[Infowarrior] - Federal Judge in DefCon Case Equates Speech with Hacking
Richard Forno
rforno at infowarrior.org
Sun Aug 10 14:21:59 UTC 2008
Federal Judge in DefCon Case Equates Speech with Hacking
By Kim Zetter EmailAugust 10, 2008 | 6:55:40 AM
http://blog.wired.com/27bstroke6/2008/08/eff-to-appeal-r.html
LAS VEGAS -- Lawyers with the Electronic Frontier Foundation said a
federal judge who granted a temporary restraining order on Saturday to
halt a scheduled conference talk about security vulnerabilities came
to "a very, very wrong conclusion." They said the judge's order
constituted illegal prior restraint, which violated the speakers'
First Amendment right to discuss important and legitimate academic
research.
"When you discuss security issues, if you are telling the truth, that
should be something protected at the core of the First Amendment,"
said Kurt Opsahl, senior staff attorney for the non-profit EFF. "If
you are truthfully telling the world about a dangerous situation, and
(it is) a situation which is dangerous not because the security
researcher exposes the vulnerability (but) because the person who made
the product . . . made the vulnerability, (then) this should be core
speech."
Opsahl was speaking at a press conference at the DefCon hacker
conference in Las Vegas on Saturday after District Judge Douglas
Woodlock of the U.S. District Court in Massachusetts granted a
temporary restraining order requested by the Massachusetts Bay Transit
Authority.
The MBTA sought to bar three students enrolled at the Massachusetts
Institute of Technology -- Zack Anderson, R.J. Ryan and Alessandro
Chiesa -- from presenting a talk at DefCon about vulnerabilities in
magnetic stripe tickets and RFID cards that are used in the MBTA's
payment system. The MBTA feared that the students planned to teach the
audience how to fraudulently add credit to a payment ticket or card in
order to ride the transit system for free.
Opsahl said the judge, in making his decision, misinterpreted a part
of the federal Computer Fraud and Abuse Act that refers to computer
intruders or hackers. Such a person is described in part in the
statute as someone who "knowingly causes the transmission of a
program, information, code, or command to a computer or computer
system."
Opsahl says the judge, during the hearing, likened the students'
conference presentation to transmitting code to a computer.
"The statute on its face appears to be discussing sending code or
similar types of information to a computer," Opsahl said. "It does not
appear to contemplate somebody who is giving a talk to humans.
Nevertheless, the court . . . believed that the act of giving a
presentation to a group of humans was covered by the computer fraud,
computer intrusion statute. We believe this is wrong."
EFF staff attorney Marcia Hoffman told reporters that the decision set
a very dangerous precedent.
"Basically, what the court is suggesting here is that giving a
presentation involving security to other security researchers is a
violation of federal law," she said. "As far as I know, this is
completely unprecedented, and it has a tremendous chilling effect on
sharing this sort of research. . . . And we intend to fight it with
everything we've got."
The students were scheduled to present their talk on Sunday about
vulnerabilities in the subway's fare collection system. According to a
description of the talk in a printed program given to conference
attendees, the students planned to demonstrate how they reverse-
engineered the mag stripe on CharlieTickets and cracked the encryption
on RFID-enabled CharlieCards that are used in the Boston system. They
also planned to release several open source tools that they created in
the course of their research.
But the MBTA contended that disclosure of the flaws, before the MBTA
had a chance to fix them, would cause irreparable harm to the transit
system, particularly if it allowed someone to increase the amount of
funds stored on a card or ticket and ride the transit system for free.
The MBTA filed its motion for a restraining order on Friday, August
9th, but Opsahl and Hofmann said that rather than make an immediate
decision, District Judge Woodlock ordered a hearing for Saturday
morning and allowed the EFF, which represented the students, to
participate by telephone from San Francisco, even though none of the
non-profit's lawyers is licensed to practice in Massachusetts.
The court's restraining order bars the students from disclosing any
information for ten days that could allow someone to defraud the
transit system and ride the subway for free.
EFF lawyers and the students refused to discuss details of the now-
cancelled presentation but did provide a timeline of events leading up
to the MBTA's suit and also shed light on how the matter unfolded,
disputing claims in the MBTA's court filings that the students had
refused to give the MBTA information about the vulnerabilities they
discovered.
According to MBTA's court filings, the agency first learned about the
planned presentation on July 30th. The next day the agency contacted
MIT computer science professor Ron Rivest, the students' instructor,
and told him that the FBI was investigating the issue.
"We didn't find that to be a very pleasing way to start a nice
dialogue with them<" Anderson said. "We got a little concerned about
what was happening."
A few days later on Monday, August 4, a detective with the transit
police and an FBI agent met with the MIT students, Rivest, and an MIT
lawyer to discuss their concerns and inquire about the nature of the
student's talk. The students say when they left that meeting they
believed, due to verbal comments made to them during the meeting, that
the issue had been resolved, and that the MBTA no longer had a problem
with their talk. [Note: A previous story said the parties had met on
August 5th, a date listed in MBTA's court filings. The students said
that date was a misprint.]
The FBI's Boston office did not respond to a call asking to confirm if
there is an ongoing investigation of the students, but Opsahl said as
far as he knows, there is no FBI investigation.
Efforts to reach the MBTA for comment were not successful, but
according to the MBTA's court filings, the students failed to respond
to a request to provide the transit authority with copies of the
conference presentation or with details about the vulnerabilities they
found in the payment card system, and this was the reason for taking
the students to court.
But the students say this isn't true.
They say the MBTA did ask for some material -- not a copy of their
conference presentation -- which they provided on Friday, around the
same time the MBTA was heading to the courthouse to request the
restraining order.
The material, it turns out, was a confidential vulnerability
assessment report (.pdf) describing, in a more substantial way than
the conference presentation slides do, the flaws in the MTBA payment
system. The report became a public document on Saturday when the MBTA
included it among other papers it submitted to the court on Saturday.
The students maintain they didn't understand that the MBTA was
expecting a copy of their presentation until Friday, when they learned
the MBTA was filing for a restraining order.
"And at that point we declined to provide the slides until we had an
opportunity to see what the complaint said," Hofmann said.
Even though the MBTA received the vulnerability assessment report at
that point, the students point out, it did not withdraw the lawsuit.
The students say they had intended to contact the MBTA a week prior to
July 30th, when the transit authority was still apparently unaware of
the presentation. They refused to say what occurred at that time to
prompt them to want to make contact with the MBTA, but said their
intent was to provide the MBTA with details that they wouldn't be
discussing in their public talk. Ultimately, however, they didn't act
on the impulse because Rivest, who agreed to facilitate the contact,
was out of town at a conference. Shortly thereafter, the MBTA
discovered the talk and contacted Rivest.
The students maintain that they never intended to teach audience
members how to de-fraud the transit system, despite provocative
comments they wrote in the published description of their talk.
A description of their talk that is printed in the conference program
schedule begins with the sentence "Want free subway rides for life?"
The line was removed from an online version of the description after
the MBTA met with the students on August 4th, but the students
wouldn't comment about why the change was made.
Opsahl called the provocative language "rhetoric" and said it was
always the students' intention to hold back key details from their
talk that would help someone attack the MBTA system.
"Please understand that, rhetoric aside, the intention was to provide
an interesting and useful talk, but not one that would enable people
to defraud the Massachusetts Bay Transit System," he said.
As it stands now, the next step, before the temporary restraining
order expires, will be to determine whether or not it should become a
preliminary injunction to extend the gag for longer, Opsahl said.
Hofmann said it's unclear right now whether the EFF will continue to
represent the students if further litigation is pursued, given that
they have no one on staff who can practice in Massachusetts. They will
have to evaluate the situation when and if it comes up.
As for the students' 1 pm speakers' slot on Sunday, DefCon has
apparently already found a replacement. Brenno de Winter, a Dutch
journalist and security consultant, told reporters on Saturday that he
has offered to fill in -- essentially to give the same or a similar
talk about vulnerabilities with transit fare cards, thought without
the focus on the Boston transit system.
More information about the Infowarrior
mailing list