ACMA's blacklist a bigot's battleground
I was never really worried about the government's fabled Internet porn filters, amid all the hoo-ha.
But the recent disinter of the remiss procedures taken by the communications watchdog for arbitrating what online content Australians will and will not be able to visit has been sobering. If the privacy advocates are right — ACMA, I'm still waiting for confirmation whenever you're ready — then Australia's clean-feed Internet will be determined by one lone bureaucrat.
But claims that the Australian Communications and Media Authority (ACMA), the fierce protector of the Internet blacklists that frame the content filters, will bend to the whim of any rampant moral crusader wanting to silence dissenting opinion is a presage of things to come.
This week's news that the same government agency will whack any news outlet that dares mention the abortion*blank*.com site, banned by the watchdog after an apparent appeal by a liberal crusader, with an $11,000 fine left myself and most others agog.
Turns out this bloke, a Whirlpool forum member, was trying to give ACMA the pip and test just how stringent the ACMA procedures are for mediating the blacklist.
Pretty damn slack, it seems.
Now the watchdog has banned the infamous Wikileaks site after it committed the same reproachable offense and publish the link to the banned Web site. Clever users have taken the fight closer to ACMA's turf and listed the page on the agency's Wikipedia page (currently in editoral lockdown) to see if the lone blacklist watchman has the gall to ban the page.
I'll concede that Greens' Scott Ludlam was right when he said it's early days and the government can't make head nor tail of how the whole thing will work — funny they seem to use that excuse for a lot of policy — and this rubbish will likely be ironed out, but what about all those now banned Web sites that we didn't hear about?
They may not be removed and, because the nature of blacklists demand secrecy, we may never know.
I expect we'll hear of some changes to the way these blacklists are managed, if the filters don't come a cropper first.
Flash storage represents a quantum leap from the storage layer in terms of performance, however it is crucial companies understand their I/O profile in order to formulate a successful storage strategy. Find out in this eBook how flash storage can be beneficial for enterprises and useful questions to ask before making an informed decision on the purchase.
- CCContract System Analyst (SQL/.net) 160205/SA/561Asia
- CCContract Analyst Programmer 160120/AP/vvtAsia
- CCHelpdesk SupportNSW
- CCSenior Information Security SpecialistNSW
- CCContract System Analyst (Website/PHP development) 160122/SA/vmtAsia
- CCEnterprise Architect - Network & InfrastructureNSW
- FTSystems Engineer / Administrator - Managed ServicesNSW
- CCContract Analyst Programmer (Java/Visual VB.net) 160115/AP/vhsAsia
- FTJava Web Development OpportunityVIC
- FTSenior Mobile Developer - IOSNSW
- CCSenior Visual DesignerNSW
- CCIT Solution DesignerNSW
- CCSenior Test AnalystSA
- CCAutomation QAVIC
- FTApplication Support AnalystVIC
- FTWeb Programmer/ DeveloperVIC
- CCLevel 2 Helpdesk, Service Support- Remedy or SAP backgroundNSW
- CCLync/Skype EngineerNSW
- CCInformation Security ManagerNSW
- CCInformatica ExpertNSW
- CCData Stage DeveloperNSW
- CCWeb Content WriterSA
- CCSSIS/ SSRS ExpertVIC
- CCContract Programmer (Crystal Reports/JAVA/SQL) 160129/P/vhs-cAsia
- FTMobile Designer / Developer - IOSNSW
Internal and external disruptions can impede business continuity and result in negative repercussions for enterprise productivity and data resources. This whitepaper looks at how improved mobility access can shield companies from unprecedented risks, resulting in greater cost savings and enhanced workforce continuity. It also highlights the benefits of having a mobile workspace technology which enables the workforce to have access to apps, desktops and files in difficult situations. Included are four case studies where organisations are able to demonstrate a high level of business continuity with sound disaster recovery strategies in place.
- Modular cellphone kit can be used for IoT and wearables
- Dragula looks to take the bite out of drag-and-drop
- Mozilla sets kill date for Firefox OS on phones
- LTE-U’s cold war may be thawing, as field testing commences ahead of summit
- Now that AI has mastered 'Go', are all our jobs next?
- Make a $40 Linux or Android PC with new Raspberry Pi 2 rival
- Researcher finds serious flaw in Chromium-based Avast SafeZone browser
- Fed up with bogus computer support calls, man turns tables on scammers
- Dridex banking malware mysteriously hijacked to distribute antivirus program
- SamsaraJS: Famo.us fork juices mobile Web UIs
- How to secure Amazon Web Services like a boss
- UN panel backs WikiLeaks' Julian Assange, but he may not go free
- The Neutrino exploit kit has a new way to detect security researchers
- 7 smartphone trends to watch this year
- What businesses need to know about Privacy Shield