1. VPN technology could be used to remain unaffected from such data retention law. A normal internet user or business could connect to any VPN company based out of USA, Australia or Europe like “PureVPN” to remain secure.

    • why would they want to retain VPN metadata? The vast majority of it is point of sale data between stores and their head offices.

      • meta data for vpn can still be useful in correlation attacks. people have been caught who used TOR this way.. not as useful, but still useful.

  2. Recently, Rightscorp, the leading anti-piracy firm, managed to win a patent to safeguard against piracy, in the wake of Australia becoming the worst country for piracy concerns. he Data Retention Australia law is here!

  3. What’s a VPN and how does it work?
    A VPN encrypts traffic between two end points on the Internet creating a secure tunnel that does not let any external entity to intervene; note that it has nothing to do with providing access to internet. The regular Internet traffic goes directly from you to the websites (and other resources) you connect to, and back. Your ISP transmits all your Internet packets for you.

    What is your ISP capable of?
    Everything you do is visible to the ISP. The ISP knows where you are connecting to and can read all your unencrypted traffic. The ISP charges you for the access to internet, which is a must-have if you need to browse online and therefore carries a high price. An ISP can even hack into your computer if he wants to and there’s nothing you can do about it.

    How would a VPN save you?
    A VPN can be referred to as an extension that provides secure browsing over the internet. As described earlier, a secure tunnel won’t let your ISP or even the government spy on you or your activities. And if the ISP grows suspicious, then there’s feature call Split tunneling available in limited VPNs such as Ivacy VPN (https://www.ivacy.com/ ). This feature lets you decide what you want to show to your ISP, and what you don’t. The activities that you don’t want to share with your ISP will stay hidden.

  4. Good for nothing fascists and their fascist fraud schemes to defend their fascism and their corporate donors.

    Don’t ever give Liberals control of anything to do with technology, they are techno illiterate idiots and like to distract and avoid answering questions for as long as possible.

    • Crudely expressed but imo very accurate!

      Welcome to Corporate sponsored Fascism folks, see the TPP if in doubt (oh wait, you cant it’s secret … wonder why!!!)

      • Hahaha yeah and Labor are so much better… lets face it, with the exception of maybe a few ministers the vast majority on all sides of politics haven’t got a f***ing clue when it comes to technological decisions

  5. Absolute fucking circus. It’s mind boggling that more than half the country wants to vote these people back in.

    • This is not a Lib vs Lab issue. They are both guilty in this. Let’s not forget that they both voted for this.

      • Both parties failed by voting for this but it is up to the current government to implement and administer it.
        On both counts they failed.

        • and this is why we should have been voting Green.

          Who had the most sensible policy when it came to the NBN, the economy, the environment (duh), who would be protecting the privacy of australians whilst disengaging from conflicts that make us a target in the eyes of extremists.

          I’m sure some shrill is going to reply with some sort of quote from a Murdoch rag supposedly showing a ‘loony green’ or better still some banal and vexatious insult about how the Greens are crazy.

          • You know what? Id actually like to see the Greens get a shot at a term running the country… It would be interesting to watch another party fuck it all up for a change

        • Lab voted for it sure, but it’s Lib who have completely failed in implementing it. It’s one thing to create a fascist policy, quite another to turn ISPs into criminals and force them to close for financial reasons by failing to fulfill your share of the responsibility.

  6. This survey covers the top tier ISPs. If they are struggling, imagine what’s going on with the hundreds of smaller operators who are not members of the Communications Alliance.

  7. I’m convinced this is about internal politics. When Brandis has to admit policy failure both he and it will go.

    I’m the mean time the PM can just stand back and wait.

  8. The compliance burden on ISPs is something that is too often overlooked here. The cost to have staff review each request to validate it’s source (is this from an approved agency/our approved contact within that agency), scope (is the metadata requested within that agency’s remit), and legal standing (is a warrant required, and has it been correctly completed) is going to exceed by orders of magnitude any technical costs of retention/recovery. Given that similar interactions, and requests can take hours to resolve, and verify how can we hope to see even the most profitable ISPs come through this intact? Especially given that ACMA has previously reported more than half a million requests per annum, and this number can only be expected to rise as the quantity, and scope of retained data increases, and more agencies gain access.

    • The problem is they can’t validate it. Eg if it’s data of a jerno like Renai the telcos have to accept the word of the law enforcement asking the request has followed the right procedures it even worst that the judge providing over the request doesn’t get to know why they want to access the data

      • The former data access legislation did not need a judge to approve its access. Are you sure this does?

        • My understanding is that certain agencies have warrantless access, where if it is similar to the current system, they can simply complete a form and lodge it with providers to request the data. Warrants are only required by agencies who do not have access to this data by default.

          • “Warrants are only required by agencies who do not have access to this data by default.”

            Section 282 and 283 states that service providers are obliged to provide law enforcement with anything they’ve aske for as long as its in relation to a crime.

            The form that they send (which i had a hand in creating many many years ago) doesn’t provide any sort of information that would allow a provider to verify that a crime has occurred. Basically if they receive it from the agencies communication centre then they are obliged to provide the requested data.

            The only except and only time a warrant is required is in relation to a intercept.

            However with all this data they don’t need to listen to a coded conversation. With surveillance data (photos, number plates etc) combined with the years of medata they can get now law enforcement agencies will be able to prove probable cause without any problem. They’ll get their warrants from a judiciary that is utterly beholden to the police and feds.

            I’d imagine one of the first steps the law enforcement agencies will do with this data is use it to discover the relationships their own officers have with certain individuals. They’ll subsume the data into their own data warehouses and crunch it. Creating pretty maps of relationships.

            One if you if you reverse searched peodphiles going back several years what relationships you’ll find?

            I don’t get why the ALP was so quick to back the Liberals on this. The entire act went through parliament with amazing efficiency, almost unheard of in Canberra.

            What’s going on? What is the real story? Who are the real targets?

      • And that’s where it’s up the ISP/Telco. They can just accept every single request at face value, or they can take the time to confirm, and check all the information to ensure that each request is compliant.

        I know which I would prefer them to do.

        I know which one they do any time a customer lodges a FOI request.

        But we also know that for most, the almighty dollar will guide them far more than ethics, and the protection of their customers.

  9. Judge is only needed for jernos and the ISP will still have know idea if the law enforcement has gone to a judge or not

    • ISP is breaking law if they divulge a journalists metadata without a warrant. But how does ISP determine that a warrant less request does not relate to a journo? They can’t without asking the person involved.

  10. The ISP don’t know what data they need to keep and based on an interview on ABC radio this morning the AG still doesn’t know either despite it ‘being clearly defined in the legislation’ (paraphrasing the AG when he avoided answering the question).

  11. TIL: The fact that laws that are designed to not be fully implemented until mid-2017 are not implemented today is evidence that they’ve been “comprehensively bungled”. The majority of the industry seems to be using the implementation plan process contained in the laws to, you know, implement this over the full two year window.

    I know you don’t like data retention Renai. But this site has always been about impartial reporting and not hyperbole.

    • ISPs will comply, because they have to.

      It’s very apparent that the Government has rushed the solution, without the department actually being in a place to action any of it in a timely manner; let alone the ISPs who pretty much have to describe their process.

      Which is pretty common for any number of rushed solutions. The press will still report the situation as a bit of a cluster-fuck – because really it actually is. The timelines were beyond hopeful and into the realms of fancy.

  12. Minister: We need to retain the metadata’s they might escape to who knows where!
    Industry: Why?
    Minister: Jehadis!!!!1
    Industry: No really, why?
    Minister: I have reasons but for operational matters I can’t tell you what they are.
    Industry: Wait, how are we supposed to pay for this?
    Minister: Submit a plan on how you’ll retain the metadata lest it escapes!
    Industry: But how are we supposed to pay for this?
    Industry: …
    Industry: fine, here is a proposal on how we can store (massively invasive) data about people
    Minister: BROFIST!
    Industry: .. it’s 500 pages, took ages to prepare and cost quite a bit
    Industry: it will take us months to put the equipment in that you want
    Industry: you are instituting a massive surveillance state that might make us unprofitable
    Industry: minister we need more time
    Industry: you don’t actually know what you want, do you.
    Industry: but how are we supposed to pay for this?

    • I am sure you missed these comment “Turn back the DATAS, Any DATAS that arrive by boat will turned back around”
      “DATAS arriving by sea funds terrorists”

  13. the weak fear the weaker and attempt to take liberty from the strong to fight a war that they create to appease their insecurity when it was their insecurity which made them weak. what a pack of bloody galahs.

  14. So do Government Depts that supply internet to their staff classify as an ISP? Do they have to retain data, and are they ready to comply ?

  15. The reason for this mess is obvious, just look at George Brandis eyes in the picture at the top, George has been smoking too much pot.

  16. I emailed an ISP on this during the week, asking a direct question on whether or not metadata was being (or would be) stored when we use their SMTP server.

    I received a copy of their _privacy policy_ back in response.

    I’ve since asked them to clarify with a Yes or a No.

    This is going to get rather messy methinks.

  17. Can we get someone (eg Senator Ludlam) to propose a law that would require the post office to keep a 2-year record of every letter they send? After all, metadata is just like the information on the outside of a letter, right?
    Or even better, can we get said senator to propose a law that would require people in Australia to have a GPS tracker implanted at birth (or at the airport for tourists)? Why use half-measures of tracking everyone’s location through their phone, when some terrorists might not even have phones!!

  18. It’s really a cool and helpful piece of information. I am satisfied that you just shared this helpful info with us.
    Please keep us informed like this. Thanks for sharing.

Comments are closed.