Stories
Slash Boxes
Comments

SoylentNews is people

posted by martyb on Thursday April 30 2020, @03:36PM   Printer-friendly
from the is-"view-source"-a-crime? dept.

Possibly paywalled: There's finally a Supreme Court battle coming over the nation's main hacking law (Alternative URL)

The Supreme Court is finally considering whether to rein in the nation's sweeping anti-hacking law, which cybersecurity pros say is decades out of date and ill-suited to the modern Internet.

The justices agreed to hear a case this fall that argues law enforcement and prosecutors have routinely applied the law too broadly and used it to criminalize not just hacking into websites but also far more innocuous behavior – such as lying about your name or location while signing up on a website or otherwise violating the site's terms of service.
If the court agrees to narrow how prosecutors can use the law, it would be a huge victory for security researchers.

They routinely skirt websites' strict terms of service when they investigate them for bugs that cybercriminals could exploit.

It would also make the Internet far safer, they say. That's because current interpretations of the 1986 law, known as the Computer Fraud and Abuse act (CFAA), have made researchers wary of revealing bugs they find because they fear getting in trouble with police or with companies, which can also sue under the law in civil courts.

"Computer researchers are constantly afraid that a security test they run is going to run them afoul of the law," Tor Ekeland, an attorney who specializes in defending people accused of violating the CFAA, told me. "This law makes the Internet less safe because it chills legitimate information security research and it's bad for the economy because it chills innovation."

The fight centers on whether the law should apply just to hacking or more broadly to breaking rules on a computer.

How many Soylentils read the entire terms of service of all the web sites they visit? In some cases, people have been convicted of crimes for violating them. It would be best to read the entire article before commenting as there are several nuances and historical precedents that it addresses.


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 2) by PiMuNu on Thursday April 30 2020, @04:24PM (10 children)

    by PiMuNu (3823) on Thursday April 30 2020, @04:24PM (#988628)

    > The law shouldn't even exist.

    Have you not seen War Games? That sort of thinking can start World War III

    Starting Score:    1  point
    Karma-Bonus Modifier   +1  

    Total Score:   2  
  • (Score: 3, Funny) by VLM on Thursday April 30 2020, @04:42PM (4 children)

    by VLM (445) on Thursday April 30 2020, @04:42PM (#988635)

    Have you not seen War Games?

    Have you? I don't think the plot of the movie was "Well, this kid did break every law in the book, but its on a computer so we'll just have to let him do it and ignore his actions".

    • (Score: 2) by PiMuNu on Thursday April 30 2020, @05:38PM

      by PiMuNu (3823) on Thursday April 30 2020, @05:38PM (#988660)

      > Have you?

      Yes, but it was a long time ago. I had to check on wikipedia that it was the film I was thinking about! I'll put down "Last Starfighter" next [checks wikipedia again]

    • (Score: 0) by Anonymous Coward on Thursday April 30 2020, @10:42PM (2 children)

      by Anonymous Coward on Thursday April 30 2020, @10:42PM (#988741)

      No, that is pretty much the plot. He unwittingly breaks into the computer and starts the countdown to Armageddon. They catch him and bring him to the vault in Colorado and Dabny Coleman locks him in an office. Then when the shit is about to hit the fan, they let him decide how to interact with the computer with the hopes that he can get it to stop. And then they all walk away happy in the end.

      I remember the movie fairly well, I think, but it was also my first real date with the girl I wanted to be my girlfriend and I did spend a lot of the movie wondering if I should touch her or maybe try to steal a kiss after it was over, so I might be a little fuzzy on some of the parts.

      • (Score: 2) by janrinok on Friday May 01 2020, @08:26AM

        by janrinok (52) Subscriber Badge on Friday May 01 2020, @08:26AM (#988842) Journal

        You can't finish there! Inquiring minds need answers.

        Did you kiss her? Did you get a second date?

      • (Score: 2) by VLM on Monday May 04 2020, @09:45PM

        by VLM (445) on Monday May 04 2020, @09:45PM (#990452)

        Should have watched the movie more closely; the secret is change her grade in class to an "A". Either that or prevent WWIII. Girls are unpredictable that way.

  • (Score: 4, Funny) by DannyB on Thursday April 30 2020, @05:27PM (4 children)

    by DannyB (5839) Subscriber Badge on Thursday April 30 2020, @05:27PM (#988656) Journal

    Recently on SN I pointed out that CFAA [wikipedia.org] (computer fraud and abuse act) was inspired by the movie War Games.

    Yes, really. Lawmakers asked about how well military computers were protected. Naturally making hacking illegal would prevent it from happening. Just as laws against murder have eliminated all murders.

    Gone are the days where you would dial in to Soylent News, to have your terminal emulator spit out a banner of rules and a notice about the CFAA and howww09909n;ln; n2;l0dd0a#(SuG9G)s32]

    NO CARRIER

    --
    The lower I set my standards the more accomplishments I have.
    • (Score: 3, Insightful) by meustrus on Thursday April 30 2020, @10:15PM (3 children)

      by meustrus (4961) on Thursday April 30 2020, @10:15PM (#988727)

      Naturally making hacking illegal would prevent it from happening.

      Most important sentence on this page.

      Computation and cryptography together represent a fundamentally new means of enforcing reality. Because you can mathematically prove that a law is broken and immediately prevent it, there's no reason to design punishments for breaking that law.

      Take Bitcoin as an example. We don't need laws against forging Bitcoin. Bitcoin as a technology is designed so that forging it is mathematically impossible (within certain highly visible restrictions).

      Businesses take far too much for granted from the government. Sure, if you have a brick and mortar store, the police are there to respond to break-ins and track down the burglar.

      That doesn't work with computers, though. There are simply too many would-be burglars for human cops to chase after them.

      What does work with computers is designing an interface that is cryptographically impossible to access fraudulently. Which is admittedly very difficult, to the point that possibly nobody has done it correctly.

      If anybody has, though, it would be the military. And here's the kicker: they could share that knowledge with the rest of society. We could have military-grade secure communication.

      We don't have military-grade secure communication, though, ultimately because they like having the best toys. See export of cryptography from the United States [wikipedia.org].

      Maybe the CFAA helped placate civilian needs for military-grade security. Maybe that was the plan all along. Maybe law enforcement prefers playing an unwinnable game of cat-and-mouse to being effectively locked out from snooping along with everybody else.

      Then again, maybe it's not realistic to think private enterprise would ever invest all that much in their own digital security. Maybe the explosion of economic activity on the internet depends on web site operators being able to avoid the expense of real security.

      At that point, though, it's all actuarial. Does it really matter to customers that the perpetrator of a data breach is classified as a criminal? No. Does it matter to their insurance underwriters? Probably.

      --
      If there isn't at least one reference or primary source, it's not +1 Informative. Maybe the underused +1 Interesting?
      • (Score: 2) by DannyB on Friday May 01 2020, @02:02PM (1 child)

        by DannyB (5839) Subscriber Badge on Friday May 01 2020, @02:02PM (#988951) Journal

        Maybe the CFAA helped placate civilian needs for military-grade security.

        Maybe, but the CFAA (1986) was a long time before the crypto wars of the early 1990s. Maybe there was demand for military grade crypto in 86, but I wasn't aware of it.

        One interesting thing about the crypto wars was a hack workaround. What if I published source code and detailed knowledge in a textbook (Applied Cryptography) and then traveled out of the US with that textbook. Was the US prepared to ban books? Or burn them? Or censor them? Or confiscate academic textbooks? Apparently they were not quite ready, at that time, to go that far. Yet.

        --
        The lower I set my standards the more accomplishments I have.
        • (Score: 2) by meustrus on Friday May 01 2020, @06:35PM

          by meustrus (4961) on Friday May 01 2020, @06:35PM (#989095)

          "Placate" is probably the wrong word. "Preempt" would be a better fit. Because yeah, the private sector didn't think they needed it. Even though Bell had been getting phreaked for years, they still thought they could get away with security-by-obscurity forever.

          In a more perfect world, the US government would have predicted the influence that networked computing would have and launch a program to provide free military-grade security consulting to US tech companies.

          There's no way that ever could have happened, though. It would have required government to simultaneously be pro-private-sector and pro-big-government, not to mention incredibly prophetic.

          It's the kind of thing that could only happen in a centrally-managed economy. Most of those were too anti-private-sector to ever consider such a scheme. All but one.

          Which raises the question: is it possible that China is running such a program? They fit all the requirements. The CCP might be too paranoid, though. But if we start to discover that Chinese tech is much more secure than anyone else's, maybe this is the reason why.

          Funny how cyberpunk in the 80s predicted the wrong east Asian country would come to dominate the world through superior technology.

          --
          If there isn't at least one reference or primary source, it's not +1 Informative. Maybe the underused +1 Interesting?
      • (Score: 2) by Pino P on Saturday May 02 2020, @06:29PM

        by Pino P (4721) on Saturday May 02 2020, @06:29PM (#989548) Journal

        What does work with computers is designing an interface that is cryptographically impossible to access fraudulently. Which is admittedly very difficult, to the point that possibly nobody has done it correctly.

        Have engineers been able to implement a computer system in which a user is authorized to access a document but not to disclose its contents to a third party? The only thing backing that up right now is national implementations of the 1996 WIPO treaty.