Cybersecurity

DOJ sees a path to legal hacking

Shutterstock image. Copyright  enzozo. 

A senior Department of Justice official said a framework to clarify how private companies can conduct information security research without running afoul of the Computer Fraud and Abuse Act is gaining traction, but that the government is content for now to keep the guidance broad and allow “natural momentum” from the private sector to determine specific policies.

Speaking Oct. 18 at a CyberScoop conference in Washington, D.C., Leonard Bailey, DOJ's senior counsel for the National Security, Computer Crime and Intellectual Property Section, provided an update on the vulnerabilities disclosure program for online systems that was unveiled in July 2017. Bailey said the government’s goal for the program was to provide enough direction to decrease "opportunities for disagreement that may result in litigation" without prescribing a particular set of policies.

"The model of going out and addressing people and urging them individually to adopt a program doesn't scale very well," said Bailey. "The goal is to get out guidance, have people consume it, and have what seems to be a natural momentum for people to look at these, decide whether it fits for their type of organization, adopt them and maybe garner greater comfort as these programs proliferate and are done successfully without… large incidents."

Timothy Edgar, former White House director of privacy and civil liberties under the Obama administration, told FCW that the DOJ framework was a helpful starting point in terms of acknowledging the legal uncertainties caused by fuzzy language in the CFAA.

Under the current language of the law, it is illegal to access a computer without authorization or "in excess of authorization," a clause that has generated uncertainty about what constitutes legal or criminal forms of hacking.

Edgar, a senior fellow at Brown University's Watson Institute for International and Public Affairs, said information security researchers ultimately need clearer statutory reforms, not just guidance, to avoid breaking the law.

The framework "is a good first step but it doesn't really define criminal conduct narrowly enough to give a real binding effect in the way that revising the law would," said Edgar.

Bailey said DOJ is considering a recent bill to allow private companies to "hack back" when their networks are breached.

The Active Cyber Defense Certainty Act, introduced by Rep. Tom Graves (R-Ga.), would amend that clause to permit organizations to conduct certain forms of active or cyber defense, or retaliatory attacks, against groups hacking into their systems.

"I think the discussion we’ll see around [the bill] is what the difficulty is in laying out this sort of authority alongside potential harms that could result, and I look forward to kind of thinking about that and trying to figure out with others what that balance looks like," said Bailey.

One of those potential harms could take the form of companies misidentifying their attacker and causing collateral damage. The current version of the bill requires companies to notify the FBI and receive confirmation before engaging offensive cyber measures, but it is not uncommon for many hackers to mimic the tactics and methods of other organizations or nation-states in order to mask themselves and throw forensic investigators off their scent.

Tom Gann, chief public policy officer for McAfee, said Graves' bill has gone through several revisions to address previous loopholes and he expects the language to change further to clarify what kind of guidance a company would need from the government. While he is still evaluating the legislation, Gann said solving the problem of how to accurately identify and attribute cyber attacks is one of main questions hovering over the bill in its current form.

"If you get the attribution wrong and you end up hacking back on a nation state, that could have serious consequences down the road," said Gann.

Correction: This piece was updated Oct. 19 to clarify that McAfee's Tom Gann is still evaluating the Active Cyber Defense Certainty Act and does not have a position on the legislation. 

About the Author

Derek B. Johnson is a senior staff writer at FCW, covering governmentwide IT policy, cybersecurity and a range of other federal technology issues.

Prior to joining FCW, Johnson was a freelance technology journalist. His work has appeared in The Washington Post, GoodCall News, Foreign Policy Journal, Washington Technology, Elevation DC, Connection Newspapers and The Maryland Gazette.

Johnson has a Bachelor's degree in journalism from Hofstra University and a Master's degree in public policy from George Mason University. He can be contacted at djohnson@fcw.com, or follow him on Twitter @derekdoestech.

Click here for previous articles by Johnson.


Featured

  • Cybersecurity

    DHS floats 'collective defense' model for cybersecurity

    Homeland Security Secretary Kirstjen Nielsen wants her department to have a more direct role in defending the private sector and critical infrastructure entities from cyberthreats.

  • Defense
    Defense Secretary James Mattis testifies at an April 12 hearing of the House Armed Services Committee.

    Mattis: Cloud deal not tailored for Amazon

    On Capitol Hill, Defense Secretary Jim Mattis sought to quell "rumors" that the Pentagon's planned single-award cloud acquisition was designed with Amazon Web Services in mind.

  • Census
    shutterstock image

    2020 Census to include citizenship question

    The Department of Commerce is breaking with recent practice and restoring a question about respondent citizenship last used in 1950, despite being urged not to by former Census directors and outside experts.

Stay Connected

FCW Update

Sign up for our newsletter.

I agree to this site's Privacy Policy.