Feeds

Australia's net filter sneaks into operation through back door

Regulator's ban on dodgy shares site wipes out hundreds, exposes censorship mechanism

The Essential Guide to IT Transformation

Australia's national internet filter has re-emerged as an incompetence-powered zombie, after the nation's corporate regulator mistakenly blocked access to hundreds of sites.

The regulator in question is the Australian Securities and Investments Commission (ASIC), which says its role is “ensuring that Australia’s financial markets are fair and transparent, supported by confident and informed investors and consumers.”

In pursuit of those goals, in March, the Commission issued a warning notice about the activities of an outfit called Global Capital Wealth, and accused the investment organisation of running "scam" websites “which purport to provide share trading services”. Such activities are illegal and ASIC therefore “blocked access to these websites”.

ASIC was able to do so by invoking section 313 of Australia's Telecommunications Act, which says, in part “A carrier or carriage service provider must ... do the carrier's best or the provider's best to prevent telecommunications networks and facilities from being used in, or in relation to, the commission of offences against the laws of the Commonwealth or of the States and Territories.”

That section has been used by Australia's government to encourage telcos to adopt Interpol's “Worst of” list, a document comprising "a list of domains containing the websites that disseminate the most severe child abuse material worldwide."

Australia last year decided to adopt that list and suggested telcos use it after reading Section 313. Doing so was decided on after concerted opposition to a rival proposal for a national internet filter saw that idea abandoned. Telcos and ISPs didn't seem to mind and the debate cooled down.

But the debate is now white hot again, because the IP address ASIC offered up for Global Capital Wealth did not belong to it alone. Instead it was a hosting company's IP address and numerous sites lived behind it. When access to Global Capital Wealth's site was blocked, hundred of other sites also found themselves inaccessible.

Some complained and one caught the attention of the Electronic Frontiers Foundation. Things burbled along for a while until local news outlet Delimiter joined the dots this week.

Questions are now being asked about just how it is possible for ASIC, or other agencies, to add sites to the list telcos are asked to block under Section 313 and why there's no oversight of the process for doing so.

Just why ASIC is unaware that one IP address can point to many websites is also something many would like to know.

Those inclined to believe this situation is the government creating a filter by stealth are not being shy of saying so.

Activists and media (including The Reg) have deluged the relevant ministers and agencies with questions about just how and why this happened.

The relevant Ministers, while admitting the incident is not a good look, are so far adamant this is not a filter-by-stealth, but are promising to look into what happened. ®

Boost IT visibility and business value

More from The Register

next story
UK gov rushes through emergency law on data retention
Cameron: 'The consequences of not acting are grave'
Judge says there's no such thing as a 'Patent Troll'
Apple banned from calling litigant a 'Bounty hunter', 'corporate shell' or 'Troll'
NSA dragnet mostly slurped innocents' traffic
Latest Snowden leak suggests indiscriminate retention
ISPs haul GCHQ into COURT over dragnet interwebs snooping
'Exploitation of network infrastructure is unlawful,' says co-claimant
Siri, did we just take a hit in that voice-recog patent fight?
Yes, Apple, you did, says this Beijing court
Report: UK.gov wants to legislate on comms data BEFORE next election
Ministerial alarm sets in over EU court's data retention ruling
Amazon sues former employee who took Google cloud job
Alleges breach of non-compete clause in contract
Russian law will force citizens' personal data to be stored locally
Won't someone think of the software-as-a-service startups?
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Eight steps to building an HP BladeSystem
Building your ideal BladeSystem infrastructure solution begins with eight simple steps, outlined in this whitepaper.
Securing Web Applications Made Simple and Scalable
Learn how automated security testing can provide a simple and scalable way to protect your web applications.
Build a Business Case: Developing Custom Apps
In this whitepaper learn how to maximize the value of custom applications by accelerating and simplifying their development.