28/07/2011 Newsnight Scotland


28/07/2011

Similar Content

Browse content similar to 28/07/2011. Check below for episodes and series from the same categories and more!

Transcript


LineFromTo

there is plenty of wrath. Tonight on Newsnight Scotland: More

:00:10.:00:13.

revelations in London about News International, an arrest in

:00:13.:00:15.

Shetland in connection with so- called cyberhacking and continuing

:00:15.:00:21.

controversy over WikiLeaks. Is our whole legal and moral system for

:00:21.:00:27.

dealing with information in crisis? And is technology making new laws

:00:27.:00:31.

to deal with the issue redundant before they're even written?

:00:31.:00:34.

Also tonight, is it really a Royal wedding just because a Royal is

:00:34.:00:39.

getting married? We look at how a damp Edinburgh is limbering up for

:00:39.:00:43.

another joyous day out. Good evening. Well, while the media

:00:43.:00:46.

goes into another frenzy about the News International scandal, the

:00:46.:00:51.

internet never sleeps. There, a campaign is under way to encourage

:00:51.:00:54.

people to shun PayPal, an online payments system which stopped

:00:54.:00:57.

processing payments to WikiLeaks. And if you believe messages tonight

:00:57.:01:00.

on Twitter, then a group of hackers will tomorrow publish a slew of

:01:00.:01:09.

documents from the American Department of Homeland Security.

:01:09.:01:11.

News International, WikiLeaks, cyberhacking. Could they by any

:01:11.:01:17.

chance be related? Well, yes. Tomorrow's front pages will again

:01:17.:01:21.

be dominated by the News International scandal following the

:01:21.:01:25.

allegations that Sara Payne's phone was hacked. This morning's front

:01:25.:01:29.

pages were dominated by another hacking story, the arrest of an 18-

:01:29.:01:34.

year-old in Shetland as part of an investigation into the cyber

:01:34.:01:40.

hacking group's Anonymous. He's being held in London as part of an

:01:40.:01:43.

ongoing investigation into hacking and so-called distributed denial of

:01:43.:01:47.

service attacks with a websites of international companies and

:01:47.:01:52.

intelligence agencies are flooded to make them crash. Among the most

:01:52.:01:56.

recent alleged victims are the Italian Government agency

:01:56.:02:02.

responsible for protecting vital computers in June the CIA's public

:02:02.:02:05.

website was taken down for a period. Among other alleged targets have

:02:05.:02:12.

been the US Senate, bang Senate Bank of America and Sony. They've

:02:12.:02:16.

also allegedly blocked access to the website of visa and hijacked

:02:16.:02:19.

sites belonging to Rupert Murdoch's News Corporation. In a statement

:02:19.:02:29.
:02:29.:02:33.

yesterday people claiming to be So, the News International scandal

:02:33.:02:36.

and international investigation into cyber hacking, and don't

:02:36.:02:39.

forget the WikiLeaks affair, which has been obsessing the chattering

:02:39.:02:44.

classes for ages, and for that matter the MPs expenses scandal,

:02:44.:02:48.

what do they all have in common? Well, they all raise the question

:02:48.:02:52.

of whether the ability of technology to give us access to

:02:52.:02:56.

secret information has outstripped our laws and moral rules about

:02:56.:03:00.

privacy. Today, Lord Justice Leveson, asked by the Prime

:03:00.:03:05.

Minister to look at journeyistic practices, raised the issue.

:03:05.:03:09.

At some stage, there needs to be a discussion of what amounts to the

:03:09.:03:13.

public good, to what extent the public interest should be taken

:03:13.:03:18.

into account, and by whom. So, who defines what is in the

:03:18.:03:24.

public interest? Who controls information that by definition is

:03:24.:03:26.

increasingly accessible, even the most sensitive types of

:03:26.:03:30.

information? And when can using questionable methods to access

:03:30.:03:39.

information be justified in the public interest?

:03:39.:03:42.

I'm joined now from Edinburgh by computer security expert Professor

:03:42.:03:46.

Bill Buchanan of Napier University. Here in Glasgow, Strathclyde

:03:46.:03:48.

sociologist Professor David Miller, and joining us live from San

:03:48.:03:51.

Francisco by the magic of the internet is Hanni Fakhoury, who's

:03:51.:04:00.

staff lawyer with the Electronic Frontier Foundation, the EFF. Do

:04:00.:04:06.

you think that the issues we have seen arising with these hacking

:04:06.:04:12.

issues recently, the campaigns on Paypal etc, are we just seeing a

:04:12.:04:18.

bunch of kids being criminals or is this some new form of civil action?

:04:18.:04:24.

I think we're seeing a new form of civil action to a certain extent.

:04:24.:04:30.

The ability of the internet to make large amounts of data accessible to

:04:30.:04:35.

many people all at once provides really an opportunity for people

:04:35.:04:39.

who do have a particular social agenda or cause that they want to

:04:40.:04:43.

publicise or promote t make it easier for them to get that

:04:43.:04:46.

information out there. And often times governments are going to try

:04:46.:04:52.

and label what they're doing criminal, but there is certainly a

:04:52.:04:57.

strong argument to be made that what they're doing is really

:04:57.:05:01.

pursuing the public interest. So we can - it's difficult because often

:05:01.:05:06.

times we may not agree with their means, but at least for many of

:05:06.:05:10.

these individuals they see it as their ends are justified. Right,

:05:10.:05:15.

but where do you draw the line? For example, there's a spectrum, if we

:05:15.:05:21.

take Paypal, there were attempts to basically by these people to say to

:05:21.:05:24.

people who have accounts don't have them, because we don't like what

:05:24.:05:28.

they're doing, that sounds like a perfectly legitimate form of

:05:28.:05:32.

protest. Then there were attempts to flood the Paypal site to bring

:05:32.:05:37.

it down, I suppose you could say that's like having a demonstration

:05:37.:05:40.

in the city centre if it's for a period of time. Should there be an

:05:40.:05:44.

attempt to publish the details of Paypal account holders because

:05:44.:05:47.

someone's hacked in? That does seem to be something very different,

:05:47.:05:53.

doesn't it? It does. And I don't want to say that it's OK to

:05:53.:05:56.

disclose other people's sensitive private information, I am certainly

:05:56.:06:01.

not suggesting that. But if the issue is do these individuals see

:06:01.:06:06.

themselves as some sort of social Crusaders, then I would say yes,

:06:06.:06:12.

they do see themselves that way. I think a lot of people forget

:06:12.:06:18.

sometimes that in many of the recent - in recent history civil

:06:18.:06:22.

rights movements, if you want to call it that, or massive protest

:06:22.:06:27.

movements, they have been criminal behaviour has been the forefront of

:06:27.:06:30.

that, so I mean we can sit and label something a crime and not a

:06:30.:06:34.

crime and it may be crime by the legal definition of what is and is

:06:34.:06:38.

not a crime, but do these people see themselves as doing something

:06:38.:06:45.

for the greater good and don't see themselves as just vandals and

:06:45.:06:49.

criminals? Then yes, I think they do see themselves that way. How we

:06:49.:06:53.

as a society views them is a more difficult question and there are

:06:53.:06:56.

people who obviously are going to agree with their methods because

:06:56.:07:03.

they'll believe that the ends justify the means. What links these

:07:03.:07:08.

issues together, links it with News International in a way, things like

:07:08.:07:11.

Milly Dowler, everyone was horrified, but there are situations

:07:11.:07:16.

where a newspaper might say well, we have done things that actually

:07:16.:07:19.

are technically illegal but we have a public defence, we have exposed

:07:19.:07:23.

an arms dealer, for example, breaking UN sanctions and we have a

:07:23.:07:29.

right and actually it's enshrined in law a lot of issues, we have a

:07:29.:07:33.

public defence. Do the kind of people that Hanni is talking about

:07:33.:07:38.

have a moral, never mind a legal right to say, well, we're just - we

:07:38.:07:44.

are the new version of newspapers? We are the new version of

:07:44.:07:47.

investigative journalism, yes, they are in some respects, they are

:07:47.:07:50.

replacing some forms of investigatesive journalism. That's

:07:50.:07:54.

a good argument but there is also a clearly an argument in relation to

:07:54.:08:00.

News International, that there are some techniques of journalism which

:08:00.:08:04.

are unacceptable and which horrify... It's drawing boundaries

:08:04.:08:09.

now, I mean ethically, never mind legally, they difficult, isn't it?

:08:09.:08:12.

It is and that's partly to do with the technology which we have been

:08:12.:08:17.

hearing about and partly to do with the concentrated assault there's

:08:17.:08:21.

been on the concept of the public interest. Many of the most famous

:08:21.:08:25.

prize winning economists regard the concept of public interest as a

:08:25.:08:29.

meaningful concept and think that people who defend the public

:08:29.:08:34.

interest are maniacs and extremists and and must be kpwalted --

:08:34.:08:44.
:08:44.:08:47.

combated. That's a key issue as well, which meshs in with the

:08:47.:08:51.

question of technology. Is there a danger, it's this balance with

:08:52.:08:55.

protecting privacy and criminalising people. An example,

:08:55.:09:01.

it took me about five seconds this evening to find a download page for

:09:02.:09:06.

something called a low orbit ion collider, which is apparently

:09:06.:09:10.

software you can use to engineer mass floodings of websites to close

:09:10.:09:15.

them down. Now I didn't download it but people in the United States

:09:15.:09:19.

have been visited and indeed arrested by the FBI for having

:09:19.:09:28.

We are now moving from an industrial age into this new area,

:09:28.:09:35.

which is an information age and we are learning about how we protect

:09:35.:09:38.

ourselves and businesses from malicious purposes, because there

:09:38.:09:43.

are a great deal of motivations out there and political gain, there's

:09:43.:09:47.

financial gain, so I think businesses need to understand how

:09:47.:09:52.

to protect themselves, so there has been a little bit of a malaise

:09:52.:09:56.

inside businesses and organisations to say that it doesn't really

:09:56.:10:00.

matter if we are being attacked or we lose data or something has been

:10:00.:10:03.

compromised. There needs to be a greater investment. Is it the case

:10:03.:10:11.

that, as I understand it, a lot of the attacks that these groups like

:10:11.:10:18.

Anonymous have done, the techniques they are using are not that

:10:18.:10:22.

sophisticated. It's just that the people they are attacking are so

:10:22.:10:25.

laxy they don't have defences against it? That is extremely true.

:10:25.:10:30.

If you ask a good security professional they'll say the

:10:30.:10:34.

easiest person to defend against is the standard kidy who is using

:10:34.:10:40.

standard tools that are widely available on the internet, because

:10:40.:10:44.

other professionals know how to defend. We have found the biggest

:10:44.:10:49.

risk is serious and organised crime groups, typically outside the UK,

:10:49.:10:52.

that have sophisticated methods. They have software programmers and

:10:52.:10:56.

they can actually pay for things to be developed for them. Once you

:10:56.:11:01.

change something then it makes it more difficult to protect against.

:11:01.:11:05.

Hanni Fakhoury, I'm interested to attitudes in the EFF as to whether

:11:05.:11:09.

you would defend some of the hacking activities. Again, from

:11:09.:11:15.

having a legitimate campaign, yes, but for example, bill Bucahanan was

:11:15.:11:20.

mentioning criminals, so if you hack into PayPal and publish lists

:11:20.:11:25.

of names, those names and passwords can be used by criminals, even if

:11:25.:11:28.

the people who are hacking are around kisses or just trying to

:11:28.:11:34.

have a laugh? Well, we at EFF have always tried to approach every

:11:34.:11:41.

situation in its own unique set of facts, so we take every - if people

:11:41.:11:45.

approach us about representing them then we take a case-by-case

:11:46.:11:53.

individual approach, but I would say that we - with respect to

:11:53.:11:55.

publishing lists and people's person and private information,

:11:55.:12:00.

obviously we don't support or encourage people to do that. To the

:12:00.:12:04.

extent that the law criminalises people who engage in that type of

:12:04.:12:08.

activity, that's not a thing that we really - we don't take too much

:12:08.:12:14.

issue with that. We do, however, take issue with the way the law at

:12:14.:12:21.

least in the United States is often times interpreted. It's meant to

:12:21.:12:26.

cover that criminal behaviour, but often it gets used in a way to

:12:26.:12:30.

criminalise much broader categories that may not be so criminal. Hanni

:12:30.:12:33.

Fakhoury, I'm sorry to interrupt, but we are going to have to leave

:12:33.:12:38.

it. Gentlemen, thank you all very much indeed.

:12:38.:12:41.

Now, you can imagine Derek Bateman's reaction when we asked

:12:41.:12:45.

him for a film on this weekend's Royal Wedding in Edinburgh between

:12:45.:12:49.

Zara Philips and Mike Tindall. He protested that it wasn't a Royal

:12:49.:12:53.

Wedding and the Palace didn't want people turning up on the Royal Mile,

:12:53.:12:56.

but we insisted he head off to Edinburgh in the rain and here's

:12:57.:13:05.

the result. All the world loves a Royal Wedding. Only this won't be

:13:05.:13:15.
:13:15.:13:17.

one. It is officially a private family affair. It just happens to

:13:17.:13:21.

be be closing parts of Edinburgh and requires police and private

:13:22.:13:30.

security and the monarch will be there. Who else has the timetable

:13:30.:13:34.

for their horse trials adjusted to allow guests to get into tails on

:13:34.:13:42.

time? We know this is a very private affair, because the

:13:42.:13:48.

minister of the Kirk won't do interviews. Actually, neither will

:13:48.:13:54.

the City Council. They've been doing an all-round tidy up ahead of

:13:54.:13:58.

the big event, which personal I think is a very good idea, because

:13:58.:14:02.

the last time I walked around the cemetery here there was clear

:14:02.:14:08.

evidence that local people had been using it as an overnight stop. The

:14:08.:14:15.

inside word - OK, the Daily Mail - says Zara was keen to sell the

:14:15.:14:19.

event to Hello but was scuppered by her mum. Yes, there's a rumour

:14:19.:14:25.

around and I say they should have gone for it. That �500,000 that is

:14:25.:14:30.

rumoured to have been paid for the pictures could also have paid

:14:30.:14:35.

�500,000 for all the police and kuert for the event. -- and

:14:35.:14:41.

security for the event. Is there a danger that the happy couple will

:14:41.:14:49.

be playing second fiddle to the monarch and to the heir and his new

:14:49.:14:53.

wife? Yes, no doubt. Anyone who is making an attempt to get a look

:14:53.:14:57.

will be looking to see Kate and William rather than Zara and Mike,

:14:57.:15:04.

but you never know, there might be a few Zara watchers around. Why is

:15:04.:15:10.

the wedding in Edinburgh at all? When the Princess Anne branch of

:15:10.:15:15.

the family there is a tradition of getting married if Scotland. When

:15:15.:15:18.

she wanted to marry her second husband, there was worry about

:15:19.:15:23.

whether she could do this in the Church of England because she had

:15:23.:15:27.

been divorced and in typical Princess Anne fashion, she kout out

:15:27.:15:34.

the nonsense by getting -- cut out the nonsense by getting married

:15:34.:15:38.

near malmoral. There's the tradition and the famous thing

:15:38.:15:44.

about Princess Anne supporting Scotland at rugby and all that.

:15:44.:15:48.

They see themselves as the most Scottish branch of the family.

:15:48.:15:52.

this a family, private affair? Absolutely not. You may say it's

:15:52.:15:57.

not a Royal Wedding, but it is a wedding and it's Royal. I know what

:15:57.:16:01.

they mean, it's not a great state occasion, so it will be a simple

:16:01.:16:07.

and smaller do, which can only be to the good. Shouldn't Scots

:16:07.:16:12.

welcome these events? Maybe we would welcome them if we were

:16:12.:16:16.

invited along and allowed to sort of enjoy them more than it seems we

:16:16.:16:22.

are being allowed to. We should remember the last time there was a

:16:22.:16:28.

Royal wedling -- wedding Britain celebrated and Glasgow went on the

:16:28.:16:36.

rampage. It doesn't help that the Edinburgh police introduced a dose

:16:36.:16:41.

of pessimism by saying there will be minimal opportunity to see the

:16:41.:16:46.

couple. So tight is space on the Royal Mile. Sadly, you won't see

:16:46.:16:52.

them either. There will be no camera inside and only one outside

:16:52.:16:58.

to see them arrive and depart. What of the dress? We are more used to

:16:58.:17:04.

seeing Zara in a fleece and there is a manly ring to her sponsors.

:17:04.:17:09.

Chunky Rolex watches, Land Rover 4x4s and water-proof clothing.

:17:09.:17:17.

Perhaps she will link all three to deal with the Edinburgh weather.

:17:17.:17:20.

There is an historical symmetry in the choice of the Kirk. The

:17:20.:17:25.

construction was started under James VII but finished under

:17:25.:17:35.
:17:35.:17:37.

Download Subtitles

SRT

ASS