> "The ACIC will use the new powers outlined in the Bill to focus efforts on understanding and gathering
intelligence on TSOC groups who are using encrypted communication platforms to conceal their
criminal activities . These platforms are used almost exclusively by SOC groups and are developed
specifically to obscure the identities of the involved criminal entities and enable avoidance of
detection by law enforcement. They enable the user to communicate within closed networks to
facilitate highly sophisticated criminal activity. ACIC observation shows there is no legitimate reason
for a law-abiding member of the community to own or use an encrypted communication platform."
> "The ACIC will use the new powers outlined in the Bill to focus efforts on understanding and gathering intelligence on TSOC groups who are using encrypted communication platforms to conceal their criminal activities . These platforms are used almost exclusively by SOC groups and are developed specifically to obscure the identities of the involved criminal entities and enable avoidance of detection by law enforcement. They enable the user to communicate within closed networks to facilitate highly sophisticated criminal activity. ACIC observation shows there is no legitimate reason for a law-abiding member of the community to own or use an encrypted communication platform."
[Note: SOC is Serious and Organized Crime]