Mass surveillance in Australia

From Infogalactic: the planetary knowledge core
Jump to: navigation, search

Lua error in package.lua at line 80: module 'strict' not found. Mass surveillance in Australia occurs through a variety of means affecting telephone, internet and other communications networks, financial systems, vehicle and transit networks, international travel, access to government services and other parts of society.

Communications

Telephone

<templatestyles src="Module:Hatnote/styles.css"></templatestyles>

Australia requires that pre-paid mobile telecommunications providers verify the identity of individuals before providing service.[1][2]

Internet

According to Greens' Senator Scott Ludlam, Australian law enforcement agencies were issued 243,631 warrants to obtain telecommunications logs in the period from July 2010 to June 2011, which vastly overshadowed the 3500-odd legal intercepts of communications.[3]

<templatestyles src="Template:Blockquote/styles.css" />

We've already taken some pretty dangerous steps in this country towards the surveillance state, and not that many of us are either interested or aware that it's going on, including people like me who should know better... Our friend and ally the United States is transitioning quite rapidly into an authoritarian state.

— Greens' Senator Scott Ludlam, 20 January 2012[3]

In 2013 it was reported that under Australian law state, territory and federal law enforcement authorities can access a variety of 'non-content' data from internet companies like Telstra, Optus and Google with authorisation by senior police officers or government officials rather than judicial warrant, and that "During criminal and revenue investigations in 2011-12, government agencies accessed private data and internet logs more than 300,000 times."[4]

Google's transparency report shows a consistent trend of growth in requests by Australian authorities for private information, constantly rising approximately 20% year-on-year. The most recent published volume for the period ending December 2013 indicates a volume of around four individual requests per calendar day.[5]

Telstra's transparency report for the period 1 July - 31 December 2013 does not include requests by national security agencies, only police and other agencies. Nevertheless, in the six-month period 40,644 requests were made, 36,053 for "Telstra customer information, carriage service records and pre-warrant checks" (name, address, date of birth, service number, call/SMS/internet records. Call records include called party, date, time and duration. Internet information includes date, time and duration of internet sessions and email logs from Telstra-administered addresses[6]), 2,871 for "Life threatening situations and Triple Zero emergency calls", 270 for "Court orders", 1450 for "Warrants for interception or access to stored communications" (real time access): an average of around 222 requests per calendar day.[7]

Cover page of the first version of the secret UKUSA Agreement, which was disclosed to the public in 2011, and was the basis for the modern Five Eyes international surveillance alliance.
Aerial view of Pine Gap, one of Australia's major spy facilities.
Aerial view of HMAS Harman, another of Australia's major spy facilities.

In 2013 more than 500 authors including five Nobel prize winners and Australian identities Frank Moorhouse, John Coetzee, Helen Garner, Geraldine Brooks and David Malouf signed a global petition to protest mass surveillance[8] after the whistleblower Edward Snowden's global surveillance disclosures informed the world, including Australians, that they are being monitored by the National Security Agency's XKeyscore system and its boundless informant. Snowden had further revealed that Australian government intelligence agencies, specifically the Australian Signals Directorate, also have access to the system as part of the international Five Eyes surveillance alliance.[9]

In August 2014 it was reported[10] that law-enforcement agencies had been accessing Australians' web browsing histories via internet providers such as Telstra without a warrant (Optus confirmed that they cooperate with law enforcement, and Vodafone did not return a request for comment). The revelations came less than a week after government attempts to increase their surveillance powers through new legislation allowing offensive computer hacking by government intelligence agencies, and mere months after outrage surrounding the government's offer to share personal information about citizens with Five Eyes intelligence partners.[11]

As of August 2014, no warrant is required for organisations to access the so-called 'metadata' information of private parties. This is information regarding "calls and emails sent and received, the location of a phone, internet browsing activity. There is no access to the content of the communication, just how, to or from whom, when and where." Under current law many organisations other than federal, state and territory police[12] and security agencies such as ASIO[12] can get access to this information, including "any agency that collects government revenue",[3] for example the RSPCA,[12][3][13] the Australian Crime Commission,[14] the Australian Securities and Investments Commission[12][14] (though reportedly temporarily removed from the list),[12] the Australian Tax Office,[12][14][15] Centrelink,[15] Medicare,[12][14] Australia Post,[12][14][15] the Australian Fisheries Management Authority,[3] the Victorian Taxi Services Commission,[3] the Victorian Transport Accident Commission,[3] WorkSafe Victoria,[12] local councils[13][12] and foreign law enforcement agencies.[13]

In the 2013-2014 financial year there were over half a million disclosures of metadata to agencies.[15]

The Australian Communications and Media Authority provides instructions for internet service providers and other telecommunications providers about their law enforcement, national security and interception obligations.

2014 proposals

A range of proposals are under discussion that affect surveillance of the population by government in conjunction with commercial service providers.

Hacking powers

The proposals seek to give the Australian Security Intelligence Organisation the right to hack in to computers and modify them.[16]

Single computer warrant to become umbrella surveillance

The proposals seek to give the Australian Security Intelligence Organisation the power to spy on whole computer networks under a single computer-access warrant.[16]

Spying on citizens abroad

The proposals seek to give the Australian Secret Intelligence Service the power to collect intelligence on Australian citizens overseas.[16]

Law against media and whistleblowing

<templatestyles src="Module:Hatnote/styles.css"></templatestyles>

Section 35P of the proposals seeks to create a new criminal offence, with a maximum penalty of 10 years imprisonment for revealing information about so-called 'special intelligence operations'. There are no exceptions listed, and the law would apply to journalists even if they were unaware that they were revealing information about such an operation. Shadow Attorney-General Mark Dreyfus called the measure "an unprecedented overreach".[16]

Mandatory data retention

<templatestyles src="Module:Hatnote/styles.css"></templatestyles>

Mandatory data retention for two years of data relating to the internet and telecommunications activity of all Australians is currently under discussion.[13][16]

<templatestyles src="Template:Blockquote/styles.css" />

I must record my very grave misgivings about the proposal; it seems to be heading in precisely the wrong direction.

— Malcolm Turnbull, government Communications Minister.[17]

On Tuesday, August 5, government Communications Minister Malcolm Turnbull complained about "waking up to newspaper headlines concerning the government's controversial plan for mandatory data retention", stating the government "risked unnecessary difficulties by pushing ahead with the data retention regime without fully understanding the details". In 2012, Turnbull had opposed mandatory retention.[17]

On Friday, August 8, Australia's federal privacy commissioner, Timothy Pilgrim, stated he felt it remained "unclear" exactly what data was to be retained, and that "there is the potential for the retention of large amounts of data to contain or reveal a great deal of information about people's private lives and that this data could be considered 'personal information' under the Privacy Act".[17]

<templatestyles src="Template:Blockquote/styles.css" />

The government's proposal on data retention raises a number of important issues and so it is important that there is an opportunity for public consultation and debate on these proposals once the detail is available.

— Timothy Pilgrim, Australia's federal privacy commissioner, Friday, August 8th, 2014.[17]

Later in the month, the head of Australian Security Intelligence Organisation (ASIO) appealed for access to private citizens' data on the grounds that commercial entities may already be collecting it.[18]

<templatestyles src="Template:Blockquote/styles.css" />

For the life of me, I cannot understand why it is somehow correct for all of your privacy to be invaded for a commercial purpose but I am not allowed to do it for the purpose of saving your life.

— David Irvine, ASIO chief, 22 August 2014

On February 19, 2015 the Australian Broadcasting Corporation's Radio National program Download This Show broadcast an interview with a former police employee who had worked extensively with metadata, on condition of anonymity. The former employee was quoted as feeling the proposed system was open for abuse and may one day be used against Australians who download music and TV shows.[19][20]

<templatestyles src="Template:Blockquote/styles.css" />

The Australian people are being sleep walked into a system the attorney general cannot even articulate [...] Right now it would be so easy for me to slip my ex-girlfriend's number in the current process under any investigation [...] No one would pick it up because there is no detail.

— Anonymous former police employee who worked extensively with metadata[19][20]

On February 22, 2015 Australian Federal Police Assistant Commissioner Tim Morris made the following claims appealing to blind trust from the public.[21]

<templatestyles src="Template:Blockquote/styles.css" />

Your chances that your data will be viewed by law enforcement is low [...] Those with nothing to hide have nothing to fear.

— Tim Morris, Australian Federal Police Assistant Commissioner, 22 February 2015[21]

The quote is a clear instance of the nothing to hide argument, which subtly implies that those who disagree are criminals.

In 2015 the issue of costs became more heavily discussed in the media with figures such as 1% of all national telecommunications revenue annually or "two battleships" per year used.[22]

Prominent parties concerned about the proposals include:[20][15]

Travel

International

<templatestyles src="Module:Hatnote/styles.css"></templatestyles>

File:JORN.svg
General depiction of northern Australia's Jindalee Operational Radar Network, used to track airborne and seaborne vessels across a vast area.

Australia and the European Union have signed in international agreement regarding the advanced sharing of traveler passenger name records for international travelers. These records typically include significantly more information than merely the name of the passenger.

In addition to passenger information and standard radar, Australia uses the Jindalee Operational Radar Network to detect individual boats and planes in the north and west of the country.

<templatestyles src="Template:Blockquote/styles.css" />

It not only provides a 24-hour military surveillance of the northern and western approaches to Australia, but also serves a civilian purpose in assisting in detecting illegal entry, smuggling and unlicensed fishing. The system also assists in weather forecasting making it possible to produce wind and sea state maps from information provided by the network. These maps can give early warnings of cyclones and enable ships to save fuel by avoiding rough weather.

Domestic

Vehicles are tracked by a range of systems including Automatic Number Plate Recognition, video and sensor-based traffic surveillance networks, cellular telephone tracking (if a device is known to be in the vehicle) and automated toll networks. The SCATS system, owned by the New South Wales government and initially deployed in Sydney, is a widely used traffic surveillance system in the country that is known under various other names in Adelaide (ACTS), Canberra (CATSS), Melbourne (SCRAM), the Northern Territory (DARTS) and Perth (PCATS).

Mass transit

NSW

In December 2014, certain universities such as Sydney University delayed collaboration with the new Opal card system scheduled to fully replace existing, anonymous paper tickets on New South Wales mass transit, citing privacy concerns,[23] whereas Macquarie University, University of New South Wales and Australian Catholic University had already agreed to provide the "student data" to the card network. Data is made available to other NSW government departments and law enforcement agencies.[24]Concerns about privacy have been repeatedly raised in the mainstream media, with commentators questioning the extent to which user data can be accessed by authorities.[25][26][27] According to the Opal Privacy Policy, data is made available to other NSW government departments and law enforcement agencies. On the 13th of March 2015 it was announced that Opal cards may be linked to commuter car park spaces, such that private road vehicle identities would become associated with individual mass transit use.[28]

Other states

The extent and frequency to which individual traveler data is released without a warrant remains poorly documented for the following systems:

Related law

Lua error in package.lua at line 80: module 'strict' not found. This section outlines the main legal references for mass surveillance in Australia.

National

Under Australian law, the following acts are prominent federal law in the area of surveillance.

A separate body of state-level laws also exists.

International agreements

Australia is part of the Five Eyes international surveillance network, run by the United States National Security Agency and generally protected from public scrutiny citing 'national security' concerns.

See also

References

  1. Lua error in package.lua at line 80: module 'strict' not found.
  2. Lua error in package.lua at line 80: module 'strict' not found.
  3. 3.0 3.1 3.2 3.3 3.4 3.5 3.6 Lua error in package.lua at line 80: module 'strict' not found.
  4. Lua error in package.lua at line 80: module 'strict' not found.
  5. Lua error in package.lua at line 80: module 'strict' not found.
  6. Lua error in package.lua at line 80: module 'strict' not found.
  7. Lua error in package.lua at line 80: module 'strict' not found.
  8. Lua error in package.lua at line 80: module 'strict' not found.
  9. Lua error in package.lua at line 80: module 'strict' not found.
  10. Lua error in package.lua at line 80: module 'strict' not found.
  11. Lua error in package.lua at line 80: module 'strict' not found.
  12. 12.0 12.1 12.2 12.3 12.4 12.5 12.6 12.7 12.8 12.9 Lua error in package.lua at line 80: module 'strict' not found.
  13. 13.0 13.1 13.2 13.3 Lua error in package.lua at line 80: module 'strict' not found.
  14. 14.0 14.1 14.2 14.3 14.4 Lua error in package.lua at line 80: module 'strict' not found.
  15. 15.0 15.1 15.2 15.3 15.4 Lua error in package.lua at line 80: module 'strict' not found.
  16. 16.0 16.1 16.2 16.3 16.4 Lua error in package.lua at line 80: module 'strict' not found.
  17. 17.0 17.1 17.2 17.3 Lua error in package.lua at line 80: module 'strict' not found.
  18. Lua error in package.lua at line 80: module 'strict' not found.
  19. 19.0 19.1 Lua error in package.lua at line 80: module 'strict' not found.
  20. 20.0 20.1 20.2 Lua error in package.lua at line 80: module 'strict' not found.
  21. 21.0 21.1 Lua error in package.lua at line 80: module 'strict' not found.
  22. Lua error in package.lua at line 80: module 'strict' not found.
  23. Lua error in package.lua at line 80: module 'strict' not found.
  24. Lua error in package.lua at line 80: module 'strict' not found.
  25. Lua error in package.lua at line 80: module 'strict' not found.
  26. Lua error in package.lua at line 80: module 'strict' not found.
  27. Lua error in package.lua at line 80: module 'strict' not found.
  28. Lua error in package.lua at line 80: module 'strict' not found.

External links