week 14 - wednesday. what did we talk about last time? legal protections for computer objects ...

39
CS363 Week 14 - Wednesday

Upload: edwin-pearson

Post on 25-Dec-2015

220 views

Category:

Documents


4 download

TRANSCRIPT

Page 1: Week 14 - Wednesday.  What did we talk about last time?  Legal protections for computer objects  Copyrights  Patents  Trade secrets

CS363Week 14 - Wednesday

Page 2: Week 14 - Wednesday.  What did we talk about last time?  Legal protections for computer objects  Copyrights  Patents  Trade secrets

Last time

What did we talk about last time? Legal protections for computer

objects Copyrights Patents Trade secrets

Page 3: Week 14 - Wednesday.  What did we talk about last time?  Legal protections for computer objects  Copyrights  Patents  Trade secrets

Questions?

Page 4: Week 14 - Wednesday.  What did we talk about last time?  Legal protections for computer objects  Copyrights  Patents  Trade secrets

Assignment 5

Page 5: Week 14 - Wednesday.  What did we talk about last time?  Legal protections for computer objects  Copyrights  Patents  Trade secrets

Project 3

Page 6: Week 14 - Wednesday.  What did we talk about last time?  Legal protections for computer objects  Copyrights  Patents  Trade secrets

Security tidbit of the day

Backdoor found in routers Some Netgear, Cisco, Linksys,

and Diamond routers based on a Sercomm hardware listen on an undocumented port (32764) Commands sent to this port

change settings on the routers without needing a password

Security researcher Eloi Vanderbeken discovered the backdoor when he needed to get administrative access to his family's router

Page 7: Week 14 - Wednesday.  What did we talk about last time?  Legal protections for computer objects  Copyrights  Patents  Trade secrets

But it gets better!

A firmware update "fixes" the backdoor The port no longer responds to messages

Unless! you "knock" by sending a specially crafted packet

This special packet was used in older Sercomm update tools

Verdict: the first backdoor was probably intentional And the new backdoor is just trying to hide it better

Follow the story: http://arstechnica.com/security/2014/04/easter-egg-dsl-router-patch-merely-hides-backdoor-instead-of-closing-it/

Page 8: Week 14 - Wednesday.  What did we talk about last time?  Legal protections for computer objects  Copyrights  Patents  Trade secrets

Information and the Law

Page 9: Week 14 - Wednesday.  What did we talk about last time?  Legal protections for computer objects  Copyrights  Patents  Trade secrets

Information as an object

Traditionally, actual things like cannon balls, horses, and eggplants were sold

Service industries such as hair stylist or accountant have existed for a long time as well

Information can also be sold, but it has different properties

Page 10: Week 14 - Wednesday.  What did we talk about last time?  Legal protections for computer objects  Copyrights  Patents  Trade secrets

Ways information is different Information is not depletable Information can be replicated (often exactly) Information has a small marginal cost

Marginal cost is the price to make another thing after you've made the first one

It's much lower for computer-based information▪ Reprinting a newspaper by hand is hard, but distributing

software is not The value of information is often time

dependent Information can be transferred intangibly

Page 11: Week 14 - Wednesday.  What did we talk about last time?  Legal protections for computer objects  Copyrights  Patents  Trade secrets

Information legal issues

Information has some value, but it is hard to pin down There are technological approaches to dealing with piracy, but we

need better legal remedies Electronic publishing

How do you protect content that you have published online only for subscribers?

They can copy the material and distribute it Data in a database

Courts can't figure out what is and isn't protected in a database Can some specific subset be protected? Databases often contain a great deal of public data

Electronic commerce How do you prove that a digital sale of electronic items actually

occurred? What if Steam took your money and didn't give you a game? There are essentially no legal ways to redress a situation where you pay

real money for equipment in Diablo 3 and don't get it

Page 12: Week 14 - Wednesday.  What did we talk about last time?  Legal protections for computer objects  Copyrights  Patents  Trade secrets

Protecting information

Statutes are laws that say that certain actions are illegal

Violating a statute can result in a criminal trial The goal is to punish the criminal

A tort is harm that does not come from violating a statute but still runs counter to precedents Perpetrators can be sued, usually for money

Contract law is another form of civil law It involves an offer, an acceptance, and a

consideration Contracts do not have to be written

Page 13: Week 14 - Wednesday.  What did we talk about last time?  Legal protections for computer objects  Copyrights  Patents  Trade secrets

Criminal vs. civil law

Criminal Law Civil Law

Defined by Statutes ContractsCommon law

Cases brought by Government

GovernmentIndividuals and

companies

Wrong party Society Individuals and companies

Remedy Jail or fine Damages, usually money

Page 14: Week 14 - Wednesday.  What did we talk about last time?  Legal protections for computer objects  Copyrights  Patents  Trade secrets

Employee and Employer Rights

Page 15: Week 14 - Wednesday.  What did we talk about last time?  Legal protections for computer objects  Copyrights  Patents  Trade secrets

Who owns what?

If you are paid to develop software, the company owns the software

If you write code in your free time, it is possible that your job can still claim a piece of it (especially if you used any of their hardware or software)

If you are a consultant who writes a program for a client and then further develop it yourself, it's complicated

Page 16: Week 14 - Wednesday.  What did we talk about last time?  Legal protections for computer objects  Copyrights  Patents  Trade secrets

Patents and copyrights

The inventor is the entity that owns the patent Who is the inventor? It matters whether your employer files the patent or if you

do In general, when you create something, you hold the

copyright The exception is a work for hire situation which

exists when some or all of the following apply: The employer has a supervisory relationship The employer has the right to fire you The employer arranges for the work to be done before it is

created A written contract states that the employer has hired you

to do certain work

Page 17: Week 14 - Wednesday.  What did we talk about last time?  Legal protections for computer objects  Copyrights  Patents  Trade secrets

Licenses and contracts

Your agreement with your employer can spell out a licensed software arrangement

In these situations, you own the software you develop, but your employer pays for a license to use it

Employment contracts often cover who owns what and whether the situation is work for hire or licensed software

Some contracts have non-compete clauses, which prevent you for working in the same field for some period of time after you quit

Page 18: Week 14 - Wednesday.  What did we talk about last time?  Legal protections for computer objects  Copyrights  Patents  Trade secrets

Software Failures

Page 19: Week 14 - Wednesday.  What did we talk about last time?  Legal protections for computer objects  Copyrights  Patents  Trade secrets

Software failures

What are the legal issues for selling correct and usable software?

What are the moral and ethical issues in producing correct and usable software?

What are the moral and ethical issues in reporting and fixing software flaws?

Software complaints can come in three kinds: The media was bad (easy fix) The software worked the way it was supposed to, but

I don't like it The software didn't work on my system

Page 20: Week 14 - Wednesday.  What did we talk about last time?  Legal protections for computer objects  Copyrights  Patents  Trade secrets

Refunds

Unlike many consumer goods, you can't check out the software at the store

Legally, you have the right to a refund if you feel that the company did not meet the contract of purchase In theory, you can claim the company did not

meet the contract if their software just isn't very good

Companies do not like to give refunds because you could keep the software installed on your computer

Page 21: Week 14 - Wednesday.  What did we talk about last time?  Legal protections for computer objects  Copyrights  Patents  Trade secrets

Demands for better quality It is hard to legally force a company to make

better software (or even demand a patch to fix specific problems) for a number of reasons: Popular software usually works reasonably well for

most people▪ Otherwise, it wouldn't be popular

Large software developers have more money to spend on lawyers than you do

In cases when the courts rule against software developers, the awards are money, not better software

Developers have small incentives to fix small problems

Page 22: Week 14 - Wednesday.  What did we talk about last time?  Legal protections for computer objects  Copyrights  Patents  Trade secrets

Reporting flaws

Researchers and users should report flaws to companies so that they can be fixed, but there is disagreement about how public the reporting is

Developers want the vulnerabilities secret as long as possible so that a small number of patches can fix many vulnerabilities

Users want more pressure on developers to fix problems quickly

Researchers have suggested guidelines to reach a compromise between these two groups

Page 23: Week 14 - Wednesday.  What did we talk about last time?  Legal protections for computer objects  Copyrights  Patents  Trade secrets

Computer Crime

Page 24: Week 14 - Wednesday.  What did we talk about last time?  Legal protections for computer objects  Copyrights  Patents  Trade secrets

Computer crime

Computer crime needs new definitions for crime Traditional crime focuses on crimes

against people (murder) or crimes against objects (theft)

Copying software is not traditional theft because no tangible object is missing

Computer trespassing has a similar problem

Evidence of computer crime is difficult to authenticate

Page 25: Week 14 - Wednesday.  What did we talk about last time?  Legal protections for computer objects  Copyrights  Patents  Trade secrets

Value of data and privacy Early cases did not recognize the value of

confidentiality and integrity of data Instead, the crimes had to be put in terms of stolen time

on a computer system Newer laws and precedents protect privacy, but not

as broadly as they should Old cases considered the value of data the same as

the paper it was printed on Newer standards have given data significant

monetary value But how much is any given data really worth?

Civil suits tend to move faster than criminal cases in updating standards

Page 26: Week 14 - Wednesday.  What did we talk about last time?  Legal protections for computer objects  Copyrights  Patents  Trade secrets

Difficulties in prosecuting computer crime

Lack of understanding Judges, lawyers, police, and jurors may poorly understand

computers Lack of physical evidence

No bloody murder weapon Lack of recognition of assets

Value of data is difficult to gauge Lack of political impact

No big headlines Complexity of cases

Hard to present technical details to a jury in order to make a case

Age of defendant Many computer criminals are young

Page 27: Week 14 - Wednesday.  What did we talk about last time?  Legal protections for computer objects  Copyrights  Patents  Trade secrets

Computer Statute Examples

Page 28: Week 14 - Wednesday.  What did we talk about last time?  Legal protections for computer objects  Copyrights  Patents  Trade secrets

Example statutes

U.S. Computer Fraud and Abuse Act Enacted in 1984 and covers:▪ Unauthorized access to a computer with national defense

information▪ Unauthorized access to a computer containing banking data▪ Unauthorized access to a computer operated by the U.S.

government▪ Accessing any "protected computer" without permission, a standard

that now includes any computer connected to the Internet▪ Computer fraud▪ Transmitting code that damages computer systems▪ Trafficking computer passwords

U.S. Economic Espionage Act Enacted in 1996 to prevent use of a computer to do

espionage for a foreign government

Page 29: Week 14 - Wednesday.  What did we talk about last time?  Legal protections for computer objects  Copyrights  Patents  Trade secrets

Example statutes

U.S. Electronic Funds Transfer Act Prohibits trafficking in stolen or counterfeit debit

instruments (credit card numbers, bank account information) for interstate or foreign commerce

U.S. Freedom of Information Act Requires government departments to disclose

information about their workings unless it would pose a national security risk or violate personal privacy

California Breach Notification Requires companies doing business in California to

notify any California citizens whose data has been compromised in an attack

Many states now have similar laws

Page 30: Week 14 - Wednesday.  What did we talk about last time?  Legal protections for computer objects  Copyrights  Patents  Trade secrets

Privacy acts (mentioned already) U.S. Privacy Act

Enacted in 1974 to limit the amount and uses of personal information the government collects

U.S. Electronic Communications Privacy Act Enacted in 1986 to protect citizens from

government wiretapping without a warrant Gramm-Leach-Bliley

Enacted in 1999 to protect the privacy of customers of financial institutions

HIPAA Enacted in 1996 to protect the privacy of individual

medical records

Page 31: Week 14 - Wednesday.  What did we talk about last time?  Legal protections for computer objects  Copyrights  Patents  Trade secrets

More example statutes

USA Patriot Act Passed in 2001 in the wake of 9/11 Allows laws enforcement to wiretap if they can show to a court

that the target is probably the agent of a foreign power Amended the U.S. Computer Fraud and Abuse Act to make

damaging a protected computer a felony Controlling the Assault of Non-Solicited Pornography and

Marketing (CAN SPAM) Act Bans false or misleading SMTP headers Prohibits deceptive subject lines Requires commercial e-mails to give an opt-out method Bans the sale or transfer of e-mails of those who have opted out Requires commercial e-mails to be identified as advertisements Has no effect on spam coming from overseas

Page 32: Week 14 - Wednesday.  What did we talk about last time?  Legal protections for computer objects  Copyrights  Patents  Trade secrets

Other Computer Crime Issues

Page 33: Week 14 - Wednesday.  What did we talk about last time?  Legal protections for computer objects  Copyrights  Patents  Trade secrets

Computer criminals are hard to catch

Much of the crime is international, and there are no international computer laws Although many countries cooperate to catch

criminals, there are safe havens where they cannot be arrested

Technical problems make them hard to catch Attacks can be bounced through many

intermediaries, each requiring their own search warrant

The right network administrators has to be given the warrant (and he or she might not keep good records)

Page 34: Week 14 - Wednesday.  What did we talk about last time?  Legal protections for computer objects  Copyrights  Patents  Trade secrets

Cryptography and the law Many countries have controls on the use of cryptography

Governments want cryptography they can break so that they can catch criminals

Laws are hard to enforce for individuals, especially now that the instructions for coding up AES are widely available

Until 1998, export of cryptography in the US was covered under laws preventing the export of weapons of war This definition changed, although there are still export

restrictions There were never any restrictions on the use of cryptography in

the US Absurdly, the government said that object code was subject to

export restriction, but printed source code was an idea and therefor not

Page 35: Week 14 - Wednesday.  What did we talk about last time?  Legal protections for computer objects  Copyrights  Patents  Trade secrets

Escrowed cryptography

The government made proposals to relax export rules for escrowed encryption With escrowed encryption, the government is

given copies of all the keys used to protect all transmissions, but promises to use them only with court authorization

Three well known proposals for these systems were Clipper, Capstone, and Fortezza

These proposals were not adopted because of public distrust of what the government might do with all the keys

Page 36: Week 14 - Wednesday.  What did we talk about last time?  Legal protections for computer objects  Copyrights  Patents  Trade secrets

Current cryptographic policies In 1996, the National Research Council made the

following recommendations: No law should ban the use of any encryption inside the US Export controls should be relaxed 56-bit DES (and similar levels of encryption) should be easily

exportable Escrowed encryption isn't a mature technology Laws should be enacted to punish the use encryption to

commit crimes In 1998, the government

Allowed export of DES virtually everywhere Allowed unlimited size encryption to 45 industrial countries

for financial institutions, medical providers, and e-commerce Made applying for permission to export a simpler process

Page 37: Week 14 - Wednesday.  What did we talk about last time?  Legal protections for computer objects  Copyrights  Patents  Trade secrets

Upcoming

Page 38: Week 14 - Wednesday.  What did we talk about last time?  Legal protections for computer objects  Copyrights  Patents  Trade secrets

Next time…

Finish legal issues Ethical issues in computers

Page 39: Week 14 - Wednesday.  What did we talk about last time?  Legal protections for computer objects  Copyrights  Patents  Trade secrets

Reminders

Keep reading Chapter 11 Finish Assignment 5

Due Friday before midnight Keep cracking each other's Project 3