Opposition: we passed Australia's 'spook's charter' on PURPOSE

'Picking battles' is strategy, not stupidity, anonymous source claims


Australia's opposition has defended its stance on Australia's new national security laws, which provide maximum ten-year jail sentence for nat-sec leakers, by leaking its leader's attitude to a national media outlet.

The draconian laws also allow ASIO to apply for a warrant to invade a computer network – without any limit on the size of the network – and to add or change data on target computers, as well as jailing anyone (including journalists) found guilty of “recklessly” revealing details of “special intelligence operations”.

Third-party computers are included in the laws, meaning that even individuals not suspected of any crime or terrorist-like activity could find themselves under attack by spook-ware, merely because they seemed to share a network connection with a target.

The laws were waved through by the Labor opposition in the Senate last week, and are expected to get the same treatment in the House of Representatives this week.

Making excuses for “running dead” on the issue, unnamed sources in the ALP have told Fairfax the party decided to “pick its battles”, meaning it reckoned on a media thrashing if it tried to defang the more onerous provisions of the laws.

According to the leaker off-the-record briefer, the opposition “does not want to be seen as obstructionist on the the politically-sensitive issue” of national security, Fairfax states.

The news of the opposition's acquiescence comes just days after the government gave The Australian a peek – yet another leak – at its current wish-list for metadata retention, which includes sweeping outfits like Skype, Twitter, Facebook and other social networks in the net. ®

Similar topics

Narrower topics


Other stories you might like

  • Will this be one of the world's first RISC-V laptops?
    A sneak peek at a notebook that could be revealed this year

    Pic As Apple and Qualcomm push for more Arm adoption in the notebook space, we have come across a photo of what could become one of the world's first laptops to use the open-source RISC-V instruction set architecture.

    In an interview with The Register, Calista Redmond, CEO of RISC-V International, signaled we will see a RISC-V laptop revealed sometime this year as the ISA's governing body works to garner more financial and development support from large companies.

    It turns out Philipp Tomsich, chair of RISC-V International's software committee, dangled a photo of what could likely be the laptop in question earlier this month in front of RISC-V Week attendees in Paris.

    Continue reading
  • Did ID.me hoodwink Americans with IRS facial-recognition tech, senators ask
    Biz tells us: Won't someone please think of the ... fraud we've stopped

    Democrat senators want the FTC to investigate "evidence of deceptive statements" made by ID.me regarding the facial-recognition technology it controversially built for Uncle Sam.

    ID.me made headlines this year when the IRS said US taxpayers would have to enroll in the startup's facial-recognition system to access their tax records in the future. After a public backlash, the IRS reconsidered its plans, and said taxpayers could choose non-biometric methods to verify their identity with the agency online.

    Just before the IRS controversy, ID.me said it uses one-to-one face comparisons. "Our one-to-one face match is comparable to taking a selfie to unlock a smartphone. ID.me does not use one-to-many facial recognition, which is more complex and problematic. Further, privacy is core to our mission and we do not sell the personal information of our users," it said in January.

    Continue reading
  • Meet Wizard Spider, the multimillion-dollar gang behind Conti, Ryuk malware
    Russia-linked crime-as-a-service crew is rich, professional – and investing in R&D

    Analysis Wizard Spider, the Russia-linked crew behind high-profile malware Conti, Ryuk and Trickbot, has grown over the past five years into a multimillion-dollar organization that has built a corporate-like operating model, a year-long study has found.

    In a technical report this week, the folks at Prodaft, which has been tracking the cybercrime gang since 2021, outlined its own findings on Wizard Spider, supplemented by info that leaked about the Conti operation in February after the crooks publicly sided with Russia during the illegal invasion of Ukraine.

    What Prodaft found was a gang sitting on assets worth hundreds of millions of dollars funneled from multiple sophisticated malware variants. Wizard Spider, we're told, runs as a business with a complex network of subgroups and teams that target specific types of software, and has associations with other well-known miscreants, including those behind REvil and Qbot (also known as Qakbot or Pinkslipbot).

    Continue reading

Biting the hand that feeds IT © 1998–2022