Yesterday Nick Reynolds of the BBC directed me, as well as many other writers, to the BBC's official response to allegations that its technology show, Click, violated the U.K.'s Computer Misuse Act when it purchased and used a botnet as part of an investigative report into cybercrime.I blogged about this on Wednesday, and have excerpted most of it here:
That's always a good question. After all, we could have simply described what we believe happens and given some warning advice, couldn't we? We've done this in the past. So have many others...
But hacking has gone professional. Today, your PC can be doing bad things to other people without you even knowing. It's a major growth area for organised crime: it's global, and very local to all of us who work, communicate and play on the world wide web.
So we felt that there was the strongest public interest in not just describing what malware can do, but actually showing it in action. A real demonstration of the power of today's botnets - to infect, disrupt and damage our digital lives - is the most powerful way to alert our audiences to the dangers that they face. It's a wake-up call to switch on that firewall and improve our security on the internet.
We think that what we did was a first for broadcast journalism. We were amazed by the ease of use of the botnet, and the power of its disruptive capacity.
No-one watching our programme could learn how to build a botnet or where to go to to buy one. But what is very clear is the level of threat - especially to home users who don't have the benefit of corporate-level security. (Our guide to PC protection is here.) As the hackers continue their silent running, we thought it was our job to expose the mechanics of their hidden economy. Please watch the full show and see what you think.
The full show (which I've not yet watched) can be viewed here, and will be available to watch for another few days.
The BBC has said it consulted legal experts before conducting the investigation and was advised that its actions would be legal provided it had no malicious intent. However, other legal experts have come out publicly saying quite the opposite. For example, Struan Robertson, quoted in a good story by John Leyden of The Register:
Breaking the law in the public interest is an argument that vigilantes will use. It rarely wins support from law enforcement.
A story in The Tech Herald noted that, in addition to the owners of the bot computers, ISPs and other service providers might have a case to bear against the BBC. From the story (by Steve Ragan):
Yet, are the legal issues serious or just passive?
"The legal issues are real, and are potentially serious. The BBC could face criminal prosecution under both state and Federal laws, as well as private lawsuits from their ISP (Google) and even any of the upstream providers that had to deal with the botnet traffic; and in theory, from the individual PC owners," she said.
Ragan goes on to compare this case against that of Daniel Cuthbert. (Described in detail on pages 3 and 4 (PDF.)
However, it seems that this case will be handled quite differently than Cuthbert's. After Cuthbert's case in 2005, Detective Inspector Chris Simpson of the London Metropolitan Police Service's Computer Crime Unit made this statement in a press release by the Met:
Conversely, The Register reports:
I haven't yet been able to confirm that the Metropolitan Computer Crime Unit did, in fact, make such a statement (not that I'm intimating that The Register is making that up, because I'm not).
I plan on going into a bit more detail on my opinions in a follow-up post, but here is my main point:
The fundamental trouble is not the BBC's actions. Nor is it the Computer Misuse Act. The fundamental trouble stems from the way the law -- and all cybercrime law -- is enforced.
Sara Peters is senior editor at Computer Security Institute. Special to Dark Reading. Sara Peters is Senior Editor at Dark Reading and formerly the editor-in-chief of Enterprise Efficiency. Prior that she was senior editor for the Computer Security Institute, writing and speaking about virtualization, identity management, cybersecurity law, and a myriad ... View Full Bio