{"id":20096,"date":"2018-11-25T21:37:31","date_gmt":"2018-11-25T21:37:31","guid":{"rendered":"http:\/\/af2a1cf7-5149-4a72-be2b-57efd38a5fd5"},"modified":"2018-11-25T21:37:31","modified_gmt":"2018-11-25T21:37:31","slug":"how-government-haste-is-ruining-its-own-anti-encryption-law","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/how-government-haste-is-ruining-its-own-anti-encryption-law\/","title":{"rendered":"How government haste is ruining its own anti-encryption law"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/zdnet2.cbsistatic.com\/hub\/i\/r\/2018\/09\/20\/813f3fab-1a09-45cd-bae0-0ea4add20933\/thumbnail\/770x578\/1684b9ece946ec9b974cac08576ad159\/dutton.png\" class=\"ff-og-image-inserted\"\/><\/div>\n<p>Last Thursday, Prime Minister Scott Morrison called for the <a href=\"https:\/\/www.aph.gov.au\/Parliamentary_Business\/Bills_Legislation\/Bills_Search_Results\/Result?bId=r6195\" target=\"_blank\" rel=\"noopener noreferrer\">Assistance and Access Bill<\/a> to be passed by Parliament <a href=\"https:\/\/www.zdnet.com\/article\/australian-pm-insists-on-encryption-busting-bill-being-passed-in-next-sitting-fortnight\/\">within two weeks<\/a>.<\/p>\n<p>&#8220;Our police, our agencies need these powers now,&#8221; he said. But I don&#8217;t think that&#8217;s the reason for the rush.<\/p>\n<p>The Bill is 172 pages of complex legislation. Setting up the systems it enables won&#8217;t be quick. A few weeks either way won&#8217;t make much difference to the big picture.<\/p>\n<p>No, a more likely reason is to reduce the level of scrutiny the Bill faces before it becomes law.<\/p>\n<p>After all, the Comms Alliance says it&#8217;s <a href=\"https:\/\/www.zdnet.com\/article\/australian-encryption-bill-raises-bar-for-outrageous-legislation-comms-alliance\/\">outrageous<\/a>, UN Special Rapporteur on the right to privacy says it&#8217;s <a href=\"https:\/\/www.zdnet.com\/article\/australian-encryption-busting-bill-fatally-flawed-un-special-rapporteur\/\">fatally flawed<\/a>, and the government&#8217;s own human rights watchdog committee says it <a href=\"https:\/\/www.zdnet.com\/article\/australias-anti-encryption-legislation-fails-to-address-human-rights-concerns-committee\/\">fails to address human rights concerns<\/a>.<\/p>\n<p>Another probable reason is to get it passed before the end of the year, because there&#8217;s likely to be a federal election early in the new year, which means a new parliament, and any legislation not passed by then goes into the bin.<\/p>\n<p>The Bill is currently being <a href=\"https:\/\/www.aph.gov.au\/Parliamentary_Business\/Committees\/Joint\/Intelligence_and_Security\/TelcoAmendmentBill2018\" target=\"_blank\" rel=\"noopener noreferrer\">reviewed<\/a> by the Parliamentary Joint Committee on Intelligence and Security (PJCIS), and the committee was scheduled to hear evidence up to December 4. With Parliament&#8217;s last day for 2018 being December 6, that wouldn&#8217;t have left time to meet Morrison&#8217;s deadline.<\/p>\n<section class=\"sharethrough-top\" data-component=\"medusaContentRecommendation\" data-medusa-content-recommendation-options=\"{&quot;promo&quot;:&quot;promo_ZD_recommendation_sharethrough_top_in_article_desktop&quot;,&quot;spot&quot;:&quot;dfp-in-article&quot;}\">\n<\/section>\n<p><strong>See: <a href=\"https:\/\/www.zdnet.com\/article\/no-backdoors-for-australian-encryption-just-a-riddling-of-ratholes\/\" target=\"_blank\">No backdoors for Australian encryption, just a riddling of ratholes<\/a><\/strong><\/p>\n<p>That was &#8220;fixed&#8221; on Friday night, when an additional PJCIS hearing was scheduled for this Monday, in addition to those on Tuesday and Friday, and the December 4 hearing was cancelled. Such was the haste, as of Monday morning the list of witnesses had not been released.<\/p>\n<p>This still leaves just four days for the committee to review all the evidence and write a report, and for parliament to draft and debate any amendments. Ludicrous, of course, but that&#8217;s the government&#8217;s plan.<\/p>\n<p>You can understand why the committee has been asking witnesses&#8217; submissions to suggest specific changes to the wording of the legislation, though of course that means that broader conceptual issues won&#8217;t be addressed.<\/p>\n<p>Now it&#8217;s possible for the Senate to derail the government&#8217;s haste train, but that would need the votes of the Labor senators. Australia is plagued by a bipartisan approach to national security, which means that opposition parties rarely criticise national security legislation. Labor won&#8217;t want to be wedged into appearing soft on terrorism, so they&#8217;re bound to vote with the government.<\/p>\n<p><strong>Read: <a href=\"https:\/\/www.zdnet.com\/article\/internet-architecture-board-warns-australian-encryption-busting-laws-could-fragment-the-internet\/\" target=\"_blank\">Internet Architecture Board warns Australian encryption-busting laws could fragment the internet<\/a><\/strong><\/p>\n<p>So, the Assistance and Access Bill will pass with little real scrutiny, and a small dog&#8217;s breakfast of hasty amendments. Even if you agree with the concept of that the Bill is trying to do, it&#8217;ll be badly written.<\/p>\n<p>If you think the news media might do the scrutiny, then you&#8217;re a hopeless romantic. Canberra press gallery journalists will be busy doing the usual horse-race journalism about the political polling figures after Saturday&#8217;s state election in Victoria.<\/p>\n<p>As it happens, ridiculously short timelines have been a feature of this Bill, as has a lack of transparency.<\/p>\n<p>The <a href=\"https:\/\/www.zdnet.com\/article\/no-backdoors-for-australian-encryption-just-a-riddling-of-ratholes\/\">first draft<\/a> was published by the Department of Home Affairs on August 14, with the deadline for public submissions just four weeks later, on September 10. But just ten days later, revised legislation was introduced into parliament.<\/p>\n<p>Meanwhile, Home Affairs has <a href=\"https:\/\/twitter.com\/joshgnosis\/status\/1065795572873887744\" target=\"_blank\" rel=\"noopener noreferrer\">refused<\/a> to release 455 of those public submissions, even though only 24 were specifically requested to be kept private. According to BuzzFeed journalist Josh Taylor, a Freedom of Information request was refused because it would take them too long to consult all 455 people or organisations.<\/p>\n<h3>Related Coverage<\/h3>\n<p><strong><a href=\"https:\/\/www.zdnet.com\/article\/australian-pm-insists-on-encryption-busting-bill-being-passed-in-next-sitting-fortnight\/\">Australian PM insists on encryption-busting Bill being passed in next sitting fortnight<\/a><\/strong><\/p>\n<p>Australian agencies need the power to intercept encrypted content, Australian Prime Minister Scott Morrison said on Thursday.<\/p>\n<p><strong><a href=\"https:\/\/www.zdnet.com\/article\/dutton-leans-on-encryption-laws-committee-to-hurry-up\/\">Dutton leans on encryption laws committee to hurry up<\/a><\/strong><\/p>\n<p>Home Affairs Minister Peter Dutton wants proposed legislation allowing police to read encrypted messages made law soon, after a terror plot was foiled.<\/p>\n<p><strong><a href=\"https:\/\/www.zdnet.com\/article\/security-guarantees-will-be-meaningless-under-encryption-busting-laws-senetas\/\">Security guarantees will be meaningless under encryption-busting laws: Senetas<\/a><\/strong><\/p>\n<p>If an Australian company is compelled by legislation to deny that a capability in its products exists, then its assertions are meaningless, security company Senetas has said.<\/p>\n<p><strong><a href=\"https:\/\/www.zdnet.com\/article\/theres-bigger-fish-to-fry-than-anti-encryption-laws-telstra-security-chief\/\">There&#8217;s &#8216;bigger fish to fry&#8217; than anti-encryption laws: Telstra security chief<\/a><\/strong><\/p>\n<p>What cyber crimefighters really need are better global collaboration and faster access to IP address data, not the content of encrypted data communications, according to Jacqueline McNamara.<\/p>\n<p><strong><a href=\"https:\/\/www.zdnet.com\/article\/dutton-frames-encryption-bill-debate-as-battle-between-protecting-silicon-valley-or-protecting\/\">Dutton frames Encryption Bill debate as battle between protecting Silicon Valley or protecting Australians<\/a><\/strong><\/p>\n<p>Australian Minister for Home Affairs Peter Dutton claims the Bill is already watered down, and Labor should support it.<\/p>\n<p>READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/how-government-haste-is-ruining-its-own-anti-encryption-law\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Australia&#8217;s proposed encryption-busting legislation is one of the most significant changes to surveillance laws in a generation, but the government is skimping on the review processes.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":20097,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-20096","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How government haste is ruining its own anti-encryption law 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/how-government-haste-is-ruining-its-own-anti-encryption-law\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How government haste is ruining its own anti-encryption law 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/how-government-haste-is-ruining-its-own-anti-encryption-law\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2018-11-25T21:37:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/11\/how-government-haste-is-ruining-its-own-anti-encryption-law.png\" \/>\n\t<meta property=\"og:image:width\" content=\"770\" \/>\n\t<meta property=\"og:image:height\" content=\"578\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-government-haste-is-ruining-its-own-anti-encryption-law\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-government-haste-is-ruining-its-own-anti-encryption-law\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"How government haste is ruining its own anti-encryption law\",\"datePublished\":\"2018-11-25T21:37:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-government-haste-is-ruining-its-own-anti-encryption-law\\\/\"},\"wordCount\":793,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-government-haste-is-ruining-its-own-anti-encryption-law\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/11\\\/how-government-haste-is-ruining-its-own-anti-encryption-law.png\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-government-haste-is-ruining-its-own-anti-encryption-law\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-government-haste-is-ruining-its-own-anti-encryption-law\\\/\",\"name\":\"How government haste is ruining its own anti-encryption law 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-government-haste-is-ruining-its-own-anti-encryption-law\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-government-haste-is-ruining-its-own-anti-encryption-law\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/11\\\/how-government-haste-is-ruining-its-own-anti-encryption-law.png\",\"datePublished\":\"2018-11-25T21:37:31+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-government-haste-is-ruining-its-own-anti-encryption-law\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-government-haste-is-ruining-its-own-anti-encryption-law\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-government-haste-is-ruining-its-own-anti-encryption-law\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/11\\\/how-government-haste-is-ruining-its-own-anti-encryption-law.png\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/11\\\/how-government-haste-is-ruining-its-own-anti-encryption-law.png\",\"width\":770,\"height\":578},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-government-haste-is-ruining-its-own-anti-encryption-law\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How government haste is ruining its own anti-encryption law\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How government haste is ruining its own anti-encryption law 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/how-government-haste-is-ruining-its-own-anti-encryption-law\/","og_locale":"en_US","og_type":"article","og_title":"How government haste is ruining its own anti-encryption law 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/how-government-haste-is-ruining-its-own-anti-encryption-law\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2018-11-25T21:37:31+00:00","og_image":[{"width":770,"height":578,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/11\/how-government-haste-is-ruining-its-own-anti-encryption-law.png","type":"image\/png"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/how-government-haste-is-ruining-its-own-anti-encryption-law\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/how-government-haste-is-ruining-its-own-anti-encryption-law\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"How government haste is ruining its own anti-encryption law","datePublished":"2018-11-25T21:37:31+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/how-government-haste-is-ruining-its-own-anti-encryption-law\/"},"wordCount":793,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/how-government-haste-is-ruining-its-own-anti-encryption-law\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/11\/how-government-haste-is-ruining-its-own-anti-encryption-law.png","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/how-government-haste-is-ruining-its-own-anti-encryption-law\/","url":"https:\/\/www.threatshub.org\/blog\/how-government-haste-is-ruining-its-own-anti-encryption-law\/","name":"How government haste is ruining its own anti-encryption law 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/how-government-haste-is-ruining-its-own-anti-encryption-law\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/how-government-haste-is-ruining-its-own-anti-encryption-law\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/11\/how-government-haste-is-ruining-its-own-anti-encryption-law.png","datePublished":"2018-11-25T21:37:31+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/how-government-haste-is-ruining-its-own-anti-encryption-law\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/how-government-haste-is-ruining-its-own-anti-encryption-law\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/how-government-haste-is-ruining-its-own-anti-encryption-law\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/11\/how-government-haste-is-ruining-its-own-anti-encryption-law.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/11\/how-government-haste-is-ruining-its-own-anti-encryption-law.png","width":770,"height":578},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/how-government-haste-is-ruining-its-own-anti-encryption-law\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"How government haste is ruining its own anti-encryption law"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/20096","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=20096"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/20096\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/20097"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=20096"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=20096"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=20096"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}