Review of Secrecy Laws

Total Page:16

File Type:pdf, Size:1020Kb

Review of Secrecy Laws Review of Secrecy Laws ISSUES PAPER You are invited to provide a submission or comment on this Issues Paper ISSUES PAPER 34 December 2008 This Issues Paper reflects the law as at 1 November 2008. © Commonwealth of Australia 2008 This work is copyright. You may download, display, print and reproduce this material in whole or part, subject to acknowledgement of the source, for your personal, non- commercial use or use within your organisation. Apart from any use as permitted under the Copyright Act 1968 (Cth), all other rights are reserved. Requests for further authorisation should be directed by letter to the Commonwealth Copyright Administration, Copyright Law Branch, Attorney-General’s Department, Robert Garran Offices, National Circuit, Barton ACT 2600 or electronically via www.ag.gov.au/cca. ISBN-978-0-9804153-4-6 Commission Reference: IP 34 The Australian Law Reform Commission was established on 1 January 1975 by the Law Reform Commission Act 1973 (Cth) and reconstituted by the Australian Law Reform Commission Act 1996 (Cth). The office of the ALRC is at Level 25, 135 King Street, Sydney, NSW, 2000, Australia. All ALRC publications can be made available in a range of accessible formats for people with disabilities. If you require assistance, please contact the ALRC. Telephone: within Australia (02) 8238 6333 International +61 2 8238 6333 TTY: (02) 8238 6379 Facsimile: within Australia (02) 8238 6363 International +61 2 8238 6363 E-mail: [email protected] ALRC homepage: www.alrc.gov.au Printed by Ligare Making a submission Any public contribution to an inquiry is called a submission and these are actively sought by the ALRC from a broad cross-section of the community, as well as those with a special interest in the particular inquiry. Submissions are usually written, but there is no set format and they need not be formal documents. Where possible, submissions in electronic format are preferred. It would be helpful if comments addressed specific proposals and questions or numbered paragraphs in this paper. Open inquiry policy In the interests of informed public debate, the ALRC is committed to open access to information. As submissions provide important evidence to each inquiry, it is common for the ALRC to draw upon the contents of submissions and quote from them or refer to them in publications. As part of ALRC policy, non-confidential submissions are made available to any person or organisation upon request after completion of an inquiry, and may also be published on the ALRC website. For the purposes of this policy, an inquiry is considered to have been completed when the final Report has been tabled in Parliament. However, the ALRC also accepts submissions made in confidence. Confidential submissions may include personal experiences where there is a wish to retain privacy, or other sensitive information (such as commercial-in-confidence material). Any request for access to a confidential submission is determined in accordance with the Freedom of Information Act 1982 (Cth), which has provisions designed to protect sensitive information given in confidence. In the absence of a clear indication that a submission is intended to be confidential, the ALRC will treat the submission as non-confidential. Submissions should be sent to: The Executive Director Australian Law Reform Commission GPO Box 3708 SYDNEY NSW 2001 Email: [email protected] Submissions may also be made using the online form on the ALRC’s homepage: <www.alrc.gov.au> The closing date for submissions in response to IP 34 is 19 February 2009. Contents Contents Terms of Reference 3 List of Participants 5 List of Questions 7 1. Introduction to the Inquiry 15 Background 15 Context for ‘secrecy’ 17 Information flows 33 Prior reviews 35 Scope of the Inquiry 37 Options for reform 42 Organisation of this Issues Paper 44 Process of reform 45 2. Overview of Secrecy Provisions in Commonwealth Legislation 49 Introduction 49 Government and secrecy in Australia 50 Number and location of Commonwealth secrecy provisions 53 Types of secrecy provisions 54 General secrecy provisions 55 Provisions that protect specific types of Commonwealth information 65 Form of secrecy provisions 75 3. Secrecy Provision Elements 79 Introduction 79 Whose activity is regulated? 80 What kind of activity is regulated? 85 The elements of criminal offences 90 The public interest 96 Constitutional limits 101 4. Exceptions and Defences 105 Introduction 105 ‘Exception’ and ‘defence’ 106 General defences 107 2 Review of Secrecy Laws Summary of existing exceptions and defences 107 Reform issues 115 Public interest disclosure legislation 121 5. Penalties 129 Introduction 129 Purpose of penalties 130 Criminal penalties 131 Administrative penalties 160 Infringement notices 168 Civil penalties 170 6. Practical Framework for Protecting Commonwealth Information 173 Introduction 173 Strategies for protecting Commonwealth information 174 Disciplinary processes 183 Criminal investigations 197 Prosecutorial discretions and processes 198 Managing overlapping proceedings 202 Overseeing the protection of Commonwealth information 204 7. Comparisons and Interactions with Other Laws 211 Introduction 211 Freedom of information 213 Privacy 221 Data-matching 229 Archives 232 Other issues 234 Appendix 1. List of Abbreviations 235 Appendix 2. Table of Secrecy Provisions 239 Appendix 3. Extracts of Key Secrecy Provisions 251 Terms of Reference REVIEW OF SECRECY LAWS I, ROBERT McCLELLAND, Attorney-General of Australia, having regard to: • the desirability of having comprehensive, consistent and workable laws and practices in relation to the protection of Commonwealth information; • the increased need to share such information within and between governments and with the private sector; • the importance of balancing the need to protect Commonwealth information and the public interest in an open and accountable system of government; and • previous reports (including previous reports of the Commission) that have identified the need for reform in this area REFER to the Australian Law Reform Commission for inquiry and report, pursuant to subsection 20(1) of the Australian Law Reform Commission Act 1996, options for ensuring a consistent approach across government to the protection of Commonwealth information, balanced against the need to maintain an open and accountable government through providing appropriate access to information. 1. In carrying out its review, the Commission will consider: a. relevant laws and practices relating to the protection of Commonwealth information, including the scope and appropriateness of legislative provisions regarding secrecy and confidentiality; b. whether there is a need to consolidate and modernise relevant provisions currently in the Crimes Act 1914 and other Commonwealth legislation for inclusion in the Criminal Code; c. the way in which secrecy laws in the Crimes Act interact with other laws and practices, including those relating to secrecy, privacy, freedom of information, archiving, whistle-blowing, and data-matching; d. whether there should be different considerations for secrecy laws relating to the protection of national security and other sensitive Commonwealth information; and e. any related matter. 4 Review of Secrecy Laws 2. In carrying out its review, the Commission is to identify and consult with key stakeholders, including relevant Commonwealth, State and Territory agencies and private sector bodies. 3. The Commission will provide its final report to me by 31 October 2009. Dated 5 August 2008 Robert McClelland Attorney-General List of Participants Australian Law Reform Commission Division The Division of the ALRC constituted under the Australian Law Reform Commission Act 1996 (Cth) for the purposes of this Inquiry comprises the following: Professor David Weisbrot (President) Professor Les McCrimmon (Commissioner) Professor Rosalind Croucher (Commissioner in charge) Justice Berna Collier (part-time Commissioner) Justice Susan Kenny (part-time Commissioner) Senior Legal Officers Carolyn Adams Bruce Alston Kate Connors Isabella Cosenza Legal Officers Lisa Eckstein Althea Gibson Erin Mackay Research Manager Jonathan Dobinson Librarian Carolyn Kearney Project Assistants Tina O’Brien Legal Interns Larisa Michalko Tracy Nau Katie Schafer Smriti Sriram Rebecca Zaman 6 Review of Secrecy Laws Advisory Committee Members Ms Lynelle Briggs, Australian Public Service Commissioner Mr Ian Carnell, Inspector-General of Intelligence and Security Mr Chris Craigie SC, Commonwealth Director of Public Prosecutions Professor Robin Creyke, College of Law, Australian National University Mr Simon Daley, Australian Government Solicitor Mr Chris Erskine SC, Blackburn Chambers Justice Paul Finn, Federal Court of Australia Mr Kevin Fitzpatrick, Chief Tax Counsel, Australian Taxation Office Mr Stephen Gageler SC, Solicitor-General of Australia Mr John McGinness, Director, National Judicial College of Australia Professor John McMillan, Commonwealth Ombudsman Mr Andrew Metcalfe, Secretary, Department of Immigration and Citizenship Associate Professor Moira Patterson, Law Faculty, Monash University Mr Peter Timmins, Timmins Consulting Ms Annette Willing, Australian Government, Attorney-General’s Department List of Questions 1. Introduction to the Inquiry 1–1 In light of freedom of information laws and other modern moves towards greater openness and accountability on the one hand, and the current international security environment on the other, are secrecy laws still relevant and necessary? Is a statutory duty
Recommended publications
  • Australian Political Writings 2009-10
    Parliament of Australia Department of Parliamentary Services Parliamentary Library Information, analysis and advice for the Parliament BIBLIOGRAPHY www.aph.gov.au/library Selected Australian political writings 2009‐10 Contents Biographies ............................................................................................................................. 2 Elections, electorate boundaries and electoral systems ......................................................... 3 Federalism .............................................................................................................................. 6 Human rights ........................................................................................................................... 6 Liberalism and neoliberalism .................................................................................................. 6 Members of Parliament and their staff .................................................................................... 7 Parliamentary issues ............................................................................................................... 7 Party politics .......................................................................................................................... 13 Party politics- Australian Greens ........................................................................................... 14 Party politics- Australian Labor Party .................................................................................... 14 Party politics-
    [Show full text]
  • Australia 2019
    Australia Free 77 100 A Obstacles to Access 23 25 B Limits on Content 29 35 C Violations of User Rights 25 40 Last Year's Score & Status 79 100 Free Overview Internet freedom in Australia declined during the coverage period. The country’s information and communication technology (ICT) infrastructure is well developed, and prices for connections are low, ensuring that much of the population enjoys access to the internet. However, a number of website restrictions, such as those related to online piracy or “abhorrent” content, limit the content available to users. The March 2019 terrorist attack on mosques in Christchurch, New Zealand, prompted internet service providers (ISPs) to block certain websites and the government subsequently introduced a new law that criminalized the failure to delete “abhorrent” content. Other legal changes—including court decisions expanding the country’s punitive defamation standards, an injunction silencing digital media coverage of a high-profile trial, and a problematic law that undermines encryption—shrunk the space for free online expression in Australia. Finally, an escalating series of cyberattacks sponsored by China profoundly challenged the security of Australia’s digital sphere. Australia is a democracy with a strong record of advancing and protecting political rights and civil liberties. Recent challenges to these freedoms have included the threat of foreign political influence, harsh policies toward asylum seekers, and ongoing disparities faced by indigenous Australians. Key Developments June 1, 2018 – May 31, 2019 After the March 2019 Christchurch attack, in which an Australian man who had espoused white supremacist views allegedly killed 51 people at two New Zealand mosques, ISPs acted independently to block access to more than 40 websites that hosted the attacker’s live-streamed video of his crimes.
    [Show full text]
  • Privacy and Data Protection in Australia: a Critical Overview (Extended Abstract)
    Privacy and Data Protection in Australia: a Critical overview (extended abstract) David Watts1, Pompeu Casanovas2,3 1 La Trobe Law School, La Trobe University, Melbourne, Australia 2 UAB Institute of Law and Technology, Universitat Autònoma de Barcelona, Spain Abstract. This extended abstract describes the regulation of privacy under Aus- tralian laws and policies. In the CRC D2D programme, we will develop a strategy to model legal requirements in a situation that is far from clear. Law enforcement agencies are facing big floods of data to be acquired, stored, assessed and used. We will propose in the final paper a linked data regulatory model to organise and set the legal and policy requirements to model privacy in this unstructured con- text. Keywords: Australian privacy law, legal requirements, privacy modelling 1 Introduction Australia has a federal system of government that embodies a number of the structural elements of the US Constitutional system but retains a Constitutional monarchy. It con- sists of a national government (the Commonwealth), six state governments (New South Wales, Victoria, Tasmania, Queensland, South Australia and Western Australia) as well as two Territories (the Australian Capital Territory and the Northern Territory). Under this system, specific Constitutional powers are conferred on the Common- wealth. Any other powers not specifically conferred on the Commonwealth are retained by the States (and, to a lesser extent, the Territories). There is no general law right to privacy in Australia. Although Australia is a signa- tory to the International Convention on Civil and Political Rights, the international law right to privacy conferred under Article 17 of the ICCPR has not been enacted into Australia’s domestic law.
    [Show full text]
  • Legitimacy in the New Regulatory State
    LEGITIMACY IN THE NEW REGULATORY STATE KAREN LEE A THESIS IN FULFILMENT OF THE REQUIREMENTS FOR THE DEGREE OF DOCTOR OF PHILOSOPHY FACULTY OF LAW MARCH 2016 TABLE OF CONTENTS ACKNOWLEDGEMENTS ...................................................................................................... I PUBLICATIONS AND PRESENTATIONS ARISING FROM THE WRITING OF THE THESIS .. III GLOSSARY AND TABLE OF ABBREVIATIONS .................................................................. IV CHAPTER 1 INTRODUCTION ............................................................................................. 1 I JUSTIFICATION FOR RESEARCH AND ITS APPROACH .......................................... 4 A THE NEED FOR EMPIRICAL STUDY OF INDUSTRY RULE-MAKING ....................... 4 B PART 6 RULE-MAKING ....................................................................................... 7 1 THE COMMUNICATIONS ALLIANCE ................................................................ 8 2 CONSUMER CODES ....................................................................................... 10 C PROCEDURAL AND INSTITUTIONAL LEGITIMACY, RESPONSIVENESS AND THEIR CRITERIA ......................................................................................................... 11 II TERMINOLOGY ................................................................................................ 15 A CONSUMER AND PUBLIC INTERESTS................................................................. 15 1 CONSUMER INTEREST .................................................................................
    [Show full text]
  • Mark Burdon Thesis
    THE CONCEPTUAL AND OPERATIONAL COMPATIBILITY OF DATA BREACH NOTIFICATION AND INFORMATION PRIVACY LAWS Mark Burdon M.Sc. (Econ) Public Policy (Lon), LLB (Hons) (London South Bank University, UK) Submitted in fulfilment of the requirements for the degree of PhD by publications Faculty of Law Queensland University of Technology 2011 Keywords Data Breach Notification Law – Information Privacy Law – Data Protection – Contextualisation - Information Security Law ii Abstract Mandatory data breach notification laws are a novel and potentially important legal instrument regarding organisational protection of personal information. These laws require organisations that have suffered a data breach involving personal information to notify those persons that may be affected, and potentially government authorities, about the breach. The Australian Law Reform Commission (ALRC) has proposed the creation of a mandatory data breach notification scheme, implemented via amendments to the Privacy Act 1988 (Cth). However, the conceptual differences between data breach notification law and information privacy law are such that it is questionable whether a data breach notification scheme can be solely implemented via an information privacy law. Accordingly, this thesis by publications investigated, through six journal articles, the extent to which data breach notification law was conceptually and operationally compatible with information privacy law. The assessment of compatibility began with the identification of key issues related to data breach notification law. The first article, Stakeholder Perspectives Regarding the Mandatory Notification of Australian Data Breaches started this stage of the research which concluded in the second article, The Mandatory Notification of Data Breaches: Issues Arising for Australian and EU Legal Developments (‘Mandatory Notification‘). A key issue that emerged was whether data breach notification was itself an information privacy issue.
    [Show full text]
  • Telecommunications Act 1997
    Telecommunications Act 1997 Act No. 47 of 1997 as amended This compilation was prepared on 26 November 2008 taking into account amendments up to Act No. 117 of 2008 [Note: Subsections 531F(1) and (2) and paragraphs 531G(2)(e) and (3A)(e) cease to have effect on 27 May 2009, see subsections 531F(3), 531G(3) and (3B)] The text of any of those amendments not in force on that date is appended in the Notes section The operation of amendments that have been incorporated may be affected by application provisions that are set out in the Notes section Prepared by the Office of Legislative Drafting and Publishing, Attorney-General’s Department, Canberra Contents Part 1—Introduction 1 1 Short title [see Note 1].......................................................................1 2 Commencement [see Note 1].............................................................1 3 Objects...............................................................................................1 4 Regulatory policy ..............................................................................3 5 Simplified outline ..............................................................................3 6 Main index.........................................................................................7 7 Definitions.........................................................................................8 8 Crown to be bound ..........................................................................18 9 Extra-territorial application .............................................................18
    [Show full text]
  • Download PDF Read More
    This Issues Paper reflects the law as at 30 November 2006 © Commonwealth of Australia 2006 This work is copyright. You may download, display, print and reproduce this material in whole or part, subject to acknowledgement of the source, for your personal, non- commercial use or use within your organisation. Apart from any use as permitted under the Copyright Act 1968 (Cth), all other rights are reserved. Requests for further authorisation should be directed by letter to the Commonwealth Copyright Administration, Copyright Law Branch, Attorney-General’s Department, Robert Garran Offices, National Circuit, Barton ACT 2600 or electronically via www.ag.gov.au/cca. ISBN 0-9758213-7-7 Commission Reference: IP 32 The Australian Law Reform Commission was established on 1 January 1975 by the Law Reform Commission Act 1973 (Cth) and reconstituted by the Australian Law Reform Commission Act 1996 (Cth). The office of the ALRC is at Level 25, 135 King Street, Sydney, NSW, 2000, Australia. All ALRC publications can be made available in a range of accessible formats for people with disabilities. If you require assistance, please contact the ALRC. Telephone: within Australia (02) 8238 6333 International +61 2 8238 6333 TTY: (02) 8238 6379 Facsimile: within Australia (02) 8238 6363 International +61 2 8238 6363 E-mail: [email protected] ALRC homepage: www.alrc.gov.au Printed by Canprint Communications Pty Ltd Making a submission Any public contribution to an inquiry is called a submission and these are actively sought by the ALRC from a broad cross-section of the community, as well as those with a special interest in the inquiry.
    [Show full text]
  • Review of the Privacy Act 1993
    NZLC REPORT 123 E31(123) NovemberJune 2011, 2010, Wellington, Wellington, New New Zealand Zealand | | REPORT REPORT 123 119 REVIEW OF THE PRIVACY ACT 1993 REVIEW OF THE LAW OF PRIVACY STAGE 4 LAW COMMISSION E31 (123) June 2011, Wellington, New Zealand | REPORT 123 REVIEW OF THE PRIVACY ACT 1993 REVIEW OF THE LAW OF PRIVACY STAGE 4 The Law Commission is an independent, publicly funded, central advisory body established by statute to undertake the systematic review, reform and development of the law of New Zealand. Its purpose is to help achieve law that is just, principled, and accessible, and that reflects the heritage and aspirations of the peoples of New Zealand. The Commissioners are: Honourable Sir Grant Hammond KNZM – President Dr Warren Young – Deputy President Emeritus Professor John Burrows QC George Tanner QC Professor Geoff McLay The General Manager of the Law Commission is Brigid Corcoran The office of the Law Commission is at Level 19, HP Tower, 171 Featherston Street, Wellington Postal address: PO Box 2590, Wellington 6140, New Zealand Document Exchange Number: sp 23534 Telephone: (04) 473-3453, Facsimile: (04) 471-0959 Email: [email protected] Internet: www.lawcom.govt.nz National Library of New Zealand Cataloguing-in-Publication Data New Zealand. Law Commission. Review of the Privacy Act 1993 : review of the law of privacy, stage 4. (Law Commission report ; 123) ISBN 978-1-877569-14-2 (pbk.)—ISBN 978-1-877569-23-4 (internet) 1. New Zealand. Privacy Act 1993. 2. Privacy, Right of—New Zealand. I. Title. II. Series: New Zealand. Law Commission. Report ; no.
    [Show full text]
  • Secrecy Laws and Open Government in Australia
    Secrecy Laws and Open Government in Australia REPORT REPORT 112 December 2009 This Report reflects the law as at 11 November 2009 © Commonwealth of Australia 2009 This work is copyright. You may download, display, print and reproduce this material in whole or part, subject to acknowledgement of the source, for your personal, non- commercial use or use within your organisation. Apart from any use as permitted under the Copyright Act 1968 (Cth), all other rights are reserved. Requests for further authorisation should be directed by letter to the Commonwealth Copyright Administration, Copyright Law Branch, Attorney-General’s Department, Robert Garran Offices, National Circuit, Barton ACT 2600 or electronically via www.ag.gov.au/cca. ISBN- 978-0-9807194-0-6 Commission Reference: ALRC Report 112 The Australian Law Reform Commission was established on 1 January 1975 by the Law Reform Commission Act 1973 (Cth) and reconstituted by the Australian Law Reform Commission Act 1996 (Cth). The office of the ALRC is at Level 25, 135 King Street, Sydney, NSW, 2000, Australia. All ALRC publications can be made available in a range of accessible formats for people with disabilities. If you require assistance, please contact the ALRC. Telephone: within Australia (02) 8238 6333 International +61 2 8238 6333 TTY: (02) 8238 6379 Facsimile: within Australia (02) 8238 6363 International +61 2 8238 6363 E-mail: [email protected] Homepage: www.alrc.gov.au Printed by Ligare The Hon Robert McClelland MP Attorney-General of Australia Parliament House Canberra ACT 2600 11 December 2009 Dear Attorney-General Review of Secrecy Laws On 5 August 2008, you issued terms of reference for the ALRC to undertake a comprehensive review of secrecy laws and related issues.
    [Show full text]
  • The Legal Protection of Personal Images Shared on Social Networks in Australia
    The Legal Protection of Personal Images Shared on Social Networks in Australia Author Georgiades, Eugenia Published 2017 Thesis Type Thesis (PhD Doctorate) School Griffith Law School DOI https://doi.org/10.25904/1912/3656 Copyright Statement The author owns the copyright in this thesis, unless stated otherwise. Downloaded from http://hdl.handle.net/10072/367723 Griffith Research Online https://research-repository.griffith.edu.au The Legal Protection of Personal Images Shared on Social Networks in Australia Eugenia Georgiades Bachelor of Arts (Hons), Bachelor of Laws, Graduate Diploma Legal Practice, Master of Laws School of Law, Griffith University This thesis is submitted in fulfilment of the requirements of the degree of Doctor of Philosophy December 2016 ii Abstract Social networks have changed the nature of communication in the modern world: they have changed how people communicate, the frequency and mode of communication, and how people relate to those communications. Social networks have also changed the type of information that is communicated. One of the notable developments has been a proliferation of the sharing of images that people have taken themselves. From the ubiquitous selfie through to group shots, personal images are now a key part of modern social communication. A number of problems have arisen as a consequence of the rapid increase in the sharing of personal images online. This is because personal images uploaded online are, more now than ever, prone to misuse. Third parties are easily able to reuse, distort and alter images that are uploaded on social networks. As a result, people are at risk of losing control over the images that they upload online.
    [Show full text]
  • Upholding the Australian Constitution Volume Fourteen
    Upholding the Australian Constitution Volume Fourteen Proceedings of the Fourteenth Conference of The Samuel Griffith Society Menzies Hotel, Carrington Street, Sydney, 14 – 16 June, 2002 © Copyright 2002 by The Samuel Griffith Society. All rights reserved. Table of Contents Foreword John Stone Dinner Address Hon Chief Justice Murray Gleeson, AC The Birth, Life and Death of Section 74 Introductory Remarks John Stone Chapter One Professor Geoffrey de Q Walker The Seven Pillars of Centralism: Federalism and the Engineers’ Case Chapter Two Dr Nicholas Aroney The Ghost in the Machine: Exorcising Engineers Chapter Three Hon Justice Kenneth Handley, AO When “Maybe” means “No” Chapter Four Professor David Flint, AM The Republic: Report from Corowa Chapter Five Professor John McMillan Immigration Law and the Courts Chapter Six Hon Philip Ruddock, MHR Immigration Policy and the Separation of Powers Chapter Seven Piers Akerman Immigration Policy, Sovereignty and the Media Chapter Eight Hon Justice Lloyd Waddy Memories of a Monarchist – now a Trappist Judge Chapter Nine Dr Stephen Hall September 11 and International Law Chapter Ten Dr Janet Albrechtsen National Interest versus International Law: The International Criminal Court Chapter Eleven Steven Franks, MP (NZ) Treaty of Waitangi: Only Good Intentions? Concluding Remarks Rt Hon Sir Harry Gibbs, GCMG, AC, KBE Appendix Contributors Foreword John Stone The fourteenth Conference of The Samuel Griffith Society, which was held in Sydney in June, 2002, was more than usually notable, for several reasons. This Volume of the Society’s Proceedings, Upholding the Australian Constitution, contains the papers, and Dinner Addresses, delivered to that Conference, together with the usual brief concluding remarks of our President, the Rt Hon Sir Harry Gibbs.
    [Show full text]
  • Michael Wilson Thesis
    THE POLITICS OF PRIVACY PROTECTION: AN ANALYSIS OF RESISTANCE TO METADATA RETENTION AND ENCRYPTION ACCESS LAWS Michael Peter Wilson Bachelor of Justice (Honours) Bachelor of Behavioural Science A thesis submitted in fulfilment of the requirements for the degree of Doctor of Philosophy School of Justice, Faculty of Law Queensland University of Technology 2020 Abstract The politics of privacy protection are contested. In recent years, the Australian Government has justified the expansion of surveillance powers, under the Data Retention Act (2015) and Encryption Access Act (2018), by invoking the ‘problem of going dark’ – a claim that the investigative capabilities of law enforcement agencies are being undermined by the use of privacy-enhancing technologies. As such, the ‘problem of going dark’ draws a moral equivalence between privacy protection and methods of evading criminal investigations. This thesis examines the politics of privacy protection within the context of Australia’s national debates about digital surveillance powers, focusing on how privacy advocates contest this moral equivalence embedded within the ‘problem of going dark’. Specifically, this research involves a political discourse analysis (Laclau & Mouffe, 1985) of twenty-one (n=21) semi-structured interviews with Australian privacy advocates involved in campaigns opposing data retention and encryption access laws. Using the analytical constructs of signification, subjectivation, and identification, the research examines how privacy advocates challenge the ‘problem of going dark’, discursively position the subjects of surveillance laws, and mobilise through the construction of shared identities. This thesis argues that Australian privacy advocates contest the moral equivalence embedded within the ‘problem of going dark’ via the articulation of a civic duty to disrupt the relations of domination that enable ‘morally arbitrary’ surveillance under the Data Retention Act (2015) and Encryption Access Act (2018).
    [Show full text]