Privacy and security are both areas of major importance to civil society, so we must ask when does national security surveillance go too far and erode our civil liberties?
This report is the product of a unique joint review of the Search and Surveillance Act 2012 (the Act) conducted by the Law Commission and the Ministry of Justice.
This paper reveals findings from the research project around understanding and rethinking what ‘privacy’ means to individuals and IoT designers/developers in the realm of increasing digital connectivity.
The United Nation's Special Rapporteur on the Right to Privacy, Professor Joe Cannataci, says governments are using terrorism as a pretext, and wants to regulate government surveillance of citizens.
There has been a rapid expansion in the type and volume of information collected for security purposes following the terrorist attacks on the United States of America (‘US’) on 11 September 2001. This event has been described as precipitating a program of...
In 2007, Australia’s Commonwealth Government took a dramatic new approach to the governance of remote Indigenous communities. The ‘Northern Territory Intervention’ aimed to combat abuse and violence in remote Indigenous communities, and included far-reaching changes to welfare administration, employment programmes and policing....
What is the impact of state surveillance on journalism? This paper by Lisa Main, a journalist for ABC, and a member of their investigative unit, aims to contribute to the debate.
The mandatory bulk collection of data by governments presents liberal democracies with a...
Outbreaks of known and novel pathogens causing very severe illness increase the risk to public health in a globalised community and alarm the public Intensive care units (ICUs) may be an underused setting for public health surveillance. This study investigates the electronic Record for Intensive...
The surveillance discourse in British broadcast news since the Snowden revelations covers justifications and challenges. Justification focuses on authorisation and rationalisation strategies stating terror threats explicitly, which are often expressed by governmental actors. Delegitimation strategies predominantly use moralising and mythopoetic arguments of civil liberties and...
Drawing on findings from a two‐year empirical study examining the culture of closed‐circuit television (CCTV) operation in the UK, this paper analyses how CCTV camera operators subjectively experience the visual media that they work to produce.
It seeks to excavate some of the social...
News reporting, in channels such as broadcast and print media, on obesity as an issue has increased dramatically in the last decade. A qualitative study, in which we used in-depth interviews and thematic analysis, was undertaken to explore 142 obese individuals’ perceptions of, and responses...
The Parramatta shooting and its aftermath demonstrate common difficulties democracies face in counterterrorism.
On Friday 2 October, 15-year old boy Farhad Jabar fatally shot NSW Police employee Curtis Cheng at Parramatta police headquarters, before being killed during an exchange of fire with officers. While...
The rapid advancement of technology has resulted in increasing privacy implications for library and information services, their users, and society. Commercial Internet services, including those used to deliver library and information services, collect extensive data on users and their behaviour. They may...
This paper presents the findings from a national survey of local government to develop a national picture of the prevalence and characteristics of open-street CCTV systems in Australia managed by local councils.
There has been considerable growth in the use of...
This inquiry, coinciding with the inquiry into mandatory data retention, examined the need for comprehensive reform of the Telecommunications (Interception and Access) Act 1979 in light of changes in technology as well as privacy concerns.
On 12 December 2013, the...
Abstract: This paper describes the nature of digital intelligence and provides context for the material published as a result of the actions of National Security Agency contractor Edward Snowden. It looks at the dynamic interaction between demands from government and law enforcement for digital...
The Parliamentary Joint Committee on Intelligence and Security (PJCIS) today released its report on the government’s proposed metadata retention laws .
The report makes a number of recommendations to revise and clarify the proposed bill, including:offering monetary compensation for service providers to...
Australia, the US and other regional allies today face a rapidly changing strategic environment in the Indo-Pacific.
The US–Australia alliance is the bedrock of Australia’s defence policy. Successive governments have looked to the alliance for access to military technology, intelligence and...
This paper aims to identify and analyse several predominant issues and discourses as they relate to the burgeoning interrelationship between social media, crime and victim.
In this paper we analyse the kidnapping, rape and murder of Jill Meagher as a case...
In Australia, in the wake of the terrorist attacks on the US in 2001, more than sixty pieces of legislation have been passed into law, that significantly strengthen the powers of intelligence organisations. This program opens the file on one of Australia's earliest, highly secretive...