Australia to Follow the UK in Terminating Content Pirates

It seems like most countries are getting more serious about the illegal downloading and the protection of intellectual property, after the UK recently proposed disconnecting ‘pirates’ from the Internet – Australia is now considering following suit.

I guess this is just the start, laws will become more heavy handed and draconian as most of it is driven by money…even though a lot of artists now say they suspect they sell more albums because people have heard their music online.

I mean just look at Sean Kingston and Souljah Boy who got famous from Myspace.

The Government will examine new legislative proposals being unveiled in Britain this week to target people who download films and music illegally. Internet service providers (ISPs) there might be legally required to take action against users who access pirated material.

The music industry estimates 1 billion songs were traded illegally by Australians last year.

Under the three-strikes policy, a warning would be first issued to offenders who illegally share files using peer-to-peer technology to access music, TV shows and movies free of charge. The second strike would lead to the offender’s internet access being suspended; the third would cancel the offender’s internet access.

The three strike system is similar to the proposition in UK to disconnect after an initial warning and a temporary suspension.

Australia has never had the best Internet for downloading anyway as bandwidth is fairly expensive and most ISPs charge by the MB.

She said action had been taken to remove illegally downloaded tracks from blogs, Cyberlocker and BitTorrent sites but this had failed to stem the estimated 2.8 million Australians downloading music illegally last year.

“Because P2P file sharing involves these music files sitting on individual people’s computers, there is very little that MIPI can do to remove those files or stop them being shared,” she said. “That’s why we have been pushing a proposal to internet service providers for a commonsense system of warning notices which, if unheeded, would ultimately result in a user having their account suspended or disconnected.”

National Internet Industry Association chief executive Peter Corones said his members’ reservations over the three-strikes and code of conduct proposals would be discussed with Mr Conroy this week.

I wonder who will be next following these laws? And how will this change the way people use P2P? Bring on the encrypted tunnels? Or private VPNs to other countries to download using their IP address?

Either way it’s something keep an eye on.

Source: Sydney Morning Herald

Posted in: Legal Issues, Privacy

, , ,

Latest Posts:

Socialscan - Command-Line Tool To Check For Email And Social Media Username Usage Socialscan – Command-Line Tool To Check For Email And Social Media Username Usage
socialscan is an accurate command-line tool to check For email and social media username usage on online platforms, given an email address or username,
CFRipper - CloudFormation Security Scanning & Audit Tool CFRipper – CloudFormation Security Scanning & Audit Tool
CFRipper is a Python-based Library and CLI security analyzer that functions as an AWS CloudFormation security scanning and audit tool
CredNinja - Test Credential Validity of Dumped Credentials or Hashes CredNinja – Test Credential Validity of Dumped Credentials or Hashes
CredNinja is a tool to quickly test credential validity of dumped credentials (or hashes) across an entire network or domain very efficiently.
assetfinder - Find Related Domains and Subdomains assetfinder – Find Related Domains and Subdomains
assetfinder is a Go-based tool to find related domains and subdomains that are related to a given domain from a variety of sources including Facebook and more.
Karkinos - Beginner Friendly Penetration Testing Tool Karkinos – Beginner Friendly Penetration Testing Tool
Karkinos is a light-weight Beginner Friendly Penetration Testing Tool, which is basically a 'Swiss Army Knife' for pen-testing and/or hacking CTF's.
Aclpwn.Py - Exploit ACL Based Privilege Escalation Paths in Active Directory Aclpwn.Py – Exploit ACL Based Privilege Escalation Paths in Active Directory is a tool that interacts with BloodHound< to identify and exploit ACL based privilege escalation paths.

31 Responses to Australia to Follow the UK in Terminating Content Pirates

  1. Wuching March 5, 2008 at 3:10 am #

    funny how I haven’t heard of that yet

  2. ZaD MoFo March 5, 2008 at 5:02 am #

    Give them ther dime and they will stop shouting what they call a crime.

    They dont want to stop illegal traffic of data,
    they want to stop unpaid traffic of data.

  3. Pantagruel March 5, 2008 at 11:36 am #

    Encrypted torrent download is no problem, simply turn it on (check
    Or try Zultrax P2P, they claim encryption on their Zepp network.

    The only thing this will give rise to is encrypted nntp (some NNTP providers are offering encrypted connections to usenet) and the revival of private FTP sites. In this case most likely sFTP to obfuscate the up- and downloaded files.

  4. Pantagruel March 5, 2008 at 12:05 pm #

    What will be next, stopping the general postage service just because old style SPAM get’s spread through it? Stop UPS from delivering packages, they might be delivering bombs or so.

    Encrypted p2p/torrent will be the next thing as wil the revival of private FTP sites and secure tunnels (vpn/sFTP) to exchange your files.
    I pity the Aussie’s paying by the Mb is no fun.

  5. Bean Avenger March 5, 2008 at 1:34 pm #

    Encrypting your traffic is the nuclear option, it’s not something you should reach for immediately, because if you do then you’ve already lost. Laws have been passed and you’ve been pushed aside, it’s an uphill struggle from there on and you’ll be made to look like a marginal element.

    If I was in Australia or the UK right now I’d be damn sure to start lobbying the MP’s (or whatever they have in each respective country) to try and make them see the heavy handedness and draconian methods this policy entails.

    If YOU don’t lobby, then someone else will, and we all know who those people are and what they want.

  6. zupakomputer March 5, 2008 at 5:04 pm #

    I still don’t see how they intend to monitor the traffic, and check the contents also so as to determine if it’s a media file, and then also visit the website or server it’s being downloaded from to check if it’s an illegal copy…..

    obviously that can all be done – but it can’t feasibly be done per each user. The only scenario I can see that is feasible there is if an artist or a copyright holder knows there’s a copy of their work being given away or sold online, and they haven’t authorised it, and they then contact the ISP provider or similar to get it removed or stop anyone accessing it.

    Again though – I’d have to point out the same thing as I did with the bot-herders that were paid affiliate monies from machine they infected with adware – why aren’t the affiliate payers, or in this case the file hosters, being pursued – since clearly their IPs and other info would be as known of as those accessing and using their services are known.
    What I mean is it seems mighty suspicious that if they have a problem with these things, why only go after the ones making use of it, and not the providers of it. I smell a “rat”. I smell some government types etc in bed with the providers.

    On another note entirely – and I’m sure this’d be popular with anyone reading here who isn’t already aware of how to go about this – how do you set up your own ISP, or get a secure network link that you can host a server from but that isn’t from an ISP business account?
    Related to that – how do you get an ISP that lets you monitor traffic using things like ICMP messages…..apparently you need to pay for a hefty business T3 or T1 line and rental, which is even pricier than the fastest home broadband is.
    I know it’s possible to use websites to run things like tracert, but it’d be vastly preferable to be able to use a command line input directly.

    Even checking with ISPs directly, the best answers I can get to those kind of questions are: you need to be a business, as in a proper registered etc trading name and everything – just to get a proper network line that doesn’t block ICMP commands and so forth….

    there’s some gaming-specific ISPs that detail what traffic they prioritise and suchlike, but they’re the only consumer-level ISP that even mention anything important and worthwhile like that.

    Obviously – all those ISP comparison sites don’t provide that kind of info either. The helpdesk folks don’t even know what you’re talking about when you ask them about it….

  7. Pantagruel March 5, 2008 at 10:28 pm #


    True, the majority of the ISP is geared towards the average internet user whom has absolutely no need for this kind of ‘advanced’ network monitoring/traffic shaping/etc. They just want to surf/mail/have the kids use the download quotum and the ISP caters this need. The few ISPs that are more knowledgeable (and block a bit less ports/protocols) tend to ask a higher price for connection speed X Mbit than the average ISP making then a dying species.

    I don’t even bother to call the helpdesk or use the online fill in form, their response is too slow. If you get a real human being on the line (after pressing atleast 6 digits on your phone) they will have to transfer you to a colleague (or even twice) and you still end up explaining him/her why the answer is not satisfactory (yes I know it’s no fun if the costumer knows more about a particular piece of software/protocol than you.

  8. Shill March 6, 2008 at 3:12 pm #

    Another country falls down…
    Please note it is also discussed in France actually

  9. J. Lion March 6, 2008 at 3:28 pm #

    “Arrrh, scurvy dogs be huntin’ pirates Aye. They be after mi lucky charms!”

    @ZaD MoFo – not sure if it’s unpaid traffic unless they are borrowing someone else’s wireless.

    @Bean Avenger – would those who lobby against this be censored or even jailed? Different country – different method of ruling.

  10. Pantagruel March 6, 2008 at 7:27 pm #


    True, spoke a french mate today, he asked if we’d be getting the same weird shit as they. He was kinda sour when I told him about the plans the UK/Australia had.

    If your French is up to it, go search you will find the abstract an article pointing into the same direction regarding the amount of leeway lawenforcers should be granted to tackle terrorisme and internet related crimes.

  11. James C March 6, 2008 at 8:00 pm #

    Why is it the music and movie industry get there laws passed
    in no time. It not like there a large percentage of gross national product of any country. They demand alot for people earn alot who do little for a country.
    Its even worse in Ireland the Aholes dont even have to pay tax.
    So the boring Bono of U2 with his 100

  12. Zebulon March 7, 2008 at 4:29 am #

    It doesn’t matter what government agency tries to do to regulate these things, this has been an ongoing problem for years. So no matter what they do there will always be pirates, period !!

  13. J. Lion March 7, 2008 at 4:17 pm #


    Pirates sounds bad, a euphemism could be “Robin Hoods” – steal from the rich and ….

  14. zupakomputer March 7, 2008 at 6:36 pm #

    On the plus side, wireless (satellite for example) internet and even world-marketplace landline link-ups are clearly going to come down in price more and more, and be more easily available, so in the long run anyway it’s futile for any national-boundary-based laws to be passed that attempt to govern the internet.

  15. Pantagruel March 7, 2008 at 7:45 pm #


    True internet in concern of Mbit/sec is getting only cheaper and cheaper. Even when you seem to be beyond the reach of cable or adsl, a satelite dish is quite a viable option (they even have companies providing 2-way (up- and downstream) satelite system.

    Ssshhh don’t wake the dog, the US has, before, expressed the sentiment to want to be regarded as the grandfater of the net and would very much like to head the internet police force (much like they seem to do right now regarding oil and precious resources). After the American invented computer (the always forget Charles Babbage was British) and the first paper stored data system (they consider Jacquard’s mechanical loom to be for sissy’s, who nitts anyway. He actually got it from Basile Bouchon (son of an organ maker, Bouchon adapted the concept of music automata controlled by pegged cylinders to the repetitive task of weaving)

  16. zupakomputer March 7, 2008 at 9:35 pm #

    I do like the old paper-punched modules with the valve tubes.

    & I find something oddly comforting and strangely familiar in watching the likes of Colossus operating away. There’s something about the way they move – like how fly’s move, they seem to skip parts of movement and just appear in the next location without having travelled to get there.

    Not sure if you’re refering to ‘that’ with the ‘shh’ bit….?!……but that guy ain’t that other guy; that other guy’s sort of looking through his eyes is all, and I did not realise it at the time or I’d have well, sorted it right out. Damn I’ll feel a right idiot if you’re weren’t meaning what I think you maybe were; just ignore this paragraph if it sounds like gibberish.

  17. Pantagruel March 8, 2008 at 12:15 pm #


    I’ll ignore it, basically because I can make nothing of the paragraph.

    The Ssshhh don

  18. zupakomputer March 8, 2008 at 3:30 pm #

    Just to be extra clear here, I had meant fly’s when they walk, not when they fly.

    But yeah, it’s probably a good thing you didn’t know what that other paragraph meant. I hope no-one knows what it meant, cause if they do then that is baaaaad. Real bad. So bad that (etc etc)

  19. Pantagruel March 8, 2008 at 4:33 pm #


    Feel free to explain yourself ;) I catch your drift regarind the walking of fly’s, I haven’t taken that much time in analyzing their way of walking.

  20. zupakomputer March 8, 2008 at 5:26 pm #

    Oh I just thought you maybe were refering to my Bush comment elsewhere here;

    just something that someone I used to know was involved with, and another person made an interesting comment in regard to it.

  21. eM3rC March 9, 2008 at 5:22 am #

    Pantagruel I loved your comment about stopping the mail/Fex Ed systems because they might be transporting dangerous packages!

    I would recommend reading my post about this in the UK ban article for my views on this, but I still have a side note to add.

    If a system like this would be developed its effectiveness would be almost useless. I mean come on whats more important, catching someone who has downloaded like $20 worth of songs or spending millions if not billions of dollars a year to establish a whole new branch of the government to monitor this kind of activity. Hackers I can see the government trying to slow down, pirating on the other hand… just plain stupid.

    Here’s a fun little quote I though I might add (although it does not really relate to the topic)
    “Quoting one is plagiarism, quoting many is reasearch”

  22. Pantagruel March 9, 2008 at 11:00 am #


    True, the effectiveness would be zero. It’s quite funny to see how ineffective the RIAA/MPAA is in prosecuting copyright offenders, eventhough their budget seems to be unlimited.

    But the thing is bureaucrats aim not to solve the problem but simple provide a ‘solution’ that appears to work (without giving shit about the costs). It all has to do with FUD. Bureaucrats will want to create Fear, Uncertainty, and Doubt so people will listen to them. They then will come up with a partial solution to the problem they themselves have created and herald they have squashed the problem (and move on to creating the next ‘hurdle’). The people will reward them for handling the ‘crisis’ by re-electing them. The same goes for the music and video industry. They state that artists (and they themselves ofcourse) are earning less and less, the reason being piracy and the distribution of their ‘property’ through digital means other than they control/get their cut from. As a solution they start a wild goose chase (actually more of a witch hunt) to bring down these bad music/video exchanging internet users. It’s rather funny they have, so far, only put some small fries on the stand.
    It’s funny that they are so preoccupied with the protection of old shit (see ‘the mickey mouse’ law) and are not investing in new and innovative products.

    Indeed bringing/slowing down hackers is by far more sensible.

    I am quite fond of the remark: “Copy and improve”

  23. zupakomputer March 12, 2008 at 10:32 am #

    What about using proxies to avoid being detected?

    Thing is though – I’d intended to try some proxy sites today, from a connection where I can actually get decent internet speeds for downloads etc (not for music, legal or otherwise – just apps like are listed here), but – since they all use meta keywords that say things like ‘proxy’ in them……they don’t work.

    What’s the point of saying you have proxies that can get around censor stuff like websense, when you then put the very keywords into your websites meta and descriptor, which are exactly what the likes of websense uses to block sites with…..

    I can’t get on darknet there either, cause it must have ‘hacking’ or something to do with ‘hack’ in the meta.

    For proxies do this – have sites with the keywords that list them, so’d they show up insearches; but then DON’T indicate in the meta or anything else of the actual proxy site / page itself that it is a proxy service, and don’t put any info in it that would flag it as a grey-area kind of place on the web.

  24. James C March 12, 2008 at 2:43 pm #

    Can’t use a proxy, most open proxy’s are used to spy on user’s, and general you wont know who is operating the proxy(eg.Government Agencies, RIAA). Tor( is much better than a traditional proxy(is encrypted and bounces through 3 host) but still has some of the same flaws

  25. Pantagruel March 16, 2008 at 3:46 pm #

    Japan will be following suit as well.

    The Yomiuri Shimbun

    The nation’s four Internet provider organizations have agreed to forcibly cut the Internet connection of users found to repeatedly use Winny and other file-sharing programs to illegally copy gaming software and music, it was learned Friday.

    The move aims to deal with the rise in illegal copying of music, gaming software and images that has resulted in huge infringements on the rights of copyright holders.

    Resorting to cutting off the Internet connection of copyright violators has been considered before but never resorted to over fears the practice might involve violations of privacy rights and the freedom of use of telecommunications.

  26. zupakomputer March 16, 2008 at 4:44 pm #

    @ James C – that’s my view on: all software (& hardware) anyway! (probably used to spy / gather info, and at any rate unless you have the source code and also know it as well as who programmed it, you’re never really going to know any better anyway what the hey it might be up to)

    What I was meaning was that – when I’m at college and want to look at websites such as this one here, darknet, I can’t do that because they use software like ‘websense’ to block websites by reading what is in their keyword meta html.
    So I had a list of proxies and thought I’d use those to circumvent it – only to discover that they use keywords in their meta that flag them as being proxy sites; therefore the ‘websense’ blocks them as well,

    so when they claim to be all about getting around things like ‘websense’ they haven’t done their homework very well or they wouldn’t advertise in the meta that they are proxy sites.

    Tor sounds interesting, and another name that also has resonant import in offline reality too (Damballah was another one mentioned here recently – a voodoo snake-gods name! Glastonbury Tor is a very special place of the Avalon Isle).

  27. @zupakomputer March 16, 2008 at 10:23 pm #

    I’d used to run a proxy on my home network and just connected to that from school, worked fine for me. if you deside to give it a go, run the server on port 80 so the traffic doesn

  28. James C March 16, 2008 at 10:24 pm #

    That was me sorry:)

  29. zupakomputer March 17, 2008 at 12:15 am #

    Lol, I was just looking up IP spoofing when I saw your comment.

    Seems like another way to be anonymous but it tends to be associated with attacks only.

    Servers@home is definitely something on the cards for me for the future..

  30. zupakomputer March 18, 2008 at 2:01 pm #

    That was my comment there, in case it’s ‘awaiting approval’ cause you thought someone else posted with my username.

  31. Bogwitch May 19, 2008 at 11:49 am #


    I would be interested to hear how you suggest that pirates are caught. Since the Internet is worldwide, it is going to be virtually impossible to stop piracy.

    The only way I can see that piracy can be reduced dramatically would be to have said artists and producers reduce the amount of royalties they expect to make from their product to a point where the pirates cannot make a profit from it. There will always be pirates that do not make any money from downloading copyrighted content but the high price of IP has, IMO, created these pirates.

    Personally, I would prefer for, music performers specifically, to provide their musical content for free. This way thay could, in theory, build up a large fanbase, who would be prepared to pay cash to see them play live. That’s going to take a ballsy artist to attempt that!