2005
DOI: 10.1016/j.telpol.2005.06.010
|View full text |Cite
|
Sign up to set email alerts
|

Telecommunications interception in Australia: Recent trends and regulatory prospects

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2006
2006
2023
2023

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 13 publications
(9 citation statements)
references
References 6 publications
0
9
0
Order By: Relevance
“…Despite these claims however, they fail to detail the proposed model. Bronitt and Stellios (2005; also consistently raise concerns regarding the increasing use of interception technology by states and territories, rather than sole use by Federal agencies. What Bronitt and Stellios (2005; fail to acknowledge is that the growth of TOC is not limited to breaching only federal or state laws, indeed they are well known to exploit proposed restrictions (Irwin 2001).…”
Section: International Journal Of Social Science Researchmentioning
confidence: 99%
See 1 more Smart Citation
“…Despite these claims however, they fail to detail the proposed model. Bronitt and Stellios (2005; also consistently raise concerns regarding the increasing use of interception technology by states and territories, rather than sole use by Federal agencies. What Bronitt and Stellios (2005; fail to acknowledge is that the growth of TOC is not limited to breaching only federal or state laws, indeed they are well known to exploit proposed restrictions (Irwin 2001).…”
Section: International Journal Of Social Science Researchmentioning
confidence: 99%
“…Bronitt and Stellios (2005; also consistently raise concerns regarding the increasing use of interception technology by states and territories, rather than sole use by Federal agencies. What Bronitt and Stellios (2005; fail to acknowledge is that the growth of TOC is not limited to breaching only federal or state laws, indeed they are well known to exploit proposed restrictions (Irwin 2001). Providing all agencies with access to these methods is an integral part of the unification of Australian LEAs, a factor which is stressed as an essential requirement throughout the literature (Irwin, 2001;Glenn, Gordon & Florescu, 2008;Flood & Ratcliffe, 2008b;Gasper, 2009).…”
Section: International Journal Of Social Science Researchmentioning
confidence: 99%
“…3 This tendency to 'function creep' and 'normalisation of extraordinary powers' has been long recognised in the literature in this field. 4 From its inception as primarily an investigative tool for federal drug offences, the powers have evolved into a national surveillance scheme for serious crime whether federal or State. Indeed, the bulk of interception activity now relates to State offences.…”
Section: Telecommunications Interception: a History Of Normalisationmentioning
confidence: 99%
“…In earlier work we have called for legislative reform that places rights protectionwhich extends beyond privacy to include fair trial rights-at the centre of regulatory design. 48 The response to such calls initially seemed promising, at least in respect of privacy. In his findings, Blunn said that 'the protection of privacy should continue to be a fundamental consideration in, and the starting point for, any legislation providing access to telecommunications for security and law enforcement'.…”
Section: Balanced Public Policy or Balancing Away Privacy Interests?mentioning
confidence: 99%
See 1 more Smart Citation