01:20 PM
Sara Peters
Sara Peters
Connect Directly

BBC Responds To Legality Issues Of Recent Tech Show

Yesterday Nick Reynolds of the BBC directed me, as well as many other writers, to the BBC's official response to allegations that its technology show, Click, violated the U.K.'s Computer Misuse Act when it purchased and used a botnet as part of an investigative report into cybercrime.

Yesterday Nick Reynolds of the BBC directed me, as well as many other writers, to the BBC's official response to allegations that its technology show, Click, violated the U.K.'s Computer Misuse Act when it purchased and used a botnet as part of an investigative report into cybercrime.I blogged about this on Wednesday, and have excerpted most of it here:

    A lot of the debate has been about whether we did the right thing digging into the murky world of hackers and organised cybercrime. In seeking to demonstrate the threat, had we put ourselves in the position of those we wanted to expose?

    That's always a good question. After all, we could have simply described what we believe happens and given some warning advice, couldn't we? We've done this in the past. So have many others...

    But hacking has gone professional. Today, your PC can be doing bad things to other people without you even knowing. It's a major growth area for organised crime: it's global, and very local to all of us who work, communicate and play on the world wide web.

    So we felt that there was the strongest public interest in not just describing what malware can do, but actually showing it in action. A real demonstration of the power of today's botnets - to infect, disrupt and damage our digital lives - is the most powerful way to alert our audiences to the dangers that they face. It's a wake-up call to switch on that firewall and improve our security on the internet.

    We think that what we did was a first for broadcast journalism. We were amazed by the ease of use of the botnet, and the power of its disruptive capacity.

    No-one watching our programme could learn how to build a botnet or where to go to to buy one. But what is very clear is the level of threat - especially to home users who don't have the benefit of corporate-level security. (Our guide to PC protection is here.) As the hackers continue their silent running, we thought it was our job to expose the mechanics of their hidden economy. Please watch the full show and see what you think.

The full show (which I've not yet watched) can be viewed here, and will be available to watch for another few days.

The BBC has said it consulted legal experts before conducting the investigation and was advised that its actions would be legal provided it had no malicious intent. However, other legal experts have come out publicly saying quite the opposite. For example, Struan Robertson, quoted in a good story by John Leyden of The Register:

    Struan Robertson, editor of and legal director at solicitors Pinsent Masons, reckons the "powerful public interest" argument is irrelevant in considering whether the BBC acted in violation of UK computer misuse law. He told El Reg that BBC Click would do better to apologise than hide behind such shaky defences.

      The public interest argument is no defence to the Computer Misuse Act. It could influence a decision by the police and the Crown on whether to take any action over the BBC's behaviour; but it could also backfire. An apology is more likely to make the problem go away, in my view, than an argument that breaking the law was the right thing to do.

      Breaking the law in the public interest is an argument that vigilantes will use. It rarely wins support from law enforcement.

A story in The Tech Herald noted that, in addition to the owners of the bot computers, ISPs and other service providers might have a case to bear against the BBC. From the story (by Steve Ragan):

    However, another claim could be raised. The BBC agreed to receive the Spam, but did Google? What about Microsoft? "...they too might be in a position to bring an action for illegal activity," [Anne P. Mitchell, Esq., the CEO and President of the Institute for Social Internet Public Policy] explained, " doesn't matter that the BBC agreed to receive the Spam - it still could have negatively impacted Google and it almost certainly violated their TOS - unless they also had the prior consent of Google."

    Yet, are the legal issues serious or just passive?

    "The legal issues are real, and are potentially serious. The BBC could face criminal prosecution under both state and Federal laws, as well as private lawsuits from their ISP (Google) and even any of the upstream providers that had to deal with the botnet traffic; and in theory, from the individual PC owners," she said.

Ragan goes on to compare this case against that of Daniel Cuthbert. (Described in detail on pages 3 and 4 (PDF.)

    In essence, he was acting in a manner according to his profession. Exactly the same way the BBC was.

However, it seems that this case will be handled quite differently than Cuthbert's. After Cuthbert's case in 2005, Detective Inspector Chris Simpson of the London Metropolitan Police Service's Computer Crime Unit made this statement in a press release by the Met:

    "It is my firm belief that the conviction of Daniel Cuthbert will send out a powerful message to those who think hacking is some form of sport, where there is no victim, or indeed crime."

Conversely, The Register reports:

    Some Reg readers have reported their concerns about the programme to the Met's Computer Crime Unit, which has said it's not prepared to do anything until a victim makes a complaint. [Emphasis added.] Given that BBC Click carefully chose machines outside the UK and US, this is unlikely to happen.

I haven't yet been able to confirm that the Metropolitan Computer Crime Unit did, in fact, make such a statement (not that I'm intimating that The Register is making that up, because I'm not).

I plan on going into a bit more detail on my opinions in a follow-up post, but here is my main point:

The fundamental trouble is not the BBC's actions. Nor is it the Computer Misuse Act. The fundamental trouble stems from the way the law -- and all cybercrime law -- is enforced.

Sara Peters is senior editor at Computer Security Institute. Special to Dark Reading. Sara Peters is Senior Editor at Dark Reading and formerly the editor-in-chief of Enterprise Efficiency. Prior that she was senior editor for the Computer Security Institute, writing and speaking about virtualization, identity management, cybersecurity law, and a myriad ... View Full Bio

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Current Issue
Flash Poll
Title Partner’s Role in Perimeter Security
Title Partner’s Role in Perimeter Security
Considering how prevalent third-party attacks are, we need to ask hard questions about how partners and suppliers are safeguarding systems and data.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2015-03-02
The Crypto API in the Linux kernel before 3.18.5 allows local users to load arbitrary kernel modules via a bind system call for an AF_ALG socket with a module name in the salg_name field, a different vulnerability than CVE-2014-9644.

Published: 2015-03-02
net/netfilter/nf_conntrack_proto_generic.c in the Linux kernel before 3.18 generates incorrect conntrack entries during handling of certain iptables rule sets for the SCTP, DCCP, GRE, and UDP-Lite protocols, which allows remote attackers to bypass intended access restrictions via packets with disall...

Published: 2015-03-02
The Crypto API in the Linux kernel before 3.18.5 allows local users to load arbitrary kernel modules via a bind system call for an AF_ALG socket with a parenthesized module template expression in the salg_name field, as demonstrated by the vfat(aes) expression, a different vulnerability than CVE-201...

Published: 2015-03-02
The em_sysenter function in arch/x86/kvm/emulate.c in the Linux kernel before 3.18.5, when the guest OS lacks SYSENTER MSR initialization, allows guest OS users to gain guest OS privileges or cause a denial of service (guest OS crash) by triggering use of a 16-bit code segment for emulation of a SYS...

Published: 2015-03-01
The IBM Notes Traveler Companion application 1.0 and 1.1 before 201411010515 for Window Phone, as distributed in IBM Notes Traveler 9.0.1, does not properly restrict the number of executions of the automatic configuration option, which makes it easier for remote attackers to capture credentials by c...

Dark Reading Radio
Archived Dark Reading Radio
How can security professionals better engage with their peers, both in person and online? In this Dark Reading Radio show, we will talk to leaders at some of the security industry’s professional organizations about how security pros can get more involved – with their colleagues in the same industry, with their peers in other industries, and with the IT security community as a whole.