GENNA CHURCHES S-205834 LWC320 RESEARCH PAPER SS2013 EVERYBODY KNOWS EVERYBODY KNOWS: SNOWDEN’S NSA LEAKS, METADATA AND PRIVACY IMPLICATIONS FOR AUSTRALIA GENNA CHURCHES* * Charles Darwin Law Student number s205834 — Bachelor of Laws Honours Paper, summer 2013. Supervisor: Felicity Gerry i GENNA CHURCHES S-205834 LWC320 RESEARCH PAPER SS2013 EVERYBODY KNOWS TABLE OF CONTENTS Table of Contents ............................................................................................................................ ii I Introduction ............................................................................................................................. 1 II Enter Stage Left — The Snowden Documents ........................................................................ 3 A Validity of Snowden Documents ......................................................................................... 3 B What Is Collected? ............................................................................................................... 4 1 GPS/Location Data ........................................................................................................... 4 2 Undersea Cables ............................................................................................................... 5 3 Backdoors in Software and Data Retention ..................................................................... 5 4 Data Sharing ..................................................................................................................... 6 5 Worse to come? ................................................................................................................ 7 6 Summary .......................................................................................................................... 8 III Metadata ............................................................................................................................... 9 A Why is it important?............................................................................................................. 9 B Mobile Communications .................................................................................................... 10 C Internet Usage .................................................................................................................... 11 D Summary ............................................................................................................................ 11 IV Enter Stage Right — Privacy ............................................................................................. 13 A A Right to Privacy — A Right to Property, Liberty and Life? .......................................... 13 1 Warren and Brandeis ...................................................................................................... 13 B Jurisprudence of Metadata — Building a Fence ................................................................ 17 1 Privacy Cases ................................................................................................................. 17 2 GPS Cases ...................................................................................................................... 24 ii GENNA CHURCHES S-205834 LWC320 RESEARCH PAPER SS2013 EVERYBODY KNOWS 3 Jurisprudence Summary ................................................................................................. 26 C Human Rights .................................................................................................................... 27 V Legislative Authority — Mass Metadata Collection ............................................................. 31 A Telecommunications (Interception and Access) Act 1979 (Cth) (‘TIAA’) ....................... 31 B Intelligence Services Act 2001 (Cth) (‘ISA’) .................................................................... 32 C Australian Security Intelligence Organisation Act 1979 (Cth) (‘ASIOA’) ....................... 35 D Privacy Act 1988 (Cth) (‘PA’) ........................................................................................... 35 E Surveillance Devices Acts ................................................................................................. 36 F Summary of Legislative Authority .................................................................................... 36 VI Other Legal Protections and Principles .............................................................................. 37 A Legally Privileged Information .......................................................................................... 37 B Rule of Law........................................................................................................................ 37 C General Warrants ............................................................................................................... 38 D Constitutional Rights ......................................................................................................... 40 VII Who Is To Blame? ............................................................................................................. 42 A The Relevant Minister or AIC?.......................................................................................... 42 B Office of the Inspector General of Intelligence and Security ............................................ 42 VIII Does Privacy Matter? ......................................................................................................... 44 IX The Remedy ....................................................................................................................... 47 X Conclusion ............................................................................................................................. 50 Bibliography ................................................................................................................................. 52 A Articles/Books.................................................................................................................... 52 B Cases .................................................................................................................................. 59 iii GENNA CHURCHES S-205834 LWC320 RESEARCH PAPER SS2013 EVERYBODY KNOWS C Legislation.......................................................................................................................... 62 D UN Documents/Declarations ............................................................................................. 63 E Reports/Inquiries/Royal Commissions/Bill Digests .......................................................... 64 F Online Newspapers/Internet Materials/Media Releases/Transcripts ................................. 66 G Other .................................................................................................................................. 78 iv GENNA CHURCHES S-205834 LWC320 RESEARCH PAPER SS2013 EVERYBODY KNOWS The price of freedom is eternal vigilance.1 I INTRODUCTION In 1890, lawyers Warren and Brandeis, wrote an influential paper discussing the support within the common-law for a right to privacy.2 They considered the many similar protections already afforded by the torts of libel, slander and defamation and their homogenous support of a tort of privacy. They believed the press was overstepping the ‘bounds of proprietary and decency’,3 dealing in a prurient trade of gossip, stepping so low as to portray ‘details of sexual relations’.4 Privacy has not attained the great heights which Warren and Brandeis envisaged — instead the media is hacking phones,5 corporations are collecting masses of metadata6 and governmental spy agencies have been accessing and retaining metadata and communications of ordinary citizens the world over.7 Every detail of life is either retained in some form by governments and/or large corporations or at least accessible without permission or judicial check. Data is collected, analysed and retained, granting unsurpassed insight into the most personal of details and thought. How would Warren and Brandeis8 have felt in today’s transparent world? A world which, with the aid of the 1 This quote has been attributed to many different sources from Thomas Jefferson and Abraham Lincoln through to Leonard Courtney, Wendell Phillips and John Curran, Master of the Rolls in Ireland; see also Robert McClelland, ‘The Future of Security’ (2007) 3(4) Original Law Review 107, quoting, Franco Frattini, European Commissioner responsible for Justice, Freedom and Security, ‘Our citizens entrust us with the task of protecting them against crime and terrorist attacks; however, at the same time, they entrust us with safeguarding their fundamental rights.’ 2 Samuel D Warren and Louis D Brandeis, ‘The Right to Privacy’ (1890) 5(IV) Harvard Law Review 193. 3 Ibid 196. 4 Ibid. 5 Leveson LJ, Leveson Inquiry, The Report into the Culture, Practices and Ethics of the Press, 29 November 2012 <http://www.levesoninquiry.org.uk/>; Lisa O’Carroll, ‘Rebekah Brooks To Begin Her Defence At Phone-Hacking Trial’, The Guardian (online), <http://www.theguardian.com/uk-news/2014/feb/18/rebekah-brooks-defence-phone- hacking-trial-andy-coulson?CMP=ema_546>. 6 See, eg, Nina Golgowski, ‘How Target Knows When Its Shoppers Are Pregnant – and Figured out a Teen Was before Her Father Did’, The Daily Mail (online), <http://www.dailymail.co.uk/news/article-2102859/How-Target- knows-shoppers-pregnant--figured-teen-father-did.html#ixzz2uOkwgc3X>. 7 See, eg, The Guardian,
Details
-
File Typepdf
-
Upload Time-
-
Content LanguagesEnglish
-
Upload UserAnonymous/Not logged-in
-
File Pages82 Page
-
File Size-