A few days ago, Anonymous activists hacked into AAPT, stole 40GB of data including customer information and forced offline ten Australian government websites, write Mark Gregory in The Conversation. Anonymous members stated in an online internet relay chat (IRQ) interview with the ABC that the hacking attacks were part of an ongoing campaign against the government’s proposed changes to privacy laws. Privacy changes One of the proposed changes being discussed by the Parliamentary Joint Committee on Intelligence and Security (PJCIS) in an inquiry into potential reforms of national security legislation is a requirement for internet service providers (ISPs) to store user online activity for two years. This means that everything you...
The advent of social networking websites presents further opportunities for criminals to obtain info...
More than four million personal records of US government workers are thought to have been hacked and...
This report provides the legal design of a tort to deal with serious invasions of privacy in the dig...
Imagine how you'd feel if you discovered footage from your private home security camera had been bro...
The term the 'information age' is particularly applicable to Australia. In a recent email, the Austr...
In April 2015, the Australian Government passed the Telecommunications (Interception and Access) Ame...
Taking into account Australia\u27s existing privacy laws, this paper asks whether a new statutory ca...
Most people will say that privacy matters to them, but like so many social issues, it is a state whi...
The United Kingdom phone hacking controversy centred upon the now defunct British tabloid News of th...
This study takes the form of a critical discussion that examines the growth of surveillance and intr...
© Springer International Publishing Switzerland 2016. Global security concerns, acts of terrorism an...
The aim of the paper is to look at the way hackers act and ways in which society can protect itself....
Mark Gregory for The Conversation talks in terms of the privacy laws Origin Energy new online monito...
This article argues that current laws are ill-equipped to deal with the multifaceted threats to indi...
Individuals, at home and at work , are increasingly using the Internet to talk to friends and collea...
The advent of social networking websites presents further opportunities for criminals to obtain info...
More than four million personal records of US government workers are thought to have been hacked and...
This report provides the legal design of a tort to deal with serious invasions of privacy in the dig...
Imagine how you'd feel if you discovered footage from your private home security camera had been bro...
The term the 'information age' is particularly applicable to Australia. In a recent email, the Austr...
In April 2015, the Australian Government passed the Telecommunications (Interception and Access) Ame...
Taking into account Australia\u27s existing privacy laws, this paper asks whether a new statutory ca...
Most people will say that privacy matters to them, but like so many social issues, it is a state whi...
The United Kingdom phone hacking controversy centred upon the now defunct British tabloid News of th...
This study takes the form of a critical discussion that examines the growth of surveillance and intr...
© Springer International Publishing Switzerland 2016. Global security concerns, acts of terrorism an...
The aim of the paper is to look at the way hackers act and ways in which society can protect itself....
Mark Gregory for The Conversation talks in terms of the privacy laws Origin Energy new online monito...
This article argues that current laws are ill-equipped to deal with the multifaceted threats to indi...
Individuals, at home and at work , are increasingly using the Internet to talk to friends and collea...
The advent of social networking websites presents further opportunities for criminals to obtain info...
More than four million personal records of US government workers are thought to have been hacked and...
This report provides the legal design of a tort to deal with serious invasions of privacy in the dig...