Feeds

Oz anti-gang law hits email, maybe torrents too

Consorting offence now includes 'electronic communication'

HP ProLiant Gen8: Integrated lifecycle automation

The Australian State of New South Wales has amended its Crimes Act with a new definition of ‘consorting’ that makes electronic communications evidence of participation in criminal groups.

The new law is a second attempt at making it hard for motorcycle gangs to do business. Such gangs are suspected of playing a significant role in Australia’s illegal drugs trade and have also been involved in drive by shootings and a firebombing in suburban Sydney. In 2009 two rival gangs brawled at Sydney Airport, resulting in the murder of one gang member who was bludgeoned to death with a bollard. Those incidents made motorcycle gangs a hot political issue and led to politicians of all persuasions playing the law and order card often and gleefully.

The State’s first attempt to stop motorcycle gangs foundered in the High Court (Australia’s ultimate court), which found a law aimed at preventing association between members exceeded the powers available to NSW’s Parliament and courts. That law was also criticised for sweeping definitions that some feared meant it could be applied to many sorts of association.

The new Crimes Amendment (Consorting and Organised Crime) Bill 2012 tries to improve on previous legislation by lowering the burden of proof required to show that someone participated in a criminal group. Defendants will now have to disprove that they “ … knew, or ought reasonably to have known …” that their activity “… contributed to the occurrence of a criminal activity.”

That activity could include email and mobile phone calls. Both were mentioned by NSW Premier Barry O’Farrell today at a news conference, where he said the new law “brings the offence of consorting up to date” by including those two media.

The wording of the Bill is, however, rather broad as it states:

“The new offence also makes it clear that consorting can occur in person or by any other means, including by electronic or other form of communication.”

We’ll wait for lawyers (all the good ones we know are out drinking expensive champagne at the time of writing) to tell us if that swarm you’re currently torrenting with can now be considered a criminal conspiracy given that you really should know that file sharing that new episode of The Simpsons is illegal and you’re doing it with other people who know the same thing, using electronic communication.

We'll update once we can get some lawyers on the phone. Watch this space. ®

Bridging the IT gap between rising business demands and ageing tools

More from The Register

next story
Arrr: Freetard-bothering Digital Economy Act tied up, thrown in the hold
Ministry of Fun confirms: Yes, we're busy doing nothing
Help yourself to anyone's photos FOR FREE, suggests UK.gov
Copyright law reforms will keep m'learned friends busy
ONE EMAIL costs mining company $300 MEEELION
Environmental activist walks free after hoax sent share price over a cliff
Apple smacked with privacy sueball over Location Services
Class action launched on behalf of 100 million iPhone owners
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
UK government officially adopts Open Document Format
Microsoft insurgency fails, earns snarky remark from UK digital services head
You! Pirate! Stop pirating, or we shall admonish you politely. Repeatedly, if necessary
And we shall go about telling people you smell. No, not really
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.