Perimeter
3/19/2009
01:20 PM
Sara Peters
Sara Peters
Commentary
Connect Directly
Twitter
RSS
E-Mail
50%
50%

BBC Responds To Legality Issues Of Recent Tech Show

Yesterday Nick Reynolds of the BBC directed me, as well as many other writers, to the BBC's official response to allegations that its technology show, Click, violated the U.K.'s Computer Misuse Act when it purchased and used a botnet as part of an investigative report into cybercrime.

Yesterday Nick Reynolds of the BBC directed me, as well as many other writers, to the BBC's official response to allegations that its technology show, Click, violated the U.K.'s Computer Misuse Act when it purchased and used a botnet as part of an investigative report into cybercrime.I blogged about this on Wednesday, and have excerpted most of it here:

    A lot of the debate has been about whether we did the right thing digging into the murky world of hackers and organised cybercrime. In seeking to demonstrate the threat, had we put ourselves in the position of those we wanted to expose?

    That's always a good question. After all, we could have simply described what we believe happens and given some warning advice, couldn't we? We've done this in the past. So have many others...

    But hacking has gone professional. Today, your PC can be doing bad things to other people without you even knowing. It's a major growth area for organised crime: it's global, and very local to all of us who work, communicate and play on the world wide web.

    So we felt that there was the strongest public interest in not just describing what malware can do, but actually showing it in action. A real demonstration of the power of today's botnets - to infect, disrupt and damage our digital lives - is the most powerful way to alert our audiences to the dangers that they face. It's a wake-up call to switch on that firewall and improve our security on the internet.

    We think that what we did was a first for broadcast journalism. We were amazed by the ease of use of the botnet, and the power of its disruptive capacity.

    No-one watching our programme could learn how to build a botnet or where to go to to buy one. But what is very clear is the level of threat - especially to home users who don't have the benefit of corporate-level security. (Our guide to PC protection is here.) As the hackers continue their silent running, we thought it was our job to expose the mechanics of their hidden economy. Please watch the full show and see what you think.

The full show (which I've not yet watched) can be viewed here, and will be available to watch for another few days.

The BBC has said it consulted legal experts before conducting the investigation and was advised that its actions would be legal provided it had no malicious intent. However, other legal experts have come out publicly saying quite the opposite. For example, Struan Robertson, quoted in a good story by John Leyden of The Register:

    Struan Robertson, editor of out-law.com and legal director at solicitors Pinsent Masons, reckons the "powerful public interest" argument is irrelevant in considering whether the BBC acted in violation of UK computer misuse law. He told El Reg that BBC Click would do better to apologise than hide behind such shaky defences.

      The public interest argument is no defence to the Computer Misuse Act. It could influence a decision by the police and the Crown on whether to take any action over the BBC's behaviour; but it could also backfire. An apology is more likely to make the problem go away, in my view, than an argument that breaking the law was the right thing to do.

      Breaking the law in the public interest is an argument that vigilantes will use. It rarely wins support from law enforcement.

A story in The Tech Herald noted that, in addition to the owners of the bot computers, ISPs and other service providers might have a case to bear against the BBC. From the story (by Steve Ragan):

    However, another claim could be raised. The BBC agreed to receive the Spam, but did Google? What about Microsoft? "...they too might be in a position to bring an action for illegal activity," [Anne P. Mitchell, Esq., the CEO and President of the Institute for Social Internet Public Policy] explained, "...it doesn't matter that the BBC agreed to receive the Spam - it still could have negatively impacted Google and it almost certainly violated their TOS - unless they also had the prior consent of Google."

    Yet, are the legal issues serious or just passive?

    "The legal issues are real, and are potentially serious. The BBC could face criminal prosecution under both state and Federal laws, as well as private lawsuits from their ISP (Google) and even any of the upstream providers that had to deal with the botnet traffic; and in theory, from the individual PC owners," she said.

Ragan goes on to compare this case against that of Daniel Cuthbert. (Described in detail on pages 3 and 4 (PDF.)

    In essence, he was acting in a manner according to his profession. Exactly the same way the BBC was.

However, it seems that this case will be handled quite differently than Cuthbert's. After Cuthbert's case in 2005, Detective Inspector Chris Simpson of the London Metropolitan Police Service's Computer Crime Unit made this statement in a press release by the Met:

    "It is my firm belief that the conviction of Daniel Cuthbert will send out a powerful message to those who think hacking is some form of sport, where there is no victim, or indeed crime."

Conversely, The Register reports:

    Some Reg readers have reported their concerns about the programme to the Met's Computer Crime Unit, which has said it's not prepared to do anything until a victim makes a complaint. [Emphasis added.] Given that BBC Click carefully chose machines outside the UK and US, this is unlikely to happen.

I haven't yet been able to confirm that the Metropolitan Computer Crime Unit did, in fact, make such a statement (not that I'm intimating that The Register is making that up, because I'm not).

I plan on going into a bit more detail on my opinions in a follow-up post, but here is my main point:

The fundamental trouble is not the BBC's actions. Nor is it the Computer Misuse Act. The fundamental trouble stems from the way the law -- and all cybercrime law -- is enforced.

Sara Peters is senior editor at Computer Security Institute. Special to Dark Reading. Sara Peters is Senior Editor at Dark Reading and formerly the editor-in-chief of Enterprise Efficiency. Prior that she was senior editor for the Computer Security Institute, writing and speaking about virtualization, identity management, cybersecurity law, and a myriad ... View Full Bio

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading, September 16, 2014
Malicious software is morphing to be more targeted, stealthy, and destructive. Are you prepared to stop it?
Flash Poll
Title Partner’s Role in Perimeter Security
Title Partner’s Role in Perimeter Security
Considering how prevalent third-party attacks are, we need to ask hard questions about how partners and suppliers are safeguarding systems and data.
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-0985
Published: 2014-09-20
Stack-based buffer overflow in Advantech WebAccess (formerly BroadWin WebAccess) 7.2 allows remote attackers to execute arbitrary code via the NodeName parameter.

CVE-2014-0986
Published: 2014-09-20
Stack-based buffer overflow in Advantech WebAccess (formerly BroadWin WebAccess) 7.2 allows remote attackers to execute arbitrary code via the GotoCmd parameter.

CVE-2014-0987
Published: 2014-09-20
Stack-based buffer overflow in Advantech WebAccess (formerly BroadWin WebAccess) 7.2 allows remote attackers to execute arbitrary code via the NodeName2 parameter.

CVE-2014-0988
Published: 2014-09-20
Stack-based buffer overflow in Advantech WebAccess (formerly BroadWin WebAccess) 7.2 allows remote attackers to execute arbitrary code via the AccessCode parameter.

CVE-2014-0989
Published: 2014-09-20
Stack-based buffer overflow in Advantech WebAccess (formerly BroadWin WebAccess) 7.2 allows remote attackers to execute arbitrary code via the AccessCode2 parameter.

Best of the Web
Dark Reading Radio