technology lawyer

Cryptocurrency and hacking offences introduced to Parliament

HomeBlogTechnology lawInternet lawCryptocurrency and hacking offences introduced to Parliament

by

reviewed by

Malcolm Burrows

The Crimes Legislation Amendment (Ransomware Action Plan) Bill 2022 (Bill) seeks to amend the Criminal Code Act 1995 (Criminal Code), the Crimes Act 1914 and the Proceeds of Crime Act 2002 to bring historical legislation into the modern state of play as it relates to threats of ransomware.  The new powers under this Bill complement existing search and seizure powers, which we have previously considered here.

Geographical considerations

Importantly, at the outset, the Bill does away with geographical constraints upon offending.  Whilst it may have been the case that to be charged with a cyber type of offence the offending would need to have occurred within Australia, the Bill introduces an ‘impact-focused’ method of determining jurisdiction.  That is, instead of focusing on the location at which the offending occurs, the Bill is concerned of the location upon which the offending impacts.

Where the conduct constituting the alleged offence occurs wholly outside Australia and it constitutes an offence relating to unauthorised:

  • access to data;
  • modification of data;
  • impairment of electronic communication of data to or from a computer; or
  • impairment of the reliability, security or operation of any data; and

the data is under the control of an Australian person or corporation and is reasonably capable of being accessed within Australia, an offender will not escape liability for the offence based on the geographical externality to Australia.[1]

Cryptocurrency seizures

Schedule 3 of the Bill inserts various sections into the Crimes Act 1914.  Arguably, most interestingly amongst them is section 1, which inserts section 3C(1) to define a digital asset and its seizure as follows:

digital asset means:

  • a digital representation of value or rights (including rights to property), the ownership of which is evidenced cryptographically and that is held and transferred electronically by:
  • a type of distributed ledger technology; or
  • another distributed cryptographically verifiable data structure; or
  • a right or thing prescribed by the regulations;

but does not include any right or thing that, under the regulations, is taken to be a digital asset for the purposes of this Part.

seize, for a digital asset, has a meaning affected by subsection 3FA(3).

 The legislative definition does not outright state ‘cryptocurrencies’, but it is perfectly clear for all who read that it is indeed such currency which is being referred to.  Indeed, a cryptocurrency is a digital representation of value with ownership cryptographically evidenced and is tradeable on distributed ledge technology.

Therefore, it is prudent to consider the circumstances in which this Bill would allow the government to seize cryptocurrencies.

If a warrant is in force in relation to either a premises or a person, an executing officer may seize a digital asset if:

  • in the course of exercising the warrant, the officer finds one or more things that suggest the existence of the digital asset; and
  • the officer suspects the digital asset to be:
    • evidential material in relation to an offence to which the warrant relates; or
    • evidential material in relation to another offence that is an indictable offence; or
    • evidential material or tainted property; and
  • the officer reasonably suspects that seizing the digital asset is necessary to prevent its concealment, loss or destruction, or its use in committing an offence.[2]

It is clear that there needs to be a sufficient connection between the digital asset and an offence before an officer is authorised to seize the digital asset.  Where an officer is authorised to do so by transferring the digital asset from an existing digital wallet to a digital wallet controlled by the Australian Federal Police.[3]  Notably, the Explanatory Memorandum to the Bill indicates that an officer is not confined merely to the above method of seizing digital assets.[4]  It appears Parliament intends to provide very broad powers to officers, in certain circumstances, to seize digital assets.

Hacking offences

The Bill establishes an offence of data extortion with penalty of imprisonment of ten (10) years.  Where a person without authorisation accesses, modifies or impairs data held in a computer and then, via a carriage service, makes a threat to the owner of the data compelling them to do or omit to do an act.[5]

The Bill also established an offence of dealing with data.  Where a person obtains, accesses, modifies or releases data by use of a carriage service and was not authorised to access or modify said data, they will have committed an offence and be liable for five (5) years imprisonment.[6]

The most severe penalty for offending introduced by the Bill is in relation to aggravated computer offences, whereby an offender may be liable to twenty-five (25) years imprisonment.  Where an offender commits an underlying offence, such as unauthorised access or modification, but that act is targeted directly or indirectly towards ‘critical infrastructure’, it will be considered aggravating offending.[7]  Critical infrastructure is expansively defined under section 9 of the Security of Critical Infrastructure Act 2018.

Takeaways

The Bill provides a novel power for law enforcement to seize digital assets such as cryptocurrencies and provides further protection against cyber crimes via the introduction of more severe penalties and the removal of geographical constraints, which may otherwise have created difficulty in prosecuting international offenders.

Links and further references

Legislation

Crimes Act 1914

Crimes Legislation Amendment (Ransomware Action Plan) Bill 2022

Criminal Code Act 1995

Explanatory Memorandum to Crimes Legislation Amendment (Ransomware Action Plan) Bill 2022

Proceeds of Crime Act 2002

Security of Critical Infrastructure Act 2018

Further information about cryptocurrency seizure and hacking offences

If you need advice on cryptocurrency seizure and hacking offences, contact us for a confidential and obligation-free discussion:

Doyles Recommended TMT Lawyer 2024

[1] Bill section 1 introducing section 476/3 to the Code.

[2] Bill Schedule 3 section 7 inserting section 3FA(1) and (2) into the Crimes Act 1914; Bill Schedule 3 s 11 inserting section 288A(1) in the Proceeds of Crime Act 2002.

[3] Bill Schedule 3 section 7 inserting section 3FA(3) into the Crimes Act 1914; Bill Schedule 3 s 11 inserting section 288A(2) in the Proceeds of Crime Act 2002.

[4] Explanatory memorandum at [144].

[5] Bill Schedule 1 section 2 inserting section 477.4 into the Criminal Code.

[6] Bill Schedule 1 section 2 inserting section 478.5 into the Criminal Code.

[7] Bill Schedule 1 section 12 inserting sections 479.1 and 479.2 into the Criminal Code.


Related insights about cryptocurrency seizure and hacking offences

  • Federal parliament passes cyber security laws

    Federal parliament passes cyber security laws

    On 25 November 2024, the Australian Parliament passed a suite of legislation, collectively referred to by the Australian Government as the Cyber Security Legislative Package 2024.  The purported impetus for this legislation was a series of high-profile data breaches in 2022 and 2023.

    Read more …

  • Domain name disputes – a summary of the process

    Domain name disputes – a summary of the process

    A domain name is a string of text that maps to an alphanumeric IP address, enabling users to access websites through client-side software.[1]  Domains can be valuable business assets, and they frequently become the subject of disputes regarding the legitimacy of their registration among organisations with competing rights.

    Read more …

  • New OAIC guidance on Artificial Intelligence

    New OAIC guidance on Artificial Intelligence

    On 21 October 2024, the Office of the Australian Information Commissioner (OAIC) published two (2) new guides on artificial intelligence (AI), purportedly in effort to make privacy compliance easier for business.

    Read more …

  • Artificial Intelligence defined – why no uniform approach?

    Artificial Intelligence defined – why no uniform approach?

    Artificial Intelligence (AI) is commonly thought of as the capacity of computer systems to execute tasks that usually need human intelligence, such as learning, reasoning, and making decisions.[1]  It covers a range of specialised fields, each focusing on different functions.  For example, machine learning allows computers to learn from data, computer vision enables them to…

    Read more …

  • New USPTO guidelines on AI assisted inventions

    New USPTO guidelines on AI assisted inventions

    In response to the Biden administration’s Executive Order on the Safe, Secure, and Trustworthy Development and Use of Artificial Intelligence on 30 October 2023, which outlined policies and principles to promote responsible Artificial Intelligence innovation and competition, the United States Patent and Trademark Office (USPTO) issued inventorship guidance for artificial intelligence (AI) assisted inventions.  These…

    Read more …

  • Software developer obtains Court order – names behind IP addresses

    Software developer obtains Court order – names behind IP addresses

    Justice Burley of the Federal Court of Australia in the case of Siemens Industry Software Inc v Telstra Corporation Limited [2020] FCA 901 ordered that Telstra, within fourteen (14) days, provide to Siemens all documents in its control relating to the identity of certain Telstra Account holders.  Those account holders were suspected by Siemens of…

    Read more …

  • The Digital ID Bill 2023 (Cth)

    The Digital ID Bill 2023 (Cth)

    On 30 November 2023, the Digital ID Bill 2023 (Cth) and the Digital ID (Transitional and Consequential Provisions) Bill 2023 (Digital ID Bills) were introduced in the Australian Senate.  Digital IDs are designed to provide individuals with a convenient way to verify their identity when completing certain online transactions and dealing with government and certain…

    Read more …

  • Misinformation and Disinformation Bill 2023 – exposure draft

    Misinformation and Disinformation Bill 2023 – exposure draft

    The Communications Legislation Amendment (Combatting Misinformation and Disinformation) Bill 2023 (Cth) (Misinformation Bill) was announced by the Department of Infrastructure, Transport, Regional Development, Communication and the Arts (DITRDCA) in January 2023.  The Misinformation Bill is aimed at restricting the flow of misinformation and disinformation by providing the Australian Communications and Media Authority (ACMA) with increased…

    Read more …

  • What are adequate cyber security measures?

    What are adequate cyber security measures?

    The adequacy of cyber security measures was considered in the case of Australian Securities and Investments Commission v RI Advice Group Pty Ltd [2022] FCA 496 (ASIC v Ri Advice Group).  One of the issues raised was whether the respondent had adequate cyber security and cyber resilience in place across its network of financial advisors. …

    Read more …

Send this to a friend