Snowden On Police Chasing Journalist’s Data

Edward Snowden has condemned Australian law enforcement for collecting the communications records of a Guardian journalist without a warrant.

The world’s most prominent whistleblower, who disclosed dragnet surveillance unprecedented in its scale by the National Security Agency and its allies, singled out for critique the Australian government’s contention that it broke no laws in its leak investigation of Paul Farrell, a Guardian reporter who in 2014 exposed the inner workings of Australia’s maritime interception of asylum seekers.

Australia's attacks on journalists' sources are about politics, not national security. “Police in developed democracies don’t pore over journalists’ private activities to hunt down confidential sources,” Snowden told the Guardian.

“The Australian federal police are defending such operations as perfectly legal, but that’s really the problem, isn’t it? Sometimes the scandal is not what law was broken, but what the law allows.”

Throughout 2015 the Australian parliament enacted a series of controversial laws that curbed privacy and freedom of expression rights. Geoffrey King, director of the Committee to Protect Journalists’ Technology Program, said the AFP’s actions were “obviously outrageous”.

“This should not be happening. But it is the inevitable result of mandatory data retention and mass surveillance, which is neither necessary nor proportional to any threat,” King said. “It doesn’t line up with the values that we all adhere to, to good counter-terrorism strategy, and it certainly doesn’t line up with a free and open society where journalists can do their jobs.”

In March 2015 the Australian Senate passed legislation requiring Internet and mobile phone companies to retain customer metadata for 24 months. The bill was vehemently opposed by the Australian Greens whose communications spokesman Senator Scott Ludlam called it a new provisions and a new, “form of mass surveillance”.

Although a last-minute amendment obliged security agencies to get a warrant before accessing a journalist’s metadata, the law essentially expands the Australian government’s ability to conduct dragnet surveillance.

Australia, along with the US, UK, Canada and New Zealand, is part of the Five Eyes signals-intelligence sharing network.

Documents leaked by Snowden in 2013 revealed that Australian spying authorities had offered to share bulk metadata of ordinary Australian citizens with their partners in the Five Eyes network. Other documents Snowden leaked revealed Australian spies had attempted to listen in to the phone calls of former Indonesian president Susilo Bambang Yudhoyono and his inner circle, causing an extended diplomatic rift between the two countries.

The investigation into Farrell’s sources, for a story relating to the activities of an Australian customs vessel and a controversial operation to turn back a boat carrying asylum seekers from Indonesia, was conducted in 2014, before the amendment passed parliament. Law enforcement did not need a warrant for accessing the information at the time.

The case marks the first time the AFP has confirmed seeking access to a journalist’s metadata in a specific case, although the agency has admitted to investigating several journalists reporting on Australian immigration.
The acknowledgement that authorities had sought access to Farrell’s records was only divulged after the reporter lodged a complaint with Australia’s privacy commissioner under the country’s Privacy Act.

In July 2015, the Australian government passed the Border Force Act, which criminalises whistleblowing from within Australia’s hardline immigration detention network, making it an offense punishable with up to two years in prison.

The country’s “Operation Sovereign Borders”, a harsh, military-led crackdown on asylum seekers who attempt to enter Australia by boat, includes a policy of turning back boats carrying migrants and deporting every arrival including children to harsh, offshore detention centres in Papua New Guinea and the tiny Pacific island state of Nauru, for permanent resettlement.

Guardian: http://bit.ly/1SmlbdA

« Smart UAE Police Cars For Expo 2020
Google Faces EU Monopoly Law Over Android Dominance »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Metasploit

Metasploit

Metasploit penetration testing software helps find security issues, verify vulnerabilities and manage security assessments.

ShadowDragon

ShadowDragon

ShadowDragon develops digital tools that simplify the complexities of modern investigations that involve multiple online environments and technologies.

Cyversity

Cyversity

Cyversity's mission (formerly ICMCP) is the consistent representation of women and underrepresented minorities in the cybersecurity industry.

Elemendar

Elemendar

Elemendar Artificial Intelligence reads cyber threat reports written by humans and translates them into industry-standard, machine-readable and machine-actionable data.

OXO Cybersecurity Lab

OXO Cybersecurity Lab

OXO Cybersecurity Lab is the first dedicated cybersecurity incubator in the Central & Eastern Europe region.

Findcourses.co.uk

Findcourses.co.uk

Findcourses is a dedicated education search engine designed to make it easy for our learners to search and find exactly what they need from our community of trusted training providers.

OurCrowd

OurCrowd

OurCrowd is a leading equity crowdfunding platform for investing in global startups.

BicDroid

BicDroid

BicDroid is a world leader in data and cyber security with innovative solutions that protect your data anywhere, anytime, against everything.

Flix11

Flix11

Flix11 is a Cyber Security & ICT Solutions focused company. We provide a range of products and services in Cyber Security, Internet of Things (IoT) and infrastructure solutions.

Nisos

Nisos

Nisos provides unrivaled protection of your reputation and assets through the practice of Active Defense.

PCS Security (PCSS)

PCS Security (PCSS)

PCS Security provides secure, reliable and state-of-the-art security solutions to help our customers address their security concerns.

Sterling Information Technologies

Sterling Information Technologies

Sterling is an information security, operational risk consulting and advisory group. Our Advisory services help to safeguard information assets while supporting business operations.

AT&T Cybersecurity

AT&T Cybersecurity

AT&T Cybersecurity’s Edge-to-Edge technologies provide threat intelligence, collaborative defense, security without the seams, and solutions that fit your business.

Royal United Services Institute (RUSI)

Royal United Services Institute (RUSI)

The Royal United Services Institute is an independent think tank engaged in cutting edge defence and security research. Areas of research include cyber security and resilience.

Arista Middle East

Arista Middle East

Arista Middle East is part of Global Arista Technologies specializing in OT Cybersecurity.

AccessIT Group

AccessIT Group

AccessIT Group is a specialized cybersecurity solutions provider offering a full range of advanced security services.