Feeds

Oz porn queen defends lecher list

MPs can check its accuracy, says flame-tressed Bernadette

  • alert
  • submit to reddit

High performance access to file storage

Porn queen and cyber-rights crusaderess Bernadette Taylor has kneed the Australian Government right where it hurts after ministers questioned the accuracy of her "exposed list" (see earlier story). And in a move that could seriously embarrass the Australian Government, she's told ministers they can even check the details for themselves to prove its accuracy. In an open e-mail today to the Australian Minister for Communications, Richard Alston, she said: "The list was compiled under my instruction by one of the highest qualified (and arguably most experienced) systems engineers on the planet using the latest in equipment and software technology available. "Because of the sensitive nature of the list, every single entry on the list was checked and tested thoroughly. "If it's on the list it was looking at porn. "Of course if the minister still disputes that he can come and look at the corresponding credit card details [for himself]," she wrote. Last month, the saucy Lara Croft lookalike published a list of 4316 individuals she said were using government-provided Internet access to view pornography during work hours. She took the action to protest at the Australian Government's decision to censor the Net and hold ISPs responsible for any breaches in the new law. "The list represents the inadequacy of filtering and/or monitoring and/or supervision systems as used by the govt," she said today. "If they can still access my adult Web site from a Government PC during office hours then the list shows that these systems do not work... yet they expect ISPs to do it right the first time or pay a fine." She dismissed claims that some of the people on the list may have been doing bona fide research into the subject or had happened upon the site by chance. For that very reason, she discounted all entries that had less than 20 access requests per IP. "But accidental and research accesses don't include spending several hours over several weeks watching Webcam shows in their entirety (and in many cases joining up via credit card) and playing games on the site," she said. Taylor has vowed to carry on her fight to get the law overturned. ®

Top three mobile application threats

More from The Register

next story
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Record labels sue Pandora over vintage song royalties
Companies want payout on recordings made before 1972
MtGox chief Karpelès refuses to come to US for g-men's grilling
Bitcoin baron says he needs another lawyer for FinCEN chat
Number crunching suggests Yahoo! US is worth less than nothing
China and Japan holdings worth more than entire company
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
prev story

Whitepapers

SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.