[Index] [Search] [Download] [Related Items] [Help]
This is a Bill, not an Act. For current law, see the Acts databases.
2019-2020
The Parliament of the
Commonwealth of Australia
HOUSE OF REPRESENTATIVES
Presented and read a first time
Surveillance Legislation Amendment
(Identify and Disrupt) Bill 2020
No. , 2020
(Home Affairs)
A Bill for an Act to amend the
Surveillance Devices
Act 2004
, and for other purposes
No. , 2020
Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020
i
Contents
1
Short title ........................................................................................... 1
2
Commencement ................................................................................. 1
3
Schedules ........................................................................................... 2
Schedule 1--Data disruption
3
Surveillance Devices Act 2004
3
Telecommunications (Interception and Access) Act 1979
33
Schedule 2--Network activity warrants
38
Part 1--Main amendments
38
Surveillance Devices Act 2004
38
Part 2--Consequential amendments
67
Australian Crime Commission Act 2002
67
Australian Federal Police Act 1979
67
Australian Human Rights Commission Act 1986
68
Australian Information Commissioner Act 2010
71
Inspector-General of Intelligence and Security Act 1986
71
Law Enforcement Integrity Commissioner Act 2006
81
Ombudsman Act 1976
83
Privacy Act 1988
86
Public Interest Disclosure Act 2013
87
Telecommunications (Interception and Access) Act 1979
90
Schedule 3--Account takeover warrants
95
Crimes Act 1914
95
Schedule 4--Controlled operations
135
Crimes Act 1914
135
Schedule 5--Minor amendments
136
Surveillance Devices Act 2004
136
Telecommunications (Interception and Access) Act 1979
136
No. , 2020
Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020
1
A Bill for an Act to amend the
Surveillance Devices
1
Act 2004
, and for other purposes
2
The Parliament of Australia enacts:
3
1 Short title
4
This Act is the
Surveillance Legislation Amendment (Identify and
5
Disrupt) Act 2020
.
6
2 Commencement
7
(1) Each provision of this Act specified in column 1 of the table
8
commences, or is taken to have commenced, in accordance with
9
column 2 of the table. Any other statement in column 2 has effect
10
according to its terms.
11
12
2
Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020
No. , 2020
Commencement information
Column 1
Column 2
Column 3
Provisions
Commencement
Date/Details
1. Sections 1 to 3
and anything in
this Act not
elsewhere covered
by this table
The day this Act receives the Royal Assent.
2. Schedule 1
The day after this Act receives the Royal
Assent.
3. Schedule 2
Immediately after the commencement of the
provisions covered by table item 2.
4. Schedules 3, 4
and 5
The day after this Act receives the Royal
Assent.
Note:
This table relates only to the provisions of this Act as originally
1
enacted. It will not be amended to deal with any later amendments of
2
this Act.
3
(2) Any information in column 3 of the table is not part of this Act.
4
Information may be inserted in this column, or information in it
5
may be edited, in any published version of this Act.
6
3 Schedules
7
Legislation that is specified in a Schedule to this Act is amended or
8
repealed as set out in the applicable items in the Schedule
9
concerned, and any other item in a Schedule to this Act has effect
10
according to its terms.
11
Data disruption
Schedule 1
No. , 2020
Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020
3
Schedule 1--Data disruption
1
2
Surveillance Devices Act 2004
3
1 Title
4
After "
access to
", insert "
, and disruption of,
".
5
2 After paragraph 3(aaa)
6
Insert:
7
(aab) to establish procedures for certain law enforcement officers
8
of the Australian Federal Police or the Australian Crime
9
Commission to obtain warrants and emergency authorisations
10
that:
11
(i) authorise the disruption of data held in computers; and
12
(ii) are likely to substantially assist in frustrating the
13
commission of relevant offences; and
14
3 Paragraph 3(ba)
15
After "accessing", insert "or disrupting".
16
4 Paragraph 3(ba)
17
After "operations", insert "or computer data disruption operations".
18
5 Paragraph 3(c)
19
Omit "and computer data access operations", substitute ", computer
20
data access operations and computer data disruption operations".
21
6 At the end of subsection 4(1)
22
Add:
23
; or (c) prohibits or regulates disruption of data held in computers.
24
7 After subsection 4(4A)
25
Insert:
26
(4B) For the avoidance of doubt, it is intended that a warrant may be
27
issued, or an emergency authorisation given, under this Act:
28
(a) for access to, and disruption of, data held in a computer; and
29
Schedule 1
Data disruption
4
Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020
No. , 2020
(b) in relation to one or more relevant offences.
1
8 Subsection 6(1)
2
Insert:
3
data disruption intercept information
has the same meaning as in
4
the
Telecommunications (Interception and Access) Act 1979
.
5
data disruption warrant
means a warrant issued under
6
section 27KC or subsection 35B(2) or (3).
7
digital currency
has the same meaning as in the
A New Tax System
8
(Goods and Services Tax) Act 1999
.
9
disrupting data
held in a computer means adding, copying,
10
deleting or altering data held in the computer.
11
Note:
This expression is used in the provisions of this Act that relate to:
12
(a) data disruption warrants; or
13
(b) emergency authorisations for disruption of data held in a
14
computer.
15
emergency authorisation for access to data held in a computer
16
means an emergency authorisation given in response to an
17
application under subsection 28(1A), 29(1A) or 30(1A).
18
emergency authorisation for disruption of data held in a
19
computer
means an emergency authorisation given in response to
20
an application under subsection 28(1C).
21
IGIS official
means:
22
(a) the Inspector-General of Intelligence and Security; or
23
(b) any other person covered by subsection 32(1) of the
24
Inspector-General of Intelligence and Security Act 1986
.
25
Ombudsman official
means:
26
(a) the Ombudsman; or
27
(b) a Deputy Commonwealth Ombudsman; or
28
(c) a person who is a member of the staff referred to in
29
subsection 31(1) of the
Ombudsman Act 1976
.
30
9 Subsection 6(1) (definition of
remote application
)
31
Omit "or 27B", substitute ", 27B or 27KB".
32
Data disruption
Schedule 1
No. , 2020
Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020
5
10 Subsection 6(1) (definition of
unsworn application
)
1
Omit "or 27A(13) and (14)", substitute ", 27A(13) and (14) or 27KA(4)
2
and (5)".
3
11 Subsection 6(1) (at the end of the definition of
warrant
)
4
Add:
5
; or (d) a data disruption warrant.
6
12 At the end of subsection 10(1)
7
Add:
8
; (d) a data disruption warrant.
9
13 At the end of Part 2
10
Add:
11
Division 5--Data disruption warrants
12
27KA Application for data disruption warrant
13
(1) A law enforcement officer of the Australian Federal Police or the
14
Australian Crime Commission (or another person on the law
15
enforcement officer's behalf) may apply for the issue of a data
16
disruption warrant if the law enforcement officer suspects on
17
reasonable grounds that:
18
(a) one or more relevant offences of a particular kind have been,
19
are being, are about to be, or are likely to be, committed; and
20
(b) those offences involve, or are likely to involve, data held in a
21
computer (the
target computer
); and
22
(c) disruption of data held in the target computer is likely to
23
substantially assist in frustrating the commission of one or
24
more relevant offences that:
25
(i) involve, or are likely to involve, data held in the target
26
computer; and
27
(ii) are of the same kind as the relevant offences referred to
28
in paragraph (a).
29
Schedule 1
Data disruption
6
Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020
No. , 2020
Procedure for making applications
1
(2) An application under subsection (1) may be made to an eligible
2
Judge or to a nominated AAT member.
3
(3) An application:
4
(a) must specify:
5
(i) the name of the applicant; and
6
(ii) the nature and duration of the warrant sought; and
7
(b) subject to this section, must be supported by an affidavit
8
setting out the grounds on which the warrant is sought.
9
Unsworn applications
10
(4) If a law enforcement officer believes that:
11
(a) immediate disruption of data held in the target computer
12
referred to in subsection (1) is likely to substantially assist as
13
described in paragraph (1)(c); and
14
(b) it is impracticable for an affidavit to be prepared or sworn
15
before an application for a warrant is made;
16
an application for a warrant under subsection (1) may be made
17
before an affidavit is prepared or sworn.
18
(5) If subsection (4) applies, the applicant must:
19
(a) provide as much information as the eligible Judge or
20
nominated AAT member considers is reasonably practicable
21
in the circumstances; and
22
(b) not later than 72 hours after the making of the application,
23
send a duly sworn affidavit to the eligible Judge or
24
nominated AAT member, whether or not a warrant has been
25
issued.
26
Target computer
27
(6) The target computer referred to in subsection (1) may be any one
28
or more of the following:
29
(a) a particular computer;
30
(b) a computer on particular premises;
31
(c) a computer associated with, used by or likely to be used by, a
32
person (whose identity may or may not be known).
33
Data disruption
Schedule 1
No. , 2020
Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020
7
27KB Remote application
1
(1) If a law enforcement officer believes that it is impracticable for an
2
application for a data disruption warrant to be made in person, the
3
application may be made under section 27KA by telephone, fax,
4
email or any other means of communication.
5
(2) If transmission by fax is available and an affidavit has been
6
prepared, the person applying must transmit a copy of the affidavit,
7
whether sworn or unsworn, to the eligible Judge or to the
8
nominated AAT member who is to determine the application.
9
27KC Determining the application
10
(1) An eligible Judge or a nominated AAT member may issue a data
11
disruption warrant if satisfied:
12
(a) that there are reasonable grounds for the suspicion founding
13
the application for the warrant; and
14
(b) the disruption of data authorised by the warrant is justifiable
15
and proportionate, having regard to the offences referred to in
16
paragraph 27KA(1)(c); and
17
(c) in the case of an unsworn application--that it would have
18
been impracticable for an affidavit to have been sworn or
19
prepared before the application was made; and
20
(d) in the case of a remote application--that it would have been
21
impracticable for the application to have been made in
22
person.
23
(2) In determining whether a data disruption warrant should be issued,
24
the eligible Judge or nominated AAT member must have regard to:
25
(a) the nature and gravity of the conduct constituting the
26
offences referred to in paragraph 27KA(1)(c); and
27
(b) the likelihood that the disruption of data authorised by the
28
warrant will frustrate the commission of the offences referred
29
to in paragraph 27KA(1)(c); and
30
(c) the existence of any alternative means of frustrating the
31
commission of the offences referred to in
32
paragraph 27KA(1)(c); and
33
Schedule 1
Data disruption
8
Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020
No. , 2020
(d) any previous warrant sought or issued under this Division in
1
relation to the alleged relevant offences referred to in
2
paragraph 27KA(1)(c).
3
27KD What must a data disruption warrant contain?
4
(1) A data disruption warrant must:
5
(a) state that the eligible Judge or nominated AAT member
6
issuing the warrant is satisfied of the matters referred to in
7
subsection 27KC(1) and has had regard to the matters
8
referred to in subsection 27KC(2); and
9
(b) specify:
10
(i) the name of the applicant; and
11
(ii) the alleged relevant offences referred to in
12
paragraph 27KA(1)(c); and
13
(iii) the date the warrant is issued; and
14
(iv) if the target computer is or includes a particular
15
computer--the computer; and
16
(v) if the target computer is or includes a computer on
17
particular premises--the premises; and
18
(vi) if the target computer is or includes a computer
19
associated with, used by or likely to be used by, a
20
known person--the person (whether by name or
21
otherwise); and
22
(vii) the period during which the warrant is in force (see
23
subsection (2)); and
24
(viii) the name of the law enforcement officer primarily
25
responsible for executing the warrant; and
26
(ix) any conditions subject to which things may be done
27
under the warrant.
28
(2) A warrant may only be issued for a period of no more than 90
29
days.
30
Note:
The access to, or disruption of, data held in the target computer
31
pursuant to a warrant may be discontinued earlier--see section 27KH.
32
(3) In the case of a warrant authorising access to, or disruption of, data
33
held in the target computer on premises that are vehicles, the
34
warrant need only specify the class of vehicle in relation to which
35
Data disruption
Schedule 1
No. , 2020
Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020
9
the access to, and disruption of, data held in the target computer is
1
authorised.
2
(4) A warrant must be signed by the person issuing it and include the
3
person's name.
4
(5) As soon as practicable after completing and signing a warrant
5
issued on a remote application, the person issuing it must:
6
(a) inform the applicant of:
7
(i) the terms of the warrant; and
8
(ii) the date on which, and the time at which, the warrant
9
was issued; and
10
(b) give the warrant to the applicant while retaining a copy of the
11
warrant for the person's own record.
12
27KE What a data disruption warrant authorises
13
(1) A data disruption warrant must authorise the doing of specified
14
things (subject to any restrictions or conditions specified in the
15
warrant) in relation to the relevant target computer.
16
(2) The things that may be specified are any of the following that the
17
eligible Judge or nominated AAT member considers appropriate in
18
the circumstances:
19
(a) entering specified premises for the purposes of doing the
20
things mentioned in this subsection;
21
(b) entering any premises for the purposes of gaining entry to, or
22
exiting, the specified premises;
23
(c) using:
24
(i) the target computer; or
25
(ii) a telecommunications facility operated or provided by
26
the Commonwealth or a carrier; or
27
(iii) any other electronic equipment; or
28
(iv) a data storage device;
29
for the following purposes:
30
(v) obtaining access to data (the
relevant data
) that is held
31
in the target computer at any time while the warrant is
32
in force, in order to determine whether the relevant data
33
is covered by the warrant;
34
Schedule 1
Data disruption
10
Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020
No. , 2020
(vi) disrupting the relevant data at any time while the
1
warrant is in force, if doing so is likely to assist in
2
frustrating the commission of one or more relevant
3
offences covered by the warrant;
4
(d) if necessary to achieve the purpose mentioned in
5
subparagraph (c)(v) or (vi)--adding, copying, deleting or
6
altering other data in the target computer;
7
(e) if, having regard to other methods (if any) of obtaining
8
access to, or disrupting, the relevant data which are likely to
9
be as effective, it is reasonable in all the circumstances to do
10
so:
11
(i) using any other computer or a communication in transit
12
to access or disrupt the relevant data; and
13
(ii) if necessary to achieve that purpose--adding, copying,
14
deleting or altering other data in the computer or the
15
communication in transit;
16
(f) removing a computer or other thing from premises for the
17
purposes of doing any thing specified in the warrant in
18
accordance with this subsection, and returning the computer
19
or other thing to the premises;
20
(g) copying any data to which access has been obtained, and
21
that:
22
(i) appears to be relevant for the purposes of determining
23
whether the relevant data is covered by the warrant; or
24
(ii) is covered by the warrant;
25
(h) intercepting a communication passing over a
26
telecommunications system, if the interception is for the
27
purposes of doing any thing specified in the warrant in
28
accordance with this subsection;
29
(i) any other thing reasonably incidental to any of the above.
30
Note:
As a result of the warrant, a person who, by means of a
31
telecommunications facility, obtains access to data stored in a
32
computer etc. will not commit an offence under Part 10.7 of the
33
Criminal Code
or equivalent State or Territory laws (provided that the
34
person acts within the authority of the warrant).
35
(3) If:
36
(a) a data disruption warrant authorises the removal of a
37
computer or other thing from premises as mentioned in
38
paragraph (2)(f); and
39
Data disruption
Schedule 1
No. , 2020
Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020
11
(b) a computer or thing is removed from the premises in
1
accordance with the warrant;
2
the computer or thing must be returned to the premises within a
3
reasonable period.
4
(4) For the purposes of paragraph (2)(g), if:
5
(a) access has been obtained to data; and
6
(b) the data is subject to a form of electronic protection;
7
the data is taken to be relevant for the purposes of determining
8
whether the relevant data is covered by the warrant.
9
When data is covered by a warrant
10
(5) For the purposes of this section, data is
covered by
a warrant if
11
disruption of the data is likely to substantially assist as described in
12
paragraph 27KA(1)(c).
13
When a relevant offence is covered by a warrant
14
(6) For the purposes of this section, a relevant offence is
covered by
a
15
warrant if the relevant offence is referred to in
16
paragraph 27KA(1)(c).
17
Certain acts not authorised
18
(7) Subsection (2) does not authorise the addition, deletion or
19
alteration of data, or the doing of any thing, that is likely to:
20
(a) materially interfere with, interrupt or obstruct:
21
(i) a communication in transit; or
22
(ii) the lawful use by other persons of a computer;
23
unless the addition, deletion or alteration, or the doing of the
24
thing, is necessary to do one or more of the things specified
25
in the warrant; or
26
(b) cause any other material loss or damage to other persons
27
lawfully using a computer, unless the loss or damage is
28
justified and proportionate, having regard to the offences
29
covered by the warrant.
30
Warrant must provide for certain matters
31
(8) A data disruption warrant must:
32
Schedule 1
Data disruption
12
Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020
No. , 2020
(a) authorise the use of any force against persons and things that
1
is necessary and reasonable to do the things specified in the
2
warrant; and
3
(b) if the warrant authorises entering premises--state whether
4
entry is authorised to be made at any time of the day or night
5
or during stated hours of the day or night.
6
Concealment of access etc.
7
(9) If any thing has been done in relation to a computer under:
8
(a) a data disruption warrant; or
9
(b) this subsection;
10
then, in addition to the things specified in the warrant, the warrant
11
authorises the doing of any of the following:
12
(c) any thing reasonably necessary to conceal the fact that any
13
thing has been done under the warrant or under this
14
subsection;
15
(d) entering any premises where the computer is reasonably
16
believed to be, for the purposes of doing the things
17
mentioned in paragraph (c);
18
(e) entering any other premises for the purposes of gaining entry
19
to or exiting the premises referred to in paragraph (d);
20
(f) removing the computer or another thing from any place
21
where it is situated for the purposes of doing the things
22
mentioned in paragraph (c), and returning the computer or
23
other thing to that place;
24
(g) if, having regard to other methods (if any) of doing the things
25
mentioned in paragraph (c) which are likely to be as
26
effective, it is reasonable in all the circumstances to do so:
27
(i) using any other computer or a communication in transit
28
to do those things; and
29
(ii) if necessary to achieve that purpose--adding, copying,
30
deleting or altering other data in the computer or the
31
communication in transit;
32
(h) intercepting a communication passing over a
33
telecommunications system, if the interception is for the
34
purposes of doing any thing mentioned in this subsection;
35
(i) any other thing reasonably incidental to any of the above;
36
at the following time:
37
Data disruption
Schedule 1
No. , 2020
Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020
13
(j) at any time while the warrant is in force or within 28 days
1
after it ceases to be in force;
2
(k) if none of the things mentioned in paragraph (c) are done
3
within the 28-day period mentioned in paragraph (j)--at the
4
earliest time after that 28-day period at which it is reasonably
5
practicable to do the things mentioned in paragraph (c).
6
(10) Subsection (9) does not authorise the doing of a thing that is likely
7
to:
8
(a) materially interfere with, interrupt or obstruct:
9
(i) a communication in transit; or
10
(ii) the lawful use by other persons of a computer;
11
unless the doing of the thing is necessary to do one or more
12
of the things specified in subsection (9); or
13
(b) cause any other material loss or damage to other persons
14
lawfully using a computer, unless the loss or damage is
15
justified and proportionate, having regard to the offences
16
covered by the warrant.
17
(11) If a computer or another thing is removed from a place in
18
accordance with paragraph (9)(f), the computer or thing must be
19
returned to the place within a reasonable period.
20
Statutory conditions
21
(12) A data disruption warrant is subject to the following conditions:
22
(a) the warrant must not be executed in a manner that results in
23
loss or damage to data unless the damage is justified and
24
proportionate, having regard to the offences covered by the
25
warrant;
26
(b) the warrant must not be executed in a manner that causes a
27
person to suffer a permanent loss of:
28
(i) money; or
29
(ii) digital currency; or
30
(iii) property (other than data).
31
(13) Subsection (12) does not, by implication, limit the conditions to
32
which a data disruption warrant may be subject.
33
Schedule 1
Data disruption
14
Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020
No. , 2020
(14) The conditions set out in subsection (12) must be specified in a
1
data disruption warrant.
2
27KF Extension and variation of data disruption warrant
3
(1) A law enforcement officer to whom a data disruption warrant has
4
been issued (or another person on the law enforcement officer's
5
behalf) may apply, at any time before the expiry of the warrant:
6
(a) for an extension of the warrant for a period of no more than
7
90 days after the day the warrant would otherwise expire; or
8
(b) for a variation of any of the other terms of the warrant.
9
(2) The application is to be made to an eligible Judge or to a
10
nominated AAT member and must be accompanied by the original
11
warrant.
12
(3) Sections 27KA and 27KB apply, with any necessary changes, to an
13
application under this section as if it were an application for the
14
warrant.
15
(4) The eligible Judge or nominated AAT member may grant an
16
application if satisfied that the matters referred to in
17
subsection 27KC(1) still exist, having regard to the matters in
18
subsection 27KC(2).
19
(5) If the eligible Judge or nominated AAT member grants the
20
application, the eligible Judge or nominated AAT member must
21
endorse the new expiry date or the other varied term on the original
22
warrant.
23
(6) An application may be made under this section more than once.
24
27KG Revocation of data disruption warrant
25
(1) A data disruption warrant may, by instrument in writing, be
26
revoked by an eligible Judge or nominated AAT member on the
27
initiative of the eligible Judge or nominated AAT member at any
28
time before the expiration of the period of validity specified in the
29
warrant.
30
(2) If the circumstances set out in subsection 27KH(2) apply in
31
relation to a data disruption warrant, the chief officer of the law
32
Data disruption
Schedule 1
No. , 2020
Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020
15
enforcement agency to which the law enforcement officer to whom
1
the warrant was issued belongs or is seconded must, by instrument
2
in writing, revoke the warrant.
3
(3) The instrument revoking a warrant must be signed by the eligible
4
Judge, the nominated AAT member or the chief officer of the law
5
enforcement agency, as the case requires.
6
(4) If an eligible Judge or nominated AAT member revokes a warrant,
7
the eligible Judge or nominated AAT member must give a copy of
8
the instrument of revocation to the chief officer of the law
9
enforcement agency to which the law enforcement officer to whom
10
the warrant was issued belongs or is seconded.
11
(5) If:
12
(a) an eligible Judge or nominated AAT member revokes a
13
warrant; and
14
(b) at the time of the revocation, a law enforcement officer is
15
executing the warrant;
16
the law enforcement officer is not subject to any civil or criminal
17
liability for any act done in the proper execution of that warrant
18
before the officer is made aware of the revocation.
19
27KH Discontinuance of access and disruption under warrant
20
Scope
21
(1) This section applies if a data disruption warrant is issued.
22
Discontinuance of access and disruption
23
(2) If:
24
(a) the data disruption warrant has been sought by or on behalf
25
of a law enforcement officer; and
26
(b) the chief officer of the law enforcement agency to which the
27
law enforcement officer belongs or is seconded is satisfied
28
that access to, and disruption of, data under the warrant is no
29
longer required for the purposes referred to in
30
paragraph 27KA(1)(c);
31
Schedule 1
Data disruption
16
Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020
No. , 2020
the chief officer must, in addition to revoking the warrant under
1
section 27KG, take the steps necessary to ensure that access to, and
2
disruption of, data authorised by the warrant is discontinued.
3
(3) If the chief officer of a law enforcement agency is notified that a
4
warrant has been revoked by an eligible Judge or a nominated
5
AAT member under section 27KG, the chief officer must take the
6
steps necessary to ensure that access to, and disruption of, data
7
authorised by the warrant is discontinued as soon as practicable.
8
(4) If the law enforcement officer to whom the warrant is issued, or
9
who is primarily responsible for executing the warrant, believes
10
that access to, and disruption of, data under the warrant is no
11
longer necessary for the purposes referred to in
12
paragraph 27KA(1)(c), the law enforcement officer must
13
immediately inform the chief officer of the law enforcement
14
agency to which the law enforcement officer belongs or is
15
seconded.
16
27KJ Relationship of this Division to parliamentary privileges and
17
immunities
18
To avoid doubt, this Division does not affect the law relating to the
19
powers, privileges and immunities of any of the following:
20
(a) each House of the Parliament;
21
(b) the members of each House of the Parliament;
22
(c) the committees of each House of the Parliament and joint
23
committees of both Houses of the Parliament.
24
14 Subsection 28(1B)
25
After "target computer", insert "mentioned in subsection (1A)".
26
15 After subsection 28(1B)
27
Insert:
28
(1C) A law enforcement officer of the Australian Federal Police or the
29
Australian Crime Commission may apply to an appropriate
30
authorising officer for an emergency authorisation for disruption of
31
data held in a computer (the
target computer
) if, in the course of an
32
investigation of a relevant offence, the law enforcement officer
33
reasonably suspects that:
34
Data disruption
Schedule 1
No. , 2020
Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020
17
(a) an imminent risk of serious violence to a person or
1
substantial damage to property exists; and
2
(b) disruption of data held in the target computer is immediately
3
necessary for the purpose of dealing with that risk; and
4
(c) the circumstances are so serious and the matter is of such
5
urgency that disruption of data held in the target computer is
6
warranted; and
7
(d) it is not practicable in the circumstances to apply for a data
8
disruption warrant.
9
(1D) The target computer mentioned in subsection (1C) may be any one
10
or more of the following:
11
(a) a particular computer;
12
(b) a computer on particular premises;
13
(c) a computer associated with, used by or likely to be used by, a
14
person (whose identity may or may not be known).
15
16 Subsections 28(3) and (4)
16
Omit "or (1A)", substitute ", (1A) or (1C)".
17
17 At the end of section 28
18
Add:
19
Statutory conditions--disruption of data held in a computer
20
(5) An emergency authorisation for disruption of data held in a
21
computer is subject to the following conditions:
22
(a) the authorisation must not be executed in a manner that
23
results in damage to data unless the damage is justified and
24
proportionate, having regard to the risk of serious violence or
25
substantial damage referred to in paragraph (1C)(a);
26
(b) the authorisation must not be executed in a manner that
27
causes a person to suffer a permanent loss of:
28
(i) money; or
29
(ii) digital currency; or
30
(iii) property (other than data).
31
18 After subsection 32(2A)
32
Insert:
33
Schedule 1
Data disruption
18
Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020
No. , 2020
(2B) An emergency authorisation for disruption of data held in a
1
computer may authorise anything that a data disruption warrant
2
may authorise.
3
19 After subsection 32(3A)
4
Insert:
5
(3B) A law enforcement officer may, under an emergency authorisation,
6
disrupt data held in a computer only if the officer is acting in the
7
performance of the officer's duty.
8
20 Subsection 32(4)
9
After "(2A)", insert "or (2B)".
10
21 After subsection 33(2A)
11
Insert:
12
(2B) In the case of an application for an emergency authorisation for
13
disruption of data held in a computer, the application:
14
(a) must specify:
15
(i) the name of the applicant for the approval; and
16
(ii) if a warrant is sought--the nature and duration of the
17
warrant; and
18
(b) must be supported by an affidavit setting out the grounds on
19
which the approval (and warrant, if any) is sought; and
20
(c) must be accompanied by a copy of the written record made
21
under section 31 in relation to the emergency authorisation.
22
22 After subsection 34(1A)
23
Insert:
24
(1B) Before deciding an application for approval of the giving of an
25
emergency authorisation given in response to an application under
26
subsection 28(1C), the eligible Judge or nominated AAT member
27
considering the application must, in particular, and being mindful
28
of the intrusive nature of accessing and disrupting data held in the
29
target computer mentioned in that subsection, consider the
30
following:
31
(a) the nature of the risk of serious violence to a person or
32
substantial damage to property;
33
Data disruption
Schedule 1
No. , 2020
Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020
19
(b) the extent to which issuing a data disruption warrant would
1
have helped reduce or avoid the risk;
2
(c) the extent to which law enforcement officers could have used
3
alternative methods to help reduce or avoid the risk;
4
(d) how much the use of alternative methods could have helped
5
reduce or avoid the risk;
6
(e) how much the use of alternative methods would have
7
prejudiced the safety of the person or property because of
8
delay or for another reason;
9
(f) whether or not it was practicable in the circumstances to
10
apply for a data disruption warrant.
11
23 After section 35A
12
Insert:
13
35B Judge or nominated AAT member may approve giving of an
14
emergency authorisation for disruption of data held in a
15
computer
16
(1) After considering an application for approval of the giving of an
17
emergency authorisation in response to an application under
18
subsection 28(1C), the eligible Judge or nominated AAT member
19
may give the approval if satisfied that there were reasonable
20
grounds to suspect that:
21
(a) there was a risk of serious violence to a person or substantial
22
damage to property; and
23
(b) disruption of data held in the target computer mentioned in
24
that subsection may have helped reduce the risk; and
25
(c) it was not practicable in the circumstances to apply for a data
26
disruption warrant.
27
(2) If, under subsection (1), the eligible Judge or nominated AAT
28
member approves the giving of an emergency authorisation, the
29
eligible Judge or nominated AAT member may:
30
(a) unless paragraph (b) applies--issue a data disruption warrant
31
relating to the continued access to, and disruption of, data
32
held in the relevant target computer as if the application for
33
the approval were an application for a data disruption warrant
34
under Division 5 of Part 2; or
35
Schedule 1
Data disruption
20
Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020
No. , 2020
(b) if the eligible Judge or nominated AAT member is satisfied
1
that, since the application for the emergency authorisation,
2
the activity that required access to, and disruption of, data
3
held in the relevant target computer has ceased--order that
4
access to, and disruption of, data held in that computer cease.
5
(3) If, under subsection (1), the eligible Judge or nominated AAT
6
member does not approve the giving of an emergency
7
authorisation, the eligible Judge or nominated AAT member may:
8
(a) order that access to, and disruption of, data held in the
9
relevant target computer cease; or
10
(b) if the eligible Judge or nominated AAT member is of the
11
view that, although the situation did not warrant the
12
emergency authorisation at the time that authorisation was
13
given, the use of a data disruption warrant under Division 5
14
of Part 2 is currently justified--issue a data disruption
15
warrant relating to the subsequent access to, and disruption
16
of, such data as if the application for the approval were an
17
application for a data disruption warrant under Division 5 of
18
Part 2.
19
(4) In any case, the eligible Judge or nominated AAT member may
20
order that any information obtained from or relating to the exercise
21
of powers under the emergency authorisation, or any record of that
22
information, be dealt with in a manner specified in the order, so
23
long as the manner does not involve the destruction of that
24
information.
25
24 Section 36
26
Omit "or 35A", substitute ", 35A or 35B".
27
25 At the end of Part 3
28
Add:
29
36A Relationship of this Part to parliamentary privileges and
30
immunities
31
To avoid doubt, this Part does not affect the law relating to the
32
powers, privileges and immunities of any of the following:
33
(a) each House of the Parliament;
34
Data disruption
Schedule 1
No. , 2020
Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020
21
(b) the members of each House of the Parliament;
1
(c) the committees of each House of the Parliament and joint
2
committees of both Houses of the Parliament.
3
26 Section 41 (paragraph (b) of the definition of
appropriate
4
consenting official
)
5
Omit "or 43B", substitute ", 43B, 43C or 43D".
6
27 At the end of Part 5
7
Add:
8
43C Extraterritorial operation of data disruption warrants
9
(1) If, before the issue of a data disruption warrant, it becomes
10
apparent to the applicant for the warrant that there will be a need
11
for access to, and disruption of, data held in a computer:
12
(a) in a foreign country; or
13
(b) on a vessel or aircraft that is registered under the law of a
14
foreign country and that is in or above waters beyond the
15
outer limits of the territorial sea of Australia;
16
the eligible Judge or nominated AAT member considering the
17
application for the warrant must not permit the warrant to authorise
18
that access and disruption unless the eligible Judge or nominated
19
AAT member is satisfied that the access and disruption has been
20
agreed to by an appropriate consenting official of the foreign
21
country.
22
(2) If:
23
(a) an application is made under section 33 by an appropriate
24
authorising officer for approval of the giving of an
25
emergency authorisation; and
26
(b) the emergency authorisation was given in response to an
27
application under subsection 28(1C); and
28
(c) before the completion of consideration of that section 33
29
application, it becomes apparent to the applicant that there
30
will be a need for access to, and disruption of, data held in a
31
computer:
32
(i) in a foreign country; or
33
Schedule 1
Data disruption
22
Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020
No. , 2020
(ii) on a vessel or aircraft that is registered under the law of
1
a foreign country and that is in or above waters beyond
2
the outer limits of the territorial sea of Australia;
3
the eligible Judge or nominated AAT member to whom the
4
section 33 application was made must not permit any data
5
disruption warrant issued on consideration of that section 33
6
application to authorise that access and disruption unless the
7
eligible Judge or nominated AAT member is satisfied that the
8
access and disruption has been agreed to by an appropriate
9
consenting official of the foreign country.
10
(3) If:
11
(a) a data disruption warrant has been issued; and
12
(b) after the issue of the warrant, it becomes apparent to the law
13
enforcement officer primarily responsible for executing the
14
warrant that there will be a need for access to, and disruption
15
of, data held in a computer that is:
16
(i) in a foreign country; or
17
(ii) on a vessel or aircraft that is registered under the law of
18
a foreign country and that is in or above waters beyond
19
the outer limits of the territorial sea of Australia;
20
the warrant is taken to permit that access and disruption if, and
21
only if, the access and or disruption has been agreed to by an
22
appropriate consenting official of the foreign country.
23
(4) Subsections (1), (2) and (3) do not apply to a data disruption
24
warrant authorising access to, and disruption of, data if:
25
(a) the person, or each of the persons, responsible for executing
26
the warrant will be physically present in Australia; and
27
(b) the location where the data is held is unknown or cannot
28
reasonably be determined.
29
(5) Despite subsections (1), (2) and (3), if:
30
(a) a vessel that is registered under the law of a foreign country
31
is in waters beyond the outer limits of the territorial sea of
32
Australia but not beyond the outer limits of the contiguous
33
zone of Australia; and
34
(b) the relevant offences in respect of which it becomes apparent
35
that access to, and disruption of, data held in a computer on
36
Data disruption
Schedule 1
No. , 2020
Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020
23
the vessel will be required are offences relating to the
1
customs, fiscal, immigration or sanitary laws of Australia;
2
there is no requirement for the agreement of an appropriate
3
consenting official of the foreign country concerned in relation to
4
that access or disruption while the vessel is in such waters.
5
(6) Despite subsections (1), (2) and (3), if:
6
(a) a vessel that is registered under the law of a foreign country
7
is in waters beyond the outer limits of the territorial sea of
8
Australia but not beyond the outer limits of the Australian
9
fishing zone; and
10
(b) the relevant offences in respect of which it becomes apparent
11
that access to, and disruption of, data held in a computer on
12
the vessel will be required are offences against section 100,
13
100A, 100B, 101, 101A or 101AA of the
Fisheries
14
Management Act 1991
or section 46A, 46B, 46C, 46D, 49A
15
or 51A of the
Torres Strait Fisheries Act 1984
;
16
there is no requirement for the agreement of an appropriate
17
consenting official of the foreign country concerned in relation to
18
that access or disruption while the vessel is in those waters.
19
(7) As soon as practicable after the commencement of access to, and
20
disruption of, data held in a computer under the authority of a data
21
disruption warrant in circumstances where consent to that access or
22
disruption is required:
23
(a) in a foreign country; or
24
(b) on a vessel or aircraft that is registered under the law of a
25
foreign country;
26
the chief officer of the law enforcement agency to which the law
27
enforcement officer who applied for the warrant belongs or is
28
seconded must give the Minister evidence in writing that the access
29
and disruption has been agreed to by an appropriate consenting
30
official of the foreign country.
31
(8) An instrument providing evidence of the kind referred to in
32
subsection (7) is not a legislative instrument.
33
(9) If a vessel or aircraft that is registered under the laws of a foreign
34
country is in or above the territorial sea of another foreign country,
35
subsections (1), (2) and (3) have effect as if the reference to an
36
appropriate consenting official of the foreign country were a
37
Schedule 1
Data disruption
24
Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020
No. , 2020
reference to an appropriate consenting official of each foreign
1
country concerned.
2
(10) For the avoidance of doubt, there is no requirement for the
3
agreement of an appropriate consenting official of the foreign
4
country to the access to, and disruption of, data held in a computer
5
under the authority of a data disruption warrant on a vessel or
6
aircraft of a foreign country that is in Australia or in or above
7
waters within the outer limits of the territorial sea of Australia.
8
43D Evidence obtained from extraterritorial computer access not to
9
be tendered in evidence unless court is satisfied that the
10
evidence was properly obtained
11
Evidence obtained from access to, or disruption of, data held in a
12
computer undertaken in a foreign country in accordance with
13
subsection 43C(1), (2) or (3) in relation to a relevant offence
14
cannot be tendered in evidence to a court in any proceedings
15
relating to the relevant offence unless the court is satisfied that the
16
access or disruption was agreed to by an appropriate consenting
17
official of the foreign country.
18
28 Subsection 44(1) (after paragraph (aa) of the definition of
19
protected information
)
20
Insert:
21
(ab) any information (other than data disruption intercept
22
information) obtained from access to, or disruption of, data
23
under:
24
(i) a data disruption warrant; or
25
(ii) an emergency authorisation for disruption of data held
26
in a computer; or
27
29 Subsection 44(1) (subparagraph (d)(iv) of the definition of
28
protected information
)
29
After "obtained", insert ", purportedly under a computer access warrant
30
or an emergency authorisation for access to data held in a computer,".
31
Data disruption
Schedule 1
No. , 2020
Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020
25
30 Subsection 44(1) (at the end of subparagraph (d)(iv) of the
1
definition of
protected information
)
2
Add "or".
3
31 Subsection 44(1) (after subparagraph (d)(iv) of the
4
definition of
protected information
)
5
Insert:
6
(v) in a case where the information was obtained,
7
purportedly under a data disruption warrant or an
8
emergency authorisation for disruption of data held in a
9
computer, through access to, or disruption of, data held
10
in a computer in a foreign country, or on a vessel or
11
aircraft that is registered under the law of a foreign
12
country and that is in or above waters beyond the outer
13
limit of Australia's territorial sea--without the
14
agreement of the appropriate consenting official of that
15
foreign country, and of any other foreign country,
16
whose agreement is required under section 43C;
17
32 Subsection 44(1) (paragraph (d) of the definition of
18
protected information
)
19
Omit "such".
20
33 Subsection 44(1) (note to the definition of
protected
21
information
)
22
Omit "Note", substitute "Note 1".
23
34 Subsection 44(1) (at the end of the definition of
protected
24
information
)
25
Add:
26
Note 2:
For protection of data disruption intercept information, see Part 2-6 of
27
the
Telecommunications (Interception and Access) Act 1979
.
28
35 After subsection 45(6)
29
Insert:
30
(6A) Protected information may be communicated by an Ombudsman
31
official to an IGIS official for the purposes of the IGIS official
32
Schedule 1
Data disruption
26
Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020
No. , 2020
exercising powers, or performing functions or duties, as an IGIS
1
official.
2
36 Paragraph 46(1)(a)
3
Omit "or general computer access intercept information", substitute ",
4
general computer access intercept information or data disruption
5
intercept information".
6
37 At the end of paragraph 46(2)(ab)
7
Add "or".
8
38 After paragraph 46(2)(ab)
9
Insert:
10
(ac) disrupting data held in a computer;
11
39 After section 47A
12
Insert:
13
47B Protection of data disruption technologies and methods
14
(1) In a proceeding, a person may object to the disclosure of
15
information on the ground that the information, if disclosed, could
16
reasonably be expected to reveal details of data disruption
17
technologies or methods.
18
(2) If the person conducting or presiding over the proceeding is
19
satisfied that the ground of objection is made out, the person may
20
order that the person who has the information not be required to
21
disclose it in the proceeding.
22
(3) In determining whether or not to make an order under
23
subsection (2), the person conducting or presiding over the
24
proceeding must take into account whether disclosure of the
25
information:
26
(a) is necessary for the fair trial of the defendant; or
27
(b) is in the public interest.
28
(4) Subsection (2) does not affect a provision of another law under
29
which a law enforcement officer cannot be compelled to disclose
30
information or make statements in relation to the information.
31
Data disruption
Schedule 1
No. , 2020
Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020
27
(5) If the person conducting or presiding over a proceeding is satisfied
1
that publication of any information disclosed in the proceeding
2
could reasonably be expected to reveal details of data disruption
3
technologies or methods, the person must make any orders
4
prohibiting or restricting publication of the information that the
5
person considers necessary to ensure that those details are not
6
revealed.
7
(6) Subsection (5) does not apply to the extent that the person
8
conducting or presiding over the proceeding considers that the
9
interests of justice require otherwise.
10
(7) In this section:
11
data disruption technologies or methods
means technologies or
12
methods relating to the use of:
13
(a) a computer; or
14
(b) a telecommunications facility operated or provided by the
15
Commonwealth or a carrier; or
16
(c) any other electronic equipment; or
17
(d) a data storage device;
18
for either or both of the following purposes:
19
(e) disrupting data held in the computer;
20
(f) obtaining access to data held in the computer;
21
where the technologies or methods have been, or are being,
22
deployed in giving effect to:
23
(g) a data disruption warrant; or
24
(h) an emergency authorisation for disruption of data held in a
25
computer.
26
proceeding
includes a proceeding before a court, tribunal or Royal
27
Commission.
28
40 After subsection 49(2C)
29
Insert:
30
(2D) In the case of:
31
(a) a data disruption warrant for disruption of data held in a
32
computer; or
33
Schedule 1
Data disruption
28
Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020
No. , 2020
(b) an emergency authorisation for disruption of data held in a
1
computer;
2
the report must:
3
(c) state whether the warrant or authorisation was executed; and
4
(d) if so:
5
(i) state the name of the person primarily responsible for
6
the execution of the warrant or authorisation; and
7
(ii) state the name of each person involved in accessing or
8
disrupting data under the warrant or authorisation; and
9
(iii) state the period during which the data was accessed or
10
disrupted; and
11
(iv) state the name, if known, of any person whose data was
12
accessed or disrupted; and
13
(v) give details of any premises at which the computer was
14
located; and
15
(vi) give details of the benefit of the use of the warrant or
16
authorisation in frustrating criminal activity; and
17
(vii) give details of the access to, and disruption of, data
18
under the warrant or authorisation; and
19
(viii) give details of the compliance with the conditions (if
20
any) to which the warrant or authorisation was subject;
21
and
22
(e) if the warrant or authorisation was extended or varied, state:
23
(i) the number of extensions or variations; and
24
(ii) the reasons for them.
25
41 After section 49B
26
Insert:
27
49C Notification to Ombudsman of things done under a data
28
disruption warrant
29
If:
30
(a) a data disruption warrant was issued in response to an
31
application made by a law enforcement officer of a law
32
enforcement agency; and
33
(b) a thing mentioned in subsection 27KE(2) was done under the
34
warrant;
35
Data disruption
Schedule 1
No. , 2020
Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020
29
the chief officer of the law enforcement agency must:
1
(c) notify the Ombudsman:
2
(i) that the warrant was issued; and
3
(ii) of the fact that the thing was done under the warrant;
4
and
5
(d) do so within 7 days after the thing was done.
6
42 After paragraph 50(1)(ea)
7
Insert:
8
(eb) if the agency is the Australian Federal Police or the
9
Australian Crime Commission--the kinds of offences
10
targeted by data disruption warrants issued during that year
11
in response to applications made by or on behalf of law
12
enforcement officers of the agency; and
13
43 Paragraph 51(b)
14
Omit "or 27G(4)", substitute ", 27G(4) or 27KG(4)".
15
44 At the end of subsection 62(1)
16
Add:
17
; or (d) anything done by the law enforcement officer in connection
18
with:
19
(i) the communication by a person to another person of; or
20
(ii) the making use of; or
21
(iii) the making of a record of; or
22
(iv) the custody of a record of;
23
information obtained from access to, or disruption of, data
24
under:
25
(v) a data disruption warrant; or
26
(vi) an emergency authorisation for disruption of data held
27
in a computer.
28
45 Subsection 62(3)
29
Omit "or 35A", substitute ", 35A or 35B".
30
46 Paragraph 64(2)(a)
31
After "access to", insert ", or disrupting,".
32
Schedule 1
Data disruption
30
Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020
No. , 2020
47 After section 64A
1
Insert:
2
64B Person with knowledge of a computer or a computer system to
3
assist disruption of data etc.
4
(1) A law enforcement officer of the Australian Federal Police or the
5
Australian Crime Commission (or another person on the officer's
6
behalf) may apply to an eligible Judge or to a nominated AAT
7
member for an order (the
assistance order
) requiring a specified
8
person to provide any information or assistance that is reasonable
9
and necessary to allow the law enforcement officer to do one or
10
more of the following:
11
(a) disrupt data held in a computer that is the subject of:
12
(i) a data disruption warrant; or
13
(ii) an emergency authorisation given in response to an
14
application under subsection 28(1C);
15
(b) access data that is held in the computer described in
16
paragraph (a);
17
(c) copy data held in the computer described in paragraph (a) to
18
a data storage device;
19
(d) convert into documentary form or another form intelligible to
20
a law enforcement officer:
21
(i) data held in the computer described in paragraph (a); or
22
(ii) data held in a data storage device to which the data was
23
copied as described in paragraph (c).
24
Grant of assistance order
25
(2) The eligible Judge or nominated AAT member may grant the
26
assistance order if the eligible Judge or nominated AAT member is
27
satisfied that:
28
(a) in a case where the computer is the subject of a data
29
disruption warrant--disruption of data held in the computer
30
is:
31
(i) likely to substantially assist in frustrating the
32
commission of the offences that are covered by the
33
warrant (within the meaning of section 27KE); and
34
Data disruption
Schedule 1
No. , 2020
Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020
31
(ii) justifiable and proportionate, having regard to those
1
offences; and
2
(b) in a case where the computer is the subject of an emergency
3
authorisation given in response to an application under
4
subsection 28(1C):
5
(i) there is an imminent risk of serious violence to a person
6
or substantial damage to property; and
7
(ii) disruption of data held in the computer is immediately
8
necessary for the purpose of dealing with the risk; and
9
(c) in a case where:
10
(i) the computer is the subject of a data disruption warrant;
11
and
12
(ii) the assistance order requires the specified person to
13
provide information or assistance to allow the law
14
enforcement officer to do a thing referred to in
15
paragraph (1)(b), (c) or (d) in relation to data;
16
doing the thing is for the purpose of determining whether the
17
data is covered by the warrant (within the meaning of
18
section 27KE); and
19
(d) in a case where:
20
(i) the computer is the subject of an emergency
21
authorisation given in response to an application under
22
subsection 28(1C); and
23
(ii) the assistance order requires the specified person to
24
provide information or assistance to allow the law
25
enforcement officer to do a thing referred to in
26
paragraph (1)(b), (c) or (d) in relation to data;
27
doing the thing is for the purpose of determining whether
28
disruption of the data is immediately necessary for the
29
purpose of dealing with an imminent risk of serious violence
30
to a person or substantial damage to property; and
31
(e) the specified person is:
32
(i) in a case where the computer is the subject of a data
33
disruption warrant--reasonably suspected of having
34
committed any of the relevant offences referred to in
35
paragraph 27KA(1)(c); or
36
(ii) in a case where the computer is the subject of
37
emergency authorisation--reasonably suspected of
38
Schedule 1
Data disruption
32
Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020
No. , 2020
having committed the relevant offence referred to in
1
subsection 28(1C); or
2
(iii) the owner or lessee of the computer; or
3
(iv) an employee of the owner or lessee of the computer; or
4
(v) a person engaged under a contract for services by the
5
owner or lessee of the computer; or
6
(vi) a person who uses or has used the computer; or
7
(vii) a person who is or was a system administrator for the
8
system including the computer; and
9
(f) the specified person has relevant knowledge of:
10
(i) the computer or a computer network of which the
11
computer forms or formed a part; or
12
(ii) measures applied to protect data held in the computer.
13
Offence
14
(3) A person commits an offence if:
15
(a) the person is subject to an order under this section; and
16
(b) the person is capable of complying with a requirement in the
17
order; and
18
(c) the person omits to do an act; and
19
(d) the omission contravenes the requirement.
20
Penalty for contravention of this subsection: Imprisonment for 10
21
years or 600 penalty units, or both.
22
48 Paragraph 65(1A)(a)
23
After "computer access warrant", insert ", data disruption warrant".
24
49 After subsection 65(1A)
25
Insert:
26
(1B) If:
27
(a) data is disrupted purportedly under:
28
(i) a data disruption warrant; or
29
(ii) an emergency authorisation for disruption of data held
30
in a computer; and
31
(b) there is a defect or irregularity in relation to the warrant or
32
emergency authorisation; and
33
Data disruption
Schedule 1
No. , 2020
Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020
33
(c) but for that defect or irregularity, the warrant or emergency
1
authorisation would be a sufficient authority for disrupting
2
the data;
3
disruption of the data is taken to be as valid as if the warrant or
4
emergency authorisation did not have that defect or irregularity.
5
50 Subsection 65(2)
6
Omit "or (1A)", substitute ", (1A) or (1B)".
7
51 After section 65B
8
Insert:
9
65C Evidence obtained from access to, or disruption of, data under
10
a data disruption warrant etc.
11
This Act does not prevent evidence obtained from access to, or
12
disruption of, data under:
13
(a) a data disruption warrant; or
14
(b) an emergency authorisation for disruption of data held in a
15
computer;
16
from being admissible as evidence in a proceeding relating to a
17
relevant offence.
18
Telecommunications (Interception and Access) Act 1979
19
52 Subsection 5(1)
20
Insert:
21
data disruption intercept information
means information obtained
22
under a data disruption warrant by intercepting a communication
23
passing over a telecommunications system.
24
data disruption warrant
has the same meaning as in the
25
Surveillance Devices Act 2004
.
26
53 Subsection 5(1) (at the end of the definition of
restricted
27
record
)
28
Add "or a record of data disruption intercept information".
29
Schedule 1
Data disruption
34
Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020
No. , 2020
54 Subsection 5(1) (paragraph (b) of the definition of
warrant
)
1
After "general computer access warrant", insert ", a data disruption
2
warrant".
3
55 Paragraph 7(2)(bb)
4
After "27E(7)", insert "or 27KE(9)".
5
56 After section 63AC
6
Insert:
7
63AD Dealing in data disruption intercept information etc.
8
(1) A person may, for the purposes of doing a thing authorised by a
9
data disruption warrant:
10
(a) communicate data disruption intercept information to another
11
person; or
12
(b) make use of data disruption intercept information; or
13
(c) make a record of data disruption intercept information; or
14
(d) give data disruption intercept information in evidence in a
15
proceeding.
16
(2) A person may:
17
(a) communicate data disruption intercept information to another
18
person; or
19
(b) make use of data disruption intercept information; or
20
(c) make a record of data disruption intercept information;
21
if the information relates, or appears to relate, to the involvement,
22
or likely involvement, of a person in one or more of the following
23
activities:
24
(d) activities that present a significant risk to a person's safety;
25
(e) acting for, or on behalf of, a foreign power (within the
26
meaning of the
Australian Security Intelligence Organisation
27
Act 1979
);
28
(f) activities that are, or are likely to be, a threat to security;
29
(g) activities that pose a risk, or are likely to pose a risk, to the
30
operational security (within the meaning of the
Intelligence
31
Services Act 2001
) of ASIS (within the meaning of that Act);
32
Data disruption
Schedule 1
No. , 2020
Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020
35
(h) activities that pose a risk, or are likely to pose a risk, to the
1
operational security (within the ordinary meaning of that
2
expression) of the Organisation or of AGO or ASD (within
3
the meanings of the
Intelligence Services Act 2001
);
4
(i) activities related to the proliferation of weapons of mass
5
destruction or the movement of goods listed from time to
6
time in the Defence and Strategic Goods List (within the
7
meaning of regulation 13E of the
Customs (Prohibited
8
Exports) Regulations 1958
);
9
(j) activities related to a contravention, or an alleged
10
contravention, by a person of a UN sanction enforcement law
11
(within the meaning of the
Charter of the United Nations Act
12
1945
).
13
(3) A person may, in connection with:
14
(a) the performance by an Ombudsman official of the
15
Ombudsman official's functions or duties; or
16
(b) the exercise by an Ombudsman official of the Ombudsman
17
official's powers;
18
communicate to the Ombudsman official, or make use of, or make
19
a record of, data disruption intercept information.
20
(4) An Ombudsman official may, in connection with:
21
(a) the performance by the Ombudsman official of the
22
Ombudsman official's functions or duties; or
23
(b) the exercise by the Ombudsman official of the Ombudsman
24
official's powers;
25
communicate to another person, or make use of, or make a record
26
of, data disruption intercept information.
27
(5) A person may, in connection with:
28
(a) the performance by an IGIS official of the IGIS official's
29
functions or duties; or
30
(b) the exercise by an IGIS official of the IGIS official's powers;
31
communicate to the IGIS official, or make use of, or make a record
32
of, data disruption intercept information.
33
(6) An IGIS official may, in connection with:
34
(a) the performance by the IGIS official of the IGIS official's
35
functions or duties; or
36
Schedule 1
Data disruption
36
Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020
No. , 2020
(b) the exercise by the IGIS official of the IGIS official's
1
powers;
2
communicate to another person, or make use of, or make a record
3
of, data disruption intercept information.
4
(7) If:
5
(a) information was obtained by intercepting a communication
6
passing over a telecommunications system; and
7
(b) the interception was purportedly for the purposes of doing a
8
thing specified in a data disruption warrant; and
9
(c) the interception was not authorised by the data disruption
10
warrant;
11
then:
12
(d) a person may, in connection with:
13
(i) the performance by an Ombudsman official of the
14
Ombudsman official's functions or duties; or
15
(ii) the exercise by an Ombudsman official of the
16
Ombudsman official's powers;
17
communicate to the Ombudsman official, or make use of, or
18
make a record of, that information; and
19
(e) an Ombudsman official may, in connection with:
20
(i) the performance by the Ombudsman official of the
21
Ombudsman official's functions or duties; or
22
(ii) the exercise by the Ombudsman official of the
23
Ombudsman official's powers;
24
communicate to another person, or make use of, or make a
25
record of, that information; and
26
(f) a person may, in connection with:
27
(i) the performance by an IGIS official of the IGIS
28
official's functions or duties; or
29
(ii) the exercise by an IGIS official of the IGIS official's
30
powers;
31
communicate to the IGIS official, or make use of, or make a
32
record of, that information; and
33
(g) an IGIS official may, in connection with:
34
(i) the performance by the IGIS official of the IGIS
35
official's functions or duties; or
36
Data disruption
Schedule 1
No. , 2020
Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020
37
(ii) the exercise by the IGIS official of the IGIS official's
1
powers;
2
communicate to another person, or make use of, or make a
3
record of, that information.
4
(8) Despite subsection 13.3(3) of the
Criminal Code
, in a prosecution
5
for an offence against section 63 of this Act, an Ombudsman
6
official or an IGIS official does not bear an evidential burden in
7
relation to the matters in subsection (4), (6) or (7) of this section.
8
57 Paragraph 67(1)(a)
9
Omit "or general computer access intercept information", substitute ",
10
general computer access intercept information or data disruption
11
intercept information".
12
58 Section 68
13
After "general computer access intercept information", insert "or data
14
disruption intercept information".
15
59 Subsection 74(1)
16
After "general computer access intercept information", insert ", data
17
disruption intercept information".
18
60 Subsection 75(1)
19
After "general computer access warrant", insert ", a data disruption
20
warrant".
21
61 Paragraphs 77(1)(a) and (b)
22
After "63AC,", insert "63AD,".
23
62 After paragraph 108(2)(cb)
24
Insert:
25
(cc) accessing a stored communication under a data disruption
26
warrant; or
27
Schedule 2
Network activity warrants
Part 1
Main amendments
38
Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020
No. , 2020
Schedule 2--Network activity warrants
1
Part 1--Main amendments
2
Surveillance Devices Act 2004
3
1 After paragraph 3(aab)
4
Insert:
5
(aac) to establish procedures for the chief officer of the Australian
6
Federal Police or the Australian Crime Commission to obtain
7
warrants that:
8
(i) authorise access to data held in computers; and
9
(ii) will substantially assist in the collection of intelligence
10
that relates to criminal networks of individuals; and
11
2 After subsection 4(4B)
12
Insert:
13
(4C) For the avoidance of doubt, it is intended that a warrant may be
14
issued under this Act:
15
(a) for access to data held in a computer; and
16
(b) in relation to the collection of intelligence that relates to a
17
criminal network of individuals.
18
3 Subsection 6(1)
19
Insert:
20
criminal network of individuals
has the meaning given by
21
section 7A.
22
electronically linked group of individuals
means a group of 2 or
23
more individuals, where each individual in the group does, or is
24
likely to do, either or both of the following things:
25
(a) use the same electronic service as at least one other
26
individual in the group;
27
(b) communicate with at least one other individual in the group
28
by electronic communication.
29
electronic communication
means a communication of information:
30
Network activity warrants
Schedule 2
Main amendments
Part 1
No. , 2020
Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020
39
(a) whether in the form of text; or
1
(b) whether in the form of data; or
2
(c) whether in the form of speech, music or other sounds; or
3
(d) whether in the form of visual images (animated or
4
otherwise); or
5
(e) whether in any other form; or
6
(f) whether in any combination of forms;
7
by means of guided and/or unguided electromagnetic energy.
8
electronic service
has the same meaning as in Part 15 of the
9
Telecommunications Act 1997
.
10
network activity warrant
means a warrant issued under
11
section 27KM.
12
network activity warrant intercept information
has the same
13
meaning as in the
Telecommunications (Interception and Access)
14
Act 1979
.
15
protected network activity warrant information
has the meaning
16
given by section 44A.
17
4 Subsection 6(1) (definition of
remote application
)
18
Omit "or 27KB", substitute, ", 27KB or 27KL".
19
5 Subsection 6(1) (definition of
unsworn application
)
20
Omit "or 27KA(4) and (5)", substitute ", 27KA(4) and (5) or 27KK(5)
21
and (6)".
22
6 Subsection 6(1) (at the end of the definition of
warrant
)
23
Add:
24
; or (e) a network activity warrant.
25
7 At the end of subsection 10(1)
26
Add:
27
; (e) a network activity warrant.
28
8 After section 7
29
Insert:
30
Schedule 2
Network activity warrants
Part 1
Main amendments
40
Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020
No. , 2020
7A Criminal network of individuals
1
(1) For the purposes of this Act, a
criminal network of individuals
is
2
an electronically linked group of individuals, where one or more
3
individuals in the group:
4
(a) have engaged, are engaging, or are likely to engage, in
5
conduct that constitutes a relevant offence; or
6
(b) have facilitated, are facilitating, or are likely to facilitate, the
7
engagement, by another person (whether or not an individual
8
in the group), in conduct that constitutes a relevant offence.
9
(2) For the purposes of subsection (1), it is immaterial whether:
10
(a) the identities of the individuals in the group can be
11
ascertained; or
12
(b) the details of the relevant offences can be ascertained; or
13
(c) there are likely to be changes, from time to time, in the
14
composition of the group.
15
9 At the end of Part 2
16
Add:
17
Division 6--Network activity warrants
18
27KK Application for network activity warrant
19
(1) The chief officer of the Australian Federal Police or the Australian
20
Crime Commission may apply for the issue of a network activity
21
warrant if the chief officer suspects on reasonable grounds that:
22
(a) a group of individuals is a criminal network of individuals;
23
and
24
(b) access to data held in a computer (the
target computer
) that
25
is, from time to time, used, or likely to be used, by any of the
26
individuals in the group will substantially assist in the
27
collection of intelligence that:
28
(i) relates to the group or to any of the individuals in the
29
group; and
30
(ii) is relevant to the prevention, detection or frustration of
31
one or more kinds of relevant offences.
32
(2) For the purposes of subsection (1), it is immaterial whether:
33
Network activity warrants
Schedule 2
Main amendments
Part 1
No. , 2020
Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020
41
(a) the identities of the individuals in the group can be
1
ascertained; or
2
(b) the target computer can be identified; or
3
(c) the location of the target computer can be identified; or
4
(d) there are likely to be changes, from time to time, in the
5
composition of the group.
6
Procedure for making applications
7
(3) An application under subsection (1) may be made to an eligible
8
Judge or to a nominated AAT member.
9
(4) An application:
10
(a) must specify:
11
(i) the name of the applicant; and
12
(ii) the nature and duration of the warrant sought; and
13
(b) subject to this section, must be supported by an affidavit
14
setting out the grounds on which the warrant is sought.
15
Unsworn applications
16
(5) If the chief officer of the Australian Federal Police or the
17
Australian Crime Commission believes that:
18
(a) immediate access to data held in the target computer referred
19
to in subsection (1) will substantially assist as described in
20
paragraph (1)(b); and
21
(b) it is impracticable for an affidavit to be prepared or sworn
22
before an application for a warrant is made by the chief
23
officer;
24
an application by the chief officer for a warrant under
25
subsection (1) may be made before an affidavit is prepared or
26
sworn.
27
(6) If subsection (5) applies, the applicant must:
28
(a) provide as much information as the eligible Judge or
29
nominated AAT member considers is reasonably practicable
30
in the circumstances; and
31
(b) not later than 72 hours after the making of the application,
32
send a duly sworn affidavit to the eligible Judge or
33
Schedule 2
Network activity warrants
Part 1
Main amendments
42
Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020
No. , 2020
nominated AAT member, whether or not a warrant has been
1
issued.
2
Target computer
3
(7) The target computer referred to in subsection (1):
4
(a) must be a computer that is, from time to time, used or likely
5
to be used by an individual (whose identity may or may not
6
be known); and
7
(b) may be one or more of the following:
8
(i) a particular computer;
9
(ii) a computer that is, from time to time, on particular
10
premises.
11
27KL Remote application
12
(1) If the chief officer of the Australian Federal Police or the
13
Australian Crime Commission believes that it is impracticable for
14
an application for a network activity warrant to be made in person,
15
the application may be made under section 27KK by telephone,
16
fax, email or any other means of communication.
17
(2) If transmission by fax is available and an affidavit has been
18
prepared, the person applying must transmit a copy of the affidavit,
19
whether sworn or unsworn, to the eligible Judge or to the
20
nominated AAT member who is to determine the application.
21
27KM Determining the application
22
(1) An eligible Judge or a nominated AAT member may issue a
23
network activity warrant if satisfied:
24
(a) that there are reasonable grounds for the suspicion founding
25
the application for the warrant; and
26
(b) in the case of an unsworn application--that it would have
27
been impracticable for an affidavit to have been sworn or
28
prepared before the application was made; and
29
(c) in the case of a remote application--that it would have been
30
impracticable for the application to have been made in
31
person.
32
Network activity warrants
Schedule 2
Main amendments
Part 1
No. , 2020
Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020
43
(2) In determining whether a network activity warrant should be
1
issued, the eligible Judge or nominated AAT member must have
2
regard to:
3
(a) the nature and gravity of the conduct constituting the kinds of
4
offences in relation to which information will be obtained
5
under the warrant; and
6
(b) the extent to which access to data under the warrant will
7
assist in the collection of intelligence that:
8
(i) relates to the group referred to in paragraph 27KK(1)(a)
9
or to any of the individuals in the group; and
10
(ii) is relevant to the prevention, detection or frustration of
11
one or more kinds of relevant offences; and
12
(c) the likely intelligence value of any information sought to be
13
obtained; and
14
(d) whether the things authorised by the warrant are
15
proportionate to the likely intelligence value of any
16
information sought to be obtained; and
17
(e) the existence of any alternative, or less intrusive, means of
18
obtaining the information sought to be obtained; and
19
(f) the extent to which the execution of the warrant is likely to
20
result in access to data of persons who are lawfully using a
21
computer; and
22
(g) any previous warrant sought or issued under this Division in
23
relation to the group referred to in paragraph 27KK(1)(a).
24
(3) If a network activity warrant is issued in response to an application
25
made by the chief officer of the Australian Federal Police or the
26
Australian Crime Commission, the chief officer must:
27
(a) notify the issue of the warrant to the Inspector-General of
28
Intelligence and Security; and
29
(b) do so within 7 days after the issue of the warrant.
30
27KN What must a network activity warrant contain?
31
(1) A network activity warrant must:
32
(a) state that the eligible Judge or nominated AAT member
33
issuing the warrant is satisfied of the matters referred to in
34
subsection 27KM(1) and has had regard to the matters
35
referred to in subsection 27KM(2); and
36
Schedule 2
Network activity warrants
Part 1
Main amendments
44
Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020
No. , 2020
(b) specify:
1
(i) the name of the applicant; and
2
(ii) the kinds of relevant offences in respect of which the
3
warrant is issued; and
4
(iii) the criminal network of individuals to which the warrant
5
relates; and
6
(iv) the date the warrant is issued; and
7
(v) the period during which the warrant is in force (see
8
subsection (2)); and
9
(vi) the name of the law enforcement officer primarily
10
responsible for executing the warrant; and
11
(vii) any conditions subject to which things may be done
12
under the warrant; and
13
(c) if the warrant authorises the use of a surveillance device--
14
specify:
15
(i) the surveillance device authorised to be used; and
16
(ii) the purpose or purposes for which the surveillance
17
device may be used under the warrant.
18
(2) A warrant may only be issued for a period of no more than 90
19
days.
20
Note:
The access to data held in the target computer pursuant to a warrant
21
may be discontinued earlier--see section 27KS.
22
(3) A warrant must be signed by the person issuing it and include the
23
person's name.
24
(4) For the purposes of subparagraph (1)(b)(iii), a criminal network of
25
individuals may be specified by identifying one or more matters or
26
things that are sufficient to identify the criminal network of
27
individuals.
28
(5) As soon as practicable after completing and signing a warrant
29
issued on a remote application, the person issuing it must:
30
(a) inform the applicant of:
31
(i) the terms of the warrant; and
32
(ii) the date on which, and the time at which, the warrant
33
was issued; and
34
(b) give the warrant to the applicant while retaining a copy of the
35
warrant for the person's own record.
36
Network activity warrants
Schedule 2
Main amendments
Part 1
No. , 2020
Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020
45
27KP What a network activity warrant authorises
1
(1) A network activity warrant must authorise the doing of specified
2
things (subject to any restrictions or conditions specified in the
3
warrant) in relation to the relevant target computer.
4
(2) The things that may be specified are any of the following that the
5
eligible Judge or nominated AAT member considers appropriate in
6
the circumstances:
7
(a) entering specified premises for the purposes of doing the
8
things mentioned in this subsection;
9
(b) entering any premises for the purposes of gaining entry to, or
10
exiting, the specified premises;
11
(c) using:
12
(i) the target computer; or
13
(ii) a telecommunications facility operated or provided by
14
the Commonwealth or a carrier; or
15
(iii) any other electronic equipment; or
16
(iv) a data storage device;
17
for the purpose of obtaining access to data (the
relevant data
)
18
that is held in the target computer at any time while the
19
warrant is in force, in order to determine whether the relevant
20
data is covered by the warrant;
21
(d) if necessary to achieve the purpose mentioned in
22
paragraph (c)--adding, copying, deleting or altering other
23
data in the target computer;
24
(e) if, having regard to other methods (if any) of obtaining
25
access to the relevant data which are likely to be as effective,
26
it is reasonable in all the circumstances to do so:
27
(i) using any other computer or a communication in transit
28
to access the relevant data; and
29
(ii) if necessary to achieve that purpose--adding, copying,
30
deleting or altering other data in the computer or the
31
communication in transit;
32
(f) removing a computer or other thing from premises for the
33
purposes of doing any thing specified in the warrant in
34
accordance with this subsection, and returning the computer
35
or other thing to the premises;
36
Schedule 2
Network activity warrants
Part 1
Main amendments
46
Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020
No. , 2020
(g) copying any data to which access has been obtained, and
1
that:
2
(i) appears to be relevant for the purposes of determining
3
whether the relevant data is covered by the warrant; or
4
(ii) is covered by the warrant;
5
(h) intercepting a communication passing over a
6
telecommunications system, if the interception is for the
7
purposes of doing any thing specified in the warrant in
8
accordance with this subsection;
9
(i) using a surveillance device for the purposes of doing any
10
thing specified in the warrant in accordance with this
11
subsection;
12
(j) any other thing reasonably incidental to any of the above.
13
Note:
As a result of the warrant, a person who, by means of a
14
telecommunications facility, obtains access to data stored in a
15
computer will not commit an offence under Part 10.7 of the
Criminal
16
Code
or equivalent State or Territory laws (provided that the person
17
acts within the authority of the warrant).
18
(3) If:
19
(a) a network activity warrant authorises the removal of a
20
computer or other thing from premises as mentioned in
21
paragraph (2)(f); and
22
(b) a computer or thing is removed from the premises in
23
accordance with the warrant;
24
the computer or thing must be returned to the premises within a
25
reasonable period.
26
(4) For the purposes of paragraph (2)(g), if:
27
(a) access has been obtained to data; and
28
(b) the data is subject to a form of electronic protection;
29
the data is taken to be relevant for the purposes of determining
30
whether the relevant data is covered by the warrant.
31
When data is covered by a warrant
32
(5) For the purposes of this section, data is
covered by
a warrant if
33
access to the data will substantially assist as described in
34
paragraph 27KK(1)(b). To avoid doubt, it is immaterial whether
35
Network activity warrants
Schedule 2
Main amendments
Part 1
No. , 2020
Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020
47
the composition of the group mentioned in that paragraph changes
1
during the period when the warrant is in force.
2
Certain acts not authorised
3
(6) Subsection (2) does not authorise the addition, deletion or
4
alteration of data, or the doing of any thing, that is likely to:
5
(a) materially interfere with, interrupt or obstruct:
6
(i) a communication in transit; or
7
(ii) the lawful use by other persons of a computer;
8
unless the addition, deletion or alteration, or the doing of the
9
thing, is necessary to do one or more of the things specified
10
in the warrant; or
11
(b) cause any other material loss or damage to other persons
12
lawfully using a computer.
13
Warrant must provide for certain matters
14
(7) A network activity warrant must:
15
(a) authorise the use of any force against persons and things that
16
is necessary and reasonable to do the things specified in the
17
warrant; and
18
(b) if the warrant authorises entering premises--state whether
19
entry is authorised to be made at any time of the day or night
20
or during stated hours of the day or night.
21
Concealment of access etc.
22
(8) If any thing has been done in relation to a computer under:
23
(a) a network activity warrant; or
24
(b) this subsection;
25
then, in addition to the things specified in the warrant, the warrant
26
authorises the doing of any of the following:
27
(c) any thing reasonably necessary to conceal the fact that any
28
thing has been done under the warrant or under this
29
subsection;
30
(d) entering any premises where the computer is reasonably
31
believed to be, for the purposes of doing the things
32
mentioned in paragraph (c);
33
Schedule 2
Network activity warrants
Part 1
Main amendments
48
Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020
No. , 2020
(e) entering any other premises for the purposes of gaining entry
1
to or exiting the premises referred to in paragraph (d);
2
(f) removing the computer or another thing from any place
3
where it is situated for the purposes of doing the things
4
mentioned in paragraph (c), and returning the computer or
5
other thing to that place;
6
(g) if, having regard to other methods (if any) of doing the things
7
mentioned in paragraph (c) which are likely to be as
8
effective, it is reasonable in all the circumstances to do so:
9
(i) using any other computer or a communication in transit
10
to do those things; and
11
(ii) if necessary to achieve that purpose--adding, copying,
12
deleting or altering other data in the computer or the
13
communication in transit;
14
(h) intercepting a communication passing over a
15
telecommunications system, if the interception is for the
16
purposes of doing any thing mentioned in this subsection;
17
(i) using a surveillance device, if the use is for the purposes of
18
doing any thing mentioned in this subsection;
19
(j) any other thing reasonably incidental to any of the above;
20
at the following time:
21
(k) at any time while the warrant is in force or within 28 days
22
after it ceases to be in force;
23
(l) if none of the things mentioned in paragraph (c) are done
24
within the 28-day period mentioned in paragraph (k)--at the
25
earliest time after that 28-day period at which it is reasonably
26
practicable to do the things mentioned in paragraph (c).
27
(9) Subsection (8) does not authorise the doing of a thing that is likely
28
to:
29
(a) materially interfere with, interrupt or obstruct:
30
(i) a communication in transit; or
31
(ii) the lawful use by other persons of a computer;
32
unless the doing of the thing is necessary to do one or more
33
of the things specified in subsection (8); or
34
(b) cause any other material loss or damage to other persons
35
lawfully using a computer.
36
Network activity warrants
Schedule 2
Main amendments
Part 1
No. , 2020
Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020
49
(10) If a computer or another thing is removed from a place in
1
accordance with paragraph (8)(f), the computer or thing must be
2
returned to the place within a reasonable period.
3
27KQ Extension and variation of network activity warrant
4
(1) If a network activity warrant was issued in response to an
5
application by the chief officer of the Australian Federal Police or
6
the Australian Crime Commission, the chief officer may apply, at
7
any time before the expiry of the warrant:
8
(a) for an extension of the warrant for a period of no more than
9
90 days after the day the warrant would otherwise expire; or
10
(b) for a variation of any of the other terms of the warrant.
11
(2) The application is to be made to an eligible Judge or to a
12
nominated AAT member and must be accompanied by the original
13
warrant.
14
(3) Sections 27KK and 27KL apply, with any necessary changes, to an
15
application under this section as if it were an application for the
16
warrant.
17
(4) The eligible Judge or nominated AAT member may grant an
18
application if satisfied that the matters referred to in
19
subsection 27KM(1) still exist, having regard to the matters in
20
subsection 27KM(2).
21
(5) If the eligible Judge or nominated AAT member grants the
22
application, the eligible Judge or nominated AAT member must
23
endorse the new expiry date or the other varied term on the original
24
warrant.
25
(6) An application may be made under this section more than once.
26
(7) If a network activity warrant is extended or varied in response to an
27
application made by the chief officer of the Australian Federal
28
Police or the Australian Crime Commission, the chief officer must:
29
(a) notify the extension or variation to the Inspector-General of
30
Intelligence and Security; and
31
(b) do so within 7 days after the extension or variation.
32
Schedule 2
Network activity warrants
Part 1
Main amendments
50
Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020
No. , 2020
27KR Revocation of network activity warrant
1
(1) A network activity warrant may, by instrument in writing, be
2
revoked by an eligible Judge or nominated AAT member on the
3
initiative of the eligible Judge or nominated AAT member at any
4
time before the expiration of the period of validity specified in the
5
warrant.
6
(2) If the circumstances set out in subsection 27KS(2) apply in relation
7
to a network activity warrant:
8
(a) if the warrant was issued in response to an application made
9
by the chief officer of the Australian Federal Police--the
10
chief officer of the Australian Federal Police must, by
11
instrument in writing, revoke the warrant; or
12
(b) if the warrant was issued in response to an application made
13
by the chief officer of the Australian Crime Commission--
14
the chief officer of the Australian Crime Commission must,
15
by instrument in writing, revoke the warrant.
16
(3) The instrument revoking a warrant must be signed by the eligible
17
Judge, the nominated AAT member, the chief officer of the
18
Australian Federal Police or the chief officer of the Australian
19
Crime Commission, as the case requires.
20
(4) If an eligible Judge or nominated AAT member revokes a warrant,
21
the eligible Judge or nominated AAT member must give a copy of
22
the instrument of revocation to:
23
(a) if the warrant was issued in response to an application made
24
by the chief officer of the Australian Federal Police--the
25
chief officer of the Australian Federal Police; or
26
(b) if the warrant was issued in response to an application made
27
by the chief officer of the Australian Crime Commission--
28
the chief officer of the Australian Crime Commission.
29
(5) If:
30
(a) an eligible Judge or nominated AAT member revokes a
31
warrant; and
32
(b) at the time of the revocation, a law enforcement officer is
33
executing the warrant;
34
Network activity warrants
Schedule 2
Main amendments
Part 1
No. , 2020
Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020
51
the law enforcement officer is not subject to any civil or criminal
1
liability for any act done in the proper execution of that warrant
2
before the officer is made aware of the revocation.
3
(6) If:
4
(a) a network activity warrant was issued in response to an
5
application made by the chief officer of the Australian
6
Federal Police or the Australian Crime Commission; and
7
(b) an eligible Judge or nominated AAT member revokes the
8
warrant;
9
the chief officer must:
10
(c) notify the revocation to the Inspector-General of Intelligence
11
and Security; and
12
(d) do so within 7 days after the revocation.
13
(7) If a network activity warrant is revoked by the chief officer of the
14
Australian Federal Police or the Australian Crime Commission, the
15
chief officer must:
16
(a) notify the revocation to the Inspector-General of Intelligence
17
and Security; and
18
(b) do so within 7 days after the revocation.
19
27KS Discontinuance of access under warrant
20
Scope
21
(1) This section applies if a network activity warrant is issued.
22
Discontinuance of access
23
(2) If:
24
(a) the warrant was sought by the chief officer of the Australian
25
Federal Police or the Australian Crime Commission; and
26
(b) the chief officer is satisfied that access to data under the
27
warrant is no longer required for the purpose referred to in
28
paragraph 27KK(1)(b);
29
the chief officer must, in addition to revoking the warrant under
30
section 27KR, take the steps necessary to ensure that access to data
31
authorised by the warrant is discontinued.
32
Schedule 2
Network activity warrants
Part 1
Main amendments
52
Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020
No. , 2020
(3) If:
1
(a) the warrant was sought by the chief officer of the Australian
2
Federal Police or the Australian Crime Commission; and
3
(b) the chief officer is notified that the warrant has been revoked
4
by an eligible Judge or a nominated AAT member under
5
section 27KR;
6
the chief officer must take the steps necessary to ensure that access
7
to data authorised by the warrant is discontinued as soon as
8
practicable.
9
(4) If the law enforcement officer who is primarily responsible for
10
executing the warrant believes that access to data under the warrant
11
is no longer necessary for the purpose referred to in
12
paragraph 27KK(1)(b), the law enforcement officer must
13
immediately inform the chief officer of the law enforcement
14
agency to which the law enforcement officer belongs or is
15
seconded.
16
27KT Relationship of this Division to parliamentary privileges and
17
immunities
18
To avoid doubt, this Division does not affect the law relating to the
19
powers, privileges and immunities of any of the following:
20
(a) each House of the Parliament;
21
(b) the members of each House of the Parliament;
22
(c) the committees of each House of the Parliament and joint
23
committees of both Houses of the Parliament.
24
10 Section 41 (paragraph (b) of the definition of
appropriate
25
consenting official
)
26
Omit "or 43D", substitute ", 43D or 43E".
27
11 At the end of Part 5
28
Add:
29
43E Extraterritorial operation of network activity warrants
30
(1) If, before the issue of a network activity warrant, it becomes
31
apparent to the applicant that there will be a need for access to data
32
held in a computer:
33
Network activity warrants
Schedule 2
Main amendments
Part 1
No. , 2020
Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020
53
(a) in a foreign country; or
1
(b) on a vessel or aircraft that is registered under the law of a
2
foreign country and that is in or above waters beyond the
3
outer limits of the territorial sea of Australia;
4
the eligible Judge or nominated AAT member considering the
5
application for the warrant must not permit the warrant to authorise
6
that access unless the eligible Judge or nominated AAT member is
7
satisfied that the access has been agreed to by an appropriate
8
consenting official of the foreign country.
9
(2) If:
10
(a) a network activity warrant has been issued; and
11
(b) after the issue of the warrant, it becomes apparent to the law
12
enforcement officer primarily responsible for executing the
13
warrant that there will be a need for access to data held in a
14
computer that is:
15
(i) in a foreign country; or
16
(ii) on a vessel or aircraft that is registered under the law of
17
a foreign country and that is in or above waters beyond
18
the outer limits of the territorial sea of Australia;
19
the warrant is taken to permit that access if, and only if, the access
20
has been agreed to by an appropriate consenting official of the
21
foreign country.
22
(3) Subsections (1) and (2) do not apply to a network activity warrant
23
authorising access to data if:
24
(a) the person, or each of the persons, responsible for executing
25
the warrant will be physically present in Australia; and
26
(b) the location where the data is held is unknown or cannot
27
reasonably be determined.
28
(4) Despite subsections (1) and (2), if:
29
(a) a vessel that is registered under the law of a foreign country
30
is in waters beyond the outer limits of the territorial sea of
31
Australia but not beyond the outer limits of the contiguous
32
zone of Australia; and
33
(b) the relevant offence in respect of which it becomes apparent
34
that access to data held in a computer on the vessel will be
35
required is an offence relating to the customs, fiscal,
36
immigration or sanitary laws of Australia;
37
Schedule 2
Network activity warrants
Part 1
Main amendments
54
Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020
No. , 2020
there is no requirement for the agreement of an appropriate
1
consenting official of the foreign country concerned in relation to
2
that access while the vessel is in such waters.
3
(5) Despite subsections (1) and (2), if:
4
(a) a vessel that is registered under the law of a foreign country
5
is in waters beyond the outer limits of the territorial sea of
6
Australia but not beyond the outer limits of the Australian
7
fishing zone; and
8
(b) the relevant offence in respect of which it becomes apparent
9
that access to data held in a computer on the vessel will be
10
required is an offence against section 100, 100A, 100B, 101,
11
101A or 101AA of the
Fisheries Management Act 1991
or
12
section 46A, 46B, 46C, 46D, 49A or 51A of the
Torres Strait
13
Fisheries Act 1984
;
14
there is no requirement for the agreement of an appropriate
15
consenting official of the foreign country concerned in relation to
16
that access while the vessel is in those waters.
17
(6) As soon as practicable after the commencement of access to data
18
held in a computer under the authority of a network activity
19
warrant in circumstances where consent to that access is required:
20
(a) in a foreign country; or
21
(b) on a vessel or aircraft that is registered under the law of a
22
foreign country;
23
the chief officer of the law enforcement agency to which the law
24
enforcement officer who applied for the warrant belongs or is
25
seconded must give the Minister evidence in writing that the access
26
has been agreed to by an appropriate consenting official of the
27
foreign country.
28
(7) An instrument providing evidence of the kind referred to in
29
subsection (6) is not a legislative instrument.
30
(8) If a vessel or aircraft that is registered under the laws of a foreign
31
country is in or above the territorial sea of another foreign country,
32
subsections (1) and (2) have effect as if the reference to an
33
appropriate consenting official of the foreign country were a
34
reference to an appropriate consenting official of each foreign
35
country concerned.
36
Network activity warrants
Schedule 2
Main amendments
Part 1
No. , 2020
Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020
55
(9) For the avoidance of doubt, there is no requirement for the
1
agreement of an appropriate consenting official of the foreign
2
country to the access to data held in a computer under the authority
3
of a network activity warrant on a vessel or aircraft of a foreign
4
country that is in Australia or in or above waters within the outer
5
limits of the territorial sea of Australia.
6
12 Subsection 44(1) (paragraph (a) of the definition of
7
protected information
)
8
After "warrant", insert "(other than a network activity warrant)".
9
13 Subsection 44(1) (subparagraph (b)(i) of the definition of
10
protected information
)
11
After "warrant", insert "(other than a network activity warrant)".
12
14 Subsection 44(1) (paragraph (c) of the definition of
13
protected information
)
14
After "warrant", insert "(other than a network activity warrant)".
15
15 Subsection 44(1) (subparagraph (d)(i) of the definition of
16
protected information
)
17
After "warrant", insert "(other than a network activity warrant)".
18
16 Subsection 44(1) (subparagraph (d)(iii) of the definition of
19
protected information
)
20
After "obtained", insert "(otherwise than purportedly under a network
21
activity warrant)".
22
17 Subsection 44(1) (paragraph (d) of the definition of
23
protected information
)
24
After "warrant" (last occurring), insert "(other than a network activity
25
warrant)".
26
18 After section 44
27
Insert:
28
Schedule 2
Network activity warrants
Part 1
Main amendments
56
Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020
No. , 2020
44A What is protected network activity warrant information?
1
For the purposes of this Act,
protected network activity warrant
2
information
means:
3
(a) any information (other than network activity warrant
4
intercept information) obtained from access to data under a
5
network activity warrant; or
6
(b) any information obtained from the use of a surveillance
7
device under a network activity warrant; or
8
(c) information relating to an application for, the issue of, the
9
existence of, or the expiration of, a network activity warrant;
10
or
11
(d) any information that is likely to enable the identification of:
12
(i) a criminal network of individuals specified in a network
13
activity warrant; or
14
(ii) an individual in a criminal network of individuals
15
specified in a network activity warrant; or
16
(iii) a computer specified in a network activity warrant; or
17
(iv) premises specified in a network activity warrant; or
18
(e) any other information obtained by a law enforcement officer:
19
(i) without the authority of a network activity warrant; or
20
(ii) in a case where the information was obtained,
21
purportedly under a network activity warrant, through
22
access to data held in a computer in a foreign country,
23
or on a vessel or aircraft that is registered under the law
24
of a foreign country and that is in or above waters
25
beyond the outer limit of Australia's territorial sea--
26
without the agreement of the appropriate consenting
27
official of that foreign country, and of any other foreign
28
country, whose agreement is required under
29
section 43E;
30
in contravention of the requirement for a network activity
31
warrant.
32
Note:
For protection of network activity warrant intercept information, see
33
Part 2-6 of the
Telecommunications (Interception and Access) Act
34
1979
.
35
19 After section 45A
36
Insert:
37
Network activity warrants
Schedule 2
Main amendments
Part 1
No. , 2020
Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020
57
45B Prohibition on use, recording, communication or publication of
1
protected network activity warrant information or its
2
admission in evidence
3
(1) A person commits an offence if:
4
(a) the person uses, records, communicates or publishes any
5
information; and
6
(b) the information is protected network activity warrant
7
information; and
8
(c) the use, recording, communication or publication of the
9
information is not permitted by this section.
10
Penalty: Imprisonment for 2 years.
11
(2) A person commits an offence if:
12
(a) the person uses, records, communicates or publishes any
13
information; and
14
(b) the information is protected network activity warrant
15
information; and
16
(c) the use, recording, communication or publication of the
17
information is not permitted by this section; and
18
(d) the use, recording, communication or publication of the
19
information:
20
(i) endangers the health or safety of any person; or
21
(ii) prejudices the effective conduct of an investigation into
22
a relevant offence.
23
Penalty: Imprisonment for 10 years.
24
(3) Subject to subsections (4), (5), (7) and (10), protected network
25
activity warrant information may not be admitted in evidence in
26
any proceedings.
27
(4) Subsections (1), (2) and (3) do not apply to:
28
(a) the use, recording, communication or publication of
29
protected network activity warrant information in connection
30
with the administration or execution of this Act; or
31
(b) the use, recording, communication or publication of any
32
information that has been disclosed in proceedings in open
33
court lawfully; or
34
Schedule 2
Network activity warrants
Part 1
Main amendments
58
Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020
No. , 2020
(c) the use or communication of protected network activity
1
warrant information by a person who believes on reasonable
2
grounds that the use or communication is necessary to help
3
prevent or reduce the risk of serious violence to a person or
4
substantial damage to property; or
5
(d) the communication to the Director-General (within the
6
meaning of the
Australian Security Intelligence Organisation
7
Act 1979
) of protected network activity warrant information
8
that relates or appears to relate to any matter within the
9
functions of that organisation; or
10
(e) the communication to the agency head (within the meaning
11
of the
Intelligence Services Act 2001
) of an agency (within
12
the meaning of that Act) of protected network activity
13
warrant information that relates or appears to relate to any
14
matter within the functions of that agency; or
15
(f) the use, recording or communication of:
16
(i) protected network activity warrant information referred
17
to in paragraph (d)--by the Director-General (within the
18
meaning of the
Australian Security Intelligence
19
Organisation Act 1979
), an ASIO employee (within the
20
meaning of that Act) or an ASIO affiliate (within the
21
meaning of that Act); or
22
(ii) protected network activity warrant information referred
23
to in paragraph (e)--by the agency head (within the
24
meaning of the
Intelligence Services Act 2001
), or a
25
staff member (within the meaning of that Act), of an
26
agency (within the meaning of that Act);
27
in the performance of the official functions of the
28
Director-General, ASIO employee, ASIO affiliate, agency
29
head or staff member, as the case may be.
30
(5) Protected network activity warrant information (other than
31
information that was obtained from the use of a surveillance device
32
under a network activity warrant) may be used, recorded,
33
communicated or published, or may be admitted in evidence, if it is
34
necessary to do so for any of the following purposes:
35
(a) the purposes of the Australian Federal Police collecting,
36
correlating, analysing or disseminating criminal intelligence
37
in the performance of the functions conferred by section 8 of
38
the
Australian Federal Police Act 1979
;
39
Network activity warrants
Schedule 2
Main amendments
Part 1
No. , 2020
Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020
59
(b) the purposes of the Australian Crime Commission collecting,
1
correlating, analysing or disseminating criminal intelligence
2
in the performance of the functions conferred by section 7A
3
of the
Australian Crime Commission Act 2002
;
4
(c) the purposes of the Australian Federal Police or the
5
Australian Crime Commission making reports in relation to
6
criminal intelligence;
7
(d) the making of an application for a warrant;
8
(e) the making of an application for the variation of a warrant;
9
(f) the making of an application for the extension of a warrant;
10
(g) the keeping of records and the making of reports by the
11
Australian Federal Police or the Australian Crime
12
Commission under Division 2;
13
(h) the purposes of an IGIS official exercising powers, or
14
performing functions or duties, as an IGIS official;
15
(i) the purposes of an investigation of an offence against
16
subsection (1) or (2);
17
(j) a proceeding relating to an offence against subsection (1) or
18
(2).
19
(6) The definition of
warrant
in subsection 6(1) does not apply to
20
paragraphs (5)(d), (e) and (f) of this section.
21
Note:
This means that warrant has its ordinary meaning.
22
(7) Protected network activity warrant information that was obtained
23
from the use of a surveillance device under a network activity
24
warrant may be used, recorded, communicated or published, or
25
may be admitted in evidence, if it is necessary to do so for any of
26
the following purposes:
27
(a) the purposes of doing a thing authorised by a network
28
activity warrant;
29
(b) the purposes of an IGIS official exercising powers, or
30
performing functions or duties, as an IGIS official;
31
(c) the purposes of an investigation of an offence against
32
subsection (1) or (2);
33
(d) a proceeding relating to an offence against subsection (1) or
34
(2).
35
Schedule 2
Network activity warrants
Part 1
Main amendments
60
Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020
No. , 2020
(8) Protected network activity warrant information may be
1
communicated by an Ombudsman official to an IGIS official for
2
the purposes of the IGIS official exercising powers, or performing
3
functions or duties, as an IGIS official.
4
(9) Protected network activity warrant information may be
5
communicated by an IGIS official to an Ombudsman official for
6
the purposes of the Ombudsman official exercising powers, or
7
performing functions or duties, as an Ombudsman official.
8
(10) Protected network activity warrant information may be admitted in
9
evidence in:
10
(a) a criminal proceeding for an offence against subsection (1) or
11
(2); or
12
(b) a proceeding that is not a criminal proceeding.
13
(11) If:
14
(a) protected network activity warrant information was obtained
15
from access to data, or the use of a surveillance device, under
16
a network activity warrant; and
17
(b) the warrant was granted in response to an application made
18
by the chief officer of a particular law enforcement agency;
19
and
20
(c) the information:
21
(i) is communicated to another law enforcement agency
22
(by communicating it to the chief officer or another
23
officer of that agency) for a particular purpose; or
24
(ii) is communicated to any agency that is not a law
25
enforcement agency (other than the Office of the
26
Inspector-General of Intelligence and Security, the
27
Australian Security Intelligence Organisation and the
28
agencies within the meaning of the
Intelligence Services
29
Act 2001
) (by communicating it to the officer in charge
30
of that agency or to another officer of that agency) for a
31
particular purpose;
32
the information that has been so communicated:
33
(d) may be communicated from one officer to another within that
34
agency for that purpose only; and
35
(e) must not be communicated to any person who is not an
36
officer of that agency.
37
Network activity warrants
Schedule 2
Main amendments
Part 1
No. , 2020
Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020
61
20 After section 46
1
Insert:
2
46AA Dealing with records obtained by accessing data under a
3
network activity warrant
4
(1) The chief officer of the Australian Federal Police or the Australian
5
Crime Commission:
6
(a) must ensure that every record or report comprising:
7
(i) protected network activity warrant information; or
8
(ii) network activity warrant intercept information;
9
is kept in a secure place that is not accessible to people who
10
are not entitled to deal with the record or report; and
11
(b) must cause to be destroyed any record or report referred to in
12
paragraph (a):
13
(i) as soon as practicable after the making of the record or
14
report if the chief officer is satisfied that no civil or
15
criminal proceeding to which the material contained in
16
the record or report relates has been, or is likely to be,
17
commenced and that the material contained in the
18
record or report is not likely to be required in
19
connection with an activity referred to in
20
subsection 45B(4) or a purpose referred to in
21
subsection 45B(5) or (7); and
22
(ii) within the period of 5 years after the making of the
23
record or report, and within each period of 5 years
24
thereafter, unless, before the end of that period, the chief
25
officer is satisfied in relation to the material contained
26
in the record or report of a matter referred to in
27
subparagraph (i) and certifies to that effect.
28
(2) If an agency is not a law enforcement agency but, as described in
29
subsection 45B(5) or (7), receives records or reports obtained by
30
accessing data, or using a surveillance device, under a network
31
activity warrant, the officer in charge of the agency:
32
(a) must ensure that every record or report that is so received is
33
kept in a secure place that is not accessible to people who are
34
not entitled to deal with the record or report; and
35
Schedule 2
Network activity warrants
Part 1
Main amendments
62
Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020
No. , 2020
(b) must cause to be destroyed any record or report referred to in
1
paragraph (a):
2
(i) as soon as practicable after the receipt of the record or
3
report by the agency if the officer in charge is satisfied
4
that no civil or criminal proceeding to which the
5
material contained in the record or report relates has
6
been, or is likely to be, commenced and that the material
7
contained in the record or report is not likely to be
8
required in connection with an activity referred to in
9
subsection 45B(4) or a purpose referred to in
10
subsection 45B(5) or (7); and
11
(ii) within the period of 5 years after the making of the
12
record or report, and within each period of 5 years
13
thereafter, unless, before the end of that period, the
14
officer in charge is satisfied in relation to the material
15
contained in the record or report of a matter referred to
16
in subparagraph (i) and certifies to that effect.
17
(3) Subsection (2) does not apply to the Office of the
18
Inspector-General of Intelligence and Security.
19
21 Subsection 47A(7) (after paragraph (c) of the definition of
20
computer access technologies or methods
)
21
Insert:
22
(ca) a network activity warrant; or
23
22 After subsection 49(2D)
24
Insert:
25
(2E) In the case of a network activity warrant for access to data held in a
26
computer, the report must:
27
(a) state whether the warrant was executed; and
28
(b) if so:
29
(i) state the name of the person primarily responsible for
30
the execution of the warrant; and
31
(ii) state the name of each person involved in accessing data
32
under the warrant; and
33
(iii) state the period during which the data was accessed; and
34
Network activity warrants
Schedule 2
Main amendments
Part 1
No. , 2020
Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020
63
(iv) state the name, if known, of any person whose data was
1
accessed; and
2
(v) give details of any premises, if known, at which the
3
computer was located; and
4
(vi) give details of any use of a surveillance device under the
5
warrant; and
6
(vii) give details of the extent to which the execution of the
7
warrant has contributed to the prevention, detection or
8
frustration of one or more kinds of relevant offences;
9
and
10
(viii) give details of the extent to which the execution of the
11
warrant has assisted the agency in carrying out its
12
functions; and
13
(ix) give details of the communication of information
14
obtained by accessing data under the warrant to persons
15
other than officers of the agency; and
16
(x) give details of the compliance with the conditions (if
17
any) to which the warrant was subject; and
18
(xi) give details of the information that was obtained from
19
access to data under the warrant; and
20
(xii) give details of how the information that was obtained
21
under the warrant was used; and
22
(xiii) give details of whether the information that was
23
obtained under the warrant was destroyed or retained
24
under section 46AA; and
25
(xiv) give details of any premises accessed,
26
telecommunications intercepted or computers removed
27
from premises under the warrant; and
28
(xv) give details of any activities undertaken under
29
subsection 27KP(8) in relation to the warrant; and
30
(xvi) give details of any assistance orders made under
31
subsection 64A(6A) in relation to the warrant; and
32
(c) if the warrant was extended or varied, state:
33
(i) the number of extensions or variations; and
34
(ii) the reasons for them.
35
23 After section 49C
36
Insert:
37
Schedule 2
Network activity warrants
Part 1
Main amendments
64
Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020
No. , 2020
49D Notification to Inspector-General of Intelligence and Security of
1
things done under a network activity warrant
2
If:
3
(a) a network activity warrant was issued in response to an
4
application made by the chief officer of the Australian
5
Federal Police or the Australian Crime Commission; and
6
(b) a thing mentioned in subsection 27KP(8) was done under the
7
warrant after the 28-day period mentioned in
8
paragraph 27KP(8)(k);
9
the chief officer must:
10
(c) notify the Inspector-General of Intelligence and Security of
11
the fact that the thing was done under the warrant after the
12
28-day period mentioned in paragraph 27KP(8)(k); and
13
(d) do so within 7 days after the thing was done.
14
24 After paragraph 50(1)(eb)
15
Insert:
16
(ec) if the agency is the Australian Federal Police or the
17
Australian Crime Commission--the kinds of offences in
18
relation to which information was obtained under network
19
activity warrants issued during that year in response to
20
applications made by the chief officer of the agency; and
21
25 Paragraph 51(b)
22
Omit "or 27KG(4)", substitute ", 27KG(4) or 27KR(4)".
23
26 After paragraph 52(1)(h)
24
Insert:
25
(ha) if the agency is the Australian Federal Police or the
26
Australian Crime Commission--details of things done under
27
subsection 27KP(8) in relation to a network activity warrant;
28
27 Paragraph 52(1)(j)
29
After "46(1)(b)", insert "or 46AA(1)(b)".
30
28 After subsection 55(1)
31
Insert:
32
Network activity warrants
Schedule 2
Main amendments
Part 1
No. , 2020
Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020
65
(1A) Subsection (1) does not apply to compliance with:
1
(a) Division 6 of Part 2 (network activity warrants); or
2
(b) the remaining provisions of this Act so far as they relate to
3
network activity warrants.
4
29 At the end of subsection 62(1)
5
Add:
6
; or (e) anything done by the law enforcement officer in connection
7
with:
8
(i) the communication by a person to another person; or
9
(ii) the making use of; or
10
(iii) the making of a record of; or
11
(iv) the custody of a record of;
12
information obtained from access to data under a network
13
activity warrant.
14
30 After subparagraph 64A(1)(a)(i)
15
Insert:
16
(ia) a network activity warrant; or
17
31 After subsection 64A(6)
18
Insert:
19
Network activity warrant
20
(6A) In the case of a computer that is the subject of a network activity
21
warrant, the eligible Judge or nominated AAT member may grant
22
the assistance order if the eligible Judge or nominated AAT
23
member is satisfied that:
24
(a) there are reasonable grounds for suspecting that access to
25
data held in the computer will substantially assist in the
26
collection of intelligence that:
27
(i) relates to the group referred to in paragraph 27KK(1)(a)
28
or to any of the individuals in the group; and
29
(ii) is relevant to the prevention, detection or frustration of
30
one or more kinds of relevant offences; and
31
(b) the specified person is:
32
Schedule 2
Network activity warrants
Part 1
Main amendments
66
Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020
No. , 2020
(i) reasonably suspected of having committed any of the
1
relevant offences in respect of which the warrant was
2
issued; or
3
(ii) the owner or lessee of the computer; or
4
(iii) an employee of the owner or lessee of the computer; or
5
(iv) a person engaged under a contract for services by the
6
owner or lessee of the computer; or
7
(v) a person who uses or has used the computer; or
8
(vi) a person who is or was a system administrator for the
9
system including the computer; and
10
(c) the specified person has relevant knowledge of:
11
(i) the computer or a computer network of which the
12
computer forms or formed a part; or
13
(ii) measures applied to protect data held in the computer.
14
32 Paragraph 65(1A)(a)
15
After "data disruption warrant", insert ", network activity warrant".
16
Network activity warrants
Schedule 2
Consequential amendments
Part 2
No. , 2020
Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020
67
Part 2--Consequential amendments
1
Australian Crime Commission Act 2002
2
33 Subsection 51(4) (at the end of the definition of
relevant
3
Act
)
4
Add:
5
; or (e) the
Inspector-General of Intelligence and Security Act 1986
,
6
or any other Act, or instrument made under an Act, that
7
confers functions, duties or powers on the Inspector-General
8
of Intelligence and Security.
9
34 After paragraph 59AA(1B)(f)
10
Insert:
11
(fa) the Inspector-General of Intelligence and Security;
12
Australian Federal Police Act 1979
13
35 Subsection 4(1)
14
Insert:
15
IGIS official
means:
16
(a) the Inspector-General of Intelligence and Security; or
17
(b) any other person covered by subsection 32(1) of the
18
Inspector-General of Intelligence and Security Act 1986
.
19
36 Subsection 40ZA(3)
20
Omit "and (6)", substitute ", (6) and (6A)".
21
37 After subsection 40ZA(6)
22
Insert:
23
(6A) Subsection (2) does not prevent a person from making a record of,
24
or divulging or communicating, information for the purpose of an
25
IGIS official exercising powers, or performing functions or duties,
26
as an IGIS official.
27
Schedule 2
Network activity warrants
Part 2
Consequential amendments
68
Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020
No. , 2020
38 After paragraph 60A(2)(f)
1
Insert:
2
; or (g) the purposes of an IGIS official carrying out, performing or
3
exercising any of the IGIS official's duties, functions or
4
powers as an IGIS official.
5
Australian Human Rights Commission Act 1986
6
39 Subsection 3(1)
7
Insert:
8
ACIC
means the agency known as the Australian Criminal
9
Intelligence Commission established by the
Australian Crime
10
Commission Act 2002
.
11
examiner
of ACIC means an examiner within the meaning of the
12
Australian Crime Commission Act 2002
.
13
IGIS official
means:
14
(a) the Inspector-General of Intelligence and Security; or
15
(b) any other person covered by subsection 32(1) of the
16
Inspector-General of Intelligence and Security Act 1986
.
17
40 At the end of subsection 11(3)
18
Add:
19
Note:
Both the Commission and the Inspector-General of Intelligence and
20
Security have functions in relation to ACIC and the Australian Federal
21
Police. The Commission and the Inspector-General can transfer
22
matters between each other and share information in relation to
23
actions taken by any of those agencies (see subsection 20(4C),
24
section 46PZ and subsection 49(4C) of this Act, and Part IIIA of the
25
Inspector-General of Intelligence and Security Act 1986
).
26
41 At the end of subsection 20(1)
27
Add:
28
Note:
A complaint is taken to have been made to the Commission if all or
29
part of a complaint is transferred to the Commission under
30
section 32AD of the
Inspector-General of Intelligence and Security
31
Act 1986
(see section 46PZ of this Act).
32
Network activity warrants
Schedule 2
Consequential amendments
Part 2
No. , 2020
Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020
69
42 After subsection 20(4B)
1
Insert:
2
(4C) If:
3
(a) a complaint has been made to the Commission in relation to:
4
(i) an act or practice of ACIC (except an act or practice of
5
an examiner of ACIC performing functions and
6
exercising powers as an examiner); or
7
(ii) an act or practice of the Australian Federal Police; and
8
(b) because the Commission is of the opinion that the subject
9
matter of the complaint could be more effectively or
10
conveniently dealt with by the Inspector-General of
11
Intelligence and Security under the
Inspector-General of
12
Intelligence and Security Act 1986
, the Commission decides
13
not to inquire, or not to continue to inquire, into that act or
14
practice;
15
the Commission must:
16
(c) consult the Inspector-General in relation to transferring the
17
complaint or part of the complaint; and
18
(d) if the Inspector-General agrees to the transfer of the
19
complaint or part of the complaint--transfer the complaint or
20
part to the Inspector-General as soon as is reasonably
21
practicable; and
22
(e) as soon as is reasonably practicable, take reasonable steps to
23
give notice in writing to the complainant stating that the
24
complaint or part has been so transferred; and
25
(f) give to the Inspector-General any information or documents
26
that relate to the complaint or part and are in the possession,
27
or under the control, of the Commission.
28
(4D) Without limiting subsection (4C), the Commission may consult
29
with, and obtain an agreement from, the Inspector-General of
30
Intelligence and Security by entering into an arrangement with the
31
Inspector-General relating to the transfer of complaints (or parts)
32
generally.
33
43 Subsection 46P(1) (note)
34
Omit "Note", substitute "Note 1".
35
Schedule 2
Network activity warrants
Part 2
Consequential amendments
70
Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020
No. , 2020
44 At the end of subsection 46P(1)
1
Add:
2
Note 2:
Under section 46PZ, a complaint may be taken to be lodged with the
3
Commission if all or part of a complaint is transferred from the
4
Inspector-General of Intelligence and Security under section 32AD of
5
the
Inspector-General of Intelligence and Security Act 1986
.
6
45 Before section 47
7
Insert:
8
46PZ Transfer of complaints from the Inspector-General of
9
Intelligence and Security
10
(1) If the Inspector-General of Intelligence and Security transfers all or
11
part of a complaint to the Commission under section 32AD of the
12
Inspector-General of Intelligence and Security Act 1986
, in respect
13
of an act or practice of ACIC or the Australian Federal Police, the
14
Commission may determine, in writing, that a complaint is taken to
15
have been:
16
(a) made as referred to in paragraph 20(1)(b) of this Act; or
17
(b) lodged under section 46P of this Act.
18
Note:
The Commission may also transfer a complaint or part of a complaint
19
to the Inspector-General of Intelligence and Security under
20
subsection 20(4C).
21
(2) The determination has effect accordingly.
22
(3) The determination is not a legislative instrument.
23
46 Subsection 49(4A)
24
After "20(4A)(e)", insert "or (4C)(f)".
25
47 After subsection 49(4B)
26
Insert:
27
(4C) Subsection (1) does not prevent the Commission, or a person
28
acting for or on behalf of the Commission, from giving information
29
or documents to an IGIS official for the purpose of the IGIS
30
official exercising a power, or performing a function or duty, as an
31
IGIS official.
32
Network activity warrants
Schedule 2
Consequential amendments
Part 2
No. , 2020
Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020
71
Note:
A defendant bears an evidential burden in relation to a matter in
1
subsection (4C) (see subsection 13.3(3) of the
Criminal Code
).
2
Australian Information Commissioner Act 2010
3
48 Section 3
4
Insert:
5
IGIS official
has the meaning given by subsection 29(6).
6
49 After paragraph 29(2)(c)
7
Insert:
8
; or (d) the person:
9
(i) records or otherwise uses the information for the
10
purpose of an IGIS official exercising a power, or
11
performing a function or duty, as an IGIS official; or
12
(ii) discloses the information to an IGIS official for the
13
purpose of the IGIS official exercising a power, or
14
performing a function or duty, as an IGIS official.
15
50 At the end of section 29
16
Add:
17
(6) In this Act:
18
IGIS official
means:
19
(a) the Inspector-General of Intelligence and Security; or
20
(b) any other person covered by subsection 32(1) of the
21
Inspector-General of Intelligence and Security Act 1986
.
22
Inspector-General of Intelligence and Security Act 1986
23
51 Subsection 3(1)
24
Insert:
25
ACIC
means the agency known as the Australian Criminal
26
Intelligence Commission established by the
Australian Crime
27
Commission Act 2002
.
28
CEO of ACIC
means the Chief Executive Officer of ACIC.
29
Schedule 2
Network activity warrants
Part 2
Consequential amendments
72
Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020
No. , 2020
52 Subsection 3(1) (after paragraph (d) of the definition of
1
head
)
2
Insert:
3
(e) in relation to ACIC--the CEO of ACIC; or
4
(ea) in relation to the Australian Federal Police--the
5
Commissioner of Police; or
6
53 Subsection 3(1)
7
Insert:
8
Information Commissioner
: see section 3A of the
Australian
9
Information Commissioner Act 2010
.
10
Inspector-General ADF
means the Inspector-General of the
11
Australian Defence Force referred to in section 110B of the
12
Defence Act 1903
.
13
integrity body
:
14
(a) means any of the following:
15
(i) the Ombudsman;
16
(ii) the Australian Human Rights Commission;
17
(iii) the Information Commissioner;
18
(iv) the Integrity Commissioner;
19
(v) the Inspector-General ADF; and
20
(b) for a complaint--has the meaning given by
21
paragraph 11(4A)(a).
22
Integrity Commissioner
has the meaning given by section 5 of the
23
Law Enforcement Integrity Commissioner Act 2006
.
24
54 Subsection 3(1) (definition of
intelligence agency
)
25
Repeal the definition, substitute:
26
intelligence agency
means:
27
(a) ASIO, ASIS, AGO, DIO, ASD or ONI; or
28
(b) the following agencies that have an intelligence function:
29
(i) the Australian Federal Police;
30
(ii) ACIC.
31
Network activity warrants
Schedule 2
Consequential amendments
Part 2
No. , 2020
Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020
73
55 Subsection 3(1)
1
Insert:
2
intelligence function
:
3
(a) for ACIC--means:
4
(i) the collection, correlation, analysis, production and
5
dissemination of intelligence obtained by ACIC from
6
the execution of a network activity warrant; or
7
(ii) the performance of a function, or the exercise of a
8
power, conferred on a law enforcement officer of ACIC
9
by the network activity warrant provisions of the
10
Surveillance Devices Act 2004
; or
11
(b) for the Australian Federal Police--means:
12
(i) the collection, correlation, analysis, production and
13
dissemination of intelligence obtained by the Australian
14
Federal Police from the execution of a network activity
15
warrant; or
16
(ii) the performance of a function, or the exercise of a
17
power, conferred on a law enforcement officer of the
18
Australian Federal Police by the network activity
19
warrant provisions of the
Surveillance Devices Act
20
2004
.
21
law enforcement officer
, when used in relation to the Australian
22
Federal Police or ACIC, has the same meaning as in the
23
Surveillance Devices Act 2004
.
24
network activity warrant
has the same meaning as in the
25
Surveillance Devices Act 2004
.
26
network activity warrant provisions of the Surveillance Devices
27
Act 2004
means:
28
(a) Division 6 of Part 2 of that Act; or
29
(b) the remaining provisions of that Act so far as they relate to
30
network activity warrants.
31
56 After subsection 8(3)
32
Insert:
33
Schedule 2
Network activity warrants
Part 2
Consequential amendments
74
Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020
No. , 2020
(3A) Subject to this section, the functions of the Inspector-General in
1
relation to ACIC or the Australian Federal Police are:
2
(a) at the request of the Attorney-General or the responsible
3
Minister; or
4
(b) of the Inspector-General's own motion; or
5
(c) in response to a complaint made to the Inspector-General;
6
to inquire into any of the following matters, to the extent that the
7
matter relates to an intelligence function of that agency:
8
(d) the compliance by that agency with the laws of the
9
Commonwealth and of the States and Territories;
10
(e) the compliance by that agency with directions or guidelines
11
given to that agency by the responsible Minister;
12
(f) the propriety of particular activities of that agency;
13
(g) the effectiveness and appropriateness of the procedures of
14
that agency relating to the legality or propriety of the
15
activities of that agency;
16
(h) any matter that relates to an act or practice of that agency,
17
referred to the Inspector-General by the Australian Human
18
Rights Commission:
19
(i) that is or may be inconsistent with or contrary to any
20
human right; or
21
(ii) that constitutes or may constitute discrimination; or
22
(iii) that is or may be unlawful under the
Age Discrimination
23
Act 2004
, the
Disability Discrimination Act 1992
, the
24
Racial Discrimination Act 1975
or the
Sex
25
Discrimination Act 1984
;
26
(i) in relation to ACIC--the compliance by that agency with:
27
(i) directions or guidelines given to that agency; or
28
(ii) policies or other decisions made;
29
by the Board of ACIC or the Inter-Governmental Committee
30
established under the
Australian Crime Commission Act
31
2002
.
32
(3B) The functions of the Inspector-General under subsection (3A) do
33
not include inquiring into any action taken by an examiner (within
34
the meaning of the
Australian Crime Commission Act 2002
) of
35
ACIC in performing functions or exercising powers as an
36
examiner.
37
Network activity warrants
Schedule 2
Consequential amendments
Part 2
No. , 2020
Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020
75
57 Subsection 8(5)
1
Omit "and (3)", substitute ", (3) and (3A)".
2
58 Subsection 8(5)
3
After "DIO", insert ", ACIC, the Australian Federal Police".
4
59 Paragraph 8A(1)(b)
5
Omit "intelligence agency", substitute "intelligence agency (within the
6
meaning of this Act); and".
7
60 After paragraph 8A(1)(b)
8
Insert:
9
(c) if the intelligence agency is ACIC or the Australian Federal
10
Police--the conduct relates to that agency's intelligence
11
functions;
12
61 Subsection 8A(1)
13
After "so relates", insert "as described in paragraph (b)".
14
62 Paragraph 9AA(b)
15
Omit "paragraph 8(1)(d)", substitute "paragraphs 8(1)(d) and (3A)(b)".
16
63 After paragraph 9AA(b)
17
Insert:
18
(ba) inquire into action taken by the Board of ACIC or the
19
Inter-Governmental Committee established under the
20
Australian Crime Commission Act 2002
except to the extent
21
necessary to perform the functions of the Inspector-General
22
referred to in paragraph 8(3A)(f); or
23
64 Section 9A
24
Before "The functions", insert "(1)".
25
65 At the end of section 9A
26
Add:
27
(2) For the purposes of conducting an inspection of an intelligence
28
agency under subsection (1) in a case where the agency is ACIC or
29
Schedule 2
Network activity warrants
Part 2
Consequential amendments
76
Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020
No. , 2020
the Australian Federal Police, the Inspector-General or a member
1
of staff assisting the Inspector-General referred to in
2
paragraph 32(1)(a):
3
(a) may, at all reasonable times, enter and remain on any
4
premises (including any land or place); and
5
(b) is entitled to all reasonable facilities and assistance that the
6
head of the agency is capable of providing; and
7
(c) is entitled to full and free access at all reasonable times to
8
any information, documents or other property of the agency;
9
and
10
(d) may examine, make copies of or take extracts from any
11
information or documents.
12
66 At the end of subsection 10(1)
13
Add:
14
Note 1:
A complaint is taken to have been made under this Act if all or part of
15
the complaint is transferred to the Inspector-General by an integrity
16
body (see section 32AE of this Act).
17
Note 2:
See also Part IIIA which deals with relationships with other agencies
18
and information sharing.
19
67 Before subsection 11(2)
20
Insert:
21
When inquiry or further inquiry into complaints is not required
22
68 After subsection 11(4)
23
Insert:
24
(4A) Without limiting paragraph (2)(c), the Inspector-General may
25
decide not to inquire into, or not to inquire further into, a complaint
26
or part of a complaint in relation to action taken by an intelligence
27
agency if:
28
(a) a complaint in respect of the action has been, or could have
29
been, made by the complainant to any of the following
30
persons or bodies (the
integrity body
for the complaint):
31
(i) the Ombudsman;
32
(ii) the Australian Human Rights Commission, under
33
Division 3 of Part II (human rights complaints) or
34
Network activity warrants
Schedule 2
Consequential amendments
Part 2
No. , 2020
Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020
77
Part IIB (unlawful discrimination complaints) of the
1
Australian Human Rights Commission Act 1986
;
2
(iii) the Information Commissioner under Part V of the
3
Privacy Act 1988
;
4
(iv) the Integrity Commissioner;
5
(v) the Inspector-General ADF; and
6
(b) the Inspector-General is satisfied that the subject matter of
7
the complaint or the part of the complaint could be more
8
effectively or conveniently dealt with by the integrity body
9
for the complaint.
10
Note:
The complaint or part of the complaint may be transferred to the
11
integrity body for the complaint under section 32AD.
12
Inquiries into complaints about employment, contracts and related
13
matters
14
69 Paragraph 15(3)(a)
15
After "ASD" (wherever occurring), insert ", ACIC, the Australian
16
Federal Police".
17
70 Paragraph 21(1B)(a)
18
After "ASD" (wherever occurring), insert ", ACIC, the Australian
19
Federal Police".
20
71 After Part III
21
Insert:
22
Part IIIA--Relationships with other agencies and
23
information sharing
24
25
32AC Information sharing with integrity bodies
26
(1) The Inspector-General may share information or documents with
27
an integrity body (the
receiving body
) if:
28
(a) the information or documents are obtained by the
29
Inspector-General in the course of exercising powers, or
30
Schedule 2
Network activity warrants
Part 2
Consequential amendments
78
Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020
No. , 2020
performing functions or duties, in relation to ACIC or the
1
Australian Federal Police; and
2
(b) the information or documents are relevant to the receiving
3
body's functions; and
4
(c) the Inspector-General is satisfied on reasonable grounds that
5
the receiving body has satisfactory arrangements in place for
6
protecting the information or documents.
7
(2) To avoid doubt, the Inspector-General may share information or
8
documents with an integrity body whether or not the
9
Inspector-General is transferring a complaint or part of a complaint
10
to the integrity body.
11
(3) Without limiting paragraph (1)(c), the Inspector-General may make
12
arrangements with the head of an intelligence agency in relation to
13
protecting information or documents provided to the
14
Inspector-General by the agency.
15
32AD Transferring complaints to other integrity bodies
16
If the Inspector-General decides under subsection 11(4A) not to
17
inquire into, or not to inquire further into, a complaint or part of a
18
complaint in relation to action taken by an intelligence agency, the
19
Inspector-General may transfer all or part of the complaint to the
20
integrity body for the complaint.
21
Note:
The complaint is taken to have been made under the Act establishing
22
the integrity body (see sections 46PZ of the
Australian Human Rights
23
Commission Act 1986
, 23A of the
Law Enforcement Integrity
24
Commissioner Act 2006
, 5B of the
Ombudsman Act 1976
and 49B of
25
the
Privacy Act 1988
).
26
32AE Complaints transferred by integrity bodies
27
For the purposes of this Act, a complaint is taken to have been
28
made to the Inspector-General under this Act if all or part of the
29
complaint is transferred (however described) to the
30
Inspector-General by an integrity body.
31
Note:
Complaints may be transferred to the Inspector-General under
32
subsections 20(4C) of the
Australian Human Rights Commission Act
33
1986
, 6F(3) of the
Ombudsman Act 1976
and 50(3) of the
Privacy Act
34
1988
, and paragraph 110C(3)(b) of the
Defence Act 1903
.
35
Network activity warrants
Schedule 2
Consequential amendments
Part 2
No. , 2020
Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020
79
72 At the end of subsection 32A(1)
1
Add:
2
; (e) in the case of ACIC or the Australian Federal Police:
3
(i) a report given to the Minister under section 46 of the
4
Public Governance, Performance and Accountability
5
Act 2013
; or
6
(ii) any other report prepared on a periodic basis, and given
7
to the responsible Minister, that the Inspector-General is
8
satisfied relates to the performance by ACIC or the
9
Australian Federal Police of its intelligence functions;
10
(f) in the case of ACIC--a report that:
11
(i) is provided to the Board of ACIC or to the
12
Inter-Governmental Committee established under the
13
Australian Crime Commission Act 2002
; and
14
(ii) the Inspector-General is satisfied relates to the
15
performance by ACIC of its intelligence functions;
16
if the report was prepared:
17
(iii) by the CEO of ACIC; or
18
(iv) by the Chair of the Board and is in the possession of
19
ACIC.
20
73 After paragraph 32A(5)(a)
21
Insert:
22
(aa) in the case of ACIC or the Australian Federal Police, the
23
head of the agency has not provided the responsible Minister
24
with a copy of a report mentioned in subparagraph (1)(e)(i);
25
or
26
74 At the end of section 32A
27
Add:
28
(6) In the case of ACIC, if the CEO of ACIC or the Chair of the Board
29
(as the case requires) has not given the Board or the
30
Inter-Governmental Committee established under the
Australian
31
Crime Commission Act 2002
a copy of a report mentioned in
32
paragraph (1)(f), the CEO or Chair need not give a copy of the
33
report to the Inspector-General until the report has been given to
34
Schedule 2
Network activity warrants
Part 2
Consequential amendments
80
Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020
No. , 2020
the Board or the Inter-Governmental Committee (as the case
1
requires).
2
75 Subsections 32B(2) and (4)
3
Repeal the subsections, substitute:
4
(1A) This section also applies to any guidelines or directions:
5
(a) that relate to the performance by ACIC or the Australian
6
Federal Police of that agency's intelligence functions; and
7
(b) that are given:
8
(i) by the responsible Minister to the head of ACIC or the
9
Australian Federal Police; or
10
(ii) to ACIC by the Board of ACIC or by the
11
Inter-Governmental Committee established under the
12
Australian Crime Commission Act 2002
.
13
(2) As soon as practicable after a direction or guideline is given to the
14
head of that agency, the Inspector-General must be given a copy of
15
the direction or guideline by:
16
(a) the Minister; or
17
(b) for directions or guidelines referred to in
18
subparagraph (1A)(b)(ii)--the CEO of ACIC.
19
76 After section 34B
20
Insert:
21
34C No evidential burden for IGIS officials in relation to defences to
22
secrecy offences
23
(1) Despite subsections 13.3(2) and (3) of the
Criminal Code
, in a
24
prosecution for any offence of:
25
(a) disclosing, making a record of, or using, information or a
26
document; or
27
(b) causing information or a document to be disclosed, recorded
28
or used;
29
an IGIS official does not bear an evidential burden in relation to
30
whether the disclosure, record or use is for the purposes of, or in
31
connection with, that or any other IGIS official exercising a power,
32
or performing a function or duty, as an IGIS official.
33
Network activity warrants
Schedule 2
Consequential amendments
Part 2
No. , 2020
Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020
81
(2) Subsection (1) applies even if the offence referred to in that
1
subsection has additional physical elements to those referred to in
2
paragraph (1)(a) or (b).
3
(3) To avoid doubt:
4
(a) an offence may be covered by subsection (1) even if the
5
offence does not refer to disclosing, making a record of, or
6
using, information or a document; and
7
(b) without limiting paragraph (a):
8
(i) disclosing information or a document includes
9
communicating information or a document; and
10
(ii) making a record of information or a document includes
11
reproducing information or a document; and
12
(iii) using information or a document includes dealing with,
13
reading or examining information or a document.
14
Law Enforcement Integrity Commissioner Act 2006
15
77 Subsection 5(1)
16
Insert:
17
IGIS official
means:
18
(a) the Inspector-General of Intelligence and Security; or
19
(b) any other person covered by subsection 32(1) of the
20
Inspector-General of Intelligence and Security Act 1986
.
21
78 Subsection 5(1) (paragraph (b) of the definition of
law
22
enforcement secrecy provision
)
23
Omit "section 45", substitute "sections 45 and 45B".
24
79 After section 23
25
Insert:
26
23A Transfer of complaints from the Inspector-General of
27
Intelligence and Security
28
If:
29
(a) the Inspector-General of Intelligence and Security transfers
30
all or part of a complaint to the Integrity Commissioner under
31
Schedule 2
Network activity warrants
Part 2
Consequential amendments
82
Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020
No. , 2020
section 32AD of the
Inspector-General of Intelligence and
1
Security Act 1986
; and
2
(b) the complaint or the part of the complaint involves an
3
allegation, or information, that raises a corruption issue;
4
the person who made the complaint is taken to have referred the
5
allegation or information to the Integrity Commissioner under
6
subsection 23(1).
7
80 After subsection 90(3A)
8
Insert:
9
Disclosure to IGIS officials
10
(3B) Nothing in a direction given by the Integrity Commissioner
11
prevents:
12
(a) a person from disclosing hearing material to an IGIS official;
13
or
14
(b) an IGIS official using hearing material, for the purpose of the
15
IGIS official performing a function, or exercising a power, as
16
an IGIS official; or
17
(c) an IGIS official disclosing hearing material to a person who
18
is not an IGIS official if the hearing material could be
19
disclosed to the person under paragraph (1)(b).
20
(3C) However, if the Commissioner is satisfied that the disclosure or use
21
would be reasonably likely to prejudice the performance of
22
functions, or the exercise of powers, of the Integrity
23
Commissioner, the Integrity Commissioner may direct under
24
subsection (1) that subsection (3B) does not apply.
25
(3D) The Integrity Commissioner must consult the Inspector-General of
26
Intelligence and Security as soon as practicable after giving a
27
direction under subsection (1) in accordance with subsection (3C).
28
81 After paragraph 208(3)(a)
29
Insert:
30
(aa) the Inspector-General of Intelligence and Security;
31
Network activity warrants
Schedule 2
Consequential amendments
Part 2
No. , 2020
Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020
83
82 Subsection 208(7)
1
After "or (6)", insert "(except to the Inspector-General of Intelligence
2
and Security for the purpose of performing the Inspector-General's
3
functions)".
4
83 At the end of section 208
5
Add:
6
Notifying the Attorney-General
7
(8) The Integrity Commissioner must notify the Attorney-General if
8
the Integrity Commissioner intends to give section 149 certified
9
information to the Inspector-General of Intelligence and Security.
10
Ombudsman Act 1976
11
84 Subsection 3(1)
12
Insert:
13
examiner
of ACC has the meaning given by the
Australian Crime
14
Commission Act 2002
.
15
85 After section 5A
16
Insert:
17
5B Transfer of complaints from the Inspector-General of
18
Intelligence and Security
19
A complaint is taken to have been made under this Act in respect
20
of action taken by:
21
(a) ACC (except action taken by an examiner of ACC
22
performing functions or exercising powers as an examiner);
23
or
24
(b) the Australian Federal Police;
25
if the Inspector-General of Intelligence and Security transfers all or
26
part of the complaint to the Ombudsman under section 32AD of
27
the
Inspector-General of Intelligence and Security Act 1986
.
28
Schedule 2
Network activity warrants
Part 2
Consequential amendments
84
Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020
No. , 2020
Note:
A complaint or part of a complaint can also be transferred from the
1
Ombudsman to the Inspector-General of Intelligence and Security
2
under section 6F of this Act.
3
86 Subsection 6A(1)
4
After "Ombudsman may", insert "(subject to subsection (3))".
5
87 At the end of section 6A
6
Add:
7
(3) However, the Ombudsman must not, under this section, transfer a
8
complaint or part of a complaint to the Inspector-General of
9
Intelligence and Security.
10
Note:
The Ombudsman may transfer a complaint or part of a complaint
11
made in relation to action taken by ACC to the Inspector-General of
12
Intelligence and Security under section 6F.
13
88 After section 6E
14
Insert:
15
6F Transfer of complaints to the Inspector-General of Intelligence
16
and Security
17
(1) This section applies if the Ombudsman forms the opinion that:
18
(a) a complainant has complained, or could complain, to the
19
Inspector-General of Intelligence and Security under the
20
Inspector-General of Intelligence and Security Act 1986
in
21
relation to action taken by:
22
(i) ACC (except action taken by an examiner of ACC
23
performing functions or exercising powers as an
24
examiner); or
25
(ii) the Australian Federal Police; and
26
(b) the complaint could be more appropriately or effectively
27
dealt with by the Inspector-General of Intelligence and
28
Security.
29
Requirement to consult with Inspector-General of Intelligence and
30
Security
31
(2) The Ombudsman:
32
Network activity warrants
Schedule 2
Consequential amendments
Part 2
No. , 2020
Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020
85
(a) must consult the Inspector-General of Intelligence and
1
Security about the complaint or the part of the complaint that
2
relates to the action; and
3
(b) may decide not to investigate the action, or not to continue to
4
investigate the action.
5
Transfer to Inspector-General of Intelligence and Security
6
(3) If the Ombudsman decides not to investigate, or not to continue to
7
investigate, an action under paragraph (2)(b), and the
8
Inspector-General of Intelligence and Security agrees to the
9
transfer of the complaint or the part of the complaint, the
10
Ombudsman must:
11
(a) transfer the complaint or part to the Inspector-General of
12
Intelligence and Security; and
13
(b) as soon as is reasonably practicable, take reasonable steps to
14
give the complainant written notice that the complaint or part
15
has been transferred; and
16
(c) give the Inspector-General of Intelligence and Security any
17
information or documents relating to the complaint or part
18
that are in the possession, or under the control, of the
19
Ombudsman.
20
Relationship with other provisions
21
(4) This section does not limit the power of the Ombudsman to
22
transfer a complaint or part of a complaint to the Inspector-General
23
of Intelligence and Security under another provision of this Act or
24
any other Act.
25
(5) Subsection 35(2) does not prevent the Ombudsman, or an officer
26
acting on behalf of the Ombudsman, from giving information or
27
documents under paragraph (3)(c) of this section.
28
89 At the end of subsection 35(6)
29
Add:
30
; or (d) from giving information or a document to the
31
Inspector-General of Intelligence and Security in accordance
32
with section 35AB.
33
Schedule 2
Network activity warrants
Part 2
Consequential amendments
86
Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020
No. , 2020
90 After section 35AA
1
Insert:
2
35AB Disclosure of information and documents to
3
Inspector-General of Intelligence and Security
4
(1) This section applies if:
5
(a) either:
6
(i) the Ombudsman obtains information or a document in
7
relation to a Commonwealth agency (within the
8
meaning of the
Inspector-General of Intelligence and
9
Security Act 1986
) in the course of performing a
10
function under this or any other Act; or
11
(ii) the Ombudsman prepares a report or other information
12
in relation to an agency referred to in subparagraph (i);
13
and
14
(b) the Ombudsman is of the opinion that the information,
15
document or report is, or may be, relevant to the performance
16
by the Inspector-General of Intelligence and Security of a
17
function of the Inspector-General.
18
(2) Nothing in this Act precludes the Ombudsman from:
19
(a) disclosing the information; or
20
(b) making a statement that includes the information; or
21
(c) giving the document;
22
to the Inspector-General.
23
91 At the end of subsections 35B(1) and 35C(1)
24
Add ", except to the Inspector-General of Intelligence and Security in
25
accordance with section 35AB".
26
Privacy Act 1988
27
92 After section 49A
28
Insert:
29
Network activity warrants
Schedule 2
Consequential amendments
Part 2
No. , 2020
Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020
87
49B Transfer of complaints from the Inspector-General of
1
Intelligence and Security
2
An individual is taken to have complained to the Information
3
Commissioner under subsection 36(1)
in respect of action taken by
4
ACC or the Australian Federal Police if the Inspector-General of
5
Intelligence and Security transfers all or part of the complaint to
6
the Information Commissioner under section 32AD of the
7
Inspector-General of Intelligence and Security Act 1986
.
8
93 Subsection 50(1) (after paragraph (e) of the definition of
9
alternative complaint body
)
10
Insert:
11
(f) the Inspector-General of Intelligence and Security; or
12
94 After subparagraph 50(2)(a)(iv)
13
Insert:
14
(iva) to the Inspector-General of Intelligence and Security
15
under the
Inspector-General of Intelligence and Security
16
Act 1986
; or
17
95 After subparagraph 50(3)(a)(iv)
18
Insert:
19
(iva) to the Inspector-General of Intelligence and Security
20
under the
Inspector-General of Intelligence and Security
21
Act 1986
; or
22
Public Interest Disclosure Act 2013
23
96 Section 8
24
Insert:
25
ACIC
means the agency known as the Australian Criminal
26
Intelligence Commission established by the
Australian Crime
27
Commission Act 2002
.
28
examiner
of ACIC has the meaning given by the
Australian Crime
29
Commission Act 2002
.
30
Schedule 2
Network activity warrants
Part 2
Consequential amendments
88
Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020
No. , 2020
intelligence function
, in relation to ACIC or the Australian Federal
1
Police, has the meaning given by the
Inspector-General of
2
Intelligence and Security Act 1986
.
3
97 Section 34 (table item 1, column 2, after paragraph (c))
4
Insert:
5
(ca) if the discloser believes on reasonable grounds that:
6
(i) the disclosure relates to action taken by ACIC or the Australian Federal Police
7
in relation to that agency's intelligence functions; and
8
(ii) it would be appropriate for the disclosure to be investigated by the IGIS;
9
the IGIS;
10
98 Section 42 (note 2)
11
After "intelligence agency", insert ", or ACIC or the Australian Federal
12
Police in relation to that agency's intelligence functions".
13
99 Subparagraph 43(3)(a)(iii)
14
After "intelligence agency", insert ", or ACIC or the Australian Federal
15
Police in relation to that agency's intelligence functions".
16
100 After subsection 43(3)
17
Insert:
18
(3A) The authorised officer must not allocate the handling of the
19
disclosure to the IGIS in relation to action taken by an examiner of
20
ACIC performing functions and exercising powers as an examiner.
21
101 Paragraphs 44(1A)(a) and (b)
22
After "intelligence agency", insert ", or ACIC or the Australian Federal
23
Police in relation to that agency's intelligence functions".
24
102 Section 46 (note)
25
After "intelligence agency", insert ", or ACIC or the Australian Federal
26
Police in relation to that agency's intelligence functions".
27
103 At the end of paragraph 50A(1)(b)
28
Add "and".
29
Network activity warrants
Schedule 2
Consequential amendments
Part 2
No. , 2020
Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020
89
104 After paragraph 50A(1)(b)
1
Insert:
2
(c) if the agency is ACIC or the Australian Federal Police--the
3
disclosure does not relate to the intelligence functions of the
4
agency;
5
105 Paragraph 50A(2)(b)
6
Repeal the paragraph, substitute:
7
(b) either:
8
(i) the agency is an intelligence agency; or
9
(ii) the agency is ACIC or the Australian Federal Police,
10
and the disclosure relates to the intelligence functions of
11
the agency;
12
106 Subsection 52(4)
13
Repeal the subsection, substitute:
14
(4) If:
15
(a) the agency is the IGIS or an intelligence agency; or
16
(b) the agency is ACIC or the Australian Federal Police, and the
17
disclosure relates to the intelligence functions of the agency;
18
the IGIS may extend, or further extend, the 90-day period by such
19
additional period (which may exceed 90 days) as the IGIS
20
considers appropriate:
21
(c) on the IGIS's own initiative; or
22
(d) if the agency is not the IGIS--on application made by the
23
principal officer of the agency; or
24
(e) on application made by the discloser.
25
107 Section 58 (note)
26
After "intelligence agency", insert ", or ACIC or the Australian Federal
27
Police in relation to that agency's intelligence functions".
28
108 After paragraph 63(a)
29
Insert:
30
(aa) assisting, in relation to the intelligence functions of ACIC or
31
the Australian Federal Police:
32
(i) principal officers of that agency; and
33
Schedule 2
Network activity warrants
Part 2
Consequential amendments
90
Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020
No. , 2020
(ii) authorised officers of that agency; and
1
(iii) public officials who belong to that agency; and
2
(iv) former public officials who belonged to that agency;
3
in relation to the operation of this Act; and
4
109 After paragraph 63(b)
5
Insert:
6
(ba) conducting educational and awareness programs relating to
7
this Act, in relation to the intelligence functions of ACIC or
8
the Australian Federal Police, to the extent to which this Act
9
relates to:
10
(i) that agency; and
11
(ii) public officials who belong to that agency; and
12
(iii) former public officials who belonged to that agency;
13
and
14
110 Section 63 (note)
15
Repeal the note, substitute:
16
Note:
Section 8A of the
Inspector-General of Intelligence and Security Act
17
1986
extends the IGIS's functions to cover disclosures of information
18
allocated under section 43 of this Act (whether or not they are
19
allocated to the IGIS), if the disclosable conduct with which the
20
information is concerned relates to:
21
(a) an intelligence agency; or
22
(b) ACIC or the Australian Federal Police, in relation to the
23
intelligence functions of the agency.
24
111 Transitional
--section 52 of the
Public Interest Disclosure
25
Act 2013
26