12:52 PM

Tougher Computer Crime Penalties Sought By U.S. Legislators

Draft version of Computer Fraud and Abuse Act includes amendments largely recycled from 2011 DOJ proposals -- and running counter to leading legal experts' demands to narrow anti-hacking laws, critics say.

Legal experts and privacy activists are crying foul after the House Judiciary Committee began circulating a draft bill that would amend the Computer Fraud and Abuse Act (CFAA) to impose tougher penalties for many types of computer crimes.

The 22-page draft "cyber-security" legislation is currently being circulated among committee members. A House Judiciary Committee aide told The Hill that the draft is still in its early stages, and feedback is still being gathered from multiple stakeholders.

But multiple legal and privacy experts have already criticized the proposed changes, with George Washington University professor Orin Kerr, a former Department of Justice computer crime prosecutor, saying that the bill's revised language appears to have been recycled from legislation proposed by Sen. Patrick Leahy (D-Vt.) in 2011, which he developed with the Department of Justice.

"This is a step backward, not a step forward," said Kerr in a blog post analyzing the draft bill. "This is a proposal to give DOJ what it wants, not to amend the CFAA in a way that would narrow it."

[ What changes should be made to current privacy and cyber abuse legislation? Read Hacking, Privacy Laws: Time To Reboot. ]

Indeed, the proposed changes would impose tougher penalties for many types of computer crimes, including making some computer crimes a form of racketeering. In addition, CFAA could be used to punish "whoever conspires to commit ... as provided for the completed offense," meaning that someone who discussed committing a computer crime could be charged with having committed the crime, reported Techdirt.

Numerous legal experts have been calling on Congress to amend the CFAA, following the death of Internet activist Aaron Swartz. He committed suicide while facing up to $1 million in fines and 35 years in prison after he used the Massachusetts Institute of Technology's network to download millions of articles from the JSTOR academic database as part of his quest to promote open access to research that had been funded by the federal government.

Ultimately, Swartz issued an apology and returned the files, and JSTOR requested that the civil matter be closed. But using the CFAA, federal prosecutors continued to press charges against Swartz. Seeing a pattern of behavior, meanwhile, critics have slammed the CFAA for being overly broad and enabling Justice Department prosecutors to treat minor crimes as major felonies.

The House Judiciary Committee's so-called cyber-security bill contains a hodgepodge of other recommendations, including in some cases classifying violations of a company's terms of service as being a felony charge. It would give the government greater leeway in pursuing criminal forfeiture, and assess penalties for anyone who intentionally damages "critical infrastructure" computers -- of which the vast majority are owned, secured and controlled by private businesses.

It would also create a federal data breach notification law that would supersede the patchwork of regulations now in effect in virtually every state. The law would require any "covered entity" that suffered a "major security breach" -- involving "means of identification" pertaining to 10,000 or more people -- to notify the FBI or Secret Service within 72 hours and inform affected customers within 14 days, or else risk a fine of up to $500,000, which could be raised to $1 million for intentional violations.

The draft legislation does propose setting a new threshold for the charge of "exceeding authorized access," saying that it would be a crime only if the value of information compromised exceeded $5,000.

But how much thought has been put into these amendments? Interestingly, the text of the bill says that "the Attorney General is authorized to establish the National Cyber Investigative Joint Task Force, which shall be charged with coordinating, integrating, and sharing information related to all domestic cyber threat investigations."

In fact, the FBI-led National Cyber Investigative Joint Task Force -- created in 2008 when President Obama established the Comprehensive National Cybersecurity Initiative -- is already coordinating intelligence and investigations into national cybersecurity intrusions across 18 intelligence and law enforcement agencies.

A House Judiciary Committee spokeswoman wasn't immediately able to discuss the apparent discrepancy by phone. But the draft bill's outdated language suggests that more than one facet of the cyber-security bill, including the proposed CFAA amendments, remain -- at best -- half-baked.

Attend Interop Las Vegas May 6-10 and learn the emerging trends in information risk management and security. Use Priority Code MPIWK by March 22 to save an additional $200 off the early bird discount on All Access and Conference Passes. Join us in Las Vegas for access to 125+ workshops and conference classes, 300+ exhibiting companies, and the latest technology. Register today!

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
J. Nicholas Hoover
J. Nicholas Hoover,
User Rank: Apprentice
4/3/2013 | 7:03:43 PM
re: Tougher Computer Crime Penalties Sought By U.S. Legislators
While the prospect of harsher punishments may help deter certain hackers, the real focus for legislators should first be on reforming the scope of many of these cybersecurity laws. Reform laws like the CFAA so that they are clearer and more reasonable before placing an even more onerous burden on individuals who have violated those laws.
User Rank: Apprentice
4/2/2013 | 5:24:04 PM
re: Tougher Computer Crime Penalties Sought By U.S. Legislators
Hackers value being unseen, and unheard. As a result uncaught.

If you catch them give them what they want.

Make them disappear and never heard from again. Being unseen, and unheard ultimately they would be at their zenith of value, and be in a place where we can really use them.
Drew Conry-Murray
Drew Conry-Murray,
User Rank: Ninja
3/27/2013 | 9:04:17 PM
re: Tougher Computer Crime Penalties Sought By U.S. Legislators
I do think prosecutors have gone overboard regarding some recent cases, including that of Aaron Swartz. And turning the violation of Terms of Service into a felony? That sounds like overkill. This certainly bears watching.

Drew Conry-Murray
Editor, Network Computing
Register for Dark Reading Newsletters
White Papers
Current Issue
Security Operations and IT Operations: Finding the Path to Collaboration
A wide gulf has emerged between SOC and NOC teams that's keeping both of them from assuring the confidentiality, integrity, and availability of IT systems. Here's how experts think it should be bridged.
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.