Internet Filtering. Macquarie University john.selby@law.mq.edu.au



Similar documents
1/ The opening of the French market for online games. Chaire Sorbonne-ICSS

How To Defend Your Position On Net Neutrality In A Berrycreeper Consultation

Security threats and network. Software firewall. Hardware firewall. Firewalls

Software Engineering 4C03 SPAM

SUMMARY The Estonian Military Technical School ( , ). Surveys, memoirs and documents

curbi for Schools Technical Overview October 2014

Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA

Network Security - ISA 656 Intro to Firewalls

Type Certification Procedures Manual 9. Costing Type Certification 9.1 Introduction to Costing

DDOS in academic Networks. Herramientas para la seguridad prevención y mitigación de DDOS. CSUC. 3 de Abril 2014

SOURCEFIRE RNA (REAL-TIME NETWORK AWARENESS)

CONTROLLING THE GENIE OF EMERGING TECHNOLOGIES SIX STEPS TO MITIGATE RISKS CREATED BY INNOVATION JOHN DRZIK

CYBERSECURITY. Global cybersecurity capabilities for a digital transformation with confidence. Delivering Transformation. Together.

Internet routing registries (IRRs), data governance and security

Effectiveness of blocking evasions in Intrusion Prevention Systems. White Paper. April, Konstantinos Xynos, Iain Sutherland, Andrew Blyth

: WORLD WAR I CFE 3201V

Overview of Banking Application Security and PCI DSS Compliance for Banking Applications

Pravail 2.0 Technical Overview. Exclusive Networks

Best Practices: The Key Things You Need to Know Now About Secure Networking Layer 1 (SONET), Layer 2 (ATM), and Layer 3 (IP) Encryption Technologies

Promoting Cross Border Data Flows Priorities for the Business Community

Estonia 2007 Cyberattakcs

Reputation Metrics Troubleshooter. Share it!

14TH ASIA SECURITY SUMMIT THE IISS SHANGRI-LA DIALOGUE FOURTH PLENARY SESSION

The first round of TPP negotiations was held in Melbourne in March 2010.

Firewall Architecture

Suspend the negotiations for a free trade agreement with the USA no agreement at the expense of workers, consumers or the environment

Criminal Code Amendment (Cluster Munitions Prohibition) Act 2012

Mobility in Claims Management

Predictive Simulation & Big Data Analytics ISD Analytics

Trends in Tax Administration Outsourcing. Why tax administrations outsource?

Good practice Public Service Communications Unit Communications Function Review 2009

TRUFFLE Broadband Bonding Network Appliance. A Frequently Asked Question on. Link Bonding vs. Load Balancing

ISP Blocking in Italy

Major Economies Business Forum: Perspectives on the Upcoming UN Framework Convention on Climate Change COP-17/CMP-7 Meetings in Durban, South Africa

EU COOPERATION. The Madrid bombings have provided additional impetus for action. In an 18-page declaration on counter terrorism on

Differentiated Services

Five Roles of Political Parties

How To Read The Financial Services Chapter Of The Ptpa

How successful was the Civil Rights campaign in achieving its aims between 1950 and 1965? I have a dream...

8. Firewall Design & Implementation

COALITION OF MAJOR PROFESSIONAL & PARTICIPATION SPORTS SUBMISSION TO THE DEPARTMENT OF BROADBAND, COMMUNICATIONS AND THE DIGITAL ECONOMY

IT PROJECT GOVERNANCE GUIDE

ICTTEN8194A Investigate the application of cloud networks in telecommunications switching

Requirements & Reference Models for ADSL Access Networks: The SNAG Document

INTERNATIONAL COOPERATION IN CRIMINAL MATTERS (Practical approach to certain issues which are not regulated by law and international treaties)

Airport regulation: experience in Germany, UK and Australia

Distributed Denial of Service Attack Tools

ANNUAL GENERAL MEETING 2012

Chapter 1: Introduction

INTERNET DOMAIN NAME SYSTEM

Australia s Charities and Not-for-profits

SENIOR SYSTEMS ANALYST

Export Controls on Intrusion Software. Collin Anderson Tom Cross

F5 Intelligent DNS Scale. Philippe Bogaerts Senior Field Systems Engineer mailto: Mob.:

Assessing the strength of your security operating model

Formal Foundations for Security Architecture

Executive Suite Series An Akamai White Paper

DIGITALEUROPE and European Services Forum (ESF) response to the Draft Supervision Rules on Insurance Institutions Adopting Digitalised Operations

Overcoming Five Critical Cybersecurity Gaps

CENSURFRIDNS a.k.a. UNCENSOREDDNS. Thomas Steen Rasmussen

The Infrastructure Journey

CYBER SECURITY Audit, Test & Compliance

Providing Remote Access Connections for Building Services Projects

9 Simple steps to secure your Wi-Fi Network.

Capture Share Report Asia Pacific Business Intelligence and Analytics Solution Providers. Authored by Phil Hassey: - Founder capioit

CMPT 471 Networking II

Fujitsu Technology Solutions Cloud Computing Competenze e Strategie Fujitsu Quali opportunità e rischi per L Homeland Security

GLOBAL SERVICES FOR DEFENCE & AEROSPACE SECURE TODAY AND PREPARE FOR TOMORROW

Inventec Corporation Corporate Social Responsibility Best Practice Principles

NOS for Network Support (903)

Giganet Cloud Managed Security as a Service

HONORS U. S. HISTORY II World War I - DBQ DUE December 13, 2013

REGULATION IN THE INFRASTRUCTURE SECTOR

Questions raised by deputations

Preventing customer churn. Why B2B businesses switch suppliers and the industries most at risk from customer defection

Reduce your downtime to the minimum with a multi-data centre concept

TRUFFLE Broadband Bonding Network Appliance BBNA6401. A Frequently Asked Question on. Link Bonding vs. Load Balancing

TEACHER S KEY SESSION 1. THE WORLD BEFORE THE GREAT WAR. PRETASK. 3. Pre- listening.

MEMORANDUM OF UNDERSTANDING

Tax administration changes to raise additional revenue over time

Corporate Social Responsibility Practice Guidelines

Trends in Non-Competitive and Single Source Procurements

Criteria for adopting International Standards and Risk Assessments

Cisco AnyConnect Secure Mobility Solution Guide

Resolution 1244 (1999) Adopted by the Security Council at its 4011th meeting, on 10 June 1999

Should the IETF do anything about DDoS attacks? Mark Handley

THE INTERNET AND TRAFFIC MANAGEMENT A CABLE EUROPE FACTSHEET

DATA SECURITY 1/12. Copyright Nokia Corporation All rights reserved. Ver. 1.0

IVCi s IntelliNet SM Network

FINRMFS9 Facilitate Business Continuity Planning and disaster recovery for a financial services organisation

ANNUAL REPORT ON DISCRIMINATION IN FOREIGN GOVERNMENT PROCUREMENT April 30, 2001

Telefónica response to the consultation on the implementation of the Intellectual Property Rights Enforcement Directive

Business Council of Co-operatives and Mutuals

The Intelligent, Proactive Information Assurance and Security Technology IPDM

South Australia. The place where people and business thrive.

Hume Community Housing Association MARKETING COMMUNICATIONS SPECIALIST

Prepared by the Commission on E-Business, IT and Telecoms

Senate Economics Legislation Committee ANSWERS TO QUESTIONS ON NOTICE

Senate Economics Legislation Committee ANSWERS TO QUESTIONS ON NOTICE

Transcription:

Internet Filtering John Selby Macquarie University john.selby@law.mq.edu.au

Senator Conroy s Proposal Is just a proposal: Like all potential ti policies, i it has benefits and costs Eid Evidence-based d policy development is input for the Regulatory Impact Assessment process which involves Cost-Benefit Analysis Rigorous, transparent Cost-Benefit Analysis of Senator Conroy s proposal is required Rigorous, transparent Cost-Benefit Analyses of alternative policies to Senator Conroy s proposal are necessary

Cost-Benefit Analysis Internet t regulation is not just about technology Cost-Benefit Analysis needs to be done in the following areas: Technical Economic Social Political Legal Each policy alternative will have different strengths and weaknesses in those areas Different stakeholders will place different weights on those areas

Modalities of Regulation Law Architecture software code Norms Markets Transaction Costs

Transaction Costs Ex ante: Search, selection, negotiation Ex post: Enforcement Transactions only occur when the benefits of fthe transaction ti are greater than the transaction costs incurred to do so The Internet massively lowers certain transaction costs, particularly search costs for content that wants to be found

Static vs Dynamic Efficiency Static ti Efficiency i is what we usually think of as efficiency, ie building a system which can produce the most of X in a period of time with the fewest inputs Static efficiency is innately conservative: optimising the production of X makes it hard to switch to producing Y Dynamic efficiency is innately progressive: it focuses not only on producing X today, but on being able to efficiently switch to producing Y tomorrow and Z the day after

Internet filtering Internet t filtering i is a relatively l static ti form of regulation Compare the transaction costs of the filter operator vs the target The target: low TCs to change ISP, IP address, register a new domain name, rename files, adopt or build new Internet protocols The operator: high TCs to respond to the Target s behaviour Static policies are ineffective at resolving dynamic problems: they can t win the arms race over time and just fall further behind (ie require more and more money)

Internet regulation Truly protecting the children requires more than symbolic ineffective gestures If you are going to spend this much money on any policy: 1) define explicitly what the policy is designed to achieve; 2) do Regulatory Impact Assessments and Cost- Benefit Analysis of a range of policy alternatives 3) understand the difference between static- and dynamic-efficiency regulatory alternatives

Expensive to build Australia s s Maginot Line? Built to fight yesterday s war Beloved by private industries for $$$ construction & maintenance contracts Ignored Transaction Costs caused by new technologies Once built, critical infrastructure became national security risk France s Maginot Line Senator Conroy s proposed Internet Filter Over $1 Billion; rest of $$$; money better spent on police military weakened investigations and user education WW1 trenches: defence = fewer casualties Concrete, Artillery, Munitions Moving many troops over broken ground French overconfidence / Germans bypassed forts Customs interdiction of prohibited content at border Computer Hardware & Filtering Software companies Use of new protocols by users and suppliers, etc Monoculture ecosystem = single point of failure / In crisis, foreign hackers / govts seize control of filters or DDoS Static or Dynamically efficient? Static Relatively static Defeated / Outmoded by: Blitzkrieg: lightning g Internet users adopting new war on ground and air protocols / technologies Symbolic or truly capable of achieving policy objective? Symbolic - French citizenry not protected Symbolic - Australian citizenry unlikely to be truly protected