House debates

Thursday, 12 February 2009

Law and Justice Legislation Amendment (Identity Crimes and Other Measures) Bill 2008

Second Reading

8:49 pm

Photo of Sussan LeySussan Ley (Farrer, Liberal Party, Shadow Minister for Justice and Customs) Share this | Hansard source

I rise to speak tonight on the Law and Justice Legislation Amendment (Identity Crimes and Other Measures) Bill 2008. Identity fraud is Australia’s fastest growing crime, with hundreds of thousands of victims and an estimated cost of more than $1 billion each year. It is evident that the rapid increase in technology and computer use is partly behind this emerging threat.

Identity crimes are increasing due to advances in technology in the banking sector and the rapid increase of financial transactions via the internet and use of credit cards. An ABS report released late last year found that in 2007 alone more than 800,000 people, or five per cent of the population aged 15 and older, fell victim to at least one instance of fraud. Identity fraud accounted for almost half a million victims, with 77 per cent of these reporting fraudulent transactions on their credit or bank cards. The remaining 23 per cent suffered identity theft involving unauthorised use of their personal details.

This bill implements changes to the identity crime offences recommended by the Model Criminal Law Officers Committee’s final report on identity crime. It seeks to insert three new identity crime offences into a new part 9.5 of the Criminal Code Act 1995, because, with the exception of South Australia and Queensland, it is not currently an offence in Australia to assume or steal another person’s identity, except in restricted circumstances. Of course, the existing offences in the Criminal Code, such as theft, forgery, fraud and credit card skimming, exist but they do not adequately cover the varied and evolving types of identity crime—for instance, malicious software and phishing. The proposed offences are framed in broad and technology-neutral language to ensure that, as new forms of identity crime emerge, these offences will continue to be valid.

The offences include: firstly, dealing in identification information with the intention of committing, or facilitating the commission of, a Commonwealth indictable offence, punishable by up to five years imprisonment—that is, dealing in identification information; secondly, possession of identification information with the intention of committing, or facilitating the commission of, conduct that constitutes the dealing offence, punishable by up to three years imprisonment—that is, possessing the identification information; and thirdly, possession of equipment to create identification documentation with the intention of committing, or facilitating the commission of, conduct that constitutes the dealing offence, punishable by up to three years imprisonment.

The bill includes amendments to the Australian Federal Police Act 1979 to streamline the processes for alcohol and other drug testing under the act and to expand the range of conduct for which the commissioner may grant awards. The bill also makes several minor amendments, establishing a more consistent approach to the restrictions placed upon the disclosure of sensitive AUSTRAC information, and strengthens safeguards to protect against the disclosure of sensitive AUSTRAC information. It also corrects a couple of drafting errors and repeals the provision no longer required.

I would like to mention the coalition’s strong record on identity security. In April 2005, the coalition government announced the national identity security strategy to combat the misuse of stolen or assumed identities in the provision of government services. To support development of the strategy, the coalition allocated funding of $5.9 million over two years in the 2005-06 budget, including funding for a pilot document verification service, DVS.

The Council of Australian Governments, COAG, considered identity security at its special meeting on counterterrorism on 27 September, 2005. COAG agreed to the development and implementation of a national identity security strategy, underpinned by an intergovernmental agreement.

COAG also agreed to the development and implementation of a national document verification service to combat the misuse of false and stolen identities and to the investigation of the means by which reliable, consistent and nationally interoperable biometric security measures could be adopted by all jurisdictions.

The coalition announced in the 2006–07 budget that the identity of Australians would be further protected with the rollout of the national document verification service. The national DVS was rolled out with funding of $28.3 million, including building on the prototype service trialled during 2006. So the coalition does have a strong record in tackling the issues surrounding identity security. It is something that we are proud of, and I am pleased that the government is continuing with measures that would have been instigated well over a year ago. It certainly needs to be vigilant as this emerging threat continues to grow.

Under the coalition government, the Model Criminal Law Officers Committee released a discussion paper on identity crime and, subsequently, its final report in March 2008. The bill implements the recommendations made by the committee. The report highlights national security impacts and the different forms in which identity crime occurs. As the report explains, it is important to note that it is not only individuals who commit identity crime related offences; it has been recognised that organised crime groups are becoming increasingly involved in identity crime—for example, to facilitate the smuggling or trafficking of people. The 9-11 hijackers used fictitious social security numbers, false identities and fraudulent identification documents. A report issued by the French Senate in 2005 indicated that terrorist networks have systematically used false identity documents to obtain employment overseas, to finance their terrorist activities and to avoid detection.

There are several ways in which identity crime occurs. The first is general online techniques. Identity related criminal activity is constantly evolving as new ways to gain access to or manipulate identity data online are found. A common online method of obtaining personal details is that of phishing. Phishing occurs when an identity fraudster sounds out fake emails claiming to be from a trusted organisation such as a bank. Ordinarily, emails claiming to be from a bank are sent to the victim, directing the receiver to a fake website designed to look like the bank’s real website. The victim enters his or her details, these are captured and subsequently used to withdraw funds from the victim’s account.

There are other online techniques that fraudsters use to obtain one’s personal identification information. Two of these are: using a key-logging device on computers and stealing personal information that is stored in computer databases, and infiltration of government organisations or financial institutions that store large amounts of personal information.

A second way in which identity crime occurs is via online social interaction, in particular social networking, which has grown in popularity in recent years. Unfortunately, some users of these networking sites, such as Facebook or MySpace, display publicly personal information that puts them at risk of identity theft or fraud. Displaying personal information such as one’s email address, name and birthday are enough to put a person at risk of identity theft, as it enables the fraudster to steal the victim’s identity and open accounts in their name. An example of a scam using Facebook involves Nigerian scammers who trick users by taking over other user’s accounts and then posing as their friends. They then send a plea for help to their ‘friend’, saying they are stranded in Lagos, Nigeria and that they need to borrow $500 for a ticket home.

A third way is consumer scams or frauds which claim to offer lottery, jobs or other attractive-sounding opportunities. Consumer scams are essentially crimes of dishonesty such as counterfeiting, forgery, online deception and theft that target individuals wishing to purchase goods and services. These consumer scams are often used by organised criminal outfits to gather personal information, which is then on-sold to other criminal groups.

In March 2005, the coalition government, as part of a whole-of-government approach to combat consumer fraud and scams, established the Australasian Consumer Fraud Taskforce. It involved all governmental regulatory agencies and departments in Australia and New Zealand that have responsibility for consumer protection.

One of Australia’s best known media identities, with a voice that is instantly recognisable to millions, John Laws, was recently targeted by identity thieves who forged his signature and raided his bank account. Mr Laws is the latest victim of a gang that is running a series of identity scams across New South Wales, much like the famous Catch Me if You Can con man, Frank Abagnale Jr. The group is responsible for stealing millions of dollars from banks by stealing and manipulating personal details, such as bank statements that are mailed to private homes. Mr Laws was not aware that he had been caught up in identity fraud until he received a call informing him of an outstanding debt. It was not until his personal assistant discovered that two cheques he had mailed had been intercepted and cashed into an unknown bank account that alarm bells began ringing. One of the alleged culprits who targeted Mr Laws is understood to be working as part of a Bonnie and Clyde set-up with a female companion. After they had stolen cheques, worth $15,000, they were able to re-route the money, using elaborate methods, including forging his signature, to a bank account belonging to Peter Raymond Murphy, a fictitious identity, set up with fake ID cards. Examples such as this show that identity theft can indeed happen to anyone, no matter how well known. It is a reminder that the government needs to be extremely vigilant and to keep up to date with new evolving methods that these criminal organisations are using.

In conclusion, as mentioned previously, the coalition support the changes recommended by the Model Criminal Law Officers Committee. We support ongoing efforts to combat identity crimes and we believe in real action on identity crime.

Comments

No comments