Feeds

Germany proposes hacker law update

Fear of a Black Hat

The Essential Guide to IT Transformation

The German government this week published proposals to modernise the country's computer hacking laws.

The proposed update makes denial of service attacks and hacking assaults against individuals clearly criminal. Previously, only attacks against companies and government organisations were indictable offences.

Gaining access to data, without necessarily stealing information, would also become an arrestable offence. The measures would raise the maximum tarriff for computer hacking offences to 10 years imprisonment in the case of conviction for the most serious crimes.

In large part the proposals update existing laws, and bring German legislation in line with an EU resolution on information system attacks proposed in February 2005, heise reports.

Controversy has centered around a provision in the draft laws that would make it an offense to create or distribute "hacking tools", something of an ambiguous term. Critics point out that many of these tools are used by system administrators and security consultants quite legitimately to probe for vulnerabilities in corporate systems.

"White hats will not be able to get them [hacking tools] and use them internally for testing or external security consultants won't be able to do security testing," van Hauser, president of The Hacker's Choice, a non-commercial group of security experts told IDG. "It's a win-lose law in favour of the bad guys," he added.

The proposals are explained in a release by the German Justice ministry here and in greater detail here (PDF in German).

The proposed German changes in computer hacking law are similar to measures proposed in the UK's Police and Justice Bill, published by the government in January. As with Germany's draft legislation, security experts here took exception to plans to ban the development, ownership and distribution of so-called "hacker tools".

The distinctions between, for example, a password cracker and a password recovery tool, or a utility designed to run DOS attacks and one designed to stress-test a network, are not properly covered in the proposed legislation, critics say. ®

Build a business case: developing custom apps

More from The Register

next story
14 antivirus apps found to have security problems
Vendors just don't care, says researcher, after finding basic boo-boos in security software
'Things' on the Internet-of-things have 25 vulnerabilities apiece
Leaking sprinklers, overheated thermostats and picked locks all online
iWallet: No BONKING PLEASE, we're Apple
BLE-ding iPhones, not NFC bonkers, will drive trend - marketeers
Only '3% of web servers in top corps' fully fixed after Heartbleed snafu
Just slapping a patched OpenSSL on a machine ain't going to cut it, we're told
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Secure microkernel that uses maths to be 'bug free' goes open source
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
Israel's Iron Dome missile tech stolen by Chinese hackers
Corporate raiders Comment Crew fingered for attacks
Tor attack nodes RIPPED MASKS off users for 6 MONTHS
Traffic confirmation attack bared users' privates - but to whom?
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Backing up Big Data
Solving backup challenges and “protect everything from everywhere,” as we move into the era of big data management and the adoption of BYOD.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.