div class=trans-pagebutton class=gotoPage data-page=1Page 1button div class=trans-imageimg data-url=documentsubmission-106-for-australiaas-2020-cyber-security-strategy-2019-11-22-thirdhtmlpage=1 data-page=1 class=trans-thumb lazyload alt=Page 1: Submission 106 for Australia’s 2020 Cyber Security Strategy · 2019 11 22 · Third limits in law enforcement resources and the specialist evidence needed for cyber-crime investigations loading=lazy src=data:imagegifbase64iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAQAAAC1HAwCAAAAC0lEQVR42mM8Uw8AAh0BTZud3BwAAAAASUVORK5CYII= data-src=https:reader034fdocumentsnetreader034viewer2022051921600f0a07dc04ed585411584dhtml5thumbnails1jpg width=140 height=200 divdivdiv class=trans-pagebutton class=gotoPage data-page=2Page 2button div class=trans-imageimg data-url=documentsubmission-106-for-australiaas-2020-cyber-security-strategy-2019-11-22-thirdhtmlpage=2 data-page=2 class=trans-thumb lazyload alt=Page 2: Submission 106 for Australia’s 2020 Cyber Security Strategy · 2019 11 22 · Third limits in law enforcement resources and the specialist evidence needed for cyber-crime investigations loading=lazy src=data:imagegifbase64iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAQAAAC1HAwCAAAAC0lEQVR42mM8Uw8AAh0BTZud3BwAAAAASUVORK5CYII= data-src=https:reader034fdocumentsnetreader034viewer2022051921600f0a07dc04ed585411584dhtml5thumbnails2jpg width=140 height=200 divdivdiv class=trans-pagebutton class=gotoPage data-page=3Page 3button div class=trans-imageimg data-url=documentsubmission-106-for-australiaas-2020-cyber-security-strategy-2019-11-22-thirdhtmlpage=3 data-page=3 class=trans-thumb lazyload alt=Page 3: Submission 106 for Australia’s 2020 Cyber Security Strategy · 2019 11 22 · Third limits in law enforcement resources and the specialist evidence needed for cyber-crime investigations loading=lazy src=data:imagegifbase64iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAQAAAC1HAwCAAAAC0lEQVR42mM8Uw8AAh0BTZud3BwAAAAASUVORK5CYII=...