{"id":19121,"date":"2022-05-28T19:02:14","date_gmt":"2022-05-29T03:02:14","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2022\/05\/28\/news-12854\/"},"modified":"2022-05-28T19:02:14","modified_gmt":"2022-05-29T03:02:14","slug":"news-12854","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2022\/05\/28\/news-12854\/","title":{"rendered":"DOJ reverses itself, says good-faith security researchers should be left alone"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/idge\/imported\/imageapi\/2022\/03\/16\/09\/sale_311646_article_image-100922035-large.3x2.jpg?auto=webp&amp;quality=85,70\"\/><\/p>\n<p><strong>Credit to Author: Evan Schuman| Date: Thu, 26 May 2022 03:02:00 -0700<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">In a move that could have a major impact on enterprise penetration testing and other cybersecurity tactics, the US Department of Justice last Thursday reversed one of its own policies by telling prosecutors\u00a0<\/span><i><span style=\"font-weight: 400;\">not to\u00a0<\/span><\/i><span style=\"font-weight: 400;\">prosecute anyone involved in \u201cgood-faith security research.\u201d<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This is one of those common-sense decisions that makes me far more interested in exploring the original DOJ policy (set in 2014, during the Obama era).\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The underlying law at issue is the <a href=\"https:\/\/en.wikipedia.org\/wiki\/Computer_Fraud_and_Abuse_Act\" rel=\"noopener nofollow\" target=\"_blank\">Computer Fraud and Abuse Act<\/a>, which made it illegal to access a computer without proper authorization. It was passed in 1986 and has been updated several times since then.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">It&#8217;s also been abused, with many taking the \u201cexceed authorized access\u201d to mean almost anything a business owner didn\u2019t like. This has caused problems for legitimate security researchers and specifically for pen testers who fear they need the blessing of a site owner before pen-testing what is publicly available.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In <\/span><a href=\"https:\/\/www.justice.gov\/opa\/pr\/department-justice-announces-new-policy-charging-cases-under-computer-fraud-and-abuse-act\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">its statement<\/span><\/a><span style=\"font-weight: 400;\">, DOJ offered some excellent examples of conduct that would no longer merit prosecution: \u201cEmbellishing an online dating profile contrary to the terms of service of the dating website; creating fictional accounts on hiring, housing, or rental websites; using a pseudonym on a social networking site that prohibits them; checking sports scores at work; paying bills at work; or violating an access restriction contained in a term of service are not themselves sufficient to warrant federal criminal charges. The policy focuses the department\u2019s resources on cases where a defendant is either not authorized at all to access a computer or was authorized to access one part of a computer \u2014 such as one email account \u2014 and, despite knowing about that restriction, accessed a part of the computer to which his authorized access did not extend, such as other users\u2019 emails.\u201d<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The statement also said that \u201cgood faith\u201d has its limits. \u201cThe new policy acknowledges that claiming to be conducting security research is not a free pass for those acting in bad faith. For example, discovering vulnerabilities in devices in order to extort their owners, even if claimed as research, is not in good faith.\u201d<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The practical matter is that there will always be gray areas. Let\u2019s consider Justice\u2019s own example of \u201cdiscovering vulnerabilities in devices in order to extort their owners.\u201d <\/span><\/p>\n<p><span style=\"font-weight: 400;\">True extortion is not gray: \u201cWe found these 19 security holes on your system. Give us $5 million by midnight tonight or we\u2019ll post the details for the world to see.\u201d<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This, however, isn&#8217;t as clear cut: &#8220;We found these 19 security holes on your system. We\u2019re really good at finding holes. Do you want to discuss retaining my firm for cybersecurity services?\u201d That&#8217;s more of a sales pitch, with no explicit threat. Then again, the &#8220;researchers&#8221; \u00a0are silent about what they would do if the pitch was refused or ignored.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">What about bounty programs? What if the security researchers found these holes and wants a payout from an advertised bounty program \u2014 and says if the bounty request is denied, they&#8221;ll tell everyone the details of the holes.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Mark Rasch is an attorney specializing in cybersecurity issues and a former Justice Dept prosecutor who happened to prosecute the very first case involving the Computer Fraud and Abuse Act. (Note: That case, with the defendant being Robert Tappan Morris, happened back in 1989. I covered that trial every day for almost a month in a Syracuse federal courtroom, so this is hardly a new issue.)<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Rasch likes the new DOJ policy, but said it all goes back to prosecutorial discretion and dealing with elaborate details and circumstances in every single case. \u201cThe real problem has been that, absent something in writing, it\u2019s about relying on the good nature of an individual prosecutor. Two people can look at the exact same activity report and come to different legal conclusions. There are a hundred different value judgments at play.\u201d<\/span><\/p>\n<p><span style=\"font-weight: 400;\">One big difference, Rasch said, between 1989 and today is community. Back in the late &#8217;80s, cybercrime was viewed as more individualistic, with analogies back to the physical world more common. He offered the example of a thief breaking into houses to prove that their security was insufficient and perhaps stealing something small to prove that they successfully broke in. That was considered abhorrent.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">But today, he said, there is a better sense of community, meaning that there is an acceptance that security research <em>can<\/em> benefit the whole community.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Even within the cybersecurity community, there are differences between what a whitehat can get away with (finding ways to break in, often via high-tech brute force) and what researchers and pen testers can get away with. Pen testers like to stay with publicly-accessible documents and see how far they can go with that limitation.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Either way, this new guidance should help those prosecution decisions be more appropriate. Anything that allows security researchers to do their jobs with less fear is a good thing,<\/span><\/p>\n<p><a href=\"https:\/\/www.computerworld.com\/article\/3661692\/doj-reverses-itself-says-good-faith-security-researchers-should-be-left-alone.html#tk.rss_security\" target=\"bwo\" >http:\/\/www.computerworld.com\/category\/security\/index.rss<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/idge\/imported\/imageapi\/2022\/03\/16\/09\/sale_311646_article_image-100922035-large.3x2.jpg?auto=webp&amp;quality=85,70\"\/><\/p>\n<p><strong>Credit to Author: Evan Schuman| Date: Thu, 26 May 2022 03:02:00 -0700<\/strong><\/p>\n<article>\n<section class=\"page\">\n<p><span style=\"font-weight: 400;\">In a move that could have a major impact on enterprise penetration testing and other cybersecurity tactics, the US Department of Justice last Thursday reversed one of its own policies by telling prosecutors\u00a0<\/span><i><span style=\"font-weight: 400;\">not to\u00a0<\/span><\/i><span style=\"font-weight: 400;\">prosecute anyone involved in \u201cgood-faith security research.\u201d<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This is one of those common-sense decisions that makes me far more interested in exploring the original DOJ policy (set in 2014, during the Obama era).\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The underlying law at issue is the <a href=\"https:\/\/en.wikipedia.org\/wiki\/Computer_Fraud_and_Abuse_Act\" rel=\"noopener nofollow\" target=\"_blank\">Computer Fraud and Abuse Act<\/a>, which made it illegal to access a computer without proper authorization. It was passed in 1986 and has been updated several times since then.<\/span><\/p>\n<p class=\"jumpTag\"><a href=\"\/article\/3661692\/doj-reverses-itself-says-good-faith-security-researchers-should-be-left-alone.html#jump\">To read this article in full, please click here<\/a><\/p>\n<\/section>\n<\/article>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[11062,10643],"tags":[714,12747],"class_list":["post-19121","post","type-post","status-publish","format-standard","hentry","category-computerworld","category-independent","tag-security","tag-technology-industry"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/19121","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=19121"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/19121\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=19121"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=19121"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=19121"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}