Under President's New Cybersecurity Executive Order... Is Wikileaks Now An Evil Cyberhacker For Releasing Trade Deal?
from the broad-definitions,-broad-powers dept
Yesterday we talked about the ridiculousness of President Obama's new cybersecurity executive order, in which he declares a national emergency around "malicious cyber-enabled activities" and enables his own government to do mean things to anyone they think is responsible for cyber badness (that his own NSA is the primary instigator of serious cyberattacks gets left ignored, of course). One of the points we made is that the definitions in the executive agreement were really vague, meaning that it's likely that they could be abused in all sorts of ways that we wouldn't normally think of as malicious hacking.Helpfully, the ever vigilant Marcey Wheeler has provided some examples of how the vague language can and likely will be twisted:
The EO targets not just the hackers themselves, but also those who benefit from or materially support hacks. The targeting of those who are “responsible for or complicit in … the receipt or use for commercial or competitive advantage … by a commercial entity, outside the United States of trade secrets misappropriated through cyber-enabled means, … where the misappropriation of such trade secrets is reasonably likely to result in, or has materially contributed to, a significant threat to the national security, foreign policy, or economic health or financial stability of the United States” could be used to target journalism abroad. Does WikiLeaks’ publication of secret Trans-Pacific Partnership negotiations qualify? Does Guardian’s publication of contractors’ involvement in NSA hacking?And, that's not all. How about encryption providers? Not too hard to see how they might qualify:
And the EO creates a “material support” category similar to the one that, in the terrorism context, has been ripe for abuse. Its targets include those who have “provided … material, or technological support for, or goods or services in support of” such significant hacks. Does that include encryption providers? Does it include other privacy protections?We've already seen some -- including government officials -- argue that Twitter could be deemed to be providing "material support" to ISIS if it didn't take down Twitter accounts that support ISIS. Twitter wouldn't directly qualify under this executive order (which targets non-US actors), but it shows you how easy it is to stretch this kind of thinking in dangerous ways.
Making sure the technology we use every day is secure is important. But vaguely worded executive orders and an over-hyped "national emergency" isn't the solution. Instead, it's likely to be abused in serious ways that harm our freedoms.
Thank you for reading this Techdirt post. With so many things competing for everyone’s attention these days, we really appreciate you giving us your time. We work hard every day to put quality content out there for our community.
Techdirt is one of the few remaining truly independent media outlets. We do not have a giant corporation behind us, and we rely heavily on our community to support us, in an age when advertisers are increasingly uninterested in sponsoring small, independent sites — especially a site like ours that is unwilling to pull punches in its reporting and analysis.
While other websites have resorted to paywalls, registration requirements, and increasingly annoying/intrusive advertising, we have always kept Techdirt open and available to anyone. But in order to continue doing so, we need your support. We offer a variety of ways for our readers to support us, from direct donations to special subscriptions and cool merchandise — and every little bit helps. Thank you.
–The Techdirt Team
Filed Under: cybersecurity, executive order, leaks, material support, tpp
Companies: wikileaks
Reader Comments
Subscribe: RSS
View by: Time | Thread
[ link to this | view in chronology ]
Surprise!
[ link to this | view in chronology ]
Re: Surprise!
[ link to this | view in chronology ]
If it's really a national emergency, let's get FEMA involved
[ link to this | view in chronology ]
[ link to this | view in chronology ]
That's why.
Which likely is the reason for its implementation and existence.
[ link to this | view in chronology ]
Matter of definitions
[ link to this | view in chronology ]
Q: "Is Wikileaks Now An Evil Cyberhacker?"
[ link to this | view in chronology ]
Re: Q: "Is Wikileaks Now An Evil Cyberhacker?"
[ link to this | view in chronology ]
Re: Q: "Is Wikileaks Now An Evil Cyberhacker?"
[ link to this | view in chronology ]
Re: Re: Q: "Is Wikileaks Now An Evil Cyberhacker?"
[ link to this | view in chronology ]
02210
[ link to this | view in chronology ]
Re: 02210
[ link to this | view in chronology ]
Homer: Not a bear in sight. The Bear Patrol must be working like a charm.
Lisa: That’s specious reasoning, Dad.
Homer: Thank you, dear.
Lisa: By your logic I could claim that this rock keeps tigers away.
Homer: Oh, how does it work?
Lisa: It doesn’t work.
Homer: Uh-huh.
Lisa: It’s just a stupid rock.
Homer: Uh-huh.
Lisa: But I don’t see any tigers around, do you?
[Homer thinks of this, then pulls out some money]
Homer: Lisa, I want to buy your rock.
[ link to this | view in chronology ]
No news coverage
When is the constitutional convention slash revolution happening please?
[ link to this | view in chronology ]
Re: No news coverage
I thought not, and I'd advise against it.
[ link to this | view in chronology ]