{"id":39074,"date":"2018-05-05T08:00:45","date_gmt":"2018-05-04T22:00:45","guid":{"rendered":"https:\/\/www.aspistrategist.ru\/?p=39074"},"modified":"2018-05-04T14:46:24","modified_gmt":"2018-05-04T04:46:24","slug":"navigating-the-balance-between-privacy-and-security","status":"publish","type":"post","link":"https:\/\/www.aspistrategist.ru\/navigating-the-balance-between-privacy-and-security\/","title":{"rendered":"Navigating the balance between privacy and security"},"content":{"rendered":"
<\/figure>\n

The Cambridge Analytica scandal<\/a> and recent testimony by Facebook CEO Mark Zuckerberg<\/a> before the US\u00a0Congress has reacquainted millions of people around the world with the issue of privacy. The scale of the controversy is itself a demonstration of the extent to which privacy rights are valued, and that the battle to retain ownership of information about oneself is worth fighting for its own sake.<\/p>\n

This important discussion is being held in the context of the relationship between a social media company and its users, but a far older\u2014and more significant\u2014relationship is between states and citizens. In Australia, with the establishment of the Home Affairs portfolio and other significant, ongoing developments inspired by the 2017 Independent Intelligence Review, it\u2019s pertinent that we consider the principles that underpin national security policy.<\/p>\n

The foremost challenge in this area is the nexus between privacy and public safety. Our law enforcement and intelligence agencies have for many decades fostered a collaborative relationship with the Australian community. Justice Robert Hope raised this point in\u00a01977 in the conclusion of the Royal Commission on Intelligence and Security. It was re-emphasised by Michael L\u2019Estrange and Stephen Merchant in the Independent Intelligence Review.<\/p>\n

That relationship continues to be largely successful, but we shouldn\u2019t neglect its maintenance. In a security or safety-first paradigm, this means reacquainting ourselves with the value of privacy as a guiding principle of public policy.<\/p>\n

Simply put, privacy is about the control we have over information about ourselves. It encompasses such things as protection of\u2014and solitude in\u2014one\u2019s own home, freedom of thought and conscience, and freedom from <\/em>intrusion and arbitrary surveillance, arrest or interrogation.<\/p>\n

In Australia, there are statutory instruments<\/a>, socio-political norms and oversight institutions such as the Independent National Security Legislation Monitor and the Inspector-General of Intelligence and Security that work effectively to uphold these ideals. But obvious difficulties arise from the fact that they can\u2019t be adhered to in absolute terms.<\/p>\n

It\u2019s important, for instance, that the security of the populace and of the government (among other interests) is defended, which means that policymakers are challenged to strike a careful balance between interests and values. This dilemma was explained by Prime Minister Malcolm Turnbull when he addressed the Parliament<\/a> in July\u00a02017 on the subject of national security in light of terrorist attacks in Melbourne, London and Baghdad.<\/p>\n

As an example, the PM focused on encryption, a feature of communications technology that enables people to disguise their online footprints, especially discussions with others, on any number of personal devices. It\u2019s difficult to manage in a law enforcement context, where individuals\u2019 legitimate protection of personal matters must be offset against the need for agencies to have the tools to carry out their important work. \u2018The privacy of a terrorist,\u2019 the PM argued, \u2018can never be more important than public safety. Never.\u2019<\/p>\n

In strict terms, operational requirements can mean that breaches of privacy might be viewed as inconvenient necessities<\/a>. But as the PM identified, there\u2019s a broader test at play that goes beyond the cases where a group or individual\u2019s responsibility for a criminal (or terrorist) act is clear. What if the subjects are under suspicion, or no act has yet been committed? Justifiably, counterterrorism strategies now lean more towards preventative measures<\/a> in recognition of the fact that a reactive approach has diminishing returns. So, which priority ought to come first?<\/p>\n

Unless you take the view that national security problems can only be solved through the purview of realpolitik, the enjoyment of collective security is contingent on the recognition of, and respect for, fundamental principles. This means that security consists of defending things of both material and <\/em>intrinsic value.<\/p>\n

The ongoing debate about foreign interference<\/a> is a case in point. There\u2019s more at stake than the economy, critical infrastructure and public safety, because we want to be able to say honestly that our democratic systems and institutions aren\u2019t only different to authoritarian models, but are also functionally better and more conducive to human wellbeing<\/a>. If the choice is made to cast privacy aside as if it\u2019s merely an abstract ideal, then our ability to uphold that important distinction will erode.<\/p>\n

Of course, the privacy\u2013security dilemma will always be formidable and can never be fully resolved. For this reason, it\u2019s important that consultation between the Australian public, intelligence and law enforcement agencies, and the government more broadly remains as active in the future as it is today.<\/p>\n","protected":false},"excerpt":{"rendered":"

The Cambridge Analytica scandal and recent testimony by Facebook CEO Mark Zuckerberg before the US\u00a0Congress has reacquainted millions of people around the world with the issue of privacy. The scale of the controversy is itself …<\/p>\n","protected":false},"author":800,"featured_media":39077,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"footnotes":""},"categories":[1],"tags":[215,932],"class_list":["post-39074","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general","tag-privacy","tag-security"],"acf":[],"yoast_head":"\nNavigating the balance between privacy and security | The Strategist<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.aspistrategist.ru\/navigating-the-balance-between-privacy-and-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Navigating the balance between privacy and security | The Strategist\" \/>\n<meta property=\"og:description\" content=\"The Cambridge Analytica scandal and recent testimony by Facebook CEO Mark Zuckerberg before the US\u00a0Congress has reacquainted millions of people around the world with the issue of privacy. The scale of the controversy is itself ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.aspistrategist.ru\/navigating-the-balance-between-privacy-and-security\/\" \/>\n<meta property=\"og:site_name\" content=\"The Strategist\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ASPI.org\" \/>\n<meta property=\"article:published_time\" content=\"2018-05-04T22:00:45+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2018-05-04T04:46:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2018\/05\/33877742875_c82500b9e3_z.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"427\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Mitchell Grant\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:site\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Mitchell Grant\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\",\"url\":\"https:\/\/www.aspistrategist.ru\/\",\"name\":\"The Strategist\",\"description\":\"ASPI's analysis and commentary site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.aspistrategist.ru\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-AU\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/navigating-the-balance-between-privacy-and-security\/#primaryimage\",\"url\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2018\/05\/33877742875_c82500b9e3_z.jpg\",\"contentUrl\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2018\/05\/33877742875_c82500b9e3_z.jpg\",\"width\":640,\"height\":427},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.aspistrategist.ru\/navigating-the-balance-between-privacy-and-security\/\",\"url\":\"https:\/\/www.aspistrategist.ru\/navigating-the-balance-between-privacy-and-security\/\",\"name\":\"Navigating the balance between privacy and security | The Strategist\",\"isPartOf\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/navigating-the-balance-between-privacy-and-security\/#primaryimage\"},\"datePublished\":\"2018-05-04T22:00:45+00:00\",\"dateModified\":\"2018-05-04T04:46:24+00:00\",\"author\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/a8c412c8445c1e622f28785e49aa438a\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/navigating-the-balance-between-privacy-and-security\/#breadcrumb\"},\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.aspistrategist.ru\/navigating-the-balance-between-privacy-and-security\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.aspistrategist.ru\/navigating-the-balance-between-privacy-and-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.aspistrategist.ru\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Navigating the balance between privacy and security\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/a8c412c8445c1e622f28785e49aa438a\",\"name\":\"Mitchell Grant\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/1b20a166bfd7e1c5989ff469f2e3f8a7?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/1b20a166bfd7e1c5989ff469f2e3f8a7?s=96&d=mm&r=g\",\"caption\":\"Mitchell Grant\"},\"url\":\"https:\/\/www.aspistrategist.ru\/author\/mitchell-grant\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Navigating the balance between privacy and security | The Strategist","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.aspistrategist.ru\/navigating-the-balance-between-privacy-and-security\/","og_locale":"en_US","og_type":"article","og_title":"Navigating the balance between privacy and security | The Strategist","og_description":"The Cambridge Analytica scandal and recent testimony by Facebook CEO Mark Zuckerberg before the US\u00a0Congress has reacquainted millions of people around the world with the issue of privacy. The scale of the controversy is itself ...","og_url":"https:\/\/www.aspistrategist.ru\/navigating-the-balance-between-privacy-and-security\/","og_site_name":"The Strategist","article_publisher":"https:\/\/www.facebook.com\/ASPI.org","article_published_time":"2018-05-04T22:00:45+00:00","article_modified_time":"2018-05-04T04:46:24+00:00","og_image":[{"width":640,"height":427,"url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2018\/05\/33877742875_c82500b9e3_z.jpg","type":"image\/jpeg"}],"author":"Mitchell Grant","twitter_card":"summary_large_image","twitter_creator":"@ASPI_org","twitter_site":"@ASPI_org","twitter_misc":{"Written by":"Mitchell Grant","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.aspistrategist.ru\/#website","url":"https:\/\/www.aspistrategist.ru\/","name":"The Strategist","description":"ASPI's analysis and commentary site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.aspistrategist.ru\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-AU"},{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/navigating-the-balance-between-privacy-and-security\/#primaryimage","url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2018\/05\/33877742875_c82500b9e3_z.jpg","contentUrl":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2018\/05\/33877742875_c82500b9e3_z.jpg","width":640,"height":427},{"@type":"WebPage","@id":"https:\/\/www.aspistrategist.ru\/navigating-the-balance-between-privacy-and-security\/","url":"https:\/\/www.aspistrategist.ru\/navigating-the-balance-between-privacy-and-security\/","name":"Navigating the balance between privacy and security | The Strategist","isPartOf":{"@id":"https:\/\/www.aspistrategist.ru\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.aspistrategist.ru\/navigating-the-balance-between-privacy-and-security\/#primaryimage"},"datePublished":"2018-05-04T22:00:45+00:00","dateModified":"2018-05-04T04:46:24+00:00","author":{"@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/a8c412c8445c1e622f28785e49aa438a"},"breadcrumb":{"@id":"https:\/\/www.aspistrategist.ru\/navigating-the-balance-between-privacy-and-security\/#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.aspistrategist.ru\/navigating-the-balance-between-privacy-and-security\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.aspistrategist.ru\/navigating-the-balance-between-privacy-and-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.aspistrategist.ru\/"},{"@type":"ListItem","position":2,"name":"Navigating the balance between privacy and security"}]},{"@type":"Person","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/a8c412c8445c1e622f28785e49aa438a","name":"Mitchell Grant","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/1b20a166bfd7e1c5989ff469f2e3f8a7?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/1b20a166bfd7e1c5989ff469f2e3f8a7?s=96&d=mm&r=g","caption":"Mitchell Grant"},"url":"https:\/\/www.aspistrategist.ru\/author\/mitchell-grant\/"}]}},"_links":{"self":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/39074"}],"collection":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/users\/800"}],"replies":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/comments?post=39074"}],"version-history":[{"count":2,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/39074\/revisions"}],"predecessor-version":[{"id":39079,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/39074\/revisions\/39079"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media\/39077"}],"wp:attachment":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media?parent=39074"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/categories?post=39074"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/tags?post=39074"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}