Feeds

BBC botnet 'public interest' defence rubbished by top IT lawyer

V for Vigilante

High performance access to file storage

Struan Robertson, editor of out-law.com and legal director at solicitors Pinsent Masons, reckons the "powerful public interest" argument is irrelevant in considering whether the BBC acted in violation of UK computer misuse law. He told El Reg that BBC Click would do better to apologise than hide behind such shaky defences.

The public interest argument is no defence to the Computer Misuse Act. It could influence a decision by the police and the Crown on whether to take any action over the BBC's behaviour; but it could also backfire. An apology is more likely to make the problem go away, in my view, than an argument that breaking the law was the right thing to do.

Breaking the law in the public interest is an argument that vigilantes will use. It rarely wins support from law enforcement.

Some Reg readers have reported their concerns about the programme to the Met's Computer Crime Unit, which has said it's not prepared to do anything until a victim makes a complaint. Given that BBC Click carefully chose machines outside the UK and US, this is unlikely to happen.

In any case, it's not hard to argue that scant cybercrime resources are far better served in investigating profit-hungry cybercrims than BBC hacks. However, contrary to BBC Click claims, we don't think the BBC carried out a storming piece of investigative journalism. Tampering with people's PCs to illustrate the botnet risk is unethical in much the same way that breaking into homes to dramatise the risks of burglary is also a non-starter.

That's by no means a universal view. A poll by security firm Sophos, which has been among BBC Click's more outspoken critics, found that a majority (56 per cent) of the 854 respondents reckoned what BBC Click did was either against the law or "set a dangerous precedent". A third said that although the exercise might be legally questionable it "helps raise awareness", while 11 per cent dismissed the whole business as a storm in a teacup. ®

High performance access to file storage

More from The Register

next story
Parent gabfest Mumsnet hit by SSL bug: My heart bleeds, grins hacker
Natter-board tells middle-class Britain to purée its passwords
Obama allows NSA to exploit 0-days: report
If the spooks say they need it, they get it
Web data BLEEDOUT: Users to feel the pain as Heartbleed bug revealed
Vendors and ISPs have work to do updating firmware - if it's possible to fix this
Samsung Galaxy S5 fingerprint scanner hacked in just 4 DAYS
Sammy's newbie cooked slower than iPhone, also costs more to build
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
Call of Duty 'fragged using OpenSSL's Heartbleed exploit'
So it begins ... or maybe not, says one analyst
Snowden-inspired crypto-email service Lavaboom launches
German service pays tribute to Lavabit
German space centre endures cyber attack
Chinese code retrieved but NSA hack not ruled out
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
HP ArcSight ESM solution helps Finansbank
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.