senate vote 2006-03-30#3
Edited by
system
on
2014-10-07 16:21:09
|
Title
Description
The majority voted in favour of a [http://www.openaustralia.org/senate/?gid=2006-03-30.117.4 motion] that schedule 2, as amended, be agreed to. This means that the majority agree with the newly amended schedule 2 and that it will remain in place. This motion was put in response to a [http://www.openaustralia.org/senate/?gid=2006-03-30.110.1 Greens amendment] to oppose the amended schedule.
Schedule 2 relates to B-party interceptions, which are interceptions of communications made by a third party, that is, by a person who is not suspected of involvement in a prescribed crime but whose communications may be relevant to an investigation. That B-party may only be a conduit for the relevant communication and may not be aware of the use being made of them by the person of interest.(Read more about B-party interceptions in the [http://www.aph.gov.au/Parliamentary_Business/Bills_Legislation/bd/bd0506/06bd102 bills digest].
)
''Background to the bill''
The [http://parlinfo.aph.gov.au/parlInfo/search/display/display.w3p;query=Id:legislation/billhome/R2506 bill] was introduced to implement some of the recommendations of the [http://www.ag.gov.au/Publications/Pages/BlunnreportofthereviewoftheregulationofaccesstocommunicationsAugust2005.aspx Review of the Regulation of Access to Communications] (known as the Blunn Report) in order to, among other things, create a warrant regime to allow access to stored communications held by a telecommunications carrier and enable the interception of communications of a person known to communicate with the person of interest.(Read more about the bill in its [http://www.aph.gov.au/Parliamentary_Business/Bills_Legislation/bd/bd0506/06bd102 bills digest].)
- The majority voted in favour of a [motion](http://www.openaustralia.org/senate/?gid=2006-03-30.117.4) that schedule 2, as amended, be agreed to. This means that the majority agree with the newly amended schedule 2 and that it will remain in place. This motion was put in response to a [Greens amendment](http://www.openaustralia.org/senate/?gid=2006-03-30.110.1) to oppose the amended schedule.
- Schedule 2 relates to B-party interceptions, which are interceptions of communications made by a third party, that is, by a person who is not suspected of involvement in a prescribed crime but whose communications may be relevant to an investigation. That B-party may only be a conduit for the relevant communication and may not be aware of the use being made of them by the person of interest.(Read more about B-party interceptions in the [bills digest](http://www.aph.gov.au/Parliamentary_Business/Bills_Legislation/bd/bd0506/06bd102). )
- _Background to the bill_
- The [bill](http://parlinfo.aph.gov.au/parlInfo/search/display/display.w3p;query=Id:legislation/billhome/R2506) was introduced to implement some of the recommendations of the [Review of the Regulation of Access to Communications](http://www.ag.gov.au/Publications/Pages/BlunnreportofthereviewoftheregulationofaccesstocommunicationsAugust2005.aspx) (known as the Blunn Report) in order to, among other things, create a warrant regime to allow access to stored communications held by a telecommunications carrier and enable the interception of communications of a person known to communicate with the person of interest.(Read more about the bill in its [bills digest](http://www.aph.gov.au/Parliamentary_Business/Bills_Legislation/bd/bd0506/06bd102).)
|
senate vote 2006-03-30#3
Edited by
system
on
2014-10-07 16:16:53
|
Title
Description
- The majority voted in favour of a [http://www.openaustralia.org/senate/?gid=2006-03-30.117.4 motion] that schedule 2, as amended, be agreed to. This means that the majority agree with the newly amended schedule 2 and that it will remain in place. This motion was put in response to a [http://www.openaustralia.org/senate/?gid=2006-03-30.110.1 Greens amendment] to oppose the amended schedule.
Schedule 2 relates to B-party interceptions, which are interceptions of communications made by a third party, that is, by a person who is not suspected of involvement in a prescribed crime but whose communications may be relevant to an investigation. That B-party may only be a conduit for the relevant communication and may not be aware of the use being made of them by the person of interest.[1]
- Schedule 2 relates to B-party interceptions, which are interceptions of communications made by a third party, that is, by a person who is not suspected of involvement in a prescribed crime but whose communications may be relevant to an investigation. That B-party may only be a conduit for the relevant communication and may not be aware of the use being made of them by the person of interest.(Read more about B-party interceptions in the [http://www.aph.gov.au/Parliamentary_Business/Bills_Legislation/bd/bd0506/06bd102 bills digest].
)
- ''Background to the bill''
The [http://parlinfo.aph.gov.au/parlInfo/search/display/display.w3p;query=Id:legislation/billhome/R2506 bill] was introduced to implement some of the recommendations of the [http://www.ag.gov.au/Publications/Pages/BlunnreportofthereviewoftheregulationofaccesstocommunicationsAugust2005.aspx Review of the Regulation of Access to Communications] (known as the Blunn Report) in order to, among other things, create a warrant regime to allow access to stored communications held by a telecommunications carrier and enable the interception of communications of a person known to communicate with the person of interest.[2]
- The [http://parlinfo.aph.gov.au/parlInfo/search/display/display.w3p;query=Id:legislation/billhome/R2506 bill] was introduced to implement some of the recommendations of the [http://www.ag.gov.au/Publications/Pages/BlunnreportofthereviewoftheregulationofaccesstocommunicationsAugust2005.aspx Review of the Regulation of Access to Communications] (known as the Blunn Report) in order to, among other things, create a warrant regime to allow access to stored communications held by a telecommunications carrier and enable the interception of communications of a person known to communicate with the person of interest.(Read more about the bill in its [http://www.aph.gov.au/Parliamentary_Business/Bills_Legislation/bd/bd0506/06bd102 bills digest].)
''References''
* [1] Read more about B-party interceptions in the [http://www.aph.gov.au/Parliamentary_Business/Bills_Legislation/bd/bd0506/06bd102 bills digest].
* [2] Read more about the bill in its [http://www.aph.gov.au/Parliamentary_Business/Bills_Legislation/bd/bd0506/06bd102 bills digest].
|
senate vote 2006-03-30#3
Edited by
mackay staff
on
2014-08-15 09:21:52
|
Title
Telecommunications (Interception) Amendment Bill 2006 — In Committee
- Telecommunications (Interception) Amendment Bill 2006 — In Committee - Schedule 2 (B—party interceptions)
Description
<p class="speaker">Natasha Stott Despoja</p>
<p>by leave—The Democrats amendments oppose schedule 2 in the following terms:</p>
<p class="italic">(18)  Schedule 2, item 1, page 62 (lines 5 to 11), <b>TO BE OPPOSED</b>.</p>
- The majority voted in favour of a [http://www.openaustralia.org/senate/?gid=2006-03-30.117.4 motion] that schedule 2, as amended, be agreed to. This means that the majority agree with the newly amended schedule 2 and that it will remain in place. This motion was put in response to a [http://www.openaustralia.org/senate/?gid=2006-03-30.110.1 Greens amendment] to oppose the amended schedule.
- B-party interceptions are interceptions of communications made by a third party, that is, by a person who is not suspected of involvement in a prescribed crime but whose communications may be relevant to an investigation. That B-party may only be a conduit for the relevant communication and may not be aware of the use being made of them by the person of interest.[1]
- ''Background to the bill''
- The [http://parlinfo.aph.gov.au/parlInfo/search/display/display.w3p;query=Id:legislation/billhome/R2506 bill] was introduced to implement some of the recommendations of the [http://www.ag.gov.au/Publications/Pages/BlunnreportofthereviewoftheregulationofaccesstocommunicationsAugust2005.aspx Review of the Regulation of Access to Communications] (known as the Blunn Report) in order to, among other things, create a warrant regime to allow access to stored communications held by a telecommunications carrier and enable the interception of communications of a person known to communicate with the person of interest.[2]
- ''References''
- * [1] Read more about B-party interceptions in the [http://www.aph.gov.au/Parliamentary_Business/Bills_Legislation/bd/bd0506/06bd102 bills digest].
- * [2] Read more about the bill in its [http://www.aph.gov.au/Parliamentary_Business/Bills_Legislation/bd/bd0506/06bd102 bills digest].
<p class="italic">(19) Schedule 2, item 2, page 62 (lines 5 to 15), <b>TO BE OPPOSED</b>.</p>
<p class="italic">(20) Schedule 2, item 3, page 62 (lines 3 to 26), <b>TO BE OPPOSED</b>.</p>
<p class="italic">(21) Schedule 2, item 4, page 62 (lines 27 and 28), <b>TO BE OPPOSED</b>.</p>
<p>The intent of the Democrat amendments is to remove the Attorney-General’s power to issue B-party warrants for ASIO. I want to make it very clear that we are talking about B-party warrants for ASIO and removing the ability of the Attorney-General to issue those warrants. We believe that it is an important safeguard that should be implemented in order to maintain a relatively high level of oversight. These changes should be passed because of the high possibility of privacy invasions under B-party warrants. Once again, I want to make it very clear that we are talking about ASIO and the Attorney-General’s power to issue those warrants to them. This is different from the issue of B-party warrants generally; it is specifically dealing with ASIO B-party warrants. Therefore, I hope the Senate will, with the recognition of that specificity, recognise the need to take that power away from the Attorney-General.</p>
<p class="speaker">Joe Ludwig</p>
<p>We do not support these amendments. Unfortunately, they go further than we think is required in these circumstances. I will not talk to them at length. The points we make in relation to our amendments go to the committee report. The hard work done by the committee, including the backbench, brought forward recommendations which were reasonable. Labor sought to take those recommendations and provide an opportunity for the government to support them. The government has chosen not to support them today.</p>
<p>In this instance, as I said previously, in terms of the regimes in place, it is important to ensure that there is a distinction between the law enforcement regime and the national security regime. Those regimes have our support. In terms of the amendments, when you look at the provisions, they go beyond the majority recommendations. I understand that they are consistent with your additional dissenting comments.</p>
<p class="speaker">Natasha Stott Despoja</p>
<p>Supplementary; additional.</p>
<p class="speaker">Joe Ludwig</p>
<p>Yes. However described, they are not things we can support.</p>
<p class="speaker">Christine Milne</p>
<p>I want to put on the record the Australian Greens’ opposition to schedule 2 as it stands. I will be supporting subsequent amendments and opposing the schedule as a whole because it does not draw an appropriate balance between security issues and privacy and basic freedoms.</p>
<p>Third parties having their phones tapped and emails read without their consent or knowledge simply because they contact somebody who government security agencies have an interest in is completely inappropriate in a democratic society. Innocent people who are unlucky enough to communicate by phone or email with someone suspected of a crime or of being a threat to national security are going to find themselves, without their knowledge, under this kind of scrutiny. I find that excessive.</p>
<p>We have to have security laws, but under these security laws everyone, including the tax office, will be able to trawl through the private emails, SMSs and phone conversations—and everything else—of people who have no idea that that is happening to them, and I find that appalling in supposedly a free country. That is the view that the Australian Greens take in relation to this. We do not believe that the government and its agencies should have the power to intervene with third parties in this way.</p>
<p class="speaker">Chris Ellison</p>
<p>I have outlined previously the government’s position in relation to the ASIO regime and the regime for law enforcement. We believe that the Attorney-General is an appropriate person in this case. If you can do it for telephone intercepts, you can do it for stored communications and warrants albeit that it relates to a B-party. We believe that we should stay with the same regime that we have.</p>
<p class="speaker">Andrew Murray</p>
<p> The question is that schedules 2, items 1 to 4, stand as printed.</p>
<p class="speaker">Chris Ellison</p>
<p>Question agreed to.</p>
<p class="speaker">Natasha Stott Despoja</p>
<p>by leave—I move Democrat amendments (23) and (24) on sheet 4869 standing my name:</p>
<p class="italic">(23)  Schedule 2, item 5, page 62 (line 29) to page 63 (line 1), omit the item, substitute:</p>
<p class="italic">5 At the end of section 46A</p>
<p class="italic">Add:</p>
<p>46B Warrant for B-party interception</p>
<p class="italic">        (1)    Where an agency applies to an eligible Judge for a warrant in respect of a person and the Judge is satisfied, on the basis of the information given to the Judge under this Part in connection with the application, that:</p>
<p class="italic">             (a)    Division 3 has been complied with in relation to the application; and</p>
<p class="italic">             (b)    in the case of a telephone application—because of urgent circumstances, it was necessary to make the application by telephone; and</p>
<p class="italic">             (c)    there are reasonable grounds for suspecting that a particular person is using, or is likely to use, more than one telecommunications service; and</p>
<p class="italic">             (d)    there is a substantial likelihood that information to be intercepted under the warrant would assist in connection with the investigation by the agency of a serious offence by a person who is expected to contact the person subject to the warrant; and</p>
<p class="italic">             (e)    having regard to the matters referred to in subsection (2), and to no other matters, the Judge should issue a warrant authorising such communications to be intercepted;</p>
<p>the Judge may, in his or her discretion, issue such a warrant.</p>
<p class="italic">        (2)    The matters to which the Judge must have regard are:</p>
<p class="italic">             (a)    how much the privacy of any person or persons would be likely to be interfered with by intercepting under a warrant communications made to any telecommunications service used by the person in respect of whom the warrant is sought; and</p>
<p class="italic">             (b)    the gravity of the conduct constituting the offence or offences being investigated; and</p>
<p class="italic">             (c)    how much the information referred to in paragraph (1)(d) would be likely to assist in connection with the investigation by the agency of the offence or offences; and</p>
<p class="italic">             (d)    to what extent methods (including the use of a warrant issued under section 46) of investigating the offence or offences that do not involve the use of a warrant issued under this section in relation to the person have been used by, or are available to, the agency; and</p>
<p class="italic">             (e)    how much the use of such methods would be likely to assist in connection with the investigation by the agency of the offence or offences; and</p>
<p class="italic">              (f)    how much the use of such methods would be likely to prejudice the investigation by the agency of the offence or offences, whether because of delay or for any other reason.</p>
<p class="italic">        (3)    The Judge must not issue a warrant in a case in which this section applies unless the person making the application on behalf of the enforcement agency states in an affidavit at the time of its application, or in the case of a telephone application within one day after the day on which the warrant is issued, that:</p>
<p class="italic">             (a)    the agency has exhausted all other methods of identifying the telecommunications services used, or likely to be used, by the person involved in the offence or offences referred to in paragraph (1)(d); and</p>
<p class="italic">             (b)    interception of communications made to or from a telecommunications service used or likely to be used by that person would not otherwise be possible; and</p>
<p class="italic">             (c)    communications intercepted from the communications service are not likely to breach any person’s legal professional privilege.</p>
<p class="italic">(24)  Schedule 2, item 6, page 63 (lines 2 and 3), omit the item, substitute:</p>
<p class="italic">6 Section 47</p>
<p class="italic">Omit “or 46A”, substitute “, 46A or 46B”.</p>
<p>Amendment (24) is a consequential amendment. Amendment (23) moves to increase significantly the threshold that is required in order to obtain a B-party warrant. I think that important aspects to note are the requirements that: firstly, there is a substantial likelihood that the information to be intercepted under the warrant would assist in connection with the investigation by the agency of a serious offence; and, secondly, that it is expected that the person of interest will contact the third party. We believe that operation of the B-party warrants does pose a serious risk for privacy rights in Australia. Where there are no adequate or appropriate measures to ensure that these privacy rights are not respected, then the schedule should not be passed.</p>
<p>We have heard various arguments for that today. It is not as if we have come in here deliberately trying to gut or tear down the act or have a deleterious impact on operational matters. But it is evident that the legislation in its current form does not strike a proportioned balance between crime fighting and security and safety on the one hand, and the civil liberties and privacy rights of Australians on the other hand. We have lost that balance. The attempt in this debate by parties such as the Democrats to inject some safeguards into this legislation has effectively failed—though we have still got almost a page of amendments to go in terms of the running sheet.</p>
<p>Having said that, I note that some of the really substantial changes that could have been made to give people some confidence in the operation of this Telecommunications (Interception) Amendment Bill have not been made, and I think that is significant. It is significant and certainly of great concern to the Australian Democrats who have been involved in the discussions and deliberations on this bill from the beginning—and I include predecessors in that involvement. In terms of this specific piece of legislation, we have been present at the inquiry and have prepared a report—and along with Senator Ludwig, I have to say, I also smirk a little at it too. The <i>Supplementary report with additional comments of dissent by the Democrats</i>I think we were aiming for the longest name of a Senate committee report. Nonetheless, it did sum up the fact that we endorse heartily the recommendations contained in the chair’s report and I put on record again that it was a majority report. We have backbenchers in here today who signed off on the legislative report but were forced to vote against the recommendations contained in that report. Doesn’t anyone have a problem with that? I think that it is quite extraordinary. Some of the safeguards built into that majority report and proposed for the legislation have since been voted against by the people who mooted them.</p>
<p>Maybe the Senate committee process is a farce now. I am not suggesting that we abandon it, but it seems extraordinary that we spent the day, albeit a short period of time, on a truncated inquiry with not enough time for verbal and written submissions and not enough time for us to deliberate over some of the questions on notice and questions that were responded to. I do acknowledge the work of the officers because I know that we gave questions without notice and on notice and they were responded to with what I would describe as alacrity considering the time frame. But still it is not enough to turn up on Monday, table a report and expect that report to be dealt with—discussed and digested—and then have us rock up on Tuesday morning—I think Monday evening was the original suggestion—and debate a significant piece of legislation that poses a great risk to privacy rights in this nation.</p>
<p>These are some of our last attempts to put some constraints and some safeguards on B-party warrants. Again, they are not intended to gut or destroy the legislation but build in safeguards. That has not happened. Yes, amendment (23) that the Democrats are moving does go further than the majority report, as Senator Ludwig has pointed out. There is good reason for that because the majority report did not go far enough. Those recommendations contained in the majority report signed off by coalition and Labor backbenchers were good recommendations and even they have been flouted in the chamber today. These are further Democrat changes proposed to the operation of B-party warrants. I think that they are reasonable changes that would increase the threshold in a way that would have a positive impact in terms of privacy as well as the security and safety of Australians. I commend the amendments to the chamber.</p>
<p class="speaker">Joe Ludwig</p>
<p>Given that Labor amendments in this area were defeated, we think that some improvement does come from the Democrat amendments to the protections not otherwise afforded and therefore we support these amendments.</p>
<p class='motion-notice motion-notice-truncated'>Long debate text truncated.</p>
|