Legal and Ethical Issues Facing Computer & Network Security Researchers



Similar documents
Conducting Cybersecurity Research Legally and Ethically

Information Security Law: Control of Digital Assets.

Retaliatory Hacking: Risky Business or Legitimate Corporate Security?

Acceptable Use Policy of UNWIRED Ltd.

TERMS OF SERVICE. This Agreement shall be construed in all respects in accordance with the laws of the province of Ontario and Canada.

FKCC AUP/LOCAL AUTHORITY

Cablelynx Acceptable Use Policy

Legal and Ethical Aspects. IT 4823 Information Security Administration. Cybercrime / Computer Crime. Law Enforcement Challenges.

BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY

The Law of Web Application Hacking. CanSecWest March 9, 2011 Marcia Hofmann, EFF

DEPARTMENT OF JUSTICE WHITE PAPER. Sharing Cyberthreat Information Under 18 USC 2702(a)(3)

Acceptable Use Policy

Service Protection Under The Provider's Acceptable Use Policy

Sharing Cybersecurity Threat Info With the Government -- Should You Be Afraid To Do So?

Clients Legal Needs in HIPAA Security Compliance

Shady RATs, Topiaries, and Other Curious Creatures: A Lawyer's Look at InfoSec 2011

OPEN ACCESS, PRIVACY AND HACKER CULTURE

CYBERSECURITY INFORMATION SHARING BILLS FALL SHORT ON PRIVACY PROTECTIONS

Commercial in confidence TELSTRA WHOLESALE ACCEPTABLE USE POLICY. Commercial-in-Confidence. Issue Number 1.5, 20 November 2012

4/21/2015. Jim Reavis CEO, Cloud Security Alliance. Cloud Security Alliance, Agenda

Virgin Media Business Acceptable Use Policy (Internet)

PEER-TO-PEER FILE SHARING POLICY

Acceptable Use Policy

ACCEPTABLE USE POLICY OF BROADVOX, INC; BROADVOX, LLC; (COLLECTIVELY BROADVOX )

PRIVACY POLICY. Mil y Un Consejos Network. Mil y Un Consejos Network ( Company or we or us or our ) respects the privacy of

Addressing Privacy and Security Concerns in Health Data Analytics. Deven McGraw, JD, MPH, LLM Partner Manatt, Phelps & Phillips, LLP

BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY

maintain and enforce on its user clients an acceptable use policy similar in scope and intent to this Acceptable Use Policy.

HTC Communications Acceptable Use Policy High Speed Internet Service Page 1 of 5. HTC Communications

How To Get A Credit Card From Dsostingprotection

Legislative Language

Comparison of Information Sharing, Monitoring and Countermeasures Provisions in the Cybersecurity Bills

Fusion Acceptable Use Policy. Effective Feb 2, 2015

The Armstrong Chamberlin Web Hosting Acceptable Use Policy ("AUP")

Top tips for improved network security

GENOA, a QoL HEALTHCARE COMPANY GENOA ONLINE SYSTEM TERMS OF USE

LETABA WIRELESS INTERNET CC ACCEPTABLE USE POLICY

114 th Congress March, Cybersecurity Legislation and Executive Branch Activity I. ADMINSTRATION S CYBERSECURITY PROPOSALS

1 of 3 3/29/2010 6:55 AM

Introduction to HIPAA Privacy

13. Acceptable Use Policy

STAR TELEPHONE MEMBERSHIP CORPORATION ACCEPTABLE USE POLICY FOR BROADBAND INTERNET SERVICES

CYBER SECURITY A L E G A L P E R S P E C T I V E

Research Topics in the National Cyber Security Research Agenda

HEALTH INSURANCE PORTABILITY & ACCOUNTABILITY ACT OF 1996 HIPAA

Acceptable Use Policy. This Acceptable Use Policy sets out the prohibited actions by a Registrant or User of every registered.bayern Domain Name.

CYBERSECURITY: THREATS, SOLUTIONS AND PROTECTION. Robert N. Young, Director Carruthers & Roth, P.A. rny@crlaw.com Phone: (336)

Health Information Privacy Refresher Training. March 2013

Acceptable Use Policy Revision date: 26/08/2013

CSIS/DOJ Active Cyber Defense Experts Roundtable March 10, 2015

Acceptable Use Policy

Privacy Statement. Policy Overview. This Notice tells you our policies regarding:

Law & Ethics, Policies & Guidelines, and Security Awareness

By writing to: Cougar Wireless, Attention: Customer Service, 4526 S. Regal St., Suite A, Spokane, WA., 99224

GOSFIELD NORTH COMMUNICATIONS CO-OPERATIVE LIMITED ( GOSFIELD ) ACCEPTABLE USE POLICY

Acceptable Use Policy ("AUP")

TERMS AND CONDITIONS OF SERVICE

TECHNOLOGY S INCREASING ROLE IN ANTI-FRAUD EFFORT ELECTRONIC DISCOVERY IN A CLOUD COMPUTING ENVIRONMENT

Acceptable Use Policy

Acceptable Use Policy

CYBERCRIME AND THE LAW

Signed into law on February 17, 2009, the Stimulus Package known

Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime

Electronic Communications: , Voic , Telephones, Internet and Computers

region16.net Acceptable Use Policy ( AUP )

JPMA - Terms and Conditions

Service Monitoring Discrimination. Prohibited Uses and Activities Spamming Intellectual Property Violations 5

To IRB, or Not to IRB? That Is the Question!

HIPAA Privacy Rule Primer for the College or University Administrator

Acceptable Use Policy & Copyright Notice updated Plant Telephone Company Inc. High Speed Internet Access Service INTRODUCTION

NATIONAL HEALTHCARE SAFETY NETWORK USER RULES OF BEHAVIOR. Version /08/05

Good Clinical Practice 101: An Introduction

Online Business Terms and Conditions - A Brief Glossary

To report an incident of policy abuse please send detailed to:

Acceptable Usage Policy Internet Service Provider / Customer Agreement

Communications Internet Acceptable Use Policy

UNIVERSITY OF ST ANDREWS. POLICY November 2005

Open Internet Policy

Human Subjects Research (HSR) Series

Peace Corps Office of the OCIO Information and Information Technology Governance and Compliance Rules of Behavior for General Users

TERMS OF SERVICE TELEPORT REQUEST RECEIVERS

Peer to Peer File Sharing and Copyright Infringement Policy

Information Sharing, Monitoring, and Countermeasures in the Cybersecurity Act, S. 2105, and the SECURE IT Act, S. 2151

ACCEPTABLE USAGE POLICY

DHS S&T Cyber Security Division (CSD) PREDICT Overview

Alliance for Fertility Preservation Website and Fertility Preservation Services Locator and Referral System Terms and Conditions of Use

Responsible Use of Technology and Information Resources

HIPAA Privacy Summary for Fully-insured Employer Groups

Appendix L: Nebraska s False Medicaid Claims Act Nebraska Statues Chapter 68 November 2013 Section Terms, defined.

Digital Evidence Collection and Use. CS 585 Fall 2009

Acceptable Use Policy for Residential Subscribers

ELECTRONIC SIGNATURE AGREEMENT

Hosting Acceptable Use Policy

HIPAA Privacy Summary for Self-insured Employer Groups

Privacy Impact Assessment

Department of the Navy Human Research Protection Program

S. ll IN THE SENATE OF THE UNITED STATES A BILL

Cass Cable TV, Inc. and Greene County Partners, Inc. CASSCOMM ACCEPTABLE USE POLICY

EECS 588: Computer and Network Security. Introduction January 14, 2014

Transcription:

Legal and Ethical Issues Facing Computer & Network Security Researchers Aaron Burstein UC Berkeley School of Information November 23, 2009

Constraints on Network Research U.S. law is often unclear (and unfriendly). Ethical issues are novel, and the scientific context changes rapidly.

Overview Law Electronic Communications Privacy Act (ECPA) Collecting and sharing network packet traces Running infected hosts Computer Fraud & Abuse Act (CFAA) Copyright / Digital Millennium Copyright Act (DMCA) Ethics Basic principles Human Subjects Research & Institutional review boards (IRBs)

COMMUNICATIONS PRIVACY LAW

Network Research: Privacy Law Issues Common research activities: Collecting network measurement data Packet headers Payload Publishing network traces Collecting mobile device traces E.g., Location data

ECPA at a Glance Content Non-content Real-time Wiretap Act Pen/Trap Stored Stored Communications Act

Electronic Communications Privacy Act (ECPA) Wiretap Act (18 U.S.C. 2510-22) Prohibits real-time interception of communications contents Stored Communications Act (18 U.S.C. 2701-110) Prohibits certain disclosures of content and noncontent/addressing information Pen/Trap statute (18 U.S.C. 3121-27) Prohibits real-time interception of noncontent/addressing information

Disclosure vs. Internal Use Real-time, contents Stored contents Voluntary disclosure OK? No No Internal use OK? No Yes Real-time, noncontent Stored, noncontent No Yes (to non-govt recipient) Yes Yes

No Research Exemptions in ECPA! Some trace collection permitted by: Consent of users or Provider exception (allowing network operators to monitor networks to defend them) Limitations Individual consent hard to get Blanket consent (e.g., as part of a network s terms of service) may provide little information about data collection, use Provider exception requires collaboration with operational IT staff

Other Privacy Issues State laws Two-party rule in state wiretap laws International laws EU member nations generally have stricter privacy laws Interaction with human subjects regulations

How ECPA Affects Cybersecurity Research (1) Activity: Collecting full-packet traces in realtime Relevant law: Wiretap Act Applies to any network (government, enterprise, WiFi, university, etc.) Need consent or sufficient link to operational network protection for provider exception Wiretap Act continues to cover traces after they are recorded If collection violates law, disclosure probably does too.

How ECPA Affects Cybersecurity Research (2) Activity: Collecting packet-header traces in real-time Relevant law: Pen/Trap statute Consent, provider exceptions available Also an exception for network operation, maintenance, and testing Legally stored data become subject to SCA

How ECPA Affects Cybersecurity Research (3) Activity: Sharing or publishing packet traces Relevant law: SCA Applies only to public service providers: commercial ISPs but not businesses Full-packet traces: disclosure prohibited without consent, subpoena Packet header traces: disclosure allowed unless given to governmental entity Much broader than law enforcement; hampers some public releases

COMPUTER FRAUD & ABUSE ACT (CFAA)

CFAA & Network Research Botnet infiltration (and response?) Running malicious code in testbeds Collecting data from online services Running honeynets to interact with attackers

CFAA Elements Protected computer Any computer connected to the Internet Access Not defined in statute Authorization Not defined in statute Obtaining information / causing loss Penalties scale with type, value of information obtained Loss is not defined

Is the CFAA as Broad as It Sounds? Perhaps... United States v. Lori Drew (2009) Access means to obtain information from Authorization may be set by Terms of Service But U.S. Const. limits criminal application of CFAA in TOS breach cases. Insufficient clarity + arbitrary enforcement = unconstitutional vagueness

Testbeds: Legal Issues Concern: What if worms, viruses escape testbed containment? CFAA prohibits (1) knowingly causing transmission of code and (2)intentionally or recklessly causing damage Unclear whether accidents meet this standard of intent

ETHICAL ISSUES

Overview 1. Basic ethical principles / theories 2. Human subjects research and ethical compliance

Ethical Frameworks Consequentialism The moral rightness of an act depends only on its consequences. Deontological theories Morality is prescribed by individual rights, duties.

Research Ethics Belmont Report crafted principles for human subjects research (HSR) Respect for persons Beneficence Justice Common Rule codifies Belmont principles Defines research, human subject, consent, institutional review board (IRB) Applies to any HSR at an organization receiving federal research funding

Navigating Human Subjects Review

Ethical Trouble Spots for Network Research Is it HSR? Waiver of Informed Consent May be waived if impracticable to obtain Deception Minimal risk No adverse effect on subjects rights, welfare Non-deceptive research design impracticable

IRB Review: Easing the Pain Exemptions Studies of existing, publicly available data Studies of data recorded so that subjects cannot be identified, directly or through IDs Note: IRB decides whether research is exempt. Expedited review Research involves no more than minimal risk Allows quick(er) protocol approval

Ethics Beyond HSR Issues Harm to the researcher s organization (e.g., university) Harm to other users Accelerating the arms race Confusing researchers roles When to report malicious activity to... Victims? Law enforcement?

Law & Ethics in Research Frontiers Studies of security-related behavior Downloading malware Checking binary signatures Ignoring A/V warnings Conditioning users to ignore security Infiltrating cybercrime organizations DMCA take down studies Active probes

Security Analysis of Software

Software Analysis: Legal Issues Issues Finding software vulnerabilities Publishing results Relevant laws: Contract law (EULAs, clickwrap/shrinkwrap licenses) Digital Millennium Copyright Act (DMCA)

Software Analysis: Contract Issues EULAs typically prohibit reverse engineering, other processes that reveal vulnerabilities Courts usually enforce them...... but important issues remain unsettled: Pre-emption by patent law Tension with First Amendment

Software Analysis: DMCA Issues No person shall circumvent a technological measure that effectively controls access to a work protected by the Copyright Act But: courts, U.S. DOJ have found that the DMCA does not prohibit conducting research on or publishing papers about software vulnerabilities. Caveats: Publishing actual circumvention software might violate DMCA. Restrictions in EULAs still apply.

Ethical Issues in Software Analysis Whether (and when) to notify software vendor How much detail to publish

Resources Legal Information Institute (http://www.law.cornell.edu/) Open access to US Constitution, US Code Common Rule Go to http://ecfr.gpoaccess.gov/, select title 45, part 46. Samuelson Clinic at UC Berkeley School of Law (http://www.samulesonclinic.org/) Reforming the ECPA to Enable a Culture of Cybersecurity Research (http://jolt.law.harvard.edu/) In-depth analysis of applicable privacy laws and proposal for a research exception to the ECPA