Australian Federal Police plots "aggressive" cyber division following law change
New powers allow law enforcement to launch disruptive operations and collect data on suspected criminals
The Australian Federal Police (AFP) has suggested it may introduce a "more aggressive" cyber division, after legislation was passed in September granting extensive new surveillance powers to law enforcement agencies in the country.
During a Senate estimates hearing held on Monday, in which senators typically scrutinise how the government is spending taxpayer money, AFP commissioner Reece Kershaw said that the introduction of Surveillance Legislation Amendment (Identify and Disrupt) Act 2021 means it can now proactively target suspected criminals with disruptive operations.
Kershaw highlighted that the three new powers in the Act will significantly enhance how the AFP investigates serious cyber-enabled crime. The new powers allow police to disrupt data by modifying, copying, adding, or deleting it and allow the AFP and Australian Criminal Intelligence Commission (ACIC) to collect intelligence from devices and networks. Lastly, the powers allow the agencies to take control of an online account to gather information for an investigation.
The commissioner said that the police’s investigators are already planning how they might use the new powers in active investigations to identify, target, and disrupt offenders, including those relating to terrorism, drug importations, and distribution of child abuse material.
"At the moment, we're actually going through an internal review of how we can be more aggressive in cyber, and it may mean a mini restructure internally for us to really have what we would call a cyber offensive operation of the AFP, which would actually conduct disruption operations on these individuals," said Kershaw, according to ZDNet.
The commissioner said this includes talking with the Five Eyes alliance about the growth of cyber threats, with Kershaw currently being the chair of the organisation’s law enforcement group.
Encrypted communications platforms are a significant barrier for the AFP, said Kershaw, outlining that transnational serious organised crime offenders rely on encrypted platforms to carry out their criminality.
“This is the next frontier of crime, and the AFP and our partners will work with governments and global law enforcement networks to ensure the long arm of the AFP reaches criminals no matter where they are in the world,” he added.
The truth about cyber security training
Stop ticking boxes. Start delivering real change.Free download
The AFP's plan for a new cyber offensive arm will have a dangerous effect on people's rights and freedoms in Australia and de-stabilise the open, secure internet we all rely on, said Namrata Maheshwari, Asia Pacific policy counsel, and lead on encryption policy at Access Now.
"This is extremely damaging for privacy and free expression, and undermines digital security for all. The new arm is being built on a flawed foundation: the Identify and Disrupt Bill, which violates human rights; and discussions with the Five Eyes surveillance alliance, which has often called for backdoors to encryption, a measure that would render private and secure communication impossible," she said. "We need rights-respecting frameworks to strengthen cybersecurity, and enhanced surveillance and new 'disruption' tools by law enforcement, as is being contemplated, will have the opposite effect."
Kershaw explained that Operation Ironside was enabled by unique, global law enforcement partnerships, particularly with the FBI, as the AFP provided the agency with the technical ability to decrypt and read encrypted communications in real time.
The operation saw the AFP work for almost three years, leading to the arrest of hundreds of suspected criminals that were tricked into using an encrypted messaging app. The app, codenamed “Anom”, was installed on mobile phones stripped of other capabilities that were bought on the black market. They were only able to send messages to another device that had the app installed, and criminals had to know other criminals to acquire a device.
2021 Thales cloud security study
The challenges of cloud data protection and access management in a hybrid and multi cloud worldFree download
IDC agility assessment
The competitive advantage in adaptabilityFree Download
Digital transformation insights from CIOs for CIOs
Transformation pilotes, co-pilots, and engineersFree download
What ITDMs did next - and what they should be doing now
Enable continued collaboration and communication for hybrid workers