Licence to hack

There are bad ideas, and then there are really awful ideas. Example of a bad idea: the proposed uniform state law called the Uniform Computer Information Transactions Act (UCITA), with its “self-help” provision that lets vendors remotely sabotage software you’ve bought if they believe you’re not conforming to their licence terms. That one is such a stinker that three states have actually outlawed UCITA provisions from being enforced.

And a really awful idea? Try legalizing malicious hacking.

That’s what a Los Angeles congressman named Howard Berman has in mind. He’s proposing a federal law that would let copyright holders use “technological self-help measures” against peer-to-peer networks like Kazaa, Morpheus and the now-moribund Napster Inc. in order to fight piracy of their copyrighted material.

What kind of “self-help” would be legalized? Spoofs, redirection, file blocking, decoys, interdiction and, oh yeah, actually breaking into servers to plant malicious code.

And what if a copyright holder causes additional damage or attacks the systems of someone who isn’t actually misusing their copyrights? Berman’s bill would protect them from being arrested or sued.

Now let this sink in for a moment: This law is a licence to hack, and hack maliciously without any further government approval, without a court order, entirely at the discretion of the copyright holder.

This is a terrible idea. Full disclosure: I’ve got no use for peer-to-peer networks where music and movies and software are pirated. My own copyrighted work has been ripped off on the Internet. My friends include the owners of several tiny music labels who hate the music-stealing networks with a passion and rejoiced when Napster went down. So I’m in a position to benefit from this licence to hack.

But I repeat: It’s a truly awful idea. And not just because it would give a little moral justification to every overgrown juvenile delinquent who believes that “if it’s OK for big movie studios to break into someone else’s computer, then it’s OK for me, too.”

It’s also a bad law for us because even though it’s aimed at peer-to-peer outfits like Kazaa and Morpheus, the next target will be corporate IT.

Face it, there’s no way to write a law that’s sure to include all peer-to-peer pirates without defining things very broadly. So any copyright holder who’s got a beef with any organization whose networks may be used to violate copyrights could claim this licence to hack.

So if some software vendor decides your company might have unlicenced software on its network whether that’s true or not the vendor could break into your servers and rummage around. After all, the software vendor is a copyright holder, and that server is on a network.

Sound crazy? Remember, Berman’s idea is to leave this all to the discretion of the copyright holder. And some copyright holders are notorious for believing their rights extend far beyond what any court or lawmaker has ever approved. For software makers who want to have you in a hammerlock, this is like UCITA on steroids.

And what if a competitor suspects you’ve acquired some of its copyrighted proprietary information? (Remember, the suspicion doesn’t have to be true.) Does anyone think some companies wouldn’t jump at the chance to hack into their rivals’ networks legally, no matter how flimsy the pretext, and “self-help” themselves to whatever they can find?

Berman says copyright holders are at a disadvantage against peer-to-peer pirates. That’s absolutely true. Crooks always have an advantage they don’t obey the law.

But the legal system shut down Napster for copyright infringement. That’s the way to go after other peer-to-peer pirates too.

There are already too many malicious hackers out there threatening our systems. Making any kind of electronic sabotage legal is a really, really awful idea.

Hayes, Computerworld (US) senior news columnist, has covered IT for more than 20 years. Contact him at [email protected].

Would you recommend this article?

Share

Thanks for taking the time to let us know what you think of this article!
We'd love to hear your opinion about this or any other story you read in our publication.


Jim Love, Chief Content Officer, IT World Canada

Featured Download

Featured Articles

Cybersecurity in 2024: Priorities and challenges for Canadian organizations 

By Derek Manky As predictions for 2024 point to the continued expansion...

Survey shows generative AI is a top priority for Canadian corporate leaders.

Leaders are devoting significant budget to generative AI for 2024 Canadian corporate...

Related Tech News

Tech Jobs

Our experienced team of journalists and bloggers bring you engaging in-depth interviews, videos and content targeted to IT professionals and line-of-business executives.

Tech Companies Hiring Right Now