• Advertise
  • About us
  • Terms and Conditions
  • Contact us
Thursday, June 19, 2025
Australian Times News
  • News
    • Weather
    • Sport
    • Technology
    • Business & Finance
      • Currency Zone
    • Lotto Results
      • The Lott
  • Lifestyle
    • Entertainment
    • Horoscopes
    • Health & Wellness
    • Recipes
  • Travel
  • Expat Life
  • Move to Australia
No Result
View All Result
  • News
    • Weather
    • Sport
    • Technology
    • Business & Finance
      • Currency Zone
    • Lotto Results
      • The Lott
  • Lifestyle
    • Entertainment
    • Horoscopes
    • Health & Wellness
    • Recipes
  • Travel
  • Expat Life
  • Move to Australia
No Result
View All Result
Australian Times News
No Result
View All Result
Home News

ACIC thinks there are no legitimate uses of encryption. They’re wrong, and here’s why it matters

Australia’s parliament is considering legislation to give new powers to the Australian Criminal Intelligence Commission (ACIC) and the Australian Federal Police.

The Conversation by The Conversation
18-05-2021 09:17
in News
Photo by Michael Dziedzic on Unsplash

Photo by Michael Dziedzic on Unsplash

Gernot Heiser, UNSW; Lyria Bennett Moses, UNSW, and Vanessa Teague, Australian National University

Australia’s parliament is considering legislation to give new powers to the Australian Criminal Intelligence Commission (ACIC) and the Australian Federal Police. These powers will allow them to modify online data, monitor network activity, and take over online accounts in some circumstances.

Last week, in a submission to parliament regarding the proposed powers, ACIC made an inaccurate and concerning claim about privacy and information security. ACIC claimed “there is no legitimate reason for a law-abiding member of the community to own or use an encrypted communication platform”.

Encrypted communication platforms, including WhatsApp, Signal, Facetime and iMessage, are in common use, allowing users to send messages that can only be read by the intended recipients. There are many legitimate reasons law-abiding people may use them. And surveillance systems, no matter how well-intentioned, may have negative effects and be used for different purposes or by different people than those they were designed for.


How surveillance can go wrong

Surveillance systems often produce unintended effects.

In 1849, the authorities at Tasmania’s Port Arthur penal colony built the Separate Prison, intended as a humane and enlightened method of imprisonment. Based on the ideas of Jeremy Bentham’s Panopticon, the design emphasised constant surveillance and psychological control rather than corporal punishment. However, many inmates suffered serious psychological problems resulting from the lack of normal communication with others.

From 2006 onwards, Facebook developed a privacy-invading apparatus intended to facilitate making money through targeted advertising. Facebook’s system has since been abused by Cambridge Analytica and others for political manipulation, with disastrous consequences for some democracies.

AlsoRead...

Leading with Trust: Why Quality still wins in the AI Era

Leading with Trust: Why Quality still wins in the AI Era

5 June 2025
Why Australian Investors are Betting on the Aviation Maverick Louis Belanger-Martin

Why Australian Investors are Betting on the Aviation Maverick Louis Belanger-Martin

28 May 2025

In 2018, Australia’s parliament passed the Telecommunications and Other Legislation Amendment (Assistance and Access) Act, with the ostensible purpose of helping police to catch terrorists, paedophiles and other serious criminals. The act gave the Australian Federal Police powers to “add, copy, delete or alter” material on computers. These powers were used the following year to raid the Australian Broadcasting Corporation in connection with a story on alleged war crimes in Afghanistan.

These examples demonstrate two facts about security and surveillance. First, surveillance may be used by people of any moral character. Second, a surveillance mechanism may be used by different people, or may achieve a completely different effect, from its original design.

We therefore need to consider what avoiding, undermining or even outlawing the use of encrypted platforms would mean for law-abiding members of the community.

Encryption limits the power of security agencies

There are already laws that decide who is allowed to listen to communications taking place over a telecommunications network. While such communications are generally protected, law enforcement and national security agencies can be authorised to intercept them.

However, where communications are encrypted, agencies will not automatically be able to retrieve the content of the conversations they intercept. The Telecommunications and Other Legislation Amendment (Assistance and Access) Act 2018 was passed to enable agencies to get assistance to try to maintain their ability to get access to the (unencrypted) content of communications. For example, they can ask that one or more forms of electronic protection be removed.



There are also federal, state and territory laws that can require people to assist law enforcement and national security agencies in accessing (unencrypted) data. There are also numerous proposals to clarify these laws, extend state powers and even to prevent the use of encryption in certain circumstances.

More surveillance power is not always better

While people may hold different views on particular proposals about state powers and encryption, there are some things on which we should all be able to agree.

First, facts matter. If the ACIC is wrong about lawful uses of encryption, its assertion should be withdrawn or discounted.

Second, people need both security and privacy. In fact, privacy can facilitate security (the more people know about you, the easier it is to trick you, track you and/or harm you).


Third, law enforcement and national security agencies need some surveillance powers to do their jobs. Most of the time, this contributes to the social good of public safety.

Fourth, more is not necessarily better when it comes to surveillance powers. We must ask what purpose the powers serve, whether they are reasonably necessary for achieving that purpose, whether they are likely to achieve the purpose, what negative consequences might result, and whether the powers are proportionate.

Lawful use of encrypted communication is common

We can only develop good policy in this area if we have the facts on lawful uses of encryption.

There are many good reasons for law-abiding citizens to use end-to-end encrypted communication platforms. Parents may send photos or videos of their children to trusted friends or relatives, but prefer not to share them with third parties. The explosion of telehealth during the COVID-19 pandemic has led many patients to clarify that they do not want their consultation with their doctor to be shared with an intermediary such as Facebook or Google (or Huawei or WeChat).

Even the New South Wales iVote online voting system — hardly a standout example of excessive security given that it contained a defect that potentially allowed vote manipulation to take place — advertises the use of end-to-end encryption to protect the privacy of votes in transit. The necessity of privacy to protect a citizen’s right to vote without coercion is one of the oldest examples of legal privacy requirements.

Undermining encryption will hurt legitimate users

As law-abiding citizens do have legitimate reasons to rely on end-to-end encryption, we should develop laws and policies around government surveillance accordingly. Any legislation that undermines information security across the board will have an impact on lawful users as well as criminals.

There will likely be significant disagreement in the community about where to go from there. But we have to get the facts right first.

We should not consider legislation to deliberately undermine the communications security of all individuals without acknowledging the potential harm this could cause to law-abiding citizens.

Gernot Heiser, Scientia Professor and John Lions Chair, UNSW; Lyria Bennett Moses, Director of the Allens Hub for Technology, Law and Innovation, UNSW, and Vanessa Teague, Adjunct associate professor (ANU) and CEO, Thinking Cybersecurity, Australian National University

This article is republished from The Conversation under a Creative Commons license. Read the original article.

Tags: SB001
DMCA.com Protection Status

SUBSCRIBE to our NEWSLETTER

[mc4wp_form id=”2384248″]

Don't Miss

Leading with Trust: Why Quality still wins in the AI Era

by Pauline Torongo
5 June 2025
Leading with Trust: Why Quality still wins in the AI Era
Business & Finance

If you're leading a software team today, you've likely noticed the shift: faster feature rollouts, routine automation, and AI taking...

Read more

How to Save on Airport Parking: Budget Tips Every Traveller Should Know

by Fazila Olla-Logday
3 June 2025
How to Save on Airport Parking
Travel

Saving money on airport parking can be a challenge,but here are some budget friendly tips to help you navigate.

Read more

Why Australian Investors are Betting on the Aviation Maverick Louis Belanger-Martin

by Pauline Torongo
28 May 2025
Why Australian Investors are Betting on the Aviation Maverick Louis Belanger-Martin
Business & Finance

Bélanger-Martin’s ambitions stretch beyond redefining inflight comfort—they’re rooted in resurrecting the romance of supersonic travel with a modern twist.

Read more

Why a Gluten Free Hamper is simply the Best Gift for a Coeliac

by Fazila Olla-Logday
22 May 2025
Gluten Free Hamper
at

Buying a thoughtful gift can be tricky at the best of times, but when someone has dietary restrictions like coeliac...

Read more

Biela.dev is quietly becoming the Infrastructure Layer for the Next Internet

by Pauline Torongo
15 May 2025
Biela.dev is quietly becoming the Infrastructure Layer for the Next Internet
Technology

Biela.dev is not merely a consumer app; it is infrastructure. It could be a layer that powers the next generation...

Read more

The Battle for the Premier League’s Fifth Champions League Spot: Who Will Prevail?

by Fazila Olla-Logday
8 May 2025
Premier-Leagues-Fifth-Champions-League-Janosch-Diggelmann-Unsplash
at

As the Premier League season nears its climax, the race for the coveted Champions League places is tighter and more...

Read more

The Predictive Infrastructure: How BOF’s Neuro Finance System Reengineers Market Forecasting

by Pauline Torongo
5 May 2025
The Predictive Infrastructure: How BOF’s Neuro Finance System Reengineers Market Forecasting
Business & Finance

As global markets become more complex and volatile, BOF Investments has developed Neuro Finance, a predictive system that combines machine...

Read more
Load More

Copyright © Blue Sky Publications Ltd. All Rights Reserved.
australiantimes.co.uk is a division of Blue Sky Publications Ltd. Reproduction without permission prohibited. DMCA.com Protection Status

  • About us
  • Write for Us
  • Advertise
  • Contact us
  • T&Cs, Privacy and GDPR
No Result
View All Result
  • News
    • Weather
    • Sport
    • Technology
    • Business & Finance
      • Currency Zone
    • Lotto Results
      • The Lott
  • Lifestyle
    • Entertainment
    • Horoscopes
    • Health & Wellness
    • Recipes
  • Travel
  • Expat Life
  • Move to Australia

Copyright © Blue Sky Publications Ltd. All Rights Reserved.
australiantimes.co.uk is a division of Blue Sky Publications Ltd. Reproduction without permission prohibited. DMCA.com Protection Status