Feeds

Secret forum reveals Oz firewall backroom dealing

Circumvention legal, but you can't tell anyone how

The Essential Guide to IT Transformation

Australia’s plans for a firewall to protect its population from smut on the internet are rapidly evolving from farce to total chaos. Weekly revelations on bulletin boards suggest that Stephen Conroy, the man behind the big idea, does not know what forthcoming legislation on the topic will say, when it will be introduced or how the firewall will work in practice.

Meanwhile, it turns out that the Minister’s own Department of Broadband, Communications and the Digital Economy (DBCDE) has been hosting a secret forum for discussions with ISPs likely to be affected by proposals. Along the way it floated the idea of making it a crime to advise surfers on how to do things that are perfectly legal to do. Confused? You will be.

First up is the time scale for plans to introduce the new firewall. As already reported, the question of when legislation will be introduced has now been bouncing between the offices of Prime Minister Kevin Rudd and Communications Minister Stephen Conroy. Severe wriggling from Conroy’s office suggests that plans for an early introduction of legislation have been put on the back burner for now.

As if one embarrassment were not enough, at the end of April, Electronic Frontiers Australia (EFA) revealed that it had in its possession screenshots of a secret forum hosting discussions between the Department of Communications and various ISPs.

Despite assurances from Conroy in December 2009 that legislation would be before the Australian parliament by March of this year, one post on the forum from mid-April acknowledged that the Department had not yet assembled even draft legislation.

Meanwhile further digging inside this forum revealed that departmental officials appear to have been discussing the possibility of making it a criminal offence to advise individuals of means that would enable them to circumvent the filter – even where the means themselves were perfectly legal.

This last revelation proved too much for the Australian Pirate Party, which weighed into the debate shortly after, accusing the government of hosting plans that would be at home with oppressive regimes such as Iran or China.

A spokesman for the Pirate Party said: "What is concerning ... is that the Department of Broadband, Communications and the Digital Economy (DBCDE)] have considered making the promotion of circumvention somehow illegal.

"If circumvention will not be illegal, then how can it be illegal to simply tell people how to circumvent the government-controlled infrastructure in order to secure access to information that the Australian Government may deem inappropriate."

Such an offence, according to the Pirate Party would mean "effectively silencing political debate" in Australia.

However, in an apparent attempt to stop the rot, the Department of Communications last Monday finally provided answers to a string of questions on the working of the firewall previously put to it by Green Senator, Scott Ludlam.

In yet another apparent volte-face, the department now claims that it would be perfectly legal for customers to adopt circumvention techniques. Its response further reveals that the Minister is well aware of the efficacy of such techniques, prompting speculation that he is actually far better informed than his public pronouncements suggest: that he knows the firewall will be of minimal effectiveness, and therefore his pursuit of this project is motivated more by populist politics than a desire to find a practical solution.

Most ominous of all for the theoretical firewall is a departmental admission that the government will put in hand a "technical review" if ever the filter hits the 10,000 URL mark and starts to creak under the strain.

As the EFA suggests, this answer raises more issues than it addresses, and relies on the degradation of the Australian network being gradual, rather than catastrophic. It does appear, however, that the government has no plans to deal with a possible overload of its firewall bringing the Australian internet to its knees – beyond setting up a review when such an event actually happens.

By then, of course, it could all be far too late. ®

The Essential Guide to IT Transformation

More from The Register

next story
Scotland's BIG question: Will independence cost me my broadband?
They can take our lives, but they'll never take our SPECTRUM
Trying to sell your house? It'd better have KILLER mobile coverage
More NB than transport links to next-gen buyers - study
iWallet: No BONKING PLEASE, we're Apple
BLE-ding iPhones, not NFC bonkers, will drive trend - marketeers
Auntie remains MYSTIFIED by that weekend BBC iPlayer and website outage
Still doing 'forensics' on the caching layer – Beeb digi wonk
Speak your brains on SIGNAL-FREE mobile comms firm here
Is goTenna tech a goer? Time to grill CEO, CTO
NBN Co adds apartments to FTTP rollout
Commercial trial locations to go live in September
Samsung Z Tizen OS mobe is post-phoned – this time for good?
Russian launch for Sammy's non-droid knocked back
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Maximize storage efficiency across the enterprise
The HP StoreOnce backup solution offers highly flexible, centrally managed, and highly efficient data protection for any enterprise.