Feeds

CEOP accused of misleading public over site security fail

User who discovered the flaw says agency 'whitewashed' insecurity incident

5 things you didn’t know about cloud backup

The person who discovered that the child abuse reporting mechanism on the website of the Child Exploitation and Online Protection Centre was insecure has reacted with anger to suggestions from the agency that the flaw had only affected surfers visiting the site from either Facebook or Google.

He says that contrary to CEOP's claims, the child abuse reporting page itself – and not just a landing page – had been available via a webpage that failed to apply an industry-standard SSL connection for the transmission of highly sensitive material. As a result confidential abuse reports submitted through the page would have been sent "in the clear" making them vulnerable to eavesdropping, according to Terry B, the person who discovered the flaw.

After the discovery of the problem, CEOP issued statements to the media, including El Reg and the BBC, downplaying the severity of the flaw, which was quickly resolved. In a statement, CEOP's chief exec, Peter Davies, said: "The risk was a hypothetical one and there is no evidence to suggest anyone's details have been jeopardised."

A spokeswoman further assured El Reg by telling us that the abuse report form itself was always encrypted and the problem, such as it was, was limited to users arriving from either Facebook and Google at a HTTP landing page on CEOP's website. It would have been better to have used a secure HTTPS page instead, CEOP admits, adding that the security weakness (which it said was fixed on the same day as notification) could only ever have been exploited by a "technically advanced" hacker.

Nonsense, according to Terry B, who has complained to data privacy watchdogs at the Information Commissioner's Office over both the flaw and CEOP's reaction to the problem.

Terry B has also arranged to speak to his MP over what he perceives to be an "attempted whitewash" and the difficulties that he has had in making a complaint about CEOP, for example its failure to provide him with a complaint form or a copy of their complaints process.

CEOP therefore stands accused of not only being more than a little clueless about web security, but of making misleading public statements about its mistakes.

We put Terry B's criticism to CEOP, asking whether it had anything further to say on the matter, but had yet to hear back from the child protection agency by the time we went to press. We'll update this story as and when we hear more.

Presumption of risk

Terry B told El Reg: "I am upset at Peter Davies from CEOP claiming that the vulnerability was only accessible from third-party sites such as Google, Yahoo! etc.

"The vulnerability was on the CEOP website itself. The reporting page itself was going over HTTP (insecure) and not HTTPS (secure)," he said, adding that CEOP had failed to apply an SSL connection by default.

Despite CEOP's assurances, Terry B still contends that there had been a real risk that highly sensitive child abuse reports were left open to interception.

"People who have submitted reports might think that they are only affected if they have submitted through Google etc," he said.

The highly sensitive and personal nature of the data submitted – which would include suspicions of child abuse – threatens not just victims but also those suspect of abuse, should the information fall into the hands of vigilantes.

"You have SSL on e-commerce sites because there is a presumption of risk," Terry B explained. "That's why CEOP's report function must run over an SSL link."

He said he had only contacted the media about the issue after the flaw had been resolved. He confirmed that CEOP had changed its site to use an SSL-encrypted connection by default within a day but is otherwise highly critical of the whole business, describing it as a "whitewash".

Terry B added that despite quickly carrying out some security improvements, CEOP had still left the insecure reporting page available to users by allowing the reporting page to be accessed simply by typing in the address directly or following old (and insecure) http links.

The Information Commissioner's Office has confirmed that it has launched an investigation into the incident, which remains ongoing.

CEOP was set up in 2006 to lead UK policing efforts in the fight against child abuse. It also runs education programmes. CEOP successfully lobbied for Facebook to put a panic button on its website, a measure the social network introduced even after criticism that the measure, though well-intentioned, was misconceived and bound to be ineffective. ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
One HUNDRED FAMOUS LADIES exposed NUDE online
Celebrity women victimised as Apple iCloud accounts reportedly popped
Rubbish WPS config sees WiFi router keys popped in seconds
Another day, another way in to your home router
Goog says patch⁵⁰ your Chrome
64-bit browser loads cat vids FIFTEEN PERCENT faster!
NZ Justice Minister scalped as hacker leaks emails
Grab your popcorn: Subterfuge and slur disrupts election run up
HP: NORKS' cyber spying efforts actually a credible cyberthreat
'Sophisticated' spies, DIY tech and a TROLL ARMY – report
NIST to sysadmins: clean up your SSH mess
Too many keys, too badly managed
Scratched PC-dispatch patch patched, hatched in batch rematch
Windows security update fixed after triggering blue screens (and screams) of death
Attack flogged through shiny-clicky social media buttons
66,000 users popped by malicious Flash fudging add-on
New Snowden leak: How NSA shared 850-billion-plus metadata records
'Federated search' spaffed info all over Five Eyes chums
prev story

Whitepapers

Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Advanced data protection for your virtualized environments
Find a natural fit for optimizing protection for the often resource-constrained data protection process found in virtual environments.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.