PROTECT-IP, SOPA, and the real threat to national security

A substantial portion of the broader technology policy community has stepped up its efforts to raise awareness of the current debate surrounding the PROTECT-IP Act, pending in the Senate, and the Stop Online Piracy Act (SOPA), pending in the House. Our friends over at the Center for Democracy and Technology have produced an excellent summary of opposition views from a broad range of interested parties, including public-interest advocates like the EFF and ACLU, law professors, and the Global Network Initiative. We at StopBadware are squarely opposed to both bills.

Others have identified the manifold ways in which the bills violate traditional norms of notice, disregard procedural and substantive due process, seriously undermine hosting provider immunity under the CDA and DMCA, and threaten the health of the global Domain Name System. The House bill's co-sponsors, Reps. Lamar Smith (R-TX) and John Conyers (D-MI), seem oblivious to the the threat it poses, claiming it addresses "critical intellectual property issues that relate to national security, public health and safety, and the expansion of respect for intellectual property abroad".

To claim that the bill will meaningfully improve America's national security posture is preposterous on its face -- one must conflate risks to U.S. copyright holders with the national interest writ large — and, with the exception of rogue pharmacies, very few infringing websites facilitate threats to public health. But let's take SOPA’s sponsors at their word for a minute and consider it a given that they want to make a serious attempt to address these important issues. Why wouldn't they target websites distributing badware instead?

Let me be clear: even if, ceteris paribus, PROTECT-IP and SOPA targeted malware distributors rather than copyright infringers, they'd still be lousy bills. In all of its work, StopBadware strives to encourage private industry and regulators to respect the free speech and due process rights of Internet users, including web masters.

That said, Congress could do much more than it has to give the security community the power to take action (under strict judicial supervision) against operators of badware websites. Malware is indisputably a national security and public health issue. As we've mentioned before in The State of Badware, criminals can set up, co-opt, and maintain badware websites because control of the infrastructure that sustains them is split among webmasters, web hosting providers, ISPs, registrars, registries, and national governments. While security researchers can collect evidence of badware behavior on websites and inform appropriate parties (see our Best Practices for Badware Reporting for more on that), they have little power to compel these parties to take these reports seriously.

Imagine if Congress were to empower security researchers with civil causes of action like the ones PROTECT-IP and SOPA grant to copyright holders. For example, Congress might attempt any or all of the following:

  • require web hosting providers to disable access to malicious content they host;
  • require DNS providers to suspend nameserver services for domain names used primarily to spread badware;
  • require US-based registrars to suspend registrations of such domain names;
  • require US-based registries to revoke registrations of such domain names.

Drafting a statute like the above — one that respects issues of standing, free speech, and due process — would definitely pose a major challenge. (I suspect that's why Protect-IP and SOPA's sponsors made no attempt to do so.)  Practically speaking, bringing successful challenges against recalcitrant infrastructure operators could be an expensive, time-consuming endeavor. But it might produce better results than the status quo.

Why? A primary effect of the Computer Fraud and Abuse Act (18 U.S.C. 1030) is to make it a crime to infect computers with malware. From this we can infer that computer owners have a right to be free of malware. In practice, as we know, pursuing responsible parties, or even determining with certainty who they are, exceeds prosecutors' technical and logistical resources. It brings to mind an ancient and well-loved principle of equity — that there can be no right without a remedy. Congress should seriously consider creating remedies that support this right and enforce it against entities who are otherwise complicit.

An approach like the one I've sketched out isn't without its pitfalls. U.S. courts have very little experience with the malware threat landscape, and judicially sanctioned interventions against malware distributors have been chiefly limited to large botnet takedowns, frequently with the assistance of security researchers and large corporations. (See our write-up on the role of government and private parties in the Coreflood takedown here.) Most day-to-day badware website takedowns occur through private persuasion, not judicial compulsion.

Yet given the growth and persistence of badware websites, the security community should take a long, hard look at the existing system of badware report handling and ask itself if private self-regulation has been effective at stemming the tide of the malware onslaught. Consider the global WHOIS system, which was theoretically intended to link domain names and IP addresses to the people responsible for their use (or abuse). Any badware website reporter will tell you that WHOIS results are rarely the end of an inquiry, and frequently contain outdated or outright fraudulent information. This makes investigation much harder, and is still no guarantee that a complaint will receive an airing from any party, much less an appropriate resolution. In short, we have an accountability problem: one can cry 'malware' all one likes, and no one has to listen.

Not so in the courts. If fraud, deception, negligence, and organized crime are properly the province of the judiciary in meatspace, why not in cyberspace?

I present this image of government regulation to the cybersecurity community as an invitation to to prove to the U.S. government, and to the world, that it can bridge this trust and accountability gap themselves. StopBadware has always sought to help embody the change we seek in the Internet through voluntary, collaborative efforts with industry experts (as in our badware reporting and web hosting best practices work). But bills like PROTECT-IP and SOPA should remind us that when the Internet community fails to act, intrusive and ill-informed legislation may seek to ‘solve’ our problems for us.

In short, we agree with others in our community who have come out forcefully against PROTECT-IP and SOPA. Not only does it fail to solve the problems it identifies (and creates massive new ones), but reflects completely misguided thinking on the root causes of those problems and ignores approaches that might solve them. SOPA’s sponsors want to improve cybersecurity by giving copyright holders a license to 'kill' infringers with no notice. We'd have them do it by giving malware victims their day in court.

4 responses to

PROTECT-IP, SOPA, and the real threat to national security

Harvey says:

What do you mean by Badware? Do you mean sites that promote illegal activities like torrents and warez?

mulemba says:

you are so nice

Maxim says:

@Harvey: Badware is any software that fails to respect users' choices about how their computers or network connections are used. A badware website facilitates the distribution or operation of badware.

ÅŸahin says: