{"id":12339,"date":"2018-05-18T09:10:03","date_gmt":"2018-05-18T17:10:03","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2018\/05\/18\/news-6108\/"},"modified":"2018-05-18T09:10:03","modified_gmt":"2018-05-18T17:10:03","slug":"news-6108","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2018\/05\/18\/news-6108\/","title":{"rendered":"Why tech companies wanted Senate Bill 315 vetoed"},"content":{"rendered":"<p><strong>Credit to Author: Kayla Matthews| Date: Fri, 18 May 2018 16:00:38 +0000<\/strong><\/p>\n<p>When Georgia Senate Bill 315 (SB-315) was introduced, people in the tech world anxiously awaited its fate, regardless of their geographic location. They knew that some laws initially restricted to single states become more widespread after politicians set precedents. And they knew that this law could potentially impact the way that they did business forever.<\/p>\n<p>The bill passed in the General Assembly on March 29\u2014and that was not the news tech companies were looking for. They hoped the bill would be shot down. But why?<\/p>\n<h3>The bill<\/h3>\n<p>SB-315 was a Republican-sponsored bill aiming to alter the state\u2019s parameters on computer usage. If passed, it would have amended the original language of Georgia\u2019s code that discusses \u201ccomputer trespass.\u201d The activities under that umbrella include deleting computer programs or data, altering or damaging hardware, and obstructing the use of a computer program. In short, Georgia\u2019s code stated that unauthorized use only extended to malicious intent.<\/p>\n<p>However, SB-315\u2019s language is much more vague than the original Georgia code. It <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/georgia-senate-passes-bill-that-criminalizes-unauthorized-pen-tests\/\" target=\"_blank\" rel=\"noopener\">prohibits unauthorized computer access<\/a>\u2014period\u2014although it doesn\u2019t apply to people living in the same house, individuals using computers for legitimate business activities, or those engaged in active cyberdefense measures that stop or detect unauthorized use.<\/p>\n<h3>What prompted SB-315?<\/h3>\n<p>A security researcher named Logan Lamb found a vulnerability associated with Kennesaw State University&#8217;s (KSU) Center for Election Systems that exposed the details of <a href=\"https:\/\/arstechnica.com\/tech-policy\/2018\/05\/georgia-governor-vetoes-cyber-bill-that-would-criminalize-unauthorized-access\/\" target=\"_blank\" rel=\"noopener\">6.7 million voters in Georgia<\/a>. He contacted the appropriate authority and received word that the issue would get fixed. A year later, Chris Grayson, a fellow cybersecurity researcher, found the vulnerability still existed.<\/p>\n<p>Next, both Lamb and Grayson approached a KSU information security lecturer about the matter. That action finally got the problem fixed. Unfortunately, it also resulted in Lamb getting visited by FBI agents. They determined he didn\u2019t do anything wrong but advised him to delete any downloaded data.<\/p>\n<p>Lamb\u2019s efforts to help protect that data would now be considered illegal under SB-315.<\/p>\n<h3>Tech companies raise concerns<\/h3>\n<p>Microsoft and Google are among the technology companies that urged Georgia governor Nathan Deal to veto the bill. In a joint letter distributed to Deal on April 15, <a href=\"https:\/\/www.courthousenews.com\/microsoft-and-google-urge-veto-of-georgia-cybersecurity-bill\/\" target=\"_blank\" rel=\"noopener\">representatives from tech companies took issue<\/a> with criminalizing unauthorized computer access, saying the consequences could be damaging to Georgia\u2019s infosec industry. They also argued against the provision of the bill that makes \u201chack backs\u201d exempt.<\/p>\n<p>The tech representatives asserted that the provision as written was too broad and its parameters were not clearly defined. As such, they recognized a strong potential for abuse for anti-competitive purposes rather than solely to protect networks. They also said that enabling Georgia businesses to \u201chack back\u201d in defense of cybercriminals could have unintended consequences.<\/p>\n<p>In addition, cybersecurity company Tripwire filed a letter with the governor\u2019s office on April 16, arguing that SB-315 would ultimately weaken security. \u201cSB-315 will discourage good actors from reporting vulnerabilities and ultimately increase the likelihood that adversaries will find and exploit the underlying weaknesses,\u201d the letter said.<\/p>\n<h3>Potential ramifications for cybersecurity researchers<\/h3>\n<p>In a separate letter to Congress, 55 tech professionals warned that the \u201clegitimate business activity\u201d exemption of the bill was dangerously unclear. The letter stated that this term \u201cis undefined and creates ambiguity for researchers unconnected with a business\u2026and how activities will be qualified as \u2018legitimate.\u2019\u201d<\/p>\n<p>Experts say SB-315 would have <a href=\"https:\/\/www.wired.com\/story\/georgia-sb315-hacking-bill-wrong\/\" target=\"_blank\" rel=\"noopener\">had a chilling effect<\/a> on independent researchers, specifically those that perform penetration tests. Sometimes referred to as whitehat hackers, these cybersecurity specialists <a href=\"https:\/\/vigilantllc.com\/services\/cybersecurity\/penetration-testing\/\" target=\"_blank\" rel=\"noopener\">look for network weaknesses<\/a> and find out what would happen if they were exploited.<\/p>\n<p>After collecting the results of penetration tests, the researchers contact the appropriate parties to inform them of vulnerabilities. However, some people in the cybersecurity sector wondered if by disclosing the outcomes of penetration tests, researchers would violate SB-315 and risk fines or jail time.<\/p>\n<p>Hackers showed their displeasure for SB-315 by hacking several Georgia websites, including the homepages of a church and two restaurants. In all cases, the infiltrators left messages on the sites to warn that <a href=\"https:\/\/www.csoonline.com\/article\/3269535\/security\/hackers-protest-georgias-sb-315-anti-hacking-bill-by-allegedly-hacking-georgia-sites.html\" target=\"_blank\" rel=\"noopener\">SB-315 barred the ethical reporting<\/a> of the vulnerabilities that allowed the attacks.<\/p>\n<h3>Nods of approval for SB-315<\/h3>\n<p>Chris Carr, the attorney general for the state of Georgia, issued a statement after SB-315 passed in the General Assembly that outlined <a href=\"https:\/\/law.georgia.gov\/press-releases\/2018-03-29\/carr-applauds-passage-georgia-cybersecurity-bill\" target=\"_blank\" rel=\"noopener\">his support of the bill<\/a>. He asserted that Georgia is one of only three states that don\u2019t make unauthorized computer or network without malicious intent illegal.<\/p>\n<p>Carr referred to SB-315 as a \u201ccommon sense solution\u201d that prevented the opportunities hackers would otherwise seize. Moreover, his press release expressed gratitude to other sponsors of the bill, including Representative Christian Coomer, and Senators Renee Unterman and Butch Miller, among others.<\/p>\n<p>Senator Bruce Thompson, who introduced the bill, largely steered clear of any controversy when discussing SB-315 on his Twitter feed.<\/p>\n<p>At the end of March, though, <a href=\"https:\/\/twitter.com\/BruceThompsonGA\/status\/978738562039533568\" target=\"_blank\" rel=\"noopener\">one of his tweets<\/a> mentioned Chairman Ed Seltzer. When the bill was on the House floor, Seltzer reportedly said the exemptions were \u201cbig enough to drive a truck through.\u201d That was presumably Thompson\u2019s way to respond to critics who thought the exceptions to the bill were too narrow in scope.<\/p>\n<p>Representative Tom Graves, who sponsored the bill, stated that SB-315 would provide citizens and businesses <a href=\"http:\/\/thehill.com\/policy\/cybersecurity\/386770-georgia-governor-vetoes-controversial-hacking-legislation\" target=\"_blank\" rel=\"noopener\">with more resources to stay safe<\/a> against hacks.<\/p>\n<h3>Deal gives his veto<\/h3>\n<p>Governor Nathan Deal ultimately chose to veto SB-315. <a href=\"https:\/\/gov.georgia.gov\/press-releases\/2018-05-08\/deal-issues-2018-veto-statements\" target=\"_blank\" rel=\"noopener\">In a related statement<\/a>, he mentioned that such legislation requires further discussion before enactment. Additionally, he brought up private industries and government agencies, admitting that SB-315 could make it more difficult for those entities to stay protected.<\/p>\n<p>Deal hoped legislators would continue to work together to find ways to enhance the state and national security against cyberattacks.<\/p>\n<p>The concerns of tech companies about the language and specific provisions of SB-315 emphasize why it\u2019s crucial to conduct all-encompassing analyses of pending legislation. The full impacts of proposed laws are not always immediately evident\u2014especially when it comes to technology.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/101\/2018\/05\/tech-companies-wanted-senate-bill-315-vetoed\/\">Why tech companies wanted Senate Bill 315 vetoed<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/101\/2018\/05\/tech-companies-wanted-senate-bill-315-vetoed\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Kayla Matthews| Date: Fri, 18 May 2018 16:00:38 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/101\/2018\/05\/tech-companies-wanted-senate-bill-315-vetoed\/' title='Why tech companies wanted Senate Bill 315 vetoed'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/shutterstock_53397613.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>Georgia Senate Bill 315 aimed to make all unauthorized access to computers illegal\u2014sounds good, right? Read why provisions in its fine print made tech and security companies more than uncomfortable.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/101\/\" rel=\"category tag\">101<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/101\/fyi\/\" rel=\"category tag\">FYI<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/cybersecurity-law\/\" rel=\"tag\">cybersecurity law<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/georgia-legislature\/\" rel=\"tag\">Georgia legislature<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/sb-315\/\" rel=\"tag\">SB-315<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/senate-bill-315\/\" rel=\"tag\">senate bill 315<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/101\/2018\/05\/tech-companies-wanted-senate-bill-315-vetoed\/' title='Why tech companies wanted Senate Bill 315 vetoed'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/101\/2018\/05\/tech-companies-wanted-senate-bill-315-vetoed\/\">Why tech companies wanted Senate Bill 315 vetoed<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[10519,18466,10520,18467,18468,18469],"class_list":["post-12339","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-10519","tag-cybersecurity-law","tag-fyi","tag-georgia-legislature","tag-sb-315","tag-senate-bill-315"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/12339","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=12339"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/12339\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=12339"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=12339"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=12339"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}