Abstract
The powers of the Agencies to use the disclosed historical and prospective location information are broad and lack transparency to challenge. This is demonstrated by the use of the word ‘security’, the meaning of which is broad, but is accepted by Australian courts as the discretionary realm of the executive branch of government. There appear to be no clear public guidelines on what actions qualify as potential threats to security, thereby placing tech—and politically-savvy climate change and environment protestors, at risk of being inquired into—the government has equated their actions to threats of security. No clear guidelines exist how metadata collections may be initiated at an arm’s length basis, between the Agencies and the government if such cases were to be referred to the Agencies by the government. Telecommunications data is also collected for what may be considered as offences that do not risk national security such as public order offences, theft and a category of miscellaneous offences that are not disclosed. In this manner the collection and use of metadata across all types of offences is indiscriminate, whereas the original motivation for metadata retention and collection were serious crimes that threaten national security, such as terrorist acts. This situation puts climate change protesters at potential risk of their metadata being stored indefinitely and analysed.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
The word ‘use’ is not defined in the TIA Act 1979 nor in the Privacy Act 1988 (Cth).
- 2.
See that describes location information as personal information.
- 3.
This compilation includes commenced amendments made by Act No. 59, 2015. Amendments made by Act No. 60, 2015 have not commenced but are noted in the endnotes.
- 4.
- 5.
Also see RZBV and Director-General of Security and Anor [2015] AATA 296 (5 May 2015) 7 [17].
- 6.
The case cited Suresh v Canada (The Minister of Citizenship and Immigration) [2002] SCC 1 at [88], [2002] 1 SCR 3, 50–51.
- 7.
See Chap. 6.
- 8.
See Sects. 5.1.2.2.1 to 5.1.2.2.3.1 in Chap. 5.
References
Australian Broadcasting Corporation (ABC) (October 24 2011) Despite arrests, Occupy protesters won’t give up. https://www.abc.net.au/news/2011-10-24/occupy-protesters-vow-to-continue/3597178. Accessed 3 Sept 2019
ABC (March 16 2019a) Climate change strikes across Australia see student protesters defy calls to stay in school. https://www.abc.net.au/news/2019-03-15/students-walk-out-of-class-to-protest-climate-change/10901978. Accessed 3 Sept 2019
ABC (2019b) Election 2019: the battle for Queensland. Broadcast: Monday 15 April 2019, 9:35pm. https://www.abc.net.au/qanda/2019-15-04/10988470. Accessed 3 Sept 2019
Administrative Decisions (Judicial Review) Act 1977 (Cth) (ADJR Act 1977)
Attorney-General’s Department (AGD) (2015) Submission No 27 to the Parliamentary Joint Committee on Intelligence and Security, Inquiry into the Telecommunications (Interception and Access) Amendment (Data Retention) Bill 2014, 16 January 2015
AGD (2016) Attorney-General’s Guidelines in relation to the performance by the Australian Security Intelligence Organisation of its function of obtaining, correlating, evaluating and communicating intelligence relevant to security (including politically motivated violence), 2016 (Attorney-General’s [AG’s] Guidelines)
Australian Federal Police (AFP), Submission 15 to the Parliamentary Joint Committee on Intelligence and Security, Review of the mandatory data retention regime, 2019
Australian Federal Police Act 1979 (Cth) (AFP Act 1979)
Australian Human Rights Commission (AHRC), Submission 8, to the Parliamentary Joint Committee on Intelligence and Security, Review of the mandatory data retention regime, 2019
Australian Security Intelligence Organisation Act 1979 (Cth) (ASIO Act 1979)
Bennett ML, de Koker L (2017) Open secrets: balancing operational secrecy and transparency in the collection and use of data for national security and law enforcement agencies. Melb Univ Law Rev 41(2):530. http://classic.austlii.edu.au/au/journals/MelbULawRw/2017/32.html
Casanovas Romeu P, de Koker L, Mendelson D, Watts D (2017) Regulation of big data: perspectives on strategy, policy, law, and privacy. Health Technol 7:335–349
Church of Scientology Inc v Woodward [1982] HCA 78; (1982) 154 CLR 25
Clarke R (2016) Privacy impact assessments as a control mechanism for Australian national security initiatives. Comp Law Secur Rev 32:403–418
Communications Access Coordinator’s (CAC) Telecommunications (Interception and Access) (Requirements for Authorisations, Notifications and Revocations) Determination 2015 (Cth) (at 9 October 2015) (CAC Determination 2015)
Council of Civil Service Unions v Minister for the Civil Service [1985] AC 374
Crimes Act 1914 (Cth)
Criminal Code Act 1995 (Cth) (CCA 1995)
de Koker L, Chan J, Mendelson D, Bennett Moses L, Maurushat A, Vaile D, Gaffney M, Sadler G, Grierson P, Cater D (June 2018) Australia report. Big data technology and national security. Comparative international perspectives on strategy, policy and law. Law and Policy Program. Data to Decisions Cooperative Research Centre. https://uploads-ssl.webflow.com/5cd23e823ab9b1f01f815a54/5cff12f563db55c367e6c7ca_Big%20Data%20Technology%20and%20National%20Security%2C%20Comparative%20International%20Perspectives%20on%20Strategy%2C%20Policy%20and%20Law%20-%20AUSTRALIA%20REPORT.pdf
Evidence to Parliamentary Joint Committee on Intelligence and Security (PJCIS), Parliament of Australia, Canberra, 30 January 2015, 65 (Lewis Duncan Edward, Director-General of Security, Australian Security Intelligence Organisation) cited in Parliamentary Joint Committee on Intelligence and Security, Parliament of Australia, Advisory Report on the Telecommunications (Interception and Access) Amendment (Data Retention) Bill 2014 (Cth) 2015
Evidence to Parliamentary Joint Committee on Intelligence and Security, Parliament of Australia, Canberra, 30 January 2015, 31 (Peter Leonard Guildford, Chairperson of the Media and Communications Committee, Business Law Section of the Law Council of Australia)
Evidence to Parliamentary Joint Committee on Intelligence and Security, Parliament of Australia, Canberra, 17 December 2014, 3 (Andrew Colvin, Commissioner, Australian Federal Police)
Evidence to Parliamentary Joint Committee on Intelligence and Security, Parliament of Australia, Canberra, 17 December 2014, 17 (Kerri Hartland, Acting Director-General, ASIO)
Evidence to Parliamentary Joint Committee on Intelligence and Security, Parliament of Australia, Canberra, 17 December 2014, 29 (Jason Clare, Member of the PJCIS)
Evidence to Parliamentary Joint Committee on Intelligence and Security, Parliament of Australia, Canberra, 17 December 2014, 29 (Anna Harmer, Acting First Assistant Secretary, Attorney-General’s Department)
Explanatory Memorandum (2019) Criminal Code Amendment (Agricultural Protection) Bill 2019
Farrell; Secretary, Department of Immigration and Border Protection (Freedom of information) [2017] AATA 409 (31 March 2017)
Feldman H (May 2 2019) Young people won’t accept inaction on climate change, and they’ll be voting in droves. The Conversation. https://theconversation.com/young-people-wont-accept-inaction-on-climate-change-and-theyll-be-voting-in-droves-116361. Accessed 3 Sept 2019
Freedom of Information Act 1982 (Cth) (FIA 1982)
Goldman ZK, Rascoff SJ (eds) (2016) Executive oversight of intelligence agencies in Australia. Global intelligence oversight: governing security in the twenty-first century. Keiran H, and Williams G. UNSW Law Research Paper No. 2016–35 (7 June 2016). https://ssrn.com/abstract=2804835. Accessed 27 Aug 2019
Greens Queensland, The (2019) The Plan to Stop Adani. https://greens.org.au/qld/platform/plan-to-stop-adani. Accessed 3 Sept 2019
Hanifie S, Isa N (January 15 2019) Mass fish die-off in Darling River could impact fish numbers in other states. https://www.abc.net.au/news/2019-01-15/mass-fish-kill-in-darling-river-to-impact-other-states/10715640. Accessed 3 Sept 2019
Hardy K, Williams G (2014) National security reforms stage one: intelligence gathering and secrecy. Law Soc NSW J 6(November):68. https://search.informit.com.au/fullText;dn=20151952;res=AGISPT
Jaffarie v Director General of Security [2014] FCAFC 102 (18 August 2014)
Kassam K (May 07 2019) Polling. Press Release - 2019 Lowy Institute Polling: Australian Attitudes Towards Foreign Policy Issues Ahead of the 2019 Federal Election. https://www.lowyinstitute.org/publications/press-release-2019-lowy-institute-polling-australian-attitudes-towards-foreign-policy. Accessed 16 Sept 2019
Keenan M (12 May 2014) Ministerial Direction. https://www.afp.gov.au/about-us/governance-and-accountability/ministerial-direction. Accessed 27 Aug 2019
National Tribune (May 11 2019) PM Politics. Greens ‘a greater threat than Palmer’. https://www.nationaltribune.com.au/greens-a-greater-threat-than-palmer-pm/. Accessed 3 Sept 2019
Office of Australian Information Commissioner (OAIC), Submission No 92 to the Parliamentary Joint Committee on Intelligence and Security, to Inquiry into the Telecommunications (Interception and Access) Amendment (Data Retention) Bill 2014, January 2015
OAIC (2015) Australian privacy principles guidelines chapter B: key concepts’, Version 1.2 ed., vol B
OAIC (2019) Submission 34 to the Parliamentary Joint Committee on Intelligence and Security, Review of the mandatory data retention regime, July 2019
Parliamentary Joint Committee on Intelligence and Security (PJCIS) (2015) Advisory Report on the Telecommunications (Interception and Access) Amendment (Data Retention) Bill 2014’, (February 2015)
Privacy Act 1988 (Cth)
PlayerFM (2019) An address by ASIO Director-General Duncan Lewis. 11 days ago 1:00:02. https://player.fm/series/the-lowy-institute-live-events/an-address-by-asio-director-general-duncan-lewis. Accessed 16 Sept 2019
Revised Explanatory Memorandum, Telecommunications (Interception and Access) Amendment (Data Retention) Bill 2015 (Cth), 2015
Rix M (2013) Security without secrecy? Counter-terrorism, ASIO and access to information. In: Baldino D (eds) Spooked: the truth about intelligence in Australia, 2013, pp 240–263, 240
R v Secretary of State for the Home Department; Ex parte Ruddock [1987] 2 All ER 518
RZBV and Director-General of Security and Anor [2015] AATA 296 (5 May 2015)
Security of Critical Infrastructure Act 2018 (Cth) (SCIA 2018)
Shanapinda S (2016) The types of telecommunications device identification and location approximation metadata: under Australia’s warrantless mandatory metadata retention and disclosure laws’. Commun Law Bull 35(3):17–19. http://www.camla.org.au/communications-law-bulletin/. Accessed 23 July 2017
Shanapinda S (2018) Advance metadata fair: the retention and disclosure of location information as metadata for law enforcement and national security, and the impact on privacy-an Australian story. Dissertation, UNSW Sydney
Suresh v Canada (The Minister of Citizenship and Immigration) [2002] SCC 1 at [88], [2002] 1 SCR
Telecommunications (Interception and Access) Amendment (Data Retention) Bill 2015 (Cth)
Telecommunications (Interceptions and Access) (Requirements for Authorisations, Notifications and Revocations) Determination 2018 (Cth) (at 20 November 2018) (CAC Determination 2018)
Telecommunications (Interception and Access) Act 1979 (Cth) (TIA Act 1979)
Telecommunications and Other Legislation Amendment (Assistance and Access) Act 2018 (AAA 2018)
Telstra (2016) Privacy. https://www.telstra.com.au/privacy/transparency#top. Accessed 4 June 2016
The Zamora [1916] 2 AC
Victorian Government (2010) Inquiry into arrangements for security and security information gathering for state government construction projects. Final report of the Victorian Parliament Law Reform Committee. October 2010. Authority Victorian Government Printer Parliamentary Paper No. 394, Session 2006-2010. https://www.parliament.vic.gov.au/papers/govpub/VPARL2006-10No394.pdf. Accessed 3 Sept 2019
Williams G (2016) The legal assault on Australian democracy. QUT Law Rev 16(2):19
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Shanapinda, S. (2020). The Powers of the Agencies to Collect and Use Location Information. In: Advance Metadata Fair. Law, Governance and Technology Series, vol 44. Springer, Cham. https://doi.org/10.1007/978-3-030-50255-3_4
Download citation
DOI: https://doi.org/10.1007/978-3-030-50255-3_4
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-50254-6
Online ISBN: 978-3-030-50255-3
eBook Packages: Law and CriminologyLaw and Criminology (R0)