Download presentation
Presentation is loading. Please wait.
Published byPamela Marylou Bradley Modified over 9 years ago
1
Simon Bronitt and James Stellios ANU College of Law, The Australian National University Regulating Telecommunications Interception and Access: A Seachange in Surveillance Laws
2
Key Issues and Questions The 2006 Act represents a landmark reform to the telecommunications interception regime in Australia. New power to access stored communications provide state with further tools for security and law enforcement purposes. Legal & Policy Issues What is the impact of the new legislative scheme? Are existing safeguards effective? Has privacy have been ‘balanced’ away in favour of providing state with enhanced surveillance tools? Is a balancing approach wrong?
3
Interception Regime Trends since 1979: Normalization of Extraordinary Powers The Emergence of Regulatory Surveillance: Beyond Serious Crime From Prohibition to Permission From Intelligence-Gathering to Evidence-Gathering From Federal to National Surveillance From Judicial to Administrative Control
4
History - Trends AGENCYRelevant StatisticsApplications for Part 2.5 (Part VI) Warrants 93/9495/9601/0202/0305/06 AFPMade Refused/Withdrawn Issued 288 1 287 233 2 231 556 1 555 691 1 690 647 0 647 NSW Crime Commission Made Refused/Withdrawn Issued 61 0 61 112 0 112 644 0 644 803 5 798 3 795 NSW PoliceMade Refused/Withdrawn Issued 76 0 76 102 1 101 392 0 392 383 1 382 422 1 421 TotalMade Refused/Withdrawn Issued 811 1 810 758 11 747 2518 4 2514 3067 9 3058 2889 6 2883
5
The Surveillance Seachange? Seachange … a ‘noticeable and unexpected transformation’ (Oxford English Dictionary) TI versus TIA Surveillance ‘Live’ Interception versus access to stored data Surveillance Warrant: The New Form of Search Warrant More or Less Privacy intrusive? SMS & Email Deserving Less Protection (or Y-Gen Prejudice)? Debased Process of Law Reform
6
Human Rights and Remedies ‘Front End’ versus ‘Back End’ Accountability Demise of Class 1 and Class 2 Warrants Citizen Suits? Effective or Illusory remedies? Privacy: Paramount or Subordinate?
7
Telecommunications Interception Amendments (TIA) New security/law enforcement tools: Device specific warrants B-Party warrants Regulation of stored communications
8
The Warrant System Two ways in which privacy is protected: Privacy as a factor in issuing process Use of judges in issuing process Reality does not match theory: Privacy likely to be outweighed by law enforcement/security purposes Judges have a limited role in process
9
Warrants Issued Number of Warrants Issued in 2004-05 by Fed. Court Judges, Family Court Judges, Nominated AAT Members and Fed. Magistrates (from Telecommunications (Interception) Act 1979: Report for Year ending 30 June 2005, Table 29) IssuerNumber issuing warrants Total Warrants issued Family Court Judges19179 Federal Court Judges213 Federal Magistrates260 Nominated AAT Members282691
10
‘Balancing’ Rhetoric ‘Balancing’ model in law enforcement context problematic In telecommunications interception/access context, law enforcement/security has balanced away privacy interests
11
Conclusions Observations are tentative Changes in the regulatory context have substantially affected privacy Mechanisms for further protection: Public interest monitor Destruction requirements Notification Rejection of ‘balancing’ models Placing privacy at the centre of law reform
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.