Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Perimeter

House Has New Crime Bill

Broader, tougher computer crime legislation is proposed by members of the US House of Representatives

Congress is proposing to get tougher on computer crime -- again.

The U.S. House of Representatives Subcommittee on Crime, Terrorism, and Homeland Security Thursday heard testimony on a newly introduced bill that promises to expand current laws to account for new types of exploits and vulnerabilities. However, with two other bills already floating around the Capitol, it will probably be some time before any definitive legislation is passed into law.

The new bill, dubbed the "Cyber-Security Enhancement and Consumer Data Protection Act of 2006" (H.R. 5318), was proposed by House Judiciary Chairman James Sensenbrenner (R-Wis.) and committee members Rep. Tom Feeney (R-Fla.) and Adam Schiff (D-Calif.).

The full text of the bill isn't yet available online, but in a hearing held yesterday, members of the House Judiciary Committee outlined some of the highlights. According to Rep. Howard Coble (R-N.C.), chairman of the subcommittee, the new legislation will tighten up current laws and stiffen the maximum penalty for computer crimes to 30 years.

In addition, the proposed legislation expands the definition of the phrase "protected computer" to include a wider variety of devices and data, and it offers specific language to outlaw the creation and use of botnets, Coble said. It also extends the RICOH Act to allow law enforcement agencies to investigate organized syndicates of attackers who work together to steal and sell personal or business-sensitive data.

Industry groups and law enforcement agencies were generally supportive of the bill, but several experts said they would like the language to go further than it does. Susanna Montezemolo, policy analyst for the Consumers Union, noted that the bill does not require corporations to tell users when a suspected violation of their data occurs, therefore nullifying some state laws that do.

Laura Parsky, deputy assistant attorney general for the Department of Justice's Criminal Division, said federal law enforcement agencies would like to see fewer limitations on the crimes that federal agencies can investigate. Currently, a computer crime must total $5,000 or more before the feds can be called in.

And several observers expressed skepticism that any bill can be passed until different House and Senate subcommittees can get together and come up with a common proposal. Currently, the House Subcommittee on Commerce, Trade, and Consumer Protection -- a part of the House Energy and Commerce Committee -- is considering H.R. 3997 and H.R. 4127, which propose new regulations on the security of financial information and personal data.

— Tim Wilson, Site Editor, Dark Reading

Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 4/7/2020
The Coronavirus & Cybersecurity: 3 Areas of Exploitation
Robert R. Ackerman Jr., Founder & Managing Director, Allegis Capital,  4/7/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
State of Cybersecurity Incident Response
State of Cybersecurity Incident Response
Data breaches and regulations have forced organizations to pay closer attention to the security incident response function. However, security leaders may be overestimating their ability to detect and respond to security incidents. Read this report to find out more.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-20637
PUBLISHED: 2020-04-08
An issue was discovered in Varnish Cache before 6.0.5 LTS, 6.1.x and 6.2.x before 6.2.2, and 6.3.x before 6.3.1. It does not clear a pointer between the handling of one client request and the next request within the same connection. This sometimes causes information to be disclosed from the connecti...
CVE-2020-11650
PUBLISHED: 2020-04-08
An issue was discovered in iXsystems FreeNAS 11.2 and 11.3 before 11.3-U1. It allows a denial of service.
CVE-2020-11653
PUBLISHED: 2020-04-08
An issue was discovered in Varnish Cache before 6.0.6 LTS, 6.1.x and 6.2.x before 6.2.3, and 6.3.x before 6.3.2. It occurs when communication with a TLS termination proxy uses PROXY version 2. There can be an assertion failure and daemon restart, which causes a performance loss.
CVE-2020-2732
PUBLISHED: 2020-04-08
A flaw was discovered in the way that the KVM hypervisor handled instruction emulation for an L2 guest when nested virtualisation is enabled. Under some circumstances, an L2 guest may trick the L0 guest into accessing sensitive L1 resources that should be inaccessible to the L2 guest.
CVE-2020-1627
PUBLISHED: 2020-04-08
A vulnerability in Juniper Networks Junos OS on vMX and MX150 devices may allow an attacker to cause a Denial of Service (DoS) by sending specific packets requiring special processing in microcode that the flow cache can't handle, causing the riot forwarding daemon to crash. By continuously sending ...