{"id":1824,"date":"2017-04-17T19:39:01","date_gmt":"2017-04-17T19:39:01","guid":{"rendered":"http:\/\/dingo.news\/voice\/?p=1824"},"modified":"2023-09-29T16:24:12","modified_gmt":"2023-09-29T08:24:12","slug":"government-lies-about-metadata-scheme","status":"publish","type":"post","link":"https:\/\/dingo.news\/voice\/government-lies-about-metadata-scheme\/","title":{"rendered":"Government Lies About Metadata Scheme &#8211; by Kieran Adair &#038; Ugur Nedim"},"content":{"rendered":"<p><span style=\"font-size: 14pt; font-family: arial, helvetica, sans-serif;\">As we all were preparing for the Easter break, the government <span style=\"color: #993300;\"><a style=\"color: #993300;\" href=\"http:\/\/www.abc.net.au\/news\/2017-04-13\/metadata-retention-scheme-deadline-arrives\/8443168\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">switched on the full version of its metadata retention system<\/a><\/span>.<\/span><\/p>\n<div class=\"content\">\n<p><span style=\"font-size: 14pt; font-family: arial, helvetica, sans-serif;\">Although the <a href=\"https:\/\/www.sydneycriminallawyers.com.au\/blog\/will-meta-data-laws-catch-criminals-or-turn-civilians-into-suspects\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"color: #993300;\">legislation enabling the scheme<\/span><\/a> was passed in October 2015 \u2013 and data has been stored and accessed since then \u2013 last week marked the end of the \u2018implementation period\u2019.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: arial, helvetica, sans-serif;\">This means everyone\u2019s online activities are now being stored by Internet Service Providers \u2013 and must be released to a whole host of government agencies upon request, without those agencies having to obtain a warrant.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: arial, helvetica, sans-serif;\">Journalist <span style=\"color: #993300;\"><a style=\"color: #993300;\" href=\"http:\/\/www.smh.com.au\/technology\/technology-news\/data-retention-and-the-end-of-australians-digital-privacy-20150827-gj96kq.html\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Quentin Dempster<\/a> <\/span>described the laws as turning \u201cthis country\u2019s entire communications industry\u2026 into a surveillance and monitoring arm of at least 21 agencies of executive government.\u201d<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-size: 14pt; font-family: arial, helvetica, sans-serif;\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-1826\" src=\"https:\/\/i0.wp.com\/dingo.news\/voice\/wp-content\/uploads\/2019\/10\/george-brandis.jpg?resize=569%2C320&#038;ssl=1\" alt=\"\" width=\"569\" height=\"320\" srcset=\"https:\/\/i0.wp.com\/dingo.news\/voice\/wp-content\/uploads\/2019\/10\/george-brandis.jpg?w=569&amp;ssl=1 569w, https:\/\/i0.wp.com\/dingo.news\/voice\/wp-content\/uploads\/2019\/10\/george-brandis.jpg?resize=300%2C169&amp;ssl=1 300w\" sizes=\"(max-width: 569px) 100vw, 569px\" \/><\/span><\/p>\n<div class=\"like no-print\" style=\"padding-left: 200px; text-align: center;\"><span style=\"font-size: 14pt; font-family: arial, helvetica, sans-serif;\">George Brandis<\/span><\/div>\n<div>&nbsp;<\/div>\n<p><span style=\"font-size: 18pt; color: #800000;\"><strong><span style=\"font-family: arial, helvetica, sans-serif;\">Why these laws are concerning<\/span><\/strong><\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: arial, helvetica, sans-serif;\">While the content of your communications is not meant to be looked at, the legally accessible data can <a href=\"http:\/\/www.smh.com.au\/digital-life\/digital-life-news\/what-is-metadata-and-should-you-worry-if-yours-is-stored-by-law-20140806-100zae.html\" target=\"_blank\" rel=\"nofollow noopener noreferrer\"><span style=\"color: #993300;\">still paint a detailed picture<\/span><\/a> of your online activities \u2013 potentially enabling government agents to <a href=\"https:\/\/www.sydneycriminallawyers.com.au\/blog\/will-meta-data-laws-catch-criminals-or-turn-civilians-into-suspects\/\"><span style=\"color: #993300;\">use selected data to bolster allegations<\/span><\/a> against intended targets, or to track, hunt down and prosecute whistle blowers.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: arial, helvetica, sans-serif;\">Indeed, government agencies including the Australian Federal Police <a href=\"https:\/\/www.sydneycriminallawyers.com.au\/blog\/police-using-journalists-metadata-to-hunt-down-whistleblowers\/\"><span style=\"color: #993300;\">have already admitted investigating many journalists<\/span><\/a> and <span style=\"color: #993300;\"><a style=\"color: #993300;\" href=\"https:\/\/www.sydneycriminallawyers.com.au\/blog\/police-investigate-outspoken-doctor\/\">even doctors<\/a> <\/span>who have been critical of government policies and actions, by accessing their metadata.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: arial, helvetica, sans-serif;\">The new legislation will make it a lot easier for these agencies to <a href=\"https:\/\/www.sydneycriminallawyers.com.au\/blog\/whistleblowers-face-prison-for-revealing-conditions-in-detention-centres\/\"><span style=\"color: #993300;\">hunt down whistleblowers<\/span><\/a> who expose government misconduct.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: arial, helvetica, sans-serif;\">Data that can be legally accessed without a warrant includes:<\/span><\/p>\n<ul>\n<li><span style=\"font-size: 14pt; font-family: arial, helvetica, sans-serif;\">Telephone records<\/span><\/li>\n<li><span style=\"font-size: 14pt; font-family: arial, helvetica, sans-serif;\">The time and length of phone calls<\/span><\/li>\n<li><span style=\"font-size: 14pt; font-family: arial, helvetica, sans-serif;\">The internet protocol addresses (IP addresses) of computers from which messages are received or sent<\/span><\/li>\n<li><span style=\"font-size: 14pt; font-family: arial, helvetica, sans-serif;\">Location of parties making phone calls<\/span><\/li>\n<li><span style=\"font-size: 14pt; font-family: arial, helvetica, sans-serif;\">To and from email addresses on emails<\/span><\/li>\n<li><span style=\"font-size: 14pt; font-family: arial, helvetica, sans-serif;\">Logs of visitors to chat rooms online<\/span><\/li>\n<li><span style=\"font-size: 14pt; font-family: arial, helvetica, sans-serif;\">Status of chat sites \u2013 whether they are active and how many people are participating<\/span><\/li>\n<li><span style=\"font-size: 14pt; font-family: arial, helvetica, sans-serif;\">Chat aliases or identifiers (the name a person uses in a chat room online)<\/span><\/li>\n<li><span style=\"font-size: 14pt; font-family: arial, helvetica, sans-serif;\">Start and finish times of internet sessions<\/span><\/li>\n<li><span style=\"font-size: 14pt; font-family: arial, helvetica, sans-serif;\">The location of an individual involved in communications<\/span><\/li>\n<li><span style=\"font-size: 14pt; font-family: arial, helvetica, sans-serif;\"><span style=\"font-size: 14pt; font-family: arial, helvetica, sans-serif;\">The name of the application someone uses online and when, where and for how long used<\/span><\/span>&nbsp;<\/li>\n<\/ul>\n<p><span style=\"font-size: 14pt; font-family: arial, helvetica, sans-serif;\">Attorney-General George Brandis claimed the purpose of the new scheme was to counter the threat of terrorism and smash organised crime gangs, and would not be misused.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: arial, helvetica, sans-serif;\">However, the new laws have indeed&nbsp;been used to target people for a range of purposes which were not previously disclosed.<\/span><\/p>\n<h2><span style=\"color: #800000;\"><strong><span style=\"font-size: 18pt; font-family: arial, helvetica, sans-serif;\">Use of metadata to date<\/span><\/strong><\/span><\/h2>\n<p><span style=\"font-size: 14pt; font-family: arial, helvetica, sans-serif;\">Last year, it was revealed that <a href=\"http:\/\/www.gizmodo.com.au\/2016\/01\/heres-every-government-agency-that-wants-your-metadata\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\"><span style=\"color: #993300;\">over 60 Government agencies<\/span><\/a> had applied to the Attorney-General for metadata access. The list includes the Australian Taxation Office, Department of Human Services, and even local councils.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: arial, helvetica, sans-serif;\">In fact, <a href=\"http:\/\/www.smh.com.au\/technology\/technology-news\/dozens-of-government-agencies-request-access-to-citizen-metadata-without-warrants-20160119-gm8uql.html\" target=\"_blank\" rel=\"nofollow noopener noreferrer\"><span style=\"color: #993300;\">Bankstown Counci<\/span>l<\/a> applied for metadata access in order to catch illegal rubbish dumpers and those who breach by-laws. That access was granted. And the <a href=\"https:\/\/www.sydneycriminallawyers.com.au\/blog\/without-privacy-there-is-no-freedom\/\"><span style=\"color: #993300;\">Queensland Police Service used the scheme to access the metadata<\/span><\/a> of cadets in an attempt to determine whether they were sleeping with one another, or faking sick days.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: arial, helvetica, sans-serif;\">To many, dumping rubbish, monitoring the sexual activities of cadets or even <span style=\"color: #993300;\"><a style=\"color: #993300;\" href=\"https:\/\/www.sydneycriminallawyers.com.au\/criminal\/offences\/tax-fraud\/\">evading tax<\/a><\/span> is not enough to justify sacrificing the privacy of the entire Australian population&nbsp;\u2013 especially when the reason put forth for the implementation of the laws was to fight against terrorism and organised crime.<\/span><\/p>\n<h2><span style=\"color: #800000;\"><strong><span style=\"font-size: 18pt; font-family: arial, helvetica, sans-serif;\">Protecting your privacy<\/span><\/strong><\/span><\/h2>\n<p><span style=\"font-size: 14pt; font-family: arial, helvetica, sans-serif;\">There are many perfectly legal ways to circumvent the government\u2019s metadata scheme. Here are just a few of them.<\/span><\/p>\n<h2><strong><span style=\"font-size: 18pt; font-family: arial, helvetica, sans-serif; color: #000000;\">Hide your browsing data using a Virtual Private Network (VPN) service:<\/span><\/strong><\/h2>\n<p><span style=\"font-size: 14pt; font-family: arial, helvetica, sans-serif;\">VPN\u2019s work by creating a secure connection between your computer and another network. While you can still browse the internet freely, VPNs allow you to do this through the other network \u2013 disguising your tracks.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: arial, helvetica, sans-serif;\">The only metadata that will be recorded is your connection to the other network. <span style=\"color: #993300;\">Electronic Frontiers Australia<\/span> and <a href=\"http:\/\/digitalrightswatch.org.au\/2017\/04\/12\/get-a-vpn\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\"><span style=\"color: #993300;\">Digital Rights Watch<\/span><\/a> both have good introductions to choosing a VPN.<\/span><\/p>\n<h2><span style=\"font-size: 18pt;\"><strong><span style=\"font-family: arial, helvetica, sans-serif;\">Protecting your emails by using online services:<\/span><\/strong><\/span><\/h2>\n<p><span style=\"font-size: 14pt; font-family: arial, helvetica, sans-serif;\">If you use an email address supplied by your ISP (ie. @optus, @bigpond etc) they will be forced to record the address you emailed, attachment names, file sizes and location from which you send.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: arial, helvetica, sans-serif;\">However, if you use an overseas browser-based email services, like Gmail or Hotmail, all your ISP can record is that your location, and how long you were connected to that service \u2013 and if you\u2019re using a VPN they won\u2019t even be able to see that.<\/span><\/p>\n<h2><strong><span style=\"font-size: 18pt; font-family: arial, helvetica, sans-serif;\">Using Facebook Messenger to protect your SMS:<\/span><\/strong><\/h2>\n<p><span style=\"font-size: 14pt; font-family: arial, helvetica, sans-serif;\">If you send a SMS from your phone, your ISP will record the number you SMSd, the time of the sms, its size and your location. However, this can be easily protected by using an App, such as Facebook Messenger or iMessage, that comes preloaded onto your phone.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: arial, helvetica, sans-serif;\">Much like using a browser based email service, this will mean that they can only record the time you accessed the service, size of data exchanged, and your location \u2013 again, even this will be protected if your using a VPN.<\/span><\/p>\n<h2><span style=\"font-size: 18pt;\"><strong><span style=\"font-family: arial, helvetica, sans-serif;\">Using Skype to protect your phone calls:<\/span><\/strong><\/span><\/h2>\n<p><span style=\"font-size: 14pt; font-family: arial, helvetica, sans-serif;\">If you make a call from your mobile phone, your ISP will record the number you called, the time of call, its duration, and your location.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: arial, helvetica, sans-serif;\">However if you call using a smartphone app, such as Skype, Signal or Facebook Messenger, then they will only be able to record the time of your connection, and the amount of data used, and your location \u2013 again, you can protect against this by using a VPN.<\/span><\/p>\n<p>&nbsp;<\/p>\n<\/div>\n<p><span style=\"font-size: 14pt; font-family: arial, helvetica, sans-serif;\"><time>17\/04\/2017<\/time> by <a title=\"Articles by Kieran Adair\" href=\"https:\/\/www.sydneycriminallawyers.com.au\/blog\/author\/kieran-adair\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"color: #008000;\">Kieran Adair<\/span><\/a> &amp; <span style=\"color: #008000;\"><a style=\"color: #008000;\" title=\"Articles by Ugur Nedim\" href=\"https:\/\/www.sydneycriminallawyers.com.au\/blog\/author\/ugur-nedim\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ugur Nedim<\/a><\/span><\/span><\/p>\n<p>&nbsp;<br \/>\n&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>As we all were preparing for the Easter break, the government switched on the full version of its metadata retention system. Although the legislation enabling the scheme was passed in October 2015 \u2013 and data has been stored and accessed since then \u2013 last week marked the end of the \u2018implementation period\u2019. This means everyone\u2019s [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":1830,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","ngg_post_thumbnail":0,"footnotes":""},"categories":[135,301,3,51],"tags":[137,139,138,136],"class_list":["post-1824","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-australias-move-to-the-right","category-corruption","category-political-issues","category-technology","tag-137","tag-data-retention","tag-no-warrant","tag-surveillance"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/dingo.news\/voice\/wp-json\/wp\/v2\/posts\/1824","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dingo.news\/voice\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dingo.news\/voice\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dingo.news\/voice\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/dingo.news\/voice\/wp-json\/wp\/v2\/comments?post=1824"}],"version-history":[{"count":0,"href":"https:\/\/dingo.news\/voice\/wp-json\/wp\/v2\/posts\/1824\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/dingo.news\/voice\/wp-json\/wp\/v2\/media\/1830"}],"wp:attachment":[{"href":"https:\/\/dingo.news\/voice\/wp-json\/wp\/v2\/media?parent=1824"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dingo.news\/voice\/wp-json\/wp\/v2\/categories?post=1824"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dingo.news\/voice\/wp-json\/wp\/v2\/tags?post=1824"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}