The head of the Australian Security Intelligence Organisation (ASIO) Mike Burgess is continuing the war of security agencies on privacy, telling a podcast that agencies needed backdoors into encrypted communications and that concerns about abuse of powers by security agencies were “just simple nonsense”.
To save time in parsing the claims of national security bureaucrats about encryption, we’ve prepared this handy guide to the claims about, and the reality of, ASIO’s demand that no one be allowed to have any privacy in their communications.
What agencies say their powers will be used for
All power grabs by security agencies are justified by three things: terrorists, paedophiles and organised crime. Data retention was justified by the Abbott government because it would only be used by a small number of agencies to investigate “serious offences” and “the worst of the worst”.
Then-attorney-general George Brandis insisted that the Turnbull government’s laws to force companies to provide backdoors to encrypted communications system — which would, Malcolm Turnbull famously insisted, override the laws of mathematics — “could be used to tackle terrorism, or serious organised crime such as paedophile networks”.
What the powers are actually used for
Whistleblowing, journalism and public scrutiny — data retention has been used repeatedly and illegally to track down journalists’ sources and pursue whistleblowers who have embarrassed the government. The phone records of cross-bench politicians have also been targeted by security agencies.
Rubbish dumping, parking fines — as a review of data retention laws has shown, data retention laws have also been used by bodies such as local councils, a racing integrity regulator, taxi bodies, veterinary bodies and anti-dumping agencies.
Commercial espionage — the Australian Signals Directorate, which Burgess used to head, is notorious for spying on Indonesian trade negotiators to pass on commercial intelligence to the US government. Defence Signals Directorate, as it was then known, had also spied on the Indonesian president and his family, as well as a climate conference held in Bali.
The most famous piece of Australian espionage in recent decades was its illegal spying on the Timor-Leste cabinet to benefit resources company Woodside, for whom the man who ordered the spying, Alexander Downer, later worked.
What is encryption really used for?
Despite the insistence of Burgess and government ministers that encrypted messaging is the province of terrorists and criminals, it is used for a wide variety of legitimate purposes:
Banking and commerce — without encryption, the entire economy would grind to a halt. Not merely would all financial transactions be compromised, but the routine exchange of confidential and market-sensitive information would be impossible. Amongst the biggest users of encrypted communications technology is the government itself.
Whistleblowing, activism, legal work and journalism — “if you’ve done nothing wrong, you have nothing to hide”. Except in some professions and roles, doing right necessitates having something hide. Only through end-to-end encryption can people who want to expose the powerful do so with a measure of safety. The ability for dissidents to communicate without governments knowing, the ability of whistleblowers to contact journalists and lawyers without their anonymity being compromised, the ability for the innocent to mount defences against malicious prosecution, all depend on encryption.
Everyday life — in fact, everyone has something to hide. That’s why we have curtains on our windows, locks on our doors and don’t share intimate details of our lives with everyone. That’s why areas like medical records have tight restrictions on who can access them. That’s why we don’t tell everyone our financial history or family secrets. Encrypted communications are basic to the kind of privacy that, despite all the claims that “privacy is dead”, we all still treasure.
Crikey is committed to hosting lively discussions. Help us keep the conversation useful, interesting and welcoming. We aim to publish comments quickly in the interest of promoting robust conversation, but we’re a small team and we deploy filters to protect against legal risk. Occasionally your comment may be held up while we review, but we’re working as fast as we can to keep the conversation rolling.
The Crikey comment section is members-only content. Please subscribe to leave a comment.
The Crikey comment section is members-only content. Please login to leave a comment.