Other government reforms also "creepy", not just data retention, Ludlam says
- 11 October, 2012 14:06
Greens senator Scott Ludlam has said there are other issues in the federal government’s proposals for intelligence and security reforms, besides data retention, which are “creepy”.
A parliamentary joint committee on intelligence and security is currently carrying out an inquiry to consider proposals for reforms for telecommunications interception, telecommunications sector security and Australian intelligence community legislation.
While the most contentious proposals have been those associated with data retention, Ludlam said there are also other alarming proposals as well.
For example, “Internet kill switches for targeted populations; the ability of ASIO to install malware on third-party computers who aren’t involved in investigations; the ability of intelligence agencies to commit crimes and then be forgiven for them behind the scenes – there’s a bunch of other stuff coming up behind data retention that actually is also kind of creepy,” Ludlam said at the Internet Governance Forum in Canberra today.
However, Ludlam said his main issue is with the proposals around data retention, which includes "tailored data retention periods for up to two years for parts of a data set", and has been a long-standing opponent of the data retention proposals.
Ludlam again today reiterated his concerns with the proposals, stating it was a “dangerous proposition” and there was a risk that criminals would shift their activities and modes of communication to other mediums which are not subject to data retention.
“But for the rest of the Australia population, this proposal is to subject all of us to a form of mild, blanket, real-time surveillance – and it’s not on. It is utterly inappropriate and the thinking behind it I think I find the most objectionable when you hear it defended in the North Korean terms of ‘but if you’ve got nothing to hide, you’ve got nothing to fear’,” he said.
One of Ludlam’s points of contention with the proposals is the lack of a paper trail associated with requests for information. For example, warrants are required to name suspects and leave a “paper trail”.
However, he said there have been a quarter of a million requests for metadata which have not required warrants, compared to 3000 warrant requests for phone taps.
“So all of that intimate detail, including your latitude and longitude, if you’re carrying [phones] around, is being vacuumed up at an enormous rate by a much larger range of agencies that do not need to allege any criminal conduct whatsoever,” Ludlam said, with Telstra recently revealing organisations such as the RSPCA, Melbourne Council and the Blacktown anti-dumping authority have all requested metadata from Telstra.
“There are more than 200 people in the federal police authorised to stamp those applications for fishing expeditions to vacuum up the private data of Australian citizens…” Ludlam said.
“I would … encourage participants here today to respond formally – and my request would be forcefully – so that the government is left in no uncertain terms aware of the views not just of the tech sector but of ordinary Australian citizens about proposals like that.”
Follow Stephanie McDonald on Twitter: @stephmcdonald0
Follow Computerworld Australia on Twitter: @ComputerworldAU
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
Why change management doesn’t work
Larry Page wants to see your medical records
Dual-Persona Smartphones Not a BYOD Panacea
After two-year hiatus, EFF accepts bitcoin donations again
CIOs struggle to deliver timely mobile business apps: survey
Advanced Persistent Threats and Real-Time Threat Management
Businesses face a constantly evolving threat landscape. One of the greatest challenges is presented by advanced persistent threats (APTs), which are sophisticated, multi‐faceted attacks targeting a particular organisation. Mitigating the risk of APTs requires advances beyond traditional layered security to include real‐time threat management. This whitepaper describes the nature of APTs, the risks they pose to businesses, and techniques for blocking, detecting, and containing APTs and other emerging threats. Read now.
Endpoint Security and Virtualisation
Besides form factor, virtual systems are not really that different than physical systems. They both use the same operating systems and applications. They both present users with computing resources such as RAM and hard drives. Consequently, the ability to exploit vulnerabilities in a physical environment will present a significant threat to virtualised environments as well. This paper examines the different endpoint security methods for virtualised environments and presents how Endpoint Protection security provides optimal performance, protection and manageability.
Integrated Computing Platforms: Infrastructure Builds for Tomorrow’s Data Centre
Integrated Computing Platforms, such as EMC VSPEX RAs, provide a solution by eliminating the time (and cost) of designing, testing, and engineering integrated environments with components built independently of one another. These validated architectures are ready for production environments upon delivery, and offer a single point of support should IT require it. Learn more on how a leading IT vendor has aligned product innovation with an IT market need to improve efficiency, performance, and value for SMBs.