Snowden On Police Chasing Journalist’s Data

Edward Snowden has condemned Australian law enforcement for collecting the communications records of a Guardian journalist without a warrant.

The world’s most prominent whistleblower, who disclosed dragnet surveillance unprecedented in its scale by the National Security Agency and its allies, singled out for critique the Australian government’s contention that it broke no laws in its leak investigation of Paul Farrell, a Guardian reporter who in 2014 exposed the inner workings of Australia’s maritime interception of asylum seekers.

Australia's attacks on journalists' sources are about politics, not national security. “Police in developed democracies don’t pore over journalists’ private activities to hunt down confidential sources,” Snowden told the Guardian.

“The Australian federal police are defending such operations as perfectly legal, but that’s really the problem, isn’t it? Sometimes the scandal is not what law was broken, but what the law allows.”

Throughout 2015 the Australian parliament enacted a series of controversial laws that curbed privacy and freedom of expression rights. Geoffrey King, director of the Committee to Protect Journalists’ Technology Program, said the AFP’s actions were “obviously outrageous”.

“This should not be happening. But it is the inevitable result of mandatory data retention and mass surveillance, which is neither necessary nor proportional to any threat,” King said. “It doesn’t line up with the values that we all adhere to, to good counter-terrorism strategy, and it certainly doesn’t line up with a free and open society where journalists can do their jobs.”

In March 2015 the Australian Senate passed legislation requiring Internet and mobile phone companies to retain customer metadata for 24 months. The bill was vehemently opposed by the Australian Greens whose communications spokesman Senator Scott Ludlam called it a new provisions and a new, “form of mass surveillance”.

Although a last-minute amendment obliged security agencies to get a warrant before accessing a journalist’s metadata, the law essentially expands the Australian government’s ability to conduct dragnet surveillance.

Australia, along with the US, UK, Canada and New Zealand, is part of the Five Eyes signals-intelligence sharing network.

Documents leaked by Snowden in 2013 revealed that Australian spying authorities had offered to share bulk metadata of ordinary Australian citizens with their partners in the Five Eyes network. Other documents Snowden leaked revealed Australian spies had attempted to listen in to the phone calls of former Indonesian president Susilo Bambang Yudhoyono and his inner circle, causing an extended diplomatic rift between the two countries.

The investigation into Farrell’s sources, for a story relating to the activities of an Australian customs vessel and a controversial operation to turn back a boat carrying asylum seekers from Indonesia, was conducted in 2014, before the amendment passed parliament. Law enforcement did not need a warrant for accessing the information at the time.

The case marks the first time the AFP has confirmed seeking access to a journalist’s metadata in a specific case, although the agency has admitted to investigating several journalists reporting on Australian immigration.
The acknowledgement that authorities had sought access to Farrell’s records was only divulged after the reporter lodged a complaint with Australia’s privacy commissioner under the country’s Privacy Act.

In July 2015, the Australian government passed the Border Force Act, which criminalises whistleblowing from within Australia’s hardline immigration detention network, making it an offense punishable with up to two years in prison.

The country’s “Operation Sovereign Borders”, a harsh, military-led crackdown on asylum seekers who attempt to enter Australia by boat, includes a policy of turning back boats carrying migrants and deporting every arrival including children to harsh, offshore detention centres in Papua New Guinea and the tiny Pacific island state of Nauru, for permanent resettlement.

Guardian: http://bit.ly/1SmlbdA

« Smart UAE Police Cars For Expo 2020
Google Faces EU Monopoly Law Over Android Dominance »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Adeptis Group

Adeptis Group

Adeptis are experts in cyber security recruitment, providing bespoke staffing solutions to safeguard your organisation against ever-changing cyber threats.

RiskSense

RiskSense

RiskSense empowers enterprises and governments to reveal cyber risk, quickly orchestrate remediation, and monitor the results.

Critical Infrastructures for Information and Cybersecurity (ICIC)

Critical Infrastructures for Information and Cybersecurity (ICIC)

ICIC addresses the demand for cybersecurity for National Public Sector organizations and civil and private sector organizations in Argentina.

Redicom

Redicom

Redicom is an independent consulting agency focusing on identity management, strong authentication and single-sign-on.

Merlin Cyber

Merlin Cyber

Merlin is a premier cybersecurity platform that leverages security technologies, trusted relationships, and capital to develop and deliver groundbreaking security solutions.

Finnish Accreditation Service (FINAS)

Finnish Accreditation Service (FINAS)

FINAS is the national accreditation body for Finland. The directory of members provides details of organisations offering certification services for ISO 27001.

Document Security Systems (DSS)

Document Security Systems (DSS)

DSS anti-counterfeit, authentication, and brand protection solutions are deployed to prevent attacks which threaten products, digital presence, financial instruments, and identification.

Hold Security

Hold Security

Hold Security works with companies of all sizes to provide unparalleled Threat Intelligence services that actually make a difference.

SECFORCE

SECFORCE

SECFORCE is a leading information security consultancy specialising in bespoke penetration testing and red team engagements.

Center for Infrastructure Assurance and Security (CIAS)

Center for Infrastructure Assurance and Security (CIAS)

CIAS is developing the world's foremost center for multidisciplinary education and development of operational capabilities in the areas of infrastructure assurance and security.

Picnic

Picnic

Picnic is a gritty, pioneering team of intelligence and cybersecurity specialists focused on solving the security challenge of our time - social engineering.

Third Wave Innovations

Third Wave Innovations

Third Wave Innovations (formerly RCS Secure) offers a full spectrum of cybersecurity safeguards and IT services.

Iron Mountain

Iron Mountain

Iron Mountain Incorporated is a global business dedicated to storing, protecting and managing, information and assets.

Panoptic Cyber

Panoptic Cyber

Panoptic Cyber are a team of elite Armed Forces Veterans who hold a wealth of experience in Information Security, Cyber Security, Data Protection and Risk Management.

Dispel

Dispel

Dispel makes the fastest secure remote access for industrial networks. Built by operators for operators: a zero trust engine for your entire OT, IoT, and xIoT stack.

Interlock

Interlock

Interlock are building blockchain-based security products that solve legacy web2 security issues - phishing and social engineering.