"All the World's a Stage We Pass Through" R. Ayana

Monday 16 December 2013

Template for a Global Prison: How Australia is Spying on Its Own


Template for a Global Prison
How Australia is Spying on Its Own

http://farm9.staticflickr.com/8436/7779763304_2c03fc67e6_o.jpg

 The Australian security state is collecting intelligence on an Orwellian scale never seen before

 
by Murray Hunter


Through rapid technology advances the Australian security apparatus has grown to an Orwellian scale. This has not necessarily been at the design of any elected government but something the Australian bureaucracy was forthright in promoting.

http://upload.wikimedia.org/wikipedia/commons/9/96/Asio_australian_security_intelligence.jpg
Photo courtesy of Chris Beer


The executive government has only superficial control over the Australian surveillance system. It is fully integrated with the NSA apparatus which immediately brings up an issue about sovereignty. This is not about a country’s sovereignty over land, but of knowledge. The international exchange of security information is a challenge to human rights of Australian citizens yet to be grappled with.

Consequently, it is not in the interests of the Australian or US intelligence community for any public or even parliamentary discussion. The idea that the parliament and executive are in total control of government is a myth.

Through technology and its innovative applications, the concept of privacy has been reframed to the point of anything a person does outside of the home or on a computer is public domain, captured through any of the large array of assets that can be utilized for surveillance.

This has allowed the creation of a new premise that has grown up through the administrative arm of the Australian Government. One of compliance. Australia seems to have adopted an almost fanatical compliance culture where the administrators believe that they are the natural custodians of Australia’s security interests, over the temporarily elected politicians of the day.

Some of the methods the Australian security state utilizes for intelligence gathering, storing, and collation are well documented and summarized below:

  • With a strong public backlash against the development of a national identity card system in 1986, the Australian Taxation Office (ATO) developed the tax file number system as an alternative. A tax file number is necessary for anybody to be employed, claim social security benefits, and open a bank account, etc. As computer technology, data storage became more efficient, and data management and communications systems improved, a national government database was developed.

Australia is considered a world leader in the use of technology in government administration. The Australian Government database is a highly sophisticated group of electronic document and records management system(s) (EDRMS) for collating, storing, and matching data between various agencies and levels of government on citizens. Consequently data collected by the Australian Taxation Office (ATO), social security (Centrelink), Medicare, immigration, customs, and police enforcement agencies are integrated with relational databases and query systems.

This is supplemented by individual agency databases with extremely detailed information on citizens. They carry an almost complete personal history of residential details going back decades, income, occupation, spouses, children, social security benefits, medical, and travel information, etc. These systems can be accessed by almost anybody within the public service. Every agency within the government has become part of the intelligence collection network.

According to academics Paul Henman and Greg Marston of the University of Queensland, these systems that enable agencies to determine client eligibility for services are highly intrusive and used with a prevailing deep suspicion of citizens in regards to their continuing eligibility for services.

  • The most recent revelations in the news about the ‘five eye’ countries eavesdropping on their citizens phone conversations, emails, and other electronic communications has been astounding. Through meta-data collection systems like PRISM and ECHELON are highly likely to be also operating within Australia due to the close relationship between the NSA and Australian intelligence community. According to AFP assistant commissioner Neil Gaughan, Australian intelligence has a much better relationship with the telecommunications companies than the US intelligence agencies. However this doesn’t appear to be a new occurrence. A reliable source working within one of the Australian telephone companies when manual exchanges were operating confirmed that ASIO and state special branches had secret rooms within the exchanges to run phone tapping operations.

The relatively high number of requests from Australia’s security agencies for user information from internet companies like Google compared to other countries indicate that the Australian agencies are one of the most active in the western liberal democratic world when it comes to surveillance of its own citizens.

  • The NSW police are using an Automated Number Plate Recognition (ANPR) system which takes continuous snapshots of car number plates. This is supplemented by tracking cars when they go through tolls.



The incredible power of the above described databases are exponentially enhanced when coupled with recent developments in cellular, RFID, internet, and other computer technologies. When private data in retail, banking, travel, health and insurance, etc., is linked to Intelligence collected by government, the value of data becomes massively enriched. Data collected by private organizations and utilized by security services include:

  • The internet domain is under constant surveillance. Companies like Google, Yahoo, Facebook, and twitter utilize tracking cookies to gather data on users. Australian security agencies employ private contractors like the National Open Source Intelligence Centre (NOSIC) to monitor, collate, and report on publically accessible information about individuals and organizations.

  • Many business organizations such as shopping centres and banks now utilize CCTV. These assets can be utilized by security organizations to track and monitor individuals. This is now being supplemented with media access control (MAC) systems which can track smartphones. This technology is already being used in three Westfield shopping centres.

  • Numerous private databases like electronic tenancy database which has detailed information. These include tenancy history, insurance company records that detail individuals insured assets, bank records, and university records. These can all be accessed by security agencies.

  • Mobile phones can be used as a means to track people through inbuilt GPS on smartphones, triangulation, or through electronic data-collectors designed to identify individual mobile phones in public places.

  • People’s purchase history and movements can be tracked through the use of credit, debit, and loyalty card purchases.
 
http://upload.wikimedia.org/wikipedia/commons/8/8a/Bansky_one_nation_under_cctv.jpg

Each piece of data in isolation can only provide a limited profile of any individual. However the power of information technology today is being able to collate, merge, and combine separate pieces of information so that a full and rich profile of any individual can be developed.

Emails, phones calls, places people go, and purchase history, in the context of other data collected has the latent potential to build up a profile on anybody. Data from social media like Facebook can enhance these profiles greatly by adding thought and behavior information. It’s the collection of small bits of information that can be collated into big pictures. Australian intelligence can retro-actively analyse anybody with the data they have access to.

Since 2007, when amendments to the Telecommunications (Interception & Access) Act 1974 were made during the last days of the Howard Government, government agencies have the power to search meta-data without the individual’s knowledge or any warrant.

CCTV cameras have been installed in many communities without the development of privacy policies on how they should be used. The law has yet to catch up with the ability to collect data.

Up until the 1980s most intelligence gathering was targeted monitoring of specific groups where persons of interest were identified for intensive surveillance. ASIO and state special branches were videotaping activists primarily from the ‘left’. Trade unionists, human rights activists, ethnic community groups, religious leaders, and even governors were targets. Surveillance was undertaken by ASIO and state special branches, where operatives used electronic means for eavesdropping, keeping index cards and files on ‘persons of interest’, recording mainly hearsay information.

Government databases were agency based and most often localized with little or no connection to larger databases. Cross referencing people on these various databases was extremely time consuming and very difficult.

Even then, red flags emerged. Peter Grabosky of the Australian Bureau of Criminology pointed out that ‘thought and discussion of public issues may be suppressed……and….excess use of (surveillance) may inhibit democratic and political freedom more subtly’. In addition, he believed that malicious accusations made from erroneous records produce false information which made innocent people suffer at the hands of the security agencies.

This problem can’t be corrected as these records are not assessable to be corrected for errors. The Mohamed Haneef arrest by the AFP in July 2007 where it was alleged he was connected with a terrorist cell in the UK, but later exonerated, hints at the security services being very territorial and ‘out of control’, where ASIO knew of Dr. Haneef’s innocence but didn’t advise the APF.

Faceless bureaucrats are the ones defining who are the enemies of the state. There appears to be a general inability to discriminate between healthy dissent in a political democracy and subversion.

Where no tangible threats existed to national security, lesser ones were perceived to be grave threats or even invented – remember “weapons of mass destruction” in Iraq. There seems to be an impulse by those within the security services to justify their existence and perpetuate what they are doing. What-more, they don’t see themselves responsible to the elected government of the day, but rather loyal to “The Crown”. This encouraged an attitude intelligence operatives feel they are not accountable for their actions to the executive of the day.

The rise of surveillance should not be understood as purely a technological development. It should be seen as a broader economic, social, and political paradigm shift within society where the balance of power has shifted away from the people and towards the state. There also appears to be a shift of power away from executive government towards an unelected bureaucracy. What makes this even more perplexing is that we don’t even know who these people really are.

With a history of security bungles, how wide are abuses of power by the Australian Security Apparatus? The Australian Security Intelligence Organization (ASIO) was caught tapping the phones of ordinary and unsuspecting Australians by the Inspector-General of Intelligence and Security. No one knows how wide these abuses really are.

The Age and Sydney Morning Herald just ran a story that intelligence data was passed on to assist the mining giant BHP. Moreover, the human rights website WEBMOBILIZE alleges in a recent article that the Australian security apparatus is being used to steal intellectual property from companies and passing it over illegally to competitors. Some of the organizations that have been alleged to receive unlawfully gained IP include the University of Melbourne, Ageis Media, Telstra, Sensis, Deakin University, Belgravia Health and Business Group, Channel Nine, Nine Entertainment, Nine MSN, Corporate health management, Fairfax media, the Herald Sun, The Guardian, Nintendo, and the Australian Labor Party (ALP)and Liberal National Party (LNP). This interlinked relationship between private corporations and the intelligence agencies is allowing some corporations to benefit over others illegally, subsidized by taxpayer dollars.

There has been little in the way of public debate, nor much concern shown by the major political parties. The issues raised by surveillance, now on the Orwellian scale in Australia, are concerning as they are operating at a much higher magnitude than any other liberal democracy.

The powers to detain anyone under section 34D of the Australian Security Intelligence Organization Act 1979 for up to seven days without the right to reveal their detention, resembles the mechanisms of a police state.

The Australian Government collects more information on its citizens than the East German Stasi did on its citizens during the cold war.

As Eric Schmidt of Google says “surveillance is just part of society now”. Surveillance is not something external to the individual anymore. We actually live within the “matrix” of surveillance of which we cannot escape.

With an annual growth rate of more than 20% and budget of over $4 Billion p.a., ASIO has a new $500 Million building in Canberra and a secret data storage facility is being built at the HMAS Harman Naval Base, near Canberra, where details are except from public account committees. When other government programs are being cut, the deep philosophical question of why there is a need to continue the increase of funding for surveillance of the nation’s citizens requires national discussion.

Mass surveillance doesn’t seem to have much to do with terrorism as it has to do with keeping check on what people are doing. It seems to be more of an intimidating compliance mechanism, aimed at protecting public revenue, preventing and detecting crime, tax evasion, and fraud.

The rapid increase in staff within ASIO from 618 in 2000 to 1860 in 2010 has meant that the organization now primarily relies upon young and inexperienced analysts in their 20s and 30s. This means that Australia is at the mercy of a “Gen Y” culture that has grown up connected to the cyber world where a sense of privacy is very different to generation before them. Newly uncovered evidence suggests that ASIO has gone to great lengths to spy on people who have broken no laws.

Through Australia’s history Australian Security Agencies have blundered in the assessments they have made on many issues. The 2004 Flood report commenting on the “failure of intelligence” on Iraq stated that these weaknesses included “a failure to rigorously challenge preconceptions”, and the absence of a “consistent and rigorous culture of challenge to and engagement with intelligence reports”. Flood found an inconsistency in assessments and very shallow analytical abilities within the security agencies he examined. On many occasions, particularly during the Howard years, intelligence analysis was ‘bastardized” by political agenda. Those who criticized the political agenda ran the risk of being reframed from dissidents and classed as deviants who came under security surveillance.

The question here, can government with a long history of cover-ups be trusted?

The dream of a fair, just, and equitable Australian society where sovereignty is in the hands of its citizens may be one of the greatest myths. Australia’s surveillance on its own has eaten into and taken away many of the rights and liberties of Australians, turning society into one of mistrust.

The growth of domestic intelligence gathering we see today is almost irreversible which hints at some form of “Animal Farm” leadership who is defining what our “truths” are. An important question here is who is actually doing this, if it is not our elected politicians?

This cannot be really satisfactorily answered relying only on public domain knowledge. We can only make guesses. However one undeniable fact is that there is presently a hidden and totally unaccountable part of government that is changing the nature of society. It is here where no media organizations are asking any questions.

Until this question is answered we are living in an illusion about what our society really is.

We have entered into a new period of governance. We are now in an age of governance by surveillance of the masses by a few unknown elite and unaccountable people. Communist totalitarianism may have collapsed in Europe in 1991 with the fall of the Soviet Union, but the “free world’s” version of surveillance and intelligence would have made Stalin, Honecker, and CeauÅŸescu very jealous.

The lack of transparency is becoming indefensible. Without scrutiny the Australian security apparatus is the loose cannon of the Bureaucracy which will cause many reverberations like the destruction of peoples’ livelihoods through IP theft, or the ruining of peoples’ reputations through persecution.

There has never been a public mandate for the development of such an extensive surveillance program. Is the money being spent justified?


From NSNBC @ http://nsnbc.me/2013/11/11/australia-spying/

http://upload.wikimedia.org/wikipedia/commons/8/80/Susan_Charles_Rankin_on_Human_Rights_Day_2005.jpg

For more information about the postmodern surveillance society see http://nexusilluminati.blogspot.com/search/label/surveillance%20society
- See ‘Older Posts’ at the end of each section


This is a ‘not for profit’ site -
But if you like what we do please buy us a meal or drink if you can
Donate any amount and receive at least one New Illuminati eBook!
Please click below - 

Xtra Images – http://farm9.staticflickr.com/8436/7779763304_2c03fc67e6_o.jpg
http://upload.wikimedia.org/wikipedia/commons/8/8a/Bansky_one_nation_under_cctv.jpg
http://upload.wikimedia.org/wikipedia/commons/8/80/Susan_Charles_Rankin_on_Human_Rights_Day_2005.jpg




For further enlightening information enter a word or phrase into the random synchronistic search box @ http://nexusilluminati.blogspot.com


And see




 New Illuminati on Facebook - https://www.facebook.com/the.new.illuminati

New Illuminati Youtube Channel - http://www.youtube.com/user/newilluminati/feed


New Illuminati on Twitter @ www.twitter.com/new_illuminati


The Her(m)etic Hermit - http://hermetic.blog.com


The Prince of Centraxis - http://centraxis.blogspot.com (Be Aware! This link leads to implicate & xplicit concepts & images!)



DISGRUNTLED SITE ADMINS PLEASE NOTE –
We provide a live link to your original material on your site - which raises your ranking on search engines and helps spread your info further! This site is published under Creative Commons Fair Use Copyright (unless an individual article or other item is declared otherwise by copyright holder) – reproduction for non-profit use is permitted & encouraged, if you give attribution to the work & author - and please include a (preferably active) link to the original (along with this or a similar notice).
Feel free to make non-commercial hard (printed) or software copies or mirror sites - you never know how long something will stay glued to the web – but remember attribution! If you like what you see, please send a donation (no amount is too small or too large) or leave a comment – and thanks for reading this far…

Live long and prosper!


From the New Illuminati – http://nexusilluminati.blogspot.com

 

No comments:

Post a Comment

Add your perspective to the conscious collective