National Security Inquiry

Submissions can be made by any individual or organisation. The best option for this inquiry is to email your submission to pjcis@aph.gov.au

This pdf: Making a Submission explains the process in more detail, but it can be enough just to send an email expressing your opposition. (one person's example)

The official page about the inquiry with more information on the process and the inquiry is here:

http://www.aph.gov.au/Parliamentary_Business/Committees/House_of_Representatives_Committees?url=pjcis/nsl2012/index.htm

Below are a number of resources, articles links and information which may assist in preparing your arguments/submission.

This wiki page is currently an active work in process and is updated regularly.

Pirate Party Flyers
Digital Flyer: http://pirateparty.org.au/media/promotional/natsecinquiry_poster.png

Print Flyer: http://pirateparty.org.au/media/promotional/natsecinquiry_poster.pdf

Related Links
Official Committee Link (Go here to make submission): http://www.aph.gov.au/Parliamentary_Business/Committees/House_of_Representatives_Committees?url=pjcis/nsl2012/index.htm

The Discussion Paper: http://www.aph.gov.au/Parliamentary_Business/Committees/House_of_Representatives_Committees?url=pjcis/nsl2012/additional/discussion%20paper.pdf

Contact Parliament/MP's: http://australia.gov.au/directories/contact-parliament

r/AUInternetAccess subreddit: https://pay.reddit.com/r/AUInternetAccess/

Twitter Hashtag: #natsecinquiry https://twitter.com/#!/search/%23natsecinquiry

Stop Big Brother: http://stopbigbrother.com.au/ (includes video and form fill out to send your opposition... form goes where?)

Freedom Not Fear: http://freedomnotfear.net/

Other groups flyers and/or related links
Ludlum's Flyer: http://scott-ludlam.greensmps.org.au/sites/default/files/natsecinquiry.pdf

Orwellian Coat of Arms: http://i.imgur.com/Fs9YV.jpg

AVAAZ Petition: https://secure.avaaz.org/en/internet_privacy_under_attack/?wZzYLab

GetUp Campaign page: http://www.getup.org.au/campaigns/privacy/protect-us-but-respect-us/your-privacy-at-risk

GetUp YouTube Video: http://www.youtube.com/watch?v=QAxZ-riGmyo

Other Links
These links are loosely related to the natsecinquiry in that they may be good examples of why aspects of the new proposals are a bad idea, or are more general overarching privacy/surveillance articles etc.

Notes on the Terms of Reference and Discussion paper
The notes are laid out based on the 6 page Terms of Reference (ToR) found here.

Notes from the discussion paper will follow the points in the ToR to make submission writing easier.

Areas of proposed changes

Introduction

(From the Discussion paper) Security services claim new powers are needed because:

They claim to have foiled 4 attacks on Australian soil since 2001.

Organised Crime.

To combat espionage from foreign powers.

Claims Law enforcement needs to keep up in a technological arms race.

"Australia’s telecommunications landscape continues to evolve, it is appropriate and timely to consider how best to manage risks to the data carried and stored on our telecommunications infrastructure to secure its availability and integrity in the long term."

Criticism

The current surveillance powers available to security agencies were able to foil four terrorist attacks since 2001. It would stand to reason that their current powers are adequate if they are able to stop terrorists already.

Deploying invasive surveillance measures to fight the so-called technological arms race with criminals results in the privacy and rights of Australian citizens to be eroded year after year. Whist some changes are necessary to adjust to the move of communications online, many measures that have been passed by the last two governments already overstep the boundaries of what is acceptable in a liberal democracy and what is proposed is the most serious assault on Australians' civil liberties to date.

Forcing ISP's to store everyone's browsing history, email data and social media histories is the largest emerging threat to the privacy of Australian citizens and businesses. Creating such a central repository will become a holy grail for criminal organisations who can use the very private data of Australians for blackmail, fraud and identity theft.

1. Relevant Acts:

a) Telecommunications (Interception and Access) Act 1979

b) Telecommunications Act 1997

c) Australian Security Intelligence Organisation Act 1979

d) Intelligence Services Act 2001

2. Consider effectiveness of proposals. The inquiry should ensure that Intelligence and Security agencies can adapt to changing technologies, can co-operate effectively and provide enhanced security to the tele-communications sector.

Criticism

The proposals in regard to dealing with 'the challenges of new and emerging technologies upon agencies’ capabilities' are all one way; the proposals strip citizens of their basic rights to grant more power to Intelligence agencies.

Enhancing the ability of security services to co-operate has merit. Issues may arise where, due to the differing responsibilities and vested powers of various agencies become a method to work around some of the checks and balances protecting Australians from undue surveillance.

3. The committee should have regard to:

a) The need to protect the privacy and civil rights of individuals, proportionate to national security

Criticism There is no demonstrated need for Intelligence agencies to gain wide-sweeping powers over the private information of Australian citizens. The powers requested, especially in the Areas of Consideration (2 years mandatory data retention and the loss of the right to remain silent in regards to decryption for E.G.) are contrary to any measure of civil liberties and are powers that are usually the hallmark of oppressive regimes.

b) Limit costs to ISPs and flow on effect to consumers

Criticism Mandatory data retention will be a costly exercise in over-collection of data that will result in consumers paying extra to their ISP's for Intelligence services having the right to pore over their personal information at leisure.

c) reduction of efficiency of law enforcement and intelligence due to changing technology

4. The committee needs to take into account a broad range of stakeholders, through public, in camera and classified hearings.

This will give rise to mistrust in the deliberations of JSCOT. If classified hearings are used to justify the proposed assault on Australians' civil liberties it will create mistrust in the Australian public who, according to the Sydney Morning Herald are almost united in their opposition to increased surveillance powers online.