Footnotes
Preliminary Pages
[1]
All definitions are drawn from Attorney-General’s Department, Equipping
Australia Against Emerging and Evolving Threats, July 2012; and UK
Intelligence and Security Committee, Access to Communications Data by the
Intelligence and Security Agencies, UK Parliament, February 2013.
Chapter 1 Introduction
[1]
Attorney-General’s Department, Equipping Australia against emerging
and evolving threats, Discussion Paper, July 2012, p. 12.
[2]
Attorney-General’s Department, Equipping Australia against emerging
and evolving threats, Discussion Paper, July 2012, p. 22.
[3]
Attorney-General’s Department, Equipping Australia against emerging
and evolving threats, Discussion Paper, July 2012, p. 29.
[4]
Attorney-General’s Department, Equipping Australia against emerging
and evolving threats, Discussion Paper, July 2012, p. 29. An externality
refers to a cost or benefit that accrues to actors which are not directly
involved in a transaction.
[5]
On 3 May 2013 the Government announced its intention to rename the DSD
and DIGO as the Australian Signals Directorate (ASD) and the Australian
Geospatial-Intelligence Organisation (AGO) respectively. <http://www.minister.defence.gov.au/2013/05/03/prime-minister-and-minister-for-defence-joint-media-release-2013-defence-white-paper-renaming-the-defence-signals-directorate-and-the-defence-imagery-and-geospatial-organisation/>,
viewed on 6 May 2013.
[6]
Attorney-General’s Department, Equipping Australia against emerging
and evolving threats, Discussion Paper, July 2012, p. 40.
[7]
Attorney-General’s Department, Equipping Australia against emerging
and evolving threats, Discussion Paper, July 2012, p. 40.
Chapter 2 Telecommunications Interception
[1]
Attorney-General’s Department, Equipping Australia against emerging
and evolving threats, Discussion Paper, July 2012, p. 12.
[2]
Attorney-General’s Department, Equipping Australia against emerging
and evolving threats, Discussion Paper, July 2012, p. 12.
[3]
Attorney-General’s Department, Equipping Australia against emerging
and evolving threats, Discussion Paper, July 2012, p. 22.
[4] Attorney-General’s Department, Submission
No. 218, pp. 2-3
[5]
Attorney-General’s Department, Equipping Australia against emerging
and evolving threats, Discussion Paper, July 2012, pp. 7-8.
[6]
Attorney-General’s Department, Equipping Australia against emerging
and evolving threats, Discussion Paper, July 2012, p. 12.
[7]
Western Australia Police, Submission No. 203, p. 6.
[8]
Law Council of Australia, Submission No. 96, pp. 21-2.
[9]
NSW Council for Civil Liberties, Submission No. 175, p. 15.
[10]
Privacy Victoria, Submission No. 109, p. 3.
[11]
Office of the Australian Information Commissioner, Submission No. 183,
pp. 1-2.
[12]
Western Australian Corruption and
Crime Commission, Submission No. 156, p. 4.
[13]
Privacy Victoria, Submission No. 109, p. 1.
[14]
Attorney-General’s Department, Submission No. 218, Attachment A p.
1.
[15]
Mr Bernard Keane, Submission No. 117, p. 3. See also Mr Robert
Batten, Submission No. 50, p. 3; Mr Ian Quick, Submission No. 95,
p. 4.
[16]
Law Council of Australia, Submission No. 96, p. 23.
[17]
Australian Federal Police, Submission No. 163, p. 8.
[18]
Australian Federal Police, Submission No. 163, p. 8.
[19]
Western Australia Police, Submission No. 203, p. 6. See also: Western
Australian Corruption and Crime Commission, Submission No. 156, pp. 4-5.
[20]
Human Rights Law Centre, Submission No. 140, pp. 2-3.
[21] Attorney-General’s
Department, Equipping Australia against emerging and evolving threats,
Discussion Paper, July 2012, p. 26.
[22] Attorney-General’s
Department, Equipping Australia against emerging and evolving threats,
Discussion Paper, July 2012, p. 26.
[23] Attorney-General’s
Department, Equipping Australia against emerging and evolving threats,
Discussion Paper, July 2012, p. 26.
[24] Mr Bernard Keane, Submission
No. 117, p. 3. See also Electronic Frontiers Australia, Submission No.
121, pp. 12-13
[25] Australian Federal
Police, Submission No. 163, p. 9.
[26] Australian Federal
Police, Submission No. 163, p. 9.
[27] Western Australia
Corruption and Crime Commission, Submission No. 156, p. 5. See also
Western Australia Police, Submission No. 203, pp. 6-7.
[28] Law Council of
Australia, Submission No. 96, p. 48.
[29] Law Council of
Australia, Submission No. 96, p. 48.
[30] See for example,
Inspector-General of Intelligence and Security, Submission No. 185, p.
8.
[31] Attorney-General’s
Department, Equipping Australia against emerging and evolving threats,
Discussion Paper, July 2012, p. 26.
[32] Attorney-General’s
Department, Equipping Australia against emerging and evolving threats,
Discussion Paper, July 2012, p. 26.
[33] Western Australia
Police, Submission No. 203, p. 7.
[34] Telstra, Submission
No. 189, p. 6.
[35] Office of the
Australian Information Commissioner, Submission No. 183, p. 12.
[36] Law Council of
Australia, Submission No. 96, p. 50.
[37] Attorney-General’s
Department, Equipping Australia against emerging and evolving threats,
Discussion Paper, July 2012, pp. 8, 9.
[38] Attorney-General’s
Department, Equipping Australia against emerging and evolving threats,
Discussion Paper, July 2012, p. 24.
[39] Ms Stella Gray, Submission
No. 152, p. 7.
[40] Liberty Victoria, Submission
No. 143, p. 6. See also Mr Bernard Keane, Submission No. 117, pp.
3-4; Senator Scott Ludlam, Submission No. 146, p. 3; Mr Ian Quick,
Submission No. 95, p. 5.
[41] Attorney-General’s
Department, Submission No. 218, p. 9.
[42] Telecommunications
(Interception and Access) Act 1979 Annual Report 2010-11, pp. 62-5.
[43] Ms Irene Graham, Submission
No. 135, p. 5.
[44] Telstra, Submission
No. 189, p. 6.
[45] Australian Mobile
Telecommunications Association – Communications Alliance, Submission No. 114,
p. 7.
[46] Attorney-General’s
Department, Submission No. 218, p. 5.
[47] Liberty Victoria, Submission
No. 143, p. 2. See also Mr Bernard Keane, Submission No. 117, p. 4;
Electronic Frontiers Australia, Submission No. 121, p. 13; Pirate Party
Australia, Submission No. 134, p. 12; and Ms Stella Gray, Submission
No. 152, p. 8.
[48] Victoria Police, Submission
No. 200, p. 7.
[49] Western Australia
Police, Submission No. 203, p. 8.
[50]
Australian Competition and Consumer Commission, Submission No. 192,
p. 5.
[51] Law Council of
Australia, Submission No. 96, p. 30.
[52] Inspector-General of
Intelligence and Security, Submission No. 185, p. 9.
[53] Australian Federal
Police, Submission No. 163, pp. 9-10.
[54] Attorney-General’s
Department, Equipping Australia against emerging and evolving threats,
Discussion Paper, July 2012, p. 23.
[55] Telecommunications
(Interception and Access) Act 1979 Annual Report 2010-11, pp. 42, 44-5.
[56] Detective Inspector Gavan
Seagrave, Transcript, 5 September 2012, pp. 29-30.
[57] Australian Federal
Police, Submission No. 163, pp. 12-13.
[58] WA Corruption and Crime
Commission, Submission No. 156, p. 10.
[59] Law Council of
Australia, Submission No. 96, p. 31
[60] Liberty Victoria, Submission
No. 143, p. 3.
[61] Mr Daniel Judge, Submission
No. 157, p. 9. See also J Trevaskis, Submission No. 62, p. 8; Mr
Mark Newton, Submission No. 87, p. 9, and James (no further details), Submission
No. 7.
[62] Attorney-General’s
Department, Submission No. 218, Attachment A p. 1
[63] Inspector-General of
Intelligence and Security, Submission No. 185, pp. 11-12.
[64] Attorney-General’s
Department, Equipping Australia against emerging and evolving threats,
Discussion Paper, July 2012, pp. 8-9.
[65]
Attorney-General’s Department, Equipping Australia against emerging and
evolving threats, Discussion Paper, July 2012, p. 25.
[66] Commissioner Andrew
Scipione, Transcript, 26 September 2012, pp. 17-18. See also Western
Australia Police, Submission No. 156, p. 6.
[67] Commissioner Andrew
Scipione, Transcript, 26 September 2012, p. 25.
[68] Victoria Police, Submission
No. 200, p. 11. See also Western Australia Police, Submission No. 203,
p. 9.
[69] Liberty Victoria, Submission
No. 143, pp. 8-9.
[70] Ms Stella Gray, Submission
No. 152, p. 7.
[71] Mr Bernard Keane, Submission
No. 117, p. 4.
[72] Pirate Party Australia,
Submission No. 134, p. 13.
[73] Australian Federal
Police, Submission No. 163, p. 10. See also: Australian Customs and
Border Protection Service, Submission No. 168, p. 3.
[74]
Office of the Australian Information Commissioner, Submission No. 183,
pp. 10-11.
[75] Mr Mark Newton, Submission
No. 87, p. 7.
[76] Law Council of
Australia, Submission No. 96, p. 46.
[77] Law Council of
Australia, Submission No. 96, p. 47.
[78] Attorney-General’s
Department, Equipping Australia against emerging and evolving threats,
Discussion Paper, July 2012, p. 17
[79]
Attorney-General’s Department, Submission No. 236, p. 18.
[80]
Attorney-General’s Department, Submission No. 236, p. 18.
[81]
Attorney-General’s Department, Submission No. 236, p. 18.
[82] Attorney-General’s
Department, Submission No. 218, p. 5.
[83] Victoria Police, Submission
No. 200, p. 13.
[84] Western Australia
Police, Submission No. 203, p. 11.
[85] Australian Mobile
Telecommunications Association – Communications Alliance, Submission No. 114,
p. 10.
[86]
iiNet, Submission No. 108, p. 10.
[87] Western Australia
Corruption and Crime Commission, Submission 156, p. 8.
[88] Pirate Party, Submission
No. 134, p. 15.
[89] Tasmanian Association
of Community Legal Centres, Submission No. 184, pp. 2-3.
[90] Inspector-General of
Intelligence and Security, Submission No. 185, pp. 9, 10.
[91] Gilbert + Tobin Centre
for Public Law, Submission No. 36, p. 9.
[92]
Law Council of Australia, Submission No. 96, p. 53.
[93] Attorney-General’s
Department, Equipping Australia against emerging and evolving threats,
Discussion Paper, July 2012, p. 13.
[94]
Attorney-General’s Department, Equipping Australia against emerging and
evolving threats, Discussion Paper, July 2012, p. 28.
[95]
Attorney-General’s Department, Submission No. 236, p. 19.
[96]
Attorney-General’s Department, Submission No. 236, p. 19.
[97]
Attorney-General’s Department, Submission No. 236, p. 19.
[98]
Australian Communications and Media Authority website, <www.acma.gov.au>, viewed 7 June 2013.
[99] Attorney-General’s
Department, Equipping Australia against emerging and evolving threats,
Discussion Paper, July 2012, p. 28.
[100] Telstra, Submission
No. 189, p. 7
[101] Mr Ian Quick, Submission
No. 95, p. 7.
[102] Mr Bernard Keane, Submission
No. 117, p. 5.
[103] Attorney-General’s
Department, Equipping Australia against emerging and evolving threats,
Discussion Paper, July 2012, p. 27.
[104] Australian Mobile
Telecommunications Association – Communications Alliance, Submission No. 114,
p. 10.
[105] iiNet, Submission No.
108, pp. 10-11.
[106] Western Australia
Corruption and Crime Commission, Submission No. 156, p. 8.
[107]
Commissioner Scipione, Transcript, 26 September 2012, p. 18.
[108]
Western Australia Police, Submission No. 203, pp. 11-12.
[109] Victoria Police, Submission
No. 200, p. 14
[110] Attorney-General’s
Department, Equipping Australia against emerging and evolving threats,
Discussion Paper, July 2012, p. 28.
[111] Ms Stella Gray, Submission
No. 152, p. 6.
[112] iiNet, Submission No.
108, p. 11
[113] Australian Mobile
Telecommunications Association – Communications Alliance, Submission No. 114,
p. 11.
[114] Australian Mobile
Telecommunications Association – Communications Alliance, Submission No. 114,
p. 12.
[115] Telstra, Submission
No. 189, p. 9.
[116] Mr James Shaw, Transcript,
27 September 2012, p. 2.
[117] Mr Mark Newton, Submission
No. 87, p. 9.
[118] Attorney-General’s
Department, Submission No. 218, pp. 6-7.
[119] Australian Mobile
Telecommunications Association – Communications Alliance, Submission No. 114,
p. 12. See also Mr James Sinnamon, Submission No. 100, p. 1; Privacy
Victoria, Submission No. 109, p. 6; Mr Arved von Brasch, Submission
No. 126, p. 3.
[120] Commissioner Tony Negus, Transcript,
26 September 2012, p. 28.
[121] Australian Federal
Police, Submission No. 163, pp. 14-15.
[122] Queensland Crime and
Misconduct Commission, Submission No. 147, p. 7. See also Western
Australia Corruption and Crime Commission, Submission No. 156, p. 10;
Victoria Police, Submission No. 200, p. 15, Western Australia Police, Submission
No. 203, p. 13.
[123]
Electronic Frontiers Australia, Submission No. 121, p. 15
[124]
Human Rights Law Centre, Submission No. 140, p. 11. See also, Mr
Breheny, Transcript, 5 September 2012, p. 45; Mr Bernard Keane, Submission
No. 117, p. 12.
[125] Mr Ian Quick, Submission
No. 95, p. 13.
[126]
Law Council of Australia, Submission No. 96, p. 36.
[127] Western Australia Police,
Submission No. 203, p. 13. See also: Western Australia Corruption and
Crime Commission, Submission No. 156, pp. 10-11.
[128] Optus, Submission No.
206, p. 2.
[129] Australian Mobile
Telecommunications Association – Communications Alliance, Submission No. 114,
p. 13.
[130] iiNet, Submission No.
108, p. 12.
[131] Telstra, Submission
No. 189, p. 10.
[132] Western Australia Police,
Submission No. 203, p. 9.
[133] Attorney-General’s
Department, Submission No. 218, pp. 2-3
[134] Privacy Victoria, Submission
No. 109, p. 2
Chapter 3 Telecommunications security
[1]
Attorney-General’s Department, Equipping Australia against emerging
and evolving threats, Discussion Paper, July 2012, p. 29.
[2]
Attorney-General’s Department, Equipping Australia
against emerging and evolving threats, Discussion Paper, July 2012, p.
29. An externality refers to a cost or benefit that accrues to actors which are
not directly involved in a transaction.
[3]
Attorney-General’s Department, Equipping Australia against emerging
and evolving threats, Discussion Paper, July 2012, p. 30.
[4]
Attorney-General’s Department, Equipping Australia against emerging and
evolving threats, Discussion Paper, July 2012, p. 32.
[5]
Ian Dudgeon, ‘Cyber-Security: the importance of partnerships’, Regional
Security Outlook 2013, Council for Security Cooperation in the Asia-Pacfic,
p. 9.
[6]
Ian Dudgeon, ‘Cyber-Security: the importance of partnerships’,
Regional Security Outlook 2013, Council for Security Cooperation in the
Asia-Pacfic, p. 10.
[7]
Ian Dudgeon, ‘Cyber-Security: the importance of partnerships’,
Regional Security Outlook 2013, Council for Security Cooperation in the
Asia-Pacfic, p. 10.
[8]
Attorney-General’s Department, Equipping Australia against emerging
and evolving threats, Discussion Paper, July 2012, p. 29.
[9]
Attorney-General’s Department, Equipping Australia against emerging
and evolving threats, Discussion Paper, July 2012, p. 34.
[10]
Attorney-General’s Department, Equipping Australia against emerging and
evolving threats, Discussion Paper, July 2012, pp. 29-30.
[11]
Mr Mark Newton, Submission No. 87, p. 10.
[12]
Mr Daniel Black, Submission No. 97, p. 7.
[13]
Mr Matthew John Healy, National Executive, Industry and Policy, Macquarie
Telecom, Transcript, 5 September 2012, pp. 11 -12.
[14]
Macquarie Telecom, Submission No. 115, pp. 2-3.
[15]
Mr Timothy Pilgrim, Privacy Commissioner, Office of the Australian
Information Commissioner, Submission No. 183, p. 16.
[16]
Optus, Submission No. 206, p. 3.
[17]
Optus, Submission No. 206, p .3.
[18]
Attorney-General’s Department, Equipping Australia against emerging and
evolving threats, Discussion Paper, July 2012, p. 35.
[19]
Attorney-General’s Department, Equipping Australia against emerging and
evolving threats, Discussion Paper, July 2012, p. 36.
[20]
Optus, Submission No. 206, p. 3.
[21]
Australian Mobile Telecommunications Association and Communications
Alliance, Submission No. 114, p. 17; see also: Huawei Technologies
(Australia) Pty Limited, Submission No. 149, p. 11.
[22]
Mr Timothy Pilgrim, Privacy Commissioner, Office of the Australian
Information Commissioner, Submission No. 183, p. 16.
[23]
Australian Mobile Telecommunications Association and Communications
Alliance, Submission No. 114, p. 17.
[24]
Attorney-General’s Department, Equipping Australia against emerging and
evolving threats, Discussion Paper, July 2012, p. 36.
[25]
Mr Mark Newton, Submission no. 87, p. 10.
[26]
Telecommunications (Interception and Access) Act 1979, section 202.
[27]
Macquarie Telecom, Submission No. 115, p. 2.
[28]
Vodafone Hutchison Australia, Submission No. 113, p.2; see also:
Optus, Submission no. 206, p. 3, Cisco Systems Australia Pty Limited, Submission
No. 112, p. 2; and Huawei Technologies (Australia) Pty Limited, Submission
No. 149, p. 12.
[29]
Australian Mobile Telecommunications Association and Communications
Alliance, Submission No. 114, p. 18; see also: Telstra, Submission
no. 189, p. 12.
[30]
Telstra, Submission No. 189, pp. 12-13.
[31]
Attorney-General’s Department, Equipping Australia against emerging and
evolving threats, Discussion Paper, July 2012, p. 37.
[32]
Australian Mobile Telecommunications Association and Communications
Alliance, Submission No. 114, p. 19.
[33]
Telstra, Submission No. 189, p. 13.
[34]
Australian Mobile Telecommunications Association and Communications
Alliance, Submission No. 114, p. 18.
[35]
Australian Mobile Telecommunications Association and Communications
Alliance, Submission No. 114, pp. 18-19.
[36]
Office of Australian Information Commissioner, Submission No. 183,
p. 20.
[37]
Australian Mobile Telecommunications Association and Communications
Alliance, Submission No. 114, p. 19.
[38]
Senetas, Submission No. 237, p. 1.
[39]
Huawei Technologies (Australia) Pty Limited, Submission No. 149, p.
15.
[40]
Mr Timothy Pilgrim, Privacy Commissioner, Office of the Australian
Information Commissioner, Submission No. 183, p. 16.
Chapter 4 Australian Intelligence Community Legislation Reform
[1]
Attorney-General’s
Department, Equipping Australia against emerging and evolving threats,
Discussion Paper, July 2012, p. 40.
[2]
Attorney-General’s Department, Equipping Australia against emerging
and evolving threats, Discussion Paper, July 2012, p. 40.
[3]
Attorney-General’s Department, Equipping Australia against emerging
and evolving threats, Discussion Paper, July 2012, p. 39.
[4]
Attorney-General’s Department, Equipping Australia against emerging
and evolving threats, Discussion Paper, July 2012, p. 39.
[5]
Mr Ian Quick, Submission No. 95, p. 8.
[6]
Mr Ian Quick, Submission No. 95, p. 8.
[7]
Inspector-General of Intelligence and Security, Submission No. 185,
p. 14.
[8]
Gilbert + Tobin Centre of Public Law, Submission No. 36, p. 11.
[9]
Australian Privacy Foundation, Submission No. 162, p. 9.
[10]
Attorney-General’s Department, Equipping Australia against emerging and
evolving threats, Discussion Paper, July 2012, p. 48.
[11]
Law Council of Australia, Submission No. 96, p. 66.
[12]
Inspector-General of Intelligence and Security, Submission No. 185,
p. 20.
[13]
Attorney-General’s Department, Submission No. 236, p. 2.
[14]
Australian Mobile Telecommunications Association and Communications
Alliance, Submission no. 114, p. 20.
[15]
Telstra, Submission No. 189, p. 14; see also: Mr Evan Slatyer, Submission
No. 131, p. 1.
[16]
Mr Robert Batten, Submission No. 50, p. 10; see also Internet
Society of Australia, Submission No. 145, p. 3.
[17]
Inspector-General of Intelligence and Security, Submission No. 185,
p. 20.
[18]
Attorney-General’s Department, Equipping Australia against emerging and
evolving threats, Discussion Paper, July 2012, p. 50.
[19]
Attorney-General’s Department, Equipping Australia against emerging and
evolving threats, Discussion Paper, July 2012, p. 50.
[20]
Liberty Victoria, Submission No. 143, p. 3; see also: Mr Daniel
Judge, Submission No. 157, p. 13; Ms Stella Gray, Submission No. 152,
pp. 11-12; see also: New South Wales Young Lawyers, Submission No. 133,
p. 8.
[21]
Office of the Victorian Privacy Commissioner, Submission No. 109, p.
6.
[22]
Dr Anthony Bendall, Acting Privacy Commissioner, Office of the Victorian
Privacy Commissioner, Transcript, Melbourne, 5 September 2012.
[23]
Attorney-General’s Department, Submission No. 236, p. 1.
[24]
Inspector-General of Intelligence and Security, Submission No. 185,
p. 21.
[25]
Attorney-General’s Department, Submission No. 236, p. 1.
[26]
Mr Johann Trevaskis, Submission No.62, p. 11.
[27]
Liberty Victoria, Submission No. 143, p. 3.
[28]
Inspector-General of Intelligence and Security, Submission No. 185,
p. 3.
[29]
Attorney-General’s Department, Equipping Australia
against emerging and evolving threats, Discussion Paper, July 2012, p. 41.
[30]
New South Wales Young Lawyers, Submission No. 133, p. 7; see also:
Law Council of Australia, Submission No. 96, p. 67.
[31]
Law Council of Australia, Submission No. 96, p. 67; see also: New
South Wales Young Lawyers, Submission No. 133, p. 6.
[32]
Attorney-General’s Department, Submission No. 236, p. 5.
[33]
Office of the Victorian Privacy Commissioner, Submission No. 109, p.
4; see also: Ms Stella Gray, Submission No. 152, p. 9.
[34]
Attorney-General’s Department, Submission No. 236, p. 5.
[35]
Attorney-General’s Department, Equipping Australia against emerging and
evolving threats, Discussion Paper, July 2012, p41, p. 42.
[36]
Castan Centre for Human Rights Law, Submission No. 142, p. 4.
[37]
Mr Daniel Nazer, Submission No. 110, p. 7.
[38]
Attorney-General’s Department, Submission No. 236,
p. 3.
[39]
Inspector-General of Intelligence and Security, Submission No. 185,
p. 15.
[40]
Inspector-General of Intelligence and Security, Submission No. 185,
p. 15.
[41]
Inspector-General of Intelligence and Security, Submission No. 185,
p. 15.
[42]
Attorney-General’s Department, Submission No. 236, p. 3.
[43]
Attorney-General’s Department, Equipping Australia against emerging and
evolving threats, Discussion Paper, July 2012, p. 42.
[44]
Liberty Victoria, Submission No. 143, p. 10; see also: Castan Centre
for Human Rights Law, Submission No. 142, p. 4; Mr M Newton, Submission
No. 87, p. 11.
[45]
Inspector-General of Intelligence and Security, Submission No. 185,
p. 15.
[46]
Gilbert + Tobin Centre of Public Law, Submission No. 36, pp. 13-14.
[47]
Attorney-General’s Department, Submission No. 236, p. 4.
[48]
Attorney-General’s Department, Submission No. 236, p. 4.
[49]
Attorney-General’s Department, Equipping Australia against emerging and
evolving threats, Discussion Paper, July 2012, p. 43.
[50]
Attorney-General’s Department, Equipping Australia against emerging and
evolving threats, Discussion Paper, July 2012, p. 43.
[51]
Inspector-General of Intelligence and Security, Submission No. 185,
p. 16.
[52]
Attorney-General’s Department, Equipping Australia against emerging and
evolving threats, Discussion Paper, July 2012, p. 41.
[53]
Attorney-General’s Department, Equipping Australia against emerging and
evolving threats, Discussion Paper, July 2012, p. 45.
[54]
Attorney-General’s Department, Equipping Australia against emerging and
evolving threats, Discussion Paper, July 2012, p. 45.
[55]
Ms Stella Gray, Submission No. 152, p. 10.
[56]
Attorney-General’s Department, Equipping Australia against emerging and
evolving threats, Discussion Paper, July 2012, p. 45.
[57]
Inspector-General of Intelligence and Security, Submission No. 185,
p. 23.
[58]
Attorney-General’s Department, Equipping Australia against emerging and
evolving threats, Discussion Paper, July 2012, p. 46.
[59]
AFP, Controlled Operations annual Report 2010-2011, viewed 12
November 2012, <www.afp.gov.au/media-centre/publications/~/media/afp/html/controlled-operations-annual-report-2010-2011.ashx>.
[60]
Attorney-General’s Department, Equipping Australia against emerging and
evolving threats, Discussion Paper, July 2012, p. 46.
[61]
Attorney-General’s Department, Equipping Australia against emerging and
evolving threats, Discussion Paper, July 2012, pp. 46-47.
[62]
Dr Patrick Emerton, Castan Centre for Human Rights Law, Transcript,
Melbourne, 5 September 2012, p. 21; see also NSW Council for Civil Liberties, Submission
No. 175, p. 13; Law Council of Australia, Submission No. 96, p. 58.
[63]
Inspector-General of Intelligence and Security, Submission No. 185,
p. 18.
[64]
Attorney-General’s Department, Submission No. 236, p. 6.
[65]
Gilbert + Tobin Centre of Public Law, Submission No. 36, p. 16.
[66]
Attorney-General’s Department, Submission No. 236, p. 6.
[67]
Attorney-General’s Department, Equipping Australia against emerging and
evolving threats, Discussion Paper, July 2012, p. 45.
[68]
Castan Centre for Human Rights Law, Submission No. 142, p. 4.
[69]
Attorney-General’s Department, Submission No. 236, p. 11.
[70]
Law Council of Australia, Submission No. 96, p. 70.
[71]
Attorney-General’s Department, Submission No. 236, p. 11.
[72]
Inspector-General of Intelligence and Security, Submission No. 185,
p. 19.
[73]
Attorney-General’s Department, Submission No. 236, p. 11.
[74]
Attorney-General’s Department, Submission No. 236, p. 9.
[75]
Inspector-General of Intelligence and Security, Submission No. 185,
p. 20.
[76]
Attorney-General’s Department, Equipping Australia against emerging and
evolving threats, Discussion Paper, July 2012, p. 48.
[77]
Attorney-General’s Department, Equipping Australia against emerging and
evolving threats, Discussion Paper, July 2012, p. 48.
[78]
Attorney-General’s Department, Submission No. 236, p. 10.
[79]
Attorney-General’s Department, Equipping Australia against emerging and
evolving threats, Discussion Paper, July 2012, p. 48.
[80]
Inspector-General of Intelligence and Security, Submission No. 185,
p. 20
[81]
Office of the Victorian Privacy Commissioner, Submission No. 109, p.
5.
[82]
Attorney-General’s Department, Submission No. 236, p. 10.
[83]
Liberty Victoria, Submission No. 143, p. 12.
[84]
Castan Centre for Human Rights Law, Submission No. 142, pp.4-5; see
also: Law Council of Australia, Submission No. 96, p. 58.
[85]
Gilbert + Tobin Centre of Public Law, Submission No. 36, p. 13. See
also: Tasmanian Association of Community Legal Centres, Submission No. 184,
p. 4.
[86]
Attorney-General’s Department, Submission No. 236, p. 10.
[87]
Attorney-General’s Department, Equipping Australia against emerging and
evolving threats, Discussion Paper, July 2012, p. 49.
[88]
Attorney-General’s Department, Equipping Australia against emerging and
evolving threats, Discussion Paper, July 2012, p. 49.
[89]
Mr Mark Newton, Submission No. 87, p. 12.
[90]
Law Council of Australia, Submission No. 96, p. 73; see also: New
South Wales Young Lawyers, Submission No. 133, p. 9.
[91]
Inspector-General of Intelligence and Security, Submission No. 185,
p. 21.
[92]
Telstra, Submission No. 189, p. 14.
[93]
Attorney-General’s Department, Equipping Australia against emerging and
evolving threats, Discussion Paper, July 2012, p. 49.
[94]
Australian Privacy Foundation, Submission No. 162, p. 10.
[95]
Mr Ian Quick, Submission No. 95, p. 12.
[96]
Inspector-General of Intelligence and Security, Submission No. 185,
p. 21
[97]
Ms Stella Gray, Submission No. 152, p. 8.
[98]
Mr Mark Newton, Submission No. 87, p. 12.
[99]
Attorney-General’s Department, Equipping Australia against emerging and
evolving threats, Discussion Paper, July 2012, p. 48.
[100]
Mr Mark Newton, Submission No.87, p. 13. See also: Office of the
Victorian Privacy Commissioner, Submission No. 109, p. 6.
[101]
New South Wales Young Lawyers, Submission No. 133, p. 8.
[102]
Office of the Victorian Privacy Commissioner, Submission No. 109, p.
6.
[103]
Attorney-General’s Department, Submission No. 236, p. 8.
[104]
Attorney-General’s Department, Submission No. 236, p. 8.
[105]
Attorney-General’s Department, Equipping Australia against emerging and
evolving threats, Discussion Paper, July 2012, p. 48.
[106]
Attorney-General’s Department, Submission No. 236, p. 12.
[107]
Human Rights Law Centre, Submission No. 140, p. 8.
[108]
Human Rights Law Centre, Submission No. 140, p. 8.
[109]
Attorney-General’s Department, Submission No. 236, p. 12.
[110]
Gilbert + Tobin Centre of Public Law, Submission No. 36, p. 15. See
also: New South Wales Young Lawyers, Submission No. 133, p. 13 and NSW
Council for Civil Liberties, Submission No. 175, p. 17.
[111]
New South Wales Young Lawyers, Submission No. 133, p. 13; See also:
Gilbert + Tobin Centre of Public Law, Submission No. 36, p. 15 and NSW
Council for Civil Liberties, Submission No. 175, p. 17.
[112]
Attorney-General’s Department, Equipping Australia against emerging and
evolving threats, Discussion Paper, July 2012, p. 52.
[113]
Gilbert + Tobin Centre of Public Law, Submission No. 36, pp. 19–20.
[114]
Australian Secret Intelligence Service, Submission No.
219, p. 3.
[115]
Australian Secret Intelligence Service, Submission No. 219, p. 3.
[116]
Attorney-General’s Department, Equipping Australia against emerging and
evolving threats, Discussion Paper, July 2012, p. 51.
[117]
Gilbert + Tobin Centre of Public Law, Submission No. 36, pp. 20-21.
[118]
Inspector-General of Intelligence and Security, Submission No. 185, p.
24.
[119]
Australian Secret Intelligence Service, Submission No. 219, p. 1.
[120]
Attorney-General’s Department, Equipping Australia against emerging and
evolving threats, Discussion Paper, July 2012, p. 54.
[121]
Pirate Party Australia, Submission No. 134, p. 31.
[122]
Human Rights Law Centre, Submission No. 140, p. 8.
[123]
Australian Secret Intelligence Service, Submission No. 219, p. 3.
[124]
Inspector-General of Intelligence and Security, Submission No. 185, p.
25.
Chapter 5 Data Retention
[1]
Attorney-General’s Department, Equipping Australia Against Emerging
and Evolving Threats, July 2012, p. 13.
[2]
Attorney-General’s Department, Equipping Australia Against Emerging
and Evolving Threats, July 2012, p. 13.
[3]
Attorney-General’s Department, Equipping Australia Against Emerging
and Evolving Threats, July 2012, p. 14.
[4]
Attorney-General’s Department, Equipping Australia Against Emerging
and Evolving Threats, July 2012, p. 21.
[5]
Attorney-General’s Department, Equipping Australia Against Emerging
and Evolving Threats, July 2012, p. 21.
[6]
Letter from Attorney-General Nicola Roxon to the Hon Anthony Byrne MP, 17
September 2012, Appendix F.
[7]
Letter from Attorney-General Nicola Roxon to the Hon Anthony Byrne MP, 17
September 2012, Appendix F.
[8]
A letter from the Secretary of AGD, Mr Roger Wilkins AO, clarifying the
data set can be found at Appendix G.
[9]
Attorney-General, Telecommunications (Interception and Access) Act:
Report for the year ending June 2011, Commonwealth of Australia, 2011, p. 10.
[10]
Attorney-General, Telecommunications (Interception and Access) Act:
Report for the year ending June 2011, Commonwealth of Australia, 2011, p. 10.
[11]
Attorney-General, Telecommunications (Interception and Access) Act:
Report for the year ending June 2011, Commonwealth of Australia, 2011, p. 11.
[12]
Attorney-General, Telecommunications (Interception and Access) Act:
Report for the year ending June 2011, Commonwealth of Australia, 2011, p.
11.
[13]
TIA Act, Part 4-1.
[14]
TIA Act, Part 4-1.
[15]
TIA Act, Part 4-1.
[16]
See Blueprint for Free Speech, Submission No. 165; Law Council, Submission
No. 96; Pirate Party of Australia, Submission No. 134; Human Rights
Law Centre, Submission No. 140.
[17]
European Union Data Retention Directive 2006/24/EC.
[18]
Law Council, Submission No. 224, p. 6.
[19]
Law Council, Submission No. 224, p. 6.
[20]
Law Council, Submission No. 224, p. 7.
[21]
Law Council, Submission No. 224, p. 9.
[22]
Law Council, Submission No. 224, pp. 9-10.
[23]
Law Council, Submission No. 224, p. 10.
[24]
Law Council, Submission No. 224, p. 10.
[25]
Law Council, Submission No. 96, p. 38.
[26]
NSW Young Lawyers, Submission No. 133, p. 10.
[27]
AMTA and Communications Alliance, Submission No. 114, p. 14.
[28]
UK Home Office, Explanatory Memorandum to the Data Retention (EC Directive)
Regulations 2009, pp. 1-2.
[29]
Draft Communications Data Bill 2012, United Kingdom.
[30]
Joint Committee on the Draft Communications Data Bill, UK Parliament, Draft
Communications Data Bill, December 2012, p. 24.
[31]
UK Intelligence and Security Committee, Press release, 11 December 2012,
viewed 18 December 2012, <http://isc.independent.gov.uk/news-archive/11december2012>.
[32]
UK Intelligence and Security Committee, Access to Communications Data by
Intelligence and Security Agencies, UK Parliament, February 2013.
[33]
Joint Committee on the Draft Communications Data Bill, UK Parliament, Draft
Communications Data Bill, December 2012, p. 74, viewed 18 December 2012,
<www.parliament.uk/business/committees/committees-a-z/joint-select/draft-communications-bill/publications/>.
[34]
Law Council of Australia, Submission No. 96, p. 37.
[35]
Institute of Public Affairs, Submission No. 139, p. 4.
[36]
Institute of Public Affairs, Submission No. 139, p. 3.
[37]
Blueprint for Free Speech, Submission No. 165, p. 6.
[38]
Pirate Party, Submission No. 134, p. 26.
[39]
Human Rights Law Centre, Submission No. 140, p. 7.
[40]
Mr Daniel Nazer, Submission No. 110, p. 4
[41]
Mr Daniel Nazer, Submission No. 110, p. 4
[42]
Liberty Victoria, Submission No. 143, p. 5.
[43]
Liberty Victoria, Submission No. 143, p. 2.
[44]
Liberty Victoria, Submission No. 143, p. 6.
[45]
NSW Council for Civil Liberties, Submission No. 175, p. 16.
[46]
Australian Digital Media Industry Association, Submission No. 198,
p. 4.
[47]
Ms Stella Gray, Submission No. 152, p. 6.
[48]
Senator Scott Ludlam, Submission No. 146, p. 26
[49]
Institute of Public Affairs, Submission No. 139, p. 3.
[50]
Victorian Privacy Commissioner, Submission No. 109, p. 7.
[51]
Dr Bendall, Transcript, 5 September 2012, p. 1.
[52]
Law Council of Australia, Submission No. 96, p. 39.
[53]
NSW Council for Civil Liberties, Submission No. 175, p. 16.
[54]
Senator Scott Ludlam, Submission No. 146, p. 2.
[55]
Senator Scott Ludlam, Submission No. 146, p. 2.
[56]
Senator Scott Ludlam, Submission No. 146, p. 2.
[57]
Law Council of Australia, Submission No. 96, p. 37
[58]
Law Council of Australia, Submission No. 96, p. 39.
[59]
iiNet, Submission No. 108, p. 12.
[60]
AMTA and Communications Alliance, Submission No. 114, p. 16.
[61] Mr
Bernard Keane, Submission No. 117, p. 13.
[62]
Mr Bernard Keane, Submission No. 117, p. 14.
[63]
Mr Ian Quick, Submission No. 95, p. 14.
[64]
Electronic Frontiers Australia, Submission No. 121, p. 5.
[65]
Electronic Frontiers Australia, Submission No. 121, p. 6.
[66]
Mr Adrian Gasparini, Submission No. 88, p. 1.
[67]
Mr Daniel Judge, Submission No. 157, p. 11.
[68]
Electronic Frontiers Australia, Submission No. 121, p. 5.
[69]
Mr Dalby, Transcript, 27 September 2012, p. 48.
[70]
Ms Budavari, Transcript, 14 September 2012, p. 14.
[71]
Electronic Frontiers Australia, Submission No. 121, p. 5.
[72]
Electronic Frontiers Australia, Submission No. 121, p. 6.
[73]
Dr James Dowty, Submission No. 35, p. 1.
[74]
Pirate Party, Submission No. 134, p. 26.
[75]
Blueprint for Free Speech, Submission No. 165, p. 6.
[76]
Blueprint for Free Speech, Submission No. 165, p. 1.
[77]
Blueprint for Free Speech, Submission No. 165, p. 6.
[78]
Blueprint for Free Speech, Submission No. 165, p. 1.
[79]
Dr Bendall, Transcript, 5 September 2012, p. 3.
[80]
Mr James C. McPherson, Submission No. 28, p. 4.
[81]
Ms Stella Gray, Submission No. 152, p. 6.
[82]
Australian Lawyers for Human Rights, Submission No. 194, p. 8.
[83]
AMTA and Communications Alliance, Submission No. 114, p. 15.
[84]
Ms Ashley Hull, Submission No. 153, p. 1.
[85]
Institute of Public Affairs, Submission No. 139, p. 4.
[86]
Mr Daniel Nazer, Submission No. 110, p. 7.
[87]
Australian Federal Police, Submission No. 163, p. 15. See also ASIO,
Submission No. 209, p. 1; Attorney-General’s Department, Submission
No. 218, p. 1
[88]
Australian Federal Police, Submission No. 163, p. 15. See also
Attorney-General’s Department, Submission No. 218, p. 7
[89]
Victoria Police, Submission No. 200, p. 5. See also
Attorney-General’s Department, Submission No. 218, p. 7;
[90]
Corruption and Crime Commission of Western Australian, Submission No.
156, p. 11. See also Australian Competition and Consumer Commission, Submission
No. 192, p. 1
[91]
Attorney-General’s Department, Submission No. 218, p. 8.
[92]
Attorney-General’s Department, Submission No. 218, p. 8.
[93]
Australian Federal Police, Submission No. 163, p. 16. See also NSW
Government, Submission No. 148, p. 3
[94]
Australian Federal Police, Submission No. 163, p. 16.
[95]
Australian Federal Police, Submission No. 163, p. 16.
[96]
AFP, ASIO and ACC, Submission No. 227, p. 3.
[97]
AFP, ASIO and ACC, Submission No. 227, p. 8.
[98]
AFP, ASIO and ACC, Submission No. 227, p. 8.
[99]
Ms Catherine Smith, Transcript, 2 November 2012, p. 3.
[100]
Commissioner Negus, Transcript, 26 September 2012, p. 19.
[101]
ASIO, Submission No. 209, p. 3.
[102]
Attorney-General’s Department, Submission No. 218, p. 10.
[103]
ASIO, Submission No. 209, p. 3.
[104]
Attorney-General’s Department, Submission No. 218, p. 10.
[105]
Australian Privacy Foundation, Submission No. 162, pp. 9-10.
[106]
Mr Bernard Keane, Submission No. 117, p. 15.
[107]
Senator Scott Ludlam, Submission No. 146, p. 6.
[108]
Victorian Privacy Commissioner, Submission No. 109, p. 8.
[109]
Mr Daniel Nazer, Submission No. 110, p. 5.
[110]
Mr Chris Althaus, Transcript, 14 September 2012, p. 31.
[111]
Electronic Frontiers Australia, Submission No. 121, p. 5.
[112]
Mr Matthew Lobb, Transcript, 27 September 2012, p. 18.
[113]
Electronic Frontiers Australia, Submission No. 121, p. 5.
[114]
NSW Young Lawyers, Submission No. 133, p. 11.
[115]
Mr Ian Quick, Submission No. 95, p. 14.
[116]
Mr Daniel Black, Submission No. 97, p. 6.
[117]
Internet Industry Association, Submission No. 187, p. 7.
[118]
Internet Society of Australia, Submission No. 145, p. 5.
[119]
Internet Industry Association, Submission No. 187, p. 7.
[120]
Australian Lawyers for Human Rights, Submission No. 194, p. 8.
[121]
Mr R Batten, Submission No. 50, p. 6.
[122]
Mr R Wigan, Submission No. 178, p. 2.
[123]
Mr Mark Newton, Submission No. 87, p. 9.
[124]
Mr Daniel Black, Submission No. 157, p. 12.
[125]
Internet Industry Association, Submission No. 187, p. 7.
[126]
Australian Lawyers for Human Rights, Submission No. 194, p. 8.
[127]
Mr Bernard Keane, Submission No. 117, p. 15.
[128]
Mr Bernard Keane, Submission No. 117, p. 15.
[129]
Mr Daniel Black, Submission No. 157, p. 12.
[130]
Blueprint for Free Speech, Submission No. 165, p. 6.
[131]
Senetas, Submission No. 237, p. 1.
[132]
Pirate Party, Submission No. 134, p. 25.
[133]
iiNet, Submission No. 108, p. 13.
[134]
Pirate Party, Submission No. 134, pp. 25-6.
[135]
Pirate Party, Submission No. 134, p. 25
[136]
AFP, ASIO and ACC, Submission No. 227, p. 8.
[137]
AFP, ASIO and ACC, Submission No. 227, p. 9.
[138]
Office of the Australian Information Commissioner, Submission No. 183,
p. 16.
[139]
Office of the Australian Information Commissioner, Submission No. 183,
p. 16.
[140]
Dr Bendall, Transcript, 5 September 2012, p. 4.
[141]
Attorney-General’s Department, Submission No. 235, p. 21.
[142]
Office of the Australian Information Commissioner, Submission No. 183,
p. 20.
[143]
Attorney-General’s Department, Submission No. 235, p. 21.
[144]
Attorney-General’s Department, Submission No. 235, p. 21.
[145]
Law Council, Submission No. 108, p. 38.
[146]
Law Council, Submission No. 108, p. 38.
[147]
Internet Society of Australia, Submission No. 145, p. 4.
[148]
Ms Stella Gray, Submission No. 152, p. 5. See also Pirate Party, Submission
No. 134, p. 26.
[149]
Internet Industry Association, Submission No. 187, p. 8.
[150]
Mr James Shaw, Transcript, 27 September 2012, p. 12.
[151]
Mr Stephen Dalby, Transcript, 27 September 2012, p. 51. See also Mr
Chris Althaus, Transcript, 14 September 2012, p. 31; Mr Andrew Pam, Transcript,
5 September 2012, pp. 62-3.
[152]
Telstra, Submission No. 238, p. 1.
[153]
Telstra, Submission No. 238, p. 1.
[154]
Telstra, Submission No. 238, p. 1.
[155]
Joint Committee on the Draft Communications Data Bill, UK Parliament,
Draft Communications Data Bill, December 2012, p. 30, viewed 18 December
2012, <www.parliament.uk/business/committees/committees-a-z/joint-select/draft-communications-bill/publications/>.
[156]
Joint Committee on the Draft Communications Data Bill, UK Parliament, Draft
Communications Data Bill, December 2012, p. 30, viewed 18 December 2012, <www.parliament.uk/business/committees/committees-a-z/joint-select/draft-communications-bill/publications/>.
[157]
Telstra, Submission No. 238, p. 2.
[158]
Telstra, Submission No. 189, p. 11.
[159]
Electronic Frontiers Australia, Submission No. 121, p. 4.
[160]
Dr Anthony Bendall, Transcript, 5 September 2012, p. 4.
[161]
Mr Stephen Dalby, Transcript, 27 September 2012, p. 47.
[162]
Blueprint for Free Speech, Submission No. 165, p. 6. Emphasis in
original.
[163]
Arbeitskreis Vorratsdatenspeicherung, Data Retention Effectiveness Report,
20 May 2011. See also Mr Chris Berg, Transcript, 5 September 2012, p.
45.
[164]
Mr Ben Lever, Submission No. 71, p. 3.
[165]
Pirate Party, Submission No. 134, p. 28.
[166]
Mr Ian Quick, Submission No. 95, p. 14. See also Liberty Victoria, Submission
No. 109, p. 7; Pirate Party, Submission No. 213, p. 3; Mr Patrick
Potter, Submission No. 212, p. 4; Mr Daniel Judge, Submission No. 157,
p. 12;
[167]
Mr Ian Quick, Submission No. 95, p. 14.
[168]
Tor Project website, About Tor, viewed 15 November 2012, <www.torproject.org/about/overview.html.en>.
[169]
Mr Cameron Blackwood, Submission No. 208, p. 3.
[170]
Mr Johann Trevaskis, Submission No. 62, p. 9.
[171]
Mr Daniel Nazer, Submission No. 110, p. 3.
[172]
Ms Catherine Smith, Transcript, 2 November 2012, p. 6.
[173]
Ms Catherine Smith, Transcript, 2 November 2012, pp. 6-7.
[174]
Australian Federal Police, Submission No. 163, p. 18.
[175]
AFP, ASIO and ACC, Submission No. 227, p. 6.
[176]
Australian Federal Police, Submission No. 163, p. 17.
[177]
Attorney-General’s Department, Submission No. 218, p. 9.
[178]
Ms Catherine Smith, Transcript, 2 November 2012, p. 4.
[179]
Telstra, Submission No. 189, p. 11. See also Mr Zull, Transcript,
5 September 2012, p. 10.
[180]
Telstra, Submission No. 189, p. 12.
[181]
Mr Bruce Arnold, Submission No. 137, p. 2.
[182]
Electronic Frontiers Australia, Submission No. 121, p. 7.
[183]
Electronic Frontiers Australia, Submission No. 121, p. 7.
[184]
AMTA and Communications Alliance, Submission No. 114, p. 14.
[185]
Mr Daniel Nazer, Submission No. 110, pp. 6-7.
[186]
Mr Stephen Dalby, Transcript, 27 September 2012, p. 48.
[187]
Mr Stephen Dalby, Transcript, 27 September 2012, p. 49.
[188]
Mr James Shaw, Transcript, 27 September 2012, p. 4.
[189]
Mr Matthew Lobb, Transcript, 27 September 2012, p. 21.
[190]
Mr John Lindsay, Transcript, 27 September 2012, p. 50.
[191]
Mrs Jane Van Beelen, Transcript, 27 September 2012, p. 11.
[192]
Ms Stella Gray, Submission No. 152, p. 5.
[193]
Mr John Stanton, Transcript, 14 September 2012, p. 29.
[194]
Australian Interactive Media Industry Association, Submission No. 198,
p. 4. See also Mr Lobb, Transcript, 27 September 2012, p. 19.
Appendix E - Discussion Paper
[1]
See Report of the Review of the regulation of access to communications (2005) (the Blunn Report) at http://www.ag.gov.au/Publications/Pages/Blunnreportofthereviewoftheregulationofaccesstocommunications
August2005.aspx
[2]
AGD, TIA Act Report for the year ending 30 June 2011, p. 46.
[3]
AGD, TIA Act Report for the year ending 30 June 2011, p. 60
[4]
AGD, TIA Act Report for the year ending 30 June 2011, p. 47
[5]
ASIO, ASIO Report to Parliament 2010-11, p. xviii.
[6]
ASIO, ASIO Report to Parliament 2010-11, p. ix
[7]
ASIO, ASIO Report to Parliament 2010-11, p. xviii, 5.
[8]
PM&C, Counter-Terrorism White Paper, 2010, p.7.
[9]
See s 5D of the TIA Act.
[10]
AIC 2011Australian crime:Facts & figures http://www.aic.gov.au/documents/0/B/6/%7B0B619F44-B18B-47B4-9B59-F87BA643CBAA%7Dfacts11.pdf, p2.
[11]
ACC, Organised Crime in Australia 2011, http://www.crimecommission.gov.au/sites/default/files/files/OCA/2011/oca2011.pdf, p. 7.
[12]
ACC, Organised Crime in Australia 2011, p. 3.
[13]
ACC, Organised Crime in Australia 2011, p. 25.
[14]
ACMA, Communications report 2010‐11, p. 24.
[15]
ACMA, Communications report 2010‐11, p. 25.
[16]
ACMA, Communications Report 2010‐11, p. 18.
[17]
ACMA, Communications report 2010‐11, p. 153.
[18]
ACMA, Communications Report 2009‐10, p. 15.
[19]
ACMA, Communications Report 2010‐11, p. 17.
[20]
ACMA, Communications Report 2010‐11, p. 26.
[21]
ACMA, Communications report 2009‐10, p. 147.
[22]
The Australian, ‘Apple’s iPhone leads Australia’s huge smartphone growth’, 15 March 2011,
http://www.theaustralian.com.au/australian-it/apples-iphone-leads-australias-huge-smartphonegrowth/story-e6frgakx-1226021287594
[23]
ACMA, Communications report 2010‐11, p. 25.
[24]
ACMA, Communications report 2010‐11, p. 16.
[25]
ACMA, Communications report 2010‐11, p. 26.
[26]
NBN Co. Media Release, 29 March 2012 at http://www.nbnco.com.au/news-and-events/news/nbn-coannounces-three-year-rollout-plan.html
[27]
The focus of the discussion about record keeping and accountability is on law enforcement agencies..
[28]
Australian Communications and Media Authority, 2011, Broken Concepts: The Australian Communications legislative landscape, p6
http://engage.acma.gov.au/wp-content/uploads/2011/08/ACMA_Broken-Concepts_Final_29Aug1.pdf
[29]
ASIO, Director‐General’s speech at the Security in Government Conference, 7 July 2011
[30]
ASIO, Director‐General’s speech at the Security in Government Conference, 7 July 2011
Back to top
|