Australia’s surveillance framework is broad. Interception powers (TIAA), two-year metadata retention, the TOLA assistance regime, the AFP/ACIC Identify & Disrupt powers, and Online Safety mechanisms create overlapping ways to access data. These laws aim at crime and national security, but they also enable dragnet collection and compelled assistance that can touch ordinary people. A realistic stance is neither panic nor apathy: know the capabilities, then reduce your exposure.
- Prefer end-to-end encrypted services with open protocols and public audits.
- Keep less data: prune cloud backups, auto-delete messages, minimize account sprawl.
- Separate roles: don’t mix personal and sensitive work on the same identity or device.