Child abuse content blocking is for 'curious individuals': IIA
- 28 June, 2011 10:25
The voluntary blocking of online child abuse material being implemented by ISPs Telstra and Optus is not attempting to address hardened offenders but instead looking to limit the availability of material to “curious individuals”, according to the Internet Industry Association (IIA).
IIA chief executive, Peter Coroneos, told Computerworld Australia the move to block child pornography sites, based on a blocklist compiled by Interpol, is more about aligning Australia with European countries including Denmark, France, Sweden and Norway, and taking the first step toward reducing the availability of such content online.
“A large part of the thinking is that if we can work with the ISPs to limit the availability of this material on the public internet, which is about as much as we can do it at the moment,” Coroneos said. “It’s a step in the direction of diminishing the exposure of perhaps curious individuals that may not yet be paedophiles that don’t have the resources that hardened offenders do.”
“If you’re part of a hardened paedophile network you’re probably not going to be using the open internet to access content. You’re going to be using much more difficult-to-track means, so we’re not really attempting at this stage to address that.”
He stresses the project is not censorship or filtering, but rather the blocking of illegal images as notified by Interpol.
“We’re not talking about all forms of offensive content on the net which can vary according to culture and values — we’re talking about a very specific subset of content that again most countries in the world have already passed laws to criminalise.”
A Telstra spokesperson told Computerworld Australia the blocking would occur across its entire network and is implemented by programming the telco’s domain name servers to redirect internet users to a ‘stop page’ should they request a restricted site.
“Other than blocking access to these specific sites, the technology does not inspect data traffic or filter the content of browsers sessions in any way,” the spokesperson said.
“We believe the telecommunications industry has a responsibility to limit the distribution of content containing child sexual abuse material.”
With Optus and Telstra committed to the initiative, and the latter implementing the Interpol list from 30 June, Coroneos is optimistic that once the code of conduct is released, smaller ISPs will join the fold.
“I can’t think of why not if it’s not an expensive exercise for the ISPs — if it’s clear that it’s just child pornography and something that the user base will support. I can’t imagine that ISPs could really mount much of a credible argument as to why they shouldn’t do it.”
According to Coroneos, traditional concerns for smaller ISPs, including who makes the determination around the blocked content and the cost, should not apply as it can be done with existing infrastructure and it is clear that Interpol is supplying the list, which encompasses a narrow range of serious content.
“It’s been constructed in such a way that we are not dictating the form in which the technical blocking occurs and in most cases we believe it can be done using existing equipment,” he said.
“It’s more a question of Interpol providing them with the relevant list of sites to be blocked and then they would implement that as part of their normal routing.”
Exetel chief executive, John Linton, said the ISP would have no reason not to participate in the scheme and would do so if requested but does not have the means to do so alone.
“We don’t have the resources to determine what sites should be banned so we would do nothing via our own initiative,” he said. “Like any right thinking people we abhor the whole concept of child abuse.”
Commenting on the initiative, Internode managing director, Simon Hackett, said the ISP would not be participating in the program but would be watching the outcome “with interest”.
Follow Chloe Herrick on Twitter: @chloe_CW
Follow Computerworld Australia on Twitter: @ComputerworldAU
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
Why change management doesn’t work
Larry Page wants to see your medical records
Dual-Persona Smartphones Not a BYOD Panacea
After two-year hiatus, EFF accepts bitcoin donations again
CIOs struggle to deliver timely mobile business apps: survey
CSO Spotlight: Security-as-a-Service Gaining Popularity
Organizations that are looking for security features including identity management, encryption and access control — and at the same time want to take advantage of the cost and flexibility benefits of the cloud —might check into security-as-a-service offerings available now from several vendors. Download now to find out more.
Endpoint Security and Virtualisation
Besides form factor, virtual systems are not really that different than physical systems. They both use the same operating systems and applications. They both present users with computing resources such as RAM and hard drives. Consequently, the ability to exploit vulnerabilities in a physical environment will present a significant threat to virtualised environments as well. This paper examines the different endpoint security methods for virtualised environments and presents how Endpoint Protection security provides optimal performance, protection and manageability.
Six Reasons to Empower Your SharePoint Citizen Developers
More and more business applications are being created by “citizen developers” - end users who are not IT developers but who create solutions for themselves and their groups. This white paper explores six reasons to embrace citizen development in an intelligent way that minimises risks and maximises the return on your SharePoint investment. Read now.