{"id":178758,"date":"2018-08-27T19:11:00","date_gmt":"2018-08-28T00:11:00","guid":{"rendered":"https:\/\/www.panix.com\/~msaroff\/40years\/2018\/08\/27\/like-at-dmca-takedown-notices-on-acid\/"},"modified":"2018-08-27T19:11:00","modified_gmt":"2018-08-28T00:11:00","slug":"like-at-dmca-takedown-notices-on-acid","status":"publish","type":"post","link":"https:\/\/www.panix.com\/~msaroff\/40years\/2018\/08\/27\/like-at-dmca-takedown-notices-on-acid\/","title":{"rendered":"Like at DMCA Takedown Notices \u2026\u2026\u2026 On Acid"},"content":{"rendered":"<div>It appears that abuse and misuse of the DMCA, with its lawsuits against printer ink manufacturers and <a href=\"https:\/\/en.wikipedia.org\/wiki\/Prenda_Law\">extortion by corrupt lawyers<\/a> has not informed the people in Washington, DC, who want to <a href=\"http:\/\/nymag.com\/selectall\/2018\/08\/legislators-consider-hacking-back-and-revenge-hack.html\">legalize revenge hacking<\/a>, which, of course, will be outsourced to incompetent and malicious contractors:<\/div>\n<blockquote><p><span style=\"color: blue;\">Imagine this: Facebook is set to release a slew of shiny new features designed to win back users and increase engagement. But before it can release its products, <a href=\"http:\/\/www.renren-inc.com\/en\/\">Renren<\/a> (one of China\u2019s Facebook clones) releases the same features across its platform, beating Facebook to the punch. Infuriated, Facebook security officials claim they know with near certainty that their plans were stolen by a hacker on behalf of the Chinese social-media giant. Some furious employees put in motion a plan to load a devastating malware attack on the hackers\u2019 networks as payback. <\/p>\n<p>Is that even legal? Can Facebook retaliate with a hack of its own? Under current U.S. law, the answer is no, but a growing number of legislators are attempting to change that. Yesterday, Rhode Island Democratic senator Sheldon Whitehouse became the most recent lawmaker to express support for revenge hacking. <\/p>\n<p>\u201cWe ought to think hard about how and when to license hack-back authority so capable, responsible private-sector actors can deter foreign aggression,\u201d <a href=\"https:\/\/www.cyberscoop.com\/hack-back-sheldon-whitehouse-senate-judiciary-committee\/\">Whitehouse said<\/a>. \u201cIf [a major CEO] wanted permission to figure out how to hack back, I don\u2019t think he\u2019d know what agency\u2019s door to knock on to actually give him an answer.\u201d <\/p>\n<p><a href=\"http:\/\/www.slate.com\/articles\/technology\/future_tense\/2017\/10\/hacking_back_the_worst_idea_in_cybersecurity_rises_again.html\">Hacking back<\/a> (also known as revenge hacking) involves a retaliatory response by a private company or an individual after they are attacked by a malicious actor. While anyone can monitor and enforce their own network and devices, the <a href=\"https:\/\/www.law.cornell.edu\/uscode\/text\/18\/1030\">Computer Fraud and Abuse Act<\/a> prevents people from going a step further and hacking into someone else\u2019s network, even if they were hacked first. In his recent book, <a href=\"javascript:void(0)\">The Perfect Weapon<\/a>, journalist David Sanger likens hacking back to a retaliatory home invader. <\/p>\n<p>\u201cIt\u2019s illegal, just as it\u2019s illegal to break into the house of someone who robbed your house in order to retrieve your property,\u201d Sanger writes.<\/span><\/p><\/blockquote>\n<p>The idea that legalizing hacking by Mark Zuckerberg and Jeff Bezos will make anyone any safer is a corrupt fiction.<\/p>\n<p>They&#8217;re Bond villains, and granting them immunity to pull this crap will end in tragedy.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>It appears that abuse and misuse of the DMCA, with its lawsuits against printer ink manufacturers and extortion by corrupt lawyers has not informed the people in Washington, DC, who want to legalize revenge hacking, which, of course, will be outsourced to incompetent and malicious contractors: Imagine this: Facebook is set to release a slew &hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[395,588,449,541,406],"class_list":["post-178758","post","type-post","status-publish","format-standard","hentry","tag-computer","tag-fail","tag-legislation","tag-security","tag-stupid"],"_links":{"self":[{"href":"https:\/\/www.panix.com\/~msaroff\/40years\/wp-json\/wp\/v2\/posts\/178758"}],"collection":[{"href":"https:\/\/www.panix.com\/~msaroff\/40years\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.panix.com\/~msaroff\/40years\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.panix.com\/~msaroff\/40years\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.panix.com\/~msaroff\/40years\/wp-json\/wp\/v2\/comments?post=178758"}],"version-history":[{"count":0,"href":"https:\/\/www.panix.com\/~msaroff\/40years\/wp-json\/wp\/v2\/posts\/178758\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.panix.com\/~msaroff\/40years\/wp-json\/wp\/v2\/media?parent=178758"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.panix.com\/~msaroff\/40years\/wp-json\/wp\/v2\/categories?post=178758"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.panix.com\/~msaroff\/40years\/wp-json\/wp\/v2\/tags?post=178758"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}