itb-au logo
Story image

Metadata retention laws “abused” by enforcement agencies

10 Feb 2020

Digital security advocates have expressed outrage at revelations that Australian law enforcement agencies have been potentially abusing mandatory metadata retention laws and receiving data explicitly excluded from the legislation. 

“It is incredibly worrying to hear that government agencies have been receiving extensive details of Australians’ web history with no oversight or accountability, potentially undermining the already minor protections that were placed on this scheme when it was passed,” says Digital Rights Watch chair Tim Singleton Norton.

The Parliamentary Joint Committee on Intelligence and Security (PJCIS) is conducting a review of the controversial metadata retention laws that require telecommunication companies to retain records of every single person’s calls, texts, and internet browsing history for at least two years.

In parliamentary hearings last week, the Commonwealth Ombudsman confirmed that law enforcement agencies are receiving URLs as part of the mandatory data retention regime, despite this practice being explicitly banned under the legislation.

“More than ever, this shows what was warned from the start – that the scheme would be abused, and safeguards overstepped. The government should immediately move to repeal this legislation, or at a bare minimum make significant improvements to bring it in line with Australia’s human rights obligations,” says Singleton Norton.

“Australia is one of many jurisdictions that grapple with the complexity of data retention rules. It’s at the heart of how we, as a society, approach privacy in the digital era – the integrity of our communication, privacy and rights as individuals are at stake,” adds Access Now policy analyst Lucie Krahulcova.

In a joint submission to the PJCIS review, Human Right Law Centre, Digital Rights Watch and Access Now advised the following recommendations:

  • ensuring that only the metadata of people connected with the commission of a serious crime is retained;
     
  • limiting access to metadata to the investigation of serious crimes, such as murder and child abuse;
     
  • requiring a warrant for access to metadata in all instances;
     
  • excluding journalists, whistleblowers and human rights defenders from investigation for public interest reporting; and
     
  • reducing the duration for which metadata is retained. 
Story image
AFP arrests two men with ties to Australian SMS phishing scheme
“The success of Operation Genmaicha has prevented further Australians from seeing their hard-earned savings siphoned off to criminal entities.”More
Story image
4 steps to overcome common infrastructure monitoring challenges
By taking steps to create visibility across their entire tech stacks, companies can create a modern environment and a culture of visibility while gaining full observability across their infrastructure. More
Story image
New AI speech technology for contact centres lands in A/NZ
The contact centre enhancement, Oration, combines an artificial intelligence language interpreter with advanced speech recognition. More
Story image
Red Hat, Samsung partner up to deliver 5G network solutions
"It is important for telecommunications service providers to adopt a consistent horizontal cloud-native platform hardened for their environments."More
Link image
Cloud-based phone systems are all but a necessity in 2020
Cloud-based services utilise the web for connecting users, enabling users and enterprises to increase portability and convenience - which can be in short supply when employees are working remotely.More
Story image
From 1G to 5G: How innovations in cellular have shaped our lives
As we look to the present decade from 2020 onwards, 5G will be at the forefront. The race for 5G is not about merely deploying new infrastructure, but getting the first-mover advantage in who can build and take the leadership role in the host of new applications and services that 5G will enable.More