{"id":33664,"date":"2020-03-05T05:50:44","date_gmt":"2020-03-05T05:50:44","guid":{"rendered":"http:\/\/45bbf3a1-1136-46da-956c-bf4f31184786"},"modified":"2020-03-05T05:50:44","modified_gmt":"2020-03-05T05:50:44","slug":"national-security-legislation-monitor-wont-be-recommending-encryption-bill-repeal","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/national-security-legislation-monitor-wont-be-recommending-encryption-bill-repeal\/","title":{"rendered":"National Security Legislation Monitor won&#8217;t be recommending Encryption Bill repeal"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/zdnet3.cbsistatic.com\/hub\/i\/r\/2018\/11\/07\/f18d6b4d-5413-4ced-ab05-25425bd09741\/thumbnail\/770x578\/95c95ac18dd1d23f1aba9d36b29fdf38\/istock-533556980.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>Australia&#8217;s Independent National Security Legislation Monitor (INSLM), Dr James Renwick, will not be recommending for the country&#8217;s encryption-busting Bill to be repealed and sent back for redrafting when he turns in his <a href=\"https:\/\/www.zdnet.com\/article\/australian-encryption-laws-sent-off-to-nat-sec-legislation-monitor-for-review\/\">report by June 30<\/a>.&nbsp;<\/p>\n<p>Renwick, who appeared at the Lowy Institute in Sydney before his resignation from the post of INSLM &#8212; which will occur after he turns in the report commissioned by the Parliamentary Joint Committee on Intelligence and Security (PJCIS) &#8212; took the opportunity to touch on what his work to-date regarding the <em>Telecommunications and Other Legislation Amendment (Assistance and Access) Act 2018<\/em> (TOLA Act) has been.<\/p>\n<p>The TOLA Act was <a href=\"https:\/\/www.zdnet.com\/article\/australia-now-has-encryption-busting-laws-as-labor-capitulates\/\">rammed through Parliament<\/a> in late 2018 and under the laws as currently written, agencies can issue:<\/p>\n<ul>\n<li>Technical Assistance Notices (TAN), which are compulsory notices for a communication provider to use an interception capability they already have;<\/li>\n<li>Technical Capability Notices (TCN), which are compulsory notices for a communication provider to build a new interception capability, so that it can meet subsequent Technical Assistance Notices; and<\/li>\n<li>Technical Assistance Requests (TAR), which have been&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/australias-anti-encryption-law-will-merely-relocate-the-backdoors-expert\/\">described by experts<\/a>&nbsp;as the most dangerous of all.<\/li>\n<\/ul>\n<p>TANs and TARs can currently be approved by the head of the requesting law enforcement or intelligence agency. TCNs must be approved jointly by the Attorney-General and the Minister for Communications.<\/p>\n<p>&#8220;Here in Australia, and internationally, there is great interest in, and strong views about, TOLA, which is seen as far reaching and novel in its scope,&#8221; Renwick said on Thursday.<\/p>\n<p>&#8220;The short period allowed for consultation on the TOLA Bill clearly caused lingering disquiet, even anger. Some say that brevity of itself means that the TOLA Act should be repealed, with consultation to begin again, not least as a way of regaining trust.&#8221;<\/p>\n<p>While Renwick appreciates the sentiment, he believes recommendations for the Bill to be repealed and re-drafted are not the way forward.<\/p>\n<section class=\"sharethrough-top\" data-component=\"medusaContentRecommendation\" data-medusa-content-recommendation-options=\"{&quot;promo&quot;:&quot;promo_zd_recommendation_sharethrough_top_in_article_desktop&quot;,&quot;spot&quot;:&quot;dfp-in-article&quot;}\">\n<\/section>\n<p>&#8220;Realistically, I do not think that is likely nor do I think it is appropriate to recommend it,&#8221; he said.<\/p>\n<p><strong>See also:&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/new-bill-to-prepare-australian-law-enforcement-for-the-us-cloud-act\/\">New Bill to prepare Australian law enforcement for the US CLOUD Act<\/a><\/strong>&nbsp;<\/p>\n<p>After holding <a href=\"https:\/\/www.zdnet.com\/article\/home-affairs-pushes-back-against-encryption-law-proposals\/\">hearings in Canberra<\/a> last month, Renwick said his focus has been on three areas of the Act in particular.<\/p>\n<p>The first, regarding the Act&#8217;s definitions of systemic weakness and systemic vulnerability, specifically, how disputes concerning the application of these statutory terms can be resolved.<\/p>\n<p>Second, is whether replacing the current TOLA decision-makers, which are currently the attorney-general or agency heads, with current or retired judges &#8212; assisted by technical experts who understand the effect of the exercise of particular TOLA powers on privacy and on the effectiveness of encryption &#8212; is a more appropriate option.<\/p>\n<p>And thirdly, finding better record-keeping and clear statements of review rights when compulsory powers are used &#8220;so that affected people and entities can exercise those rights, including by complaining to the Commonwealth Ombudsman or the Inspector-General of Intelligence and Security&#8221;.<\/p>\n<p>While Renwick said he agrees that &#8220;going dark&#8221; has created a large problem for police, intelligence, and integrity agencies, he said such activity has justified a &#8220;proportionate but not absolute legislative response&#8221;.<\/p>\n<p>&#8220;I have already announced that for so long as the police have access to TARs and TANs, so should the State and Territory ICACs, who have said how important these powers are to their work in ensuring integrity in government administration, including for police,&#8221; he added.<\/p>\n<p>He also said there is at least some evidence that the law is either effective or capable of being made effective, especially in relation to the powers in schedules 2-5, and for the TARs and TANs in schedule 1.<\/p>\n<p>&#8220;The publicly available material does not show that TANs have been used, because requests have been complied with voluntarily, but the use of TARs shows TANs are capable of being effective,&#8221; he said.<\/p>\n<p>Renwick said there is no public evidence that the more intrusive TCN, which is for the creation of a new capability, has yet been used.<\/p>\n<p>&#8220;The real question for me is whether any of these powers are proportionate to the undoubted threats &#8212; especially of criminality &#8212; that exist. And the answer to that question must focus on the thresholds and safeguards for their use,&#8221; he said.<\/p>\n<h3>READ MORE<\/h3>\n<p><strong><a href=\"https:\/\/www.zdnet.com\/article\/home-affairs-pushes-back-against-encryption-law-proposals\/\">Home Affairs pushes back against encryption law proposals<\/a><\/strong><\/p>\n<p>Both Labor and Australia&#8217;s Independent National Security Legislation Monitor have proposed judicial approvals before cops and spooks can access encrypted communications, but the Department of Home Affairs isn&#8217;t keen.<\/p>\n<p><strong><a href=\"https:\/\/www.zdnet.com\/article\/watchdog-ponders-tougher-independent-oversight-for-australias-encryption-laws\/\">Watchdog ponders tougher independent oversight for Australia&#8217;s encryption laws<\/a><\/strong><\/p>\n<p>There&#8217;s no sign of mass surveillance, but the Independent National Security Legislation Monitor suggests a UK-style &#8216;double lock&#8217; system for authorising access to encrypted communications.<\/p>\n<p><strong><a href=\"https:\/\/www.zdnet.com\/article\/how-the-b-team-watches-over-australias-encryption-laws-and-cybersecurity\/\">How the B-Team watches over Australia&#8217;s encryption laws and cybersecurity<\/a><\/strong><\/p>\n<p>Most telco interception warrants are issued by non-judges. Important cybersecurity work isn&#8217;t being done. The Information Commissioner lacks funding. Does the government actually care about privacy and security?<\/p>\n<p>READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/national-security-legislation-monitor-wont-be-recommending-encryption-bill-repeal\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>He said there is at least some evidence that the law is either effective, or capable of being made effective, in its current state.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":33665,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-33664","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>National Security Legislation Monitor won&#039;t be recommending Encryption Bill repeal 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/national-security-legislation-monitor-wont-be-recommending-encryption-bill-repeal\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"National Security Legislation Monitor won&#039;t be recommending Encryption Bill repeal 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/national-security-legislation-monitor-wont-be-recommending-encryption-bill-repeal\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-03-05T05:50:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/03\/national-security-legislation-monitor-wont-be-recommending-encryption-bill-repeal.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"770\" \/>\n\t<meta property=\"og:image:height\" content=\"578\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/national-security-legislation-monitor-wont-be-recommending-encryption-bill-repeal\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/national-security-legislation-monitor-wont-be-recommending-encryption-bill-repeal\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"National Security Legislation Monitor won&#8217;t be recommending Encryption Bill repeal\",\"datePublished\":\"2020-03-05T05:50:44+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/national-security-legislation-monitor-wont-be-recommending-encryption-bill-repeal\\\/\"},\"wordCount\":833,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/national-security-legislation-monitor-wont-be-recommending-encryption-bill-repeal\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/03\\\/national-security-legislation-monitor-wont-be-recommending-encryption-bill-repeal.jpg\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/national-security-legislation-monitor-wont-be-recommending-encryption-bill-repeal\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/national-security-legislation-monitor-wont-be-recommending-encryption-bill-repeal\\\/\",\"name\":\"National Security Legislation Monitor won't be recommending Encryption Bill repeal 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/national-security-legislation-monitor-wont-be-recommending-encryption-bill-repeal\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/national-security-legislation-monitor-wont-be-recommending-encryption-bill-repeal\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/03\\\/national-security-legislation-monitor-wont-be-recommending-encryption-bill-repeal.jpg\",\"datePublished\":\"2020-03-05T05:50:44+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/national-security-legislation-monitor-wont-be-recommending-encryption-bill-repeal\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/national-security-legislation-monitor-wont-be-recommending-encryption-bill-repeal\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/national-security-legislation-monitor-wont-be-recommending-encryption-bill-repeal\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/03\\\/national-security-legislation-monitor-wont-be-recommending-encryption-bill-repeal.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/03\\\/national-security-legislation-monitor-wont-be-recommending-encryption-bill-repeal.jpg\",\"width\":770,\"height\":578},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/national-security-legislation-monitor-wont-be-recommending-encryption-bill-repeal\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"National Security Legislation Monitor won&#8217;t be recommending Encryption Bill repeal\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"National Security Legislation Monitor won't be recommending Encryption Bill repeal 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/national-security-legislation-monitor-wont-be-recommending-encryption-bill-repeal\/","og_locale":"en_US","og_type":"article","og_title":"National Security Legislation Monitor won't be recommending Encryption Bill repeal 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/national-security-legislation-monitor-wont-be-recommending-encryption-bill-repeal\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-03-05T05:50:44+00:00","og_image":[{"width":770,"height":578,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/03\/national-security-legislation-monitor-wont-be-recommending-encryption-bill-repeal.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/national-security-legislation-monitor-wont-be-recommending-encryption-bill-repeal\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/national-security-legislation-monitor-wont-be-recommending-encryption-bill-repeal\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"National Security Legislation Monitor won&#8217;t be recommending Encryption Bill repeal","datePublished":"2020-03-05T05:50:44+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/national-security-legislation-monitor-wont-be-recommending-encryption-bill-repeal\/"},"wordCount":833,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/national-security-legislation-monitor-wont-be-recommending-encryption-bill-repeal\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/03\/national-security-legislation-monitor-wont-be-recommending-encryption-bill-repeal.jpg","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/national-security-legislation-monitor-wont-be-recommending-encryption-bill-repeal\/","url":"https:\/\/www.threatshub.org\/blog\/national-security-legislation-monitor-wont-be-recommending-encryption-bill-repeal\/","name":"National Security Legislation Monitor won't be recommending Encryption Bill repeal 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/national-security-legislation-monitor-wont-be-recommending-encryption-bill-repeal\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/national-security-legislation-monitor-wont-be-recommending-encryption-bill-repeal\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/03\/national-security-legislation-monitor-wont-be-recommending-encryption-bill-repeal.jpg","datePublished":"2020-03-05T05:50:44+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/national-security-legislation-monitor-wont-be-recommending-encryption-bill-repeal\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/national-security-legislation-monitor-wont-be-recommending-encryption-bill-repeal\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/national-security-legislation-monitor-wont-be-recommending-encryption-bill-repeal\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/03\/national-security-legislation-monitor-wont-be-recommending-encryption-bill-repeal.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/03\/national-security-legislation-monitor-wont-be-recommending-encryption-bill-repeal.jpg","width":770,"height":578},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/national-security-legislation-monitor-wont-be-recommending-encryption-bill-repeal\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"National Security Legislation Monitor won&#8217;t be recommending Encryption Bill repeal"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/33664","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=33664"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/33664\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/33665"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=33664"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=33664"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=33664"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}