Jump to content

Internet censorship in New Zealand

From Wikipedia, the free encyclopedia

Internet censorship in New Zealand refers to the New Zealand Government's system for filtering website traffic to prevent Internet users from accessing certain selected sites and material. While there are many types of objectionable content under New Zealand law, the filter specifically targets content depicting the sexual abuse or exploitation of children and young persons. The Department of Internal Affairs runs the filtering system, dubbed the Digital Child Exploitation Filtering System (DCEFS). It is voluntary for Internet Service Providers (ISPs) to join.[1]

History

[edit]

In August 1993, the New Zealand Parliament passed the Films, Videos, and Publications Classification Act 1993, which made it the responsibility of the Department of Internal Affairs (DIA) to restrict objectionable content in the country.[2] This act did not include any provisions for Internet content.[2] In February 2005, the New Zealand Parliament amended the act to explicitly prevent ISPs from being prosecuted for their users transmitting objectionable content.[3][4]

In March 2009, the Minister for Communications and IT, Steven Joyce, stated that the government had been following the controversy surrounding Internet censorship in Australia, and had no plans to introduce something similar in New Zealand. He acknowledged that filtering can cause delays for all Internet users, and that those who are determined to get around any filter will find a way to do so.[5] Later in July of the same year, it was reported that the Department of Internal Affairs had plans to introduce Internet filtering in New Zealand.[6][7] The project, using Swedish software, cost $150,000.[8] February 2010 saw the first meeting of the Independent Reference Group, who are tasked with overseeing the responsible implementation of the DCEFS.[9] In March 2010, a year after Joyce stated that there were no plans to do so, the Department of Internal Affairs stated that the filter was operational and in use.[10] Tech Liberty NZ objected to the launch of the filter, but DIA defended the system and noted that trials over two years showed that the filter did not affect the speed or stability of the internet.[11]

In March 2019, several websites disseminating footage of the Christchurch mosque shooting were censored by major ISPs in Australia and New Zealand, including 4chan, 8chan, and LiveLeak.[12][13]

Technical details

[edit]
A diagram of the request life cycle for a user of an ISP who has implemented the DCEFS

The Department of Internal Affairs maintains a hidden list of banned URLs and their internet addresses on a NetClean WhiteBox server, which as of 2009 contained over 7000 websites.[14] The DIA then uses the Border Gateway Protocol to tell ISPs that they have the best connection to those internet addresses.[15]

When a user tries to access a website, the ISP will automatically send their data through the best connection possible. If the user is trying to access a website hosted at an internet address that the DIA claims to have the best connection to, the ISP will divert the traffic to the DIA.[15]

If the website the user is trying to access is on the DIA's list of banned URLs, then the connection is blocked by the WhiteBox server.[15] The user instead sees a filter notice page and has the option of getting counselling or anonymously appealing the ban.[16]

If the website is not on the list of banned URLs, then the DIA transparently passes on the data to the actual website and the user is left unaware that the request was checked.[15]

ISPs using the system

[edit]

Some of the largest ISPs in New Zealand, including Spark New Zealand, One NZ, 2degrees, Compass, Kordia, Maxnet, Now, and Xtreme Networks are using the DCEFS, which as of 2017 make up over 75% of the domestic market, as well as 100% of cellular carriers.[3][17][18]

[edit]

The Films, Videos, and Publications Classification Act of 1993 (FVPC Act) makes it the responsibility of the Department of Internal Affairs (DIA) to administer the restriction of objectionable content in the country.[2] This includes the power to seize the offending publication, which was later interpreted to include images and video posted online, given that the original FVPC Act gave no guidelines for Internet content.[3][2]

However, while the FVPC Act was interpreted to include the search and seizure of Internet content hosted in New Zealand, it wasn't possible for the DIA to directly take down the website in another jurisdiction.[19] Furthermore, the FVPC Act doesn't give the DIA the right to mandate a block of objectionable content hosted in other jurisdictions, meaning that they can't create a compulsory filter.[20]

The FVPC Act defines many forms of objectionable content, such as depictions of torture, degrading sexual acts, bestiality, sexual violence, abuse of children, and necrophilia, especially in conjunction with the promotion of discrimination, crime, terrorism or dehumanization. Given the fact that the DIA couldn't make the filter compulsory for ISPs, they chose to choose to limit the filter to block the exploitation of children rather than targeting all objectionable content, as it is easy to garner public support for fighting child abuse.[3][14]

Positions

[edit]

Support

[edit]

The DIA implemented the DCEFS with that stated intent of preventing child predators from accessing child abuse images, thereby preventing their spread as much as possible.[20] Proponents of the system tout its over one million blocks per month as evidence of its necessity as part of a multifaceted approach to combating child exploitation.[21]

The DIA claims the system is helpful in educating users about this type of child abuse.[19] The system also prevents innocent users from accidentally accessing images of child abuse, which the DIA claims is a public expectation of the government and ISPs.[19]

In addition, supporters of the system argue that there is nothing inherently bad in ISPs offering internet filtering, as many ISPs offered it before the DCEFS was even built.[19]

Against

[edit]

Critics of the DCEFS have cited numerous problems including performance, transparency, and security concerns. While the DIA claims that the filter will not cause issues, opponents of the system claimed that it has made major missteps, such as catching a Google-owned internet address in the filter, causing significant slowdowns.[11][22] There are also concerns that the filter simply won't work, as it can be bypassed by commonly available technologies such as using encryption or non-HTTP based file sharing methods.[23]

Civil rights groups, such as TechLibertyNZ have criticized the system for its lack of transparency due to their refusal to release the list of what is being banned, as well as what they view as a purposefully hidden launch of the system.[11] TechLibertyNZ claims that the government could secretly add other sites they want to restrict to the hidden list.[23]

Finally, there are concerns over the security of such a system, mainly due to its use of the trust-based BGP protocol.[24] If someone got access to the system, they could redirect any internet traffic in between New Zealand ISPs.[24] The DIA argues this is not a vulnerability unique to the DCEFS and that their security is industry standard.[19]

See also

[edit]

References

[edit]
  1. ^ "Internet and website filter". www.dia.govt.nz. Retrieved 9 November 2018.
  2. ^ a b c d "Films, Videos, and Publications Classification Act 1993 No 94 (as at 01 October 2018), Public Act Contents – New Zealand Legislation". www.legislation.govt.nz. Retrieved 15 November 2018.
  3. ^ a b c d Ctrl + Alt + Delete? Challenges to New Zealand censorship law in the internet age (Thesis). Hastings, Bill. Victoria University of Wellington. 2016.{{cite thesis}}: CS1 maint: others (link)
  4. ^ "Films, Videos, and Publications Classification Amendment Act 2005 No 2, Public Act 25 New sections 122 and 122A substituted – New Zealand Legislation". www.legislation.govt.nz. Retrieved 15 November 2018.
  5. ^ Keall, Chris (20 March 2009). "Joyce: Internet filtering off the agenda in NZ". NBR. Archived from the original on 10 March 2018. Retrieved 12 July 2009.
  6. ^ Beagle, Thomas (10 May 2009). "The Response from Internal Affairs". Retrieved 12 July 2009.
  7. ^ Freitas, Mauricio Freitas (11 July 2009). "Government plans to filter New Zealand Internet". Retrieved 12 July 2009.
  8. ^ Hendery, Simon (16 July 2009). "Internet filter sparks outrage". Retrieved 15 December 2014.
  9. ^ "Independent Reference Group Meeting Minutes February 2010". www.dia.govt.nz. Retrieved 8 December 2018.
  10. ^ "NZ government now filtering internet". Tech Liberty NZ. 11 March 2010. Retrieved 12 March 2010.
  11. ^ a b c "New Zealand's internet filter goes live". Stuff. Retrieved 20 September 2018.
  12. ^ Kelly, Makena (18 March 2019). "New Zealand ISPs are blocking sites that do not remove Christchurch shooting video". The Verge. Retrieved 18 March 2019.
  13. ^ Brodkin, Jon (20 March 2019). "4chan, 8chan blocked by Australian and NZ ISPs for hosting shooting video". Ars Technica. Retrieved 20 March 2019.
  14. ^ a b "Web filter will focus solely on child sex abuse images". www.dia.govt.nz. Retrieved 9 November 2018.
  15. ^ a b c d "Technical FAQ". Tech Liberty NZ. 16 March 2010. Retrieved 9 November 2018.
  16. ^ "Stop". www.dce.net.nz. Retrieved 9 November 2018.
  17. ^ "Internet Service Providers using the filter". www.dia.govt.nz. Retrieved 9 November 2018.
  18. ^ "2017 Annual Telecommunications Monitoring Report" (PDF). Commerce Commission New Zealand. 20 December 2017. Retrieved 9 November 2018.
  19. ^ a b c d e "Common questions and answers". www.dia.govt.nz. Retrieved 15 November 2018.
  20. ^ a b "Explanatory statement". www.dia.govt.nz. Retrieved 15 November 2018.
  21. ^ "Banned website visits shock experts". Stuff. Retrieved 8 December 2018.
  22. ^ "DIA now filtering .. Google?". Tech Liberty NZ. 28 May 2013. Retrieved 8 December 2018.
  23. ^ a b "Why we oppose internet filtering". Tech Liberty NZ. 10 March 2010. Retrieved 8 December 2018.
  24. ^ a b "Guest article: Security risks of centralised filtering". Tech Liberty NZ. 14 March 2010. Retrieved 8 December 2018.
[edit]