GCHQ Asked Court To Let It Infringe On Anti-Virus Copyrights… For National Security

from the nothing-is-intact dept

National security apparently means “securing” the nation at the expense of citizens’ security. New Snowden documents published by The Intercept show massive amounts of dicking around in the coding of popular anti-virus software by the NSA and GCHQ. The list of antivirus products not affected would be much, much shorter than a list of those that have been.

Much of what listed here involves the NSA and GCHQ monitoring threats reported to these antivirus makers (by intercepting email messages, naturally), obviously in hopes of finding something temporarily exploitable. But in other cases, the efforts went much, much deeper. The GCHQ obtained a warrant to reverse engineer Kapersky products because it felt the company’s software was “obstructing” its hacking attempts.

“Personal security products such as the Russian anti-virus software Kaspersky continue to pose a challenge to GCHQ’s CNE [Computer Network Exploitation] capability and SRE is essential in order to be able to exploit such software and to prevent detection of our activities,” the warrant renewal request said. “Examination of Kaspersky and other such products continues.” The warrant renewal request also states that GCHQ reverse engineers anti-virus programs to assess their fitness for use by government agencies.

Not only did the GCHQ seek permission to tear apart a legitimate security product for its own ends, but it also asked for an exception to UK copyright law in order to do so.

GCHQ’s success as an intelligence agency is founded on technical knowledge and creativity. In particular this may involve modifying commercially available software to enable interception, decryption and other related tasks, or “reverse engineering” software (this means to convert it from machine readable code into the original format, which is then comprehensible to a person). These actions, and others necessary to understand how the software works, may represent an infringement of copyright. The interference may also be contrary to, or inconsistent with, the provisions of any licensing agreement between GCHQ and the owners of the rights in the software.

Recognizing this could potentially cause a problem if its efforts were discovered, GCHQ explicitly asked that it be granted permission to engage in copyright infringement in the name of national security.

There is a risk that in the unlikely event of a challenge by the copyright owner or licensor, the Courts would, in the absence of a legal authorisation, hold that such activity was unlawful and amounted to a copyright infringement or breach of contract. The purpose of this warrant is to provide authorisation for all continuing activities which involve interference with copyright or licensed software, but which cannot be said to fall within any other specific authorisation held by GCHQ and which are done without the permission of the owner.

In other words, GCHQ doesn’t have specific authorization to violate copyrights or licensing agreements, but for this particular effort, the warrant would act as a blanket permission slip to engage in this illegal activity. And, in doing so, it stretched an intelligence law to cover its violation of intellectual property laws.

GCHQ obtained a warrant for reverse engineering under a section of British intelligence law that does not explicitly authorize — and had apparently never been used to authorize — the sort of copyright infringement GCHQ believed was necessary to conduct such activity.

The spy agency instead relied on the Intelligence Services Commissioner to let it use a law pertaining only to property and “wireless telegraphy,” a law that had never been applied to intellectual property, according to GCHQ’s own warrant renewal application. Eric King, deputy director of U.K. surveillance watchdog Privacy International said, after being shown documents related to the warrant, “The secret reinterpretation of powers, in entirely novel ways, that have not been tested in adversarial court processes, is everything that is wrong with how GCHQ is using their legal powers.”

On top of that, the type of warrant it obtained was only to be used for foreign surveillance, but supporting documentation notes GCHQ would also be performing its reverse engineering to support “police operations” and the domestically-focused National Technical Assistance Centre.

When it comes to national security efforts, laws just don’t apply, it would appear. The NSA and GCHQ’s efforts are completely indistinguishable from those of cybercriminals. While these agencies may have “good” on their side — at least in terms of not wishing specific harm to non-targets — the end result is the same: a less secure computing world.

Filed Under: , , , , ,
Companies: kaspersky

Rate this comment as insightful
Rate this comment as funny
You have rated this comment as insightful
You have rated this comment as funny
Flag this comment as abusive/trolling/spam
You have flagged this comment
The first word has already been claimed
The last word has already been claimed
Insightful Lightbulb icon Funny Laughing icon Abusive/trolling/spam Flag icon Insightful badge Lightbulb icon Funny badge Laughing icon Comments icon

Comments on “GCHQ Asked Court To Let It Infringe On Anti-Virus Copyrights… For National Security”

Subscribe: RSS Leave a comment
Anonymous Coward says:


won’t happen while most of the population blindly supports whoever is in charge because they have bread and circuses or if you prefer, something shiny to distract them.

Once the economy goes kablooie and people stop getting their daily dose of reality tv shows and food then they will be more willing to overthrow the criminals in charge that caused it all

observer (user link) says:

Re: Re:

That’s the thing, isn’t it? Of course reverse engineering can be used for nefarious purposes – just ask GCHQ! – but that’s no reason for a blanket ban. It’s a very interesting pastime, as it happens – as it goes on at a much lower level than most ordinary programming, it really gives you a feel for how your computer works.

Anonymous Coward says:

“Not wishing specific harm to non-targets” is very different from “wishing not to cause specific harm to non-targets.” It is an important distinction. NSA interference has massively harmed the reputations, and consequently has harmed the business activities, of non-targeted private companies (e.g. Cisco, Google, Facebook, …). NSA may not have wished harm to those businesses, but they clearly either failed to wish a lack of harm, or were exceptionally inept at executing such a wish.

ECA (profile) says:


AV software is generally for 1 use..AV protection..
It does have ANTI encryption abilities..to FIND Virus.

The only reason to Goto the AV programs is to find ways to bypass it..Thats what hackers DO..
There is an easier way..ASK MS..
MS has pre-authorized hidden programs..Wonder why they didnt ask MS??

The Only reason for this, is to install CRAP on your machine.
Something we already have problems with and WHY we try to protect ourselves..

Also…If you are VERY smart..and encrypt your machine, you are not going to use WINDOWS… They even warn you about it..that recovery isnt easy,or even possible in many cases.

Encrypting your machine means you are NOT doing standard things…its a pain and hassle if you are a gamer. they have their OWN data checks and encryption, and verifications, and adding encryption, just confuses things on your machine.

Only good thing to use encryption on is a data server, Mail server or the like..Otherwise its not worth the hassle.

ECA (profile) says:


Then as an AC’ disprove it..
Windows passwords and other codes are easy to pull out with programs available around the net..

Many programs with/without DMCA, go look at STEAM..its a whole system..

Encrypting a system is abit dangerous unless you have a First recovery disk and are willing to do a full reinstall and Encrypt again..
Also, we are talking about the common user. NOT people with abit more advanced knowledge..

Show me whats wrong here?

Good AV programs Check themselves FIRST..
Yes you can HIDE things under windows..and there are simple ways to find it(not to decode it, just find) And the Border patrol has the RIGHTS to ask you to OPEN IT…

Get a hint please..That you wont be using windows to hide things.. And most advanced users can do allot more..

Anonymous Coward says:

and what happened to people whose internet connection became less secure, because of what these agencies did? even worse, what if that lower security resulted in financial loss to the person(s) concerned? the bank or whatever would have blamed the customer when it was nothing to do with the customer at all! obviously the extra problem then is how to prove anything? the customer could have lost all the savings and what if there were 100, 1,000 or more? the banks keep advertising various software to combat theft but in actual fact, they were advertising ways for the different security forces to crack customers accounts!! a bit of ‘aiding and abetting’ here?

Anonymous Coward says:

Re: Re:

We will never know if an attack is caused by clever programmers or a vulnerability introduced by terrorist agencies like NSA or GCHQ etc. Their gag orders prevent the companies from disclosing that security was compromised by our so-called protectors.
There could, in theory, be the possibility of a whistleblower from said company, but the threat of hanging, shooting, stabbing, decapitation, mauling by angry dogs and other nice things people in power have suggested, will keep most people from stepping forward.

Anonymous Coward says:

Re: Re:

“and what happened to people whose internet connection became less secure, because of what these agencies did?”

How do we know that the NSA/GCHQ/etc. aren’t at least partially to blame for some of the recent large database security breaches? If the are, you can bet the government has gag orders on the companies involved to prevent them disclosing it.

MrTroy (profile) says:

I don't get it

Okay, so GCHQ is reverse engineering the Kapersky product… and then what? Are they just trying to figure out how the product works to try to get around it? So are countless security researchers (citation: I didn’t count them).

If they’re performing a sleight of hand to replace the official strong version of Kapersky’s AV with their own modified/weakened version, then that’s terrible, but how would they do that? That seems like it would involve spoofing the Kapersky website across the UK… which would still be defeated by a VPN.

I’m not sure how to read this story other than as an endorsement for the official version of Kapersky’s software…

Annonimus says:

Security agencies are worse than cybercriminals

“When it comes to national security efforts, laws just don’t apply, it would appear. The NSA and GCHQ’s efforts are completely indistinguishable from those of cybercriminals. While these agencies may have “good” on their side — at least in terms of not wishing specific harm to non-targets — the end result is the same: a less secure computing world. “

Actually its the cybercriminals who do not wish harm to non-targets as any harm you do to a system leaves a mark that can be cataloged and tracked so it is in the criminals best interest to do as little harm as possible to the target in getting to the goal and to avoid collateral damage.

Compare that to the security agencies model of everyone is a suspect and as such there are no non-targets. Everybody is a target and a suspect.

observer (user link) says:

Re: Security agencies are worse than cybercriminals

Evidence, if any more were needed, that the natsec industry has nothing to do with the general public – whose taxes it nevertheless spends in abundance – and everything to do with monitoring potential dissidents and compensating party donors. It happened with all the scaremongering over Russia and/or China acquiring the Snowden docs, as if their own intelligence agencies didn’t have all that info already: I can’t bring myself to care, because which government has the biggest metaphorical penis has no bearing on the lives of the vast majority of people.

GEMont (profile) says:

Re: One small comfort

Actually, the news that the NSA/GCHQ wants to “legally” compromise Kapersky AV software, sounds like either an unintended promotion for the apparently highly effective software or an intended push by the Surveillance Industry towards making users purchase a now legally-compromised Kapersky.

Hard to decide which, when your dealing with criminals in all the high places.

GEMont (profile) says:

There's no business, like Snow Business, and snowjobs are such a breeze...

I can hardly wait till the populations of Australia, Britain, Canada, USA, and New Zealand finally grasp the simple fact that their federal governments and the agencies attached to those federal governments, have left the employ of those populations and are now working for someone else altogether. A very, very secret someone – like maybe the billionaire members of these federal governments themselves, perhaps.

At the rate the federal governments are telling their populations to fuck themselves now, it should not take much more than another 50-75 years or so, for the public to catch on – which should be – if history is any yardstick – about 50 years too late, as usual.

Anonymous Coward says:

Re: There's no business, like Snow Business, and snowjobs are such a breeze...

we can only hope it takes 50-75 years. personally I think things will turn much more dictatorial by 2017 or 2020.

Things like getting your door kicked in and your family dragged off in the middle of the night for political dissent against the self entitled party rulers.

GEMont (profile) says:

Re: Re: There's no business, like Snow Business, and snowjobs are such a breeze...

“…we can only hope it takes 50-75 years. personally I think things will turn much more dictatorial by 2017 or 2020.”

Actually, I said it would take the public that long – 50-75 years – to figure out exactly who the enemy is, not that it would take that long before the enemy removes all vestiges of what was once the mythical American freedoms and rights protections.

And while the poster below appears to be playing tongue-in-cheek, he/she is actually quite correct.

“We know”, is pretty much the end-purpose of the Five Eyes’ entire surveillance program.

And busting down your door and dragging your family off in the dead of night, is already a common practice, although the Drug War is used as a premise for the public pest extermination process, rather than political dissent – currently.

However, given the escalation of the War on Terror programs and its accompanying anti-public-rights laws, by the timely, convenient and well (Five Eyes) funded inauguration of ISIL as the new Evil Terrorist Horde, the Five Eyes will soon be using the War on Terror and the War on Drugs together, to implement their new secret War on the Adversary.

At that point, “We Know” becomes “We Gotcha” for any and all dissidents, popular anti-establishment bloggers and reporters and anyone else who gets in the way of the future Ownership Society’s intended Roman Utopia.

Its just the natural progression of Fascism actually.

Fascism is very difficult for the common peasant to recognise, because its a quiet conquest of the 99%, from behind, by the nation’s own wealthy 1% – the very people that the poor and middle class – the Adversary – have been trained for centuries to look up to and admire.

It is very difficult to admit that the people you want to become are the very people who are destroying your life and draining the nation in which you live.

In fact, The People almost never catch on to the process of Fascism, so fascism can be seen as the final stage of the entropy of a failed civilization.

I doubt this process will take another 20 years to accomplish, even if they do not destroy the internet through BS copyright legislation and Phony Free Trade Agreements.

Add Your Comment

Your email address will not be published. Required fields are marked *

Have a Techdirt Account? Sign in now. Want one? Register here

Comment Options:

Make this the or (get credits or sign in to see balance) what's this?

What's this?

Techdirt community members with Techdirt Credits can spotlight a comment as either the "First Word" or "Last Word" on a particular comment thread. Credits can be purchased at the Techdirt Insider Shop »

Follow Techdirt

Techdirt Daily Newsletter

Techdirt Deals
Techdirt Insider Discord
The latest chatter on the Techdirt Insider Discord channel...