Open Letter On Ending Attacks On Security Research

from the it's-too-important dept

The Center for Democracy and Technology has put together an important letter from experts on the importance of security research. This may sound obvious, but increasingly we’re seeing attacks on security researchers, where the messenger is blamed for finding and/or disclosing bad security practices or breaches — and that makes us all less safe by creating chilling effects.

On April 10, 2018, over fifty experts and expert advocates published a statement in support of security research and against efforts to chill or intimidate security researchers. Computer and network security research, white-hat hacking, and vulnerability disclosure are legal, legitimate, and needed now more than ever to understand flaws in the information systems that increasingly pervade our lives.

Security researchers hesitate to report vulnerabilities and weaknesses to companies for fear of facing legal retribution; these chilling effects invite the release of anonymous, public zero-day research instead of coordinated disclosure. The undersigned urge support for security researchers and reporters in their work, and decry those who oppose research and discussion of privacy and security risks. Harming these efforts harms us all.

I’m proud to have signed onto the letter, which you can read here (or embedded below). In it, we cite two legal cases in which a reporter and security researcher were sued for their work disclosing security vulnerabilities. These kinds of lawsuits are a disgrace and need to stop.

The most recent cases include Keeper v. Goodin and River City Media v. Kromtech ; in the first case, a reporter was sued for reporting on the details of a vulnerability, and in the second case a security researcher is being sued for investigating a publicly accessible spam server. These lawsuits not only endanger a free and open press but risk a ?chilling effect? towards research designed to improve cybersecurity. Security researchers hesitate to report vulnerabilities and weaknesses to companies for fear of facing legal retribution; these chilling effects invite the release of anonymous, public zero-day research instead of coordinated disclosure.

It’s kind of sad that this kind of letter is even needed, but these kinds of things are happening way too often.

Filed Under: , , ,

Rate this comment as insightful
Rate this comment as funny
You have rated this comment as insightful
You have rated this comment as funny
Flag this comment as abusive/trolling/spam
You have flagged this comment
The first word has already been claimed
The last word has already been claimed
Insightful Lightbulb icon Funny Laughing icon Abusive/trolling/spam Flag icon Insightful badge Lightbulb icon Funny badge Laughing icon Comments icon

Comments on “Open Letter On Ending Attacks On Security Research”

Subscribe: RSS Leave a comment
6 Comments
Jim says:

Actually!

More then just a slapped law. Active research by Americans, in academia. Not just the secret government stuff. China and Russia, and the NSA, do not report, or educate the American people into security. A collegate researcher may have to publish or die, so you may hear of the problem, not the solution. NSA, someone has to find a program and decode what it did, and someone reliable to expose the wrong.

Add Your Comment

Your email address will not be published. Required fields are marked *

Have a Techdirt Account? Sign in now. Want one? Register here

Comment Options:

Make this the or (get credits or sign in to see balance) what's this?

What's this?

Techdirt community members with Techdirt Credits can spotlight a comment as either the "First Word" or "Last Word" on a particular comment thread. Credits can be purchased at the Techdirt Insider Shop »

Follow Techdirt

Techdirt Daily Newsletter

Ctrl-Alt-Speech

A weekly news podcast from
Mike Masnick & Ben Whitelaw

Subscribe now to Ctrl-Alt-Speech »
Techdirt Deals
Techdirt Insider Discord
The latest chatter on the Techdirt Insider Discord channel...
Loading...