Show simple item record

dc.contributor.authorHardy, K
dc.date.accessioned2020-10-08T23:00:22Z
dc.date.available2020-10-08T23:00:22Z
dc.date.issued2020
dc.identifier.issn2197-6775en_US
dc.identifier.doi10.14763/2020.3.1493en_US
dc.identifier.urihttp://hdl.handle.net/10072/398233
dc.description.abstractTo investigate terrorism, law enforcement and intelligence agencies increasingly require assistance from multinational technology companies including Facebook, Google and Apple. These companies can assist with decrypting secret communications or unlocking personal devices, but not, they maintain, without undermining the privacy and security of all their users. While other western countries continue to debate these issues, Australia legislated quickly to enhance decryption capabilities with little industry consultation. This article examines the encryption laws recently enacted by the Australian federal parliament, which allow law enforcement and intelligence agencies to require technical assistance from ‘designated communications providers’. It interrogates the government’s justifications for these laws and examines the wider legal and political context in which they were enacted. The analysis confirms that Australia’s approach to decryption does not represent sound practice and instead reflects a pattern of rights-infringing lawmaking in response to terrorism.en_US
dc.description.peerreviewedYesen_US
dc.publisherInternet Policy Review, Alexander von Humboldt Institute for Internet and Societyen_US
dc.relation.ispartofpagefrom1en_US
dc.relation.ispartofpageto16en_US
dc.relation.ispartofissue3en_US
dc.relation.ispartofjournalInternet Policy Reviewen_US
dc.relation.ispartofvolume9en_US
dc.subject.fieldofresearchCriminologyen_US
dc.subject.fieldofresearchPolitical Scienceen_US
dc.subject.fieldofresearchcode1602en_US
dc.subject.fieldofresearchcode1606en_US
dc.titleAustralia’s encryption laws: Practical need or political strategy?en_US
dc.typeJournal articleen_US
dc.type.descriptionC1 - Articlesen_US
dcterms.bibliographicCitationHardy, K, Australia’s encryption laws: Practical need or political strategy?, Internet Policy Review, 2020, 9 (3), pp. 1-16en_US
dcterms.licensehttps://creativecommons.org/licenses/by/3.0/de/deed.enen_US
dc.date.updated2020-10-08T04:28:43Z
dc.description.versionVersion of Record (VoR)en_US
gro.rights.copyright© The Author(s) 2020. This is an Open Access article distributed under the terms of the Creative Commons Attribution 3.0 Germany (CC BY 3.0 DE) License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.en_US
gro.hasfulltextFull Text
gro.griffith.authorHardy, Keiran A.


Files in this item

This item appears in the following Collection(s)

  • Journal articles
    Contains articles published by Griffith authors in scholarly journals.

Show simple item record