Pressure (not) to Publish

advertisement
Running head: Pressure (not) to Publish
Pressure (not) to Publish:
Discussing the Publication of Cyber Security Research
Karen Farthing
CSC540, Spring 2013
Murray State University
Abstract
Cyber security researchers are increasingly facing a daunting dilemma: to publish or not to
publish? The ethical argument can be approached from two different perspectives. The first
school of thought posits that any exploits discovered should be published, so that systems
administrators are aware of the ever evolving threat. The second school of thought is espoused
largely by business and government, and posits that new exploits should not be published,
because it leaves systems vulnerable to attack. It’s a David and Goliath struggle, leaving
researchers in the unenviable position of having to choose the hard right over the easy wrong.
Legislation has been unable to keep pace with a rapidly changing technological landscape,
leaving the line between legal and criminal behavior open to debate. So where does that leave the
researcher? No man’s land.
Pressure (not) to Publish: Discussing the Publication of Cyber Security Research
Introduction
Cyber security researchers face an increasingly difficult battle when attempting to publish
or present their work. Publishing security vulnerabilities is risky. Researchers must take care not
to publish too much; for example, if a researcher publishes too much functional code, the
vulnerability discussed could be exploited before patches can be applied. There are also no
whistleblower protections in place for researchers. They face legal threats from businesses and
governments, and fall victim to smear campaigns when companies don’t have a legal leg to stand
on (Attrition.org, 2013). In the following pages, this paper will discuss legal and other barriers to
publication; case histories that describe white hats, grey hats, black hats, and innovators;
identification of factors that contribute to the issue; and identification of steps that might
alleviate the problem.
Barriers to Publication
There are many legal vehicles that contribute to the limitations placed upon researchers
who want to publish vulnerability reporting. Likewise, businesses and governments sometimes
resort to less than legal means aimed at discouraging researchers from publishing information
about security vulnerabilities.
Legal Barriers
Copyright Law is intended to protect a creator from unauthorized reproduction of his work.
This applies to software, as well as music, video, and a number of other works. Security
researchers must often make copies of software in order to find bugs or exploits, and this can
violate copyright law (Electronic Frontier Foundation, 2013).
Trade Secret Law is intended to protect the proprietary works of businesses engaged in
maintaining an edge over their competition. According to the Coder’s Rights Project FAQ from
the Electronic Frontier Foundation, “…misappropriation of trade secrets can be both a civil and
criminal offense. Generally, a trade secret is information that (1) derives independent economic
value, actual or potential, from not being generally known to the public or to other persons who
can obtain economic value from its disclosure or use; and (2) is the subject of efforts that are
reasonable under the circumstances to maintain its secrecy. Misappropriation means a wrongful
acquisition, use, or disclosure of a trade secret (Electronic Frontier Foundation, 2013).” Reverse
engineering of software or hardware can fall under the auspices of violation of trade secret law.
Companies often try to claim that security vulnerabilities fall under trade secret law, because if
knowledge about a vulnerability were to be made public, it could cause a deleterious effect upon
their competitive advantage or adversely affect the value of their holdings.
Patent Law ostensibly grants the creator of a work or invention sole use of the
aforementioned for a limited period of time. It is intended to prevent the infringement of other
parties upon their intellectual property, during the period of time that said property has the most
earning potential. Researchers can run afoul of patent law if they create a hardware hack that
behaves or operates too similarly to another product currently under patent – regardless of how
the researcher created the hack.
The Digital Millennium Copyright Act (DMCA) is the juggernaut that all security
researchers must face. Any security researcher venturing into the arenas of Digital Rights
Management (DRM) or technological protection measures must tread very, very carefully. Even
when caution is exercised, researchers will most likely violate the DMCA at some point. The
terms of the DMCA are broad and open to interpretation at every turn. Congress did, however,
provide three limited circumstances under which security researchers can conduct reverse
engineering, encryption research, and security research. Distribution of code or tools that
circumvent the provisions of the DMCA can only occur in limited circumstances and must be
under the supervision of and with permission from the entity that stands to be injured as a result
of said research. The DMCA has had an impact on the worldwide cryptography research
community, since an argument can be made that any cryptanalytic research violates, or might
violate, the DMCA. Additionally, critics argue that the DMCA stifles free expression (see case
histories of Felten and Sklyarov), jeopardizes fair use for owners of various media, impedes
competition, and interferes with computer intrusion laws. However, since this paper is not
intended as a discussion of the DMCA, please refer to section 1201 of the Act.
Contract Law surrounds the concept of a legally enforceable “promise” between two
parties. Non-disclosure Agreements (NDAs) fall into this category, as do EULAs and Terms of
Service/Terms of Use. Contract law most benefits the company that employs a researcher, rather
than the researcher himself. Since this area of the law is “murky”, researchers who publish their
work against the wishes of their employers stand a very good chance of at least getting fired, if
not sued, for breach of contract.
Criminal Law is designed to punish law breakers (of course). Researchers can be charged
under various criminal codes if it can be proved that they published their work with the intent to
help others commit a crime (aiding and abetting), or if the research is so detailed that it would be
simple for others to commit crimes (facilitation).
International Law varies from country to country (of course), and is much too broad to
cover in a limited but meaningful way. Researches should be mindful of a host country’s laws
when working overseas, and should be mindful of any laws they might break via use of
telecommunications technologies that might span across borders.
Other Methods
“Media smear” campaigns have been instigated against researchers when there was no
clear legal method for stopping the publication of their work. A particularly vicious instance
involved researchers David Maynor and Jon Ellch, who cracked a MacBook at Black Hat in
2006 using third party drivers and third party wireless hardware. Apple PR director Lynn Fox
orchestrated a smear campaign accusing Maynor and Ellch of fabricating aspects of the hack, all
in an attempt to make it appear that Apple was a victim of unscrupulous hackers (Ou, How
Apple orchestrated web attack on researchers, 2007).
Overt and covert threats have been used to intimidate researchers into either cancelling or
delaying, or removing publication. One popular method is for a company to issue a DMCA takedown notice to a researcher, only to have them rescind the notice later. In one instance, banking
equipment manufacturer Thales sent a DMCA takedown notice to John Young, who runs the
well-known Cryptome site, demanding that he remove a manual for one of their HSM products
(Moody, 2013). HSM stands for “hardware security module”, and in the banking industry HSMs
are instrumental in managing cryptographic keys and PINs used to authenticate bank card
transactions. The manual in question had been used for years by security researchers who were
investigating vulnerabilities cryptographic weaknesses, and those vulnerabilities were causing
Thales some notable embarrassment. Another instance involves Patrick Webster, a security
consultant in Australia, who quietly warned First State Superannuation Fund about a web
vulnerability that would allow a hacker to access users’ accounts (Pauli, 2011). The Fund
thanked him for the tip, fixed the flaw within 24 hours, then sent the police to his house the next
day to “investigate”. The Fund demanded that Webster turn over his personal laptop to their inhouse IT staff, and also informed him that he could be held liable for any expenses related to
fixing the flaw that he reported. So, this researcher saved the company potentially millions of
dollars by alerting them to the flaw, alerted them privately that the flaw existed so that they could
avoid any embarrassment, and they threatened him with legal action and a repair bill.
Firings due to pressure from others is another tactic used by businesses to curtail or
punish unflattering publication. Dan Geer, former CTO of @stake Inc., was let go just a day after
the publication of a paper he co-authored that was sharply critical of Microsoft Corp.— one of
@stake’s customers. The paper covered the effects that Microsoft’s monopolistic position have
on the security of the Internet, and argued that the dominance of Windows in the marketplace has
created a monoculture in which all systems are more vulnerable to widespread attacks and
viruses (Fisher, 2003). Both @stake and Microsoft claimed that Greer was let go for other
reasons, but Greer professed serious doubts.
Case Histories
Security researchers typically fall into one of four categories: white hats, grey hats, black
hats, and innovators. They all hack or crack systems, but have varying motivations. While many
researchers ascribe to being white hats, the truth is that most of them are actually grey. The
following section details the attributes of each, and provides a few “case histories” for members
of each category.
White hats profess to work to secure systems without breaking into them. “Hackers
for good”, they work with software companies/governments to resolve vulnerabilities and won't
announce vulnerabilities until a company is ready or found to be responsible. They will show the
system owner - but no one else - how to exploit a vulnerability, and will only attack systems
when authorized (Hafele, 2004).
Grey hats have a tendency to either skirt the law or run afoul of the law in the course of
their research. They might break into systems to heighten awareness of security flaws, and have
a tendency to announce vulnerabilities publicly without informing the company (or on the same
day that the company is notified). They may release exploit code or tools that aren’t easily
modified for hacking security, and will explore holes before notifying the owner of
vulnerabilities (Hafele, 2004).
Black hats are the bad guys. A black hat cares more about controlling and accessing
systems than about security. He will keep all of his exploits to himself, and will trade with others
on closed lists. He won't publish, and hacks for his own gain or for malicious reasons (Hafele,
2004).
White Hats
Ed Felten is currently the Director of Princeton's Center for Information Technology Policy.
Felten was a witness for the government in US v. Microsoft, where Microsoft was accused of a
variety of anti-trust violations surrounding the exclusive use of Internet Explorer with the
Windows operating system. Microsoft asserted that IE could not be removed from the
distribution without causing damage to the OS. Felten and a team of his students were able to
prove otherwise, severely damaging Microsoft’s case.
He is probably best known for his involvement with the Secure Digital Music Initiative
(SDMI), wherein the Recording Industry Association of America and Verance Corporation sued
him and his team for winning a competition they sponsored. The competition asked participants
to attempt to break the watermarking schema in use for protecting copyrighted music from
unauthorized use. In just three weeks, Felten’s team was able to remove any watermarks,
rendering the SDMI schema useless. When he attempted to publish his work, the RIAA and
Veyance threatened to sue him under the auspices of the DMCA for violation of section 1201 of
the same. The suit failed, and Felten presented his work at Usenix in 2001.
Felten was instrumental in uncovering security and accuracy problems in Diebold and
Sequoia voting machines. He and his students also discovered the cold boot attack, which allows
someone with physical access to a machine to extract the contents in memory after bypassing
any security methodologies (Wikipedia, 2013).
Michael Lynn was instrumental in highlighting security flaws in Cisco’s IOS. Dubbed
“Ciscogate”, the flaw centered around IPv6 packets, and whether or not a Cisco device could be
exploited remotely. Cisco fixed the flaw in early 2005, and Lynn was scheduled to present a
paper at Black Hat the same year detailing the results of his research. Lynn was careful to
remove as much detail as possible, but Cisco objected – strenuously. Representatives from the
company arrived at the conference a few hours before he was scheduled to present, confiscated
his paper and notes, and pressured Black Hat into cancelling his presentation. Lynn’s employer,
ISS, also gave him a “cease and desist” order regarding the presentation, and told him he would
be fired if he presented his work. Lynn resigned from his position at ISS an hour prior to
presenting, and asked attendees for a job just before giving his speech. He was hired by Juniper
Networks a few months later, and is still employed there (Masnick, 2005).
HD Moore is an innovator and white hat who developed Metasploit, one of the most widely
used penetration and vulnerabilities testers in use (Stop The Hacker, 2012). He also developed
the Metasploit Decloaking Tool, which purports to be able to identify a user’s IP address
regardless of the use of proxies or VPNs. Current research projects include the Month of
Browser Bugs, which aims to combine fast-paced discovery with full disclosure.
Grey Hats
Robert Morris was the first person convicted under the Computer Fraud and Abuse Act for
spawning the Morris Worm – considered by many to be the first internet worm. Designed as a
means for measuring networks, Morris developed the worm while he was a graduate student at
Cornell. The story of how the worm “escaped” changes from time to time, but most accounts
agree that Morris developed the worm as a means to test and map the limits of the local area
network in a laboratory environment. However, containment of the worm failed, and in an effort
to disguise where the worm originated, Morris managed to divert it to MIT – where it spread
worldwide. Morris is currently a tenured professor of Computer Science at – you guessed it –
MIT (Anthony, 2011).
Dmitry Sklyarov is a Russian programmer who gained notoriety for cracking Adobe’s
ebook DRM scheme while employed at Russian software company ElcomSoft. In 2001, after
giving a presentation at DEF CON titled “eBook's Security - Theory and Practice”, Sklyarov was
arrested by the FBI and jailed for violating the DMCA after complaints from Adobe. However,
the DMCA does not apply in Russia, and the courts decided that a Russian citizen working for a
Russian company could not be held accountable under the DMCA. Both Sklyarov and
ElcomSoft were found not guilty at trial (Wikipedia, 2013).
Jon Lech Johansen (DVD Jon) is a Norwegian programmer with a thing for DRM – he
hates it. Since 2001, Johansen has developed 16 different methodologies for defeating DRM on a
multitude of platforms. Ironically, the Sony Rootkit actually used code stolen from Johansen, and
some have argued that he might have a case to sue Sony under the DMCA. His most notorious
exploit was the release of DeCSS, a method for defeating the Content Scrambling System in use
on DVDs (Anthony, 2011).
Black Hats
Kevin Mitnick’s first exploit occurred at the age of 12, when he figured out how to ride the
transit system in LA for free by bypassing the punch card system in use. He became a social
engineer, garnering usernames, passwords, and modem phone numbers. He hacked DEC at age
16 and was tried and convicted to 12 months in jail with three years’ supervised release. Near the
end of his three year probation, he hacked PacBell’s voice mail system, then went on the run for
over 2 years. By the time the FBI finally caught him, he had hacked numerous networks, cloned
cell phones, and stolen proprietary software from cell companies (Anthony, 2011).
Kevin Poulsen is currently the editor of Wired Magazine, but he began his career as a phone
phreak. His most notorious exploit was hacking the phone lines of a local radio station in order to
ensure that he was the 102d caller – to win a Porsche. The FBI began pursuing him for myriad
crimes, and he turned fugitive. When a special was aired on America’s Most Wanted profiling
Poulsen, you guessed it, the phone system at AMW crashed. After his release from prison, he
managed to reinvent himself as a white hat and investigative journalist. Poulsen used exploits on
MySpace to identify over 700 sex offenders engaged in soliciting sex from children, and was the
man who broke the Bradley Manning-WikiLeaks story (Anthony, 2011).
Gary McKinnon is accused of hacking into 97 United States military and NASA computers
over a 13-month period between February 2001 and March 2002. The US authorities claim he
deleted critical files from operating systems, which shut down the United States Army’s Military
District of Washington network of 2,000 computers for 24 hours. McKinnon also posted a notice
on the military's website: "Your security is crap". After the September 11 attacks in 2001, he
deleted weapons logs at the Earle Naval Weapons Station, rendering its network of 300
computers inoperable and paralyzing munitions supply deliveries for the US Navy's Atlantic
Fleet. McKinnon is also accused of copying data, account files and passwords onto his own
computer. US authorities claim the cost of tracking and correcting the problems he caused was
over $700,000 (Wikipedia, 2013).
Identify the Problem
Ideological disconnect
There is an ideological disconnect between researchers/security professionals, and the
businesses and governments they work for. The researchers’ view: publish known vulnerabilities
so they can be prevented. Business’ and Government’s view: don’t publish, because if the exploit
is unknown, we aren’t vulnerable. You can see where this would lead to problems. Appendix A
lists a veritable cornucopia of instances detailing what happens when these competing ideologies
clash. Some examples include:
Researcher Ahmed Al-Khabaz discovered vulnerabilities in Skytech's Omnivox portals that
exposed 250k student records, and brought it to the attention of Dawson College. Skytech
threatened to press charges and send him to jail if he did not sign an NDA (Attrition.org, 2013).
Consultants Varun Uppal and Gyan Chawdhary discovered high-speed trading system
hacks during the course of business with a client. Due to financial pressure (i.e. loss of said
client), the talk was cancelled and has not been published (Attrition.org, 2013).
Security specialist Patrick Webster found a direct object reference vulnerability in First
State Superannuation’s website. He received a letter indicating FSS reported him to the police,
and threatened him with further legal action. After negative publicity, First State Super
withdraws legal threat (Attrition.org, 2013).
There are no “whistleblower” protections anywhere to protect researchers, consultants, or
security specialists. Not in the DMCA, not in the any of the legal statutes related to cybercrime
and security, and not in business law.
The “Grey Hat” concept is tricky. Most researchers aspire to be white hats, but before you
get the pay and the position, you have to break some rules and build a reputation. That means
either black hat or grey hat activity. Unfortunately, government and business have a tendency to
lump black and grey together, and they only tolerate white hats as “guns for hire” because they
have to.
Businesses defining legislation via lobby to uninformed legislators (He who has the most money,
wins)
Almost everyone agrees that the DMCA is a bad piece of legislation. It’s only real purpose
is to prop up a failing business model adhered to by producers of “art”. I’m not attacking the
artist here, but rather entities like the RIAA, the MPAA, and the big publishing houses. These
entities banded together, spent a LOT of money, and got the legislation they wanted through use
of lobbyists and payments to members of Congress.
Researchers “crossing the line” into illegal activity (as currently defined)
There have been cases where researchers have crossed the line into illegal activity – even
become blackmailers and extorters. However, most of that information is anecdotal – found on
forums and blogs.
One notable example is the case of Bret McDanel. While employed at Tornado
Development, McDanel discovered a flaw in the web-mail product provided to customers.
McDanel notified Tornado, and when they took too long to fix the problem, he quit. Six months
later (and employed at another company) he discovered that the exploit had not been fixed. He
took on the name "Secret Squirrel" and e-mailed about 5,600 of Tornado's customers over the
course of three days, telling about the vulnerability, and directed them to his own website for
information about it. This caused Tornado to panic - by deleting customers' emails without
consent so they couldn't read McDanel's message.
McDanel was arrested, tried, convicted and sentenced to sixteen months in prison, because
of the email and website he crafted. However, there was no evidence that McDanel or anyone
else ever exploited the vulnerability. McDanel was prosecuted for "knowingly causing the
transmission of information and as a result of such conduct, intentionally cause any impairment
to the integrity or availability of data, a program, a system, or information without
authorization." This is normally reserved for people who publish viruses and worms, not for
people who publish unpatched exploits to the potential victims. So, even though no "computer
crime" was actually committed, he was convicted for "impairing the integrity" of a system
(Rasch, 2003).
This is an excellent example of the disconnect between researchers and government. While
McDanel could have acted less like an angry teenager and more like a polished professional, he
really didn’t have much of a choice. He could have gone back to the management at Tornado and
expressed concern – but it didn’t work the first time. Had he threatened to expose the
vulnerability if Tornado didn’t fix it, he could have been charged with extortion. Had he broken
in and fixed the exploit himself, he definitely would have been outside the law. So he did what
he thought was best, and because federal prosecutors decided to stretch the limits of the law, he
went to jail. Not fair.
Solve the Problem
Current recommended practices
One of the current practices recommended by the EFF’s Coder’s Rights Project is delayed
publication, also known as “responsible disclosure”. This involves self-policing on the part of
researchers and a good faith effort to notify victims of any exploits prior to publishing any work.
It also requires that researchers do not publish until adequate time has been given for victims to
build a patch or close loopholes.
Another recommended practice involves limited publication. This practice requires that
researchers publish the concept, not fully functional exploit. This would prevent bad actors from
taking advantage of exploits that have not been or cannot be patched. Also included in limited
publication is that researchers only publish to a limited audience – peers, business, and
government entities. By keeping to a smaller “pond”, researchers limit the number of fish that
get to feed.
Both of these practices are a win-win for everyone involved, and show a level of
professionalism and mutual respect for security partners.
Fix bad/broken legislation
Current legislation has not kept pace with the state of the industry. Almost every facet of
current legislation has weaknesses – the DMCA, copyright/patent law, criminal/international
law, even business and civil law. While pointing out weaknesses is easy (and would take all
day), coming up with a solution is not so simple. One good first step would be to limit or
redefine lobby access and the legislative process to include advocates from within the industry,
from researchers, from business concerns, and from our legislative representatives. I’m not sure
how to make that work, either, but change needs to start somewhere.
Proposed Future Practices
Going forward, in addition to the steps outlined in “solve the problem”, a new mindset should
be developed. Some recommendations are to redefine the business model or philosophy to
embrace early and ubiquitous reporting of vulnerabilities and exploits. This has huge
implications for national security as well as business. Without a fundamental change of mindset,
however, this will never happen. This change can be facilitated by adopting an “Open Source”
mindset between all stakeholders (business, government, researchers).
References
Anonymous. (2001, Apr 20). RIAA Challenges SDMI Attack. Retrieved Apr 3, 2013, from Extra - The
Register UK: http://www.theregister.co.uk/extra/sdmi-attack.htm
Anthony, S. (2011, Sep 1). Black hat down: What happened to the world’s most famous hackers?
Retrieved Mar 3, 2013, from Extremetech.com: http://www.extremetech.com/extreme/94647black-hat-down-what-happened-to-the-most-famous-hackers/2
Attrition.org. (2013, 01). Legal Threats Against Security Researchers. Retrieved 03 15, 2013, from
attrition.org: http://attrition.org/errata/legal_threats/
Buchanan, E., Aycock, J., Dexter, S., Dittrick, D., & Hvizdak, E. (2011, Jun). Computer Science Security
Research and Human Subjects: Emerging Considerations for. Journal of Empirical Research on
Human Research Ethics: An International Journal, 6(2), 71 - 83.
Burstein, A. J. (2008, Apr 14). Conducting Cybersecurity Research Legally and Ethically. Retrieved Mar 13,
2013, from usenix.org:
http://static.usenix.org/event/leet08/tech/full_papers/burstein/burstein.pdf
Electronic Frontier Foundation. (2013). A "Grey Hat" Guide. Retrieved Mar 5, 2013, from Pages - EFF.org:
https://www.eff.org/pages/grey-hat-guide
Electronic Frontier Foundation. (2013). Coders’ Rights Project Vulnerability Reporting FAQ. Retrieved Feb
23, 2013, from Issues - Coders - EFF.org: https://www.eff.org/issues/coders/vulnerabilityreporting-faq
Felten, E. (2013, Mar 29). The Chilling Effects of the DMCA. Retrieved Apr 3, 2013, from Articles Technology - slate.com:
http://www.slate.com/articles/technology/future_tense/2013/03/dmca_chilling_effects_how_c
opyright_law_hurts_security_research.html
Fisher, D. (2003, Sep 29). Security Expert Geer Sounds Off on Dismissal . Retrieved Apr 16, 2013, from
Security - eweek.com: http://www.eweek.com/c/a/Security/Security-Expert-Geer-Sounds-Offon-Dismissal/
Goodin, D. (2007, Apr 17). ISP ejects whistle-blowing student. Retrieved Mar 22, 2013, from Security The Register UK: http://www.theregister.co.uk/2007/04/17/hackers_service_terminated/
Hafele, D. M. (2004, Feb 23). Three Different Shades of Ethical Hacking: Black, White and Gray. Retrieved
03 22, 2013, from SANS Institute InfoSec Reading Room:
http://www.sans.org/reading_room/whitepapers/hackers/shades-ethical-hacking-black-whitegray_1390
Hurley, E. (2004, Feb). Cyberspace security liability lawsuits on the rise? Retrieved Mar 10, 2013, from
Information Security Laws, Investigations and Ethics - Information Security Magazine:
http://searchsecurity.techtarget.com/Cyberspace-security-liability-lawsuits-on-the-rise
Kravets, D. (2013, Apr 24). Man Convicted of Hacking Despite Not Hacking. Retrieved Apr 25, 2013, from
Threat Level - Wired Magazine: http://www.wired.com/threatlevel/2013/04/man-convicted-ofhacking-despite-no-hacking/
Lemos, R. (2002, Sep 23). New laws make hacking a black-and-white choice. Retrieved Mar 25, 2013,
from CNET News: http://news.cnet.com/2009-1001_3-958129.html
Lemos, R. (2002, Aug 2). Security pros create resource on flaws. Retrieved Mar 22, 2013, from CNET
News News - Business Tech: http://news.cnet.com/2100-1001-948127.html
Lemos, R. (2003, Nov 13). GameSpy warns security researcher. Retrieved Mar 13, 2013, from CNET News
- Enterprise Security: http://news.cnet.com/2100-7355_3-5107305.html
Lemos, R. (2011, Oct 17). Security suffers when firms sue researchers who report flaws. Retrieved Mar 5,
2013, from Tech Watch - InfoWorld: http://www.infoworld.com/t/web-security/securitysuffers-when-firms-sue-researchers-who-report-flaws-176281
Lohmann, F. V. (2010, Feb). Unintended Consequences: . Retrieved Mar 6, 2013, from EFF.org:
https://www.eff.org/sites/default/files/eff-unintended-consequences-12-years_0.pdf
Loup-Richet, J. (2012, Oct 30). Why Security Research Should Be Protected Speech. Retrieved Mar 5,
2013, from Censorship - Information Systems Research: http://www.information-systemsresearch.com/blog/2012/10/30/why-security-research-should-be-protected-speech/
Masnick, M. (2005, Jul 28). Cisco Coming Down Hard On Whistleblower Who Found Vulnerabilities.
Retrieved Apr 4, 2013, from Legal Issues - TechDirt:
http://www.techdirt.com/articles/20050728/0259209.shtml
McCullagh, D. (2001, Jul 23). Russian Hacker Arrested. Retrieved Mar 15, 2013, from Cryptome.org:
http://cryptome.org/dmitry-bruce.htm
McCullagh, D. (2002, Jul 30). Security warning draws DMCA threat. Retrieved Mar 15, 2013, from CNET
News - Digital Media: http://news.cnet.com/2100-1023-947325.html
Menn, J. (2012, Oct 29). Legal fears muffle warnings on cybersecurity threats. Retrieved Mar 13, 2013,
from Featured Articles - Computer Security: http://articles.chicagotribune.com/2012-1029/business/sns-rt-us-cyberwar-infrastructurebre89s1ah-20121029_1_cyber-attackscybersecurity-stuxnet
Mills, E. (2008, Jul 9). Dutch chipmaker sues to silence security researchers. Retrieved Apr 5, 2013, from
News Blogs - CNET: http://news.cnet.com/8301-10784_3-9985886-7.html
Mills, E. (2011, Aug 01). Journalist faces charges over transit card flaw reports. Retrieved Mar 7, 2013,
from News - CNET: http://news.cnet.com/8301-27080_3-20086613-245/journalist-facescharges-over-transit-card-flaw-reports/?part=rss&subj=news&tag=2547-1_3-020&dlvrit=142337
Moody, G. (2013, Jan 24). Banking Equipment Vendor Tries To Censor Security Research With DMCA
Notice -- Then Backs Down When Called Out For It. Retrieved Mar 19, 2013, from Abusing the
system - TechDirt: http://www.techdirt.com/articles/20130118/10002721726/bankingequipment-vendor-tries-to-censor-security-research-with-dmca-notice-then-backs-down-whencalled-out-it.shtml
Ou, G. (2006, Aug 20). Vicious orchestrated assault on MacBook wireless researchers. Retrieved Mar 22,
2013, from Real World IT - zdnet.com: http://www.zdnet.com/blog/ou/vicious-orchestratedassault-on-macbook-wireless-researchers/300
Ou, G. (2007, Mar 20). How Apple orchestrated web attack on researchers. Retrieved Mar 27, 2013, from
Repost from Real World IT - ZDNet: http://www.zdnet.com/blog/ou/how-apple-orchestratedweb-attack-on-researchers/451
Pauli, D. (2011, Oct 14). Security researcher threatened with vulnerability repair bill. Retrieved Mar 5,
2013, from Risk - SC Magazine: http://www.scmagazine.com.au/News/276780,securityresearcher-threatened-with-vulnerability-repair-bill.aspx
Schneier, B. (2001, Nov 15). Full Disclosure. Retrieved Apr 4, 2013, from Crypto-Gram Newsletter Schneier.com: http://www.schneier.com/crypto-gram-0111.html
Schneier, B. (2002, Jun). Fixing Network Security by Hacking the Business Climate. Retrieved Mar 15,
2013, from UCSC.edu: http://classes.soe.ucsc.edu/cmps122/Spring04/Documents/schneier.pdf
Schneier, B. (2011, May 24). New Siemens SCADA Vulnerabilities Kept Secret. Retrieved Mar 5, 2013,
from Schneier on Security - Schneier.com:
http://www.schneier.com/blog/archives/2011/05/new_siemens_sca.html
Search Security. (2008, Aug 14). MIT case shows folly of suing security researchers. Retrieved 2013 Feb,
2013, from Security Laws, Investigations and Ethics - Searchsecurity.com: 28
Silverman, J. (n.d.). 10 Famous Hackers and Hacks. Retrieved Mar 13, 2013, from Communications Discovery Channel: http://dsc.discovery.com/tv-shows/curiosity/topics/10-famous-hackershacks.htm
Stop The Hacker. (2012, Jul 23). The Five Most Famous Good Guy Hackers. Retrieved Mar 22, 2013, from
stopthehacker.com: http://www.stopthehacker.com/2012/07/03/five-most-famous-good-guyhackers/
Stubblefield, A. B., & Wallach, D. S. (2001, July). Dagster: Censorship-Resistant Publishing Without
Replication. Retrieved Mar 13, 2013, from cs.rice.edu:
http://www.cs.rice.edu/~dwallach/pub/dagster-tr.pdf
University of Exeter. (2012, Nov 12). Attitudes towards security threats uncovered. Retrieved Apr 5,
2013, from News - Phys.org: http://phys.org/news/2012-11-attitudes-threats-uncovered.html
Vijayan, J. (2011, Jan 21). Sony sends 'dangerous' message with PS3 lawsuit, says EFF. Retrieved Mar 5,
2013, from Legal News - Computer World:
http://www.computerworld.com/s/article/9205885/Sony_sends_dangerous_message_with_PS
3_lawsuit_says_EFF
Wikipedia. (2013, Apr 20). Edward Felten. Retrieved Apr 25, 2013, from wikipedia.org:
http://en.wikipedia.org/wiki/Edward_Felten
Wikipedia. (2013). Gary McKinnon. Retrieved Apr 3, 2013, from wikipedia.org:
http://en.wikipedia.org/wiki/Gary_McKinnon
Wikipedia. (2013, Apr 29). United States v. Elcomsoft. Retrieved Apr 30, 2013, from wikipedia.org:
http://en.wikipedia.org/wiki/United_States_v._ElcomSoft_and_Sklyarov
Appendix A
Legal Threats Against Security Researchers: How vendors try to save face by stifling legitimate
research
(Note – this table was taken in its entirety from http://attrition.org/errata/legal_threats/ and is
intended for use as an overview of trending topics.)
When
1/20/2013
Company
making
threat
Dawson
College /
Skytech
10/25/2012
(unknown
international
utility)
10/25/2012
(unknown
international
utility)
5/28/2012
E-Soft (UK)
Researchers
Ahmed AlKhabaz)
Research
Topic
Resolution/Status
Link
Vulnerabilitie
s in Skytech's
Omnivox
portals, used
by schools
Found vulnerability that exposed
250k student records, brought it to
attention of college. Did not try to
conceal his identity, did not misuse
the information, did not try to
profit. Skytech threatened to press
charges and send him to jail if he
did not sign an NDA.
http://www.nationalpost
.com/m/wp/news/canad
a/blog.html?b=news.nati
onalpost.com/2013/01/2
0/youth-expelled-frommontreal-college-afterfinding-sloppy-codingthat-compromisedsecurity-of-250000students-personal-data
(unknown)
Nuclear
power plant
vulnerabilities
(SCADA)
Ralph
Langner
Nuclear
power plant
vulnerabilities
(SCADA)
Eric Romang
Video of
Metasploit
Digital Music
Pad SEH
overflow
exploitation
module
Talk was cancelled last minute at
the 12th ICS Cyber Security
Conference An unnamed vendor
objected to the talk on the
grounds that "the review would
disclose problems in its
equipment" and threatened to
sue, "even though plant officials
had approved the presentations".
This is one of two talks cancelled
at the conference, according to the
conference organizer.
Talk was cancelled last minute at
the 12th ICS Cyber Security
Conference An unnamed vendor
objected to the talk on the
grounds that "the review would
disclose problems in its
equipment" and threatened to
sue, "even though plant officials
had approved the presentations".
This is one of two talks cancelled
at the conference according to the
conference organizer.
E-Soft sent a bogus copyright claim
to YouTube to have the video
removed. It has been reposted to
the same site once by another
individual. The video remains
available, and there have been no
reported attempts to silence news
of the exploit in other manners.
http://gadgets.ndtv.com
/internet/news/legalfears-muffle-warningson-cyber-securitythreats-286061
http://gadgets.ndtv.com
/internet/news/legalfears-muffle-warningson-cyber-securitythreats-286061
http://attrition.org/errat
a/legal_threats/e-soft/
1/31/2012
11/22/2011
10/13/2011
8/1/2011
Smart
Grid/Meter
Vendor
(unspecified)
Carrier IQ
First State
Superannuat
ion
Trans Link
Systems
Don Weber /
InGuardians
Smart Grid
Meter
Security
Assessment
Tool Release
Researcher cancelled the talk last
minute, citing the desire to work
with the vendor. Note: a reliable
source tells Attrition that
InGuardian did not reach out to
the vendor until weeks after the
ShmooCon CFP. Further,
Weber says there was no
vulnerabilities being disclosed,
suggesting that InGuardian may
have cancelled the talk when the
unspecified vendor agreed to
become a client.
Trevor
Eckhart
Carrier IQ
software logs
excessive
information
Carrier IQ threatens Eckhart and
sends a cease & desist letter.
Shortly after negative attention,
Carrier IQ retracts the threat.
Research stays public.
Patrick
Webster
Direct Object
Reference
vulnerability
in FSS website
Brenno de
Winter
OV Transit
Payment
System
Vulnerabilitie
s
Acidgen
Buffer
overflow in
Music Maker
16 software
(version
16.0.2.4)
Researcher received
letter indicating FSS reported him
to the police and threatened him
with further legal action. After
negative publicity, First State
Super withdraws legal threat.
Researcher learned he may have
been facing legal charges. Vendor
statement says a criminal
complaint was filed and researcher
was questioned, but researcher
was not the target of the
complaint. It is still not clear who
the complaint was filed against or
if this was a tactic to stifle de
Winter's research
Research published despite threat.
Researchers convinced Magix to
change stance on vuln handling.
Magix opened a resource for
security researches site, but try to
force researchers not to disclose
w/o a patch or fix available, in
their terms and conditions.
Roth's apartment was raided, his
bank account frozen, and he had
to refrain from releasing his tool
during Black Hat. Injunction had
since been revoked, Roth
published the research.
4/27/2011
Magix AG
3/21/2011
German
telecommun
ications firm
(unspecified)
Thomas
Roth
Amazon EC2based
password
cracking
software
7/26/2010
Financial
Industry
Client
(unspecified)
Varun Uppal
and Gyan
Chawdhary
High-Speed
Trading
System Hacks
Due to financial pressure (i.e. loss
of a client), the talk was pulled and
not presenter anywhere else.
Taiwanese
Government
Wayne
Huang,
Armorize
Technologie
s Inc.
The Chinese
Cyber Army:
An
Archaeologica
l Study from
Two weeks before the
conference, the talk was
cancelled due to "pressure from
the Taiwanese government."
7/15/2010
https://twitter.com/cuta
way/status/1659234456
98347008
http://www.darkreading.
com/enduser/researcherovercomes-legal-setbackover/229301362
http://www.eweek.com/
c/a/Security/ChinaCyber-Army-Talk-PulledFrom-Black-Hat-668887/
2001 to 2010
Scott Jarkoff
Navy Federal
Credit Union
Web Site
Flaws
SliceHost / TechMiso challenges
RSA, RSA backs down
C&D Sent to Tumblr, information
removed but vulnerability still
present (2009-07-17)
http://techmiso.com/243
4/navy-federal-creditunion-web-siteoperating-with-securityissue/
http://dl.dropboxuserco
ntent.com/u/634884/Let
ter%20to%20Tumblr%20
from%20P.%20Bertrand
%207-17-09.PDF
7/18/2009
RSA
7/17/2009
Comerica
Bank
Lance James
XSS / Phishing
vulnerabilities
on Comerica
site
6/6/2009
Orange.fr
HackersBlog
Multiple
Vulnerabilitie
s [1] [2]
Apparent legal threats, details not
published.
404 not found
8/13/2008
Sequoia
Voting
Systems
Ed Felten
Voting
Machine
Audit
Research still not published (200810-02)
https://freedom-totinker.com/blog/appel/ju
dge-suppresses-reportvoting-machine-security/
8/9/2008
Massachuset
ts Bay
Transit
Authority
Zach
Anderson, RJ
Ryan and
Alessandro
Chiesa
Electronic
Fare Payment
(Charlie
Card/Charlie
Ticket)
Gag order lifted, Researchers hired
as consultants by MBTA
https://www.eff.org/pres
s/archives/2008/12/22
7/9/2008
NXP
(formerly
Philips
Semiconduct
ors)
Radboud
University
Nijmegen
Mifare Classic
Card Chip
Security
Research Published
http://news.cnet.com/83
01-10784_3-99858867.html
12/6/2007
Autonomy
Corp., PLC
Secunia
KeyView
Vulnerability
Research
Research Published
7/29/2007
U.S.
Customs
Halvar Flake
Security
Training
Material
Researcher denied entry into U.S.,
training cancelled last minute
4/17/2007
BeThere (Be
Un limited)
Sid
Karunaratne
Publishing ISP
Router
Backdoor
Information
Researcher still in talks with
BeThere, passwords
redacted, patch supplied, ISP
service not restored (2007-07-06)
2/27/2007
HID Global
Chris
Paget/IOActi
ve
RFID Security
Problems
Talk pulled, research not published
2007-??-??
TippingPoint
Technologie
s, Inc.
/David
Maynor /
ErrataSec
Reversing
TippingPoint
rule set to
discover
vulnerabilities
Bulk of research later published at
BlackHat Briefings 07.
7/29/2005
Cisco
Systems, Inc.
Mike
Lynn /ISS
Cisco router
vulnerabilities
Resigned from ISS before
settlement, gave BH presentation,
future disclosure injunction agreed
on
http://archives.neohapsi
s.com/archives/fulldisclo
sure/2007-12/0152.html
http://addxorrol.blogspo
t.com/2007/07/ive-beendenied-entry-to-usessentially.html
http://www.theregister.c
o.uk/2007/04/17/hacker
s_service_terminated/
http://www.infoworld.co
m/d/securitycentral/lawsuits-patentclaims-silence-black-hattalk-720
https://www.blackhat.co
m/presentations/bh-usa07/Maynor_and_Graham
/Whitepaper/bh-usa-07maynor_and_grahamWP.pdf
http://www.securityfocu
s.com/news/11260
3/25/2005
9/30/2003
7/30/2002
7/16/2001
2001-??-??
Sybase, Inc.
Blackboard
Transaction
System
HewlettPackard
Developmen
t Company,
L.P. (HP)
Adobe
Systems
Incorporate
d
Tegam
International
Viguard
Antivirus
NextGeneration
Security
Software
Sybase
Database
vulnerabilities
Threat dropped, research
published
http://www.securityfocu
s.com/news/10827
Billy
Hoffman
and Virgil
Griffith
Blackboard
issued C&D to
Interz0ne
conference,
filed
complaint
against
students
Confidential agreement reached
between Hoffman, Griffith and
Blackboard
http://www.chillingeffect
s.org/weather.cgi?Weath
erID=383
SNOsoft
Tru64 Unix OS
vulnerability DMCA based
threat
Vendor/researcher agree on
future timeline, Additional Tru64
vulnerabilities published, HP asks
Neohapsis for OpenSSL exploit
code shortly after
http://news.cnet.com/21
00-1023-947325.html
Dmitry
Sklyarov &El
comSoft
Adobe eBook
AEBPR Bypass
Elcomsoft found Not Guilty
http://news.cnet.com/21
00-1023-978176.html
Suspended fine of 5,000 Euros
http://news.cnet.com/Fr
ance%20puts%20a%20da
mper%20on%20flawhunting/2100-7350_35606306.html?tag=techd
irt
Guillaume
Tena
(Guillermito)
Vulnerabilitie
s in Viguard
Antivirus
Four
Watermark
Protection
http://en.wikipedia.org/
SDMI, RIAA
Research published at USENIX
4/23/2001
Ed Felten
Schemes
wiki/Edward_Felten#SD
and Verance
2001
Bypass MI_Lawsuits
Corporation
DMCA based
threat
DVD
2600: The
Encryption
MPAA &
http://www.linuxinsider.
8/17/2000
Hacker
Breaking
DeCSS ruled 'not a trade secret'
DVD CCA
com/story/32672.html
Quarterly
Software
(DeCSS)
The following incidents are not confirmed as legal or financial threats. They are being included here in the hopes that someone
will come forward with additional information or clarification.
Company
Research
When
making
Researchers
Resolution/Status
Topic
threat
NDA between Edge/Apple existed
already, Apple called Edge on it.
FileVault
Researcher "rescinded talk" but BH
http://news.cnet.com/83
Charles Edge
encryption
CFP team shows no record of talk
8/1/2008
Apple
01-1009_3-10004627/ 318 Inc.
system
being submitted in first place.
83.html
weaknesses
Attrition Theory: Incident used as
press fodder for 318/Edge
attention.
Week of
Oracle
WoOB cancelled, rumors of
12/7/2006
Argeniss
Oracle Bugs
404 not found
Corporation
financial/legal threats
(WoOB)
The following incidents are related to the ones above, but "cross the line". They include incidents where it was not "security
research", but rather activity that was considered a crime by current laws (at the time). Instead of following a more ethical
approach or going the route of responsible disclosure, the researcher chose to research and disclose the details in a manner
that was questionable. While the threat of law suit of such activity is frivilous to most, the companies are being prudent
because the researcher in question likely did break laws in the process.
Company
Research
When
making
Researchers
Resolution/Status
Topic
threat
Voting
http://www.wired.com/t
Hari Prasad,
Machine
Prasad arrested, machine given to
8/23/2010
n/a
hreatlevel/2010/08/rese
Netindia
vulnerability
him was apparently stolen
archer-arrested-in-india
research
Used
http://www.canada.com
keylogger to
/ottawacitizen/news/city
Carleton
Mansour
Moufid charged with computer
9/12/2008
expose
/story.html?id=25110a8f
University
Moufid
crime
student
-a73a-43a0-a2a5information
1daa08d147d1
Database
programming
http://www.wired.com/p
University of
error allows
McCarty charged with computer
olitics/law/commentary/
4/28/2006
Southern
Eric McCarty
disclosure of
crime
circuitcourt/2006/05/708
California
student SSN
57
and more
Secure
Tornado
Webmail
Arrested, tried, convicted and
Bret
http://www.securityfocu
8/18/2003
Developmen
Session
sentenced to 16 months of prison
McDanel
s.com/columnists/179
t, Inc.
Hijacking
time
discovery
Harris
Insecure
Faces 5 years and $250,000 fine.
County
Stefan
wireless
3/18/2002
The jury deliberated for 15
District
Puffer
network
minutes before acquitting Puffer.
Court
discovery
Over the years, many talks have been cancelled for various reasons. Sometimes, the rumor of legal threats dominate the venue
and/or news, but never happened. This table will list such events, to help clarify what happened. As time allows, any case of a
security talk being cancelled will be added.
Company
making
Research
When
Researchers
Resolution/Status
request or
Topic
threat
Grutzmacher coordinated
disclosure via US-CERT in August.
Days before Toorcon 2012, HP
Kurt
Huawei / H3C
sent a polite request for him to
Hewlett10/19/2012
Grutzmache
router
cancel, saying patches were not
Packard
r
vulnerabilities
ready. Grutzmacher cancelled his
talk. Two days later, HP released
the patch, casting doubt over their
intention behind the request.
Pirate Bay
Neij's lawyer advised his client not
founders
Talk titled
to travel to a highly visible public
10/10/2012
(none)
Peter Sunde
"Data is
conference centered on hacking.
and Fredrik
Political"
Sunde was reportedly too ill to
Neij
travel.
7/29/2012
(unknown)
Sergey
Gordeychik /
Denis
Baranov,
Positive
Technologie
s
1/31/2012
Smart Grid
Meter
Vendor
(unnamed)
Don Weber /
InGuardians
SCADA
vulnerabilities
including
Siemens
The talk "SCADA Strangelove: How
I Learned To Start Worrying And
Love The Nuclear Plants" was
cancelled a week before the
conference and replaced with a
different SCADA talk by another
person not affiliated with Positive
Technologies. No confirmation as
to why, speculation is the talk was
pulled due to vendor pressure.
Smart Grid
Vulnerabilitie
s
Was asked to pull talk from
ShmooCon 2012, complied.
Presented later at BSidesLV 2012.
Google
Android
Vulnerabilitie
s
8/16/2011
(none)
Riley Hassel
/ Shane
Macaulay
5/18/2011
Siemens /
Department
of Homeland
Security
(DHS)
Dillon
Beresford /
NSS Labs
SCADA
vulnerabilities
7/15/2010
Taiwanese /
Chinese
agencies
(unnamed)
Wayne
Huang,
Armorize
CTO
Analysis of
China's
governmentbacked
hacking
initiatives
6/29/2010
ATM
Vendors
(unnamed)
Raoul Chiesa
ATM
Vulnerabilitie
s
BlackHat Briefings Las Vegas 2011
Hassel/Macaulay scheduled to give
"Hacking Android for Profit" talk at
BlackHat Briefings Las Vegas 2011.
Neither presenter showed for their
talk. Subsequent articles point out
that Google said "The identified
bugs are not present in Android",
and that the presenters backed
out in "fear criminals would use it
attack Android phones". In
another work, Hassel said "that
some of their work may have
replicated previously published
research, and they wanted to
make sure they properly
acknowledged that work."
TakeDownCon 2011 talk titled
"Chain Reactions - Hacking SCADA"
was cancelled by Beresford after
concerns from Siemens/DHS were
expressed. Beresford said "DHS in
no way tried to censor the
presentation."
Talk pulled from BlackHat Briefings
2010 in Las Vegas, announced by
Caleb Sima, Armorize CEO on
Twitter. An earlier version of the
talk was given to a small
conference in Taiwain in 2007.
Initial reports said that Chiesa was
threatened by ATM vendors and
forced to cancel last
minute. according to Chiesa, no
threats were made. The talk was
cancelled for "logistical issues that
day". Some in the industry have
classified this as a publicity stunt,
to garner more attention for the
talk at a subsequent date.
6/30/2009
7/2/2008
ATM
Vendors
(unnamed,
presumed
Triton)
Barnaby Jack
/ Juniper
Networks
ATM
Vulnerabilitie
s
Apple
Unamed
'Apple
Insiders'
Apple
Security
Response
Team
BlackHat Briefings Las Vegas 2009
talk cancelled by Juniper after ATM
vendor expressed concerns about
disclosure before customers were
fully protected. Information
published at BlackHat 2010.
According to Trey Ford, BlackHat
general manager, a panel of Apple
insiders were to have a panel to
discuss "the company's securityresponse team". When Apple's
marketing department heard, the
panel was abruptly cancelled.
Download