The people in government have apparently passed some sort of
legislation that allows them to monitor every mode of communication the mass
population has including their location at every point in time an instance of
communication has been made.
The government will also keep this information for ever and
use it at any point in time (even when you're 90 years old) against you, and
maybe at some later point in time bring up your forefather's (alleged) 'criminal'
actions (internet browsing history) in your court matter.
When was this done?
When the peasants were flocking to celebrate the death of a
man called Jesus Christ otherwise known as Easter.
Now why would the Australian Government turn on a mass
surveillance machine against its own people, unless it sees the people as an
enemy of the state?
Let's take a closer look at what is this 'Australian
Government' and what is this 'the people'.
The people should be aware that in Australia, the founding
legal document for 'authorities' to follow is a document called 'The
Commonwealth of Australia Constitution Act' from the year 1901, or commonly
referred to as 'The Constitution' for short.
Every single law that has been passed must be in line with
this document called 'The Constitution'.
Every single court in this country must be a Chapter III (of
the Constitution) court.
Putting aside any legal arguments into the validity of the 'Constitution',
the highest court in this land is a business called the High Court of
Australia, which has been only recently setup (NOT in 1902) by an Act called the High Court
of Australia Act 1979, by people from somewhere called the 'Australian
Government', a place not as described in the 'Constitution'
According to the Constitution ALL laws must be made by the
Parliament of the Commonwealth.
Currently ALL laws are made by the Parliament of Australia.
EVERY politician MUST recite the oath contained within the
'Constitution'.
Only recently it has been exposed that the people sitting in
the High Court of Australia have committed criminal offences by removing the U.K.
monarch from legal proceedings.
The High Court of Australia has been deceiving the people of
Australia since 1973, and therefore as a result is not a court of competent
jurisdiction.
There is plenty more to write about in detail into the
corruption of Australia's executive with regards to their powers and the
judiciary but this is beyond the scope of this post.
Let's now move across to who 'the people' are.
Since Australia is (still) a monarchy where the people are
technically 'subjects' of Her Majesty, unless of course one has emigrated to
Australia and signed 'Citizenship'
paperwork (therefore succumbing to a republic), which brings them into a
different jurisdiction.
So for the best part of it, the Australian people who live
in a monarchy are 'subjects' of Her Majesty.
So where do these people stand with regards to law / the law
making process something technically called the Rule of Law?
1). The U.K. Monarch - Her Majesty Queen Elizabeth II
2). The people of the state, 'subjects' of Her Majesty
3). Parliament - 'The Parliament of the Commonwealth' - The
'lawful' governing body the 'de jure' government.
The people in the corporation conglomerate called the
'Australian Government' are not in office lawfully, governing over the
Australian people, the people of the state, 'subjects' of Her Majesty through
fear, extortion, intimidation, threats of violence or incarceration for not
heeding to corporate agreements.
The people are literally the enemy of this machine called
the 'Australian Government'.
See what Sydney
Criminal Lawyers wrote on this topic (text only version):
Although the legislation enabling the scheme was passed in October 2015 – and data has been stored and accessed since then – last week marked the end of the ‘implementation period’.
This means everyone’s online activities are now being stored by Internet Service Providers – and must be released to a whole host of government agencies upon request, without those agencies having to obtain a warrant.
Journalist Quentin Dempster described the laws as turning “this country’s entire communications industry… into a surveillance and monitoring arm of at least 21 agencies of executive government.”
Why these laws are concerning
While the content of your communications is not meant to be looked at, the legally accessible data can still paint a detailed picture of your online activities – potentially enabling government agents to use selected data to bolster allegations against intended targets, or to track, hunt down and prosecute whistle blowers.
Indeed, government agencies including the Australian Federal Police have already admitted investigating many journalists and even doctors who have been critical of government policies and actions, by accessing their metadata.
The new legislation will make it a lot easier for these agencies to hunt down whistleblowers who expose government misconduct.
Data that can be legally accessed without a warrant includes:
- Telephone records
- The time and length of phone calls
- The internet protocol addresses (IP addresses) of computers from which messages are received or sent
- Location of parties making phone calls
- To and from email addresses on emails
- Logs of visitors to chat rooms online
- Status of chat sites – whether they are active and how many people are participating
- Chat aliases or identifiers (the name a person uses in a chat room online)
- Start and finish times of internet sessions
- The location of an individual involved in communications
- The name of the application someone uses online and when, where and for how long used
However, the new laws have indeed been used to target people for a range of purposes which were not previously disclosed.
Use of metadata to date
Last year, it was revealed that over 60 Government agencies had applied to the Attorney-General for metadata access. The list includes the Australian Taxation Office, Department of Human Services, and even local councils.
In fact, Bankstown Council applied for metadata access in order to catch illegal rubbish dumpers and those who breach by-laws. That access was granted. And the Queensland Police Service used the scheme to access the metadata of cadets in an attempt to determine whether they were sleeping with one another, or faking sick days.
To many, dumping rubbish, monitoring the sexual activities of cadets or even evading tax is not enough to justify sacrificing the privacy of the entire Australian population – especially when the reason put forth for the implementation of the laws was to fight against terrorism and organised crime.
Protecting your privacy
There are many perfectly legal ways to circumvent the government’s metadata scheme. Here are just a few of them.
Hide your browsing data using a Virtual Private Network (VPN) service:
VPN’s work by creating a secure connection between your computer and another network. While you can still browse the internet freely, VPNs allow you to do this through the other network – disguising your tracks.
The only metadata that will be recorded is your connection to the other network. Electronic Frontiers Australia and Digital Rights Watch both have good introductions to choosing a VPN.
Protecting your emails by using online services:
If you use an email address supplied by your ISP (ie. @optus, @bigpond etc) they will be forced to record the address you emailed, attachment names, file sizes and location from which you send.
However, if you use an overseas browser-based email services, like Gmail or Hotmail, all your ISP can record is that your location, and how long you were connected to that service – and if you’re using a VPN they won’t even be able to see that.
Using Facebook Messenger to protect your SMS:
If you send a SMS from your phone, your ISP will record the number you SMSd, the time of the sms, its size and your location. However, this can be easily protected by using an App, such as Facebook Messenger or iMessage, that comes preloaded onto your phone.
Much like using a browser based email service, this will mean that they can only record the time you accessed the service, size of data exchanged, and your location – again, even this will be protected if your using a VPN.
Usings Skype to protect your phone calls:
If you make a call from your mobile phone, your ISP will record the number you called, the time of call, its duration, and your location.
However if you call using a smartphone app, such as Skype, Signal or Facebook Messenger, then they will only be able to record the time of your connection, and the amount of data used, and your location – again, you can protect against this by using a VPN.