Transforming the Computer Misuse Act 1990 to support vulnerability research? Proposal for a defence for hacking as a strategy in the fight against cybercrime

Audrey Guinchard
2018 Journal of Information Rights Policy and Practice  
Despite the recent push towards security by design, most softwares and hardwares on the market still include numerous vulnerabilities, i.e. flaws or weaknesses whose discovery and exploitation by criminal hackers compromise the security of the networked and information systems, affecting millions of users, as acknowledged by the 2016 UK Government in its Cybersecurity Strategy.Conversely, when security researchers find and timely disclose vulnerabilities to vendors who supply the IT products or
more » ... who provide a service dependent on the IT products, they increase the opportunities for vendors to remove the vulnerabilities and close the security gap. They thus significantly contribute to the fight against cybercrime and, more widely, to the management of the digital security risk.However, in 2015, the European Network and Information Security Agency concluded that the threat of prosecution under EU and US computer misuse legislations 'can have a chilling effect', with security researchers 'discentivise[d]' to find vulnerabilities.Taking stock of these significant, but substantially understudied, criminal law challenges that these security researchers face in the UK when working independently, without the vendors' prior authorisation, this paper proposes a new defence to the offences under the Computer Misuse Act, an innovative solution to be built in light of both the scientific literature on vulnerability research and the exemption proposals envisaged prior to the Computer Misuse Act 1990. This paper argues that a defence would allow security researchers, if prosecuted, to demonstrate that contrary to criminal hackers, they acted in the public interest and proportionally.
doi:10.21039/irpandp.v2i2.36 fatcat:wavr4zbhyjaftgs6k56xj4jhii