Monday, November 30, 2020

Cybercrime law goes to SCOTUS — Will defense policy bill create National Cyber Director? — Chris Krebs calls GOP election sabotage a 'travesty'

Delivered every Monday by 10 a.m., Weekly Cybersecurity examines the latest news in cybersecurity policy and politics.
Nov 30, 2020 View in browser
 
POLITICO's Weekly Cybersecurity newsletter logo

By Eric Geller

With help from Martin Matishak

Editor's Note: Weekly Cybersecurity is a weekly version of POLITICO Pro's daily Cybersecurity policy newsletter, Morning Cybersecurity. POLITICO Pro is a policy intelligence platform that combines the news you need with tools you can use to take action on the day's biggest stories. Act on the news with POLITICO Pro.

Quick Fix

— The Supreme Court will hear arguments today in a case that will determine how broadly prosecutors can apply a landmark cybercrime law.

— The pending fiscal 2021 defense policy bill is the last best hope for supporters of a National Cyber Director position.

— Former U.S. cyber chief Chris Krebs dismissed right-wing conspiracy theories about the presidential election in his first interview since President Donald Trump fired him.

HAPPY CYBER MONDAY to those who celebrate and welcome to Morning Cybersecurity! Your MC host was a big fan of Ahsoka Tano before her live-action debut on Friday's episode of "The Mandalorian," which is basically the nerd equivalent of loving a band before it goes mainstream. Send your thoughts, feedback and especially tips to egeller@politico.com, and be sure to follow @POLITICOPro and @MorningCybersec. Full team info below.

 

TRACK THE TRANSITION: President-elect Biden has started to form a Cabinet and announce his senior White House staff. The appointments and staffing decisions made in the coming days send clear-cut signals about Biden's priorities. Transition Playbook is the definitive guide to one of the most consequential transfers of power in American history. Written for political insiders, it tracks the appointments, people, and the emerging power centers of the new administration. Track the transition and the first 100 days of the incoming Biden administration. Subscribe today.

 
 
Supreme Court

OYEZ, OYEZ, OYEZ — For what may be the first time ever, the fate of a cybersecurity law rests in the hands of the Supreme Court. This morning, the nine justices will hear oral arguments in Van Buren v. United States , a case about whether the 1986 Computer Fraud and Abuse Act prohibits a person who is authorized to access a computer from using that access in an unauthorized way (such as to download and leak sensitive data). Supporters of the appellant, Nathan Van Buren, argue that reading the nation's only major cybercrime law in this way would create a precedent for criminalizing many innocent and beneficial acts, such as security research not specifically authorized by a website's terms of service. Supporters of the government argue that a strict interpretation of the law is necessary to deter theft and exposure of sensitive data.

The case could rest on how concerned the justices are about the slippery slope that technology, cybersecurity and privacy experts discuss in their amicus briefs. "If they're focused on hypotheticals far from the facts of this case, then that bodes well" for Van Buren, said Orin Kerr, a Berkley law professor who specializes in cybercrime and filed a brief supporting Van Buren's position. "The government's problem is that they don't have an obvious limiting principle: Their view sweeps incredibly broadly."

Andrew Crocker, a senior staff attorney at the Electronic Frontier Foundation who also filed a brief on Van Buren's side, noted "the kinds of innocuous things we all do on the Internet that [violate] terms of service or our employers' computer use agreements: fibbing on a social media profile, sharing streaming passwords, checking sports scores at work, and so on."

But supporters of the government are also concerned about a slippery slope — one that could result from narrowing the meaning of the CFAA's prohibition against behavior that "exceeds authorized access." The Federal Law Enforcement Officers Association, which filed a brief on the government's side, told MC that it would be listening for indications that the justices are concerned about doxing. "Where someone with access to law enforcement databases maliciously abuses that access to 'dox' law enforcement agents," the group said in a statement, "there may be no other obvious federal criminal remedies available to prosecute that very harmful wrongdoing." The FLEOA also argued that prosecutorial discretion will help avoid the worst-case scenarios imagined by CFAA critics, such as charges against people who lie about their weight on a dating service.

The Van Buren case's potential to reshape the breadth of the CFAA has attracted a diverse range of interested parties, with the Koch Brothers-backed Americans for Prosperity Foundation and the Reporters Committee for Freedom of the Press on one side and the Managed Funds Association and the Electronic Privacy Information Center on the other. The internet voting firm Voatz earned enmity in cyber circles for filing a brief on the government's side.

On the Hill

BACK FROM THE BREAK — Congress returns this week for a mad dash to wrap up their work before the end of the year. One major outstanding piece of business is the fiscal 2021 National Defense Authorization Act. The House and Senate versions of the massive policy bill contained dozens of policy recommendations proposed or inspired by the Cyberspace Solarium Commission — chief among them the creation of a Senate-confirmed National Cyber Director. The House draft, H.R. 6395, would establish the office, while the Senate version, S. 4049, included place-holder language that called for a study of the issue.

Lawmakers and staffers are bullish that some form of the position will be included in the final NDAA — which could be unveiled as early as this week — despite opposition from the Trump White House. There's also optimism that a top-to-bottom assessment of U.S. Cyber Command's forces will make the final cut.

The fate of the annual intelligence authorization bill is also wrapped up in the debate. The Senate attached its version of the bill to the chamber's NDAA. The House Intelligence Committee approved its version of the bill, H.R. 7856 , in July, but the full chamber has yet to pass it. With very few legislative vehicles left, the NDAA is one of the best shots for lawmakers to get something done.

Hanging over all of this, of course, is President Trump's threat to veto the must-pass defense bill if it contains language that would rename military bases and installations named after Confederate generals.

KREBS SPEAKS OUT — Even out of office, Chris Krebs is still debunking conservatives' false election-rigging conspiracy theories. Krebs, whom Trump fired as director of DHS' Cybersecurity and Infrastructure Security Agency on Nov. 17, shared his reaction to his firing and Trump allies' discredited claims in an interview broadcast Sunday on CBS' "60 Minutes." The use of paper ballots in states such as Georgia "thoroughly … debunks some of [the] sensational claims out there" about supposed vote-tampering software, Krebs said — claims that have been amplified by right-wing figures such as Trump lawyers Rudy Giuliani and Sidney Powell. "It's just — it's nonsense," said a clearly exasperated Krebs.

Republicans' demonization of the election process is a "travesty," said Krebs, a lifelong Republican, who noted that election officials have received death threats simply for doing their jobs. "There are some real heroes out there," he said. "There are some real patriots." When CBS' Scott Pelley asked Krebs what he thought of the news conference at which Giuliani breathlessly warned of vote-rigging, the former CISA director replied, "It was upsetting, because what I saw was a apparent attempt to undermine confidence in the election, to confuse people, to scare people."

FOLLOW THE RULES — Hackers are using email forwarding rules to hide evidence of their intrusions from their victims, the FBI warned in a private alert obtained by MC. "The web-based [email] client's forwarding rules often do not sync with the desktop client, limiting the rules' visibility to cyber security administrators," the bureau said in the alert issued late last week. "Cyber criminals then capitalize on this reduced visibility to increase the likelihood of a successful business email compromise." The FBI said it was issuing the Nov. 25 alert to raise the profile of the issue and warn corporate IT administrators to configure their networks so as not to miss these changes.

Not only do auto-forwarding rules help criminals carry out such schemes, which the FBI estimates to have caused more than $1.7 billion in global losses, but their sneaky nature can delay the remediation of a breach, because initial assessments after the discovery of a breach may miss these changes. The longer it takes to discover these forwarding rules, the FBI said, the more time hackers have to continue tricking employees and stealing money. Plus, the bureau added, "cyber criminals may also use auto-forwarding rules to delete records from the recycle bin to further obfuscate their activities."

AND NOW FOR SOME GOOD NEWS — Nigerian police, with the assistance of INTERPOL, have arrested three men who allegedly participated in a cybercrime group that distributed malware, conducted phishing attacks and ran scams targeting businesses. The "prolific gang" has used 26 malware variants, including AgentTesla, Loki, Azorult and Spartan, to hack companies and government agencies in more than 150 counties since 2017, INTERPOL said last Wednesday. Investigators continue to piece together their operations but have already identified roughly 50,000 targets. As part of INTERPOL-led "Operation Falcon," investigators worked with the security firm Group-IB to gather information about the cybercrime gang's structure and process data from breach investigations.

TWEET OF THE LONG WEEKEND — Kind of funny, in a bleak way.

 

NEXT WEEK - DON'T MISS THE MILKEN INSTITUTE FUTURE OF HEALTH SUMMIT 2020: POLITICO will feature a special edition Future Pulse newsletter at the Milken Institute Future of Health Summit. The newsletter takes readers inside one of the most influential gatherings of global health industry leaders and innovators determined to confront and conquer the most significant health challenges. Covid-19 has exposed weaknesses across our health systems, particularly in the treatment of our most vulnerable communities, driving the focus of the 2020 conference on the converging crises of public health, economic insecurity, and social justice. Sign up today to receive exclusive coverage from December 7–9.

 
 


Quick Bytes

The New York Times looks at the damage that cyberattacks are wreaking at hospitals.

Reuters: Hackers likely linked to the North Korean government have tried to breach the pharmaceutical giant AstraZeneca, which developed one of the three effective coronavirus vaccines.

Baltimore Sun: It may take weeks for Baltimore's school system to recover from a "catastrophic" ransomware attack.

Improvements to the FBI's cyber victim notification process are among the unresolved inspector general recommendations at the Justice Department.

House Democrats asked the leaders of agencies including the CIA and the NSA for information about political appointees who have been converted to career staffers to outlast Trump's departure.

CyberScoop: Networking vendor Belden said hackers accessed employee and customer data.

Associated Press: Denmark's biggest news service is refusing to pay a ransom to regain access to its systems.

That's all for today.

Stay in touch with the whole team: Eric Geller (egeller@politico.com, @ericgeller); Bob King (bking@politico.com, @bkingdc); Martin Matishak (mmatishak@politico.com, @martinmatishak); and Heidi Vogt (hvogt@politico.com, @heidivogt).

 

Follow us on Twitter

Heidi Vogt @HeidiVogt

Eric Geller @ericgeller

Martin Matishak @martinmatishak

 

Follow us

Follow us on Facebook Follow us on Twitter Follow us on Instagram Listen on Apple Podcast
 

To change your alert settings, please log in at https://www.politico.com/_login?base=https%3A%2F%2Fwww.politico.com/settings

This email was sent to edwardlorilla1986.paxforex@blogger.com by: POLITICO, LLC 1000 Wilson Blvd. Arlington, VA, 22209, USA

Please click here and follow the steps to unsubscribe.

No comments:

Post a Comment