Australia’s Cybersecurity Adviser Calls For Privacy

The Australian government's national cybersecurity adviser has urged social media companies to improve the way they treat personal data and encouraged users of those platforms to be more aware of what information they are offering up to the Internet.

Amid the heightened debate around the use of personal data online, Alastair MacGibbon, who heads the Australian Cyber Security Centre, also suggested companies like Facebook were being hypocritical when governments seek their assistance with criminal investigations.

"These same companies that have allowed tens of millions of accounts to go at the back end out of their control will say to us often, 'look we’re not going to help you' or 'we can’t help you' or 'you’re overreaching as a government', even though you have court orders and a really strong, compelling case because we need to protect the privacy of their customers," Mr MacGibbon told Sky News.

"These companies that hold up privacy and the sanctity of the individual to us as governments, western, liberal, democratic governments, are the same ones that are then allowing data at the back end to go off out of their control."

He said the companies' treatment of personal data should become more mature to comply with community expectations. He also reminded people that, "we are their product, our data is their product" when these services are free.

"That’s what everyone needs to remember in this discussion. Is that our data, as we used those services, is used primarily to market but the events this week highlight that sometimes there can a darker side," Mr MacGibbon said.

Following revelations concerning data science firm Cambridge Analytica's inappropriate harvesting of Facebook users' data and involvement in political campaigns around the world, the companies are now facing inquiries in multiple countries and the prospect of tighter regulation.

The controversy has also triggered debate around the use of data in politics, with former federal privacy commissioner Malcolm Crompton criticising Australia's major political parties, who enjoy an exemption from the Privacy Act.

Fairfax Media revealed that Facebook approached the major parties with an advanced data-matching tool in the lead-up to the 2016 election, an offer the Liberal Party declined out of concern it could breach electoral laws.

Political parties are exempt from the Privacy Act that governs the data collection, use and disclosure for almost all other private organisations. The exemption is designed to "encourage freedom of political communication" and support the electoral process, according to Attorney-General Christian Porter.

Mr Crompton said the parties "don't have a leg to stand on" and should adhere to the same practices and principles that others face, which would make their data collection more accurate and transparent.

Labor is understood to have adopted Facebook's "Custom Audience" feature and has advanced digital campaigning capabilities while the South Australian and Victorian Liberal Party branches are using data-driven micro-targeting service i360.

Data long collected by political parties, from the electoral roll, direct contact and publicly available statements, is now being combined with social media, deployed in increasingly advanced ways online and refining the more traditional methods of door-knocking, phone calls and direct mail.

Cambridge Analytica, notorious for its involvement in the 2016 US election, has made attempts to expand into Australia but the major parties have declined to take up their services.

Sydney Morning Herald

You Might Also Read: 

Australia To Challenge Facebook & Google Over Media Disruption:

 
« The Pentagon Is Busy Integrating Cyber Into Its Battle Plans
Snowden: The Deep State’s Influence On The Presidency »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Pen Test Partners LLP

Pen Test Partners LLP

Pen Test Partners provides penetration testing, security assessment and training services.

Okta

Okta

Okta is an enterprise-grade identity management service, built from the ground up in the cloud to address the challenges of a cloud-mobile-interconnected world.

Center for a New American Security (CNAS)

Center for a New American Security (CNAS)

CNAS is the nation's leading research institution focused on defense and national security policy. Cyber security issues are an intrinsic element of the national security debate.

Scale Computing

Scale Computing

Scale Computing is an industry leading application platform for EDGE computing environments covering retail, manufacturing, financial services and government.

Center for Strategic Cyberspace & International Studies (CSCIS)

Center for Strategic Cyberspace & International Studies (CSCIS)

CSCIS seeks to advance global cyberspace security and prosperity by providing strategic insights for cyberspace and policy solutions to decision makers.

SecureBrain

SecureBrain

SecureBrain software and services help protect against Japanese-specific cybercrime and global internet security threats such as online fraud, phishing, drive-by downloads and malware attacks.

Seqrite

Seqrite

Seqrite offers a highly advanced range of enterprise and IT security solutions to protect your organization's most critical data.

Newtech Recycyling

Newtech Recycyling

Newtech Recycyling specializes in the removal and disposal of IT infrastructure which has reached the end of its life cycle.

Maritime Transportation System Information Sharing and Analysis Center (MTS-ISAC)

Maritime Transportation System Information Sharing and Analysis Center (MTS-ISAC)

MTS-ISAC promotes and facilitates maritime cybersecurity information sharing, awareness, training, and collaboration efforts between private and public sector stakeholders.

Digitpol

Digitpol

Digitpol’s Cyber Crime Investigation experts investigate hacking incidents, ransomware, extortion and conduct security audits and IT upgrades.

FREE eBook: Practical Guide To Optimizing Your Cloud Deployments

FREE eBook: Practical Guide To Optimizing Your Cloud Deployments

AWS Marketplace eBook: Optimizing your cloud deployments to accelerate cloud activities, reduce costs, and improve customer experience.

Quantum Star Technologies

Quantum Star Technologies

Quantum Star Technologies has developed Starpoint to be a next-next-generation solution to cyber security threats. Our mission is to secure the online world through our patented technology.

HiSolutions

HiSolutions

HiSolutions is a renowned consulting firms for IT governance, risk & compliance in Germany, combining highly specialized know-how in the field with profound process competence.

Cyber Explorers

Cyber Explorers

Cyber Explorers is a fun, free and interactive learning platform for future digital superstars. An exciting addition to UK curriculum delivery or after school activities.

Capzul

Capzul

Capzul are transforming the network security landscape with a new approach; creating virtually impenetrable networks, precluding cybercriminal attacks on your network ecosystem.

Vonahi Security

Vonahi Security

Vonahi Security is a cybersecurity SaaS company that pioneered automated network penetration testing.