Today'
Sender: [EMAIL PROTECTED]
X-Loop: [EMAIL PROTECTED]
Precedence: bulk

scanned from BRW's Media 'Management today':

Oh Big Brother Where Art Thou?

The privacy bill before Parliament seems destined to leave Australian 
citizens vulnerable to invasions of electronic communications


Imagine, in the not too distant future, your highly confidential personal 
information could be available for any corporation to use. Imagine your 
every commercial move being monitored by United States spy networks and 
possibly sold to US businesses. Imagine that the Australian Government 
actively assisted in removing blocks to such invasions of privacy.

Well, imagine no more; that is precisely what is happening. Until recently, 
such scenarios were confined to the celluloid thriller. But now, thanks to 
the Privacy Amendment (Private Sector) Bill tabled in the House of 
Representatives on June 26, 2000, Australian citizens, residents and 
businesses can look forward to yet unforeseen forms of privacy invasion.

Ignoring the advice of privacy advocates, those in charge of the bill 
consultation process excluded any formal mechanism for brining corporations 
or government bodies to account.

IT specialist Roger Clarke, of Xamax Consultancy in Canberra, said in his 
submission to the Attorney-General on the draft Bill, that it was "as 
though the Government's intent were to  create an image of a protective 
regime, while actually reducing privacy protections, and legitimising 
privacy-abusive practices." Clarke concluded that the additions this Bill 
did include for protecting privacy would have very little affect.

This is a non-partisan issue. The ALP helped the Government by guaranteeing 
a quiet passage of the bill, avoiding a Senate inquiry. Given the backlash 
to Bob Hawke's proposed Australia Card, an inquiry would have drawn a lot 
of public attention to a bill that, effectively protects the interests of 
big business and sells out on the privacy interests of the public.

Due to take effect later this year, the bill will allow "data-mining" 
(collecting) companies legal authority to gain information, Clarke says. 
This includes the right to collect information on any group, business, 
community or individual.

Former spy Mike Frost, with 34 years' experience of procedures in the 
Canadian Government, states that personal information includes: name, 
address, telephone number, age, family status, sex, sexual preference, 
occupation, medical and health records, dental records, assets, 
liabilities, income, payment records, driving records, credit-card 
information and history, bank records, criminal records, and more.

He says the Canadian Government was denying the existence of such 
information as he was feeding it into the database.

Global sources, combined with sophisticated compiling procedures, allow 
comprehensive profiles on any individual to be purchased in this booming 
market. Unhindered by public scrutiny, many data-mining companies are 
becoming unscrupulous in their behaviour.

Mervyn Vogt, union delegate and candidate for the board of Telstra, works 
in the specialist-products line for Telstra, assisting customers who are 
having difficulty with their Telstra products. Taking an average of a 
hundred calls a day from around the world, Vogt has to work with the 
uncomfortable knowledge that, even if a client consents to having a 
conversation recorded, this does not necessarily protect their rights to 
privacy.

"People who ring up Telstra have faith in the people they are talking to, 
but not necessarily with Telstra as an organisation" says Vogt.

Often, conversations will include private and personal details. It is not 
uncommon for a person to ring up in state of desperation. Like a wife who 
tries to use her mobile phone to seek help from a violent husband. Or a 
teenager who fears that she is being stalked. In moments of stress you can 
reveal more about yourself than intended. This type of information is a 
gold mine for data-mining agencies.

There is little protection from abuse of privacy. Vogt says: "Telstra is 
not subject to the Privacy Act. It is only subject to the 
Telecommunications Interception Act, which means that,  if I was involved 
in a crime, the police would be required to get a court order to tap my 
phone. Telstra has unfettered access to all personal customer information 
it records."

Vogt is not told what happens to this data, and, as Telstra seems 
unanswerable to anyone, it is impossible to verify what happens to it. Anne 
O'Rourke, of Liberty Victoria, says: "The current ad-hoc regulatory 
approach does not adequately protect citizens' personal data from the 
dangers of misuse."

There are many ways of collecting personal data. Workplace relations 
provides ample opportunity for abuse, and Telstra may also be involved. 
Telstra is not responding to questions about its surveillance of employees.

The Cameo programme, which, Vogt says, 30% of US corporations use, sifts 
through 5,000 messages an hour looking for key words. If a message is found 
containing any of these words, the message and its attachments are 
forwarded to a supervisor who reads them in full. This sophisticated form 
of spying on workers is based on a far larger, in fact a gargantuan, global 
spy network capable of scanning all telephone, fax, mobile and e-mail 
communications.

Australia was the first country to admit that it used the UKUSA Echelon 
system (Nine Network's Sunday program, 23 May, 1999), an extraordinary 
admission given that this spy network has been in covert operation for 50 
years.

Australia's Defence Signals Directorate (DSD), runs the Australian 
operations. Martin Brady has admitted that the DSD co-operates with 
counterpart signals intelligence organisations overseas under the UKUSA 
relationship. Given that Australia and New Zealand are junior partners in 
this network, which is dominated by the US National Security Agency (NSA), 
followed by Britain and Canada, this means more than co-operation.

Established after WWII, the pact was aimed at helping the Western powers to 
check the spread of communism. Through the sharing of facilities, staff, 
strategies, tasks and products between the participating governments, this 
global network proved invaluable during the Cold War. Since the Cold War 
ended, this system has been developing into a formidable tool for gathering 
economic intelligence.

According to Echelon specialist David Campbell, the DSD, with its four 
overseas counterparts, operates a network of highly automated tracking 
stations that illicitly picks up commercial communications and examine 
every fax, telex, e-mail, phone call, or computer data message that the 
satellites carry. Information is also fed into the Echelon system from the 
internet and by monitoring pods on undersea cables.

The UKUSA uses the Echelon system to simultaneously scan millions of 
messages every 30 minutes for key words that may be of interest to 
intelligence agencies and governments. Intercepted signals are filtered 
through a computer system known as the "Dictionary". This compares each new 
message or call against thousands of collection requirements. Campbell says 
the Dictionaries then send the messages into the spy agencies' equivalent 
of the Internet.

New Zealand activist Nicky Hager, who alerted the world to the Echelon 
through his book Secret Power, explains the susceptibility of this system 
to corruption. Because Australia and New Zealand are junior members of the 
UKUSA, they cannot turn down requests by the NSA, for example, for 
information concerning their businesses and citizens.

Vogt says: "It is more advantageous for US business to use the Echelon to 
maintain its leverage over Australian business. The US dedicates a high 
percentage of the Echelon to purely commercial espionage."

One spectacular breach of Australia's national interest might not have 
involved the Echelon, however it illustrates where Australia's allegiances 
may lie. Two disgruntled former Australian Security Intelligence Service 
(ASIS) agents in November 1993 revealed that ASIS had maintained files on 
thousands of Australians and had done bugging work for Britain's M16 that 
undermined Australian commercial interests.

All countries may be susceptible. Take, for instance, from Macedonia, the 
January 24, 2001, issue of Dnevnik. Its lead story covers the 150 tapes 
that were leaked to the Macedonian Parliament. The tapes are of telephone 
conversations from politicians and journalists residing in Macedonia. The 
European Union has recommended that Macedonia form an all-party 
parliamentary inquiry into this scandal.

Vogt says: "Since Macedonia doesn't possess the technology to intercept and 
record all conversations, it is obvious that it was an external 
spy-network. This may also indicate that a new form of technology is out 
there, because the Echelon intercepts satellite transmissions, but 
Macedonia is a poor country and they can't afford to use satellites."

A little later, in an e-mail, Vogt wrote: "I am informed that, in the last 
few hours, representatives of the CIA and Croatian Secret Police have 
arrived in Skopje, capital of Macedonia, for discussions regarding the 
matter I spoke of."

As for the rest of us, things get worse. Before New Zealand Parliament is a 
crimes amendment bill that, if passed, will allow agencies that run the NZ 
operational arm in UKUSA (the Government Communications Security Bureau and 
the Secret Intelligence Service), to spy on their own citizens by 
intercepting e-mail.

These activities could have dire consequences for Australians. Mike Frost 
speaks from a Canadian perspective, but the implications are clear. "The 
Canadian Government has a database that contains personal information 
concerning its citizens. It is my opinion that the Government of New 
Zealand probably has a similar database. I mean, why wouldn't they? The 
Government of Canada will not acknowledge the existence of this database, 
but I know it exist because I used to provide input to it."

British legislation is even more draconian. Copied straight from the FBI, 
the Prevention of Terrorism Bill redefines terrorism as the "use of serious 
violence against persons or property, or the threat to use violence, to 
intimidate or coerce a government, the public, or any section of the public 
for political, religious or ideological ends."

This definition places violence with coercion, yet coercion is not defined 
and could mean anything from writing a letter to a newspaper or advocating 
for democratic rights through community meetings. Under such a broad 
understanding, the World Wildlife Fund could be seen as a terrorist 
organisation.

British Labour MP Alan Simpson, stated: "We are witnessing a global 
resurgence of citizens' movements, saying: 'If governments can no longer 
protect our rights, we shall have to do so ourselves.' It's sad that we've 
chosen this movement to redefine terrorism. Potentially, it turns activist 
movements into terrorist movements. It's a catch-all bill".

Such anti-democratic legislation mirrors the US Anti-Terrorist Act of 1996, 
which the FBI is using to clamp down on any left or right-wing activities.

But, there is hope. Strong encryption programs are one way that Australian 
business can guard against eavesdropping. Even if Echelon intercepted a 
message, it may not necessarily be understood. There is a narrow window of 
opportunity for Australian business to take up encryption procedures. This 
would make it unlikely that the Government would ban encryption, and 
citizens would be able to maintain some control over privacy.

In 2000, France set a precedent by authorising the use of encryption in 
private messages.  However, until Australian privacy becomes an election 
issue, we must prepare for the worst to come.

� Alan Griffiths January 27/01/01


Through rain, hail, sleet, snow, satellite spy networks, phone taps.

So, you are an Australian enterprise thinking of operating abroad to take 
advantage of the globally connected world. The opportunities are there, and 
the competitive terrain seems open.

Think again. The technology that has created the opportunity may also be 
used to take them away.

Consider the example of the French company Thomson. The company lost a 
radar contract in Brazil and is alleging the reason for the loss was that 
spying networks were used to provide sensitive information to a United 
States rival. The French Government is conducting an inquiry into the 
surveillance system Echelon, which allegedly was used to provide the data.

Similar allegations are being made about an incident in which the European 
Airbus consortium missed out on a $US6-billion aircraft contract that was 
won by the Boeing Corporation of the US.

Echelon, a system set up between the US and Britain, is used for monitoring 
all forms of electronic communications, including fax and e-mail. According 
to a European Union report, the monitoring activities include illegal 
interception of commercial satellites, and long- distance communications 
from space and the internet. French authorities are alleging that it is 
powerful enough to monitor most phone traffic in France. More than 120 
satellite systems are said to be continually collecting intelligence, and 
the system is reputed to be able to intercept more than a million 
communications every 30 minutes.

The moral of the story? If you are competing in the global economy against 
a powerful American rival, assume that no electronic communication is safe. 
If worse comes to worst, talk face to face or resort to the one form of 
communication that is nearly always reliable and private: the post.

David James



The American Management Association reports that two-thirds of its members 
regularly conduct electronic surveillance of their employees. Sarah Joseph 
(Monash lecturer in law), 'Taming the Leviathans: Multinational Enterprises 
& Human Rights

The Direct Marketing Association will spearhead a $US100-million privacy 
consumer education campaign and has hired the public relations company 
Young & Rubican to create the effort. The DMA hopes to set the record 
straight on privacy, change consumers' mindsets and let them know how 
marketers use information and how consumers will benefit.


--

           Leftlink - Australia's Broad Left Mailing List
                            mailto:[EMAIL PROTECTED]
        Archived at http://www.cat.org.au/lists/leftlink/

Sponsored by Melbourne's New International Bookshop
Subscribe: mailto:[EMAIL PROTECTED]?Body=subscribe%20leftlink
Unsubscribe: mailto:[EMAIL PROTECTED]?Body=unsubscribe%20leftlink

Reply via email to