Australia's Cyber Security Plan Includes Domestic Surveillance

Australia plans to expand the work of its national spy agency  and provide the Australian Signals Directorate (ASD)’s new  powers that would allow it to conduct domestic investigations for the first time. By rendering support to the Australian federal police and the Australian Criminal Intelligence Commission, the cyber security and intelligence agency would for the first time be able to spy on Australians, although Dutton maintains ASD won’t be able to do so directly.

The Home Affairs minister Peter Dutton has confirmed that Australia’s $1.6 million cyber strategy will include capability for the Australian Signals Directorate (ASD) to help law enforcement agencies identify and disrupt serious criminal activity, including those inside Australia.

Dutton said law enforcement agencies would target terrorists, paedophiles and drug traffickers operating in the Dark Web, promising proposed new powers will apply “to those people and those people only”. Details of the new powers, which will require legislation, are not contained in the strategy, which says only that the government will “ensure law enforcement agencies have appropriate legislative powers and technical capabilities to deter, disrupt and defeat the criminal exploitation of anonymising technology and the dark web”.

ASD powers have been a source of controversy for the government, after the Australian Federal Police (AFP) raided News Corp journalist Annika Smethurst’s home in June over a news report suggesting the home affairs department was seeking power for ASD to spy on Australians. Dutton had claimed the story was nonsense.

Dutton told reporters in the capital, Canberra, that the ASD has “a very unique set of powers” and is “the very best in the business” in operations such as stopping terrorist attacks. More recently ASD had disrupted scam attacks seeking passwords and other information targeting Australians financially during the Covid-19 pandemic.

Dutton said target servers and syndicates were mostly offshore but it was “appropriate” for ASD to help protect Australians. Law enforcement agencies would be able to “tap into” ASD’s capabilities but “the power only applies to … the Australian federal police and ACIC, not the ASD,” he said.

According to sources the  ASD will be prevented from directly collecting information but will be able to provide 'technical capability advice' to assist police execute computer access warrants to identify suspects and disrupt criminal activity.

The package includes $470m to expand Australia’s cybersecurity workforce with 500 new jobs created within the ASD, and $125m to double the AFP’s cyber enforcement capacity by 100 officers and expand the remit of the ACIC. Giving the ASD domestic powers would also allow it to target Australians with military-grade hacking capabilities, including malware exploits that leverage vulnerabilities in applications and operating systems.  

Australia's domestic spy agency says it has detected a rise in suspicious online activity during the coronavirus lockdown, which may have allowed extremists more opportunities to target young people.

Australian Siganls Direcorate:     ABC:       Yahoo:        Newsbreak:       Information Age:       Australian Finacial Review:

You Might Also Read:

Australia Assaulted By Severe State-Backed Cyber Attacks:
 

« Which Industries Suffer Most From Remote Working?
Essential Books For Learning About Cyber Security »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Karamba Security

Karamba Security

Karamba provide an IoT Security solution for ECUs in automobiles which ensures that all cars are protected (not just autonomous cars).

National Intelligence Service (NIS) - South Korea

National Intelligence Service (NIS) - South Korea

The NIS oversees policy on cyber security in South Korea by formulating and coordinating the execution of such policy and devising necessary schemes and guidelines.

Beta Systems Software

Beta Systems Software

Beta Systems automate IT-based business processes, control access rights, monitor processes, secure the network and optimize the infrastructure management of corporate IT.

DataSunrise

DataSunrise

DataSunrise Data-Centric high-performance security software protects the sensitive data in real-time in cloud or on premises, and helps organizations to stay compliant.

CYBERSEC Forum

CYBERSEC Forum

CYBERSEC Forum is an annual European Public Policy Conference dedicated to strategic aspects of cybersecurity.

Redstor

Redstor

Redstor's complete data management helps you discover, manage and control your data from a single control centre, unifying backup and recovery, disaster recovery, archiving and search and insight.

Stamus Networks

Stamus Networks

Stamus Networks offers Scirius Security Platform solutions that marry real-time network traffic data with enhanced Suricata intrusion detection (IDS) and an advanced analytics engine.

Schneider Downs

Schneider Downs

Schneider Downs & Co. provides accounting, tax and business advisory services through innovative thought leaders who deliver their expertise to meet the individual needs of each client.

Pakistan Telecommunication Company Limited (PTCL)

Pakistan Telecommunication Company Limited (PTCL)

Pakistan Telecommunication Company Limited (PTCL) is the largest integrated Information Communication Technology (ICT) company of Pakistan.

Protexxa

Protexxa

Protexxa is a B2B SaaS cybersecurity platform that leverages Artificial Intelligence to rapidly identify, evaluate, predict, and resolve cyber issues for employees.

Archer Technologies

Archer Technologies

Archer helps organizations manage risk in the digital era—uniting stakeholders, integrating technologies and transforming risk into reward.

Nordic Defender

Nordic Defender

Nordic Defender is the first crowd-powered modern cybersecurity solution provider in the Nordic region.

Twine Security

Twine Security

Twine is pioneering the creation of AI digital cybersecurity employees to help improve efficiency for cybersecurity teams.

Infrassist Technologies

Infrassist Technologies

We're Infrassist - a trusted white label Managed IT & Professional Services partner for MSP businesses.

TR-CERT (USOM)

TR-CERT (USOM)

TR-CERT (Ulusal Siber Olaylara Müdahale Merkezi - USOM) is the national Computer Emergency Response Team of Turkey.

IdentifAI

IdentifAI

At identifAI, we develop cutting-edge AI solutions to combat the growing threats of deepfakes and fakenews.