StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Criticism and Justification of the Telecommunications Act 2015 - Research Paper Example

Summary
"Criticism and Justification of the Telecommunications Act 2015" paper discusses inefficiencies in the amended Act and the challenges that state security agencies and telecommunication operators have faced in ensuring that the set objective is achieved…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER93.6% of users find it useful

Extract of sample "Criticism and Justification of the Telecommunications Act 2015"

Student’s Name Instructor’s Name Subject Details Due Date Contents 1.0 Introduction 1 2.1 Possible Risks 5 2.2 Implications of the Amendment 6 3.0 Looking Forward 7 3.1 Implementation 9 3.2 Conclusion 10 Works Cited 11 The Telecommunications Act 2015 (cth) 1.0 Introduction Nearly two years ago, an amendment of the antiterrorism law was done to help intelligence and law enforcement agencies to fight terrorism to the maximum. By far, recent terror activities, combats, and neutralization have shown that the amendment of Act 2015 (Cth) was not necessary1. During its inception, the amendment was received amid complaints and speculations from various stakeholders regarding the ethical concerns involved. With this amendment, digital privacy would be at stake thus personal security would be compromised to a greater extent. As the new Act required, the Australian telcos and ISPs would access personal data, ranging from download volumes, mobile phone usage, emails, messages, calls and landline voice. According to the provision, a secret register would be kept by the service provider so as to serve as an identification bureau for the person being targeted, particularly regarding terrorism and terrorist activities. Over time, the amendment of this law framework to counter terrorism in Australia has by far been proven ineffective. However, there are still challenges due in its implementation2. This essay discusses inefficiencies in the amended Act and the challenges that state security agencies and telecommunication operators have faced in ensuring that the set objective is achieved. 2.0 Criticism and Justification Several parties have criticized the Telecommunications (Interception and Access) Amendment (Data Retention) Act 20153. Internet Australia, being the central stakeholder resisted the enactment of this Act to a greater extent. The basis of which the Act was founded was questioned by the Academics and Privacy advocates4. Additionally, serious concerns about its implications on the laws of privacy were questioned by the Australian Information Commissioner. According to the reports generated from the AGD, incomplete metadata was an urgent requirement in combating terrorism in Australia5. Amid all these arguments, the question remains as to whether data retention is necessary, proportionate and reasonable. Majority of Australians have been affected by this scheme. Companies such as Telcos increased the cost of internet access that ran to hundreds of millions of dollars. The Australian civilians have been subjected to a surveillance tax. It was expected that the scheme would be financed by the federal government but to the state's realization, civilians are paying heavily to the government. According to Abbott, the Prime Minister who was in office during its inception, the total cost for funding the scheme was to be $131 million6 . However, the Joint Committee on Intelligence and Security supplied evidence showing a possible $60 surveillance tax in every household7. Relatively, a figure of $60 per household translates to a cost of $5 for every customer to store data8. While competing against larger companies, smaller ISPs will have been forced to meet the costs of the data retention regime. To some extent, the enactment of this Act serves as means for maintaining the status quo. Evidently, phone records have been kept by highest telcos companies like Telstra and iiNet9. In this case, therefore, data retention will be a waste of resources that could have been converged to establish more comprehensive ant-terror mechanisms. The police departments have failed to substantiate claims that metadata would help to investigate crime and combat terrorism. Comparatively, the use of "data retention" as an antiterrorism approach in Netherlands has been active for the last four years. There is no prove that the approach has helped to combat the vice. There is also debate among citizens on who will have the authority to access the data. Up to the moment, the government has not laid the exact agencies responsible for accessing telecommunication data. According to most citizens, the public and service providers should be given authority to decide which agencies can obtain their data instead of the government itself. A study conducted in Australia marked that the rate of crime clearance had increased by 0.04% in 201410. In connection with this data, the Attorney General's department officials and the Australian police forces have also expressed their lack of evidence about the kind of security they would achieve with the use of data retention. The only case that proved the effectiveness of the use metadata in fighting terrorism was the 2005 Operation Pendennis that several proponents of the metadata approach have always quoted11. The effectiveness of this approach in this particular case is questioned when it failed to identify the masterminds of the terror activity and the groups that were involved.Comparatively, the US has passed Freedom Acts that restricts security agencies to get access to all call records12. Furthermore, countries like Israel with more terrorist threats than Australia have not yet passed such law as they have not perceived it as a comprehensive and effective strategy to an adequate response to terror threats. So far, the data surveillance process has not yet exposed any serious criminal plots in Australia thus this makes it lack a legitimate purpose. 2.1 Possible Risks Assuming, despite the evidence and for the argument's sake, that crime detection rates could be improved with data retention, provokes a series of arguments about the rights of citizens. It is acceptable that there are rights that mark a trade-off between a particular state's power to protect its citizens and the rights of privacy of an individual. The Act would expose individual information since their consent is not sought for when their information is needed. It is also a common understanding that detecting, preventing and punishing crime is made difficult more often due to the civil liberties of citizens13. They are, nonetheless, valued highly and as such kept anyway. Challenges arose when there is a mismatch in balance for the state that is created by the "data retention" regime. The jurisdiction is repressive as it limits the time that citizens use on the internet. This point of view leads to a generalization that any limitation on data retention is unnecessary and is only geared towards exploitation of the public. Data has shown that the number of terrorist incidences in Australia is on the rise even after the amendment of the Act. On 10 September 2016, the Minto Stabbing attack in New South Wales was a terrorist attack that "data retention" never detected14. Equally, the Queanbeyan Stabbing on 7 April 2017 is no exception15. Significantly though, the method has not been used as a comprehensive means to counter terrorism following the reason that as at 2016, prosecutions for terrorist offense have been the only means for identifying terror groups and activities. With all these scenarios and evidence from terror threats that have experience in the last two years, there is no way that the existing data protection law is adequate as a terrorism countermeasure. The inadequacy of this mechanism is contributed to by the fact that it depends on a lot other program activities like coding and voluntary compliance. 2.2 Implications of the Amendment The amendment is likely to be a threat to many institutions within the Australian community. According to the Metadata Retention Act, most institutions including police departments and local councils were barred from accessing citizen data without a warranty16. The restriction renders such institutions and departments in great danger as they cannot access data of their ordinary clients. The order puts the barred institutions and government departments at a greater risk of offering their daily services. Additionally, the order does not cover corporate and university networks, this has a potential of creating more threats to the university sector in particular considering the safety of students. Notably, key government departments have not defined clearly the meaning of metadata causing more contradictions and confusions among citizens. For instance, there is a question whether the web-browsing history of an individual is inclusive of the intended data. Recently, Attorney George Brandis faced challenges in his bid to explain the meaning of metadata in the security context regarding websites and personal portfolios17. Most of these questions remain unanswered by the relevant authorities bringing misunderstanding of the new law. In adopting the new directive, most service providers will require more time to fully adhere to the requirements. The time of implementation will vary among companies depending on their system designs. As such, most telcos are likely to take long periods to start storing destinations of corresponding IP addresses of their customers and also removing some data from their systems will require technical advice from experts. Considering all these requirements and processes there is still the challenge of ensuring full implementation of the amendment in the counter-terrorism law. The Communications Alliance CEO, John Stanton, is debating on behalf of the industry for an extension of the deadline and the cost. The stakeholders in the industry have argued that the estimated budget of $131 million will not be enough due to other attached expenses like the surveillance tax18. This provokes the question of the community cost in tax to finance the transition. 3.0 Looking Forward Through declaration and on a temporary basis, the Attorney General is permitted by Subsection 187 AA (2) of the Data Retention Act 1998, to amend the dataset. Thus providing a fine opportunity to inculcate different views from various civil society groups and lawyers for the betterment of the law. Additionally, it gives room to cover future situations based technologies and changes in telcos practices. Moreover, Australia Communication and Media Authority should hold extensive consultation process as stipulated in section 187G. All this should work together to ensure information security obligations to avert terrorism. Today, most terrorist attacks are linked to strong religious beliefs. There is much radicalization among the youth increasing their numbers into terrorist organizations. Some youths pretend to attend mosque sessions when in reality, they would be plotting strategies on more terrorist attacks19. Despite holding most data, terrorist groups may decide to schedule private meetings without the knowledge of intelligence department. For instance, Farhad Mohammed had visited a local mosque of extremist Islamic groups before the attack that led to the killing of Curtis Cheng20. With the evidence from this scenario, the use of data retention as mitigation approach to counter-terrorism is rendered ineffective. The amendments in the telecommunications act of 2015 do not safeguard the confidentiality of critical information. Sensitive information concerning legal privileges and health records of individuals is at risk. The telecommunication data is capable of revealing information that can be against the law such like client and lawyer which can be disclosed during defense process. This is against the requirements in the amendments to Privacy Act 1998 (Cth) of 2014 that strengthened privacy and protection. As such, the bill need to house specific safeguards to prevent discloser of confidential information. The data retention periods need to be reduced. According to the Data Retention Amendment Act of 2015, telcos providers have a maximum period of two years to retain computer and phone metadata for their customers. The EU data retention directive imposed on a retention period of between six to twenty-four months. Most countries have adopted six to eighteen months period to prevent data alteration. As such the Australian government should consider reducing the data retention period down from two years to reduce the risk of data breaches and the extent to which data is compromised. Additionally, the geographical location of the person whose data may contribute to detection and prevention of terrorist attacks may be extended in case of any suspicion. 3.1 Implementation By far the government has not demonstrated any form of urgency to implement fully the provisions of the amendments. From the federal government's underestimated budget, there will be financial constraints in administering the implementation process of the policy21. Additionally, there is no good criteria in the disbursement of the funds to each telecommunication company to facilitate data retention22. As such, more cash needs to be pumped to ensure the successful transition and clear any possible barrier that may occur in the process. The delays give terrorist opportunities to plot for more attacks in the country. There is need for an oversight judicial to inspect the process in avoiding information errors. To establish an inspection regime, the Ombudsman is bestowed with authority from Section 186B of the Data Retention Act 1998 to inspect such data retention records23. In return, the Ombudsman is required to report accurate results relating to compliance as provided in section 186J on public reporting24. In so doing, all security agencies will ensure maximum compliance in providing necessary information to the intelligence department and henceforth easing prevention of terrorist operations. In response to growing security threats and as required by law, the Parliamentary Joint Committee on Intelligence and Security drafts necessary reforms to counter terrorism. As such, they have been mandated to come up with preferred legislative frameworks that address Australian citizens' need and providing technical detail to service providers. Being the representative of citizens, the members of parliament need to formulate laws that are of the best interest of most citizens25. Moreover, the service providers are also essential in facilitating the communication processes, their views and suggestions need to be taken seriously. 3.2 Conclusion The data retention scheme is invasive, based on the cost, threats, right to privacy, freedom of expression and need for a free press in the society. There are questions on the need for the Australian government to uphold human rights and need to protect unlawful access and disclose of confidential information. In a pursuit to maintain the safety of all citizen, essential human factors like need to privacy and confidentiality are paramount. By actual degradation in investigative capabilities the security of people is threatened and is yet to worsen if appropriate mitigation measures are not undertaken26. With the increase in terrorist attacks worldwide, not assuming the most recent attack in the city of Manchester, there is need for necessary amendments particularly on intelligence and security Acts to avert terrorism. Notably, the recent amendments to the Data Retention Act 1998 have brought uncertainties for most service providers27. The attorney general's sentiments on the need for telcos to retain information routinely does not describe the type of data. In future, broader and more sweeping metadata collection laws need to be enacted. A comprehensive law to counter terrorism can be enacted if there is coordination of all government agencies and various civil society groups. Works Cited Beckman, James. Comparative legal approaches to homeland security and anti-terrorism. Routledge, 2016. 212. Print. Clarke, Roger. "Data retention as mass surveillance: the need for an evaluative framework." International Data Privacy Law 5.2 (2015): 121-132. Print Davis, Fergal, Nicola McGarrity, and George Williams. Surveillance, counter-terrorism, and comparative constitutionalism. Routledge, 2014. 11. Print. Greenleaf, Graham. "Scheherazade and the 101 data privacy laws: Origins, significance and global trajectories." JL Inf. & Sci. 23 (2014): 4. Print. Jackson, Richard. "The epistemological crisis of counterterrorism." Critical Studies on Terrorism 8.1 (2015): 33-54. Print. Leonard, Peter. "Mandatory internet data retention in Australia-looking the horse in the mouth after it has bolted-May 2015." Intellectual Property Forum: Journal of the Intellectual and Industrial Property Society of Australia and New Zealand. No. 101. Intellectual and Industrial Property Society of Australia and New Zealand Inc. 2015. Mueller, John, and Mark G. Stewart. "Evaluating counterterrorism spending." The Journal of Economic Perspectives 28.3 (2014): 237-247. Print. Nacos, Brigitte. Mass-mediated Terrorism: Mainstream and Digital Media in Terrorism and Counterterrorism. Rowman & Littlefield, 2016. 211. Print. Nicholson, Lyn. (2015) big data, metadata and personal data-How does the Privacy Act regulate metadata? Bulletin. Retrieved from www.holdingredlich.com Santas, Victoria. Traces of Terror: Counter-terrorism law, policing, and race. Oxford University Press, 2014. 221. Print. Tsesis, Alexander. "The right to erasure: Privacy, data brokers, and the indefinite retention of data." Wake Forest L. Rev. 49 (2014): 433. Print. Zwart, Melissa de, Sal Humphreys, and Beatrix Van Dissel. "Surveillance, big data, and democracy: Lessons for Australia from the US and UK." UNSWLJ 37 (2014): 713. Print. Read More

CHECK THESE SAMPLES OF Criticism and Justification of the Telecommunications Act 2015

Discourse Analysis of the Usage of Public Relations in Social Media: A Case of Proctor and Gamble

rom this, it is clear to note that its largest market share comes from the baby care segment and provides justification for the development of its 'Kids' advertisement with a dedication to moms all over the world.... justification Various studies in the field as well as publications by journalists have emphasized the fundamental role that social media has played in the field of public relations (Hunt, 2010)....
23 Pages (5750 words) Research Paper

Television Licensing Fees, The BBC and the Ofcom Regulation

The paper "Television Licensing Fees, The BBC and the Ofcom Regulation" affirms that various technologies for receiving visual material now question the justification for a licence fee based on television receiver ownership when the television is no longer the sole medium to distributes content....
11 Pages (2750 words) Essay

Cyber Terrorists: Shutdown the Internet

In recent times various soft wares have been generated that act as the tool of attack in the cyber system and some popular among them are Trojan, password crackers, malware, and key loggers.... The paper "Cyber Terrorists: Shutdown the Internet" states that the facilities provided by the creation of the web world should be protected so that the tide does not turn in our favor....
15 Pages (3750 words) Essay

Progress of Women in the Middle East

... his paper ''Progress of Women in the Middle East'' tells us that just over 100 years ago, Qasim Amin, an Egyptian lawyer and judge who is considered the "father of Arab feminism," wrote, "The evidence of history confirms and demonstrates that the status of women is inseparably tied to the status of a nation....
8 Pages (2000 words) Essay

Surveillance Technology

This term paper focuses on Surveillance Technology.... There are types of surveillance technologies available today are described, along with their applications.... The major categories discussed will be cameras or video surveillance, biometrics, Internet and etc.... ... ... ... Criticisms and limitations of surveillance technology are also discussed, as are the justifications for its continued usage by law enforcement agencies....
8 Pages (2000 words) Term Paper

Cheap Labor and Outsourcing

The market is saturated locally and establishment of production facilities in a third country could meet the local demand in such country and this unit could act as a hub for export of such products to other countries.... ?? (Musil, 2012) But for the cheap labor available in the thickly populated countries like China, India and Indonesia there is no other justification for shifting or creating new facilities in these countries by the American companies....
12 Pages (3000 words) Research Paper

Ethical Analysis of Snowdengate

In the United States, Wikipedia has filed a lawsuit against the NSA for violation of privacy and proper targeting (Stiles, 2015).... Wikipedia asserts that the NSA discourages free speech for the users of the popular free-knowledge product (Stiles, 2015).... Retrieved April 8th, 2015, from PRI: http://www.... Retrieved April 8th, 2015, from Huffington Post: http://www.... Retrieved April 8th, 2015, from The Daily Beast: http://www....
1 Pages (250 words) Research Paper

Strategy Management - Microsoft Nokia, Apple Incorporation

Due to increasing opportunities and the growth prosperity, many new ventures are getting established into the industry driven with the objective of profit maximization.... Nevertheless,.... ... ... The paper 'Strategy Management - Microsoft Nokia, Apple Incorporation" is a great example of a management case study....
14 Pages (3500 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us