Freedom on the Net 2012 - Australia
|Publication Date||25 September 2012|
|Cite as||Freedom House, Freedom on the Net 2012 - Australia, 25 September 2012, available at: http://www.refworld.org/docid/5062e8ab1e.html [accessed 29 December 2014]|
|Disclaimer||This is not a UNHCR publication. UNHCR is not responsible for, nor does it necessarily endorse, its content. Any views expressed are solely those of the author or publisher and do not necessarily reflect those of UNHCR, the United Nations or its Member States.|
Australia enjoys affordable, high-quality access to the internet and other digital media. This quality of access improved in 2011 with the rollout of the National Broadband Network (NBN), a new communications network that aims to significantly improve broadband capacity and speed. Once fully implemented, the NBN will eliminate the need for any remaining dial-up connections and make high-speed broadband available in remote and rural areas.
Access to online content is far-reaching, and Australians are able to explore all facets of political and societal discourse, including information about human rights violations. Nonetheless, privacy and freedom of expression concerns remain, particularly in the context of Australia's pending accession to the Convention on Cybercrime and the proposed Cybercrime Legislation Amendment Bill. Unlike many other countries that have already ratified the convention, Australia is expected to go beyond the treaty's terms in calling for greater monitoring of all internet communications by internet service providers (ISPs).
Obstacles to Access
Access to the internet and other digital media is widespread, almost ubiquitous. Australians have a number of internet connection options, including ADSL, wireless, cable, satellite, and dial-up. Wireless systems have the capacity to reach 99 percent of the population, while satellite capabilities are able to reach 100 percent. Dial-up has been phasing out, with nearly 90 percent of internet connections now provided through other means.
In 2011, the National Broadband Network (NBN) was launched to further expand high-speed internet access across the country. The NBN includes laying high-speed fiber-optic cable to connect homes and businesses in Australia and incorporate 93 percent of the country's population, with prioritization of the rollout to remote communities with either no broadband capacity or limited connection. The other 7 percent would connect to the internet by new satellite and fixed wireless technologies. With the development of the high-speed National Broadband Network (NBN), all Australians, including those in more remote areas, will soon enjoy peak connection at a minimum of 12 Mbps using a "nationwide network of fibre, fixed wireless and satellite technologies."
In 2011, Australia had an internet penetration rate of 79 percent, and between 2010 and 2011, additional one million households gained access to broadband internet, with 73 percent of households equipped with a broadband connection by December 2011. These figures are expected to steadily increase with the implementation of the NBN. Although internet access is widely available in locations such as libraries, educational institutions, and internet cafes, Australians predominantly access the internet from home, work, and increasingly through mobile telephones.
People of all ages are using the internet, but the elderly population lags behind. In fact, age is a significant indicator of internet use, with 69 percent of Australians between 18 and 24 years accessing the internet at home on a daily basis, and 75 percent of people 15 years or over reporting having used the internet in the past 12 months. By contrast, only 31 percent of those 65 and over had used the internet during the same time period. Approximately 50 percent of Aboriginal and Torres Strait Islanders living in discrete indigenous communities (not major cities) have access to the internet, with 36 percent having internet access in the home.
Australia had a mobile phone penetration rate of 108 percent in 2011 with some consumers using more than one phone or SIM card. Third-generation (3G) mobile services are the driving force behind the recent growth in usage. The overall mobile phone penetration rate in Aboriginal communities is unknown, however, and not all indigenous communities have mobile phone coverage.
Australia, like most other industrialized nations, hosts a competitive market for internet access, with 97 medium to very large ISPs in June 2011, as well as hundreds of small ISPs. Many of the latter are "virtual" ISPs, maintaining only a retail presence and offering end users access through the network facilities of other companies. ISPs are considered carriage service providers (CSPs) under Australian law. As such, they are required to obtain a license from the Australian Communications and Media Authority (ACMA) and to be members of the Telecommunications Industry Ombudsman (TIO), an independent dispute resolution service. Australian ISPs are co-regulated under Schedule 7 of the 1992 Broadcasting Services Act (BSA), meaning there is a combination of regulation by the ACMA and self-regulation by the telecommunications industry. The industry's involvement consists of the development of industry standards and codes of practice.
The government has adopted a strong policy of technical neutrality. There are no limits to the amount of bandwidth that ISPs can supply, and ISPs are free to adopt internal market practices on traffic-shaping. Some Australian ISPs practice traffic-shaping under what are known as fair-use policies. If a customer is a heavy peer-to-peer user, for example, internet connectivity for those activities are slowed down to free bandwidth for other applications. Advanced web applications such as the social-networking sites Facebook and MySpace, the Skype voice-communications system, and the video-sharing site YouTube are neither restricted nor blocked in Australia.
Limits on Content
Australian law does not provide for mandatory blocking or filtering of websites, blogs, chat rooms, or platforms for peer-to-peer file sharing. Users are able to access a wide range of information, and their ability to openly express dissatisfaction with politicians and criticize government policies is not hindered by the authorities.
However, there are two systems in place that regulate internet content and place some restrictions on what can be viewed online. First, material deemed by the ACMA to be "prohibited content" is subject to take down notices. The ACMA notifies the relevant ISP that it is hosting illicit content and is then required to take down the offending material. Under the BSA, the following categories of online content are prohibited:
Any online content that is classified Refused Classification (RC) by the Classification Board, including real depictions of actual sexual activity; child pornography; depictions of bestiality; material containing excessive violence or sexual violence; detailed instruction in crime, violence, or drug use; and material that advocates the commission of a terrorist act.
Content that is classified R 18+ and not subject to a restricted access system that prevents access by children, including depictions of simulated sexual activity; material containing strong, realistic violence; and other material dealing with intense adult themes.
Content that is classified MA 15+, provided by a mobile premium service or a service that provides audio or video content upon payment of a fee and that is not subject to a restricted access system, including material containing strong depictions of nudity, implied sexual activity, drug use, or violence; very frequent or very strong coarse language; and other material that is strong in impact.
To date, this system for restricting access to videos, films, literature and similar material via take down notices has not emerged as problematic in terms of any overflow to information of political or social consequence. In addition, the general disposition is to allow adults unfettered access to R 18+ materials while protecting children from exposure to inappropriate content.
Under the second system, the ACMA may direct an ISP or content service provider to comply with the Code of Practice developed by the Australian Internet Industry Association (IIA). Failure to comply with such instructions may draw a maximum penalty of AUD$11,000 (US$11,400) per day. Other regulatory measures require ISPs to offer their customers a family-friendly filtering service. This is known as voluntary filtering, as customers must select it as an option.
Draft legislation on mandatory filtering was proposed under the Labour government led by Kevin Rudd and then put aside during the election in August 2010. There have been no indications by the current Labour government led by Julia Gillard as to whether draft legislation on the matter will be reintroduced in the immediate future, but statements have been made that the government has no intention to abandon the plan altogether. The list of sites to be blocked would initially focus on images of child abuse, particularly child pornography.
The proposed filtering system has been controversial due to concerns of over-blocking, censorship of adult materials, scope creep, and impairment of telecommunication access speeds. While Prime Minister Gillard has voiced support for the filter in the media, the likelihood of any such proposal becoming law is slim due to the strong opposition to any such legislation by opposition parties. In the interim, the three largest ISPs in Australia (Telstra, Optus and Primus) voluntarily filter material listed as child abuse or child pornography.
The many problems of classifying content in Australia came to light in the 2011 public inquiry and review of the current classification scheme by the Australian Law Reform Commission (ALRC). The ALRC released its final report in February 2012 entitled, "Classification-Content Regulations and Convergent Media," which recommended the creation of a new single regulator of classification and content, among other key features. The new national classification scheme will also emphasise eight guiding principles. While the ALRC's report announced sweeping reform to the classification and convergence of media content, it remains to be seen if the government will heed any of the recommendations.
Journalists, commentators, and ordinary users in Australia are not subject to censorship so long as their content does not amount to defamation or breach criminal laws, such as those against hate speech or racial vilification. Nevertheless, the need to avoid defamation has been a significant driver of self-censorship by both the media and ordinary users (see "Violations of User Rights").
Aside from restrictions on prohibited content, incitement to violence, racial vilification, and defamation, Australians have access to a broad choice of online news sources that express diverse, uncensored political and social viewpoints. Individuals are able to use the internet and other technologies both as sources of information and as tools for mobilization. Digital media such as blogs, Twitter feeds, Wikipedia pages, and Facebook groups have been harnessed for a wide variety of purposes ranging from elections to campaigns against government corporate activities, to a channel for safety-related alerts where urgent and immediate updates were required. For instance, Google maps were used in a creative endeavor to map out fire dissemination in the devastating 2009 wildfires that spread across the State of Victoria. In 2011, Twitter feeds were used to assist the mobilization of people in the Occupy Sydney and Occupy Brisbane movements.
Violations of User Rights
Australians' right to access internet content and freely engage in online discussions is based less in law than in the shared understanding of a fair and free society. Legal protection for free speech is limited to the constitutionally-implied freedom of political communication, which only extends to the limited context of political discourse during an election. The full range of human rights in Australia, unlike in most other developed democracies, is not protected by a bill of rights or similar legislative instrument, and the courts have less ground to strike down legislation that infringes on civil liberties. Nonetheless, Australians benefit greatly from a culture of freedom of expression and freedom of information, further protected by an independent judiciary. The country is also a signatory to the International Covenant on Civil and Political Rights (ICCPR).
Australian defamation law has been interpreted with a wide scope and is governed by legislation passed by the states as well as common-law principles. A person may bring a defamation case based on information posted by someone outside of Australia provided that the material can be accessed in the country and the defamed person enjoys a reputation in Australia. Civil actions over defamation are common and form the main impetus for self-censorship, though a number of cases have established a constitutional defense when the publication of defamatory material involves political discussion. In one example in 2009, the operator of the Australian online discussion board ZGeek was named as a defendant in an AUD$42 million (US$43.5 million) defamation suit over comments posted on the forum, but the case was later struck down by the courts.
Criminal defamation charges have also been filed over online content. There have been a series of recent publicized defamation suits involving foreign companies such as Google, Yahoo, and Twitter. In October 2011 the Supreme Court of Queensland ordered Google Australia to release the details of the creators of websites that had published defamatory material about the author Jamie McIntyre. In January 2012, the online music critic Joshua Meggit instigated proceedings against Twitter in Australia for failing to remove a defamatory tweet about him. In another case in April 2012, health researcher Dr. Janice Duffy sued Google for refusing to remove defamatory links to the U.S.-based consumer complaint website, Ripoff Report, from the Google search engine.
Law enforcement agencies may search and seize computers and compel an ISP to intercept and store data from those suspected of committing a crime, but such actions require a lawful warrant. The collection and monitoring of communications fall within the purview of the Telecommunications (Interception and Access) Act 1979 (TIAA). Call-charge records, however, are regulated by the Telecommunications Act 1997 (TA). It is prohibited for ISPs and similar entities, acting on their own, to monitor and disclose the content of communications without the customer's consent. Unlawful collection and disclosure of the content of a communication can draw both civil and criminal sanctions. The TIAA and TA expressly authorize a range of disclosures, including to specified law enforcement and tax agencies, all of which require a warrant.
ISPs are currently able to monitor their networks without a warrant for "network protection duties," such as curtailing malicious software and spam. Pending Australia's accession to the Convention on Cybercrime and adoption of the Cybercrime Legislation Amendment Bill 2011, ISPs will be required to perform wider monitoring functions. Unlike many other countries that have already ratified the convention, Australia is expected to go beyond the treaty's terms in calling for greater monitoring of all internet communications by ISPs. Under the Convention, an ISP is only required to monitor, intercept, and retain data when presented with a warrant, and only in conjunction with an active and ongoing criminal investigation of types of crimes listed in the Convention: fraud and forgery; copyright; unauthorized access, modification and interference to data or data system (computer, network); and child pornography provisions.
Under the proposed bill, timely preservation of evidence that might otherwise be lost may be obtained without a warrant. Preservation notices are issued by the Australian Federal Police (AFP) and are available for both domestic and international investigations. Carriage service providers (CSP in the legislation but commonly interchanged with ISP) must preserve stored communications of a target(s) for up to 90 days, depending on the type of preservation notice received from the AFP. A foreign country may also send a request to the AFP, who would then make a request to the Australian CSP. It is important to note, however, that preservation notices compel a carriage service provider merely to store information and that communications may only be disclosed when a valid Australian warrant has been issued.
Public input into Australia's accession to the Convention was sought in the form of a Cybercrime Inquiry. Many submissions to the inquiry expressed concern over a lack of safeguards, the privacy invasiveness of the proposed provisions, and the overly broad scope of cooperation with foreign parties extending beyond the requirements of the Convention. For example, the Convention only requires mutual cooperation between countries for preservation notices and real time evidence collection in the context of four areas: fraud and forgery; child pornography; copyright infringement; and unauthorized access, modification or interference with data, data systems or a computer. The Australian proposal does not limit mutual cooperation to the crimes specified in the Convention but potentially opens the door to any type of crime.
Presently, ISPs are required by law to have real time interception capabilities, generally to be used for gathering evidence in connection with serious offenses such as murder, terrorism, and child pornography. Under the proposed Cybercrime Legislation Amendment Bill, such real time evidence obligations will be expanded to any crime provided that a number of set procedural conditions are met. The data may be preserved but cannot be disclosed in the absence of a warrant.
Users do not need to register to use the internet, nor are there restrictions placed on anonymous communications. The same cannot be said of mobile phone users, as verified identification information is required to purchase any prepaid mobile service. Additional personal information is required for the service provider before a phone may be activated. All purchase information is stored while the service remains activated, and it may be accessed by law enforcement and emergency agencies with a valid warrant.
There have been a number of politically-motivated cyberattacks, particularly distributed denial-of-service attacks (DDoS) that have led to websites being inaccessible or flooded with substituted content for various lengths of time. For example, offline marches and online acts of protest were staged in response to the Australian government's decision to introduce a mandatory filter in 2010. One of these protests was the online defacement and DDoS attack of the Australian Parliamentary website by the Anonymous hacktivist group, dubbed Operation Titstorm. The attack brought down the parliament's website for three days by bombarding it with pornographic images. In 2011, Matthew George, an Australian member of Anonymous who participated in Operation Titstorm, was charged and convicted of incitement, and was given an AUS$550 (US$570) fine. More severe cyberattacks on the nation's critical infrastructure (such as electric grids, hospitals, and banks) have occurred as well, though to date, attacks on banking institutions for financial motives have been much more frequent.
1 Chris Nash, "Freedom of the Press in Australia," Democratic Audit of Australia, November 19, 2003, http://apo.org.au/research/freedom-press-australia.
2 "Who Is an Internet Content Host or an Internet Service Provider (and How Is the ABA Going to Notify Them?" Internet Society of Australia, accessed June 2010, http://www.isoc-au.org.au/Regulation/WhoisISP.html; Stuart Corner, "EFA Fights ACMA Over 'Take-Down' Notice," iTWire, April 20, 2010, http://www.itwire.com/it-policy-news/regulation/38423-efa-fights-acma-over-take-down-notice;"Guide for Internet Users," Internet Industry Association, March 23, 2008, http://www.iia.net.au/index.php/initiatives/guide-for-users.html.
4 Internet Industry Association (IIA), Internet Industry Code of Practice: Content Services Code for Industry Co-Regulation in the Area of Content Services (Pursuant to the Requirements of Schedule 7 of the Broadcasting Services Act 1992), Version 1.0, 2008, http://www.iia.net.au/images/content_services_code_registration_version_1.0.pdf.
5 Alana Maurushat and Renee Watt, "Australia's Internet Filtering Proposal in the International Context," Internet Law Bulletin 12, no. 2 (2009); ACMA, "Internet Service Provider (ISP) Filtering," October 2011, http://www.dbcde.gov.au/funding_and_programs/cybersafety_plan/internet_service_provider_isp_filtering.
6 See generally, Alana Maurushat and Renee Watt, "Australia's Internet filter Proposal in the International Context," Internet Law Bulletin 12, no. 2 (2009), page 18-25; and David Vaile and Renee Watt, "Inspecting the Despicable, Assessing the Unacceptable: Prohibited Packets and the Great Firewall of Canberra," University of New South Wales Law Review Series 35 (2009).
7 "Internet Filter is Right: Gillard," The Sydney Morning Herald, October 12, 2010, http://news.smh.com.au/breaking-news-national/internet-filter-is-right-gillard-20101012-16hiz.html.
8 "Internet Service Provider (ISP) Filtering," accessed April 23, 2012, http://www.dbcde.gov.au/funding_and_programs/cybersafety_plan/internet_service_provider_isp_filtering.
9 For some of the key features of the ALRC's new model, see: Australian Law Reform Commission, "Classification-Content Regulation and Convergent Media Final Report," February 2012, p 24, accessed April 23, 2012, http://www.alrc.gov.au/sites/default/files/pdfs/publications/final_report_118_for_web.pdf.
10 See, Ibid, p 24-30.
11 Jones v. Toben  FCA 1150 (17 September 2002), http://www.austlii.edu.au/au/cases/cth/FCA/2002/1150.html.
12 Re Lim, "Cronulla Riot: Confiscation of Mobile Phones, Invasion of Privacy and the Curbing of Free Speech," Act Now, March 15, 2006, http://www.actnow.com.au/Opinion/Cronulla_riot.aspx; Les Kennedy, "Man in Court Over Cronulla Revenge SMS," Sydney Morning Herald, December 6, 2006, http://www.smh.com.au/news/national/man-in-court-over-cronulla-revenge-sms/2006/12/06/1165081008241.html.
13 Digital media, for example, is readily used for political campaigning and political protest in Australia. See, Terry Flew, "Not Yet the Internet Election: Online Media, Political Content and the 2007 Australian Federal Election," 2008, http://eprints.qut.edu.au/12611/1/12611.pdf.
14 John Liebhardt, "Australian wildfires and web tools," Global Voices, February 9, 2009, http://globalvoicesonline.org/2009/02/09/australian-wildfires-and-web-tools/.
16 For a full analysis of freedom of expression in Australia, see: Alana Maurushat and Sophia Christou, "Waltzing Matilda or Advance Australia Fair: Fair dealings copyright exemptions with user-generated content," Media & Arts Law Review, March 2009.
17 Chris Nash, "Freedom of the Press in Australia," Democratic Audit of Australia, November 19, 2003. For more information generally on press freedom in Australia, see: Reporters Without Borders, http://en.rsf.org/australie.html.
18 Irene Moss, "Report of the Independent Audit into the State of Free Speech in Australia," Australia's Right to Know Coalition, October 31, 2011, http://www.alliance.org.au/documents/071031_right_to_know_report.pdf.
19 Human Rights Constitutional Rights, "Australian Defamation Law," accessed June 2010, http://www.hrcr.org/safrica/expression/defamation.html.
20 Asher Moses, "Online Forum Trolls Cost me Millions: Filmmaker," Sydney Morning Herald, July 9, 2009, http://www.smh.com.au/technology/technology-news/online-forum-trolls-cost-me-millions-filmmaker-20090715-dl4t.html.
21 "ZGeek Law Suit Struck Down," Electronic Frontiers Australia, July 15, 2009, http://www.efa.org.au/2009/07/15/zgeek-defamation-lawsuit-struck-out/.
22 Alison Sandy and Alex Dickinson, "Supreme Court Orders Google Australia to Release Details of Creators of Website," News Australia, October 7, 2011, http://jamiemcintyre.com/jamie-mcintyre-winning-battle-supremem-court-orders-google-australia-release-details-creators-defamatory-website/.
23 "Australian Joshua Meggit Sues Twitter," Socialite Media, February 20, 2012, http://socialitemedia.com.au/australian-joshua-meggitt-sues-twitter/824/.
24 Rachel Wells, "Google in the Gun as Cyber Victims Fight Back," Sydney Morning Herald, April 2, 2012, http://www.smh.com.au/technology/technology-news/google-in-the-gun-as-cyber-hate-victims-fight-back-20120401-1w6nf.html#ixzz1rmmmBLSx.
25 Telecommunications Act 1997, Part 13, accessed June 2010, http://www.austlii.edu.au/au/legis/cth/consol_act/ta1997214/.
26 Part 2-1, section 7, of the Telecommunications (Interception and Access) Act 1979 (TIAA) prohibits disclosure of an interception or communications, and Part 3-1, section 108, of the TIAA prohibits access to stored communications. See http://www.austlii.edu.au/au/legis/cth/consol_act/taaa1979410/.
27 Criminal offenses are outlined in Part 2-9 of the TIAA, while civil remedies are outlined in Part 2-10.
28 Alana Maurushat, "Australia's Accession to the Cybercrime Convention: Is the Convention Still Relevant in Combating Cybercrime in the Era of Obfuscation Crime Tools?" University of New South Wales Law Journal 16, no. 1, forthcoming.
29 Cybercrime Legislation Amendment Bill 2011, Bills Digest no.31, 2011-12, accessed April 11, 2012, http://www.aph.gov.au/Parliamentary_Business/Bills_Legislation/bd/bd1112a/12bd031.
30 Australian Privacy Foundation, "Cybercrime Legislation Amendment Bill 2011, Submission to the Joint Standing Committee on Cyber-Safety," August 5, 2011.
31 Law Council of Australia, "Submission No. 5, Inquiry into Cybercrime Legislation Amendment Bill 2011," Joint Select Committee on Cyber-Security, July 14, 2011, p. 3. http://www.aph.gov.au/Parliamentary_Business/Committees/House_of_Representatives_Committees?url=jscc/cybercrime_bill/subs.htm.
33 Section 5D of the Telecommunications Act 1997.
35 Alana Maurushat, "Ethical Hacking (2012): A Report for A Report for the National Cyber Security Division of Public Safety Canada." Publication on file with author. Report to be released to the public in 2012.
36 Sarah Whyte, "Meet the hacktivist who tried to take down the government," Sydney Morning Herald, March 14, 2011, http://www.smh.com.au/technology/security/meet-the-hacktivist-who-tried-to-take-down-the-government-20110314-1btkt.html.
37 AusCERT Conference (2009), closed session invite-only workshop on cybercrime, Chatham House Rules.