Concerns raised as government demands universal wiretapping
- 17 April, 2008 09:47
Sweeping reforms will make it easier than ever for law enforcement to intercept communications if amendments to the Telecommunications (Interceptions) Act are agreed upon by a Senate standing committee.
The federal government is pushing a bill to force all telecommunications providers to facilitate lawful data interception across fixed and mobile telephone systems, Voice over Internet Protocol (VoIP), Instant Messaging (IM) and chat room discussions.
The standing committee is meeting today to discuss the proposed changes to Telecommunications (Interception and Access) Amendment Bill 2008 (TIA).
The amendments build on previous reforms by the then Howard government which required Internet Service Providers (ISPs) to implement wiretapping provisions in VoIP services.
Attorney-General Robert McClelland said business owners will be handed powers to intercept employee e-mails without notice in a bid to prevent cyber-terrorism.
Consumer advocacy groups are outraged by the reforms and have questioned the motives of the government, labelling the move as a blatant invasion of privacy.
NSW Council of Civil Liberties president, Cameron Murphy, said the changes are unnecessary and will inadvertently subject hundreds of people to privacy violations.
"These laws will massively increase the number of interception points available for techniques such as wiretapping," Murphy said.
"Everything from online chatting, to Skype (VoIP) and mobile phone calls will be open to interception."
He believes the changes are being driven by law enforcement which is effectively offloading its work on the private industry.
The reforms also violate the privacy of other parties involved in a monitored communication channel, according to the Council, the Australian Privacy Foundation (APF) and the Electronic Frontiers Association (EFA).
The organisations told Computerworld that NSW law, which allows businesses to intercept employee e-mails with consent, is a breach of the TIA and the Privacy Act. The problem arises from ambiguity in the law which does not stipulate rules for dealing with third party information, and what constitutes consent.
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
Why IT projects really fail
Queensland government to provide 200 services online by 2015
Call Centers Suffer From Big Data Overload
CIO 100: Carsales wins top gong for innovation
How to secure passwords and other critical numbers
Introduction to Storage efficiency technologies
Data is growing at a tremendous rate, and organisations of every type rely on the timely retrieval of information to facilitate transaction and decision making. Processing powers are also expanding, now equipped with storage efficiency technologies that help simplify the many IT challenges that companies are facing. This white paper describes how proper simple storage efficiency features help you leverage daily storage, maximise capacity and performance optimisation, while reducing power consumption and total cost.
Managing Web Security in an Increasingly Challenging Threat Landscape
Cybercriminals have increasingly turned their attention to the web, which has become by far the predominant area of attack. Those who would do harm to our computer systems for profit or malice always manage to focus their efforts on our most vulnerable weak spots. Today, that is the web, for a wide number of reasons. Download to find out why and what you can do to protect yourself.
Benchmarks for Security - A Comparative Test
In a head to head comparison of 8 end-point security products, we look at which performs the best across crucial performance metrics - from installation time to memory usage. Download to find out which performs the best!