Keywords

1 Introduction

Security concerns have become heightened across Federal, State and Local government agencies alike, primarily due to the severity of international and domestic incidents that relate specifically to terrorism and cybercrime (ANZCTC 2017). Terrorism incidents such as the attacks in the United States of America on September 11, 2001 and the Bali bombings in 2002, among others, have contributed to the growing use of surveillance technologies in both the private and public sectors (Mann and Smith 2017). More recently, however, the COVID-19 pandemic has emerged and presented further privacy concerns for the public and privacy advocates. The COVID-19 response has seen an increase in the rapid deployment of surveillance devices in Australia. For instance, the use of drones and smartphone applications to enforce social distancing measures or support contact tracing methods.

The tension between privacy and security is a complex debate between privacy advocates and security proponents; however, public citizens appear to be either indifferent to, or are struggling to grasp, the effect of technological advancements on privacy erosion, especially when privacy infringements are legitimised when contextualised with the War on Terror (Broek et al. 2017) and more recently the COVID-19 pandemic. The introduction of public surveillance systems and laws that support their use appear contradictory. Juridical matters bring forth legal implications in relation to data handling, leaving little room for redress with the continued trend of surveillance systems as a remedy to support national security objectives.

This paper examines the privacy-security debate through the lens of the power model developed by Turner (2005). The balance between privacy and security is at the nexus of technology, law and people. Technology enables what is legitimate under law on behalf of the people. Australians are typically mistrustful of their government with respect to personal data (Lupton 2019) - they do not like to be identified. A recent survey by the Office of the Australian Information Commissioner (OAIC) showed that this is still an issue for Australians (OAIC 2017). Witness the “Australia Card” of the 1980s and the more recent “My Health Record” (an opt-out system). Briefly, the Australia Card was a failed attempt to issue a national identity card. Further, approximately 20% of Australians have elected to opt-out of My Health Record. As noted by Hanson (2018), “The controversy over police access to the My Health Record [data] and the need to add further privacy protections in that scheme also point to heightened public awareness and concern about digitisation processes, including about losing control of personal information that might be used to cause harm”. The 2017 survey administered by the OAIC showed that government access to personal data continues to concern Australians (OAIC 2017). The COVID-19 pandemic may prove to be an interesting confounding variable. The use of Bluetooth Low Energy (BLE) technology, in the case of the COVIDSafe application (Department of Health 2020) appears at first glance to potentially enhance the rapid detection of contacts with an infected person - a laudable public health goal. However, a BLE signal could produce false positives which would hinder, rather than help, the public health effort. Standing outside a closed office for 15 min could generate a “contact” where no direct exposure has occurred. This paper hereafter summarises related work on privacy, provides an extensive discussion of legal, technical and human-centred matters pertaining to privacy, shows how the discourse fits an established theory of power in groups (Turner’s TPT) and concludes by suggesting that further work can be done in the form of surveying segments of the population to determine if the attitudes of Australians have changed.

2 Related Work

Privacy is recognised in fundamental documents that define human rights (Clark 2006). For example, section 12 of the Universal Declaration of Human Rights states “No one shall be subjected to arbitrary interference with his privacy, family, home or correspondence, nor to attacks upon his honour and reputation. Everyone has the right to the protection of the law against such interference or attacks.” (UN General Assembly 1948). Historically, Australians have been at best, reluctant to accept government attempts to impose policies that result in universal identification. In the 1980’s the Hawke Government proposed introducing a national identity card (Hawley 2005) that was quickly consigned to the waste bin of history. Recently, the Morrison Government’s COVID-19 application attracted greater acceptance with citizens notwithstanding ongoing technical issues and release of draft legislation to enshrine privacy protections. While this draft legislation seems to exclude the operation of other security legislation the fact remains that Australia’s security apparatus has acknowledged that it does at times carry out illegal acts in the course of fulfilling its role in protecting Australians (Moorhouse 2014). If nothing else Australians are on notice that different Australian agencies hold different approaches to the balancing act that underpins the relationship between privacy and security.

The balance between privacy and security is continually shifting and increasing discord between individual privacy rights and the collective security objectives of a nation state (Mann and Smith 2017). Goggin et al. (2017) conducted a survey of 1,600 Australians. The research explored questions about the nature of digital rights and covered four key issues, namely; (1) privacy surrounding data profiling and analytics, (2) government data matching and surveillance, (3) digital privacy relating to the work place (work), and (4) freedom of expression (speech) with an emphasis on online digital platforms (Goggin et al. 2017). Key areas of interest drawn from the research were the findings relating to privacy profiling, and government data matching and surveillance. The research revealed that Australians are genuinely concerned about their online privacy in agreeance with research conducted by the OAIC in 2017 that showed similar outcomes (OAIC 2017). 65% of participants felt they had nothing to hide, whilst 67% actively took steps to protect their online privacy. 57% of participants agreed that corporations were a threat to privacy. With regards to government data matching and surveillance, 47% were concerned about government violating their privacy, however, when questions were framed from a security perspective the percentage changed. When respondents were asked whether they are in favour of law enforcement or security agencies accessing meta data, 42% were in favour, conversely, when framed as an anti-terrorism measure 57% were in favour (Goggin et al. 2017). The change in attitudes suggests that personal views towards privacy breaches varied depending on the context–further highlighting the complexity of the issue.

A 2017 survey on Australian attitudes towards privacy conducted by the OAIC (2017) further identified that 93% of respondents do not want their personal data sent and stored overseas. The desire for personal privacy has seen an increase in the use of encryption technology by consumers and enterprises globally (Korolov 2016). The widespread use of encryption has contributed to more recent developments in law, for example, in 2018 the Australian Parliament passed the Assistance and Access Act 2018 (Cth). The Act is designed to improve the ability of Australian law enforcement and security agencies in decrypting information when investigating serious crimes (The Parliament of the Commonwealth of Australia 2018). Thus, the introduction of the Act is a contributing factor to the rising tensions between privacy advocates and security proponents. Similarly, the Identity Matching Services Bill (2019) implements the Intergovernmental Agreement (IGA) on identity matching services. Under the Intergovernmental agreement, the Commonwealth and all states and territories agree to preserve or introduce legislation to support the sharing of facial images and related identity information via a set of identity-matching services (Parliament of Australia, 2019). While privacy laws in Australia do exist at both State and Federal level, not all government agencies work in unison, furthermore, juridical issues greatly influence law enforcement. As noted by Greenleaf (2020) any COVID-19 legislation needs to avoid ‘pseudo-voluntary’ compliance by which voluntary uptake becomes de facto compulsory. That is, any resultant legislation should make the uptake of the COVID-19 application ‘genuinely voluntary and guaranteed by enforceable laws.’ (Greenleaf 2020). In contrast, the exposure draft makes it an offence to ‘require another person to download the application or have the application in operation (The Parliament of the Commonwealth of Australia 2020b). The exposure draft does not use the words ‘voluntary’. Section 94B (Object of this Part) could enshrine the principle of voluntary uptake.

3 Discussion

Paine et al. (2007) noted over a decade ago, that advances in technology have altered the way in which information is collected, stored and exchanged. Increasing threats to public safety, whether criminal or health related, have contributed to the accelerated implementation of surveillance technologies in both the public and private sector. An outcome is that regulators are struggling to keep abreast of technological developments and their impact on society (Mann and Smith 2017). Public trust, a domain of concern, is found to play a critical role regarding surveillance in society. Major studies, for instance, the Public perception of security and privacy: Assessing knowledge, Collecting evidence, Translating research into action (PACT) survey, found that respondents level of distrust reflected in the preferences for different security and privacy practices (Patil et al. 2015). The Australian Government is not exempt from public trust issues on multiple fronts. For example, the government’s handling of the Robo Debt process wherein its use of flawed technology (Price 2019) to shift the onus of proof of financial entitlement onto those least able to look after themselves indicated either a collective lack of trust in citizens or an unhealthy focus on achieving a budget surplus at all cost.

In a not unrelated vein, the government’s pursuit of journalists and whistle-blowers who, respectively, exposed government plans to secretly spy upon Australians (Ryall 2019; Tillett 2018) and revealed illegal government behaviour against a friendly neighbour during Timor Gap negotiations (Knaus 2019; Heathcote 2013) further illustrates a preoccupation with secrecy. Furthermore, the government has just introduced into parliament proposed amendments to the Australian Security and Intelligence Act 1979 (Cth) (ASIO Act). These amendments include provision for ASIO to use nonintrusive surveillance devices on Australian citizens without needing to apply to a court for a warrant and to examine articles being delivered by a delivery service provider (The Parliament of the Commonwealth of Australia 1999). These proposed amendments have been described as ‘one more step towards a totalitarian state’ (Barnes 2020). This same government now asks Australians to trust it on providing adequate protections of citizen’s privacy within its COVID-19 smartphone application. This is the same application that has not achieved universal uptake by all federal politicians, including some ministers of the government (ABC News 2020). Importantly, one politician has given the protection of the identity of whistle-blowers as the reason why he will not download the COVID-19 application. This raises an important issue, while the draft legislation provides criminal sanctions for misuse of ‘tracing application data’ beyond medical contact tracing for the purposes of COVID-19, the derivative use of the outcome of such tracing might not be so easily prevented. It might not take much for a well-resourced agency to link a person of interest or to narrow its field of search to persons required to isolate following the identification of a politician, investigative journalist or lawyer who has become a recent victim of COVID-19. For clever people, knowing where to start looking is almost as good as knowing where to search.

Brown et al. (2014) confirm that transparency is indeed important to the public in Australia and the UK, thus public trust relies on increasing the responsibility of institutions to recognise and protect whistle-blowers. Brown et al. (2014) show in their research regarding transparency and whistleblowing, that public attitudes towards whistleblowing is divided. Half of the respondents (50%) surveyed felt information was kept to secret demonstrating public opinion in these domains has the potential to impact political support. Therefore, introducing intrusive means of data collection in combination with legislative amendments that threaten public trust is paramount. As such public figures, for example, Julian Assange, have potential to not only influence public opinion but contribute to the increasing pressure of trust in modern institutions.

Recent developments with respect to COVID-19 have prompted governments of the world to canvas technological solutions capable of contributing to the response effort. For instance, drone deployment has been trialed in some countries to enforce social distancing polices while other technological solutions such as GPS ankle monitoring devices have been acquired to help police track citizens who should be in quarantine or self-isolation (Sky News 2020). In contrast, automatic number plate recognition (ANPR) cameras have been purchased in the state of Western Australia to enforce state-wide travel restrictions (Hendry 2020b). Mann and Smith (2017) astutely point out that Australia is following the trend of expanding its surveillance capabilities, noting the most significant development that occurred in 2015. The National Facial Recognition Biometric Matching Capability (NFRBMC) was announced and intended to become operational in 2016. The NFRBMC provides for the sharing of facial templates across state and federal agencies. According to more recent reports, Western Australia as a case in point, at present is preparing for the upload of licence and photographs to be shared, while other states (Victoria, South Australia and Tasmania) have already supplied driver’s licence details and photographs to the National Driver’s Licence Facial Recognition System (NDLFRS) (Hendry 2020a). The NDLFRS, hosted on a Department of Home Affairs platform, contributes data to the NFRBMC system. The end result will probably result in the driver’s licence becoming by stealth what Australian’s had collectively rejected with the Hawke Government (the national identity “Australia” card). A government focused on identification and secrecy may find the lure of surreptitiously linking such data to Australians using the same phone application very tempting.

One particular technological response measure of interest is the introduction of a smartphone application for the purpose of social distancing and contact tracing. Countries around the world such as Singapore, Israel, South Korea and the United States have adopted surveillance methods leveraging mobile location data to enforce social distancing policies and contact tracing (Ng 2020). Contact tracing aims to identify citizens that have come into close contact with a COVID-19 positive case or who have tested positive, thus the data can be used to promptly notify people who may be at risk or should be in quarantine. The COVIDSafe application, released in Australia on 26 April, 2020 (Department of Health 2020), underwent some consultation prior to its release. The Department of Health released a Privacy Impact Assessment (PIA) prior to the application being released that documented recommendations yet to materialise. In addition, the PIA performed a compliance analysis against the Australian Privacy Principles (APPs). Whilst there are rhetorical moves to enforce penalty for breach of information privacy (Dentons 2019), it is important to note that the APPs are not enforceable (Australian Law Reform Commission 2014, p. 21), in other words, legal remedy for encroachment does not currently exist in Australia. Furthermore, the Australian Privacy Act (that incorporates the APPs), provide exemptions to a number of Federal and State agencies, thus it is questionable as to what protections exist for the Australian public should a breach be realised.

As the privacy debate continues, there exists an emerging discourse with regards to public surveillance and security, or put another way, national security versus information security. The balance between privacy and surveillance for the purpose of national security - a debate that continues to gain ground, demonstrates the discourse with the introduction of Acts such as the Assistance and Access Act (2018), designed to improve the ability of Australian law enforcement and security agencies in decrypting information, is in contradiction to the advocacy of privacy. The Australian Government purportedly promotes privacy on the one hand while simultaneously implementing legislation that supports intrusive means of data collection. The primary legislation for regulating privacy in Australia is the Privacy Act 1988 (Cth). The Australian Privacy Principles (APPs), included in schedule 1 of the Privacy Act, outline how personal information should be managed and handled by entities subject to the Act. Exemptions to the Act include entitles with an annual turnover of less than three million AUD, local and state governments are also exempt (OAIC, n.d.). In addition, defence and intelligence agencies are either partially or completely exempt (Australian Law Reform Commission 2008). The Australian Law Reform Commission (2008) stated that “Australia is yet to achieve uniformity in the regulation of personal information”.

Due to public concern, Australia’s Federal Health Minister, Greg Hunt, shared a Determination under the Biosecurity Act 2015 (Cth) in an attempt to protect people’s privacy and quell fears. The Determination restricts access to state and territory health authorities only, for the purpose of contact tracing. The Determination declares that a person must not retain the data on a database outside Australia, and the Commonwealth must cause COVID-19 application data in the National COVIDSafe data store to be deleted after the COVID-19 pandemic has concluded (Australian Government 2020). A better option would be to insert a sunset clause in the proposed legislation requiring the approval of parliament to extend the use of the COVID-19 application legislation notwithstanding a Determination can be amended or appealed at the discretion of the government anytime. Thus, the finalisation of the draft COVID-19 application legislation is crucial for clarity. As legal experts have warned, legislation would be a better instrument (Bogle 2020). Law Council of Australia president Pauline Wright stated, “there was some potential legal ambiguity around whether laws authorising the law enforcement and intelligence warrants could override the Determination’s prohibition on access” (Bogle 2020). In addition to the ambiguity that exists in Australian law, international requests for data deserves the serious consideration of the current Parliamentary Joint Committee on Intelligence and Security (PJCIS) review. To illustrate further, the Department of Health has contractual agreements with Amazon Web Services (AWS) for the COVIDSafe application data store. The use of AWS, an American company, raises some juridical issues. AWS has an annual turnover of more than three million AUD qualifying AWS as an APP entity. However, a bilateral agreement between Australia and the United States following enactment of the United States CLOUD Act (Clarifying Lawful Overseas Use of Data), enacted in 2018, may or may not weaken protections afforded under Australian’s Privacy Act. This agreement is subject to the outcome of the PJCIS review and is currently being negotiated (see Second Reading Speech on the Telecommunications Legislation Amendment (International Production Orders) Bill 2020 by Minister Mr Tudge (Parliament of Australia 2020). In the meantime, The PJCIS has commenced a review into the effectiveness of the Telecommunications Legislation Amendment (International Production Orders) Bill 2020 with a reporting date of 26 June 2020 (The Parliament of the Commonwealth of Australia 2020a). As recently as 14 May 2020, Taylor (2020) has canvassed concerns about US law enforcement accessing COVID-19 data making the PJCIS review crucial for those concerned with privacy.

Another issue worthy of consideration is the Archives Act 1983 (Cth), an Act that sets out requirements for the retention of data. This means that archived data needs considerable attention in relation to data access, storage, backups and retention timeframes. Other pertinent issues worthy to note include function creep and exemptions to current Australian law. Function creep in generic terms addresses the originally intended purpose of a particular surveillance system. The originally intended purpose does not necessarily mean the surveillance technology will cease to operate once the originating use case ceases. A case in point is the COVIDSafe application. Whilst the Australian Government has stated that the data store must be deleted when the pandemic ends, as noted by Ahmed et al (2020), the term “end of pandemic” is vague. Whilst use of the technology by the government of the day may have well-deserved intentions, this does not guarantee future governments will hold the same values. Therefore, legislative guarantees to protect against a host of potentially lucrative markets or temptation of the security apparatus (both public and private) require mitigation to balance the potential unforeseen effects or secondary uses.

Turning to the implication of exemptions, certain Australian laws such as the Privacy Act 1988 (Cth) allow for state and federal exemptions across agencies. Should Pauline Wright’s concerns come to fruition, laws that authorise state, federal and intelligence agency warrants override the Determination’s prohibition on access, therefore, requirement for entities to share information with foreign governments exists and requires rigorous investigation, fortunately this is currently part of the PJCIS review mentioned above.

Instruments to investigate data protection and information privacy are widely available. PIA’s are one such mechanism designed to consider the impacts and issues that may arise due to deployment of surveillance systems, In addition, PIA’s aim to bring forth alternatives or safeguards to mitigate negative impacts to stakeholders (Wright et al. 2010). The PIA officiated by the Department of Health failed to adequately address these issues relating to the COVIDSafe application data. The PIA raised concerns in the form of recommendations prior to release. However, until legislation concerning usage and contractual arrangements is enacted, information privacy related matters will continue to emerge. Moreover, public trust will continue to decline. It is not desirable that a PIA for an application critical for the health and safety of Australians, and by extension privacy, did not seek independent expert or community input prior to release. The Australian government has openly stated that returning to normal life is dependent upon the application being downloaded and used (Ruiz and Moore 2020). In contrast, Professor McLaws, a member of the WHO coronavirus response panel stated “What’s not clear is who the custodian of the data is and where the data are stored. It’s not true informed consent” and in another statement “Until we know what the source code is and until we know whether Amazon has to fulfil Australian law, I won’t download the application” (White 2020). Amazon’s relationship with Australian law in releasing data held within Australia to the United States of America will hopefully crystallise after the PJCIS review into the Telecommunications Legislation Amendment (International Production Orders) Bill 2020 is completed.

Privacy of one’s information is significantly important in the pursuit of public trust, a critical factor that may impact on citizens’ support for a security practice (Friedewald et al. 2016), thus acceptance of intrusive technological solutions rely heavily on trust in the institutions that advocate such practices. The aim of the Privacy and Security Mirrors: “Towards a European Framework for integrated decision making” (PRISMS) project, was to gain better understanding of the relation between surveillance, security and privacy that could inform public policy and decision makers. The PRISMS project, a relatively large study, found a strong correlation between public trust and privacy intrusive measures, thus public trust played a critical role in the acceptance of security practices (Friedewald et al. 2016). The introduction of the General Data Protection Directive in May of 2018, otherwise referred to as the GDPR, illustrates that privacy of personal data is a serious issue in the European Union. The PRISMS project successfully informed policy makers in the EU, and by implication, influenced policy makers worldwide to follow suit (van Lieshout et al. 2013).

We acknowledge that any solution that enables health professionals to effectively and efficiently detect COVID-19 transmissions is a benefit to society as a whole and that contact tracing is effective. Conflicting views are however apparent with Norway’s health authority for instance ceasing to use the country’s COVID-19 application and deleting existing data (Kelio 2020). Within Australia, there are concerns about the technical implications of the use of the COVIDSafe application. We have already suggested a scenario where a false positive might occur. Interesting, the OAIC recommends turning Bluetooth ‘off’ to preserve privacy (although the pandemic might be considered a special case). Perhaps more seriously, there have been reports of the application interfering with medical devices that also use Bluetooth. Bluetooth may also be resource-intensive and drain a phone’s battery prematurely, so users might be reluctant to enable it, thus invalidating the data collected by the application. Furthermore, the application does not function correctly on Apple products. Notwithstanding the functionality issue, Apple and Google are jointly designing a different privacy-preserving contact tracing protocol. The Apple/Google solution is different to the COVIDSafe application in several respects, in that their solution does not collect location data from a user’s phone, nor does it share the identities of users with each other (or with Apple/Google for that matter). Further, random Bluetooth identifiers rotate every 10–20 min, which helps prevent tracking.

We now examine the above evidence and frame it in terms of Turner’s Three Process Theory (TPT) of power. Turner (2005) contends that the “standard” theory of power is really a set of general assumptions about the relationship between power and influence. He addresses this by providing a more formal model of the factors that influence power (see Fig. 1). Turner’s model is interesting in that, contrary to the standard model of power, group formation or the development of a shared social identity is the catalyst for influence, and this influence (separated by the different elements of persuasion, authority and coercion) is the foundation of power.

Fig. 1.
figure 1

(adapted from Turner 2005).

Turner’s power model

Applying Turner’s TPT to the constructs of Fig. 1, we find evidence (or, at least the semblance) of a shared social identity (group formation), driven by the COVID-19 threat and expressed by frequent television advertising as “We are all in this together”. Examining the three elements of influence, there is evidence of persuasion or convincing someone that your view is the correct one (advertising campaigns exhorting citizens to download the application), authority or the belief that someone else can control what you do (the government wants citizens to download the application) and coercion or someone can control your behaviour, even against your own interests (you may not be able to attend certain events if you have not downloaded the application). Notwithstanding concerns expressed about the security of the application’s data and potential future uses (cross-matching) of said data, there is also an “appeal to the gallery” implicit in the conversation around Facebook and other social media platforms capturing more personal data than the application (therefore, why not use the application?). One could argue that end-user’s perceptions of Facebook data collection processes are camouflaged through the perceived leisurely benefits of the application. Patil and Shyamasundar (2019) suggest that end-users believe they may exercise a degree of control over Facebook’s data collection process, despite not actively reviewing or adjusting any controls. In contrast COVID-19 centric applications are often managed by the governing body thus minimising opportunities for end-users to exercise control. The final element of Turner’s model, gaining control of resources, is evidenced by considering the data collected by the application to be a resource.

4 Conclusion

The number of private and public sector organisations deploying surveillance technologies is increasing rapidly (Mann and Smith 2017). This trend is expected to continue as new challenges emerge, for example, the outbreak of COVID-19. Recent law developments, for example, the Identity-Matching Services Bill (2019) or the Assistance and Access Act 2018 (Cth), have generated significant concern in regard to the erosion of privacy. In Australia, the uploading of facial images and licence plate information to the National Database is now a reality with little oversight and little debate regarding the rollout of such technologies.

It is clear from the literature that privacy is important to the public. With the introduction of new surveillance methods such as the deployment of drones, GPS tracking devices and contact tracing apps, public concern will likely continue to increase. An important finding from the EU PRISMS project was that public trust was paramount. The research concluded that public trust played a critical role in the acceptance of security practices (Friedewald et al. 2016). If surveillance technologies are to be deployed as solutions to security objectives, or in the case of COVID-19, a rapid response to unforeseen circumstances, then the Australian Government has a responsibility to address the ambiguity that surrounds the public’s perception of technological solutions and the laws that purport to protect privacy. A clear and definite roadmap for the reversal of intrusive technological surveillance systems would contribute to public trust, however such debate is absent from the discussion. The Australian Privacy Act offers little redress for breach of information privacy, moreover, the plethora of Acts, Bills and other Amendments provides for a contradictory landscape that is difficult to navigate leaving the average Australian often confused and mislead when new surveillance systems are introduced. It is time to consolidate these nuances surrounding law and design a solid framework for the deployment of surveillance technology. Worthy of consideration among all the newly, or otherwise predicated surveillance systems, is the continued advocacy of surveillance technology as a primary solution to national and state security objectives. The trade-off paradigm, that is, the assumption people are willing to trade privacy for more security, has been debated among scholars and academic circles for considerable time. People desire both security and privacy (Broek et al. 2017), thus finding the balance is pertinent in the pursuit of public trust. Friedewald et al. (2015) showed in research concerning the trade-off paradigm, evidence against the trade-off hypothesis and found no significant statistical correlation between people’s valuation of privacy and security concern, therefore, generalising that Australian citizens are willing to trade privacy for more security is not consistent with the evidence.

We are not arguing that privacy trumps security in all cases. All nations keep secrets and it is in their national interest to do so. What we observe is that, by nature, Australians are reticent to share their personal information with any government entity. In order to test if this is true, we propose to undertake a survey of segments of the population to evaluate current Australian attitudes to privacy and to evaluate if the COVID-19 pandemic changes these attitudes in any significant way.

The COVID-19 pandemic has seen the suspension of parliamentary sittings potentially setting a precedent for future emergency protocols to be established. Laws have been passed without opposition and surveillance systems are in the process of rapid deployment, thus the absence of political safeguards reduces the potential for external scrutiny. While the gravity of the pandemic can be appreciated, and we are indeed chartering unfamiliar waters, still it is unequivocally necessary that a well-informed sense of assurance that information risks and controls are in balance is paramount, in other words, a clear and concise Business Continuity Plan on behalf of Federal and State governments is crucial to enable continuation of government and democratic debate. Furthermore, decision making without practicing due diligence and regard for the impact on the Australian public deserves criticism. As stated by Zedner (2009) “Do we want to be completely secure in a police state?”.