House of Representatives Committees


| Parliamentary Joint Committee on Intelligence and Security

Footnotes

Preliminary Pages

[1]       All definitions are drawn from Attorney-General’s Department, Equipping Australia Against Emerging and Evolving Threats, July 2012; and UK Intelligence and Security Committee, Access to Communications Data by the Intelligence and Security Agencies, UK Parliament, February 2013.

Chapter 1 Introduction

[1]       Attorney-General’s Department, Equipping Australia against emerging and evolving threats, Discussion Paper, July 2012, p. 12.

[2]       Attorney-General’s Department, Equipping Australia against emerging and evolving threats, Discussion Paper, July 2012, p. 22.

[3]       Attorney-General’s Department, Equipping Australia against emerging and evolving threats, Discussion Paper, July 2012, p. 29.

[4]       Attorney-General’s Department, Equipping Australia against emerging and evolving threats, Discussion Paper, July 2012, p. 29. An externality refers to a cost or benefit that accrues to actors which are not directly involved in a transaction.

[5]       On 3 May 2013 the Government announced its intention to rename the DSD and DIGO as the Australian Signals Directorate (ASD) and the Australian Geospatial-Intelligence Organisation (AGO) respectively. <http://www.minister.defence.gov.au/2013/05/03/prime-minister-and-minister-for-defence-joint-media-release-2013-defence-white-paper-renaming-the-defence-signals-directorate-and-the-defence-imagery-and-geospatial-organisation/>, viewed on 6 May 2013.

[6]       Attorney-General’s Department, Equipping Australia against emerging and evolving threats, Discussion Paper, July 2012, p. 40.

[7]       Attorney-General’s Department, Equipping Australia against emerging and evolving threats, Discussion Paper, July 2012, p. 40.

Chapter 2 Telecommunications Interception

[1]       Attorney-General’s Department, Equipping Australia against emerging and evolving threats, Discussion Paper, July 2012, p. 12.

[2]       Attorney-General’s Department, Equipping Australia against emerging and evolving threats, Discussion Paper, July 2012, p. 12.

[3]       Attorney-General’s Department, Equipping Australia against emerging and evolving threats, Discussion Paper, July 2012, p. 22.

[4]       Attorney-General’s Department, Submission No. 218, pp. 2-3

[5]       Attorney-General’s Department, Equipping Australia against emerging and evolving threats, Discussion Paper, July 2012, pp. 7-8.

[6]       Attorney-General’s Department, Equipping Australia against emerging and evolving threats, Discussion Paper, July 2012, p. 12.

[7]       Western Australia Police, Submission No. 203, p. 6.

[8]       Law Council of Australia, Submission No. 96, pp. 21-2.

[9]       NSW Council for Civil Liberties, Submission No. 175, p. 15.

[10]     Privacy Victoria, Submission No. 109, p. 3.

[11]     Office of the Australian Information Commissioner, Submission No. 183, pp. 1-2.

[12]     Western Australian Corruption and Crime Commission, Submission No. 156, p. 4.

[13]     Privacy Victoria, Submission No. 109, p. 1.

[14]     Attorney-General’s Department, Submission No. 218, Attachment A p. 1.

[15]     Mr Bernard Keane, Submission No. 117, p. 3.  See also Mr Robert Batten, Submission No. 50, p. 3; Mr Ian Quick, Submission No. 95, p. 4.

[16]     Law Council of Australia, Submission No. 96, p. 23.

[17]     Australian Federal Police, Submission No. 163, p. 8.

[18]     Australian Federal Police, Submission No. 163, p. 8.

[19]     Western Australia Police, Submission No. 203, p. 6. See also: Western Australian Corruption and Crime Commission, Submission No. 156, pp. 4-5.

[20]     Human Rights Law Centre, Submission No. 140, pp. 2-3.

[21]     Attorney-General’s Department, Equipping Australia against emerging and evolving threats, Discussion Paper, July 2012, p. 26.

[22]     Attorney-General’s Department, Equipping Australia against emerging and evolving threats, Discussion Paper, July 2012, p. 26.

[23]     Attorney-General’s Department, Equipping Australia against emerging and evolving threats, Discussion Paper, July 2012, p. 26.

[24]     Mr Bernard Keane, Submission No. 117, p. 3.  See also Electronic Frontiers Australia, Submission No. 121, pp. 12-13

[25]     Australian Federal Police, Submission No. 163, p. 9.

[26]     Australian Federal Police, Submission No. 163, p. 9.

[27]     Western Australia Corruption and Crime Commission, Submission No. 156, p. 5.  See also Western Australia Police, Submission No. 203, pp. 6-7.

[28]     Law Council of Australia, Submission No. 96, p. 48.

[29]     Law Council of Australia, Submission No. 96, p. 48.

[30]     See for example, Inspector-General of Intelligence and Security, Submission No. 185, p. 8.

[31]     Attorney-General’s Department, Equipping Australia against emerging and evolving threats, Discussion Paper, July 2012, p. 26.

[32]     Attorney-General’s Department, Equipping Australia against emerging and evolving threats, Discussion Paper, July 2012, p. 26.

[33]     Western Australia Police, Submission No. 203, p. 7.

[34]     Telstra, Submission No. 189, p. 6.

[35]     Office of the Australian Information Commissioner, Submission No. 183, p. 12.

[36]     Law Council of Australia, Submission No. 96, p. 50.

[37]     Attorney-General’s Department, Equipping Australia against emerging and evolving threats, Discussion Paper, July 2012, pp. 8, 9.

[38]     Attorney-General’s Department, Equipping Australia against emerging and evolving threats, Discussion Paper, July 2012, p. 24.

[39]     Ms Stella Gray, Submission No. 152, p. 7.

[40]     Liberty Victoria, Submission No. 143, p. 6.  See also Mr Bernard Keane, Submission No. 117, pp. 3-4; Senator Scott Ludlam, Submission No. 146, p. 3; Mr Ian Quick, Submission No. 95, p. 5.

[41]     Attorney-General’s Department, Submission No. 218, p. 9.

[42]     Telecommunications (Interception and Access) Act 1979 Annual Report 2010-11, pp. 62-5.

[43]     Ms Irene Graham, Submission No. 135, p. 5.

[44]     Telstra, Submission No. 189, p. 6.

[45]     Australian Mobile Telecommunications Association – Communications Alliance, Submission No. 114, p. 7.

[46]     Attorney-General’s Department, Submission No. 218, p. 5.

[47]     Liberty Victoria, Submission No. 143, p. 2.  See also Mr Bernard Keane, Submission No. 117, p. 4; Electronic Frontiers Australia, Submission No. 121, p. 13; Pirate Party Australia, Submission No. 134, p. 12; and Ms Stella Gray, Submission No. 152, p. 8.

[48]     Victoria Police, Submission No. 200, p. 7.

[49]     Western Australia Police, Submission No. 203, p. 8.

[50]     Australian Competition and Consumer Commission, Submission No. 192, p. 5.

[51]     Law Council of Australia, Submission No. 96, p. 30.

[52]     Inspector-General of Intelligence and Security, Submission No. 185, p. 9.

[53]     Australian Federal Police, Submission No. 163, pp. 9-10.

[54]     Attorney-General’s Department, Equipping Australia against emerging and evolving threats, Discussion Paper, July 2012, p. 23.

[55]     Telecommunications (Interception and Access) Act 1979 Annual Report 2010-11, pp. 42, 44-5.

[56]     Detective Inspector Gavan Seagrave, Transcript, 5 September 2012, pp. 29-30.

[57]     Australian Federal Police, Submission No. 163, pp. 12-13.

[58]     WA Corruption and Crime Commission, Submission No. 156, p. 10.

[59]     Law Council of Australia, Submission No. 96, p. 31

[60]     Liberty Victoria, Submission No. 143, p. 3.

[61]     Mr Daniel Judge, Submission No. 157, p. 9.  See also J Trevaskis, Submission No. 62, p. 8; Mr Mark Newton, Submission No. 87, p. 9, and James (no further details), Submission No. 7.

[62]     Attorney-General’s Department, Submission No. 218, Attachment A p. 1

[63]     Inspector-General of Intelligence and Security, Submission No. 185, pp. 11-12.

[64]     Attorney-General’s Department, Equipping Australia against emerging and evolving threats, Discussion Paper, July 2012, pp. 8-9.

[65]     Attorney-General’s Department, Equipping Australia against emerging and evolving threats, Discussion Paper, July 2012, p. 25.

[66]     Commissioner Andrew Scipione, Transcript, 26 September 2012, pp. 17-18.  See also Western Australia Police, Submission No. 156, p. 6.

[67]     Commissioner Andrew Scipione, Transcript, 26 September 2012, p. 25.

[68]     Victoria Police, Submission No. 200, p. 11.  See also Western Australia Police, Submission No. 203, p. 9.

[69]     Liberty Victoria, Submission No. 143, pp. 8-9.

[70]     Ms Stella Gray, Submission No. 152, p. 7.

[71]     Mr Bernard Keane, Submission No. 117, p. 4.

[72]     Pirate Party Australia, Submission No. 134, p. 13.

[73]     Australian Federal Police, Submission No. 163, p. 10. See also: Australian Customs and Border Protection Service, Submission No. 168, p. 3.

[74]     Office of the Australian Information Commissioner, Submission No. 183, pp. 10-11.

[75]     Mr Mark Newton, Submission No. 87, p. 7.

[76]     Law Council of Australia, Submission No. 96, p. 46.

[77]     Law Council of Australia, Submission No. 96, p. 47.

[78]     Attorney-General’s Department, Equipping Australia against emerging and evolving threats, Discussion Paper, July 2012, p. 17

[79]     Attorney-General’s Department, Submission No. 236, p. 18.

[80]     Attorney-General’s Department, Submission No. 236, p. 18.

[81]     Attorney-General’s Department, Submission No. 236, p. 18.

[82]     Attorney-General’s Department, Submission No. 218, p. 5.

[83]     Victoria Police, Submission No. 200, p. 13.

[84]     Western Australia Police, Submission No. 203, p. 11.

[85]     Australian Mobile Telecommunications Association – Communications Alliance, Submission No. 114, p. 10.

[86]     iiNet, Submission No. 108, p. 10.

[87]     Western Australia Corruption and Crime Commission, Submission 156, p. 8.

[88]     Pirate Party, Submission No. 134, p. 15.

[89]     Tasmanian Association of Community Legal Centres, Submission No. 184, pp. 2-3.

[90]     Inspector-General of Intelligence and Security, Submission No. 185, pp. 9, 10.

[91]     Gilbert + Tobin Centre for Public Law, Submission No. 36, p. 9.

[92]     Law Council of Australia, Submission No. 96, p. 53.

[93]     Attorney-General’s Department, Equipping Australia against emerging and evolving threats, Discussion Paper, July 2012, p. 13.

[94]     Attorney-General’s Department, Equipping Australia against emerging and evolving threats, Discussion Paper, July 2012, p. 28.

[95]     Attorney-General’s Department, Submission No. 236, p. 19.

[96]     Attorney-General’s Department, Submission No. 236, p. 19.

[97]     Attorney-General’s Department, Submission No. 236, p. 19.

[98]     Australian Communications and Media Authority website, <www.acma.gov.au>, viewed 7 June 2013.

[99]     Attorney-General’s Department, Equipping Australia against emerging and evolving threats, Discussion Paper, July 2012, p. 28.

[100]   Telstra, Submission No. 189, p. 7

[101]   Mr Ian Quick, Submission No. 95, p. 7.

[102]   Mr Bernard Keane, Submission No. 117, p. 5.

[103]   Attorney-General’s Department, Equipping Australia against emerging and evolving threats, Discussion Paper, July 2012, p. 27.

[104]   Australian Mobile Telecommunications Association – Communications Alliance, Submission No. 114, p. 10.

[105]   iiNet, Submission No. 108, pp. 10-11.

[106]   Western Australia Corruption and Crime Commission, Submission No. 156, p. 8.

[107]   Commissioner Scipione, Transcript, 26 September 2012, p. 18.

[108]   Western Australia Police, Submission No. 203, pp. 11-12.

[109]   Victoria Police, Submission No. 200, p. 14

[110]   Attorney-General’s Department, Equipping Australia against emerging and evolving threats, Discussion Paper, July 2012, p. 28.

[111]   Ms Stella Gray, Submission No. 152, p. 6.

[112]   iiNet, Submission No. 108, p. 11

[113]   Australian Mobile Telecommunications Association – Communications Alliance, Submission No. 114, p. 11.

[114]   Australian Mobile Telecommunications Association – Communications Alliance, Submission No. 114, p. 12.

[115]   Telstra, Submission No. 189, p. 9.

[116]   Mr James Shaw, Transcript, 27 September 2012, p. 2.

[117]   Mr Mark Newton, Submission No. 87, p. 9.

[118]   Attorney-General’s Department, Submission No. 218, pp. 6-7.

[119]   Australian Mobile Telecommunications Association – Communications Alliance, Submission No. 114, p. 12.  See also Mr James Sinnamon, Submission No. 100, p. 1; Privacy Victoria, Submission No. 109, p. 6; Mr Arved von Brasch, Submission No. 126, p. 3.

[120]   Commissioner Tony Negus, Transcript, 26 September 2012, p. 28.

[121]   Australian Federal Police, Submission No. 163, pp. 14-15.

[122]   Queensland Crime and Misconduct Commission, Submission No. 147, p. 7.  See also Western Australia Corruption and Crime Commission, Submission No. 156, p. 10; Victoria Police, Submission No. 200, p. 15, Western Australia Police, Submission No. 203, p. 13.

[123]   Electronic Frontiers Australia, Submission No. 121, p. 15

[124]   Human Rights Law Centre, Submission No. 140, p. 11. See also, Mr Breheny, Transcript, 5 September 2012, p. 45; Mr Bernard Keane, Submission No. 117, p. 12.

[125]   Mr Ian Quick, Submission No. 95, p. 13.

[126]   Law Council of Australia, Submission No. 96, p. 36.

[127]   Western Australia Police, Submission No. 203, p. 13. See also: Western Australia Corruption and Crime Commission, Submission No. 156, pp. 10-11.

[128]   Optus, Submission No. 206, p. 2.

[129]   Australian Mobile Telecommunications Association – Communications Alliance, Submission No. 114, p. 13.

[130]   iiNet, Submission No. 108, p. 12.

[131]   Telstra, Submission No. 189, p. 10.

[132]   Western Australia Police, Submission No. 203, p. 9.

[133]   Attorney-General’s Department, Submission No. 218, pp. 2-3

[134]   Privacy Victoria, Submission No. 109, p. 2

Chapter 3 Telecommunications security

[1]       Attorney-General’s Department, Equipping Australia against emerging and evolving threats, Discussion Paper, July 2012, p. 29.

[2]       Attorney-General’s Department, Equipping Australia against emerging and evolving threats, Discussion Paper, July 2012, p. 29. An externality refers to a cost or benefit that accrues to actors which are not directly involved in a transaction.

[3]       Attorney-General’s Department, Equipping Australia against emerging and evolving threats, Discussion Paper, July 2012, p. 30.

[4]       Attorney-General’s Department, Equipping Australia against emerging and evolving threats, Discussion Paper, July 2012, p. 32.

[5]       Ian Dudgeon, ‘Cyber-Security: the importance of partnerships’, Regional Security Outlook 2013, Council for Security Cooperation in the Asia-Pacfic, p. 9.

[6]       Ian Dudgeon, ‘Cyber-Security: the importance of partnerships’, Regional Security Outlook 2013, Council for Security Cooperation in the Asia-Pacfic, p. 10.

[7]       Ian Dudgeon, ‘Cyber-Security: the importance of partnerships’, Regional Security Outlook 2013, Council for Security Cooperation in the Asia-Pacfic, p. 10.

[8]       Attorney-General’s Department, Equipping Australia against emerging and evolving threats, Discussion Paper, July 2012, p. 29.

[9]       Attorney-General’s Department, Equipping Australia against emerging and evolving threats, Discussion Paper, July 2012, p. 34.

[10]     Attorney-General’s Department, Equipping Australia against emerging and evolving threats, Discussion Paper, July 2012, pp. 29-30.

[11]     Mr Mark Newton, Submission No. 87, p. 10.

[12]     Mr Daniel Black, Submission No. 97, p. 7.

[13]     Mr Matthew John Healy, National Executive, Industry and Policy, Macquarie Telecom, Transcript, 5 September 2012, pp. 11 -12.

[14]     Macquarie Telecom, Submission No. 115, pp. 2-3.

[15]     Mr Timothy Pilgrim, Privacy Commissioner, Office of the Australian Information Commissioner, Submission No. 183, p. 16.

[16]     Optus, Submission No. 206, p. 3.

[17]     Optus, Submission No. 206, p .3.

[18]     Attorney-General’s Department, Equipping Australia against emerging and evolving threats, Discussion Paper, July 2012, p. 35.

[19]     Attorney-General’s Department, Equipping Australia against emerging and evolving threats, Discussion Paper, July 2012, p. 36.

[20]     Optus, Submission No. 206, p. 3.

[21]     Australian Mobile Telecommunications Association and Communications Alliance, Submission No. 114, p. 17; see also: Huawei Technologies (Australia) Pty Limited, Submission No. 149, p. 11.

[22]     Mr Timothy Pilgrim, Privacy Commissioner, Office of the Australian Information Commissioner, Submission No. 183, p. 16.

[23]     Australian Mobile Telecommunications Association and Communications Alliance, Submission No. 114, p. 17.

[24]     Attorney-General’s Department, Equipping Australia against emerging and evolving threats, Discussion Paper, July 2012, p. 36.

[25]     Mr Mark Newton, Submission no. 87, p. 10.

[26]     Telecommunications (Interception and Access) Act 1979, section 202.

[27]     Macquarie Telecom, Submission No. 115, p. 2.

[28]     Vodafone Hutchison Australia, Submission No. 113, p.2; see also:  Optus, Submission no. 206, p. 3, Cisco Systems Australia Pty Limited, Submission No. 112, p. 2; and Huawei Technologies (Australia) Pty Limited, Submission No. 149, p. 12.

[29]     Australian Mobile Telecommunications Association and Communications Alliance, Submission No. 114, p. 18; see also: Telstra, Submission no. 189, p. 12.

[30]     Telstra, Submission No. 189, pp. 12-13.

[31]     Attorney-General’s Department, Equipping Australia against emerging and evolving threats, Discussion Paper, July 2012, p. 37.

[32]     Australian Mobile Telecommunications Association and Communications Alliance, Submission No. 114, p. 19.

[33]     Telstra, Submission No. 189, p. 13.

[34]     Australian Mobile Telecommunications Association and Communications Alliance, Submission No. 114, p. 18.

[35]     Australian Mobile Telecommunications Association and Communications Alliance, Submission No. 114, pp. 18-19.

[36]     Office of Australian Information Commissioner, Submission No. 183, p. 20.

[37]     Australian Mobile Telecommunications Association and Communications Alliance, Submission No. 114, p. 19.

[38]     Senetas, Submission No. 237, p. 1.

[39]     Huawei Technologies (Australia) Pty Limited, Submission No. 149, p. 15.

[40]     Mr Timothy Pilgrim, Privacy Commissioner, Office of the Australian Information Commissioner, Submission No. 183, p. 16.

Chapter 4 Australian Intelligence Community Legislation Reform

[1]       Attorney-General’s Department, Equipping Australia against emerging and evolving threats, Discussion Paper, July 2012, p. 40.

[2]       Attorney-General’s Department, Equipping Australia against emerging and evolving threats, Discussion Paper, July 2012, p. 40.

[3]       Attorney-General’s Department, Equipping Australia against emerging and evolving threats, Discussion Paper, July 2012, p. 39.

[4]       Attorney-General’s Department, Equipping Australia against emerging and evolving threats, Discussion Paper, July 2012, p. 39.

[5]       Mr Ian Quick, Submission No. 95, p. 8.

[6]       Mr Ian Quick, Submission No. 95, p. 8.

[7]       Inspector-General of Intelligence and Security, Submission No. 185, p. 14.

[8]       Gilbert + Tobin Centre of Public Law, Submission No. 36, p. 11.

[9]       Australian Privacy Foundation, Submission No. 162, p. 9.

[10]     Attorney-General’s Department, Equipping Australia against emerging and evolving threats, Discussion Paper, July 2012, p. 48.

[11]     Law Council of Australia, Submission No. 96, p. 66.

[12]     Inspector-General of Intelligence and Security, Submission No. 185, p. 20.

[13]     Attorney-General’s Department, Submission No. 236, p. 2.

[14]     Australian Mobile Telecommunications Association and Communications Alliance, Submission no. 114, p. 20.

[15]     Telstra, Submission No. 189, p. 14; see also: Mr Evan Slatyer, Submission No. 131, p. 1.

[16]     Mr Robert Batten, Submission No. 50, p. 10; see also Internet Society of Australia, Submission No. 145, p. 3.

[17]     Inspector-General of Intelligence and Security, Submission No. 185, p. 20.

[18]     Attorney-General’s Department, Equipping Australia against emerging and evolving threats, Discussion Paper, July 2012, p. 50.

[19]     Attorney-General’s Department, Equipping Australia against emerging and evolving threats, Discussion Paper, July 2012, p. 50.

[20]     Liberty Victoria, Submission No. 143, p. 3; see also: Mr Daniel Judge, Submission No. 157, p. 13; Ms Stella Gray, Submission No. 152, pp. 11-12; see also: New South Wales Young Lawyers, Submission No. 133, p. 8.

[21]     Office of the Victorian Privacy Commissioner, Submission No. 109, p. 6.

[22]     Dr Anthony Bendall, Acting Privacy Commissioner, Office of the Victorian Privacy Commissioner, Transcript, Melbourne, 5 September 2012.

[23]     Attorney-General’s Department, Submission No. 236, p. 1.

[24]     Inspector-General of Intelligence and Security, Submission No. 185, p. 21.

[25]     Attorney-General’s Department, Submission No. 236, p. 1.

[26]     Mr Johann Trevaskis, Submission No.62, p. 11.

[27]     Liberty Victoria, Submission No. 143, p. 3.

[28]     Inspector-General of Intelligence and Security, Submission No. 185, p. 3.

[29]     Attorney-General’s Department, Equipping Australia against emerging and evolving threats, Discussion Paper, July 2012, p. 41.

[30]     New South Wales Young Lawyers, Submission No. 133, p. 7; see also: Law Council of Australia, Submission No. 96, p. 67.

[31]     Law Council of Australia, Submission No. 96, p. 67; see also: New South Wales Young Lawyers, Submission No. 133, p. 6.

[32]     Attorney-General’s Department, Submission No. 236, p. 5.

[33]     Office of the Victorian Privacy Commissioner, Submission No. 109, p. 4; see also:  Ms Stella Gray, Submission No. 152, p. 9.

[34]     Attorney-General’s Department, Submission No. 236, p. 5.

[35]     Attorney-General’s Department, Equipping Australia against emerging and evolving threats, Discussion Paper, July 2012, p41, p. 42.

[36]     Castan Centre for Human Rights Law, Submission No. 142, p. 4.

[37]     Mr Daniel Nazer, Submission No. 110, p. 7.

[38]     Attorney-General’s Department, Submission No. 236, p. 3.

[39]     Inspector-General of Intelligence and Security, Submission No. 185, p. 15.

[40]     Inspector-General of Intelligence and Security, Submission No. 185, p. 15.

[41]     Inspector-General of Intelligence and Security, Submission No. 185, p. 15.

[42]     Attorney-General’s Department, Submission No. 236, p. 3.

[43]     Attorney-General’s Department, Equipping Australia against emerging and evolving threats, Discussion Paper, July 2012, p. 42.

[44]     Liberty Victoria, Submission No. 143, p. 10; see also: Castan Centre for Human Rights Law, Submission No. 142, p. 4; Mr M Newton, Submission No. 87, p. 11.

[45]     Inspector-General of Intelligence and Security, Submission No. 185, p. 15.

[46]     Gilbert + Tobin Centre of Public Law, Submission No. 36, pp. 13-14.

[47]     Attorney-General’s Department, Submission No. 236, p. 4.

[48]     Attorney-General’s Department, Submission No. 236, p. 4.

[49]     Attorney-General’s Department, Equipping Australia against emerging and evolving threats, Discussion Paper, July 2012, p. 43.

[50]     Attorney-General’s Department, Equipping Australia against emerging and evolving threats, Discussion Paper, July 2012, p. 43.

[51]     Inspector-General of Intelligence and Security, Submission No. 185, p. 16.

[52]     Attorney-General’s Department, Equipping Australia against emerging and evolving threats, Discussion Paper, July 2012, p. 41.

[53]     Attorney-General’s Department, Equipping Australia against emerging and evolving threats, Discussion Paper, July 2012, p. 45.

[54]     Attorney-General’s Department, Equipping Australia against emerging and evolving threats, Discussion Paper, July 2012, p. 45.

[55]     Ms Stella Gray, Submission No. 152, p. 10. 

[56]     Attorney-General’s Department, Equipping Australia against emerging and evolving threats, Discussion Paper, July 2012, p. 45.

[57]     Inspector-General of Intelligence and Security, Submission No. 185, p. 23.

[58]     Attorney-General’s Department, Equipping Australia against emerging and evolving threats, Discussion Paper, July 2012, p. 46.

[59]     AFP, Controlled Operations annual Report 2010-2011, viewed 12 November 2012, <www.afp.gov.au/media-centre/publications/~/media/afp/html/controlled-operations-annual-report-2010-2011.ashx>.

[60]     Attorney-General’s Department, Equipping Australia against emerging and evolving threats, Discussion Paper, July 2012, p. 46.

[61]     Attorney-General’s Department, Equipping Australia against emerging and evolving threats, Discussion Paper, July 2012, pp. 46-47.

[62]     Dr Patrick Emerton, Castan Centre for Human Rights Law, Transcript, Melbourne, 5 September 2012,  p. 21; see also NSW Council for Civil Liberties, Submission No. 175, p. 13;  Law Council of Australia, Submission No. 96, p. 58.

[63]     Inspector-General of Intelligence and Security, Submission No. 185, p. 18.

[64]     Attorney-General’s Department, Submission No. 236, p. 6.

[65]     Gilbert + Tobin Centre of Public Law, Submission No. 36, p. 16.

[66]     Attorney-General’s Department, Submission No. 236, p. 6.

[67]     Attorney-General’s Department, Equipping Australia against emerging and evolving threats, Discussion Paper, July 2012, p. 45.

[68]     Castan Centre for Human Rights Law, Submission No. 142, p. 4.

[69]     Attorney-General’s Department, Submission No. 236, p. 11.

[70]     Law Council of Australia, Submission No. 96, p. 70.

[71]     Attorney-General’s Department, Submission No. 236, p. 11.

[72]     Inspector-General of Intelligence and Security, Submission No. 185, p. 19.

[73]     Attorney-General’s Department, Submission No. 236, p. 11.

[74]     Attorney-General’s Department, Submission No. 236, p. 9.

[75]     Inspector-General of Intelligence and Security, Submission No. 185, p. 20.

[76]     Attorney-General’s Department, Equipping Australia against emerging and evolving threats, Discussion Paper, July 2012, p. 48.

[77]     Attorney-General’s Department, Equipping Australia against emerging and evolving threats, Discussion Paper, July 2012, p. 48.

[78]     Attorney-General’s Department, Submission No. 236, p. 10.

[79]     Attorney-General’s Department, Equipping Australia against emerging and evolving threats, Discussion Paper, July 2012, p. 48.

[80]     Inspector-General of Intelligence and Security, Submission No. 185, p. 20

[81]     Office of the Victorian Privacy Commissioner, Submission No. 109, p. 5.

[82]     Attorney-General’s Department, Submission No. 236, p. 10.

[83]     Liberty Victoria, Submission No. 143, p. 12.

[84]     Castan Centre for Human Rights Law, Submission No. 142, pp.4-5; see also: Law Council of Australia, Submission No. 96, p. 58.

[85]     Gilbert + Tobin Centre of Public Law, Submission No. 36, p. 13.  See also: Tasmanian Association of Community Legal Centres, Submission No. 184, p. 4.

[86]     Attorney-General’s Department, Submission No. 236, p. 10.

[87]     Attorney-General’s Department, Equipping Australia against emerging and evolving threats, Discussion Paper, July 2012, p. 49.

[88]     Attorney-General’s Department, Equipping Australia against emerging and evolving threats, Discussion Paper, July 2012, p. 49.

[89]     Mr Mark Newton, Submission No. 87, p. 12.

[90]     Law Council of Australia, Submission No. 96, p. 73; see also: New South Wales Young Lawyers, Submission No. 133, p. 9.

[91]     Inspector-General of Intelligence and Security, Submission No. 185, p. 21.

[92]     Telstra, Submission No. 189, p. 14.

[93]     Attorney-General’s Department, Equipping Australia against emerging and evolving threats, Discussion Paper, July 2012, p. 49.

[94]     Australian Privacy Foundation, Submission No. 162, p. 10.

[95]     Mr Ian Quick, Submission No. 95, p. 12.

[96]     Inspector-General of Intelligence and Security, Submission No. 185, p. 21

[97]     Ms Stella Gray, Submission No. 152, p. 8.

[98]     Mr Mark Newton, Submission No. 87, p. 12.

[99]     Attorney-General’s Department, Equipping Australia against emerging and evolving threats, Discussion Paper, July 2012, p. 48.

[100]   Mr Mark Newton, Submission No.87, p. 13.  See also:  Office of the Victorian Privacy Commissioner, Submission No. 109, p. 6.

[101]   New South Wales Young Lawyers, Submission No. 133, p. 8.

[102]   Office of the Victorian Privacy Commissioner, Submission No. 109, p. 6.

[103]   Attorney-General’s Department, Submission No. 236, p. 8.

[104]   Attorney-General’s Department, Submission No. 236, p. 8.

[105]   Attorney-General’s Department, Equipping Australia against emerging and evolving threats, Discussion Paper, July 2012, p. 48.

[106]   Attorney-General’s Department, Submission No. 236, p. 12.

[107]   Human Rights Law Centre, Submission No. 140, p. 8.

[108]   Human Rights Law Centre, Submission No. 140, p. 8.

[109]   Attorney-General’s Department, Submission No. 236, p. 12.

[110]   Gilbert + Tobin Centre of Public Law, Submission No. 36, p. 15.  See also:  New South Wales Young Lawyers, Submission No. 133, p. 13 and NSW Council for Civil Liberties, Submission No. 175, p. 17.

[111]   New South Wales Young Lawyers, Submission No. 133, p. 13;  See also:  Gilbert + Tobin Centre of Public Law, Submission No. 36, p. 15  and NSW Council for Civil Liberties, Submission No. 175, p. 17.

[112]   Attorney-General’s Department, Equipping Australia against emerging and evolving threats, Discussion Paper, July 2012, p. 52.

[113]   Gilbert + Tobin Centre of Public Law, Submission No. 36, pp. 19–20. 

[114]   Australian Secret Intelligence Service, Submission No. 219, p. 3.

[115]   Australian Secret Intelligence Service, Submission No. 219, p. 3.

[116]   Attorney-General’s Department, Equipping Australia against emerging and evolving threats, Discussion Paper, July 2012, p. 51.

[117]   Gilbert + Tobin Centre of Public Law, Submission No. 36, pp. 20-21.

[118]   Inspector-General of Intelligence and Security, Submission No. 185, p. 24.

[119]   Australian Secret Intelligence Service, Submission No. 219, p. 1.

[120]   Attorney-General’s Department, Equipping Australia against emerging and evolving threats, Discussion Paper, July 2012, p. 54.

[121]   Pirate Party Australia, Submission No. 134, p. 31.

[122]   Human Rights Law Centre, Submission No. 140, p. 8.

[123]   Australian Secret Intelligence Service, Submission No. 219, p. 3.

[124]   Inspector-General of Intelligence and Security, Submission No. 185, p. 25.

Chapter 5 Data Retention

[1]       Attorney-General’s Department, Equipping Australia Against Emerging and Evolving Threats, July 2012, p. 13.

[2]       Attorney-General’s Department, Equipping Australia Against Emerging and Evolving Threats, July 2012, p. 13.

[3]       Attorney-General’s Department, Equipping Australia Against Emerging and Evolving Threats, July 2012, p. 14.

[4]       Attorney-General’s Department, Equipping Australia Against Emerging and Evolving Threats, July 2012, p. 21.

[5]       Attorney-General’s Department, Equipping Australia Against Emerging and Evolving Threats, July 2012, p. 21.

[6]       Letter from Attorney-General Nicola Roxon to the Hon Anthony Byrne MP, 17 September 2012, Appendix F.

[7]       Letter from Attorney-General Nicola Roxon to the Hon Anthony Byrne MP, 17 September 2012, Appendix F.

[8]       A letter from the Secretary of AGD, Mr Roger Wilkins AO, clarifying the data set can be found at Appendix G.

[9]       Attorney-General, Telecommunications (Interception and Access) Act: Report for the year ending June 2011, Commonwealth of Australia, 2011, p. 10.

[10]     Attorney-General, Telecommunications (Interception and Access) Act: Report for the year ending June 2011, Commonwealth of Australia, 2011, p. 10.

[11]     Attorney-General, Telecommunications (Interception and Access) Act: Report for the year ending June 2011,  Commonwealth of Australia, 2011, p. 11.

[12]     Attorney-General, Telecommunications (Interception and Access) Act: Report for the year ending June 2011,  Commonwealth of Australia, 2011, p. 11.

[13]     TIA Act, Part 4-1.

[14]     TIA Act, Part 4-1.

[15]     TIA Act, Part 4-1.

[16]     See Blueprint for Free Speech, Submission No. 165; Law Council, Submission No. 96; Pirate Party of Australia, Submission No. 134; Human Rights Law Centre, Submission No. 140.

[17]     European Union Data Retention Directive 2006/24/EC.

[18]     Law Council, Submission No. 224, p. 6.

[19]     Law Council, Submission No. 224, p. 6.

[20]     Law Council, Submission No. 224, p. 7.

[21]     Law Council, Submission No. 224, p. 9.

[22]     Law Council, Submission No. 224, pp. 9-10.

[23]     Law Council, Submission No. 224, p. 10.

[24]     Law Council, Submission No. 224, p. 10.

[25]     Law Council, Submission No. 96, p. 38.

[26]     NSW Young Lawyers, Submission No. 133, p. 10.

[27]     AMTA and Communications Alliance, Submission No. 114, p. 14.

[28]     UK Home Office, Explanatory Memorandum to the Data Retention (EC Directive) Regulations 2009, pp. 1-2.

[29]     Draft Communications Data Bill 2012, United Kingdom.

[30]     Joint Committee on the Draft Communications Data Bill, UK Parliament, Draft Communications Data Bill, December 2012, p. 24.

[31]     UK Intelligence and Security Committee, Press release, 11 December 2012, viewed 18 December 2012, <http://isc.independent.gov.uk/news-archive/11december2012>.

[32]     UK Intelligence and Security Committee, Access to Communications Data by Intelligence and Security Agencies, UK Parliament, February 2013.

[33]     Joint Committee on the Draft Communications Data Bill, UK Parliament, Draft Communications Data Bill, December 2012, p. 74, viewed 18 December 2012, <www.parliament.uk/business/committees/committees-a-z/joint-select/draft-communications-bill/publications/>.

[34]     Law Council of Australia, Submission No. 96, p. 37.

[35]     Institute of Public Affairs, Submission No. 139, p. 4.

[36]     Institute of Public Affairs, Submission No. 139, p. 3.

[37]     Blueprint for Free Speech, Submission No. 165, p. 6.

[38]     Pirate Party, Submission No. 134, p. 26.

[39]     Human Rights Law Centre, Submission No. 140, p. 7.

[40]     Mr Daniel Nazer, Submission No. 110, p. 4

[41]     Mr Daniel Nazer, Submission No. 110, p. 4

[42]     Liberty Victoria, Submission No. 143, p. 5.

[43]     Liberty Victoria, Submission No. 143, p. 2.

[44]     Liberty Victoria, Submission No. 143, p. 6.

[45]     NSW Council for Civil Liberties, Submission No. 175, p. 16.

[46]     Australian Digital Media Industry Association, Submission No. 198, p. 4.

[47]     Ms Stella Gray, Submission No. 152, p. 6.

[48]     Senator Scott Ludlam, Submission No. 146, p. 26

[49]     Institute of Public Affairs, Submission No. 139, p. 3.

[50]     Victorian Privacy Commissioner, Submission No. 109, p. 7.

[51]     Dr Bendall, Transcript, 5 September 2012, p. 1.

[52]     Law Council of Australia, Submission No. 96, p. 39.

[53]     NSW Council for Civil Liberties, Submission No. 175, p. 16.

[54]     Senator Scott Ludlam, Submission No. 146, p. 2.

[55]     Senator Scott Ludlam, Submission No. 146, p. 2.

[56]     Senator Scott Ludlam, Submission No. 146, p. 2.

[57]     Law Council of Australia, Submission No. 96, p. 37

[58]     Law Council of Australia, Submission No. 96, p. 39.

[59]     iiNet, Submission No. 108, p. 12.

[60]     AMTA and Communications Alliance, Submission No. 114, p. 16.

[61]    Mr Bernard Keane, Submission No. 117, p. 13.

[62]     Mr Bernard Keane, Submission No. 117, p. 14.

[63]     Mr Ian Quick, Submission No. 95, p. 14.

[64]     Electronic Frontiers Australia, Submission No. 121, p. 5.

[65]     Electronic Frontiers Australia, Submission No. 121, p. 6.

[66]     Mr Adrian Gasparini, Submission No. 88, p. 1.

[67]     Mr Daniel Judge, Submission No. 157, p. 11.

[68]     Electronic Frontiers Australia, Submission No. 121, p. 5.

[69]     Mr Dalby, Transcript, 27 September 2012, p. 48.

[70]     Ms Budavari, Transcript, 14 September 2012, p. 14.

[71]     Electronic Frontiers Australia, Submission No. 121, p. 5.

[72]     Electronic Frontiers Australia, Submission No. 121, p. 6.

[73]     Dr James Dowty, Submission No. 35, p. 1.

[74]     Pirate Party, Submission No. 134, p. 26.

[75]     Blueprint for Free Speech, Submission No. 165, p. 6.

[76]     Blueprint for Free Speech, Submission No. 165, p. 1.

[77]     Blueprint for Free Speech, Submission No. 165, p. 6.

[78]     Blueprint for Free Speech, Submission No. 165, p. 1.

[79]     Dr Bendall, Transcript, 5 September 2012, p. 3.

[80]     Mr James C. McPherson, Submission No. 28, p. 4.

[81]     Ms Stella Gray, Submission No. 152, p. 6.

[82]     Australian Lawyers for Human Rights, Submission No. 194, p. 8.

[83]     AMTA and Communications Alliance, Submission No. 114, p. 15.

[84]     Ms Ashley Hull, Submission No. 153, p. 1.

[85]     Institute of Public Affairs, Submission No. 139, p. 4.

[86]     Mr Daniel Nazer, Submission No. 110, p. 7.

[87]     Australian Federal Police, Submission No. 163, p. 15. See also ASIO, Submission No. 209, p. 1; Attorney-General’s Department, Submission No. 218, p. 1

[88]     Australian Federal Police, Submission No. 163, p. 15. See also Attorney-General’s Department, Submission No. 218, p. 7

[89]     Victoria Police, Submission No. 200, p. 5. See also Attorney-General’s Department, Submission No. 218, p. 7;

[90]     Corruption and Crime Commission of Western Australian, Submission No. 156, p. 11. See also Australian Competition and Consumer Commission, Submission No. 192, p. 1

[91]     Attorney-General’s Department, Submission No. 218, p. 8.

[92]     Attorney-General’s Department, Submission No. 218, p. 8.

[93]     Australian Federal Police, Submission No. 163, p. 16. See also NSW Government, Submission No. 148, p. 3

[94]     Australian Federal Police, Submission No. 163, p. 16.

[95]     Australian Federal Police, Submission No. 163, p. 16.

[96]     AFP, ASIO and ACC, Submission No. 227, p. 3.

[97]     AFP, ASIO and ACC, Submission No. 227, p. 8.

[98]     AFP, ASIO and ACC, Submission No. 227, p. 8.

[99]     Ms Catherine Smith, Transcript, 2 November 2012, p. 3.

[100]   Commissioner Negus, Transcript, 26 September 2012, p. 19.

[101]   ASIO, Submission No. 209, p. 3.

[102]   Attorney-General’s Department, Submission No. 218, p. 10.

[103]   ASIO, Submission No. 209, p. 3.

[104]   Attorney-General’s Department, Submission No. 218, p. 10.

[105]   Australian Privacy Foundation, Submission No. 162, pp. 9-10.

[106]   Mr Bernard Keane, Submission No. 117, p. 15.

[107]   Senator Scott Ludlam, Submission No. 146, p. 6.

[108]   Victorian Privacy Commissioner, Submission No. 109, p. 8.

[109]   Mr Daniel Nazer, Submission No. 110, p. 5.

[110]   Mr Chris Althaus, Transcript, 14 September 2012, p. 31.

[111]   Electronic Frontiers Australia, Submission No. 121, p. 5.

[112]   Mr Matthew Lobb, Transcript, 27 September 2012, p. 18.

[113]   Electronic Frontiers Australia, Submission No. 121, p. 5.

[114]   NSW Young Lawyers, Submission No. 133, p. 11.

[115]   Mr Ian Quick, Submission No. 95, p. 14.

[116]   Mr Daniel Black, Submission No. 97, p. 6.

[117]   Internet Industry Association, Submission No. 187, p. 7.

[118]   Internet Society of Australia, Submission No. 145, p. 5.

[119]   Internet Industry Association, Submission No. 187, p. 7. 

[120]   Australian Lawyers for Human Rights, Submission No. 194, p. 8.

[121]   Mr R Batten, Submission No. 50, p. 6.

[122]   Mr R Wigan, Submission No. 178, p. 2.

[123]   Mr Mark Newton, Submission No. 87, p. 9.

[124]   Mr Daniel Black, Submission No. 157, p. 12.

[125]   Internet Industry Association, Submission No. 187, p. 7. 

[126]   Australian Lawyers for Human Rights, Submission No. 194, p. 8.

[127]   Mr Bernard Keane, Submission No. 117, p. 15.

[128]   Mr Bernard Keane, Submission No. 117, p. 15.

[129]   Mr Daniel Black, Submission No. 157, p. 12.

[130]   Blueprint for Free Speech, Submission No. 165, p. 6.

[131]   Senetas, Submission No. 237, p. 1.

[132]   Pirate Party, Submission No. 134, p. 25.

[133]   iiNet, Submission No. 108, p. 13.

[134]   Pirate Party, Submission No. 134, pp. 25-6.

[135]   Pirate Party, Submission No. 134, p. 25

[136]   AFP, ASIO and ACC, Submission No. 227, p. 8.

[137]   AFP, ASIO and ACC, Submission No. 227, p. 9.

[138]   Office of the Australian Information Commissioner, Submission No. 183, p. 16.

[139]   Office of the Australian Information Commissioner, Submission No. 183, p. 16.

[140]   Dr Bendall, Transcript, 5 September 2012, p. 4.

[141]   Attorney-General’s Department, Submission No. 235, p. 21.

[142]   Office of the Australian Information Commissioner, Submission No. 183, p. 20.

[143]   Attorney-General’s Department, Submission No. 235, p. 21.

[144]   Attorney-General’s Department, Submission No. 235, p. 21.

[145]   Law Council, Submission No. 108, p. 38.

[146]   Law Council, Submission No. 108, p. 38.

[147]   Internet Society of Australia, Submission No. 145, p. 4.

[148]   Ms Stella Gray, Submission No. 152, p. 5.  See also Pirate Party, Submission No. 134, p. 26.

[149]   Internet Industry Association, Submission No. 187, p. 8.

[150]   Mr James Shaw, Transcript, 27 September 2012, p. 12.

[151]   Mr Stephen Dalby, Transcript, 27 September 2012, p. 51.  See also Mr Chris Althaus, Transcript, 14 September 2012, p. 31; Mr Andrew Pam, Transcript, 5 September 2012, pp. 62-3.

[152]   Telstra, Submission No. 238, p. 1.

[153]   Telstra, Submission No. 238, p. 1.

[154]   Telstra, Submission No. 238, p. 1.

[155]   Joint Committee on the Draft Communications Data Bill, UK Parliament, Draft Communications Data Bill, December 2012, p. 30, viewed 18 December 2012, <www.parliament.uk/business/committees/committees-a-z/joint-select/draft-communications-bill/publications/>.

[156]   Joint Committee on the Draft Communications Data Bill, UK Parliament, Draft Communications Data Bill, December 2012, p. 30, viewed 18 December 2012, <www.parliament.uk/business/committees/committees-a-z/joint-select/draft-communications-bill/publications/>.

[157]   Telstra, Submission No. 238, p. 2.

[158]   Telstra, Submission No. 189, p. 11.

[159]   Electronic Frontiers Australia, Submission No. 121, p. 4.

[160]   Dr Anthony Bendall, Transcript, 5 September 2012, p. 4.

[161]   Mr Stephen Dalby, Transcript, 27 September 2012, p. 47.

[162]   Blueprint for Free Speech, Submission No. 165, p. 6. Emphasis in original.

[163]   Arbeitskreis Vorratsdatenspeicherung, Data Retention Effectiveness Report, 20 May 2011.  See also Mr Chris Berg, Transcript, 5 September 2012, p. 45.

[164]   Mr Ben Lever, Submission No. 71, p. 3.

[165]   Pirate Party, Submission No. 134, p. 28.

[166]   Mr Ian Quick, Submission No. 95, p. 14.  See also Liberty Victoria, Submission No. 109, p. 7; Pirate Party, Submission No. 213, p. 3; Mr Patrick Potter, Submission No. 212, p. 4; Mr Daniel Judge, Submission No. 157, p. 12;

[167]   Mr Ian Quick, Submission No. 95, p. 14.

[168]   Tor Project website, About Tor, viewed 15 November 2012, <www.torproject.org/about/overview.html.en>.

[169]   Mr Cameron Blackwood, Submission No. 208, p. 3.

[170]   Mr Johann Trevaskis, Submission No. 62, p. 9.

[171]   Mr Daniel Nazer, Submission No. 110, p. 3.

[172]   Ms Catherine Smith, Transcript, 2 November 2012, p. 6.

[173]   Ms Catherine Smith, Transcript, 2 November 2012, pp. 6-7.

[174]   Australian Federal Police, Submission No. 163, p. 18.

[175]   AFP, ASIO and ACC, Submission No. 227, p. 6.

[176]   Australian Federal Police, Submission No. 163, p. 17.

[177]   Attorney-General’s Department, Submission No. 218, p. 9.

[178]   Ms Catherine Smith, Transcript, 2 November 2012, p. 4.

[179]   Telstra, Submission No. 189, p. 11. See also Mr Zull, Transcript, 5 September 2012, p. 10.

[180]   Telstra, Submission No. 189, p. 12.

[181]   Mr Bruce Arnold, Submission No. 137, p. 2.

[182]   Electronic Frontiers Australia, Submission No. 121, p. 7.

[183]   Electronic Frontiers Australia, Submission No. 121, p. 7.

[184]   AMTA and Communications Alliance, Submission No. 114, p. 14.

[185]   Mr Daniel Nazer, Submission No. 110, pp. 6-7.

[186]   Mr Stephen Dalby, Transcript, 27 September 2012, p. 48.

[187]   Mr Stephen Dalby, Transcript, 27 September 2012, p. 49.

[188]   Mr James Shaw, Transcript, 27 September 2012, p. 4.

[189]   Mr Matthew Lobb, Transcript, 27 September 2012, p. 21.

[190]   Mr John Lindsay, Transcript, 27 September 2012, p. 50.

[191]   Mrs Jane Van Beelen, Transcript, 27 September 2012, p. 11.

[192]   Ms Stella Gray, Submission No. 152, p. 5.

[193]   Mr John Stanton, Transcript, 14 September 2012, p. 29.

[194]   Australian Interactive Media Industry Association, Submission No. 198, p. 4. See also Mr Lobb, Transcript, 27 September 2012, p. 19.

Appendix E - Discussion Paper

[1]   See Report of the Review of the regulation of access to communications (2005) (the Blunn Report) at http://www.ag.gov.au/Publications/Pages/Blunnreportofthereviewoftheregulationofaccesstocommunications August2005.aspx

[2]   AGD, TIA Act Report for the year ending 30 June 2011, p. 46.

[3]   AGD, TIA Act Report for the year ending 30 June 2011, p. 60

[4]   AGD, TIA Act Report for the year ending 30 June 2011, p. 47

[5]   ASIO, ASIO Report to Parliament 2010-11, p. xviii.

[6]   ASIO, ASIO Report to Parliament 2010-11, p. ix

[7]   ASIO, ASIO Report to Parliament 2010-11, p. xviii, 5.

[8]   PM&C, Counter-Terrorism White Paper, 2010, p.7.

[9]   See s 5D of the TIA Act.

[10]   AIC 2011Australian crime:Facts & figures http://www.aic.gov.au/documents/0/B/6/%7B0B619F44-B18B-47B4-9B59-F87BA643CBAA%7Dfacts11.pdf, p2.

[11]   ACC, Organised Crime in Australia 2011, http://www.crimecommission.gov.au/sites/default/files/files/OCA/2011/oca2011.pdf, p. 7.

[12]   ACC, Organised Crime in Australia 2011, p. 3.

[13]   ACC, Organised Crime in Australia 2011, p. 25.

[14]   ACMA, Communications report 2010‐11, p. 24.

[15]   ACMA, Communications report 2010‐11, p. 25.

[16]   ACMA, Communications Report 2010‐11, p. 18.

[17]   ACMA, Communications report 2010‐11, p. 153.

[18]   ACMA, Communications Report 2009‐10, p. 15.

[19]   ACMA, Communications Report 2010‐11, p. 17.

[20]   ACMA, Communications Report 2010‐11, p. 26.

[21]   ACMA, Communications report 2009‐10, p. 147.

[22]   The Australian, ‘Apple’s iPhone leads Australia’s huge smartphone growth’, 15 March 2011,
http://www.theaustralian.com.au/australian-it/apples-iphone-leads-australias-huge-smartphonegrowth/story-e6frgakx-1226021287594

[23]  ACMA, Communications report 2010‐11, p. 25.

[24]  ACMA, Communications report 2010‐11, p. 16.

[25]   ACMA, Communications report 2010‐11, p. 26.

[26]  NBN Co. Media Release, 29 March 2012 at http://www.nbnco.com.au/news-and-events/news/nbn-coannounces-three-year-rollout-plan.html

[27]   The focus of the discussion about record keeping and accountability is on law enforcement agencies..

[28]  Australian Communications and Media Authority, 2011, Broken Concepts: The Australian Communications legislative landscape, p6
http://engage.acma.gov.au/wp-content/uploads/2011/08/ACMA_Broken-Concepts_Final_29Aug1.pdf

[29]   ASIO, Director‐General’s speech at the Security in Government Conference, 7 July 2011

[30]   ASIO, Director‐General’s speech at the Security in Government Conference, 7 July 2011

Back to top

We acknowledge the traditional owners and custodians of country throughout Australia and acknowledge their continuing connection to land, waters and community. We pay our respects to the people, the cultures and the elders past, present and emerging.

Aboriginal and Torres Strait Islander people are advised that this website may contain images and voices of deceased people.