House of Representatives Committees


| Parliamentary Joint Committee on Intelligence and Security

Navigation: Previous Page | Contents | Next Page

Chapter 1 Introduction

Background to the inquiry

1.1                   In May 2012, Attorney-General the Hon. Nicola Roxon MP asked the Parliamentary Joint Committee on Intelligence and Security (the Committee) to inquire into a number of potential reforms to Australia’s national security legislation. Subsequent to this request, the Committee was provided with a discussion paper outlining the reforms the Australian Government was considering, as well as some on which the government sought the views of the Committee.

1.2                   This discussion paper contained the terms of reference for this inquiry which canvassed reforms in three areas: interception of communications and access to data under the Telecommunication (Interception and Access) Act 1979; reform of the telecommunications security aspects of the Telecommunications Act 1997 and other relevant legislation; and reform of the Australian Security Intelligence Organisation Act 1979 and the Intelligence Services Act 2001.  The terms of reference contained 18 specific reform proposals.

1.3                   The Committee formally adopted the proposed terms of reference on 6 July 2012.

1.4                   The Committee was faced with two key difficulties in its conduct of this inquiry. Firstly, the terms of reference were very wide-ranging, containing 44 separate items across three different reform agenda. Secondly, the lack of any draft legislation or detail about the potential reforms was a major limitation and made the Committee’s consideration of the merit of the reforms difficult. This also made it hard for interested stakeholders to effectively respond to the terms of reference.

Conduct of the inquiry

1.5                   The Chair of the Committee, the Hon. Anthony Byrne MP announced the inquiry via media release on 9 July 2012, and the inquiry was subsequently advertised in The Australian on 11 July 2012. The Attorney-General’s Department discussion paper was published on the Committee website. Letters inviting submissions were sent to over 130 stakeholders in both federal and state government, the telecommunications industry, civil liberties and privacy non-government organisations, and peak legal bodies and associations with an expected interest in the reforms canvassed.

1.6                   The Committee received 240 submissions and 29 exhibits. These are outlined in Appendices A and B. Three submissions were received in largely identical terms from some 5,300 individual members of the public. These submitters expressed opposition to the reform proposals, and to a mandatory data retention regime in particular. The Committee thanks these members of the public for contributing to the inquiry and making their concerns known.

1.7                   At all times it was the Committee’s preference for submission to be made public. Confidentiality was granted by the Committee where the information had a national security classification such as SECRET or where a submitter made a special request for such confidentiality to the Committee.

1.8                   Whilst it is the Committee’s preference to be open and transparent the use of classified evidence has meant this has not always been possible.

1.9                   The Committee is grateful to ASIO and ASIS for providing unclassified submissions. This was particularly helpful in the writing of this report.

1.10               The Committee held six public hearings, three private classified hearings and a further private hearing. The witnesses who appeared at these hearings are outlined in Appendices C and D.

1.11               In addition to its public and classified hearings, the Committee received private briefings from the Attorney-General on two occasions, and received a further private briefing from the Secretary and officials of the Attorney-General’s Department.

1.12               As the Committee commenced its inquiry, the Government of the United Kingdom issued a draft Communications Data Bill which has similarities to potential reforms in the Australian Government’s proposals. The Bill was examined by the British Intelligence and Security Committee (ISC) and a Joint Select Committee of the UK Parliament. The Committee held a private meeting with the ISC where the reform proposals in each country were canvassed. The Committee appreciated the observations and assistance provided by ISC members and their Secretariat.

1.13               Finally, the Committee visited Telstra’s Global Operations Centre and received useful briefings from Telstra’s staff.

1.14               Having commenced the inquiry at the beginning of July 2012, the Committee was asked to report if at all possible by the end of the calendar year. This afforded the Committee a highly compressed and unachievable time frame of less than six months to examine what is an extensive list of potential reforms, some of which are far reaching.

1.15               The Committee thanks all submitters and witnesses, including the large number of members of the public who submitted, for their contributions to the Committee’s examination of this package of potential reforms of national security legislation.

1.16               While the evidence submitted was heavily focussed on data retention, the Committee carefully examined each proposal within the Terms of Reference. In its recommendations the Committee has outlined a strategy for the further development of the potential reforms to national security legislation. Specifically, the Committee believes that detailed consideration of any draft legislative provisions will be necessary. Public consultation must be part of this consideration. As part of this consultation the Committee sees merit in expressly seeking the views of key stakeholders including the Independent National Security Legislation Monitor, oversight bodies, privacy advocates, the telecommunications sector, law enforcement and national security agencies.

Structure of the report

1.17               This report focuses around the terms of reference, and thus comprises four chapters. The following chapters discuss:

n  Chapter Two – reform of the government’s ability to intercept telecommunications content and data via the Telecommunications (Interception and Access) Act 1979;

n  Chapter Three – reform of telecommunications sector security and relevant legislation such as the Telecommunications Act 1997; and

n  Chapter Four – reform of the legislation governing the functions and activities of Australia’s intelligence community, including the Australian Security Intelligence Organisation Act 1979 and the Intelligence Services Act 2001.

n  Chapter Five – data retention.

1.18               The Terms of Reference group the proposed reforms into three broad categories:

n  Matters the Government wishes to progress;

n  Matters the Government is considering; and,

n  Matters on which the Government expressly seeks the views of the Parliamentary Joint Committee on Intelligence and Security.

1.19               Due to the complexity and number of issues raised in the Terms of Reference it has not always been possible or logical for the Committee to address its comments in accordance with the three broad groupings noted above.

Chapter Two

1.20               Chapter two looks at a series of proposed reforms to the telecommunications interception regime that are designed to better reflect the ‘contemporary communications environment’.[1]

1.21               In particular, the AGD identified four aspects of the legislation as requiring reform:

n  Strengthening the safeguards and privacy protections in line with contemporary community expectations;

n  Reforming the lawful access regime for agencies;

n  Streamlining and reducing complexity; and

n  Modernising the cost sharing framework.[2]

1.22               Chapter two deals with each of these areas in detail.

Chapter Three

1.23               Chapter three looks at emerging challenges to the security of telecommunications data:

Risks to the availability, confidentiality and integrity of our national telecommunications infrastructure can come from hardware vulnerabilities, accidental misconfiguration, external hacking and even trusted insiders.[3]

1.24               The implications of these risks are significant, especially given that Australian businesses, individuals and public sector actors rely on telecommunication carriers and carriage service providers’ (C/CSPs) ability to store and transmit their data safely and securely, and to protect it from potential national security threats. The discussion paper notes that:

Failure to effectively manage national security risks therefore has implications beyond individual C/CSPs; it is a negative externality affecting government, business and individual Australians.[4]

1.25               The chapter looks at the proposed package of reforms to the Telecommunications Act 1997 and associated legislation to establish this regulatory framework.

Chapter Four

1.26               Chapter four deals with a number of practical difficulties with the legislation governing the operation of the Australian Intelligence Community which is comprised of the Australian Security Intelligence Organisation (ASIO), the Australian Secret Intelligence Service (ASIS), the Defence Signals Directorate (DSD), and the Defence Imagery and Geospatial Organisation (DIGO), the Defence Intelligence Organisation (DIO) and the Office of National Assessments (ONA).[5]

1.27               In relation to these difficulties, the discussion paper canvasses a number of reforms to the Australian Security Intelligence Organisation Act 1979 (ASIO Act) and the Intelligence Services Act 2001 (IS Act). According to the discussion paper, these reforms are necessary to:

...maintain the intelligence gathering capabilities of the Australian intelligence agencies, ensuring they remain able to adeptly respond to emerging and enduring threats to security. Proposed reforms seek to continue the recent modernisation of security legislation to ensure the intelligence community can continue to meet the demands of government in the most effective manner.[6]

1.28               Chapter 4 of the report looks into these matters and make recommendations where appropriate.

Chapter Five

1.29               The Government sought the Committee’s views on a mandatory data retention regime.[7] The Committee did not have access to draft legislation. Furthermore, the inadequate description of data retention in the terms of reference and discussion paper also impaired both the public discussion and the Committee’s consideration of the data retention issue.

1.30               By far the most controversial topic on which the Committee was asked to provide comment, data retention took up much of the Committee’s time. The number of submissions on this issue far exceeded those received on any other topic in the terms of reference.

1.31               In correspondence to the Committee, the Attorney-General defined what could potentially be included in a data set for retention. The Attorney-General put forward the European Union data retention directive, which can be found at Appendix F, as an appropriate model.

1.32               Many submitters to this inquiry expressed their concerns about content being retained under any mandatory data retention regime. However, by the conclusion of the evidence gathering phase of the inquiry, the Attorney-General and the AGD had categorically stated that it was not the Government’s intention to propose a regime that retains content, such as the substance of text messages and emails. However as Chapter Five reveals, there was conflicting evidence from expert witnesses as to whether this was technically possible. Indeed, one of the issues the Committee confronted was the uncertain definitional boundaries between data and content. For completeness, the definitional issue of what constitutes ‘data’ and ‘content’ is included in chapter five.

1.33               The issue with which the Committee has grappled arises not primarily from a changed threat environment, but from the increasingly rapid development of technological capability which has in many cases outpaced the security services’ capacity to respond.

1.34               There is no doubt that the enactment of a mandatory data retention regime would be of significant utility to the national security agencies in the performance of their intelligence, counter-terrorism and law enforcement functions. The Committee takes very seriously the security services’ concerns for public safety.

1.35               However, a mandatory data retention regime raises fundamental privacy issues, and is arguably a significant extension of the power of the state over the citizen. No such regime should be enacted unless those privacy and civil liberties concerns are sufficiently addressed

1.36               Ultimately, the reconciliation of these two fundamental public values is a decision for Government to make.

1.37               The Committee would have been in a better position to assess the merits of such a scheme, and the public better placed to comment, had draft legislation been provided to it.

Appendices

1.38               In addition to the appendices mentioned above, appendices with relevant information have been provided to assist the reader of the report. They are as follows:

n  Appendix E: Discussion paper, Equipping Australia against emerging and evolving threats.

n  Appendix F: Correspondence from the Attorney-General regarding data retention.

n  Appendix G: Correspondence from the Secretary of the Attorney-General’s Department further clarifying data retention.

n  Appendix H: Telecommunications data provided to law enforcement and national security agencies by Telstra.

 

We acknowledge the traditional owners and custodians of country throughout Australia and acknowledge their continuing connection to land, waters and community. We pay our respects to the people, the cultures and the elders past, present and emerging.

Aboriginal and Torres Strait Islander people are advised that this website may contain images and voices of deceased people.