SlideShare una empresa de Scribd logo
1 de 45
Descargar para leer sin conexión
Legal Issues in Mobile Security
           Research
           CanSecWest
          March 8, 2012
       Marcia Hofmann, EFF
what we’ll talk about today
✪  Why mobile security research presents unique
legal considerations.

✪  Some of the laws you should be aware of when
you’re doing mobile security research.

✪  Ways to reduce whatever risk your research
might create.
what do I mean by “risk”?
        A couple distinct, separate things.

   (1) The likelihood of becoming an attractive
target for a law suit or prosecution, either with or
                   without basis.

(2) The likelihood that a court might decide that
           you’ve run afoul of the law.
My goal today is not to frighten you or
       discourage your research.

I want to help you spot potentially sticky
situations so that you can call a lawyer early
      to help you safely navigate them.

I also want to help you think proactively
about ways to design your research to avoid
                  trouble.
This is not legal advice.

If you are concerned about the legality of your
    research, you should speak with a lawyer
          about your specific situation.
What makes mobile security research
       legally interesting?
factors
✪ Networked devices that access, store and
  transmit vast amounts of information, lots of
  which is intensely personal
✪ Many different players involved in the space:
  manufacturers, platform providers, software
  developers, carriers, users
✪ Embedded software (tricky © issues)
some legal considerations*
contract law
which contracts?

The documents that set out terms purporting to
regulate how people can access and use a device/
               program/service.

E.g., end-user license agreements, SDK licenses,
           terms of use, carrier contracts
Be sure to check whether more than one
    agreement might apply to your research.

Also see whether other agreements/policies are
 incorporated be reference, and read them, too.
laws that might apply
Violating an agreement could involve:
✪  Breach of contract
  ✪  civil claim
  ✪  monetary damages, if any (compensation for loss)
  ✪  perhaps account terminated

✪  Computer crime laws…?
computer intrusion laws
laws that might apply

Accessing someone else’s computer might involve:
      (1)  Computer Fraud and Abuse Act
              18 U.S.C. § 1030
     (2) Similar state computer crime laws
unauthorized access
The CFAA prohibits, among other things,
“intentionally access[ing] a computer without
 authorization or in excess of authorization, and
 thereby obtain[ing] . . . information from any
 protected computer.”
18 U.S.C. § 1030(a)(2)(C).
Folks have tried to make creative arguments
   for defining “unauthorized” to include
            violating agreements…
           United States v. Drew
        Facebook v. Power Ventures
               Sony v. Hotz
This is especially problematic because the
 CFAA is both a civil and criminal law.
Also, one court recently held that designing
   a tool to avoid IP blocking violated the
                    CFAA.

        Facebook v. Power Ventures
copyright laws
laws that might apply
Accessing and making copies of someone else’s
        copyrighted code might involve:
        (1)  Copyright Act (copying)
          17 U.S.C. §§ 101 et seq.
   (2) Digital Millennium Copyright Act
    (accessing/enabling others to access)
             17 U.S.C. § 1201
Copyright Act
✪  Broadly prohibits infringement of copyrighted
 works.
✪  This includes making copies of code written by
  others.
✪  Stiff penalties (injunctions, statutory damages,
  criminal penalties).
important exception #1: fair use

   It’s OK to use copyrighted material for
  purposes such as research, news reporting,
commentary, criticism, and scholarship under
            certain circumstances.
important exception #1: fair use
      Four-factor balancing test
  ✪ Purpose and character of the use
  ✪ Nature of the copied work
  ✪ Amount and substantiality used
  ✪ Effect on the market
fair use and reverse engineering
If reverse engineering is necessary to gain access
to functional processes and ideas, intermediate
copies are fair use.

Be sure that you’re legitimately in possession of
the software, and don’t use someone else’s code in
your final product unless absolutely necessary.
contracts revisited

Some agreements forbid reverse engineering.

            Can they do that?


         So far, the courts say yes.
important exception #2: Section 117

The owner of a copy of a computer program
  may copy or adapt it as “an essential step
 in the utilization of the computer program
              with a machine[.]”
Digital Millennium Copyright Act
          Two basic prohibitions:
(1) Can’t circumvent technological measures
 that effectively protect or control access to
              copyrighted works
(2) No trafficking in tools that are primarily
   designed, valuable or marketed for (1)
Digital Millennium Copyright Act

  Again, tough civil/criminal penalties.

 (injunctions, statutory damages, criminal
            fines, prison time)
protection/access measures
             CSS
      protocol encryption
   authentication handshakes

    “chain of trust” signing?
       code obfuscation?
     proprietary protocols?
important exceptions

           reverse engineering
          encryption research
            security research
personally identifiable information (PII)
reverse engineering: breakdown
✪  Lawfully obtained the program, and
✪  Circumvention is for the sole purpose of
  identifying and analyzing to achieve program-
  to-program interoperability, and
✪  Information not previously readily available,
 and
✪  Not infringing.
reverse engineering: breakdown

Information learned through reverse engineering
  may be made available to others for the sole
purpose of achieving interoperability, so long as
           doing so isn’t infringing.
encryption research: breakdown
✪  Lawfully obtained the program, and
✪  Circumvention is necessary to conduct the
 research, and
✪  Good faith effort to obtain authorization
 before the circumvention, and
✪  Not infringing.
encryption research: other factors
✪  Was the information disseminated, and if so, in
  a way reasonably to advance the state of
  knowledge, or to facilitate infringement or violate
  other laws?
✪  Is the researcher studying, trained, experienced,
  or employed in the field of encryption research?
✪  Did the researcher give the copyright owner
  notice of the research findings?
security research: breakdown
✪  Solely to promote the security of the owner of the
  device, system, or network, with the owner’s
  authorization, and
✪ Information learned isn’t used to facilitate
  infringement or violate other laws.
✪  Tools created for the sole purpose of security
  testing are OK if they don’t otherwise violate the
  ban on distributing tools.
PII: breakdown
✪  The TPM or work it protects can collect or
  disseminate personally identifying
  information, and
✪  The person whose PII is at issue is the one
  circumventing, and
✪  Sole purpose to identify and disable PII
  collection/dissemination.
a few words about jailbreaking

✪  Library of Congress made clear in 2010 that
  jailbreaking phones doesn’t violate the DMCA.
✪  Doesn’t apply to jailbreaking other devices (at
  least, not yet).
✪  Doesn’t authorize the distribution of jailbreaking
  tools.
communication laws
laws that might apply
✪  Eavesdropping laws
   ✪  Wiretap Act (18 § U.S.C. 2510 et seq.)
   ✪  State laws

✪  Laws protecting addressing/routing information
   ✪  Pen Register Act (18 U.S.C. § 3121 et seq.)
   ✪  State laws

✪  Laws protecting stored communications
   ✪  Stored Communications Act (18 U.S.C. § 2701 et seq.)
   ✪  State laws
watch out for
✪  Inspecting packets without consent of the
  parties (note one-party vs. all-party consent).
✪  Breaking encryption or descrambling.
✪  These laws are outdated and confusing. It’s
  worth checking in with a lawyer if your research
  involves looking at communications, even just
  routing information.
designing safer research
✪  Identify and read any applicable agreements
 before you begin your research.
✪  Don’t agree, if possible.
✪  Test on your own devices/accounts/data/
 communications.
✪  Get permission to access the device/accounts/
 data/communications.
✪  Make sure that the copy of the software you’re
 studying is legally acquired.
✪  If you make a copy of someone else’s code,
 make sure that you need it to understand how
 the program functions, and don’t copy more
 than you have to.
✪  Avoid making copies of code for a purpose
 other than analyzing how a program works.
✪  Talk to a lawyer before breaking crypto,
 descrambling, or bypassing other security
 measures.

✪  When studying others’ code, consider asking
 permission, even if you don’t think you’ll get it.
questions?

     Marcia Hofmann
Senior Staff Attorney, EFF
      marcia@eff.org

Más contenido relacionado

La actualidad más candente

The Legal Aspects of Cyberspace
The Legal Aspects of CyberspaceThe Legal Aspects of Cyberspace
The Legal Aspects of Cyberspacetimmcguinness
 
Digital Crime & Forensics - Report
Digital Crime & Forensics - ReportDigital Crime & Forensics - Report
Digital Crime & Forensics - Reportprashant3535
 
Digital Crime & Forensics - Presentation
Digital Crime & Forensics - PresentationDigital Crime & Forensics - Presentation
Digital Crime & Forensics - Presentationprashant3535
 
Legal aspects of handling cyber frauds
Legal aspects of handling cyber fraudsLegal aspects of handling cyber frauds
Legal aspects of handling cyber fraudsSagar Rahurkar
 
Privacy and Data Security: Minimizing Reputational and Legal Risks
Privacy and Data Security: Minimizing Reputational and Legal RisksPrivacy and Data Security: Minimizing Reputational and Legal Risks
Privacy and Data Security: Minimizing Reputational and Legal RisksTechWell
 
Chapter2
Chapter2Chapter2
Chapter2Pibi Lu
 
Obstacles to Cybercrime Investigations
Obstacles to Cybercrime InvestigationsObstacles to Cybercrime Investigations
Obstacles to Cybercrime InvestigationsDr. Prashant Vats
 
FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossi...
FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossi...FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossi...
FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossi...Black Duck by Synopsys
 
9 things about indian cyber law prashant mali
9 things about indian cyber law   prashant mali9 things about indian cyber law   prashant mali
9 things about indian cyber law prashant maliAdv Prashant Mali
 
Ethics and legislation in the it industry
Ethics and legislation in the it industryEthics and legislation in the it industry
Ethics and legislation in the it industryjamiehaworth1
 
Major Essay_ US-China Relations_FINAL
Major Essay_ US-China Relations_FINALMajor Essay_ US-China Relations_FINAL
Major Essay_ US-China Relations_FINALLouise Collins
 
Computer Misuse Act
Computer Misuse ActComputer Misuse Act
Computer Misuse Actmrmwood
 
Cyber Crime Investigation
Cyber Crime InvestigationCyber Crime Investigation
Cyber Crime InvestigationHarshita Ved
 
Chfi V3 Module 01 Computer Forensics In Todays World
Chfi V3 Module 01 Computer Forensics In Todays WorldChfi V3 Module 01 Computer Forensics In Todays World
Chfi V3 Module 01 Computer Forensics In Todays Worldgueste0d962
 
Cybercrime And Cyber forensics
Cybercrime And  Cyber forensics Cybercrime And  Cyber forensics
Cybercrime And Cyber forensics sunanditaAnand
 

La actualidad más candente (20)

The Legal Aspects of Cyberspace
The Legal Aspects of CyberspaceThe Legal Aspects of Cyberspace
The Legal Aspects of Cyberspace
 
Digital Crime & Forensics - Report
Digital Crime & Forensics - ReportDigital Crime & Forensics - Report
Digital Crime & Forensics - Report
 
Midwest ip summit_copyright_trade_secret_handouts_2011_mmm
Midwest ip summit_copyright_trade_secret_handouts_2011_mmmMidwest ip summit_copyright_trade_secret_handouts_2011_mmm
Midwest ip summit_copyright_trade_secret_handouts_2011_mmm
 
Digital Crime & Forensics - Presentation
Digital Crime & Forensics - PresentationDigital Crime & Forensics - Presentation
Digital Crime & Forensics - Presentation
 
Legal aspects of handling cyber frauds
Legal aspects of handling cyber fraudsLegal aspects of handling cyber frauds
Legal aspects of handling cyber frauds
 
Privacy and Data Security: Minimizing Reputational and Legal Risks
Privacy and Data Security: Minimizing Reputational and Legal RisksPrivacy and Data Security: Minimizing Reputational and Legal Risks
Privacy and Data Security: Minimizing Reputational and Legal Risks
 
Chapter2
Chapter2Chapter2
Chapter2
 
Obstacles to Cybercrime Investigations
Obstacles to Cybercrime InvestigationsObstacles to Cybercrime Investigations
Obstacles to Cybercrime Investigations
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossi...
FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossi...FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossi...
FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossi...
 
2_CyberSecurity_2d_ARMA_IG_Panel_7-14-15
2_CyberSecurity_2d_ARMA_IG_Panel_7-14-152_CyberSecurity_2d_ARMA_IG_Panel_7-14-15
2_CyberSecurity_2d_ARMA_IG_Panel_7-14-15
 
9 things about indian cyber law prashant mali
9 things about indian cyber law   prashant mali9 things about indian cyber law   prashant mali
9 things about indian cyber law prashant mali
 
Ethics and legislation in the it industry
Ethics and legislation in the it industryEthics and legislation in the it industry
Ethics and legislation in the it industry
 
Major Essay_ US-China Relations_FINAL
Major Essay_ US-China Relations_FINALMajor Essay_ US-China Relations_FINAL
Major Essay_ US-China Relations_FINAL
 
Computer Misuse Act
Computer Misuse ActComputer Misuse Act
Computer Misuse Act
 
How to become Hackers .
How to become Hackers .How to become Hackers .
How to become Hackers .
 
Cyber Crime Investigation
Cyber Crime InvestigationCyber Crime Investigation
Cyber Crime Investigation
 
Chfi V3 Module 01 Computer Forensics In Todays World
Chfi V3 Module 01 Computer Forensics In Todays WorldChfi V3 Module 01 Computer Forensics In Todays World
Chfi V3 Module 01 Computer Forensics In Todays World
 
Cybercrime law
Cybercrime lawCybercrime law
Cybercrime law
 
Cybercrime And Cyber forensics
Cybercrime And  Cyber forensics Cybercrime And  Cyber forensics
Cybercrime And Cyber forensics
 

Destacado

Privacy and Cryptographic Security Issues within Mobile Recommender Syste...
Privacy and Cryptographic Security Issues within Mobile     Recommender Syste...Privacy and Cryptographic Security Issues within Mobile     Recommender Syste...
Privacy and Cryptographic Security Issues within Mobile Recommender Syste...Jacob Mack
 
Mobile Database ,alrazgi
Mobile Database ,alrazgiMobile Database ,alrazgi
Mobile Database ,alrazgialrazgi
 
Mobile security issues & frauds in India
Mobile security issues & frauds in IndiaMobile security issues & frauds in India
Mobile security issues & frauds in IndiaYogesh Lolge
 
Databases & Challenges of a Digital Age
Databases & Challenges of a Digital AgeDatabases & Challenges of a Digital Age
Databases & Challenges of a Digital AgeWendy Lile
 
Privacy and Security in Mobile E-Commerce
Privacy and Security in Mobile E-CommercePrivacy and Security in Mobile E-Commerce
Privacy and Security in Mobile E-CommerceNow Dentons
 
Mobile database security threats
Mobile database security threatsMobile database security threats
Mobile database security threatsAkhil Kumar
 
Database Systems Security
Database Systems SecurityDatabase Systems Security
Database Systems Securityamiable_indian
 
Security of the database
Security of the databaseSecurity of the database
Security of the databasePratik Tamgadge
 
Computer ethics
Computer ethicsComputer ethics
Computer ethicsJagan Nath
 
Data management issues
Data management issuesData management issues
Data management issuesNeha Bansal
 
Computer Ethics and Legal Issues
Computer Ethics and Legal IssuesComputer Ethics and Legal Issues
Computer Ethics and Legal IssuesKak Yong
 
Legal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in TechnologyLegal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in TechnologyRachel Farnese
 
2015 Mobile Security Trends: Are You Ready?
2015 Mobile Security Trends: Are You Ready?2015 Mobile Security Trends: Are You Ready?
2015 Mobile Security Trends: Are You Ready?IBM Security
 
Legal, Ethical, and Social Issues in Educational Computing
Legal, Ethical, and Social Issues in Educational ComputingLegal, Ethical, and Social Issues in Educational Computing
Legal, Ethical, and Social Issues in Educational Computingsappingtonkr
 
Towards the security issues in Mobile Ad Hoc Networks
Towards the security issues in Mobile Ad Hoc NetworksTowards the security issues in Mobile Ad Hoc Networks
Towards the security issues in Mobile Ad Hoc NetworksAM Publications,India
 

Destacado (20)

Privacy and Cryptographic Security Issues within Mobile Recommender Syste...
Privacy and Cryptographic Security Issues within Mobile     Recommender Syste...Privacy and Cryptographic Security Issues within Mobile     Recommender Syste...
Privacy and Cryptographic Security Issues within Mobile Recommender Syste...
 
Mobile Database ,alrazgi
Mobile Database ,alrazgiMobile Database ,alrazgi
Mobile Database ,alrazgi
 
Mobile security issues & frauds in India
Mobile security issues & frauds in IndiaMobile security issues & frauds in India
Mobile security issues & frauds in India
 
Databases & Challenges of a Digital Age
Databases & Challenges of a Digital AgeDatabases & Challenges of a Digital Age
Databases & Challenges of a Digital Age
 
Privacy and Security in Mobile E-Commerce
Privacy and Security in Mobile E-CommercePrivacy and Security in Mobile E-Commerce
Privacy and Security in Mobile E-Commerce
 
Mobile database security threats
Mobile database security threatsMobile database security threats
Mobile database security threats
 
Mobile computing unit 5
Mobile computing  unit 5Mobile computing  unit 5
Mobile computing unit 5
 
Database Systems Security
Database Systems SecurityDatabase Systems Security
Database Systems Security
 
Mobile Payment fraud & risk assessment
Mobile Payment fraud & risk assessmentMobile Payment fraud & risk assessment
Mobile Payment fraud & risk assessment
 
Security of the database
Security of the databaseSecurity of the database
Security of the database
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Femtocell
FemtocellFemtocell
Femtocell
 
Data management issues
Data management issuesData management issues
Data management issues
 
Computer Ethics and Legal Issues
Computer Ethics and Legal IssuesComputer Ethics and Legal Issues
Computer Ethics and Legal Issues
 
Legal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in TechnologyLegal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in Technology
 
2015 Mobile Security Trends: Are You Ready?
2015 Mobile Security Trends: Are You Ready?2015 Mobile Security Trends: Are You Ready?
2015 Mobile Security Trends: Are You Ready?
 
Mobile security
Mobile securityMobile security
Mobile security
 
Legal, Ethical, and Social Issues in Educational Computing
Legal, Ethical, and Social Issues in Educational ComputingLegal, Ethical, and Social Issues in Educational Computing
Legal, Ethical, and Social Issues in Educational Computing
 
Towards the security issues in Mobile Ad Hoc Networks
Towards the security issues in Mobile Ad Hoc NetworksTowards the security issues in Mobile Ad Hoc Networks
Towards the security issues in Mobile Ad Hoc Networks
 
Database security issues
Database security issuesDatabase security issues
Database security issues
 

Similar a Legal Issues in Mobile Security Research

Policies and Law in IT
Policies and Law in ITPolicies and Law in IT
Policies and Law in ITAnushka Perera
 
10. law invest & ethics
10. law invest & ethics10. law invest & ethics
10. law invest & ethics7wounders
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hrTushar Rajput
 
Lofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and EncryptionLofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and EncryptionSean Whalen
 
Yar Chaikovsky ABA Section of Intellectual Property Law Division VII — Infor...
Yar Chaikovsky ABA Section of Intellectual Property Law  Division VII — Infor...Yar Chaikovsky ABA Section of Intellectual Property Law  Division VII — Infor...
Yar Chaikovsky ABA Section of Intellectual Property Law Division VII — Infor...Yar Chaikovsky
 
Do You Wannacry: Your Ethical and Legal Duties Regarding Cybersecurity & Privacy
Do You Wannacry: Your Ethical and Legal Duties Regarding Cybersecurity & PrivacyDo You Wannacry: Your Ethical and Legal Duties Regarding Cybersecurity & Privacy
Do You Wannacry: Your Ethical and Legal Duties Regarding Cybersecurity & PrivacyButlerRubin
 
Contracting for Better Cybersecurity
Contracting for Better CybersecurityContracting for Better Cybersecurity
Contracting for Better CybersecurityShawn Tuma
 
Legal Privacy and Ethical Issues in Computer Security.pptx
Legal Privacy and Ethical Issues in Computer Security.pptxLegal Privacy and Ethical Issues in Computer Security.pptx
Legal Privacy and Ethical Issues in Computer Security.pptxKRITARTHBANSAL1
 
Iowa Weighs in on Ethics of Cloud Computing for Lawyers
Iowa Weighs in on Ethics of Cloud Computing for LawyersIowa Weighs in on Ethics of Cloud Computing for Lawyers
Iowa Weighs in on Ethics of Cloud Computing for LawyersNicole Black
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselCasey Ellis
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counselbugcrowd
 
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...Casey Ellis
 
2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptx2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptxSSPTRGCELL
 
Cybercrime
CybercrimeCybercrime
Cybercrimepromit
 
Meet the hackers: Seattle Tech Law CLE December 2018
Meet the hackers: Seattle Tech Law CLE December 2018Meet the hackers: Seattle Tech Law CLE December 2018
Meet the hackers: Seattle Tech Law CLE December 2018Wendy Knox Everette
 

Similar a Legal Issues in Mobile Security Research (20)

Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Policies and Law in IT
Policies and Law in ITPolicies and Law in IT
Policies and Law in IT
 
10. law invest & ethics
10. law invest & ethics10. law invest & ethics
10. law invest & ethics
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hr
 
Lofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and EncryptionLofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and Encryption
 
Yar Chaikovsky ABA Section of Intellectual Property Law Division VII — Infor...
Yar Chaikovsky ABA Section of Intellectual Property Law  Division VII — Infor...Yar Chaikovsky ABA Section of Intellectual Property Law  Division VII — Infor...
Yar Chaikovsky ABA Section of Intellectual Property Law Division VII — Infor...
 
Puna 2015
Puna 2015Puna 2015
Puna 2015
 
Do You Wannacry: Your Ethical and Legal Duties Regarding Cybersecurity & Privacy
Do You Wannacry: Your Ethical and Legal Duties Regarding Cybersecurity & PrivacyDo You Wannacry: Your Ethical and Legal Duties Regarding Cybersecurity & Privacy
Do You Wannacry: Your Ethical and Legal Duties Regarding Cybersecurity & Privacy
 
Contracting for Better Cybersecurity
Contracting for Better CybersecurityContracting for Better Cybersecurity
Contracting for Better Cybersecurity
 
Legal Privacy and Ethical Issues in Computer Security.pptx
Legal Privacy and Ethical Issues in Computer Security.pptxLegal Privacy and Ethical Issues in Computer Security.pptx
Legal Privacy and Ethical Issues in Computer Security.pptx
 
2627 8105-1-pb
2627 8105-1-pb2627 8105-1-pb
2627 8105-1-pb
 
Iowa Weighs in on Ethics of Cloud Computing for Lawyers
Iowa Weighs in on Ethics of Cloud Computing for LawyersIowa Weighs in on Ethics of Cloud Computing for Lawyers
Iowa Weighs in on Ethics of Cloud Computing for Lawyers
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
 
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
 
2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptx2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptx
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Computer Crimes
Computer CrimesComputer Crimes
Computer Crimes
 
Meet the hackers: Seattle Tech Law CLE December 2018
Meet the hackers: Seattle Tech Law CLE December 2018Meet the hackers: Seattle Tech Law CLE December 2018
Meet the hackers: Seattle Tech Law CLE December 2018
 
Cyber Laws
Cyber LawsCyber Laws
Cyber Laws
 

Último

Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 

Último (20)

Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 

Legal Issues in Mobile Security Research

  • 1. Legal Issues in Mobile Security Research CanSecWest March 8, 2012 Marcia Hofmann, EFF
  • 2. what we’ll talk about today ✪  Why mobile security research presents unique legal considerations. ✪  Some of the laws you should be aware of when you’re doing mobile security research. ✪  Ways to reduce whatever risk your research might create.
  • 3. what do I mean by “risk”? A couple distinct, separate things. (1) The likelihood of becoming an attractive target for a law suit or prosecution, either with or without basis. (2) The likelihood that a court might decide that you’ve run afoul of the law.
  • 4. My goal today is not to frighten you or discourage your research. I want to help you spot potentially sticky situations so that you can call a lawyer early to help you safely navigate them. I also want to help you think proactively about ways to design your research to avoid trouble.
  • 5. This is not legal advice. If you are concerned about the legality of your research, you should speak with a lawyer about your specific situation.
  • 6. What makes mobile security research legally interesting?
  • 7. factors ✪ Networked devices that access, store and transmit vast amounts of information, lots of which is intensely personal ✪ Many different players involved in the space: manufacturers, platform providers, software developers, carriers, users ✪ Embedded software (tricky © issues)
  • 10. which contracts? The documents that set out terms purporting to regulate how people can access and use a device/ program/service. E.g., end-user license agreements, SDK licenses, terms of use, carrier contracts
  • 11. Be sure to check whether more than one agreement might apply to your research. Also see whether other agreements/policies are incorporated be reference, and read them, too.
  • 12. laws that might apply Violating an agreement could involve: ✪  Breach of contract ✪  civil claim ✪  monetary damages, if any (compensation for loss) ✪  perhaps account terminated ✪  Computer crime laws…?
  • 14. laws that might apply Accessing someone else’s computer might involve: (1)  Computer Fraud and Abuse Act 18 U.S.C. § 1030 (2) Similar state computer crime laws
  • 15. unauthorized access The CFAA prohibits, among other things, “intentionally access[ing] a computer without authorization or in excess of authorization, and thereby obtain[ing] . . . information from any protected computer.” 18 U.S.C. § 1030(a)(2)(C).
  • 16. Folks have tried to make creative arguments for defining “unauthorized” to include violating agreements… United States v. Drew Facebook v. Power Ventures Sony v. Hotz
  • 17. This is especially problematic because the CFAA is both a civil and criminal law.
  • 18. Also, one court recently held that designing a tool to avoid IP blocking violated the CFAA. Facebook v. Power Ventures
  • 20. laws that might apply Accessing and making copies of someone else’s copyrighted code might involve: (1)  Copyright Act (copying) 17 U.S.C. §§ 101 et seq. (2) Digital Millennium Copyright Act (accessing/enabling others to access) 17 U.S.C. § 1201
  • 21. Copyright Act ✪  Broadly prohibits infringement of copyrighted works. ✪  This includes making copies of code written by others. ✪  Stiff penalties (injunctions, statutory damages, criminal penalties).
  • 22. important exception #1: fair use It’s OK to use copyrighted material for purposes such as research, news reporting, commentary, criticism, and scholarship under certain circumstances.
  • 23. important exception #1: fair use Four-factor balancing test ✪ Purpose and character of the use ✪ Nature of the copied work ✪ Amount and substantiality used ✪ Effect on the market
  • 24. fair use and reverse engineering If reverse engineering is necessary to gain access to functional processes and ideas, intermediate copies are fair use. Be sure that you’re legitimately in possession of the software, and don’t use someone else’s code in your final product unless absolutely necessary.
  • 25. contracts revisited Some agreements forbid reverse engineering. Can they do that? So far, the courts say yes.
  • 26. important exception #2: Section 117 The owner of a copy of a computer program may copy or adapt it as “an essential step in the utilization of the computer program with a machine[.]”
  • 27. Digital Millennium Copyright Act Two basic prohibitions: (1) Can’t circumvent technological measures that effectively protect or control access to copyrighted works (2) No trafficking in tools that are primarily designed, valuable or marketed for (1)
  • 28. Digital Millennium Copyright Act Again, tough civil/criminal penalties. (injunctions, statutory damages, criminal fines, prison time)
  • 29. protection/access measures CSS protocol encryption authentication handshakes “chain of trust” signing? code obfuscation? proprietary protocols?
  • 30. important exceptions reverse engineering encryption research security research personally identifiable information (PII)
  • 31. reverse engineering: breakdown ✪  Lawfully obtained the program, and ✪  Circumvention is for the sole purpose of identifying and analyzing to achieve program- to-program interoperability, and ✪  Information not previously readily available, and ✪  Not infringing.
  • 32. reverse engineering: breakdown Information learned through reverse engineering may be made available to others for the sole purpose of achieving interoperability, so long as doing so isn’t infringing.
  • 33. encryption research: breakdown ✪  Lawfully obtained the program, and ✪  Circumvention is necessary to conduct the research, and ✪  Good faith effort to obtain authorization before the circumvention, and ✪  Not infringing.
  • 34. encryption research: other factors ✪  Was the information disseminated, and if so, in a way reasonably to advance the state of knowledge, or to facilitate infringement or violate other laws? ✪  Is the researcher studying, trained, experienced, or employed in the field of encryption research? ✪  Did the researcher give the copyright owner notice of the research findings?
  • 35. security research: breakdown ✪  Solely to promote the security of the owner of the device, system, or network, with the owner’s authorization, and ✪ Information learned isn’t used to facilitate infringement or violate other laws. ✪  Tools created for the sole purpose of security testing are OK if they don’t otherwise violate the ban on distributing tools.
  • 36. PII: breakdown ✪  The TPM or work it protects can collect or disseminate personally identifying information, and ✪  The person whose PII is at issue is the one circumventing, and ✪  Sole purpose to identify and disable PII collection/dissemination.
  • 37. a few words about jailbreaking ✪  Library of Congress made clear in 2010 that jailbreaking phones doesn’t violate the DMCA. ✪  Doesn’t apply to jailbreaking other devices (at least, not yet). ✪  Doesn’t authorize the distribution of jailbreaking tools.
  • 39. laws that might apply ✪  Eavesdropping laws ✪  Wiretap Act (18 § U.S.C. 2510 et seq.) ✪  State laws ✪  Laws protecting addressing/routing information ✪  Pen Register Act (18 U.S.C. § 3121 et seq.) ✪  State laws ✪  Laws protecting stored communications ✪  Stored Communications Act (18 U.S.C. § 2701 et seq.) ✪  State laws
  • 40. watch out for ✪  Inspecting packets without consent of the parties (note one-party vs. all-party consent). ✪  Breaking encryption or descrambling. ✪  These laws are outdated and confusing. It’s worth checking in with a lawyer if your research involves looking at communications, even just routing information.
  • 42. ✪  Identify and read any applicable agreements before you begin your research. ✪  Don’t agree, if possible. ✪  Test on your own devices/accounts/data/ communications. ✪  Get permission to access the device/accounts/ data/communications.
  • 43. ✪  Make sure that the copy of the software you’re studying is legally acquired. ✪  If you make a copy of someone else’s code, make sure that you need it to understand how the program functions, and don’t copy more than you have to. ✪  Avoid making copies of code for a purpose other than analyzing how a program works.
  • 44. ✪  Talk to a lawyer before breaking crypto, descrambling, or bypassing other security measures. ✪  When studying others’ code, consider asking permission, even if you don’t think you’ll get it.
  • 45. questions? Marcia Hofmann Senior Staff Attorney, EFF marcia@eff.org