Feeds

Gov and telcos in Aussie wiretap death match

'Wiretaps are fine. You are wrong, wrong, wrong!'

Combat fraud and increase customer satisfaction

When it comes to telecomms technology, who are you going to trust? Senior executives in some of Australia’s largest telcos? Or a high-ranking bureaucrat from the Federal Attorney-General’s Department?

It’s a close call, but lines were drawn and disagreements laid out in the open yesterday as the Senate's Legal ad Constitutional Affairs Committee (pdf) met to review Schedule 2 of the Telecommunications Interception and Intelligence Services Legislation Amendment Bill.

The Bill itself is part of legislation that would amend telecommunications interception legislation, making it easier for law enforcement to wiretap new technology as it emerges. While business leaders condemned the proposal for imposing potentially "onerous requirements" on the Australian telco industry, the top civil servant hit back, describing their attitude as quite simply "wrong, wrong, wrong".

The controversial Schedule 2 requires telecommunications providers to notify the government of any network change to the system that is likely to have a "material adverse effect" on the ability of the organisation to comply with its other obligations under the bill or existing legislation.

According to Australian Mobile Telecommunications Association (AMTA), chief executive, Chris Althaus, this proposal was of major concern and should be scrapped. He told the Committee: “It is a schedule which is providing what we regard as onerous requirements on industry, and that has the potential to limit partnerships and outsourcing by Australian companies.

"It creates a non-technology-neutral situation with uneven requirements in Australia versus other places in the world. It certainly will create uncertainty and high levels of risk. It certainly will delay and potentially limit the rollout of innovation and innovative products and constrain our members and the industry’s ability to assemble competitive packages."

Mr Althaus was seconded by Telstra manager, future networks and services, regulatory operations, Michael Ryan, who warned that the proposal could place an additional burden on telecommunications companies looking to provide cloud services.

He said: "Providers [of Cloud services] in Australia can be telecommunications related companies or they can be independent software related companies, so we end up with some real discrepancies with what is proposed in Schedule 2 in that if a telecommunications company wants to package up some Cloud computing with some telecommunications services it is providing it appears to get caught up in Schedule 2 but a purely software house apparently wouldn’t.

"Likewise these services can be supplied directly from overseas, but if we want to be involved and make it easier for our customers by putting together a total package of services then we seem to get caught up with additional notification required by this process."

Combat fraud and increase customer satisfaction

More from The Register

next story
Virgin Media so, so SORRY for turning spam fire-hose on its punters
Hundreds of emails flood inboxes thanks to gaffe
A black box for your SUITCASE: Now your lost luggage can phone home – quite literally
Breakfast in London, lunch in NYC, and your clothes in Peru
AT&T threatens to pull out of FCC wireless auctions over purchase limits
Company wants ability to buy more spectrum space in auction
Turnbull leaves Australia's broadband blackspots in the dark
New Statement of Expectations to NBN Co offers get-out clauses for blackspot builds
Facebook claims 100 MEEELLION active users in India
Who needs China when you've got the next billion in your sights?
Facebook splats in-app chat, whacks brats into crack yakety-yak app
Jibber-jabbering addicts turfed out just as Zuck warned
Google looks to LTE and Wi-Fi to help it lube YouTube tubes
Bandwidth hogger needs tube embiggenment if it's to succeed
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.