Home Open Sauce Encryption bill: Labor can no longer describe itself as the Opposition

Author's Opinion

The views in this column are those of the author and do not necessarily reflect the views of iTWire.

Have your say and comment below.

Encryption bill: Labor can no longer describe itself as the Opposition Pixabay

There are few things in life which are predictable. Among them are the reaction of the Australian Labor Party to national security legislation.

Initially, the party says it needs to examine the legislation carefully and is unable to say anything until it has done so. Then it starts getting a few hurry-up calls from the government and appears to bite back.

But that is deceptive. The party ends up making some meaningless changes — else would the government accept it? — that benefit no-one and passes the law.

Its response to the Telecommunications and Other Legislation Amendment (Assistance and Access) Bill 2018 has been no different. After five days of hearings before a parliamentary panel, Labor acted as though it would not give in unless what it wanted was done.

But finally, it gave in and agreed to vote for the bill, afraid that it would be seen as being weak on national security. Or maybe senior Labor officials, like Mark Dreyfus, the shadow attorney-general, were reminded of what happened to the late Gough Whitlam in 1975, and realised that the Americans want this law in place.

After that it was a no-contest.

Dreyfus has been going on and on about a definition for the term "systemic weakness". He was told by tech-savvy people — like the chairman of encryption technology firm Senetas, Francis Galbally — that it was not possible to define the term.

Galbally told the Parliamentary Joint Committee on Intelligence and Security last Friday that it was not possible to have knowledge of what a systemic weakness was until it manifested itself.

But did Dreyfus listen? No, he insisted that a definition would have to be one of the additions to the text of the bill when he was negotiating with the government to cut a deal. What good will it do? Well, it will satisfy Dreyfus, that's all.

Another change that Dreyfus said he had negotiated was that the new powers in the bill would only cover serious offences. Plus the communications minister of the day would also act as an overseer in the case of technical capability notices, where the attorney-general can insist that a company provide assistance to a law enforcement agency which wants to break encryption.

There are three ways listed in the bill by which law enforcement can get industry to aid in breaking encryption. A “technical assistance request” allows for voluntary help by a company and its staff will be given civil immunity from prosecution.

An interception agency can then issue a “technical assistance notice” to make a communications provider offer assistance.

Finally, a “technical capability notice” can be issued by the attorney-general at the request of an interception agency. This will force a company to help law enforcement, by building functionality.

What about the question of trust that Galbally and others raised during the five days of PJCIS hearings? It looks like Dreyfus forgot about that.

Seldom has any bill, national security or otherwise, seen the level of objections and criticism that this bill has. It attracted 343 public submissions before it made its way to the PJCIS. Then there about 100 submissions made to the panel, some of them the same as were made earlier.

The Department of Home Affairs did not put up about 500 other submissions. Plus there were thousands of one-liners, simply saying the bill should be dropped.

But both Labor and the government know much better than all these people what is best for the country, the economy, and all those serious things which you and I are not supposed to think about.

Until yesterday, I thought the silliest thing I had seen a Labor politician do, was Mark Latham signing a big cardboard pledge during the 2004 election campaign to indicate that he would always keep the budget in surplus.

But Dreyfus has now topped that by a country mile. Meanwhile, down at Senetas, they must be trying to figure out where they will move their manufacturing of the $1 billion-plus worth of product they sell to other countries.

47 REASONS TO ATTEND YOW! 2018

With 4 keynotes + 33 talks + 10 in-depth workshops from world-class speakers, YOW! is your chance to learn more about the latest software trends, practices and technologies and interact with many of the people who created them.

Speakers this year include Anita Sengupta (Rocket Scientist and Sr. VP Engineering at Hyperloop One), Brendan Gregg (Sr. Performance Architect Netflix), Jessica Kerr (Developer, Speaker, Writer and Lead Engineer at Atomist) and Kent Beck (Author Extreme Programming, Test Driven Development).

YOW! 2018 is a great place to network with the best and brightest software developers in Australia. You’ll be amazed by the great ideas (and perhaps great talent) you’ll take back to the office!

Register now for YOW! Conference

· Sydney 29-30 November
· Brisbane 3-4 December
· Melbourne 6-7 December

Register now for YOW! Workshops

· Sydney 27-28 November
· Melbourne 4-5 December

REGISTER NOW!

LEARN HOW TO REDUCE YOUR RISK OF A CYBER ATTACK

Australia is a cyber espionage hot spot.

As we automate, script and move to the cloud, more and more businesses are reliant on infrastructure that has the high potential to be exposed to risk.

It only takes one awry email to expose an accounts’ payable process, and for cyber attackers to cost a business thousands of dollars.

In the free white paper ‘6 Steps to Improve your Business Cyber Security’ you’ll learn some simple steps you should be taking to prevent devastating and malicious cyber attacks from destroying your business.

Cyber security can no longer be ignored, in this white paper you’ll learn:

· How does business security get breached?
· What can it cost to get it wrong?
· 6 actionable tips

DOWNLOAD NOW!

Sam Varghese

website statistics

Sam Varghese has been writing for iTWire since 2006, a year after the sitecame into existence. For nearly a decade thereafter, he wrote mostly about free and open source software, based on his own use of this genre of software. Since May 2016, he has been writing across many areas of technology. He has been a journalist for nearly 40 years in India (Indian Express and Deccan Herald), the UAE (Khaleej Times) and Australia (Daily Commercial News (now defunct) and The Age). His personal blog is titled Irregular Expression.

 

Popular News

 

Telecommunications

 

Sponsored News

 

 

 

 

Connect