• Home
  • Subscribe!
  • About Us / FAQ
  • Staff
  • Columns
  • Awards
  • Terms of Use
  • Facebook
  • Twitter
  • Contact
  • OB Rag
  • Donate

San Diego Free Press

Grassroots News & Progressive Views

The White House’s New Executive Order On Cyber Crime is (Unfortunately) No Joke

April 9, 2015 by Source

Share this:

  • Share on Facebook (Opens in new window) Facebook
  • Share on X (Opens in new window) X
  • More
  • Share on LinkedIn (Opens in new window) LinkedIn
  • Email a link to a friend (Opens in new window) Email
  • Print (Opens in new window) Print
  • Share on Reddit (Opens in new window) Reddit
  • Share on WhatsApp (Opens in new window) WhatsApp

cybercrimeBy Nadia Kayyali and Kurt Opsahl / DeepLinks Blog

On the morning of April 1st, the White House issued a new executive order (EO) that asserts that malicious “cyber-enabled activities” are a national threat, declares a national emergency, and establishes sanctions and other consequences for individuals and entities.

While computer and information security is certainly very important, this EO could dangerously backfire, and chill the very security research that is necessary to protect people from malicious attacks.

We wish we could say it was a very well-orchestrated April Fool’s joke, it appears the White House was serious. The order is yet another example of bad responses to very real security concerns. It comes at the same time as Congress is considering the White House’s proposal for fundamentally flawed cybersecurity legislation.

That perhaps shouldn’t be surprising, since so far, D.C.’s approach to cybersecurity hasn’t encouraged better security through a better understanding of the threats we face (something security experts internationally have pointed out is necessary). Instead of encouraging critical security research into vulnerabilities, or creating a better way to disclose vulnerabilities, this order could actually discourage that research.

The most pernicious provision, Section 1(ii)(B), allows the Secretary of the Treasury, “in consultation with” the Attorney General and Secretary of State, to make a determination that an person or entity has “materially … provided … technological support for, or goods or services in support of any” of these malicious attacks.

While that may sound good on its face, the fact is that the order is dangerously overbroad. That’s because tools that can be used for malicious attacks are also vital for defense. For example, penetration testing is the process of attempting to gain access to computer systems, without credentials like a username.

It’s a vital step in finding system vulnerabilities and fixing them before malicious attackers do. Security researchers often publish tools, and provide support for them, to help with this testing. Could the eo be used to issue sanctions against security researchers who make and distribute these tools? On its face, the answer is…maybe.

To be sure, President Obama has said that “this executive order [does not] target the legitimate cybersecurity research community or professionals who help companies improve their cybersecurity.” But assurances like this are not enough. Essentially, with these words, Obama asks us to trust the Executive, without substantial oversight, to be able to make decisions about the property and rights of people who may not have much recourse once that decision has been made, and who may well not get prior notice before the hammer comes down. Unfortunately, the Department of Justice has used anti-hacking laws far too aggressively to gain that trust.

As several security researchers who spoke up against similarly problematic terms in the Computer Fraud and Abuse Act recently pointed out in an amicus brief:

There are relatively few sources of pressure to fix design defects, whether they be in wiring, websites, or cars. The government is not set up to test every possible product or website for defects before its release, nor should it be; in addition, those defects in electronic systems that might be uncovered by the government (for instance, during an unrelated investigation) are often not released, due to internal policies. Findings by industry groups are often kept quiet, under the assumption that such defects will never come to light—just as in Grimshaw (the Ford Pinto case). The part of society that consistently serves the public interest by finding and publicizing defects that will harm consumers is the external consumer safety research community, whether those defects be in consumer products or consumer websites.

It’s clear that security researchers play an essential function. It was researchers (not the government) who discovered and conscientiously spread the news about Heartbleed, Shellshock, and POODLE, three major vulnerabilities discovered in 2014. Those researchers should not have to question whether or not they will be subject to sanctions.

To make matters worse, while most of the provisions specify that they apply to activity taking place outside of or mostly outside of the US, Section 1(ii)(B) has no such limitation. We have concerns about how the order applies to everyone. But this section also brings up constitutional due process concerns. That is, if it were to apply to people protected by the U.S. Constitution, it could violate the Fifth Amendment right to due process.

As we’ve had to point out repeatedly in the discussions about reforming the Computer Fraud and Abuse Act, unclear laws, prosecutorial (or in this case, Executive Branch) discretion, coupled with draconian penalties are not the answer to computer crime.

Nadia Kayyali is a member of the activism team at the Electronic Frontier Foundation. Kurt Opsahl is the Deputy General Counsel of the Electronic Frontier Foundation.

The Electronic Frontier Foundation is the leading nonprofit organization defending civil liberties in the digital world. Founded in 1990, EFF champions user privacy, free expression, and innovation through impact litigation, policy analysis, grassroots activism, and technology development.

This work is licensed under a Creative Commons Attribution-Share Alike 3.0 License.

 

  • Bio
  • Latest Posts
Source

Source

Source

Latest posts by Source (see all)

  • And Then They Came for the Vietnamese… - December 13, 2018
  • Amazon’s Disturbing Plan to Add Face Surveillance to Your Front Door - December 13, 2018
  • 140+ Arrested as Youth-Led Protests Demand Green New Deal on Capitol Hill - December 11, 2018

Like this:

Like Loading...

Related

Filed Under: Activism, Courts, Justice, Government, Media, Politics

« Another Day, Another Black Human Becomes a Hashtag: Video Shows Cop Shooting SC Man in the Back
An Inconvenient Companion: For Mary Kowit »
San Diego Free Press Has Suspended Publication as of Dec. 14, 2018

Let it be known that Frank Gormlie, Patty Jones, Doug Porter, Annie Lane, Brent Beltrán, Anna Daniels, and Rich Kacmar did something necessary and beautiful together for 6 1/2 years. Together, we advanced the cause of journalism by advancing the cause of justice. It has been a helluva ride. "Sometimes a great notion..." (Click here for more details)

#ResistanceSD logo; NASA photo from space of US at night

Click for the #ResistanceSD archives

Make a Non-Tax-Deductible Donation

donate-button

A Twitter List by SDFreePressorg

KNSJ 89.1 FM
Community independent radio of the people, by the people, for the people

"Play" buttonClick here to listen to KNSJ live online

At the OB Rag: OB Rag

Thoughts on the District 2 Candidates

Point Loma’s Roseville Once Rivaled San Diego

When ‘Peace’ Is Just a Deal: Why We Should Be Skeptical — An Ocean Beach Reality Check

Study of In-custody Deaths at San Diego’s Central Jail Confirms Systematic Failures

By Week’s End, Trump’s War With Iran Will Be Plainly Illegal

  • Sitemap
  • Contact
  • About Us
  • Terms of Use

©2010-2017 SanDiegoFreePress.org

Code is Poetry

%d