Home Government Tech Policy Encryption bill will hit family violence victims: claim
Encryption bill will hit family violence victims: claim Pixabay Featured

The South Eastern Centre against Sexual Assault and Family Violence (SECASA) has told the Federal Government that passage of its encryption bill would put those at risk of family violence in greater danger.

In a submission to the public consolation on the draft bill, Carolyn Worth, the manager of SECASA, said the broadening of the Telecommunications (Interception and Access) Act 1979 was unwarranted and would be detrimental to all citizens, especially those with a background of family violence and/or sexual assault.

The period for public comment on the bill, which is officially known as the Telecommunications and Other Legislation Amendment (Assistance and Access) Bill 2018, ended on 10 September after the draft was released on 14 August.

Home Affairs Minister Peter Dutton introduced the bill into Parliament on 20 September. One day has been set aside for a hearing before the Parliamentary Joint Committee on Intelligence and Security.

Ten submissions were put online on 14 September and then another 101 were released. This morning, a further 232 were made accessible.

Worth said the new legislation, by seeking to access all citizens' activities conducted on telecommunications devices, would be able to create an atmosphere of control and fear, especially for those who had suffered family violence.

The amendment would, thus, bring about an atmosphere of fear and coercion.

"Family violence often includes privacy violations such as surveillance, monitoring, or other stalking. For a family violence victim, privacy in relation to their activities goes hand in hand with their physical safety," Worth said.

"These activities might be seeking information about how to escape from an abusive relationship, electronically storing evidence of abuse or critical documentation as part of a safety plan."

She said the amendment would enable authorities and those collecting data to access all telecommunications activity "which mimics the same control exerted over victims by their abuser".

"Survivors will feel that no matter where they go or what they do electronically, just like in the family violence they have suffered, they will not be able to escape this controlling relationship, regardless of if their activities are law abiding or not," she said.

A second problem with the amendment, Worth claimed, was that it would provide the ability for proxy stalking. "Workers identified Facebook as a platform that perpetrators use to proxy stalk women," she said. "Proxy stalking refers to a perpetrator using the activities of other people against the victim.

"In a family violence setting this technique is used to heighten a woman’s feelings of isolation by conveying the impression that the perpetrator does not need to be present to control her; he can monitor her via other people and, in so doing, create the impression that no matter where she goes, she will not be safe from him."

It could also affect those with post traumatic stress disorder, Worth said. "Knowing that there is the possibility of having all telecommunication activities, including those with an expectation of privacy, examined by a third party and possibly used against them, may trigger PTSD in survivors of family violence."

She said stalking could have an effect on mental health. "This amendment will permit the government and its authorised representatives to become proxy abusers by subsuming the same powers as the family violence abuser of coercion and control."

An additional downside to the amendment was the misuse of information. Worth pointed out that one in six women were affected by family violence and some of them would be in relationships with those who constituted “officers and authorities of the Commonwealth and of the States and Territories” [as stated in the draft bill].

"A percentage will be in a relationship with or have a connection to workers in the telecommunications industry who have access to the private data this amendment proposes is to be gathered and stored. This amendment will give them carte blanch to invade the privacy of their current or ex partners without any checks or balances. If this amendment goes ahead, how does the government proposed to stop this happening?" she asked.

Worth recommended that if the amendment went ahead, police should be allowed to have access to the private data of perpetrators of family violence so they could pass this on to the victims. "In this way both police and victims can keep informed at all times of their abusers’ whereabouts and activities and take appropriate actions," she added.

The SECASA provides sexual assault and family violence services in Victoria within the Mornington Peninsula, Frankston, Bayside, Port Phillip, Stonnington, Glen Eira and Kingston local government areas. It also provides services to children and adults, both female and male, who have been sexually or physically assaulted.

47 REASONS TO ATTEND YOW! 2018

With 4 keynotes + 33 talks + 10 in-depth workshops from world-class speakers, YOW! is your chance to learn more about the latest software trends, practices and technologies and interact with many of the people who created them.

Speakers this year include Anita Sengupta (Rocket Scientist and Sr. VP Engineering at Hyperloop One), Brendan Gregg (Sr. Performance Architect Netflix), Jessica Kerr (Developer, Speaker, Writer and Lead Engineer at Atomist) and Kent Beck (Author Extreme Programming, Test Driven Development).

YOW! 2018 is a great place to network with the best and brightest software developers in Australia. You’ll be amazed by the great ideas (and perhaps great talent) you’ll take back to the office!

Register now for YOW! Conference

· Sydney 29-30 November
· Brisbane 3-4 December
· Melbourne 6-7 December

Register now for YOW! Workshops

· Sydney 27-28 November
· Melbourne 4-5 December

REGISTER NOW!

LEARN HOW TO REDUCE YOUR RISK OF A CYBER ATTACK

Australia is a cyber espionage hot spot.

As we automate, script and move to the cloud, more and more businesses are reliant on infrastructure that has the high potential to be exposed to risk.

It only takes one awry email to expose an accounts’ payable process, and for cyber attackers to cost a business thousands of dollars.

In the free white paper ‘6 Steps to Improve your Business Cyber Security’ you’ll learn some simple steps you should be taking to prevent devastating and malicious cyber attacks from destroying your business.

Cyber security can no longer be ignored, in this white paper you’ll learn:

· How does business security get breached?
· What can it cost to get it wrong?
· 6 actionable tips

DOWNLOAD NOW!

Sam Varghese

website statistics

Sam Varghese has been writing for iTWire since 2006, a year after the sitecame into existence. For nearly a decade thereafter, he wrote mostly about free and open source software, based on his own use of this genre of software. Since May 2016, he has been writing across many areas of technology. He has been a journalist for nearly 40 years in India (Indian Express and Deccan Herald), the UAE (Khaleej Times) and Australia (Daily Commercial News (now defunct) and The Age). His personal blog is titled Irregular Expression.

 

Popular News

 

Telecommunications

 

Sponsored News

 

 

 

 

Connect