#[1]Latest topics for ZDNet in Security

    * Edition:
         + Asia
         + Australia
         + Europe
         + India
         + United Kingdom
         + United States
         + ZDNet around the globe:
         + [2]ZDNet China
         + [3]ZDNet France
         + [4]ZDNet Germany
         + [5]ZDNet Korea
         + [6]ZDNet Japan

  Search
  What are you looking for? ____________________ (BUTTON) Go

    * [7]Videos
    * [8]Windows 10
    * [9]Enterprise Software
    * [10]Cloud
    * [11]AI
    * [12]Security
    * [13]TR Premium
    * more
         + [14]Build a Website
         + [15]5G Guide
         + [16]Innovation
         + [17]CES 2020
         + [18]Best Smartphones
         + [19]Executive Guides
         + [20]Best VPN Services
         + [21]Web Hosting
         + [22]See All Topics
         + [23]White Papers
         + [24]Downloads
         + [25]Reviews
         + [26]Galleries
         + [27]Videos
         + [28]TechRepublic Forums
    * [29]Newsletters
    * [30]All Writers
    *
         + [31]Preferences
         + [32]Community
         + [33]Newsletters
         + [34]Log Out

    *
    *
         + What are you looking for? ____________________ (BUTTON) Go
    * Menu
         + [35]Videos
         + [36]Windows 10
         + [37]Enterprise Software
         + [38]Cloud
         + [39]AI
         + [40]Security
         + [41]TR Premium
         + [42]Build a Website
         + [43]5G Guide
         + [44]Innovation
         + [45]CES 2020
         + [46]Best Smartphones
         + [47]Executive Guides
         + [48]Best VPN Services
         + [49]Web Hosting
         + [50]See All Topics
         + [51]White Papers
         + [52]Downloads
         + [53]Reviews
         + [54]Galleries
         + [55]Videos
         + [56]TechRepublic Forums
    *
    *
         +
              o [57]Preferences
              o [58]Community
              o [59]Newsletters
              o [60]Log Out
    * us
         + Asia
         + Australia
         + Europe
         + India
         + United Kingdom
         + United States
         + ZDNet around the globe:
         + [61]ZDNet China
         + [62]ZDNet France
         + [63]ZDNet Germany
         + [64]ZDNet Korea
         + [65]ZDNet Japan

Cops are getting full URLs under Australia's data retention scheme

  There is content on the envelope. A Senate committee has been told that
  law enforcement agencies sometimes get full URLs from telcos, despite
  government reassurances.

    *
    *
    *
    *
    *
    *

  [66]Stilgherrian

  By [67]Stilgherrian for [68]The Full Tilt | February 7, 2020 -- 03:33
  GMT (19:33 PST) | Topic: [69]Security

  The Commonwealth Ombudsman, Michael Manthorpe, has revealed that law
  enforcement agencies are being given the full URLs of web pages visited
  by people under investigation.

  Australia's mandatory telecommunications [70]data retention scheme was
  meant to deliver only so-called "metadata" to the cops and spooks.
  Under the scheme, a warrant is not required.

  But according to Manthorpe, the "ambiguity around the definition of
  content" means that agencies might effectively be receiving the content
  of communications.

  The ombudsman explained his concerns during a hearing of the
  Parliamentary Joint Committee on Intelligence and Security (PJCIS) on
  Friday.

    Senator Andrew Hastie, Committee Chair: Could you talk about your
    concerns regarding ambiguity around the definition of content and
    whether or not an agency should have access to that when disclosed
    by a carrier under an authorisation?

    Michael Manthorpe, Commonwealth Ombudsman: Yes, essentially, the
    piece of ambiguity we have observed through our inspections is that
    sometimes the metadata, in the way it's captured, particularly URL
    data, and sometimes IP addresses but particularly URL data, does
    start to actually in its granularity start to communicate something
    about the content of what is being looked at. That's essentially the
    point we're making.

    Hastie: Just to be very clear, you get the URL, you get the full
    www. whatever it is .com?

    Manthorpe: That's right.

    Hastie: Which can indicate indicate what they're looking at.

    Manthorpe: Exactly. It can be quite long, or it can be quite short,
    and in some cases the descriptor is long enough to start -- we start
    to ask ourselves well that's almost communicating content, even
    though it's captured in the URL.

    Hastie: And then multiple -- we are getting too technical but you
    know -- multiple clicks, for example, on a thread would generate
    more and more, I guess, content.

    Manthorpe: That's right. Yes, exactly. So it's, we're simply
    highlighting that I think when the scheme was commenced, the concept
    of metadata was probably thought to be quite a clean and delineable
    thing, but we know that there is a greyness on the edges here that
    we thought we should call out.

    Hastie: Yeah. Sometimes there's information on the envelope, so to
    speak, to use the analogy from a couple of years ago.

    Manthorpe: That's a good analogy.

  As for the intelligence agencies, the Inspector-General of Intelligence
  and Security (IGIS), Margaret Stone, said that she wasn't aware of any
  instances of content being provided unlawfully, but she echoed
  Manthorpe's concerns.

  "There is this assumption that you get more from content than
  metadata," Stone told the committee.

  "But when you look at the range of metadata, and what it tells you,
  there's an argument that could be made that it is just as intrusive, or
  almost as intrusive, as content. You can tell a lot about what a
  person's doing from that."

  See also: [71]Why Australia is quickly developing a technology-based
  human rights problem (TechRepublic)

'Grave concerns' that this wasn't meant to happen

  Labor Senator Anthony Byrne noted that the major telecommunications
  companies had given the government "numerous assurances ... that they
  could keep metadata in a subset" away from the content.

  "The federal government actually gave these telecommunications
  companies a substantial amount of money to ensure that that has
  actually happened," Byrne said.

  "If that's not happening, that's of grave concern to me."

  Byrne stressed that he wasn't critical of the agencies, nor the
  Commonwealth Ombudsman's office, merely that what he was now being told
  did not match how he thought the system was meant to work.

  "We are undertaking a review of this mandatory data regime, whether or
  not it works, whether or not it could be improved," he said. "It's
  nothing more than that."

Telco data requests are meant to be written down

  Law enforcement agencies are obtaining telco data without written
  authorisation in a "very small number" of cases, according to ombudsman
  Manthorpe.

  "In some cases, they issue an internal authorisation based on verbal
  advice. And at an operational level, I can understand why that might
  occur, but it isn't catered for in the legislation," he said.

  "Sometimes, agencies -- if they issue a verbal authorisation -- do
  subsequently go to commit[ing it] to writing."

  Or, presumably, sometimes not.

  "We see non-compliance in a small minority of cases generally, and this
  is one area of potential non-compliance," Manthorpe said.

  "I would want to emphasise that, you know, there is a big volume of
  authorisations, and as far as we can ascertain, most of them are
  authorised appropriately."

  However as the committee noted, with the huge number of authorisations
  issues, a small percentage might still represent a large absolute
  number.

  In the 2018-2019 financial year, [72]295,691 authorisations to access
  metadata were issued across all state and federal law enforcement
  agencies. This number does not include those issued to intelligence
  agencies.

ASIO guidelines 'well out of date'

  The Attorney-General's guidelines that cover data collection by the
  Australian Security and Intelligence Agency (ASIO) are "well out of
  date", according to Margaret Stone.

  "The present guidelines were issued in 2007, so guidance in relation to
  new powers introduced since then would be very helpful," she said.

  As well as accessing mandatory data retention, those new powers include
  Australia's [73]controversial encryption laws, and the power to conduit
  a range of "special operations".

  "We've been saying for many years now, that those guidelines need
  revising," Stone said.

  "They're well out of date, the present guidelines."

  PJCIS has been hearing evidence as part of its [74]review of the
  mandatory data retention scheme. These powers were legislated as Part
  5-1A of the [75]Telecommunications (Interception and Access) Act 1979,
  usually referred to as the TIA Act, in 2015.

  The committee is due to report by April 13.

SEE ALSO

    * [76]Human Rights Commission wants data retention period limited to
      six months
    * [77]Telstra questions whether metadata restrictions are working as
      intended
    * [78]Optus gained exemption to store metadata unencrypted
    * [79]Home Affairs floats making telcos retain MAC addresses and port
      numbers
    * [80]Commonwealth Ombudsman singles out Home Affairs over stored
      communications and metadata handling
    * [81]ACT Policing had an unauthorised metadata access party 3249
      more times in 2015
    * [82]Australian enforcement agencies angling for metadata review on
      telco cost recovery
    * [83]Clean Energy Regulator, WA Mines Department, and Vet Surgeons
      Board trying to access metadata: Comms Alliance

 Related Topics:

  [84]Australia [85]Security TV [86]Data Management [87]CXO [88]Data
  Centers

    *
    *
    *
    *
    *
    *

  [89]Stilgherrian

  By [90]Stilgherrian for [91]The Full Tilt | February 7, 2020 -- 03:33
  GMT (19:33 PST) | Topic: [92]Security

  [93]Show Comments
  LOG IN TO COMMENT
    * [94]My Profile
    * [95]Log Out

  | [96]Community Guidelines

Join Discussion

  Add Your Comment
  [97]Add Your Comment

More from Stilgherrian

    * Security
      [98]How the B-Team watches over Australia's encryption laws and
      cybersecurity
    * 5G
      [99]Britain 'doing the wrong thing' by letting in Huawei 5G: former
      ASD officer
    * Security
      [100]Home Affairs report reveals deeper problems with Australia's
      encryption laws
    * Security
      [101]AI and disinformation join nukes in the race for armageddon

  Please review our terms of service to complete your newsletter
  subscription.
  [ ]

  By registering, you agree to the [102]Terms of Use and acknowledge the
  data practices outlined in the [103]Privacy Policy.

  You will also receive a complimentary subscription to the ZDNet's Tech
  Update Today and ZDNet Announcement newsletters. You may unsubscribe
  from these newsletters at any time.
  [ ]

  You agree to receive updates, alerts, and promotions from the CBS
  family of companies - including ZDNet’s Tech Update Today and ZDNet
  Announcement newsletters. You may unsubscribe at any time.

  By signing up, you agree to receive the selected newsletter(s) which
  you may unsubscribe from at any time. You also agree to the [104]Terms
  of Use and acknowledge the data collection and usage practices outlined
  in our [105]Privacy Policy.
  (BUTTON) Continue

Newsletters

  See All
  See All

Related Stories

    * 1 of 3
    *

    * [106]As coronavirus challenges mount, WHO's reputation is being
      hijacked for data theft scams
      A potential pandemic, an “infodemic,” and scams are all challenges
      being faced by the WHO.
    * [107]Ransomware installs Gigabyte driver to kill antivirus products
      RobbinHood ransomware deploys novel technique to make sure it can
      encrypt files without being interrupted.
    * [108]Open source takes on managing and securing the electrical grid
      LF Energy and Alliander Announce a program -- GXF -- to securely
      manage the modern electrical grid's Industrial Internet of Things.

    * [109]UK government rolls out red carpet for infamous spyware vendor
      NSO Group will be touting its wares to visiting officials,
      including those potentially from oppressive regimes.
    * [110]Device security firm Forescout snapped up by Advent in $1.9
      billion deal
      The agreement represents a premium of roughly 30 percent on closing
      share prices.
    * [111]OAIC wants visual on what telcos are handing over under data
      retention regime
      The commissioner also reiterated the importance of limiting the
      retention period, introducing a warrant-based system, better
      defining terminology used in the legislation, and ...

    * [112]Human Rights Commission wants data retention period limited to
      six months
      The commission also wants a warrant system introduced to the
      country's data retention regime, saying it would 'help to focus the
      mind of the agency that is seeking the data'. ...
    * [113]US Attorney General says US and allies should invest in Huawei
      competitors
      US Attorney General Barr says the US and its allies should invest
      in Nokia and Ericsson.
    * [114]Malaysia warns of Chinese hacking campaign targeting
      government projects
      MyCERT security alert points the finger at APT40, a Chinese
      state-sponsored hacking crew.

  [115]ZDNet
  Connect with us

  © 2020 CBS Interactive. All rights reserved. [116]Privacy Policy |
  [117]Cookies | [118]Ad Choice | [119]Advertise | [120]Terms of Use |
  [121]Mobile User Agreement
  Visit other CBS Interactive sites: [Select Site_____]
    * [122]Topics
    * [123]Galleries
    * [124]Videos
    * [125]Sponsored Narratives
    * [126]CA Privacy/Info We Collect
    * [127]CA Do Not Sell My Info

    * [128]About ZDNet
    * [129]Meet The Team
    * [130]All Authors
    * [131]RSS Feeds
    * [132]Site Map
    * [133]Reprint Policy

    * [134]Manage | [135]Log Out
    * Join | Log In
    * [136]Membership
    * [137]Newsletters
    * [138]Site Assistance
    * [139]ZDNet Academy
    * [140]TechRepublic Forums

References

  Visible links
  1. https://www.zdnet.com/topic/security/rss.xml
  2. http://www.zdnet.com.cn/
  3. http://www.zdnet.fr/
  4. http://www.zdnet.de/
  5. http://www.zdnet.co.kr/
  6. http://japan.zdnet.com/
  7. https://www.zdnet.com/video/
  8. https://www.zdnet.com/topic/windows-10/
  9. https://www.zdnet.com/topic/enterprise-software/
 10. https://www.zdnet.com/topic/cloud/
 11. https://www.zdnet.com/topic/artificial-intelligence/
 12. https://www.zdnet.com/topic/security/
 13. https://www.techrepublic.com/premium/
 14. https://www.zdnet.com/article/how-to-build-a-website-for-your-business-your-step-by-step-guide/
 15. https://www.zdnet.com/article/what-is-5g-the-business-guide-to-next-generation-wireless-technology/
 16. https://www.zdnet.com/topic/innovation/
 17. https://www.zdnet.com/topic/ces/
 18. https://www.zdnet.com/article/10-best-smartphones/
 19. https://www.zdnet.com/topic/executive-guides/
 20. https://www.zdnet.com/article/vpn-services-the-ultimate-guide-to-protecting-your-data-on-the-internet/
 21. https://www.zdnet.com/article/buying-guide-cheap-web-hosting-services/
 22. https://www.zdnet.com/topic/
 23. https://www.techrepublic.com/resource-library/whitepapers/
 24. https://downloads.zdnet.com/
 25. https://www.zdnet.com/reviews/
 26. https://www.zdnet.com/pictures/
 27. https://www.zdnet.com/video/
 28. https://www.techrepublic.com/forums/
 29. https://www.zdnet.com/newsletters/
 30. https://www.zdnet.com/blog/
 31. https://www.zdnet.com/members/preferences/
 32. https://www.zdnet.com/members/community/
 33. https://www.zdnet.com/members/newsletters/
 34. https://www.zdnet.com/user/logout/
 35. https://www.zdnet.com/video/
 36. https://www.zdnet.com/topic/windows-10/
 37. https://www.zdnet.com/topic/enterprise-software/
 38. https://www.zdnet.com/topic/cloud/
 39. https://www.zdnet.com/topic/artificial-intelligence/
 40. https://www.zdnet.com/topic/security/
 41. https://www.techrepublic.com/premium/
 42. https://www.zdnet.com/article/how-to-build-a-website-for-your-business-your-step-by-step-guide/
 43. https://www.zdnet.com/article/what-is-5g-the-business-guide-to-next-generation-wireless-technology/
 44. https://www.zdnet.com/topic/innovation/
 45. https://www.zdnet.com/topic/ces/
 46. https://www.zdnet.com/article/10-best-smartphones/
 47. https://www.zdnet.com/topic/executive-guides/
 48. https://www.zdnet.com/article/vpn-services-the-ultimate-guide-to-protecting-your-data-on-the-internet/
 49. https://www.zdnet.com/article/buying-guide-cheap-web-hosting-services/
 50. https://www.zdnet.com/topic/
 51. https://www.techrepublic.com/resource-library/whitepapers/
 52. https://downloads.zdnet.com/
 53. https://www.zdnet.com/reviews/
 54. https://www.zdnet.com/pictures/
 55. https://www.zdnet.com/video/
 56. https://www.techrepublic.com/forums/
 57. https://www.zdnet.com/members/preferences/
 58. https://www.zdnet.com/members/community/
 59. https://www.zdnet.com/members/newsletters/
 60. https://www.zdnet.com/user/logout/
 61. http://www.zdnet.com.cn/
 62. http://www.zdnet.fr/
 63. http://www.zdnet.de/
 64. http://www.zdnet.co.kr/
 65. http://japan.zdnet.com/
 66. https://www.zdnet.com/meet-the-team/au/stilgherrian/
 67. https://www.zdnet.com/meet-the-team/au/stilgherrian/
 68. https://www.zdnet.com/blog/the-full-tilt/
 69. https://www.zdnet.com/topic/security/
 70. https://www.zdnet.com/article/mandatory-data-retention-passes-australian-parliament/
 71. https://www.techrepublic.com/article/why-australia-is-quickly-developing-a-technology-based-human-rights-problem/
 72. https://www.zdnet.com/article/home-affairs-report-reveals-deeper-problems-with-australias-encryption-laws/
 73. https://www.zdnet.com/article/whats-actually-in-australias-encryption-laws-everything-you-need-to-know/
 74. https://www.aph.gov.au/Parliamentary_Business/Committees/Joint/Intelligence_and_Security/Dataretentionregime
 75. http://www.austlii.edu.au/cgi-bin/viewdb/au/legis/cth/consol_act/taaa1979410/
 76. https://www.zdnet.com/article/human-rights-commission-wants-data-retention-period-limited-to-six-months/
 77. https://www.zdnet.com/article/telstra-questions-whether-metadata-restrictions-are-working-as-intended/
 78. https://www.zdnet.com/article/optus-gained-exemption-to-store-metadata-unencrypted/
 79. https://www.zdnet.com/article/home-affairs-floats-making-telcos-retain-mac-addresses-and-port-numbers/
 80. https://www.zdnet.com/article/commonwealth-ombudsman-singles-out-home-affairs-over-stored-communications-and-metadata-handling/
 81. https://www.zdnet.com/article/act-policing-had-an-unauthorised-metadata-access-party-3249-further-times-in-2015/
 82. https://www.zdnet.com/article/australian-enforcement-agencies-angling-for-metadata-review-on-telco-cost-recovery/
 83. https://www.zdnet.com/article/clean-energy-regulator-wa-mines-department-and-vet-surgeons-board-trying-to-access-metadata-comms-alliance/
 84. https://www.zdnet.com/topic/australia/
 85. https://www.zdnet.com/topic/security-tv/
 86. https://www.zdnet.com/topic/data-management/
 87. https://www.zdnet.com/topic/cxo/
 88. https://www.zdnet.com/topic/data-centers/
 89. https://www.zdnet.com/meet-the-team/au/stilgherrian/
 90. https://www.zdnet.com/meet-the-team/au/stilgherrian/
 91. https://www.zdnet.com/blog/the-full-tilt/
 92. https://www.zdnet.com/topic/security/
 93. https://www.zdnet.com/article/cops-are-getting-full-urls-under-australias-data-retention-scheme/container
 94. https://www.zdnet.com/members/preferences/
 95. https://www.zdnet.com/user/logout/
 96. http://cbsi.force.com/CBSi/zdnetcommunityfaq
 97. https://www.zdnet.com/article/cops-are-getting-full-urls-under-australias-data-retention-scheme/#comments-ef338f5f-c0fd-4442-b61f-b9eeb1a504aa
 98. https://www.zdnet.com/article/how-the-b-team-watches-over-australias-encryption-laws-and-cybersecurity/
 99. https://www.zdnet.com/article/britain-doing-the-wrong-thing-by-letting-in-huawei-5g-former-asd-officer/
100. https://www.zdnet.com/article/home-affairs-report-reveals-deeper-problems-with-australias-encryption-laws/
101. https://www.zdnet.com/article/ai-and-disinformation-join-nukes-in-the-race-for-armageddon/
102. http://www.cbsinteractive.com/legal/cbsi/terms-of-use
103. https://www.cbsinteractive.com/legal/cbsi/privacy-policy/highlights
104. http://www.cbsinteractive.com/legal/cbsi/terms-of-use
105. https://www.cbsinteractive.com/legal/cbsi/privacy-policy/highlights
106. https://www.zdnet.com/article/this-is-how-the-world-health-organization-is-being-abused-to-stoke-coronavirus-fears/
107. https://www.zdnet.com/article/ransomware-installs-gigabyte-driver-to-kill-antivirus-products/
108. https://www.zdnet.com/article/open-source-takes-on-managing-and-securing-the-electrical-grid/
109. https://www.zdnet.com/article/uk-government-rolls-out-the-red-carpet-for-infamous-spyware-vendor/
110. https://www.zdnet.com/article/device-security-firm-forescout-snapped-up-by-advent-in-1-9-billion-deal/
111. https://www.zdnet.com/article/oaic-wants-visual-on-what-telcos-are-handing-over-under-data-retention-regime/
112. https://www.zdnet.com/article/human-rights-commission-wants-data-retention-period-limited-to-six-months/
113. https://www.zdnet.com/article/us-attorney-general-says-us-and-allies-should-invest-in-huawei-competitors/
114. https://www.zdnet.com/article/malaysia-warns-of-chinese-hacking-campaign-targeting-government-projects/
115. https://www.zdnet.com/
116. http://legalterms.cbsinteractive.com/privacy
117. http://legalterms.cbsinteractive.com/cookies
118. http://legalterms.cbsinteractive.com/adchoice
119. https://www.zdnet.com/advertise/
120. http://legalterms.cbsinteractive.com/terms-of-use
121. http://legalterms.cbsinteractive.com/eula
122. https://www.zdnet.com/topic/
123. https://www.zdnet.com/pictures/
124. https://www.zdnet.com/video/
125. http://narratives.zdnet.com/
126. https://ca.privacy.cbs/
127. https://ca.privacy.cbs/donotsell
128. https://www.zdnet.com/about/
129. https://www.zdnet.com/meet-the-team/
130. https://www.zdnet.com/blog/
131. https://www.zdnet.com/rssfeeds/
132. https://www.zdnet.com/sitemap/
133. https://www.zdnet.com/reprints/
134. https://www.zdnet.com/members/preferences/
135. https://www.zdnet.com/user/logout/
136. https://www.zdnet.com/about/
137. https://www.zdnet.com/newsletters/
138. https://cbsi.secure.force.com/CBSi/knowledgehome?referer=zdnet.com
139. https://academy.zdnet.com/
140. https://www.techrepublic.com/forums/

  Hidden links:
142. https://www.zdnet.com/
143. https://www.zdnet.com/
144. https://www.zdnet.com/article/cops-are-getting-full-urls-under-australias-data-retention-scheme/#comments-ef338f5f-c0fd-4442-b61f-b9eeb1a504aa
145. https://www.zdnet.com/article/cops-are-getting-full-urls-under-australias-data-retention-scheme/#comments-ef338f5f-c0fd-4442-b61f-b9eeb1a504aa
146. https://www.zdnet.com/article/how-the-b-team-watches-over-australias-encryption-laws-and-cybersecurity/
147. https://www.zdnet.com/article/britain-doing-the-wrong-thing-by-letting-in-huawei-5g-former-asd-officer/
148. https://www.zdnet.com/article/home-affairs-report-reveals-deeper-problems-with-australias-encryption-laws/
149. https://www.zdnet.com/article/ai-and-disinformation-join-nukes-in-the-race-for-armageddon/
150. https://www.zdnet.com/newsletters/
151. https://www.zdnet.com/members/newsletters/
152. https://www.zdnet.com/article/this-is-how-the-world-health-organization-is-being-abused-to-stoke-coronavirus-fears/
153. https://www.zdnet.com/article/ransomware-installs-gigabyte-driver-to-kill-antivirus-products/
154. https://www.zdnet.com/article/open-source-takes-on-managing-and-securing-the-electrical-grid/
155. https://www.zdnet.com/article/uk-government-rolls-out-the-red-carpet-for-infamous-spyware-vendor/
156. https://www.zdnet.com/article/device-security-firm-forescout-snapped-up-by-advent-in-1-9-billion-deal/
157. https://www.zdnet.com/article/oaic-wants-visual-on-what-telcos-are-handing-over-under-data-retention-regime/
158. https://www.zdnet.com/article/human-rights-commission-wants-data-retention-period-limited-to-six-months/
159. https://www.zdnet.com/article/us-attorney-general-says-us-and-allies-should-invest-in-huawei-competitors/
160. https://www.zdnet.com/article/malaysia-warns-of-chinese-hacking-campaign-targeting-government-projects/
161. https://www.facebook.com/pages/ZDNet/5953112932
162. http://twitter.com/zdnet
163. https://www.linkedin.com/company/zdnet-com
164. https://www.youtube.com/channel/UCr9QWb5RKLfaunjKHJZAdQQ