PM spruiks data retention as report blames Snowden for poor data sharing

“Strained” relationships between intelligence and business had impeded information sharing and compromised national security as a result, a report into Australia's counter terrorism capabilities has warned as Australian prime minister Tony Abbott stepped up his rhetoric about the need for data-retention legislation in a speech on national security this week.

Abbott's long-expected National Security Statement outlined a range of initiatives designed to increase overall national security, ranging from changes in the handling of dual-citizens' passports to the establishment of a National Counter Terrorism Coordinator.

Proposed data-retention laws – introduced on 30 October 2014 in the form of the Telecommunications (Interception and Access) Amendment (Data Retention) Bill 2014 – were touched on during the course of the speech, with Abbott calling them “the vital next step in giving our agencies the tools they need to keep Australia safe.”

“Access to metadata is the common element to most successful counter-terrorism investigations,” Abbott said. “It's essential in fighting most major crimes, including the most abhorrent of all – crimes against children.”

Data retention has been a divisive issue in recent years. European Union laws requiring data retention were struck down last April but the Swedish government, for one, recently ordered an ISP to resume retaining customer communications data or face a hefty fine.Conversely, the Dutch government has struggled to pass similar legislation, with that country's privacy commissioner said proposed data-retention laws were non-compliant within the country's privacy regime.

In Australia, there have been concerns not only about the implications of broader surveillance but about issues such as the security of retained data.

The speech also saw the release of the Review of Australia's Counter-Terrorism Machinery, a formal report that warned that “the proliferation of communication platforms and encryption technology makes it difficult to maintain the expertise and access needed to detect and monitor terrorists' communications.”

“While much valuable intelligence is hidden by encryption, agencies also need to manage the volume of unencrypted metadata being created,” the report warned. “The challenges of managing and exploiting this data requires investment in new and unique tools, skills and innovation.”

The review highlighted the need for better information sharing between security agencies, which had been constrained by “strained” relationships between intelligence and business in the wake of the Edward Snowden revelations and had “[made] it harder to access key data without legal compulsion.”

Read more: The week in security: Data retention looms, Superfish gutted

Warning that “the ongoing consequences of Edward Snowden's revelations are making the task of maintaining a technological 'edge' over terrorists more difficult,” the report also noted that terrorists were increasingly becoming attuned to surveillance efforts that had, in turn, become easier to avoid.

This meant that agencies “need to use increasingly intrusive and sophisticated monitoring measures”, the report concluded.

Observers weren't convinced: The Greens, for one, said in a statement that Abbott was “pushing the terror button”, “embedding himself in an agenda of fear and anxiety” and “is ignoring practical measures to make our streets safer”.

This article is brought to you by Enex TestLab, content directors for CSO Australia.

Upcoming IT Security Events

March 3rd, March 5th, March 9th 2015

Read more: App Security- the great unspoken

Join CSO for the day@#csoperspectives and hear from @kimzetter @LeviathanSec

3 International Keynote speakers, 36 Key IT Security Industry Speaker, 21 Exhibitors, Security Analysts and many more.. Register today

Dont miss one of the biggest IT Security events in ANZ (registration is free, but seats are limited)

Join the CSO newsletter!

Error: Please check your email address.

Tags national securitydata sharingTony AbbottNational Counter Terrorism Coordinatorunencrypted metadatadata retentionPMSnowdendual-citizens' passports

More about BillCSOEnex TestLabIT Security

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by David Braue

Latest Videos

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

  • 150x50

    IDG Live Webinar:The right collaboration strategy will help your business take flight

    Speakers - Mike Harris, Engineering Services Manager, Jetstar - Christopher Johnson, IT Director APAC, 20th Century Fox - Brent Maxwell, Director of Information Systems, THE ICONIC - IDG MC/Moderator Anthony Caruana

    Play Video

More videos

Blog Posts