Skip to main content

Obama's War on Hackers Is Turning Everyone into a Suspect

So there's good news, and there's bad news. The good news is that Obama mentioned a sprawling set of cybersecurity initiatives at the State of the Union tonight. The bad news is that they suck.

Don't get me wrong: improving the country's cybersecurity is important. However, the president's new proposals stand to stomp all over Americans' civil liberties and further muddle our already vague hacking laws. What does that mean for you? It means you might find yourself unwittingly violating a hacking law if you so much as click on a link. Even retweeting a link could get you into hot water. This doesn't bode well for privacy or free speech.
In the future, everybody is a hacker

Obama's cybersecurity proposals are slightly sprawling, but the changes to the Computer Fraud and Abuse Act (CFAA) are particularly alarming. Security entrepreneur Rob Graham summed it up well in an ironic tweet last week:

    Ha ha. New York Times accidentally posted their employee database to their website: SSN, passwords, and salaries: https://t.co/1dLdUXG2tT

    - Rob Graham (@ErrataRob) January 14, 2015

Would you click that link? If you did, there's a chance that you'd be violating the CFAA. The law already is notoriously awful for its vague definition of hacking offenses and draconian punishments. However, Obama's proposals manage to make it both more broad and more draconian.

Let's look at the above tweet. Obama's idea for a revised CFAA calls for expanding the definition of the phrase "exceeds authorized access" of a computer. Exceeding access imply means accessing information "for a purpose that the accesser knows is not authorized by the computer owner." In other words, Obama wants to amend the meaning of hacking. He'd even wants to make it a type of racketeering. Graham explains:

    Obama proposes upgrading hacking to a "racketeering" offense, means you can be guilty of being a hacker by simply acting like a hacker (without otherwise committing a specific crime). ... If you innocently clicked on the link above, and think you can defend yourself in court, prosecutors can still use the 20-year sentence of a racketeering charge in order to force you to plea bargain down to a 1-year sentence for hacking.

Dang. So clicking a link could mean 20 years in prison? That sounds astounding until you realize how Aaron Swartz faced decades in prison for accessing scholarly articles on MIT's network. This is after the university and the database declined to press charges. Under Obama's proposals, doing less could lead to more prison time.
The new laws are tough

The above example is just the beginning. The remainder of Obama's plan to improve cybersecurity pushes forward some of the more aggressive sides of hacking laws. In The Washington Post, Orin Kerr reflects upon the case of Andrew "weev" Auernheimer and the so-called double-counting issue. This is when the government charges a hacker twice when the unauthorized access occurs "in furtherance of" a different crime.

This happened in the Auernheimer case. Weev simply accessed a database of customer information that AT&T failed to protect. According to the prosecutors that meant committing a federal misdemeanor "in furtherance of" violating a similar New Jersey law. Weev was ultimately convicted and then the conviction was overturned due to the double-counting issue. Obama's proposals, however, open up the opportunity for more cases like this.

But it all comes back to that phrase "exceeding authorized access," the definition of hacking. Kerr writes:

    The expansion of "exceeding authorized access" would seem to allow lots of prosecutions under a "you knew the computer owner wouldn't like that" theory. And that strikes me as a dangerous idea, as it focuses on the subjective wishes of the computer owner instead of the individual's actual conduct.

It's never a good idea to have subjective laws-or at least laws that enable more subjective interpretations.

The Sony hack is one thing. Few people would argue that Sony would've liked hackers to come in, steal a bunch of internal documents packed with sensitive information, and then release it all to the public. But this situation creates a really tough situation for security researchers who are actually trying to improve cybersecurity. The CFAA already makes it tough for researchers to identify and, well, research vulnerabilities. Do we really want to make it tougher?
Then there's the privacy problem

Obama's new cybersecurity proposals don't just seek to deter hackers with broad definitions and harsh punishments. The body of legislation also aims to enable the government to access private consumer data more easily. Think of it as forensic research. If the Feds can get a better understanding of past hacks, they'll be able to trump future hacks. Or at least that's what Obama thinks.

Privacy advocates don't like this one bit. Sharing a shitload of consumer data with government agencies wouldn't necessarily stop future attacks. But does the average American really want the government digging into their Facebook data? Or their Playstation Network data?

Obama does want to improve consumer rights online. He's even pushing for stricter data privacy laws. Part of this initiative calls for anonymous consumer data before it's shared with the government, but more sharing still feels like less privacy. This is almost exactly what CISPA wants to do. CISPA is that god awful cybersecurity bill that's suddenly back in play but the president's already threatened to veto. We already know that a law like CISPA probably would not have stopped the Sony hack. So what's the point of pursing a similar direction, especially when civil liberties advocates think it's a bad idea? That seems like the opposite of consumer rights.
Obama's had better ideas

We know that a lot of the ideas in Obama's cybersecurity proposals are bad, because we've already seen how they play out in the real world. Along those lines, several aspects of Obama's legislation have already been proposed and shot down.

"The Obama Administration is on a roll with proposing legislation that endangers our privacy and security," the Electronic Frontier Foundation's Mark Jaycox and Lee Tien wrote in a blog post. They warned that Obama's cybersecurity bill "looks awfully similar to the now infamous CISPA" and conclude: "All three of [Obama's] bills are recycled ideas that have failed in Congress since their introduction in 2011. They should stay on the shelf."

Let's just call them bad ideas. It's a bad idea to assume that everyone is a hacker. It's a bad idea to come down too hard on harmless offenses. It's a bad idea to weaken Americans' sense of privacy.

Obama has a lot of good ideas about the internet. That community-based internet project that will one day loosen Comcast's stranglehold on the internet-that's a good idea! The president's advice to the FCC on how to secure net neutrality-that's a good idea, too! These cybersecurity proposals? They're just full of bad ideas.

Comments

Popular posts from this blog

JNTU-K B.Tech R10 All Results | Manabadi | Schools9 | jntuk.edu.in

Hi Friends...! It is some what difficult to search the all regular and supply results in google from manabadi, schools9 or from jntuk.edu.in for JNTU-Kakinada B.Tech students of R10 Regulation. So, that for this purpose Results Release team collected all the results and providing you to check the results of jntuk r10 regulation.  JNTU-K R10 B.Tech All Results [2010-14] JNTU-K R10 B.Tech All Results [2011-15] JNTU-K R10 B.Tech All Results [2012-16]

Adobe Acrobat XI Pro 11.0.0 Multilanguage (Cracked dll )

(Size: 530 MB) Adobe® Acrobat® XI Pro is more than just the leading PDF converter. It's packed with smart tools that give you even more power to communicate. Easily, seamlessly, brilliantly. NEW Edit text in a PDF - Fix a typo, change a font, or add a paragraph to your PDF as easily as you do in other applications using a new point-and-click interface. NEW Convert PDF files to PowerPoint - Get a head start on new projects by saving a PDF file as a fully editable PowerPoint presentation. NEW Create new PDF and web forms - Customize professional templates or design from scratch with the Adobe FormsCentral desktop app included in Acrobat XI Pro. IMPROVED Standardize routine PDF tasks - Make it easy to create PDFs consistently. Guide people through the correct series of steps with Actions. NEW Edit images in a PDF - Resize, replace, and adjust images in your PDF with no need to track down the original file or graphic.

The anatomy of anxiety

Mac OS X 10.8 Mountain Lion ISO Untouched OS download

Description I noticed that there are no complete and untouched Mountain Lion ISO images uploaded on any torrent sites. The only one available had its boot sector stripped so it could fit onto a 4.7 gb dvd. Therefore it is not bootable or very hard to boot! So here is a untouched copy of Mountain Lion in the ISO format. It will require a dual layer dvd to burn!  This iso was made by opening the golden master "InstallESD.dmg" in disk utility and converting it to a cd/dvd master. Macs use the extension ".cdr" for raw image files so I then changed it to ".iso". Now it is completely compatible to be burned with any iso image burner available! To burn on a mac in disk utility simply change the extension back to ".cdr".