国产视频

In Short

If Congress Really Cares about Cybersecurity…

If Congress Really Cares 国产视频 Cybersecurity..._image.jpeg

Before it adjourned in August, Congress delayed a vote on the controversial and dangerous Cybersecurity Information Sharing Act. This is definitely for the best鈥擟ISA is deeply flawed legislation that would do more to put citizens鈥 private data in the hands of the government than to actually make progress on critical cybersecurity issues. Information sharing鈥攖hat is, sharing of information about cybersecurity threats among private companies and between companies and the government鈥攚as supposed to be the low-hanging fruit that Congress could tackle quickly, before turning to larger issues. But the information-sharing bill has been hanging around for five years. And CISA isn鈥檛 just worrisome for privacy rights advocates鈥攊t鈥檚 many of the large breaches we鈥檝e seen lately.

But there are much more effective strategies for protecting valuable data. One of our greatest cybersecurity assets is 鈥渨hite hats鈥濃攕ecurity engineers who try to break the software we use every day so they can discover weaknesses that ought to be fixed. They鈥檙e like a squad of friendly locksmiths who walk around neighborhoods performing free lock audits on everyone鈥檚 front doors. (Not to mention helping develop new types of locks, working with lock companies to fortify the ones out there 鈥 it鈥檚 an imperfect analogy.) You鈥檇 probably thank the locksmiths鈥攎aybe even give them cookies.

But multiple well-meaning federal laws had unintended consequences of stifling this kind of cybersecurity work. Let鈥檚 follow a hypothetical security researcher through the three laws that Congress ought to amend right now if we want to encourage, rather than dissuade, her research:

1. The Computer Fraud and Abuse Act (18 U.S.C. 1030)

Ironically, the federal anti-hacking provision can discourage security research. The problem here is that the untrained eye has a very difficult time distinguishing security research from malicious attacks. Both actions involve trying to break into computers or networks鈥攖he differences are in what motivates the actor, and in what she does with the information after discovering a security flaw. Those are admittedly difficult questions to base a criminal statute on (though the concept of mens rea, or the mental state of an accused criminal, has been a crucial piece of criminal law for centuries), but the CFAA doesn鈥檛 even attempt to take them into account.

Congress could improve this law by adding a threshold test that attempts to recognize the legitimacy of security research and carve out behaviors that are clearly aimed at improving security. Aaron鈥檚 Law鈥攏amed after , who tragically killed himself while under what many believed was an unwarranted indictment for violations of the CFAA鈥攚ould fix some of the issues in the law, including clarifying that simple terms of service violations do not rise to the level of a criminal act. Unfortunately, Aaron鈥檚 Law has languished in committee since it was introduced. But laws should also grant immunity to any security researcher that reported or attempted to sell a discovered vulnerability to the owner or maintainer of a piece of software, instead of selling it on a black market.

If our hypothetical researcher gains unauthorized access to a computer network or system (which is the entire point of her exercise), she will have violated the CFAA. Violations of the CFAA can carry sentences up to 10 years.

2. The Digital Millennium Copyright Act (17 U.S.C. 1201)

Under the DMCA, it鈥檚 unlawful to break a protection measure put in place to prevent a person from accessing copyrighted material. The law was originally designed to combat copyright infringement by preventing people from doing things like descrambling DVDs to make bootleg copies. But in the 17 years since its passage, the DMCA has proved susceptible to abuse by companies that don鈥檛 like people to tamper with their stuff, even in ways that have nothing to do with copyright infringement. For example, just a few months ago, a researcher who exposed severe security flaws in supposedly high-security electronic locks made by a company called CyberLock got a letter from the company鈥檚 lawyers . Threats like these may never materialize into actual lawsuits or prosecutions but could nevertheless make a well-meaning engineer think twice before engaging in security research or reporting the security flaws he discovers.

If our friendly researcher subverts a security system protecting copyrighted material (and the fact of copyright law today is that most if not all Web servers contain some form of copyrighted material), she will be violating the DMCA鈥檚 anti-circumvention provisions. Violations of the DMCA are civil infractions and carry statutory damages of up to $2,500 per act of circumvention.

3. The Electronic Communications Privacy Act (18 U.S.C. 2701)

ECPA does a whole swath of good things to protect our electronic communications (though it still ). On the downside, though, ECPA鈥攍ike the CFAA and DMCA鈥攄oes not seem to have been written with security researchers in mind. One particular provision of the law, Section 2701, prohibits breaking into a computer network or system and accessing, altering, or denying access to private communications. This helps prevent unlawful spying, but just like the CFAA, ECPA doesn鈥檛 have any exceptions for researchers who might be doing similar work. Congress ought to fix ECPA to carve out behavior we want to incentivize by requiring a certain intention on the part of the defendant or by granting immunity to those who report their findings to help fix the vulnerability.

If our security researcher comes across the private communications of users, even if she doesn鈥檛 read them or otherwise tamper with them, she will have violated ECPA. Violations of ECPA can carry up to five years in prison for a first offense and 10 years per subsequent offense.

Bonus: The Wassenaar Export Control Arrangement

While it isn鈥檛 a law that Congress can amend, the United States is party to a multinational agreement called the Wassenaar Arrangement that could potentially threaten security research. The Wassenaar Arrangement aims in part to limit the sale of software and technology that could be used for surveillance to repressive regimes around the world. This agreement, which the Department of Commerce is working to implement into regulations right now, could be important for the preservation of human rights and civil liberties, particularly in those places where those protections are most needed.

Unfortunately, Commerce鈥檚 first implementation proposal was broad enough to present concerns for security research. The proposed rules would have forbid export of a fairly large category of software that is routinely used in investigating systems for vulnerabilities. Fortunately, the Commerce Department recognized the potential for chilling research presented in the proposed rules and is seeking comment and revising the rules. 国产视频鈥檚 Open Technology Institute, where I work,聽 on the regulations and we鈥檙e hopeful that the next round of rules released will strike a balance between limiting access to surveillance software by repressive regimes while still encouraging robust security research.

So, in total, our researcher may find herself facing up to 20 years in prison and $2,500 per each offense, which can stack up depending on how many violations an overly litigious company decides it can plausibly claim. That鈥檚 not even including whatever violations might accrue under the new regulations soon to come out of the Department of Commerce鈥檚 Wassenaar rulemaking. It鈥檚 an intimidating result if you鈥檙e a small independent researcher. If we want to solve our nation鈥檚 cybersecurity problems, we could start by encouraging those who go out of their way to find and report vulnerabilities with an eye toward making us all more secure.

Ross Schulman is senior policy counsel at 国产视频鈥檚 Open Technology Institute, focusing on cybersecurity, encryption, surveillance, and Internet governance. Follow him on .

This article originally appeared on , a partnership of Slate, 国产视频, and Arizona State University.听听

If Congress Really Cares about Cybersecurity…