12:52 PM

Tougher Computer Crime Penalties Sought By U.S. Legislators

Draft version of Computer Fraud and Abuse Act includes amendments largely recycled from 2011 DOJ proposals -- and running counter to leading legal experts' demands to narrow anti-hacking laws, critics say.

Legal experts and privacy activists are crying foul after the House Judiciary Committee began circulating a draft bill that would amend the Computer Fraud and Abuse Act (CFAA) to impose tougher penalties for many types of computer crimes.

The 22-page draft "cyber-security" legislation is currently being circulated among committee members. A House Judiciary Committee aide told The Hill that the draft is still in its early stages, and feedback is still being gathered from multiple stakeholders.

But multiple legal and privacy experts have already criticized the proposed changes, with George Washington University professor Orin Kerr, a former Department of Justice computer crime prosecutor, saying that the bill's revised language appears to have been recycled from legislation proposed by Sen. Patrick Leahy (D-Vt.) in 2011, which he developed with the Department of Justice.

"This is a step backward, not a step forward," said Kerr in a blog post analyzing the draft bill. "This is a proposal to give DOJ what it wants, not to amend the CFAA in a way that would narrow it."

[ What changes should be made to current privacy and cyber abuse legislation? Read Hacking, Privacy Laws: Time To Reboot. ]

Indeed, the proposed changes would impose tougher penalties for many types of computer crimes, including making some computer crimes a form of racketeering. In addition, CFAA could be used to punish "whoever conspires to commit ... as provided for the completed offense," meaning that someone who discussed committing a computer crime could be charged with having committed the crime, reported Techdirt.

Numerous legal experts have been calling on Congress to amend the CFAA, following the death of Internet activist Aaron Swartz. He committed suicide while facing up to $1 million in fines and 35 years in prison after he used the Massachusetts Institute of Technology's network to download millions of articles from the JSTOR academic database as part of his quest to promote open access to research that had been funded by the federal government.

Ultimately, Swartz issued an apology and returned the files, and JSTOR requested that the civil matter be closed. But using the CFAA, federal prosecutors continued to press charges against Swartz. Seeing a pattern of behavior, meanwhile, critics have slammed the CFAA for being overly broad and enabling Justice Department prosecutors to treat minor crimes as major felonies.

The House Judiciary Committee's so-called cyber-security bill contains a hodgepodge of other recommendations, including in some cases classifying violations of a company's terms of service as being a felony charge. It would give the government greater leeway in pursuing criminal forfeiture, and assess penalties for anyone who intentionally damages "critical infrastructure" computers -- of which the vast majority are owned, secured and controlled by private businesses.

It would also create a federal data breach notification law that would supersede the patchwork of regulations now in effect in virtually every state. The law would require any "covered entity" that suffered a "major security breach" -- involving "means of identification" pertaining to 10,000 or more people -- to notify the FBI or Secret Service within 72 hours and inform affected customers within 14 days, or else risk a fine of up to $500,000, which could be raised to $1 million for intentional violations.

The draft legislation does propose setting a new threshold for the charge of "exceeding authorized access," saying that it would be a crime only if the value of information compromised exceeded $5,000.

But how much thought has been put into these amendments? Interestingly, the text of the bill says that "the Attorney General is authorized to establish the National Cyber Investigative Joint Task Force, which shall be charged with coordinating, integrating, and sharing information related to all domestic cyber threat investigations."

In fact, the FBI-led National Cyber Investigative Joint Task Force -- created in 2008 when President Obama established the Comprehensive National Cybersecurity Initiative -- is already coordinating intelligence and investigations into national cybersecurity intrusions across 18 intelligence and law enforcement agencies.

A House Judiciary Committee spokeswoman wasn't immediately able to discuss the apparent discrepancy by phone. But the draft bill's outdated language suggests that more than one facet of the cyber-security bill, including the proposed CFAA amendments, remain -- at best -- half-baked.

Attend Interop Las Vegas May 6-10 and learn the emerging trends in information risk management and security. Use Priority Code MPIWK by March 22 to save an additional $200 off the early bird discount on All Access and Conference Passes. Join us in Las Vegas for access to 125+ workshops and conference classes, 300+ exhibiting companies, and the latest technology. Register today!

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
J. Nicholas Hoover
J. Nicholas Hoover,
User Rank: Apprentice
4/3/2013 | 7:03:43 PM
re: Tougher Computer Crime Penalties Sought By U.S. Legislators
While the prospect of harsher punishments may help deter certain hackers, the real focus for legislators should first be on reforming the scope of many of these cybersecurity laws. Reform laws like the CFAA so that they are clearer and more reasonable before placing an even more onerous burden on individuals who have violated those laws.
User Rank: Apprentice
4/2/2013 | 5:24:04 PM
re: Tougher Computer Crime Penalties Sought By U.S. Legislators
Hackers value being unseen, and unheard. As a result uncaught.

If you catch them give them what they want.

Make them disappear and never heard from again. Being unseen, and unheard ultimately they would be at their zenith of value, and be in a place where we can really use them.
Drew Conry-Murray
Drew Conry-Murray,
User Rank: Ninja
3/27/2013 | 9:04:17 PM
re: Tougher Computer Crime Penalties Sought By U.S. Legislators
I do think prosecutors have gone overboard regarding some recent cases, including that of Aaron Swartz. And turning the violation of Terms of Service into a felony? That sounds like overkill. This certainly bears watching.

Drew Conry-Murray
Editor, Network Computing
8 Ways Hackers Monetize Stolen Data
Steve Zurier, Freelance Writer,  4/17/2018
Securing Social Media: National Safety, Privacy Concerns
Kelly Sheridan, Staff Editor, Dark Reading,  4/19/2018
Firms More Likely to Tempt Security Pros With Big Salaries than Invest in Training
Sara Peters, Senior Editor at Dark Reading,  4/19/2018
Register for Dark Reading Newsletters
White Papers
Current Issue
How to Cope with the IT Security Skills Shortage
Most enterprises don't have all the in-house skills they need to meet the rising threat from online attackers. Here are some tips on ways to beat the shortage.
Flash Poll
[Strategic Security Report] Navigating the Threat Intelligence Maze
[Strategic Security Report] Navigating the Threat Intelligence Maze
Most enterprises are using threat intel services, but many are still figuring out how to use the data they're collecting. In this Dark Reading survey we give you a look at what they're doing today - and where they hope to go.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.