Is it legal to use Firesheep at Starbucks?
Legal experts debate legality of Firefox add-on that steals Facebook, Twitter account access at public hot spots
Computerworld - People using the Firesheep add-on may be breaking federal wiretapping laws, legal experts said today.
Or maybe not.
"I honestly don't know the answer," said Phil Malone, a clinical professor of law at Harvard Law School as well as the director of the school's Cyberlaw Clinic at the Berkman Center for Internet and Society. Malone also served for more than 20 years as a federal prosecutor with the U.S. Department of Justice.
Firesheep, which was released just over a week ago and has been downloaded nearly half a million times since, is an add-on to Mozilla's Firefox browser that identifies users on an open network -- such as a coffee shop's public Wi-Fi hot spot -- who are visiting an unsecured Web site.
But while the tool itself is not illegal, using it may be a violation of federal wiretapping laws and an invasion of privacy, experts said.
"There are two schools of thought," said Jonathan Gordon, a partner in the Los Angeles office of law firm Alston & Bird. "The first is that there's no reasonable expectation of privacy in a public insecure Wi-Fi connection."
Gordon, who regularly counsels clients on their Internet business practices, cited the U.S. statute pertaining to wiretapping, which states that it's not a violation of the law "to intercept or access an electronic communication made through an electronic communication system that is configured so that such electronic communication is readily accessible to the general public."
But a second school of thought, said Gordon, "is that when people are accessing their social network [account], they have an expectation that whatever they're doing is governed by the privacy settings in that network." In other words, the fact that accessing a site takes place in an unsecure environment is beside the point.
Gordon acknowledged that the second position was held by a minority of legal experts.
Scott Christie, a partner in the Newark, N.J., office of law firm of McCarter & English, is in that minority, and he said that using tools such as Firesheep -- dubbed "packet-sniffers" -- is illegal.
"Do people have a reasonable expectation of privacy when they're at a public node? The answer is probably yes," said Christie. "They don't forfeit their expectation of privacy simply by using a public Wi-Fi spot. And wiretap laws in general make it illegal to intercept real-time communications and content."
But privacy laws were not crafted to cover scenarios where the owner of the data -- in the Firesheep example, people accessing their Facebook accounts at an unsecured hot spot -- didn't take steps to protect their information.
That's one of the reasons why the legality of Firesheep, and other tools like it, remains up in the air.
"It's an unsettled legal issue, but it will be tested at some point," Christie said. "Like many other situations, this is one of those areas where the law was crafted prior to the Internet age, and the courts will have to catch up."
Gordon agreed. "It may be difficult [to clarify this], but it will happen," he said.
- Enable secure remote access to 3D data without sacrificing visual perfomance Design and manufacturing companies must adapt quickly to the demands of an increasingly global and competitive economy. To speed time to market for...
- Virtually Delivered High Performance 3D Graphics "A picture is worth a thousand words." That old phrase is as true today as it ever was. Pictures (i.e., those with heavy...
- Best Practices for Securing Hadoop Historically, Apache Hadoop has provided limited security capabilities. To protect sensitive data being stored and analyzed in Hadoop, security architects should use a...
- Top Tips for Securing Big Data Environments: Why Big Data Doesn't Have to Mean Big Security Challenges Organizations must come to terms with the security challenges they introduce. As big data environments ingest more data, organizations will face significant risks...
- What should I look for in a Next Generation Firewall? SANS Provides Guidance With so many vendors claiming to have a Next Generation Firewall (NGFW), it can be difficult to tell what makes each one different....
- Responding to New SSL Cybersecurity Threat The featured Gartner research examines current strategies to address new SSL cybersecurity threats and vulnerabilities. All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!