The Justice Department Will No Longer Charge Security Researchers with Criminal Hacking

Following a recent Supreme Court ruling, the Justice Department will no longer prosecute “good faith” security researchers with cybercrimes:

The policy for the first time directs that good-faith security research should not be charged. Good faith security research means accessing a computer solely for purposes of good-faith testing, investigation, and/or correction of a security flaw or vulnerability, where such activity is carried out in a manner designed to avoid any harm to individuals or the public, and where the information derived from the activity is used primarily to promote the security or safety of the class of devices, machines, or online services to which the accessed computer belongs, or those who use such devices, machines, or online services.

[…]

The new policy states explicitly the longstanding practice that “the department’s goals for CFAA enforcement are to promote privacy and cybersecurity by upholding the legal right of individuals, network owners, operators, and other persons to ensure the confidentiality, integrity, and availability of information stored in their information systems.” Accordingly, the policy clarifies that hypothetical CFAA violations that have concerned some courts and commentators are not to be charged. Embellishing an online dating profile contrary to the terms of service of the dating website; creating fictional accounts on hiring, housing, or rental websites; using a pseudonym on a social networking site that prohibits them; checking sports scores at work; paying bills at work; or violating an access restriction contained in a term of service are not themselves sufficient to warrant federal criminal charges. The policy focuses the department’s resources on cases where a defendant is either not authorized at all to access a computer or was authorized to access one part of a computer—such as one email account—and, despite knowing about that restriction, accessed a part of the computer to which his authorized access did not extend, such as other users’ emails.

News article.

EDITED TO ADD (6/14): Josephine Wolff writes about this update.

Posted on May 24, 2022 at 6:11 AM24 Comments

Comments

NoSpamPlease May 24, 2022 6:49 AM

So they’re saying security research actually is A Crime under CFAA, but they just promise they won’t go after you for committing that Crime, right?

Doesn’t give me a warm and fuzzy feeling…

Rombobjörn May 24, 2022 7:21 AM

Sure, it sounds great to not prosecute security researchers, but selective enforcement of overly broad laws paves the way for discrimination, favoritism and arbitrary crackdowns.

EvilKiru May 24, 2022 8:19 AM

If a web site has a policy that can’t be enforced, such as prohibiting multiple accounts for a single individual, then in no way should violating said policy ever be considered illegal trespass.

MrC May 24, 2022 8:37 AM

@NoSpamPlease: No, that’s not correct. The policy memo is a straightforward, good-faith instruction to USAs not to prosecute certain categories of potential CFAA cases because (a) SCOTUS’s new Van Buren precedent says they do not fit within the CFAA, or (b) they are near enough to Van Buren that, if called upon to resolve such a case, courts would likely say they do not fit within the CFAA, or (c) even if a court could maybe be convinced not to dismiss the case under Van Buren, such a prosecution wouldn’t serve to vindicate the government’s interest in “promot[ing] privacy and cybersecurity by upholding the legal right of individuals, network owners, operators, and other persons to ensure the confidentiality, integrity, and availability of information stored in their information systems.” I know it’s hard to believe the DOJ ever does the right thing or acts in good faith, but this time they did.

Ted May 24, 2022 9:30 AM

To tell you the truth, I don’t expect to be terribly surprised by the cases that elicit charges under this new policy.

Even though people are saying the policy still leaves wiggle room under the CFAA, if you glance at the 5 pages I think you can better see its constraints.

For example, federal interests are more aligned with:

concerns pertaining to national security, critical infrastructure, public health and safety, market integrity, international relations…

There also look to be several formal consultation requirements, including for investigating and charging. So I’d like to think the policy will better focus federal objectives and resources.

Barry May 24, 2022 9:36 AM

Excuse ignorance of US law. Does the CFAA law criminalize unauthorised access to a computer system? I would think that’s a civil tort, not a criminal act.

Ted May 24, 2022 10:44 AM

@John

Some blowhards trying to write their own laws!

I don’t know John. More and more companies have vulnerability disclosure policies in place. This seems like a step in furtherance of software and hardware security.

wiredog May 24, 2022 11:55 AM

@barry
Would unauthorized access to someone’s home be a criminal act or a civil tort?

Marcus May 24, 2022 1:57 PM

@wiredog
@barry

I tell my housekeeping service to leave my home office alone. I find a cleaning person vacuuming the floor. Is that criminal or civil? Or anything at all? What are the damages?

EvilKiru May 24, 2022 2:20 PM

@Marcus: Neither. Unless they stole something, in which case criminal, if you can prove it (and you press charges).

Clive Robinson May 24, 2022 5:34 PM

@ ALL,

As I understand it from talking to others with a more legal view than my own the “now alowable” “research” is still limited.

Lets say you’ve observed a bug in a say an Online Email service. So you decide to fuzz/randomize the input.

If you do it to,

1, The authentication ID process that is still a prosecutable CFAA violation.

2, The authentication password process that might still be a prosecutable CFAA violation.

3, Most of the user processes when authenticated are bow probably not a CFAA violation that will be prosecuted.

I know this feels like “splitting hairs” but there is some logic behind it.

But also, you still can not just stroll upto a system that requires authentication, that you do not have a valid account on, and gain access.

It’s apparently in part to do with how your “state of mind” is judged by others after an event…

I guess we are just going to have to wait and see how the policy shaps up under,

1, The judges
2, The politicians / legislators

The simple fact is the CFAA, like the DMCA and similar in other jurisdictions is basically “bad law” in that the scope given by the legislators was too broad, and prosecutors have tried to push the scope wider in various ways.

Remember that in many nation states these days the legislation is not written by legislators or impartial civil servants. It’s mainly “gifted” from other frequently far from impartial sources via the likes of lobbyists…

MrC May 24, 2022 8:56 PM

@Barry:

Does the CFAA law criminalize unauthorised access to a computer system?

Yes that’s exactly what it does. The longstanding problem is the the wording is vague as hell and open to some interpretations that are unfathomably broad. What’s going on right now is that the U.S Supreme Court recently issued an opinion swatting down one of the more outrageously broad interpretations. This prompted the DOJ central office to issue a memo instructing its District U.S. Attorneys, in essence, “hey guys, don’t prosecute potential cases that fall under this new precedent, or that come close to falling under this new precedent, or under any of those bullshit expansive interpretations that common sense dictates shouldn’t be a crime.” In other words, they’ve made a good-faith effort to extrapolate the line the Supreme Court drew in this one case and to narrow the DOJ’s interpretation of what’s prosecutable to fit within that line.

(When I say that the DOJ is acting in good faith here, I’m explicitly rejecting the innuendo that this standard is flexible and will be used to selectively go after people they don’t like, suggested in some of the comments here. That’s not what they’re up to. They really, truly are trying to get their interpretation “right” in the wake of Van Buren. However, they are not entirely without ulterior motives — Narrowing their interpretation is a way for the DOJ to preemptively avoiding the embarrassment of losing another Supreme Court case on one of these broad theories like Van Buren, or, even worse from their perspective, having a case on one of these broad theories prompt the Supreme Court to chuck the entire CFAA as unconstitutionally vague.)

@Clive: Afraid you’re off-base there.

(Some key background that you may be unaware of: In Anglo-American law, crimes consist of individual “elements,” each of which must be proven to secure a conviction. For example: Traditionally, burglary consisted of (1) breaking and entering, (2) into a dwelling, (3) that is not your own home, (4) for the intended purpose of committing a crime inside (usually stealing stuff). Even when one isn’t written into the statute, all crimes include a mental state (mens rea) element, which is usually “intended to do the proscribed act,” unless otherwise specified.)

The “fuzzing the username versus fuzzing the password versus userland process” distinction arises from someone trying to make sense of what Van Buren has to say about the “exceeding authorized access” element. However, the DOJ memo’s section on “good-faith security research” pertains to the mental state element. Different elements. Under this memo, a mental state of “good faith security research” (that’s obvious to the DOJ) should preclude prosecution regardless of what specifically you’re doing.

(“But,” you may ask, “what if my subjective mental intent was ‘good-faith security research,’ and the DOJ prosecuted me anyway?” Oh-ho, here’s where things get interesting. The boilerplate final paragraph expressly says that this memo doesn’t create defenses that defendants can assert. But it a roundabout way it does despite itself. The memo is not a binding statement of the law that the courts or DOJ are obliged to obey, but it nevertheless contributes to your mental state once you’ve read it. So you end up with this meta component of your mental state where you subjectively believe you lack criminal intent because you read the DOJ memo that says you lack criminal intent. Now you have a two-pronged argument: First, that the DOJ memo is actually correct on the law (good faith security research isn’t criminal intent) and, second, that, even if that’s not correct, that a meta-belief that you lack criminal intent collapses into a lack of criminal intent. This second argument has mixed results that usually correlate with the reasonableness of the meta-belief (which in this case would be extremely reasonable).)

SpaceLifeForm May 25, 2022 1:24 AM

hxtps://www.techdirt.com/2022/05/23/doj-changes-cfaa-policy-will-no-longer-bring-criminal-charges-against-security-researchers/

Clive Robinson May 25, 2022 5:19 AM

@ SpaceLifeForm, ALL,

Re: Techdirt article.

There is a big problem with what has been pushed out by the DoJ that others have just “reprinted” but have not picked up on an important point.

For instance this from the DoJ has been put on many Internet sites,

“Embellishing an online dating profile contrary to the terms of service of the dating website; creating fictional accounts on hiring, housing, or rental websites; using a pseudonym on a social networking site that prohibits them; checking sports scores at work; paying bills at work; or violating an access restriction contained in a term of service are not themselves sufficient to warrant federal criminal charges.”

Without a precautionary warning…

Is actually not quite as true as some may mistakenly think from reading “are not themselves sufficient to warrant federal criminal charges”…

Take the “creating fictional accounts on hiring…” technically it’s “fraud”, and as it almost certainly crosses state boundaries, it becomes a federal crime.

So all the DoJ are actually saying is “not under the CFAA” sections to do with a companies “policy” or “TOC/S” documents,

Nor does it preclude the companies starting prosecutions…

The CFAA is bad legislation that should be struck down in it’s entirety.

Because it was drafted at a time law makers did not have a clue about digital systems thus suffered from “chicken little syndrome”, and were to easily persuaded into legislating against the provoked fears rather than the actual reality.

This if further evidenced by the fact that well over a quater of a century later, it was still being abused by prosecutors. By “pretending” they did not understand what they were doing was an abuse, says much about them their motivations and mentality. Which is why I call the DoJ legals a bunch of psychopaths, as that is how too many of them behave.

name.withheld.for.obvious.reasons June 2, 2022 2:24 AM

Simply, YEAH! WTF has been the problem. But as always, the truth lies in some statute that has been weaponized in some other area of law that obviates the CFAA’s failures/features. DCMA comes to mind…

Anonymous January 18, 2024 12:55 PM

David Hume, identified justice as a response to three “circumstances of justice:”
1)moderate equality
2)moderate egoism
3)moderate scarcity

-from Ethics for a Broken World

Anonymous February 1, 2024 4:52 PM

@anonymous
“A system that does not protect me”

I think the system should provide food, water, shelter for the people who do not agree to your privacy policy.

Leave a comment

Login

Allowed HTML <a href="URL"> • <em> <cite> <i> • <strong> <b> • <sub> <sup> • <ul> <ol> <li> • <blockquote> <pre> Markdown Extra syntax via https://michelf.ca/projects/php-markdown/extra/

Sidebar photo of Bruce Schneier by Joe MacInnis.