Open Letter On Ending Attacks On Security Research

from the it's-too-important dept

The Center for Democracy and Technology has put together an important letter from experts on the importance of security research. This may sound obvious, but increasingly we're seeing attacks on security researchers, where the messenger is blamed for finding and/or disclosing bad security practices or breaches -- and that makes us all less safe by creating chilling effects.

On April 10, 2018, over fifty experts and expert advocates published a statement in support of security research and against efforts to chill or intimidate security researchers. Computer and network security research, white-hat hacking, and vulnerability disclosure are legal, legitimate, and needed now more than ever to understand flaws in the information systems that increasingly pervade our lives.

Security researchers hesitate to report vulnerabilities and weaknesses to companies for fear of facing legal retribution; these chilling effects invite the release of anonymous, public zero-day research instead of coordinated disclosure. The undersigned urge support for security researchers and reporters in their work, and decry those who oppose research and discussion of privacy and security risks. Harming these efforts harms us all.

I'm proud to have signed onto the letter, which you can read here (or embedded below). In it, we cite two legal cases in which a reporter and security researcher were sued for their work disclosing security vulnerabilities. These kinds of lawsuits are a disgrace and need to stop.

The most recent cases include Keeper v. Goodin and River City Media v. Kromtech ; in the first case, a reporter was sued for reporting on the details of a vulnerability, and in the second case a security researcher is being sued for investigating a publicly accessible spam server. These lawsuits not only endanger a free and open press but risk a “chilling effect” towards research designed to improve cybersecurity. Security researchers hesitate to report vulnerabilities and weaknesses to companies for fear of facing legal retribution; these chilling effects invite the release of anonymous, public zero-day research instead of coordinated disclosure.

It's kind of sad that this kind of letter is even needed, but these kinds of things are happening way too often.

Hide this

Thank you for reading this Techdirt post. With so many things competing for everyone’s attention these days, we really appreciate you giving us your time. We work hard every day to put quality content out there for our community.

Techdirt is one of the few remaining truly independent media outlets. We do not have a giant corporation behind us, and we rely heavily on our community to support us, in an age when advertisers are increasingly uninterested in sponsoring small, independent sites — especially a site like ours that is unwilling to pull punches in its reporting and analysis.

While other websites have resorted to paywalls, registration requirements, and increasingly annoying/intrusive advertising, we have always kept Techdirt open and available to anyone. But in order to continue doing so, we need your support. We offer a variety of ways for our readers to support us, from direct donations to special subscriptions and cool merchandise — and every little bit helps. Thank you.

–The Techdirt Team

Filed Under: cdt, chilling effects, open letter, security research


Reader Comments

Subscribe: RSS

View by: Time | Thread


  1. icon
    Mason Wheeler (profile), 12 Apr 2018 @ 12:52pm

    Ok everybody, once more with feeling:

    This is why we need a federal anti-SLAPP law.

    link to this | view in thread ]

  2. identicon
    Jim, 12 Apr 2018 @ 1:21pm

    Actually!

    More then just a slapped law. Active research by Americans, in academia. Not just the secret government stuff. China and Russia, and the NSA, do not report, or educate the American people into security. A collegate researcher may have to publish or die, so you may hear of the problem, not the solution. NSA, someone has to find a program and decode what it did, and someone reliable to expose the wrong.

    link to this | view in thread ]

  3. identicon
    Anonymous Coward, 12 Apr 2018 @ 1:36pm

    Re:

    nice, but not even close to solving even part of the problem.

    link to this | view in thread ]

  4. identicon
    Anonymous Coward, 12 Apr 2018 @ 1:46pm

    Re: Re:

    A federal anti-SLAPP law would get Goodin's case dismissed—it's purely related to his writings. It wouldn't help if people are being pursued under CFAA or DMCA.

    link to this | view in thread ]

  5. icon
    ECA (profile), 12 Apr 2018 @ 3:19pm

    DONT DO IT...

    LEt them fail..
    Let them FALL by the way side..

    THEN we have persons to SUE, into the ground..\
    We can also have a class action Lawsuit..

    IF they do this, then they only need to hire 1-2 Companies to do a JOB that they SHOULD OF HAD LONG AGO, and PAID 1-2 people to do it FOREVER.. and should have been done LONG AGO..

    link to this | view in thread ]


Follow Techdirt
Essential Reading
Techdirt Deals
Report this ad  |  Hide Techdirt ads
Techdirt Insider Discord

The latest chatter on the Techdirt Insider Discord channel...

Loading...
Recent Stories

This site, like most other sites on the web, uses cookies. For more information, see our privacy policy. Got it
Close

Email This

This feature is only available to registered users. Register or sign in to use it.