Moves by several European countries to tighten laws against computer hacking worry security professionals who often use the same tools as hackers but for legitimate purposes.The United Kingdom and Germany are among the countries that are considering revisions to their computer crime laws in line with the 2001 Convention on Cybercrime, a Europe-wide treaty, and with a similar European Union measure passed in early 2005.But security professionals are scrutinizing those revisions out of concern for how prosecutors and judges could apply the laws. Security professionals are especially concerned about cases where the revisions apply to programs that could be used for bad or good. Companies often use hacking programs to test the mettle of their own systems.“One useful utility in the wrong hands is a potentially malicious hacking tool,” said Graham Cluley, senior technology consultant at Sophos in Abingdon, England. In the United Kingdom, legislators are debating amendments to the Computer Misuse Act (CMA) of 1990. The proposed revisions would make it illegal to create or supply a tool to someone who intends to use it for unauthorized computer access or modification.Likewise, the proposed changes to German law would also criminalize making and distributing hacking tools. The German government said the changes will bring it into compliance with the 2001 Convention on Cybercrime. Several German security companies are planning to lobby against the law, as they fear it could hamper those who test security systems, said Alexander Kornbrust, founder and chief executive officer of Red-Database-Security in Neunkirchen, Germany. For example, tools to check the strength of passwords, often freely distributed, could also be used by malicious hackers, he said.“The security community is very unhappy with this approach,” Kornbrust said. “The concern is that the usage and possession of so-called hacker tools will become illegal.”The United Kingdom and Germany are trying to align their laws with Article 6 of the convention, which bans the creation of computer programs for the purpose of committing cybercrime.So far, 43 countries have signed the convention, which indicates their willingness to revise their laws to comply. Fifteen have ratified the convention. After a country changes its laws, it can ratify the convention and put it into force.The convention does not mandate a deadline for when countries must comply, and the process of changing laws can be lengthy depending on the country, said Margaret Killerby, head of the European Committee on Crime Problems, which tracks implementation of the convention.But the goal is for Europe—and other countries, such as the United States, which also said it will implement the convention soon—to mount a consistent defense against computer criminals, given the transnational nature of computer crime, Killerby said. A key point of the convention requires countries to have a law enforcement contact available at all times to assist foreign authorities in obtaining electronic evidence, which can disappear quickly without quick moves by law enforcement.“What we want to have is an institution to allow states to cooperate with each other as rapidly as possible,” she said.Those requirements are devoid of controversy. Individual countries can draft their own customized legislation to comply with the convention, which can be used as a checklist, Killerby said. The council has provided assistance to countries in central and eastern Europe in creating computer crime laws where none was on the books, Killerby said.Countries with existing laws will have to find a medium that satisfies their own legal requirements and the convention. In the United Kingdom, the House of Lords is scheduled next month to debate changes in the part of the CMA concerning creation and distribution of hacking tools. The proposed revision to the CMA says a person is guilty of an offense if he makes or supplies something intending it to be used to commit an offense or “believing that it is likely to be so used.”But officials are confident that the wording can be smoothed. The controversy could be dampened merely by changing “likely” to “primarily,” which could “make sure we don’t catch the legitimate penetration testers,” said Merlin Erroll, a lord who sits on the All Party Parliamentary Internet Group, during a recent presentation in London.-Jeremy Kirk, IDG News Service (London Bureau)Related Link: German Law to Make Hacking Punishable CrimeCheck out our CIO News Alerts and Tech Informer pages for more updated news coverage. Related content brandpost Sponsored by Freshworks When your AI chatbots mess up AI ‘hallucinations’ present significant business risks, but new types of guardrails can keep them from doing serious damage By Paul Gillin Dec 08, 2023 4 mins Generative AI brandpost Sponsored by Dell New research: How IT leaders drive business benefits by accelerating device refresh strategies Security leaders have particular concerns that older devices are more vulnerable to increasingly sophisticated cyber attacks. By Laura McEwan Dec 08, 2023 3 mins Infrastructure Management case study Toyota transforms IT service desk with gen AI To help promote insourcing and quality control, Toyota Motor North America is leveraging generative AI for HR and IT service desk requests. By Thor Olavsrud Dec 08, 2023 7 mins Employee Experience Generative AI ICT Partners feature CSM certification: Costs, requirements, and all you need to know The Certified ScrumMaster (CSM) certification sets the standard for establishing Scrum theory, developing practical applications and rules, and leading teams and stakeholders through the development process. By Moira Alexander Dec 08, 2023 8 mins Certifications IT Skills Project Management Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe