Two weeks ago, the Supreme Court heard oral arguments in Van Buren vs. United States, the landmark case over the Computer Fraud and Abuse Act (CFAA). Nathan Van Buren, the petitioner in the case, is a former police officer in Georgia who used his lawful access to a police license plate database to look someone up in exchange for money. Van Buren was indicted and convicted of violating the CFAA for using his legal access to the database in a way it was not intended.
The fundamental question presented to the Supreme Court is whether someone who has authorized access to a computer violates federal law if he or she accesses the same information in an unauthorized way. While the question may seem trivial, this is a welcome and long overdue court case that could have a major impact on security researchers, consumers, and corporations alike.
Intended as the United States first anti-hacking law, the CFAA was enacted almost thirty-five years ago, long before lawyers and technologists had any sense of how the Internet would proliferate and evolve. In fact, the Act is outdated enough that it specifically excludes typewriters and portable hand-held calculators as a type of computer.
Since its inception, it has been robustly applied for basic terms and services breaches, like the infamous case of Aaron Swartz downloading articles from the digital library JSTOR, to indicting nation-state hackers and extraditing Julian Assange.
The core of the problem lies in the vague, perhaps even draconian, description of unauthorized computer use. While the law has been amended several times, including to clarify the definition of a protected computer, the ambiguity of unauthorized access puts the average consumer at risk of breaking federal law. According to the Ninth Circuit, you could potentially be committing a felony by sharing subscription passwords.
The stakes are particularly high for security researchers who identify vulnerabilities for companies without safe harbor or bug bounty programs. White-hat hackers, who act in good faith to report vulnerabilities to a company before it is breached, face the same legal risks as cybercriminals who actively exploit and profit from those vulnerabilities. Say, for example, that a security researcher has identified a significant vulnerability in the pacemaker that a healthcare company produces. If the healthcare company hasnt published a safe harbor agreement, that security researcher could face up to ten years in prison for reporting a vulnerability that could potentially save someones life.
On the less drastic side, security researchers who work with companies to protect their systems face legal risk in their day-to-day activities. During a penetration test, for example, a client will list assets that are in scope for testing, as well as state what tests are prohibited (e.g., any action that causes a denial of service and crashes a server). A penetration tester could face legal liability and prison time for inadvertently testing the wrong asset that is out of scopeor accidentally executing a test that breaches authorized use. Arguably, engineers could face the same legal liability if they access the wrong database or push the wrong code.
On one hand, the broad and ambiguous language of the CFAA provides robust legal protection for companies and facilitates federal resources, like the FBI, if a significant breach occurs. Some companies have argued that narrowing the scope of the CFAA would not be damaging to security programs if companies are already contracting security services, including crowdsourced programs like bug bounty. One company received pushback from the information security community when it accused MIT security researchers of acting in bad faith by identifying vulnerabilities in its mobile app. Some companies have argued that the difficulty of attribution, meaning the ability to accurately identify a threat actor, makes it difficult to distinguish good actors from cybercriminals.
Yet the CFAA is a reactive measure that would be enforced following an incident. Companies should ideally be focused on preventative measures to protect against a breach before it occurs. It is arguably to the detriment of companies like Voatz, which serves the public through its voting app, that the CFAA is so broad, since security researchers may choose not to investigate or report vulnerabilities due to the possibility that they could be reported to the FBI. While attribution can be incredibly difficult, good faith security researchers will always identify themselves when they report a vulnerability. Unlike malicious actors, who will exploit vulnerabilities for their own gain, security researchers act to increase the security posture of a company and protect citizens from harm.
All companies should use security services, like penetration testing, bug bounty programs, and safe harbor, to quickly identify and triage vulnerabilities. However, security researchers all have different methods for testing and may not be able to cover all of the assets that a company owns. For example, an ethical hacker may be focused on exploiting a SQL injection in a database, he or she may miss exposed credentials on the Internet that allow access into a protected server. With the rapid pace of DevSecOps, engineers could be pushing changes a dozen timesor morein a single day.
Revolutionary changes in the structure and pace of the Internet and the software that fuels it means that ad-hoc or occasional security testing is not enough to protect against vulnerabilities. We need the full force of security researchers, and all companies should encourage and protect their work.
Should the Supreme Court affirm van Burens conviction, the legal landscape will remain largely the same. Security researchers and consumers alike will face liability despite acting in good faith, and the federal government will continue to exercise broad power over trivial and ambiguous breaches of authorized computer use.
Yet the Supreme Court now has the opportunity to limit the scope of the CFAA and restrict what the federal government can prosecute. Doing so will enhance the security of the Internet, protect security researchers, and limit the legal liability of daily Internet users who clicked through terms of services without reading them.
A lot has changed since the CFAA was first enacted in 1984. While the Supreme Courts decision could drastically change the information security landscape, it is still not enough. As weve seen with the Internet of Things bill that was recently passed through the House, the United States needs modern legislation to secure the rapidly changing technology of the twenty-first century.
In short, security researchers who act in good faith are exposing themselves to huge legal risk because of the broad interpretation of CFAA. This is to the detriment of anyone who values the protection of their information. We are in dire need of reform in the United States, but in the meantime, there is hope that the Supreme Court will narrow the scope of the CFAA to protect consumers and security researchers alike.
Read more here:
What's at stake in the Computer Fraud and Abuse Act (CFAA) - Help Net Security
- Obama surveillance proposal will change little: Assange [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Julian Assange: ‘We Heard a Lot of Lies in This Speech by Obama’ [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Obama speech embarrassing says Assange [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Assange: Obama 'embarrassing' [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Julian Assange - The New York Times [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Julian Assange: Pictures, Videos, Breaking News [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Julian Assange - Wikipedia, the free encyclopedia [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Julian Assange Obama's NSA Reforms Are 'Embarrassing' - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- "I Think It's Embarrassing" - Julian Assange Responds To Obama's "Big" NSA Reforms Speech - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Julian Assange On President Obama's Speech: 'We Heard a Lot of Lies In It' - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Sean Wilentz Tries to Change the Subject [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Julian Assange - iPhone, Blackberry and Gmail to Spy Users - Video [Last Updated On: January 28th, 2014] [Originally Added On: January 28th, 2014]
- courage is contagious Ben as Julian Assange - Video [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- Julian Assange Interviews Cypherpunk Activists - The World Tomorrow - Part 2/2 - Video [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- Julian Assange Interviews Cypherpunk Activists - The World Tomorrow - Part 1/2 - Video [Last Updated On: January 31st, 2014] [Originally Added On: January 31st, 2014]
- John Elway on 'Fox News Sunday'; Julian Assange on 'Meet the Press' [Last Updated On: January 31st, 2014] [Originally Added On: January 31st, 2014]
- 2 solid video releases star Daniel (wait, who?) Bruhl [Last Updated On: January 31st, 2014] [Originally Added On: January 31st, 2014]
- Julian Assange vs. J. Edgar Hoover: Who's the real hero? - Video [Last Updated On: February 1st, 2014] [Originally Added On: February 1st, 2014]
- Feb. 2: Denis McDonough, Tim Scott, Julian Assange, Rich Lowry, Robert Gibbs, Gwen Ifill, Doris Kearns Goodwin, Chuck ... [Last Updated On: February 3rd, 2014] [Originally Added On: February 3rd, 2014]
- Julian Assange on the Anna Hazare movement - Video [Last Updated On: February 3rd, 2014] [Originally Added On: February 3rd, 2014]
- Julian Assange on personal attacks - Video [Last Updated On: February 3rd, 2014] [Originally Added On: February 3rd, 2014]
- Prosecutor pressed to speed up Assange case [Last Updated On: February 4th, 2014] [Originally Added On: February 4th, 2014]
- Julian Assange spills black money secrets - Video [Last Updated On: February 4th, 2014] [Originally Added On: February 4th, 2014]
- What's It Like to Play Kirk Pengilly From INXS? [Last Updated On: February 5th, 2014] [Originally Added On: February 5th, 2014]
- Julian Assange News and Video - FOX News Topics - FOXNews.com [Last Updated On: February 5th, 2014] [Originally Added On: February 5th, 2014]
- Julian Assange - Times Topics - The New York Times [Last Updated On: February 5th, 2014] [Originally Added On: February 5th, 2014]
- Agenda. Julian Assange. Carl Bildt till Iran - Video [Last Updated On: February 5th, 2014] [Originally Added On: February 5th, 2014]
- Julian Assange, WikiLeaks editor - News, Articles ... [Last Updated On: February 6th, 2014] [Originally Added On: February 6th, 2014]
- George Galloway - Julian Assange Rape Comments - Video [Last Updated On: February 9th, 2014] [Originally Added On: February 9th, 2014]
- Treat Assange according to Swedish Law [Last Updated On: February 12th, 2014] [Originally Added On: February 12th, 2014]
- Assange should be treated according to Swedish law [Last Updated On: February 12th, 2014] [Originally Added On: February 12th, 2014]
- Swedish MPs calling the prosecutors to travel to London and question Julian Assange - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- Julian Assange: Counter-terrorism strategies targeting Muslims will affect the wider population. - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- NSA and GCHQ spying on WikiLeaks [Last Updated On: February 18th, 2014] [Originally Added On: February 18th, 2014]
- Julian Assange Biography - Facts, Birthday, Life Story ... [Last Updated On: February 18th, 2014] [Originally Added On: February 18th, 2014]
- Hezbollah | Julian Assange's The World Tomorrow: Hassan Nasrallah - Video [Last Updated On: February 18th, 2014] [Originally Added On: February 18th, 2014]
- Julian Assange, Wikileaks and the Atika Shubert CNN interview - Video [Last Updated On: February 18th, 2014] [Originally Added On: February 18th, 2014]
- Benedict Cumberbatch vs Siri - Video [Last Updated On: February 19th, 2014] [Originally Added On: February 19th, 2014]
- Julian Assange 'couldn't bear to reveal his own secrets', says ghostwriter [Last Updated On: February 22nd, 2014] [Originally Added On: February 22nd, 2014]
- Writer dishes dirt on 'sexist' Assange [Last Updated On: February 22nd, 2014] [Originally Added On: February 22nd, 2014]
- Julian Assange's 'Ghostwriter' Eviscerates The WikiLeaks Founder In Crushing Tell-All [Last Updated On: February 23rd, 2014] [Originally Added On: February 23rd, 2014]
- Ghostwriter Reveals the Secret Life of WikiLeaks Founder Julian Assange [Last Updated On: February 25th, 2014] [Originally Added On: February 25th, 2014]
- Ghostwriter: Assange™ is NARCISSISTIC and UNTRUTHFUL [Last Updated On: February 25th, 2014] [Originally Added On: February 25th, 2014]
- 'Julian Assange couldn't bear his own secrets': ghostwriter speaks out [Last Updated On: February 28th, 2014] [Originally Added On: February 28th, 2014]
- Julian Assange to speak at SXSW [Last Updated On: March 1st, 2014] [Originally Added On: March 1st, 2014]
- Julian Assange: A Ghost Even to Himself? [Last Updated On: March 1st, 2014] [Originally Added On: March 1st, 2014]
- WikilLeaks' Julian Assange On Whistleblowers. - Video [Last Updated On: March 2nd, 2014] [Originally Added On: March 2nd, 2014]
- Calle 13 ft Julian Assange - Multiviral (2014) - Video [Last Updated On: March 3rd, 2014] [Originally Added On: March 3rd, 2014]
- 06 - Calle 13 - #Multi_Viral ft. Julian Assange. - Video [Last Updated On: March 4th, 2014] [Originally Added On: March 4th, 2014]
- Free Julian Assange Rally - Ecuador Embassy London - 1st March 2014 - Video [Last Updated On: March 4th, 2014] [Originally Added On: March 4th, 2014]
- Julian Assange - NNDB [Last Updated On: March 5th, 2014] [Originally Added On: March 5th, 2014]
- SXSW 2014: Snowden, Assange top bill at tech gathering [Last Updated On: March 7th, 2014] [Originally Added On: March 7th, 2014]
- Snowden, Assange top bill at Texas tech gathering [Last Updated On: March 7th, 2014] [Originally Added On: March 7th, 2014]
- Julian Assange draws a big SXSW crowd, which quickly loses interest [Last Updated On: March 9th, 2014] [Originally Added On: March 9th, 2014]
- Assange hints at more leaks [Last Updated On: March 9th, 2014] [Originally Added On: March 9th, 2014]
- Julian Assange draws a big SXSW crowd [Last Updated On: March 9th, 2014] [Originally Added On: March 9th, 2014]
- Assange to SXSW: We're all being watched [Last Updated On: March 9th, 2014] [Originally Added On: March 9th, 2014]
- Julian Assange: We're all being watched [Last Updated On: March 9th, 2014] [Originally Added On: March 9th, 2014]
- Julian Assange interviews Guardian Editor Alan Rusbridger - Video [Last Updated On: March 9th, 2014] [Originally Added On: March 9th, 2014]
- Julian Assange's Virtual Address at South By Southwest [Last Updated On: March 9th, 2014] [Originally Added On: March 9th, 2014]
- Julian Assange Skyping SXSW from London - Video [Last Updated On: March 9th, 2014] [Originally Added On: March 9th, 2014]
- Julian Assange Appears at South by Southwest - Video [Last Updated On: March 9th, 2014] [Originally Added On: March 9th, 2014]
- Julian Assange: We're Heading Towards A Dystopian Surveillance Society - Video [Last Updated On: March 9th, 2014] [Originally Added On: March 9th, 2014]
- Julian Assange: Society 'Heading Towards Surveillance Totalitarianism' - Alex Wagner Interview - Video [Last Updated On: March 9th, 2014] [Originally Added On: March 9th, 2014]
- Julian Assange - SXSW - March 8 2014 - Video [Last Updated On: March 10th, 2014] [Originally Added On: March 10th, 2014]
- Omar Gallaga on Julian Assange - Video [Last Updated On: March 10th, 2014] [Originally Added On: March 10th, 2014]
- Julian Assange at SXSW 2014 - Video [Last Updated On: March 10th, 2014] [Originally Added On: March 10th, 2014]
- Julian Assange Labels NSA As A 'Rogue Agency' During SXSW Speech [Last Updated On: March 11th, 2014] [Originally Added On: March 11th, 2014]
- Julian Assange speaks at SXSW - Video [Last Updated On: March 11th, 2014] [Originally Added On: March 11th, 2014]
- Wearable tech, Julian Assange and Grumpy Cat: Newsrooms goes inside the trends of SXSW - Video [Last Updated On: March 14th, 2014] [Originally Added On: March 14th, 2014]
- Julian Assange Talks Surveillance, Leaks At SXSW - Video [Last Updated On: March 14th, 2014] [Originally Added On: March 14th, 2014]
- Julian Assange 'Shows Up' in Texas - Video [Last Updated On: March 15th, 2014] [Originally Added On: March 15th, 2014]
- Julian Assange address South by Southwest festival- VOA60 America - Video [Last Updated On: March 15th, 2014] [Originally Added On: March 15th, 2014]
- Julian Assange speaking via Skype at #sxsw - Video [Last Updated On: March 16th, 2014] [Originally Added On: March 16th, 2014]
- CBS's Steve Kroft Demonizes Julian Assange - Video [Last Updated On: March 18th, 2014] [Originally Added On: March 18th, 2014]
- Julian Assange: Sysadmins of the world, unite! - Video [Last Updated On: March 18th, 2014] [Originally Added On: March 18th, 2014]
- Funny 'Assange endorsing things' meme pokes fun at BJP's embarrassment over WikiLeaks' ... [Last Updated On: March 20th, 2014] [Originally Added On: March 20th, 2014]
- Calle13 - MultiViral feat Julian Assange - Audio HD - Video [Last Updated On: March 22nd, 2014] [Originally Added On: March 22nd, 2014]
- Assange not running in new Australian election [Last Updated On: March 31st, 2014] [Originally Added On: March 31st, 2014]
- Julian Assange leaks Narendra Modi's lie - Video [Last Updated On: March 31st, 2014] [Originally Added On: March 31st, 2014]