Feeds

Oz Ombudsman calls for wiretap oversight

Sniffs at poison chalice

Next gen security for virtualised datacentres

With both political parties and most law enforcement agencies devoted to implementing more data retention in Australia's Internet, the Commonwealth Ombudsman has suggested it could have a role in overseeing such a regime.

Ombudsman Colin Neave has told the Senate committee reviewing Australia's telecommunications interception act that his body could handle the role with appropriate resourcing. He also said stronger public reporting mechanisms are needed to make Australia's metadata retention regime more transparent.

Its submission (available from the committee (page here) says there is “a clear requirement for the Ombudsman to ascertain agencies' compliance with the telecommunications interception and stored communications access provisions”.

While the office would not have the resources to test the compliance of agencies in the light of so much metadata collection, Neave told the committee a sampling regime combined with high-level oversight of agencies' processes would be feasible.

Meanwhile, Narelle Clark, president of the Internet Society of Australia, told the committee that the lack of standards defining what can be considered “metadata” is hampering both the debate and the legislative review.

Unlike the world of telephony, where the difference between metadata and content is clearly defined, the world of IP communications has no such technical specifications, she said.

“There needs to be clear technology standards for this," she said, so that equipment and applications can be built with data retention requirements in mind, with appropriate control.

"None of that I believe is in evidence at this point in time,” she said.

Clark also singled out the idea that system logs can be considered metadata repositories for criticism, saying that logs are designed for fault-finding, and are extremely verbose (and, The Register would add, frequently intrusive), containing “all sorts of detail” about connection attempts (whether or not they're made), route selection and other extraneous information. ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
Munich considers dumping Linux for ... GULP ... Windows!
Give a penguinista a hug, the Outlook's not good for open source's poster child
UK fuzz want PINCODES on ALL mobile phones
Met Police calls for mandatory passwords on all new mobes
e-Borders fiasco: Brits stung for £224m after US IT giant sues UK govt
Defeat to Raytheon branded 'catastrophic result'
Yes, but what are your plans if a DRAGON attacks?
Local UK gov outs most ridiculous FoI requests...
Detroit losing MILLIONS because it buys CHEAP BATTERIES – report
Man at hardware store was right: name brands DO last longer
Snowden on NSA's MonsterMind TERROR: It may trigger cyberwar
Plus: Syria's internet going down? That was a US cock-up
UK government accused of hiding TRUTH about Universal Credit fiasco
'Reset rating keeps secrets on one-dole-to-rule-them-all plan', say MPs
Caught red-handed: UK cops, PCSOs, specials behaving badly… on social media
No Mr Fuzz, don't ask a crime victim to be your pal on Facebook
EU justice chief blasts Google on 'right to be forgotten'
Don't pretend it's a freedom of speech issue – interim commish
prev story

Whitepapers

Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Solving today's distributed Big Data backup challenges
Enable IT efficiency and allow a firm to access and reuse corporate information for competitive advantage, ultimately changing business outcomes.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.