Published on October 13th, 2019 📆 | 8564 Views ⚑
0After banning working cryptography and raiding whistleblowers, Australia’s spies ban speakers from national infosec conference / Boing Boing
Australian politics are a revolting mess of unstable governments dominated by xenophobic, climate-denying far-right oligarchs, and the only check on their power is the fact that Australian governments are so riven by internal strife and unhinged authoritarianism that they tend to collapse on a quarterly basis, triggering new elections and/or leadership contests.
But the Aussie oligarch class are persistent: sometimes, they can actually get policies and laws that suit their needs enacted, as happened in late 2018, when the country banned working cryptography, or last June, when cops and spies staged a series of armed raids on journalists who'd reported on leaks that revealed official corruption.
So it's perhaps not surprising that the country's annual flagship cybersecurity conference, the annual conference of the Australian Information Security Association, has become mired in a censorship scandal.
This year, AISA opted to co-organise its annual conference with the Australian Cyber Security Centre, a creature of the same spy agencies that led the crackdown on whistleblowers in June.
But the ACSC has a very different set of priorities to AISA, which is why it insisted on the cancellation of multiple invited talks at the show, including Thomas Drake, a celebrated NSA whistleblower who was scheduled to give a talk on "the golden age of surveillance, both government and corporate"; and the University of Melbourne's Dr Suelette Dreyfus whose cancelled lecture was on "anonymous whistleblowing technologies like SecureDrop and how they reduce corruption in countries where that is a problem."
Both speakers have posted their slides, and Bruce Schneier, who gave a keynote at the conference, opened his talk by reading the URLs aloud.
But the censorship doesn't stop there: ACSC also demanded that invited speaker Ted Ringrose (partner at the Ringrose Siganto law firm) remove criticism in his speech on Australia's ban on working cryptography, going so far as to edit his slides to remove "bias." (Ringrose refused and was allowed to give his original talk as planned).
Australia's slide into authoritarianism is clearly accelerating. The decision to include an anti-encryption spy agency in the organising of the nation's flagship security conference smacks of the Soviet practice of including "political minders" on the committees for scientific symposiums, to make sure that no one challenged the official doctrine.
You can read the banned talk notes and the accompanying slides at Censorcon.Net.
Alex Woerndle, deputy chair of the Australian Information Security Association (AISA), which organised the conference, said questions about the two speakers being removed should be directed to ACSC but said: “AISA supports and encourages diversity of views however it’s important to note we work with a number of partners, including government, and as such need to manage a variety of views to deliver an event catered for all our stakeholders.”
ACSC did not initially respond to requests for comment on Tuesday. Guardian Australia directly approached officials at the agency’s booth at the conference on Wednesday, and was later told that no comment would be provided on the matter.
The conference also banned media from attending a session where an official from Home Affairs explained the development of the government’s 2020 cyber security strategy. Non-media attendees said the talk contained nothing that wasn’t already public knowledge.
Melbourne cyber conference organisers pressured speaker to edit 'biased' talk [Josh Taylor/The Guardian]
Speakers Censored at AISA Conference in Melbourne [Bruce Schneier]
How can a single, ill-conceived law wreak havoc in so many ways? It prevents you from making remix videos. It blocks computer security research. It keeps those with print disabilities from reading ebooks. It makes it illegal to repair people's cars. It makes it harder to compete with tech companies by designing interoperable products. It's even been used […]
READ THE REST
Early versions of the free/open Unix variant BSD came with password files that included hashed passwords for such Unix luminaries as Dennis Ritchie, Stephen R. Bourne, Eric Schmidt, Brian W. Kernighan and Stuart Feldman.
READ THE REST
Last month, a developer called Axi0mx released an Iphone crack called Checkm8, which attacks a defect in the Ios bootrom, a low-level piece of code that has not been successfully attacked since 2010. The bootrom is read-only, making its defects effectively unpatchable, short of removing the chip and swapping it for one with more robust […]
READ THE REST
There’s movie merch and then there are artifacts – one-of-a-kind items for the true fans only. These 11 items definitely fall into the latter category. We’ve unearthed movie art, props and other fan touchstones from the major nerd franchises of the last 50 years. Gaze upon these Star Wars and Marvel collectibles and don’t worry. […]
READ THE REST
No matter what kind of office you work at, there’s probably an Excel expert in it. And no wonder: Businesses are still discovering uses for one of Microsoft’s flagship software suites beyond just bare-bones spreadsheets. Make October the month you become invaluable at work by taking one of these boot camps in Excel and its […]
READ THE REST
Whoever said you’d never need math to succeed in life clearly never sat down at a high-stakes poker table. When it comes right down to it, poker is a winnable game no matter where you play it – as long as you play the odds. There are time-honored strategies for playing those odds, tested by […]
READ THE REST
Gloss