All changes made to the description and title of this division.

View division | Edit description

Change Division
senate vote 2006-03-30#4

Edited by system

on 2014-10-07 16:21:10

Title

Description

  • The majority voted in favour of a [http://www.openaustralia.org/senate/?gid=2006-03-30.123.1 motion] that schedule 3 stand as printed. This means that the majority agree with the schedule and want it to remain unchanged. This motion was put in response to an [http://www.openaustralia.org/senate/?gid=2006-03-30.119.1 Australian Democrats amendment] to oppose the amended schedule, which was introduced by Senator [http://publicwhip-rails.openaustraliafoundation.org.au/mp.php?mpn=Natasha_Stott_Despoja&mpc=Senate&house=senate Natasha Stott Despoja].
  • Schedule 3 relates to equipment based interception. Its purpose is "to enable interception agencies to intercept communications to and from identified devices such as mobile handsets and computer terminals".(Read more about B-party interceptions in the [http://www.aph.gov.au/Parliamentary_Business/Bills_Legislation/bd/bd0506/06bd102 bills digest]. ) For example, this schedule would allow an authority to intercept all communications made through a particular mobile handset rather than having to speak permission to intercept communications through each new SIM card used in that mobile handset.
  • When explaining her opposition to this schedule, Senator Stott Despoja quoted a submission from [http://en.wikipedia.org/wiki/Electronic_Frontiers_Australia Electronic Frontiers Australia], which said: "This proposal appears to have an inappropriately and unjustifiably high potential to result in interception of communications of persons who are not suspects (i.e. are not named in the warrant) because, among other things, the types of device numbers proposed to be used do not necessarily uniquely identify a particular device."(Read Senator Stott Despoja whole contribution [http://www.openaustralia.org/senate/?gid=2006-03-30.119.1 here]. )
  • ''Background to the bill''
  • The [http://parlinfo.aph.gov.au/parlInfo/search/display/display.w3p;query=Id:legislation/billhome/R2506 bill] was introduced to implement some of the recommendations of the [http://www.ag.gov.au/Publications/Pages/BlunnreportofthereviewoftheregulationofaccesstocommunicationsAugust2005.aspx Review of the Regulation of Access to Communications] (known as the Blunn Report) in order to, among other things, create a warrant regime to allow access to stored communications held by a telecommunications carrier and enable the interception of communications of a person known to communicate with the person of interest.(Read more about the bill in its [http://www.aph.gov.au/Parliamentary_Business/Bills_Legislation/bd/bd0506/06bd102 bills digest].)
  • The majority voted in favour of a [motion](http://www.openaustralia.org/senate/?gid=2006-03-30.123.1) that schedule 3 stand as printed. This means that the majority agree with the schedule and want it to remain unchanged. This motion was put in response to an [Australian Democrats amendment](http://www.openaustralia.org/senate/?gid=2006-03-30.119.1) to oppose the amended schedule, which was introduced by Senator [Natasha Stott Despoja](http://publicwhip-rails.openaustraliafoundation.org.au/mp.php?mpn=Natasha_Stott_Despoja&mpc=Senate&house=senate).
  • Schedule 3 relates to equipment based interception. Its purpose is "to enable interception agencies to intercept communications to and from identified devices such as mobile handsets and computer terminals".(Read more about B-party interceptions in the [bills digest](http://www.aph.gov.au/Parliamentary_Business/Bills_Legislation/bd/bd0506/06bd102). ) For example, this schedule would allow an authority to intercept all communications made through a particular mobile handset rather than having to speak permission to intercept communications through each new SIM card used in that mobile handset.
  • When explaining her opposition to this schedule, Senator Stott Despoja quoted a submission from [Electronic Frontiers Australia](http://en.wikipedia.org/wiki/Electronic_Frontiers_Australia), which said: "This proposal appears to have an inappropriately and unjustifiably high potential to result in interception of communications of persons who are not suspects (i.e. are not named in the warrant) because, among other things, the types of device numbers proposed to be used do not necessarily uniquely identify a particular device."(Read Senator Stott Despoja whole contribution [here](http://www.openaustralia.org/senate/?gid=2006-03-30.119.1). )
  • _Background to the bill_
  • The [bill](http://parlinfo.aph.gov.au/parlInfo/search/display/display.w3p;query=Id:legislation/billhome/R2506) was introduced to implement some of the recommendations of the [Review of the Regulation of Access to Communications](http://www.ag.gov.au/Publications/Pages/BlunnreportofthereviewoftheregulationofaccesstocommunicationsAugust2005.aspx) (known as the Blunn Report) in order to, among other things, create a warrant regime to allow access to stored communications held by a telecommunications carrier and enable the interception of communications of a person known to communicate with the person of interest.(Read more about the bill in its [bills digest](http://www.aph.gov.au/Parliamentary_Business/Bills_Legislation/bd/bd0506/06bd102).)
senate vote 2006-03-30#4

Edited by system

on 2014-10-07 16:16:53

Title

Description

  • The majority voted in favour of a [http://www.openaustralia.org/senate/?gid=2006-03-30.123.1 motion] that schedule 3 stand as printed. This means that the majority agree with the schedule and want it to remain unchanged. This motion was put in response to an [http://www.openaustralia.org/senate/?gid=2006-03-30.119.1 Australian Democrats amendment] to oppose the amended schedule, which was introduced by Senator [http://publicwhip-rails.openaustraliafoundation.org.au/mp.php?mpn=Natasha_Stott_Despoja&mpc=Senate&house=senate Natasha Stott Despoja].
  • Schedule 3 relates to equipment based interception. Its purpose is "to enable interception agencies to intercept communications to and from identified devices such as mobile handsets and computer terminals".[1] For example, this schedule would allow an authority to intercept all communications made through a particular mobile handset rather than having to speak permission to intercept communications through each new SIM card used in that mobile handset.
  • Schedule 3 relates to equipment based interception. Its purpose is "to enable interception agencies to intercept communications to and from identified devices such as mobile handsets and computer terminals".(Read more about B-party interceptions in the [http://www.aph.gov.au/Parliamentary_Business/Bills_Legislation/bd/bd0506/06bd102 bills digest]. ) For example, this schedule would allow an authority to intercept all communications made through a particular mobile handset rather than having to speak permission to intercept communications through each new SIM card used in that mobile handset.
  • When explaining her opposition to this schedule, Senator Stott Despoja quoted a submission from [http://en.wikipedia.org/wiki/Electronic_Frontiers_Australia Electronic Frontiers Australia], which said: "This proposal appears to have an inappropriately and unjustifiably high potential to result in interception of communications of persons who are not suspects (i.e. are not named in the warrant) because, among other things, the types of device numbers proposed to be used do not necessarily uniquely identify a particular device."[2]
  • When explaining her opposition to this schedule, Senator Stott Despoja quoted a submission from [http://en.wikipedia.org/wiki/Electronic_Frontiers_Australia Electronic Frontiers Australia], which said: "This proposal appears to have an inappropriately and unjustifiably high potential to result in interception of communications of persons who are not suspects (i.e. are not named in the warrant) because, among other things, the types of device numbers proposed to be used do not necessarily uniquely identify a particular device."(Read Senator Stott Despoja whole contribution [http://www.openaustralia.org/senate/?gid=2006-03-30.119.1 here]. )
  • ''Background to the bill''
  • The [http://parlinfo.aph.gov.au/parlInfo/search/display/display.w3p;query=Id:legislation/billhome/R2506 bill] was introduced to implement some of the recommendations of the [http://www.ag.gov.au/Publications/Pages/BlunnreportofthereviewoftheregulationofaccesstocommunicationsAugust2005.aspx Review of the Regulation of Access to Communications] (known as the Blunn Report) in order to, among other things, create a warrant regime to allow access to stored communications held by a telecommunications carrier and enable the interception of communications of a person known to communicate with the person of interest.[3]
  • The [http://parlinfo.aph.gov.au/parlInfo/search/display/display.w3p;query=Id:legislation/billhome/R2506 bill] was introduced to implement some of the recommendations of the [http://www.ag.gov.au/Publications/Pages/BlunnreportofthereviewoftheregulationofaccesstocommunicationsAugust2005.aspx Review of the Regulation of Access to Communications] (known as the Blunn Report) in order to, among other things, create a warrant regime to allow access to stored communications held by a telecommunications carrier and enable the interception of communications of a person known to communicate with the person of interest.(Read more about the bill in its [http://www.aph.gov.au/Parliamentary_Business/Bills_Legislation/bd/bd0506/06bd102 bills digest].)
  • ''References''
  • * [1] Read more about B-party interceptions in the [http://www.aph.gov.au/Parliamentary_Business/Bills_Legislation/bd/bd0506/06bd102 bills digest].
  • * [2] Read Senator Stott Despoja whole contribution [http://www.openaustralia.org/senate/?gid=2006-03-30.119.1 here].
  • * [3] Read more about the bill in its [http://www.aph.gov.au/Parliamentary_Business/Bills_Legislation/bd/bd0506/06bd102 bills digest].
senate vote 2006-03-30#4

Edited by mackay staff

on 2014-08-15 09:43:10

Title

  • Telecommunications (Interception) Amendment Bill 2006 — In Committee
  • Telecommunications (Interception) Amendment Bill 2006 — In Committee - Schedule 3 (equipment based interception)

Description

  • <p pwmotiontext="moved">That schedule 3 stand as printed.</p>
  • The majority voted in favour of a [http://www.openaustralia.org/senate/?gid=2006-03-30.123.1 motion] that schedule 3 stand as printed. This means that the majority agree with the schedule and want it to remain unchanged. This motion was put in response to an [http://www.openaustralia.org/senate/?gid=2006-03-30.119.1 Australian Democrats amendment] to oppose the amended schedule, which was introduced by Senator [http://publicwhip-rails.openaustraliafoundation.org.au/mp.php?mpn=Natasha_Stott_Despoja&mpc=Senate&house=senate Natasha Stott Despoja].
  • Schedule 3 relates to equipment based interception. Its purpose is "to enable interception agencies to intercept communications to and from identified devices such as mobile handsets and computer terminals".[1] For example, this schedule would allow an authority to intercept all communications made through a particular mobile handset rather than having to speak permission to intercept communications through each new SIM card used in that mobile handset.
  • When explaining her opposition to this schedule, Senator Stott Despoja quoted a submission from [http://en.wikipedia.org/wiki/Electronic_Frontiers_Australia Electronic Frontiers Australia], which said: "This proposal appears to have an inappropriately and unjustifiably high potential to result in interception of communications of persons who are not suspects (i.e. are not named in the warrant) because, among other things, the types of device numbers proposed to be used do not necessarily uniquely identify a particular device."[2]
  • ''Background to the bill''
  • The [http://parlinfo.aph.gov.au/parlInfo/search/display/display.w3p;query=Id:legislation/billhome/R2506 bill] was introduced to implement some of the recommendations of the [http://www.ag.gov.au/Publications/Pages/BlunnreportofthereviewoftheregulationofaccesstocommunicationsAugust2005.aspx Review of the Regulation of Access to Communications] (known as the Blunn Report) in order to, among other things, create a warrant regime to allow access to stored communications held by a telecommunications carrier and enable the interception of communications of a person known to communicate with the person of interest.[3]
  • ''References''
  • * [1] Read more about B-party interceptions in the [http://www.aph.gov.au/Parliamentary_Business/Bills_Legislation/bd/bd0506/06bd102 bills digest].
  • * [2] Read Senator Stott Despoja whole contribution [http://www.openaustralia.org/senate/?gid=2006-03-30.119.1 here].
  • * [3] Read more about the bill in its [http://www.aph.gov.au/Parliamentary_Business/Bills_Legislation/bd/bd0506/06bd102 bills digest].