Feeds

TalkTalk to fight net disconnection plan

Speak to you in court

Using blade systems to cut costs and sharpen efficiencies

A major ISP has promised a court challenge to Government plans to allow the cutting off of internet connections used by people accused of unlawful file sharing. TalkTalk said it will challenge the plans in the courts.

The Government commissioned a report on digital policy, Digital Britain, which did not recommend the cutting off of connections used by alleged file-sharers. The Department for Business, Innovation and Skills (BIS), which is headed by Lord Mandelson, later amended its consultation on that report, proposing disconnection as a policy.

Though Culture minister Ben Bradshaw told MPs last week that disconnections would happen only after a court order had been issued, there are no such guarantees in the Government's proposal.

Opponents of the plan have said that disconnection without proof to a court violates principles of justice, and have warned that disconnecting entire households because of the actions of one household member is not a fair response.

Internet service provider TalkTalk said that if it is issued with orders to disconnect its customers it will challenge their legality in the courts.

"The approach is based on the principle of ‘guilty until proven innocent’ and substitutes proper judicial process for a kangaroo court. What is being proposed is wrong in principle and it won't work in practice. We know this approach will lead to wrongful accusations," said a TalkTalk statement.

"TalkTalk will continue to resist any attempts to make it impose technical measures on its customers unless directed to do so by a court or recognised tribunal. In the event we are instructed to impose extra judicial technical measures we will challenge the instruction in the courts," it said.

The company is campaigning against the proposal, which is not yet official Government policy but is widely reported to be the favoured option of Lord Mandelson.

Other countries have attempted to introduce such laws. The French government has tried a number of times but has hit legal snags several times.

The European Parliament is locked in a battle with the European Commission and Council over the issue. It has inserted into a Telecoms Package of reforms a clause declaring disconnection without court oversight illegal.

The Council and Commission have rejected the amendment and the three governing bodies will have to thrash out a deal on the issue before the end of the year or see the entire Telecoms Package fail.

TalkTalk has said that the methods proposed to find and cut off illegal file-sharers are flawed. It said that an internet connection's owner is not necessarily responsible for all use of that connection.

"[The measures] will do little to tackle illegal filesharing since the main offenders will easily avoid detection by using other people’s broadband connections to download content or encrypting their activity," it said in a statement. "Indeed the proposed measures will increase Wi-Fi and PC hijacking and so increase even further the chances of innocent customers being wrongly cut off."

The company surveyed 1,083 internet connections and found that many could be very easily broken into and used.

"Five per cent of connections were completely open (ie no security at all), 36 per cent used WEP which is easily hackable and 56 per cent used WPA which is currently fairly secure, though a vulnerability has already been detected meaning it could become hackable soon. Only three per cent used the most secure form of protection, WPA2," it said.

Copyright © 2009, OUT-LAW.com

OUT-LAW.COM is part of international law firm Pinsent Masons.

The smart choice: opportunity from uncertainty

More from The Register

next story
Yorkshire cops fail to grasp principle behind BT Fon Wi-Fi network
'Prevent people that are passing by to hook up to your network', pleads plod
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
NEW, SINISTER web tracking tech fingerprints your computer by making it draw
Have you been on YouPorn lately, perhaps? White House website?
LibreSSL RNG bug fix: What's all the forking fuss about, ask devs
Blow to bit-spitter 'tis but a flesh wound, claim team
Black Hat anti-Tor talk smashed by lawyers' wrecking ball
Unmasking hidden users is too hot for Carnegie-Mellon
Attackers raid SWISS BANKS with DNS and malware bombs
'Retefe' trojan uses clever spin on old attacks to grant total control of bank accounts
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.