Feeds

The Great Aussie Firewall is dead: Long live the firewall

Details of Australian ISP blocking now public

Security for virtualized datacentres

The Australian government announced new laws today – or yesterday in local time – that will force all Australia-based ISP’s to block dodgy material entering the country from overseas, or face swingeing penalties if they fail to do so.

The announcement came in an official statement from the Department of Communications which made clear the Government’s intention to "introduce legislative amendments to require all ISPs in Australia to use ISP level filtering to block overseas hosted Refused Classification (RC) material on the Australian Communications and Media Authority’s (ACMA) RC Content list".

They added: "Content defined under the National Classification Scheme as Refused Classification includes child sexual abuse imagery, bestiality, sexual violence, detailed instruction in crime, violence or drug use and/or material that advocates the doing of a terrorist act."

This represents a retreat from initial hazy plans to introduce a great state-run firewall to shield the country from the tidal wave of "unsuitable material" that lurked just outside its shores. Insofar as the scheme is actually workable, it is viewed by many as a dangerous assault on freedom of speech in Australia.

El Reg spoke to Colin Jacobs, Vice-Chair of Electronic Frontiers Australia (EFA). He confirmed the gradual evolution of government thinking, from the technologically unfeasible through to the solution advocated today.

He explained that the present government were elected on a platform that included protecting the nation from child abuse on the internet. This quickly translated into vague plans for some sort of shield, and a long drawn-out testing process to "prove" that filtering based on the Australian Communications and Media Authority [ACMA] blacklist would not excessively degrade internet speed.

According to the Communications Department, the tests carried out have shown that this can be done.

Mr Jacobs said: "The real problem was never technical, but political. Although the government rhetoric is all based on child abuse, only about a third of existing RC material could be considered to be child abuse: the RC classification is notorious for including all manner of material on grounds it might incite crime."

That is the presumed reason why a Youtube film site on euthanasia has been included on the RC list. The Australian ratings system is also notorious for not having an R18 categories for games, which means that many games passed for play in the UK and the rest of the world are simply banned in Australia.

In recognition of this, the announcement from the Communications Department highlights an ongoing consultation on the status of RC as classification.

Mr Jacobs added: "It is not at all clear why the RC list includes many gambling sites – as well as that of an Australian dentist, who suffered the misfortune of having his site hacked some years previously".

The Australian government is keen to draw parallels between this list and the IWF scheme in the UK. EFA Supporter and Register reader Cameron Watt explained: "A key difference is that it is mandatory, leaving little leeway for ISP’s to make mistakes. That is likely to create a need for greater network complexity and add to the cost overhead.

"It will also be state run, leaving the suspicion that even if people agreed 100% with what is on the list now, a future government might block more widely. There are already suspicions that [Communications Minister] Stephen Conroy is anticipating the result of a landmark copyright case and is thinking of using filtering as a means to block piracy."

Not unsurprisingly, the Australian Sex Party is spitting feathers. Their official blogger writes: "I have just started reading the Enex report into mandatory filtering and my blood is already starting to boil." More seriously, their concern is that if filtering ends up being applied at site level, almost every X-rated site to which Australians have access now will eventually be blocked.

Equally unsurprisingly, the Australian Christian Lobby were supportive of the government announcement, and are nudging already for the principle to be extended further to "deal with other harmful X and R-rated material on the internet". ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
Found inside ISIS terror chap's laptop: CELINE DION tunes
REPORT: Stash of terrorist material found in Syria Dell box
Show us your Five-Eyes SECRETS says Privacy International
Refusal to disclose GCHQ canteen menus and prices triggers Euro Human Rights Court action
Heavy VPN users are probably pirates, says BBC
And ISPs should nab 'em on our behalf
Former Bitcoin Foundation chair pleads guilty to money-laundering charge
Charlie Shrem plea deal could still get him five YEARS in chokey
NORKS ban Wi-Fi and satellite internet at embassies
Crackdown on tardy diplomatic sysadmins providing accidental unfiltered internet access
'Serious flaws in the Vertigan report' says broadband boffin
Report 'fails reality test' , is 'simply wrong' and offers ''convenient' justification for FTTN says Rod Tucker
FAIL.GOV – Government asks Dropbox for accounts that don't exist
Storage locker's transparency report shows rise in government data gobble attempts
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Top 5 reasons to deploy VMware with Tegile
Data demand and the rise of virtualization is challenging IT teams to deliver storage performance, scalability and capacity that can keep up, while maximizing efficiency.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.