Feeds

Computer Misuse Act could ban security tools

Publishing software flaws now an offence?

The Essential Guide to IT Transformation

The new Police and Justice Act, published today, could criminalise legitimate IT security activity. There are fears among security experts that changes it makes to the Computer Misuse Act will make it illegal to distribute some vital tools.

The new law modifies the Computer Misuse Act of 1990, the cornerstone of Britain's anti-hacking law. The changes make clear for the first time that denial of service attacks are an offence, but they also address the distribution of hacking tools.

The new Act will make a person guilty of an offence "if he supplies or offers to supply any article believing that it is likely to be used to commit, or to assist in the commission of, [a hacking offence]". The word "article" is defined in the Act to include "any program or data held in electronic form".

Some software tools commonly used by IT security professionals can also be used for malicious purposes, making the new legislation a cause for concern.

"This applies particularly to dual use tools like nmap, which security professionals use to check if a network is insecure or not and which the bad guys use to scan for insecurities to then attack it," said Richard Clayton, a member of digital rights group the Open Rights Group and a security researcher at Cambridge University. "Distributors of this have to decide if the people getting it from them are the good guys or the bad guys."

Legal argument and uncertainty will surround what exactly constitutes "likelihood" to be used for malicious purposes. "The Home Office believes that likely is more than 50 per cent, so you have to have a trial within a trial to decide if it is more than 50 per cent likely that distribution is more likely than not to result in an offence being committed," said Clayton.

The final wording of the legislation is broader than was initially proposed. A version of the bill published in January 2006 (145 page/663KB PDF, at clause 35) made the offence contingent upon knowledge or intent that the article would be used for hacking; but the final version reduced that requirement to a belief that such use is likely.

The legislation may have been broadened as it went through Parliament to ensure that a person can be prosecuted if, for example, he posts software to the internet with a reckless disregard for its use.

Another fear of the new law is that it could be stretched to apply to warnings about security flaws and damage the ability of security firms to warn about third party software security breaches.

"The difficulty in the Act is that it says 'any item' and people are worried that that might include information about a piece of software's security vulnerability," said Clayton. "If you distribute information about a security vulnerability and the bad guys use it to attack it then the information about that vulnerability might qualify."

That could then allow software companies themselves to block publication of their products' flaws. "There are worries that software companies will use this to stop people publishing information about security flaws, to suppress that because they don't want the information out," said Clayton.

Security company Sophos said it did not plan to alter its practices, despite the law change. "We have no intention of changing our procedures in light of this legislation," said Carole Theriault, a spokeswoman for Sophos. "We don't believe it likely that any information relating to a computer threat supplied by us would be used to commit an offence.

"Trusted vendors in the security market provide information and tools to prevent security risks – certainly not to help them," said Theriault. "We are always careful – common sense dictates that we obfuscate information that might help someone contemplating online crime."

See:

Copyright © 2006, OUT-LAW.com

OUT-LAW.COM is part of international law firm Pinsent Masons.

HP ProLiant Gen8: Integrated lifecycle automation

More from The Register

next story
BBC goes offline in MASSIVE COCKUP: Stephen Fry partly muzzled
Auntie tight-lipped as major outage rolls on
iPad? More like iFAD: We reveal why Apple fell into IBM's arms
But never fear fanbois, you're still lapping up iPhones, Macs
White? Male? You work in tech? Let us guess ... Twitter? We KNEW it!
Grim diversity numbers dumped alongside Facebook earnings
HP, Microsoft prove it again: Big Business doesn't create jobs
SMEs get lip service - what they need is dinner at the Club
Bose says today is F*** With Dre Day: Beats sued in patent battle
Music gear giant seeks some of that sweet, sweet Apple pie
Amazon Reveals One Weird Trick: A Loss On Almost $20bn In Sales
Investors really hate it: Share price plunge as growth SLOWS in key AWS division
Dude, you're getting a Dell – with BITCOIN: IT giant slurps cryptocash
1. Buy PC with Bitcoin. 2. Mine more coins. 3. Goto step 1
There's NOTHING on TV in Europe – American video DOMINATES
Even France's mega subsidies don't stop US content onslaught
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.