iTnews
  • Home
  • News
  • Technology
  • Telco/ISP

Conroy expands ISP filter tests to examine P2P and BitTorrent traffic

By Ry Crozier
Dec 22 2008 7:00PM
Follow google news

Broadband Minister Stephen Conroy has broken his silence on the controversial ISP content filter trials to start before the end of the year, saying they will now cover new filter technologies that can examine peer-to-peer and BitTorrent traffic.

Conroy expands ISP filter tests to examine P2P and BitTorrent traffic
In a post to the recently-launched
Department blog today, Conroy finally responded to some of the technical and alleged freedom of speech issues raised by the Federal government’s plan.

For the first time, the Minister revealed details of the types of content filters to be included in live ISP trials, with peer-to-peer traffic monitoring now on the government’s radar.

“Technology that filters peer-to-peer and BitTorrent traffic does exist and it is anticipated that the effectiveness of this will be tested in the live pilot trial,” said Conroy.

The admission is a new development for the proposal, which previously centred around monitoring standard HTTP and HTTPS traffic. Opponents had criticised the plan alleging that offensive content is often delivered via protocols and applications other than standard web sites - for example, via virtual private networks, email, newsgroups or instant messenger.

Conroy said the government ‘understands that the potential extent of ISP filtering is inherently related to the technical capabilities of filtering solutions’.

“International experience suggests that index-based filtering of a central blacklist is technically feasible,” said Conroy.

“Broader, dynamic analysis filtering of internet content, on the other hand, has raised some issues in the past.

“The government is currently testing the effectiveness of these technical solutions in the current live trial. The results of this trial will inform the government's approach to this issue,” said Conroy.

However, the Minister has resisted calls to reveal the contents of the proposed blacklist, claiming it is not in the public’s best interests.

“The ACMA blacklist is currently protected from release under the Freedom of Information Act,” said Conroy.

“Publishing the title or internet address of child abuse material would constitute distribution of illegal material and is therefore protected from release.

“To do otherwise would allow a person to view and download the material in jurisdictions where ISP-level filtering was not implemented.

“Given that most of this material relates to child sexual abuse, the publication of this information is clearly not in the public interest,” said Conroy.

Conroy denied that the content filtering plan would impinge on Internet users’ rights to freedom of speech.

“Freedom of speech is fundamentally important in a democratic society and there was never any suggestion that the Australian Government would seek to block political content. In this context, claims that the Government's policy is analogous to the approach taken by countries such as Iran, China and Saudi Arabia are not justified,” he said.

“All the government is now seeking to do is to examine how technology can assist in filtering internationally-hosted content.”

He also ruled out re-introducing PC-level filtering - the approach adopted by the previous government.

“Despite an $84.8 million government program and $15.5 million in advertising, only about two per cent of households with dependent children are using a [PC] filter,” said Conroy.

“Unfortunately, many parents do not have the technical skills or knowledge to install and manage PC-level filters. ISP-level filtering could provide important protection for those families with limited technical expertise.”

He continued: “We understand that ISP filtering is not a 'silver bullet' for this purpose. However, in conjunction with the Government's numerous other initiatives in this area, we believe it can make an important contribution to protecting children online.”

Add iTnews as your trusted source

Add iTnews As Your Trusted Source Add iTnews As Your Trusted Source
Got a news tip for our journalists? Share it with us anonymously here.
Tags:
acmabittorrentblacklistconroycontentfiltersispnetp2ptelco/isptrials

Related Articles

  • Telco service abuse dominates federal crime in Victoria Telco service abuse dominates federal crime in Victoria
  • ACCC backs tighter rules on mobile coverage claims ACCC backs tighter rules on mobile coverage claims
  • TPG Telecom and Optus clash with Telstra over ACMA mobile coverage maps plan TPG Telecom and Optus clash with Telstra over ACMA mobile coverage maps plan
  • Aussie Broadband prioritises VMware-based workloads for cloud migration Aussie Broadband prioritises VMware-based workloads for cloud migration
Join our WhatsApp Channel

Partner Content

Security for smart devices – time to step forward because there's nowhere to hide
Promoted Content Security for smart devices – time to step forward because there's nowhere to hide
AI Goals for 2026: What Every Organisation Should Prioritise
Promoted Content AI Goals for 2026: What Every Organisation Should Prioritise
From Faster Coding to Accelerated Innovation Cycles: How Intelligent Orchestration Unlocks AI's Promise
Promoted Content From Faster Coding to Accelerated Innovation Cycles: How Intelligent Orchestration Unlocks AI's Promise
Targeting Maximum Competitive Advantage for Businesses
Promoted Content Targeting Maximum Competitive Advantage for Businesses

Sponsored Whitepapers

5 reasons to adopt a mobile first security strategy
5 reasons to adopt a mobile first security strategy
Uncomplicate IT Service Delivery with AI Agents
Uncomplicate IT Service Delivery with AI Agents
Getting ahead of the tech: what’s next for Australian organisations in digital transformation
Getting ahead of the tech: what’s next for Australian organisations in digital transformation
Fintech compliance made fast and secure
Fintech compliance made fast and secure
How to evaluate SIEM solutions Safeguarding your future Get a demo Download guide
How to evaluate SIEM solutions Safeguarding your future Get a demo Download guide

Events

  • Cyber Resilience Summit Cyber Resilience Summit
  • iTnews Executive Retreat - Security Leaders Edition iTnews Executive Retreat - Security Leaders Edition
  • Huntress + Eftsure Virtual Event -Fighting A New Frontier of Cyber-Fraud: How Leaders Can Work Together Huntress + Eftsure Virtual Event -Fighting A New Frontier of Cyber-Fraud: How Leaders Can Work Together
  • iTnews Cloud Covered Breakfast Summit iTnews Cloud Covered Breakfast Summit
  • Live & Hands On Demo: Navigating the BMC AMI DevX Platform to Understand Code Faster Using AI Live & Hands On Demo: Navigating the BMC AMI DevX Platform to Understand Code Faster Using AI
Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

TPG Telecom and Optus clash with Telstra over ACMA mobile coverage maps plan

TPG Telecom and Optus clash with Telstra over ACMA mobile coverage maps plan

Telstra first out of gates in Australia with anti-fraud APIs for network

Telstra first out of gates in Australia with anti-fraud APIs for network

Aussie Broadband prioritises VMware-based workloads for cloud migration

Aussie Broadband prioritises VMware-based workloads for cloud migration

Telstra pushes forward with agentic AI plans

Telstra pushes forward with agentic AI plans

techpartner.news logo
Sydney-based AI-cloud waste startup raises $3m
Sydney-based AI-cloud waste startup raises $3m
Brennan uses NiCE to modernise its contact centre
Brennan uses NiCE to modernise its contact centre
Impact Awards: Tecala slashes customer response times for fintech IQumulate
Impact Awards: Tecala slashes customer response times for fintech IQumulate
Interactive introduces private cloud platform
Interactive introduces private cloud platform
Digital61 expands cybersecurity portfolio
Digital61 expands cybersecurity portfolio
All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's Privacy Policy and Terms & Conditions.