Snowden On Police Chasing Journalist’s Data

Edward Snowden has condemned Australian law enforcement for collecting the communications records of a Guardian journalist without a warrant.

The world’s most prominent whistleblower, who disclosed dragnet surveillance unprecedented in its scale by the National Security Agency and its allies, singled out for critique the Australian government’s contention that it broke no laws in its leak investigation of Paul Farrell, a Guardian reporter who in 2014 exposed the inner workings of Australia’s maritime interception of asylum seekers.

Australia's attacks on journalists' sources are about politics, not national security. “Police in developed democracies don’t pore over journalists’ private activities to hunt down confidential sources,” Snowden told the Guardian.

“The Australian federal police are defending such operations as perfectly legal, but that’s really the problem, isn’t it? Sometimes the scandal is not what law was broken, but what the law allows.”

Throughout 2015 the Australian parliament enacted a series of controversial laws that curbed privacy and freedom of expression rights. Geoffrey King, director of the Committee to Protect Journalists’ Technology Program, said the AFP’s actions were “obviously outrageous”.

“This should not be happening. But it is the inevitable result of mandatory data retention and mass surveillance, which is neither necessary nor proportional to any threat,” King said. “It doesn’t line up with the values that we all adhere to, to good counter-terrorism strategy, and it certainly doesn’t line up with a free and open society where journalists can do their jobs.”

In March 2015 the Australian Senate passed legislation requiring Internet and mobile phone companies to retain customer metadata for 24 months. The bill was vehemently opposed by the Australian Greens whose communications spokesman Senator Scott Ludlam called it a new provisions and a new, “form of mass surveillance”.

Although a last-minute amendment obliged security agencies to get a warrant before accessing a journalist’s metadata, the law essentially expands the Australian government’s ability to conduct dragnet surveillance.

Australia, along with the US, UK, Canada and New Zealand, is part of the Five Eyes signals-intelligence sharing network.

Documents leaked by Snowden in 2013 revealed that Australian spying authorities had offered to share bulk metadata of ordinary Australian citizens with their partners in the Five Eyes network. Other documents Snowden leaked revealed Australian spies had attempted to listen in to the phone calls of former Indonesian president Susilo Bambang Yudhoyono and his inner circle, causing an extended diplomatic rift between the two countries.

The investigation into Farrell’s sources, for a story relating to the activities of an Australian customs vessel and a controversial operation to turn back a boat carrying asylum seekers from Indonesia, was conducted in 2014, before the amendment passed parliament. Law enforcement did not need a warrant for accessing the information at the time.

The case marks the first time the AFP has confirmed seeking access to a journalist’s metadata in a specific case, although the agency has admitted to investigating several journalists reporting on Australian immigration.
The acknowledgement that authorities had sought access to Farrell’s records was only divulged after the reporter lodged a complaint with Australia’s privacy commissioner under the country’s Privacy Act.

In July 2015, the Australian government passed the Border Force Act, which criminalises whistleblowing from within Australia’s hardline immigration detention network, making it an offense punishable with up to two years in prison.

The country’s “Operation Sovereign Borders”, a harsh, military-led crackdown on asylum seekers who attempt to enter Australia by boat, includes a policy of turning back boats carrying migrants and deporting every arrival including children to harsh, offshore detention centres in Papua New Guinea and the tiny Pacific island state of Nauru, for permanent resettlement.

Guardian: http://bit.ly/1SmlbdA

« Smart UAE Police Cars For Expo 2020
Google Faces EU Monopoly Law Over Android Dominance »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Pondurance

Pondurance

Pondurance is an IT Security and Compliance company providing services in Cyber Security, Continuity, Compliance and Threat Management.

SecDev

SecDev

SecDev is a consulting firm working at the intersection of geopolitical, digital, urban, energy and cyber risk.

National Response Centre for Cyber Crime (NR3C)

National Response Centre for Cyber Crime (NR3C)

National Response Centre for Cyber Crime (NR3C) is a law enforcement agency in Pakistan dedicated to fighting cyber crime.

Texplained

Texplained

Texplained specializes in security audits of microchips to identify vulnerabilities and protect against invasive cyber attacks.

QuintessenceLabs

QuintessenceLabs

QuintessenceLabs offers a suite of Data Security technology, products and solutions to secure digital information in-transit, at-rest or in-use.

Bluink

Bluink

Bluink specializes in identity and access management and customer identity verification, using your smartphone as a strong authenticator and secure identity store.

Cybersecurity & Infrastructure Security Agency (CISA)

Cybersecurity & Infrastructure Security Agency (CISA)

CISA leads the national effort to defend critical infrastructure against the threats of today and to secure against the evolving risks of tomorrow.

Egyptian Supreme Cybersecurity Council (ESCC)

Egyptian Supreme Cybersecurity Council (ESCC)

ESCC is responsible for developing a national strategy to face and respond to the cyber threats and attacks and to oversee its implementation and update.

DFI

DFI

DFI is a global leading provider of high-performance computing technology across multiple embedded industries.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Hut Six Security

Hut Six Security

Train, test and track your Information Security culture through information security awareness training and customised phishing simulation campaigns.

Ackcent Cybersecurity

Ackcent Cybersecurity

Ackcent's mission is to help our clients to protect their critical digital assets by providing them with a portfolio of specialised professional services.

Techsolidity

Techsolidity

Techsolidity is an emerging e-learning platform that offers a wide range of upskilling programs worldwide in areas including cybersecurity.

Protect AI

Protect AI

Protect AI is a cybersecurity company focused on AI & ML systems. Through innovative security products and thought leadership in MLSecOps, we help our customers build a safer AI powered world.

Prescott

Prescott

Prescott acts as your guiding light in the preparation for your CMMC assessment and long after by governing your cybersecurity practice.

DHCO IT

DHCO IT

The DHCO IT team are experts in IT support, cyber security, cloud support and disaster recovery, and are Microsoft 365 partners.