Like what you've read?

On Line Opinion is the only Australian site where you get all sides of the story. We don't
charge, but we need your support. Here�s how you can help.

  • Advertise

    We have a monthly audience of 70,000 and advertising packages from $200 a month.

  • Volunteer

    We always need commissioning editors and sub-editors.

  • Contribute

    Got something to say? Submit an essay.


 The National Forum   Donate   Your Account   On Line Opinion   Forum   Blogs   Polling   About   
On Line Opinion logo ON LINE OPINION - Australia's e-journal of social and political debate

Subscribe!
Subscribe





On Line Opinion is a not-for-profit publication and relies on the generosity of its sponsors, editors and contributors. If you would like to help, contact us.
___________

Syndicate
RSS/XML


RSS 2.0

How Australia is spying on its own

By Murray Hunter - posted Tuesday, 19 November 2013


Through rapid technology advances the Australian security apparatus has grown to an Orwellian scale. This has not necessarily been at the design of any elected government but something the Australian bureaucracy was forthright in promoting.

The executive government has only superficial control over the Australian surveillance system. It is fully integrated with the NSA apparatus which immediately brings up an issue about sovereignty. This is not about a country's sovereignty over land, but knowledge. The international exchange of security information is a challenge to human rights of Australian citizens that has to be grappled with.

Consequently, it is not in the interests of the Australian or US intelligence community for any public or even parliamentary discussion. The idea that the parliament and executive are in total control of government is a myth.

Advertisement

Through technology and its innovative applications, the concept of privacy has been reframed to the point of anything a person does outside of the home or on a computer is public domain, captured through any of the large array of assets that can be utilized for surveillance.

This has allowed the creation of a new premise that has grown up through the administrative arm of the Australian Government. One of compliance. Australia seems to have adopted an almost fanatical compliance culture where the administrators believe that they are the natural custodians of Australia's security interests, over the temporarily elected politicians of the day.

Some of the methods the Australian security state utilizes for intelligence gathering, storing, and collation are well documented and summarized below:

· The Australian Government database is a highly sophisticated group of electronic document and records management system(s) (EDRMS) for collating, storing, and matching data between various agencies and levels of governments. Consequently data collected by the Australian Taxation Office (ATO), social security (Centrelink), Medicare, immigration, customs, and police enforcement agencies are integrated with relational databases and query systems. This is supplemented by individual agency databases with extremely detailed information on citizens. They carry an almost complete personal history of residential details going back decades, income, occupation, spouses, children, social security benefits, medical, and travel information, etc. These systems can be accessed by almost anybody within the public service. Every agency within the government has become part of the intelligence collection network.

According to academics Paul Henman and Greg Marston of the University of Queensland, these systems that enable agencies to determine client eligibility for services are highly intrusive and used with a prevailing deep suspicion of citizens in regards to their continuing eligibility for services.

· The most recent revelations in the news about the 'five eye' countries eavesdropping on their citizens phone conversations, emails, and other electronic communications has been astounding. Through meta-data collection systems like PRISM and ECHELON are highly likely to be also operating within Australia due to the close relationship between the NSA and Australian intelligence community. According to AFP assistant commissioner Neil Gaughan, Australian intelligence has a much better relationship with the telecommunications companies than the US intelligence agencies. However this doesn't appear to be a new occurrence. A reliable source working within one of the Australian telephone companies when manual exchanges were operating confirmed that ASIO and state special branches had secret rooms within the exchanges to run phone tapping operations.

Advertisement

· The NSW police are using an Automated Number Plate Recognition (ANPR) system which takes continuous snapshots of car number plates. This is supplemented by tracking cars when they go through tolls.

· Law enforcement agencies have announced that they are preparing to utilize drones for crime surveillance in the not too distant future.

· State and Federal Governments have been encouraging citizens to inform on other citizens they suspect of Breaking the law. Government campaigns have been very successful in achieving all-time high numbers of informants in crime, social security, and taxation related matters.

The incredible power of the above described databases are exponentially enhanced when coupled with recent developments in cellular, RFID, internet, and other computer technologies. When private data in retail, banking, travel, health and insurance, etc., is linked to Intelligence collected by government, the value of data becomes massively enriched. Data collected by private organizations and utilized by security services include:

· The internet domain is under constant surveillance. Companies like Google, Yahoo, Facebook, and twitter utilize tracking cookies to gather data on users. Australian security agencies employ private contractors like the National Open Source Intelligence Centre (NOSIC) to monitor, collate, and report on publically accessible information about individuals and organizations.

· Many business organizations such as shopping centres and banks now utilize CCTV. These assets can be utilized by security organizations to track and monitor individuals. This is now being supplemented with media access control (MAC) systems which can track smartphones. This technology is already being used in three Westfield shopping centres.

· Numerous private databases like electronic tenancy database which has detailed information. These include tenancy history, insurance company records that detail individuals insured assets, bank records, and university records. These can all be accessed by security agencies.

· Mobile phones can be used as a means to track people through inbuilt GPS on smartphones, triangulation, or through electronic data-collectors designed to identify individual mobile phones in public places.

· People's purchase history and movements can be tracked through the use of credit, debit, and loyalty card purchases.

Emails, phones calls, places people go, and purchase history, in the context of other data collected has the latent potential to build up a profile on anybody. Data from social media like Facebook can enhance these profiles greatly by adding thought and behavior information. It's the collection of small bits of information that can be collated into big pictures. Australian intelligence can retro-actively analyse anybody with the data they have access to.

Since 2007, when amendments to the Telecommunications (Interception & Access) Act 1974 were made during the last days of the Howard Government, government agencies have the power to search meta-data without the individual's knowledge or any warrant.

CCTV cameras have been installed in many communities without the development of privacy policies on how they should be used. The law has yet to catch up with the ability to collect data.

Up until the 1980's most intelligence gathering was targeted monitoring of specific groups where 'persons of interest' were identified for intensive surveillance. ASIO and state special branches were videotaping activists primarily from the 'left'. Surveillance was undertaken by ASIO and state special branches, where operatives used electronic means for eavesdropping, keeping index cards and files on 'persons of interest', recording mainly hearsay information.

Even then, red flags emerged. Peter Grabosky of the Australian Bureau of Criminology pointed out that 'thought and discussion of public issues may be suppressed......and....excess use of (surveillance) may inhibit democratic and political freedom more subtly'. In addition, he believed that malicious accusations made from erroneous records produce false information which made innocent people suffer at the hands of the security agencies.

This problem can't be corrected as these records are not assessable to be corrected for errors. The Mohamed Haneef arrest by the AFP in July 2007 where it was alleged he was connected with a terrorist cell in the UK, but later exonerated, hints at the security services being very territorial and 'out of control', where ASIO knew of Dr. Haneef's innocence but didn't advise the APF.

Faceless bureaucrats are the ones defining who were the enemies of the state. There appears to be a general inability to discriminate between healthy dissent in a political democracy and subversion.

Where no tangible threats existed to national security, lesser ones were perceived to be grave threats or even invented - remember "weapons of mass destruction" in Iraq.

The rise of surveillance should not be understood as purely a technological development. It should be seen as a broader economic, social, and political paradigm shift within society where the balance of power has shifted away from the people and towards the state. There also appears to be a shift of power away from executive government towards an unelected bureaucracy. What makes this even more perplexing is that we don't even know who these people really are.

The Sydney Morning Herald just ran a story that intelligence data was passed on to assist the mining giant BHP. Moreover, the human rights website WEBMOBILIZE alleges in a recent article that the Australian security apparatus is being used to steal intellectual property from companies and passing it over illegally to competitors. Some of the organizations that have been alleged to receive unlawfully gained IP include the University of Melbourne, Ageis Media, Telstra, Sensis, Deakin University, Belgravia Health and Business Group, Channel Nine, Nine Entertainment, Nine MSN, Corporate health management, Fairfax media, the Herald Sun, The Guardian, Nintendo, and the Australian Labor Party (ALP)and Liberal National Party (LNP).

There has been little in the way of public debate, nor much concern shown by the major political parties.

The powers to detain anyone under section 34D of the Australian Security Intelligence Organization Act 1979 for up to seven days without the right to reveal their detention, resembles the mechanisms of a police state.

With an annual growth rate of more than 20% and budget of over $4 Billion p.a., ASIO has a new $500 Million building in Canberra and a secret data storage facility is being built at the HMAS Harman Naval Base, near Canberra, where details are exempt from public account committees. When other government programs are being cut, the deep philosophical question is why we should increase funding for surveillance of the nation's citizens.

Mass surveillance doesn't seem to have much to do with terrorism as it has to do with keeping check on what people are doing. It seems to be more of an intimidating compliance mechanism, aimed at protecting public revenue, preventing and detecting crime, tax evasion, and fraud.

The rapid increase in staff within ASIO from 618 in 2000 to 1860 in 2010 has meant that the organization now primarily relies upon young and inexperienced analysts in their 20s and 30s. This means that Australia is at the mercy of a "Gen Y" culture that has grown up connected to the cyber world where a sense of privacy is very different to generation before them. Newly uncovered evidence suggests that ASIO has gone to great lengths to spy on people who have broken no laws.

Through Australia's history Australian Security Agencies have blundered in the assessments they have made on many issues. The 2004 Flood report commenting on the "failure of intelligence" on Iraq stated that these weaknesses included "a failure to rigorously challenge preconceptions", and the absence of a "consistent and rigorous culture of challenge to and engagement with intelligence reports". Flood found an inconsistency in assessments and very shallow analytical abilities within the security agencies he examined. On many occasions, particularly during the Howard years, intelligence analysis was 'bastardized" by political agenda. Those who criticized the political agenda ran the risk of being reframed from dissidents and classed as deviants who come under security surveillance.

The question here, can government with a long history of cover-ups be trusted?

The dream of a fair, just, and equitable Australian society where sovereignty is in the hands of its citizens may be one of the greatest myths. Australia's surveillance on its own has eaten into and taken away many of the rights and liberties of Australians, turning society into one of mistrust.

This cannot be really satisfactorily answered relying only on public domain knowledge. We can only make guesses. However one undeniable fact is that there is presently a hidden and totally unaccountable part of government that is changing the nature of society. It is here where no media organizations are asking any questions.

We have entered into a new period of governance. We are now in an age of governance by surveillance of the masses by a few unknown elite and unaccountable people. Communist totalitarianism may have collapsed in Europe in 1991 with the fall of the Soviet Union, but the "free world's" version of surveillance and intelligence would have made Stalin, Honecker, and CeauÅŸescu very jealous.

The lack of transparency is becoming indefensible. Without scrutiny the Australian security apparatus is the loose cannon of the Bureaucracy which will cause many reverberations like the destruction of peoples' livelihoods through IP theft, or the ruining of peoples' reputations through persecution.

There has never been a public mandate for the development of such an extensive surveillance program. Is the money being spent justified?

  1. Pages:
  2. 1
  3. 2
  4. 3
  5. 4
  6. All


Discuss in our Forums

See what other readers are saying about this article!

Click here to read & post comments.

29 posts so far.

Share this:
reddit this reddit thisbookmark with del.icio.us Del.icio.usdigg thisseed newsvineSeed NewsvineStumbleUpon StumbleUponsubmit to propellerkwoff it

About the Author

Murray Hunter is an associate professor at the University Malaysia Perlis. He blogs at Murray Hunter.

Other articles by this Author

All articles by Murray Hunter

Creative Commons LicenseThis work is licensed under a Creative Commons License.

Photo of Murray Hunter
Article Tools
Comment 29 comments
Print Printable version
Subscribe Subscribe
Email Email a friend
Advertisement

About Us Search Discuss Feedback Legals Privacy