy.org.au/author/ian-warren/feed/" rel="self" type="application/rss+xml" />
	<link>https://privacy.org.au</link>
	<description>Defending your right to be free from intrusion</description>
	<lastBuildDate>Sat, 09 Sep 2017 06:01:47 +0000</lastBuildDate>
	<language>en-AU</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://privacy.org.au/wp-content/uploads/2021/04/cropped-logo_horizontal2-32x32.png</url>
	<title>Ian Warren &#8211; Australian Privacy Foundation</title>
	<link>https://privacy.org.au</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Poisoned water holes: the legal dangers of dark web policing</title>
		<link>https://privacy.org.au/2017/09/08/poisoned-water-holes-the-legal-dangers-of-dark-web-policing/</link>
		
		<dc:creator><![CDATA[Ian Warren]]></dc:creator>
		<pubDate>Fri, 08 Sep 2017 01:59:18 +0000</pubDate>
				<category><![CDATA[Commentary]]></category>
		<guid isPermaLink="false">http://privacy.org.au/?p=1285</guid>

					<description><![CDATA[As police operations move into online environments, new rules for digital evidence collection and exchange must be developed to assist prosecutions while preserving due process and human rights. Without proper checks, police could have significantly expanded scope to search homes and computers around the world. <span class="excerpt-more"><a href="https://privacy.org.au/2017/09/08/poisoned-water-holes-the-legal-dangers-of-dark-web-policing/">Read More</a></span>]]></description>
										<content:encoded><![CDATA[<span><a href="https://theconversation.com/profiles/ian-warren-390074">Ian Warren</a>, <em><a href="http://theconversation.com/institutions/deakin-university-757">Deakin University</a></em>; <a href="https://theconversation.com/profiles/adam-molnar-157177">Adam Molnar</a>, <em><a href="http://theconversation.com/institutions/deakin-university-757">Deakin University</a></em>, and <a href="https://theconversation.com/profiles/monique-mann-221915">Monique Mann</a>, <em><a href="http://theconversation.com/institutions/queensland-university-of-technology-847">Queensland University of Technology</a></em></span>

<p><em>This article is part of a series originally published on <a href="http://theconversation.com">The Conversation</a> on how law enforcement is fighting crime across digital borders.</em></p>

<p>Australian police are using <a href="http://www.csoonline.com/article/2614643/security/watch-out-for-waterhole-attacks----hackers--latest-stealth-weapon.html">&#8220;poisoned watering holes&#8221;</a> to investigate crime on the dark web. By taking over illegal marketplaces that traffic in child pornography or drugs, law enforcement are collecting information about criminals all over the world.</p>

<p>Of course, crimes that occur on the internet often cross international borders, but this situation is creating troubling new standards in transnational policing.</p>

<p>Research, <a href="https://eprints.qut.edu.au/102299/">including our own</a>, indicates that as police operations move into online environments, new rules for digital evidence collection and exchange must be developed to assist prosecutions while preserving due process and <a href="https://necessaryandproportionate.org/">human rights</a>.</p>

<p>Investigations on the <a href="https://theconversation.com/explainer-what-is-the-dark-web-46070">dark web</a> readily transcend geographic demarcations fundamental to the use of search warrants and the admissibility of evidence.</p>

<p>Some enforcement agencies have <a href="https://www.eff.org/deeplinks/2016/08/illegal-playpen-story-rule-41-and-global-hacking-warrants">conducted online investigations</a> and attempted to <a href="http://epublications.bond.edu.au/law_pubs/761/">access or transfer information</a> outside existing domestic and transnational legal frameworks. This is common <a href="https://motherboard.vice.com/en_us/article/mg79nb/australian-authorities-hacked-computers-in-the-us">in cases</a> involving dark web sites that distribute child exploitation material (CEM).</p>

<p>Without proper checks, police could have significantly expanded scope to search homes and computers around the world, even in cases not involving CEM.</p>

<h2>Watering holes and network investigative techniques</h2>

<p>The techniques used in online investigations can have potentially problematic legal standing.</p>

<p><a href="https://arstechnica.com/tech-policy/2017/05/creator-of-infamous-playpen-website-sentenced-to-30-years-in-prison/">Playpen</a> was a dark web site used to distribute CEM. The FBI seized the site in 2015, and obtained a warrant to continue its operation on a government server.</p>

<p>The FBI used a Network Investigative Technique (NIT), also known as <a href="https://policyreview.info/articles/analysis/computer-network-operations-and-rule-law-australia">Computer Network Exploitation</a>, to identify Playpen users. This distributed <a href="https://theconversation.com/after-wannacrypt-should-governments-stockpile-software-vulnerabilities-experts-respond-77717">malware</a> onto any computer used to log into the site.</p>

<p>The NIT enabled the FBI to identify the IP addresses, log-in times, and operating systems of around 150 computers located in the United States and more than 8,000 computers <a href="https://motherboard.vice.com/en_us/article/53d4n8/fbi-hacked-over-8000-computers-in-120-countries-based-on-one-warrant">located in 120 countries</a>. Up to <a href="https://www.casemine.com/judgement/us/5914abd5add7b049347399fb">215,000 registered Playpen users globally</a> could be affected.</p>

<p>According to the Electronic Frontier Foundation, Playpen is the largest known <a href="https://www.eff.org/deeplinks/2016/09/playpen-story-fbis-unprecedented-and-illegal-hacking-operation">US government hacking operation</a>. But it was authorised by a single warrant issued in Eastern Virginia.</p>

<p>Specialist online units in Australia, such as <a href="https://www.theguardian.com/society/2016/jul/13/shining-a-light-on-the-dark-web-how-the-police-ended-up-running-a-paedophile-site">Task Force Argos</a> in the Queensland Police Service, have also used &#8220;poisoned watering hole&#8221; tactics.</p>

<p>Australian convicted child sex offender <a href="http://www.abc.net.au/news/2016-02-26/paedophile-shannon-mccoole-gives-evidence-at-royal-commission/7203970">Shannon Grant McCoole</a>, who administered &#8220;The Love Zone&#8221; site, was apprehended after a tip from Danish police. Task Force Argos investigators then <a href="https://www.cdpp.gov.au/news/record-sentence-head-administrator-paedophile-site">effectively ran the site</a> &#8220;while feeding information to international law enforcement colleagues&#8221;.</p>

<p>The investigation identified many users located in other countries, including several who were <a href="https://motherboard.vice.com/en_us/article/mg79nb/australian-authorities-hacked-computers-in-the-us">prosecuted in the United States</a>.</p>

<p>Details of the warrant used in this investigation are unclear, which is common in cases involving CEM that result in guilty pleas.</p>

<h2>Darkweb investigations and the law</h2>

<p>There are some established methods for law enforcement sharing information across borders.</p>

<p><a href="https://mlat.info/">Mutual Legal Assistance Treaties (MLATs)</a> are similar to extradition treaties. States seeking access to digital evidence located offshore must first issue a formal request.</p>

<p>MLATs aim to protect the legal rights of people suspected of transnational or offshore offending. However, available US cases <a href="https://motherboard.vice.com/en_us/article/mg79nb/australian-authorities-hacked-computers-in-the-us">involving The Love Zone</a> do not appear to mention MLAT procedures.</p>

<p>This has troubling implications for the right to a fair trial.</p>

<p>It’s possible Task Force Argos informally communicated the IP addresses of US-based site users directly to US authorities. Queensland Police declined to comment on the warrant.</p>

<p>The geographic scope of the Playpen NIT warrant, on the other hand, is extremely unclear. <a href="https://www.aclu.org/report/challenging-government-hacking-criminal-cases?redirect=malware-report">Some US courts</a> have declared the NIT warrant to be valid only within Eastern Virginia.</p>

<p>At least one US court has ruled that warrants to search homes and seize computers outside of this district produced evidence viewed as the <a href="https://assets.documentcloud.org/documents/3533838/2017-03-23-44-US-v-Carlson-DMN.pdf">&#8220;fruit of the poisonous tree&#8221;</a>.</p>

<p>In other words, because the dark web’s infrastructure could only enable law enforcement to uncover the locations and identities of suspects through the defective NIT warrant, any physical evidence seized from a subsequent warrant to search a home was inadmissible.</p>

<p>However, some US courts seem willing to admit evidence from the Playpen NIT because the FBI is regarded by the courts as acting in <a href="https://www.ca10.uscourts.gov/opinions/16/16-1401.pdf">good faith</a> in both seeking and executing it.</p>

<h2>Legal geographies of online investigations</h2>

<p>Law enforcement agencies are keen to maintain secrecy of dark web CEM investigations. But there is concern from legal experts that informal police networks routinely operate outside of established MLAT procedures.</p>

<p>The MLAT process is slow, technical <a href="https://www.accessnow.org/whats-wrong-system-cross-border-access-data/">and cumbersome</a>. This may fuel the acceptance of questionable NITs and exchange of data between police to streamline transnational dark web investigations. But it could also undermine complex cyber-prosecutions and the fairness of criminal trials that rely on electronic evidence.</p>

<p>The informal exchange of criminal intelligence and use of malware is understandable where child welfare is at stake. But these investigative methods <a href="https://publicpolicy.googleblog.com/2015/02/a-small-rule-change-that-could-give-us.html">undercut current attempts</a> to preserve due process and digital security standards.</p>

<p><img decoding="async" src="https://counter.theconversation.edu.au/content/82833/count.gif?distributor=republish-lightbox-basic" alt="The Conversation" style="display: none !important;" width="1" hidden="" height="1" />Success in these types of investigations cannot solely be measured by prosecution and conviction rates. It should also be measured by the legality, ethics and transparency of transnational investigative procedures and the rules that underpin them.</p>

<p><span><a href="https://theconversation.com/profiles/ian-warren-390074">Ian Warren</a>, Senior Lecturer, Criminology, <em><a href="http://theconversation.com/institutions/deakin-university-757">Deakin University</a></em>; <a href="https://theconversation.com/profiles/adam-molnar-157177">Adam Molnar</a>, Lecturer, Criminology, <em><a href="http://theconversation.com/institutions/deakin-university-757">Deakin University</a></em>, and <a href="https://theconversation.com/profiles/monique-mann-221915">Monique Mann</a>, Lecturer, School of Justice, Researcher at the Crime and Justice Research Centre and Intellectual Property and Innovation Law Research Group, Faculty of Law, <em><a href="http://theconversation.com/institutions/queensland-university-of-technology-847">Queensland University of Technology</a></em></span></p>

<p>This article was originally published on <a href="http://theconversation.com">The Conversation</a>. Read the <a href="https://theconversation.com/poisoned-water-holes-the-legal-dangers-of-dark-web-policing-82833">original article</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The Australian government is importing spyware &#8211; Is that legal?</title>
		<link>https://privacy.org.au/2017/07/27/the-australian-government-is-importing-spyware-is-that-legal/</link>
		
		<dc:creator><![CDATA[Monique Mann]]></dc:creator>
		<pubDate>Thu, 27 Jul 2017 04:54:43 +0000</pubDate>
				<category><![CDATA[Commentary]]></category>
		<guid isPermaLink="false">http://privacy.org.au/?p=1032</guid>

					<description><![CDATA[An Australian Tax Office (ATO) staffer recently leaked on LinkedIn a step-by-step guide to hacking a smartphone.
The documents, which have since been removed, indicate that the ATO has access to Universal Forensic Extraction software made by the Israeli company Cellebrite. This technology is part of a commercial industry that profits from bypassing the security features of devices to gain access to private data. <span class="excerpt-more"><a href="https://privacy.org.au/2017/07/27/the-australian-government-is-importing-spyware-is-that-legal/">Read More</a></span>]]></description>
										<content:encoded><![CDATA[<h1>Spyware merchants: the risks of outsourcing government hacking</h1>
<p><a href="https://theconversation.com/profiles/monique-mann-221915">Monique Mann</a>, <em><a href="http://theconversation.com/institutions/queensland-university-of-technology-847">Queensland University of Technology</a></em>; <a href="https://theconversation.com/profiles/adam-molnar-157177">Adam Molnar</a>, <em><a href="http://theconversation.com/institutions/deakin-university-757">Deakin University</a></em>, and <a href="https://theconversation.com/profiles/ian-warren-390074">Ian Warren</a>, <em><a href="http://theconversation.com/institutions/deakin-university-757">Deakin University</a></em></p>
<p>An Australian Tax Office (ATO) staffer <a href="http://www.abc.net.au/news/2017-07-12/tax-office-slip-up-reveals-new-phone-hacking-capabilities/8698800">recently leaked</a> on LinkedIn a step-by-step guide to hacking a smartphone.</p>
<p>The documents, which have since been removed, indicate that the ATO has access to Universal Forensic Extraction software made by the Israeli company Cellebrite. This technology is part of a commercial industry that profits from bypassing the security features of devices to gain access to private data.</p>
<p>The ATO <a href="https://www.ato.gov.au/Media-centre/Media-releases/Second-Commissioner-s-Statement--ATO-digital-forensic-capability/">later stated</a> that while it does use these methods to aid criminal investigations, it “does not monitor taxpayers’ mobile phones or remotely access their mobile devices”.</p>
<p>Nevertheless, the distribution of commercial spyware to government agencies appears to be common practice in Australia.</p>
<p>This is generally considered to be lawful surveillance. But without proper oversight, there are serious risks to the proliferation of these tools, here and around the world.</p>
<h2>The dangers of the spyware market</h2>
<p>The spyware market is estimated to be worth <a href="https://www.forbes.com/sites/thomasbrewster/2017/02/16/government-iphone-android-spyware-is-the-same-as-seedy-spouseware/#2e300813455c">millions of dollars globally</a>. And as Canadian privacy research group Citizen Lab <a href="https://citizenlab.ca/2017/03/whos-watching-little-brother-checklist-accountability-industry-behind-government-hacking/">has noted</a>, spyware vendors have been willing to sell their wares to autocratic governments.</p>
<p>There are numerous examples of spyware being used by states with dubious human-rights records. These include the surveillance of journalists, political opponents and human rights advocates, including more recently by the <a href="https://citizenlab.ca/2017/06/reckless-exploit-mexico-nso/">Mexican government</a> and in the <a href="https://citizenlab.ca/2016/08/million-dollar-dissident-iphone-zero-day-nso-group-uae/">United Arab Emirates</a>. In Bahrain, the tools have reportedly been used to <a href="https://theintercept.com/2016/12/08/phone-cracking-cellebrite-software-used-to-prosecute-tortured-dissident/">silence political dissent</a>.</p>
<p>Commercial spyware often steps in when mainstream technology companies resist cooperating with law enforcement because of security concerns.</p>
<p>In 2016, for example, <a href="https://www.apple.com/customer-letter/">Apple refused</a> to assist the FBI in circumventing the security features of an iPhone. Apple claimed that being forced to redesign their products could undermine the security and privacy of all iPhone users.</p>
<p>The FBI eventually dropped its case against Apple, and it was <a href="https://www.theguardian.com/technology/2016/apr/21/fbi-apple-iphone-hack-san-bernardino-price-paid">later reported</a> the FBI paid almost US$1.3 million to a spyware company, <a href="http://www.reuters.com/article/us-apple-encryption-cellebrite-idUSKCN0WP17J">reportedly Cellebrite</a>, for technology to hack the device instead. This has never been officially confirmed.</p>
<p>For its part, <a href="http://www.cellebrite.com/Mobile-Forensics/News-Events/Press-Releases/cellebrite-announces-availability-of-mobile-device-forensics-solutions-through-federal-government-wide-procurement-vehicles">Cellebrite</a> claims on its website to provide technologies allowing “investigators to quickly extract, decode, analyse and share evidence from mobile devices”.</p>
<p>Its services are “widely used by federal government customers”, it adds.</p>
<h2>Spyware merchants and the Australian Government</h2>
<p>The Australian government has shown considerable appetite for spyware.</p>
<p><a href="https://www.tenders.gov.au/?event=public.advancedsearch.keyword&amp;keyword=Cellebrite">Tender records</a> show Cellebrite currently holds Australian government contracts worth hundreds of thousands of dollars. But the specific details of these contracts remain unclear.</p>
<p>Fairfax Media <a href="http://www.canberratimes.com.au/national/asic-ato-afp-and-defence-buy-services-of-phonehacking-company-cellebrite-20170622-gwwbnb.html">has reported</a> that the ATO, Australian Securities and Investment Commission, Department of Employment , Australian Federal Police (AFP) and Department of Defence all have contracts with Cellebrite.</p>
<p>The Department of Human Services <a href="https://www.tenders.gov.au/?event=public.cn.view&amp;CNUUID=07C42438-B724-7039-1F98A5667818BBA6">has had</a> a contract with Cellebrite, and <a href="http://www.canberratimes.com.au/national/centrelink-hacking-into-fraudsters-phones-20170627-gwzgqc.html">Centrelink</a> apparently uses spyware to hack the phones of suspected welfare frauds.</p>
<p>In 2015 <a href="http://www.abc.net.au/news/2015-07-28/wikileaks-reveals-australian-companies-selling-spyware/6652184">WikiLeaks released emails</a> from Hacking Team, an Italian spyware company. These documents revealed <a href="http://www.abc.net.au/news/2015-07-10/leaked-emails-expose-australian-government-agencies-hacking-team/6609276">negotiations with</a> the Australian Security and Intelligence Organisation (ASIO), the AFP and other law enforcement agencies.</p>
<h2>Laws and licensing</h2>
<p>In Australia, the legality of spyware use varies according to government agency.</p>
<p>Digital forensics tools are used with a warrant by <a href="https://www.ato.gov.au/About-ATO/Access,-accountability-and-reporting/In-detail/Our-approach-to-information-gathering/?page=2#Legislative_references">the ATO</a> to conduct federal criminal investigations. <a href="http://www.austlii.edu.au/au/legis/cth/consol_act/ca191482/s3e.html">A warrant</a> is typically required before Australian police agencies can use spyware.</p>
<p>ASIO, on the other hand, <a href="http://www.austlii.edu.au/au/legis/cth/consol_act/asioa1979472/">has its own powers</a>, and those under the <a href="http://www.austlii.edu.au/au/legis/cth/consol_act/taaa1979410/">Telecommunications (Interception and Access) Act 1979</a>, that enable spyware use when authorised by the attorney-general.</p>
<p>ASIO also has <a href="http://www.austlii.edu.au/au/legis/cth/consol_act/asioa1979472/s25a.html">expanded powers</a> to hack <a href="https://policyreview.info/articles/analysis/computer-network-operations-and-rule-law-australia">phones and computer networks</a>. These powers raise concerns about the adequacy of independent oversight.</p>
<p>International control of these tools is also being considered.</p>
<p>The <a href="http://www.wassenaar.org/">Wassenaar Arrangement</a>, of which Australia is participant, is an international export control regime that aims to limit the movement of goods and technologies that can be used for both military and civilian purposes.</p>
<p>But there are questions about whether this agreement can be enforced. Security experts also question whether it could criminalise <a href="https://www.wired.com/2015/06/arms-control-pact-security-experts-arms/">some forms of cybersecurity research</a> and limit the exchange of important <a href="https://www.privacyinternational.org/node/344">encryption technology</a>.</p>
<p>Australia has export <a href="http://www.defence.gov.au/ExportControls/DTC.asp">control laws</a> that apply <a href="http://www.defence.gov.au/ExportControls/ICT.asp#Overview">to intrusion software</a>, but the process lacks transparency about the domestic export of spyware technologies to overseas governments. Currently, there are few import controls.</p>
<p>There are also moves to regulate spyware through licensing schemes. For example, Singapore is <a href="https://www.csa.gov.sg/news/press-releases/mci-and-csa-seek-public-feedback-on-proposed-cybersecurity-bill">considering</a> a license for ethical hackers. This could potentially improve transparency and control of the sale of intrusion software.</p>
<p>It’s also concerning that “off-the-shelf” spyware is <a href="https://motherboard.vice.com/en_us/article/aeyea8/i-tracked-myself-with-dollar170-smartphone-spyware-that-anyone-can-buy">readily accessible</a> to the public.</p>
<h2>‘War on math’ and government hacking</h2>
<p>The use of spyware in Australia should be viewed alongside the recent announcement of Prime Minister Malcolm Turnbull’s so-called <a href="http://www.zdnet.com/article/labor-not-distancing-itself-from-turnbulls-war-on-maths/">war on maths</a>.</p>
<p>The prime minister has <a href="https://theconversation.com/australias-planned-decryption-law-would-weaken-cybersecurity-81028">announced laws</a> will be introduced obliging technology companies to intercept encrypted communications to fight terrorism and other crimes.</p>
<p>This is part of a general appetite to undermine security features that are designed to provide the public at large with privacy and safety when using smartphones and other devices.</p>
<p>Despite the prime minister’s <a href="https://www.computerworld.com.au/article/620329/no-one-talking-about-backdoors-says-pm-cyber-guy/">statements to the contrary</a>, these policies can’t help but force technology companies to build <a href="https://www.theregister.co.uk/2017/07/07/oz_governments_definition_of_backdoor/">backdoors</a> into, or otherwise weaken or undermine, encrypted messaging services and the security of the hardware itself.</p>
<p>While the government tries to bypass encryption, spyware technologies already rely on the inherent weaknesses of our digital ecosystem. This is a secretive, lucrative and unregulated industry with serious potential for abuse.</p>
<p><img decoding="async" src="https://counter.theconversation.edu.au/content/80891/count.gif?distributor=republish-lightbox-basic" alt="The Conversation" width="1" height="1" />There needs to be more transparency, oversight and strong steps toward developing a robust framework of <a href="https://citizenlab.ca/2017/03/whos-watching-little-brother-checklist-accountability-industry-behind-government-hacking/">accountability</a> for both the government and private spyware companies.</p>
<p><a href="https://theconversation.com/profiles/monique-mann-221915">Monique Mann</a>, Lecturer, School of Justice, Researcher at the Crime and Justice Research Centre and Intellectual Property and Innovation Law Research Group, Faculty of Law, <em><a href="http://theconversation.com/institutions/queensland-university-of-technology-847">Queensland University of Technology</a></em>; <a href="https://theconversation.com/profiles/adam-molnar-157177">Adam Molnar</a>, Lecturer in Criminology, <em><a href="http://theconversation.com/institutions/deakin-university-757">Deakin University</a></em>, and <a href="https://theconversation.com/profiles/ian-warren-390074">Ian Warren</a>, Senior Lecturer, Criminology, <em><a href="http://theconversation.com/institutions/deakin-university-757">Deakin University</a></em></p>
<p>This article was originally published on <a href="http://theconversation.com">The Conversation</a>. Read the <a href="https://theconversation.com/spyware-merchants-the-risks-of-outsourcing-government-hacking-80891">original article</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
