Here we go again - ISP DPI, but is it interception?
Peter Fairbrother
zenadsl6186 at zen.co.uk
Fri Jul 30 18:07:11 BST 2010
Nicholas Bohm wrote:
> Chris Edwards wrote:
>> On Fri, 30 Jul 2010, Nicholas Bohm wrote:
>>
>> | Clive D.W. Feather wrote:
>> | > Charles Lindsey said:
>> | >
>> | >> Once they have a list of addresses of sites, they they are perfectly
>> | >> entitled to visit those sites (as is anybody else) and to probe them for
>> | >> malware.
>> | >>
>> | >
>> | > No they aren't. You may recall that, a couple of years ago, someone was
>> | > convicted of computer misuse because he probed a site for malware - to be
>> | > precise, he put "/.." on an URL.
>> |
>> | Useful point: do you have a reference?
>>
>> I suspect Clive's refering to the case involving Daniel Cuthbert
>>
>> aka the "Tsunami Hacker"
>>
>> http://www.pmsommer.com/CLCMA1205.pdf
>>
>
> Thanks to Chris and Peter for their pointers.
>
> The decision of a magistrate isn't of course binding as a precedent, but
> it's a good real-world example, and one must wonder whether Talk Talk
> have overlooked it.
>
> Their public responses do suggest that they aren't very clear about the
> difference between data protection and interception, as they seem to be
> justifying the interception on the basis that they haven't collected any
> personal information about their customers.
Yes, seems rather silly. They are breaking CMA and RIPA, but "not the
DPA" ...
Or maybe it's not so silly. CMA and RIPA are enforced by the Police, who
don't seem willing to act against large companies, whereas DPA is
enforced by the IC, who does seem willing to act, even if his powers are
comparatively limited.
-- Peter Fairbrother
>
> Nicholas
More information about the ukcrypto
mailing list