Snowden On Police Chasing Journalist’s Data

Edward Snowden has condemned Australian law enforcement for collecting the communications records of a Guardian journalist without a warrant.

The world’s most prominent whistleblower, who disclosed dragnet surveillance unprecedented in its scale by the National Security Agency and its allies, singled out for critique the Australian government’s contention that it broke no laws in its leak investigation of Paul Farrell, a Guardian reporter who in 2014 exposed the inner workings of Australia’s maritime interception of asylum seekers.

Australia's attacks on journalists' sources are about politics, not national security. “Police in developed democracies don’t pore over journalists’ private activities to hunt down confidential sources,” Snowden told the Guardian.

“The Australian federal police are defending such operations as perfectly legal, but that’s really the problem, isn’t it? Sometimes the scandal is not what law was broken, but what the law allows.”

Throughout 2015 the Australian parliament enacted a series of controversial laws that curbed privacy and freedom of expression rights. Geoffrey King, director of the Committee to Protect Journalists’ Technology Program, said the AFP’s actions were “obviously outrageous”.

“This should not be happening. But it is the inevitable result of mandatory data retention and mass surveillance, which is neither necessary nor proportional to any threat,” King said. “It doesn’t line up with the values that we all adhere to, to good counter-terrorism strategy, and it certainly doesn’t line up with a free and open society where journalists can do their jobs.”

In March 2015 the Australian Senate passed legislation requiring Internet and mobile phone companies to retain customer metadata for 24 months. The bill was vehemently opposed by the Australian Greens whose communications spokesman Senator Scott Ludlam called it a new provisions and a new, “form of mass surveillance”.

Although a last-minute amendment obliged security agencies to get a warrant before accessing a journalist’s metadata, the law essentially expands the Australian government’s ability to conduct dragnet surveillance.

Australia, along with the US, UK, Canada and New Zealand, is part of the Five Eyes signals-intelligence sharing network.

Documents leaked by Snowden in 2013 revealed that Australian spying authorities had offered to share bulk metadata of ordinary Australian citizens with their partners in the Five Eyes network. Other documents Snowden leaked revealed Australian spies had attempted to listen in to the phone calls of former Indonesian president Susilo Bambang Yudhoyono and his inner circle, causing an extended diplomatic rift between the two countries.

The investigation into Farrell’s sources, for a story relating to the activities of an Australian customs vessel and a controversial operation to turn back a boat carrying asylum seekers from Indonesia, was conducted in 2014, before the amendment passed parliament. Law enforcement did not need a warrant for accessing the information at the time.

The case marks the first time the AFP has confirmed seeking access to a journalist’s metadata in a specific case, although the agency has admitted to investigating several journalists reporting on Australian immigration.
The acknowledgement that authorities had sought access to Farrell’s records was only divulged after the reporter lodged a complaint with Australia’s privacy commissioner under the country’s Privacy Act.

In July 2015, the Australian government passed the Border Force Act, which criminalises whistleblowing from within Australia’s hardline immigration detention network, making it an offense punishable with up to two years in prison.

The country’s “Operation Sovereign Borders”, a harsh, military-led crackdown on asylum seekers who attempt to enter Australia by boat, includes a policy of turning back boats carrying migrants and deporting every arrival including children to harsh, offshore detention centres in Papua New Guinea and the tiny Pacific island state of Nauru, for permanent resettlement.

Guardian: http://bit.ly/1SmlbdA

« Smart UAE Police Cars For Expo 2020
Google Faces EU Monopoly Law Over Android Dominance »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

ACIS Professional Center

ACIS Professional Center

ACIS provides training and consulting services in the area of information technology, cybersecurity, IT Governance, IT Service management, information security and business continuity management.

HackerOne

HackerOne

HackerOne was started by hackers and security leaders who are driven by a passion to make the internet safer.

Coalfire

Coalfire

Coalfire specialises in cyber risk management and compliance. Our services span the cybersecurity lifecycle from advisory and compliance, to testing and engineering, monitoring and optimization.

iXsystems

iXsystems

iXsystems is a leader in Open-Source enterprise server and storage solutions including Backup & Recovery to protect critical data.

Subex

Subex

Subex leverages its award-winning telecom analytics solutions in areas such as Revenue Assurance, Fraud Management, Asset Assurance and Partner Management, and IoT Security.

bwtech@UMBC

bwtech@UMBC

The bwtech@UMBC Cyber Incubator is an innovative business incubation program that delivers business and technical support to start-up and early-stage cybersecurity/IT products and services companies.

Cyber Observer

Cyber Observer

Cyber Observer’s team specializes in providing corporate officers with comprehensive, visual, real-time performance overview, critical security control (CSC) analysis.

Insight Partners

Insight Partners

Insight Partners is a leading global private equity and venture capital firm investing in growth-stage technology, software and Internet businesses.

Human Security

Human Security

Human (formerly White Ops) Bot Mitigation Platform enables complete protection from sophisticated bot attacks across advertising, marketing and cybersecurity.

Redpoint Security

Redpoint Security

Redpoint Security is an application security consulting firm that is focused on all aspects of code security.

Analygence

Analygence

ANALYGENCE is your trusted partner for mission support, cyber solutions, and management services.

Zorus

Zorus

Zorus provides best-in-class cybersecurity products to MSP partners to help them grow their business and protect their clients.

ClearShark

ClearShark

Since 2001, ClearShark has been a go-to adviser in the U.S. Public Sector for creating customized and integrated solutions for the most secure of networks.

DeviQA

DeviQA

DeviQA provide best-in-class quality assurance services to companies of all sizes.

Softanics

Softanics

Softanics’ ArmDot protects .NET apps with advanced obfuscation, control flow protection, and virtualization, securing code against reverse engineering without requiring agents or environment changes.

DYOPATH

DYOPATH

At DYOPATH we work with the single purpose of helping our clients combat the ongoing increase of cyber threats, the growth in more complex IT environments, and ever-increasing human capital shortages.