Feeds

Data retention saves Australia from TERROR says Labor MP

MP Anthony Byrne whacks the 'liberty licenses our enemy' drum

Former chair of Australia's Parliamentary Joint Committee on Intelligence and Security (JCIS), Labor MP Anthony Byrne, has urged the nation's federal government to implement data retention legislation to prevent what he calls “imminent” terrorist attacks.

In a speech to parliament on Monday July 14, Byrne said the government should bring all of the recommendations made in a 2013 JCIS (JCIS) report before parliament for debate, as soon as possible.

Referring specifically to data retention, he said “Inevitably and in the not-too-distant future we will have an event on Australian soil”, and that “I don't want to see data retention debated … after an event has occurred”.

Byrne told parliament an attack “of the magnitude of the Bali event” is inevitable and would be prevented by data retention laws.

The government's failure to bring the report's 43 recommendations to parliament means that it isn't giving security agencies all of the powers they have been asking for, he said. Regarding critics of data retention laws, Byrne said that “in some sections of the media and some sections of the commentariat” there was discussion of liberty, “but there's not a discussion about the threat that is posed to Australian citizens”.

A variety of bodies, from police to intelligence agencies, has long been lobbying for Australian carriers and ISPs to be required to retain telecommunications metadata for periods ranging upwards from two years. The industry has resisted such calls on the basis of cost and the security of such data.

The committee report, here, has been left on the “too controversial” list by both the previous and current government, although there have been reports that the Attorney-General George Brandis is preparing legislation based on Chapter 4 of the report.

Among other things, that chapter deals with how computers are defined in national security legislation, how agencies are allowed to access target computers, the use of third-party computers or networks in accessing targeted machines, and offers a model under which agencies could launch attacks against target computers and networks.

The opposition has clearly decided that data retention gives it a lever to use against the government. Both Byrne and, in this Facebook post ALP member Michael Danby, accuse the government of avoiding the committee's report at the behest of right-wing think tank the Institute of Public Affairs.

The full video of Byrne's speech is below. ®

Youtube Video

More from The Register

next story
Phones 4u slips into administration after EE cuts ties with Brit mobe retailer
More than 5,500 jobs could be axed if rescue mission fails
Apple CEO Tim Cook: TV is TERRIBLE and stuck in the 1970s
The iKing thinks telly is far too fiddly and ugly – basically, iTunes
Huawei ditches new Windows Phone mobe plans, blames poor sales
Giganto mobe firm slams door shut on Microsoft. OH DEAR
Phones 4u website DIES as wounded mobe retailer struggles to stay above water
Founder blames 'ruthless network partners' for implosion
Found inside ISIS terror chap's laptop: CELINE DION tunes
REPORT: Stash of terrorist material found in Syria Dell box
Show us your Five-Eyes SECRETS says Privacy International
Refusal to disclose GCHQ canteen menus and prices triggers Euro Human Rights Court action
prev story

Whitepapers

Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.