Home | WebMail | Register or Login

      Calgary | Regions | Local Traffic Report | Advertise on Action News | Contact

Sign Up

Sign Up

Please fill this form to create an account.

Already have an account? Login here.

Science

'Messenger always gets shot': Hackers say the Canadian government doesn't want their help

The U.S. Department of Defence is encouraging well-intentioned hackers to look for flaws in its computer systems. Meanwhile, the Canadian government's stance on bug hunters remains unclear.

U.S. adopts friendlier policy to expose and fix online flaws, but Ottawa isn't talking

The Casino Rama Resort in Rama, Ont., says its customers, vendors and current and former staff should keep an eye on their bank accounts, credit cards and other financial information following a security breach. (Mal Langsdon/Reuters)

The U.S. Department of Defence has turned to well-intentioned hackers and independent security researchers to help the government agency find software bugs and vulnerabilities in its computer systems.

But in Canada, the government appears to still have no formal policy or public guidelines, which makes it difficult for those who do find flaws to know what to do, or how the government might respond.

"There's no formal process," says Imran Ahmad, a partner at the law firmMiller Thomson who works with clients on cybersecurity related issues. In the absence of such a process, he says, those who find flaws "just don't know how the government's going to react, and they just want to protect themselves."

"My advice to anyone who finds a flaw in a governmentwebsiteat this time would be to forget they ever saw it,"wrote web developer and security researcherKevinMcArthurin an email.

In the past, companies and governments often threatened security researchers and coders who found and published details about vulnerabilities in software with litigation, prompting the adoption of an informal process called "responsible disclosure."

'My advice to anyone who finds a flaw in a governmentwebsiteat this time would be to forget they ever saw it.'Kevin McArthur, security researcher and web developer

In practice, itmeans researchers will typically notify a company in private abouta bugand give that company time to fix the flawbefore disclosing its existence in part or full to the wider public.

In recent years, U.S. technology companies such as Facebook, Googleand Microsoft have offered financial incentives and bragging rights for the responsible disclosure of bugs through the creation of programs called bug bounties welcoming, rather than warring againstthe efforts of outside researchers who manage to penetrate their systems with the goal of making them safer.

The companies typically have guidelines for how far researchers are able to go in their search for flaws, outlining specifically what isallowedand providing assurance that a researcher won't be labelled a criminal for finding a serious flaw.

U.S. Secretary of Defence Ash Carter wrote in a Medium post that his department's new vulnerability disclosure policy would allow it to 'find and fix issues faster.' (Jonathan Ernst/Reuters)

Last Monday, the U.S. DoD announced a vulnerability disclosure policy, following a pilot project called "Hack the Pentagon" it organized earlier this year.

"For the first time, anyone who identifies a security issue on a DoD website will have clear guidance on how to disclose that vulnerability in a safe, secureand legal way,"Secretary of Defence Ash Carter wrote.

CBC News asked seven Canadian federal government agencies the departments of Finance; National Defence; Justice; Innovation, Science and Economic Development; Public Safety; Shared Services; and Canada Revenue Agency questions about their policies, but did not receive a response.

"There are a lot of good people who are better at coding, who are better at hacking, who are better at a lot of things than government resources allowthem to be," saidAhmadof the U.S., where the DoD's attitude has changed. "So, where in the past, you may want to jail someone for something like this, I think they're now moving towards bringing them into the fold, and even bringing them onto the team, instead of coming down hard on them."

Chilling effects

In 2014, a serious bug was discovered in the security software that underpinned hundreds of thousands of trusted websites. It was called Heartbleed, and researchers wasted little time determining which sites and services were vulnerable so that the hole could be patched.

Justin Bull a software engineer with the financial tech startup Wealthsimpleand a security enthusiast in his spare time noticed that software used by the CanadaRevenue Agency was also vulnerable. He says he spent about two hours attempting to contact various federal government agencies, finally leaving bothan encrypted e-mail and voice mail with the Canadian Cyber Incident Response Centre, or CCIRC.

The CCIRC operates within Public Safety Canada, and is the government's primary point of contact for tips on cyberattacks and other computer-related incidents, but the Centre's website does not specifically address the discovery and disclosure of software flaws.

"I never ever ever got a response," Bull said. "So when I was hearing that the RCMP was investigating I'm like 'Holy shit, is my door going to get kicked down?' Because I'm trying to tell them here, and I don't know what's going to happen."

"You don't want to anger the beast," he added. "I understand that chilling effect. The messenger always gets shot."

Similarly, McArthurcited the fallout from theRCMP'scase againstStephenSolis-Reyes, as one of the reasons he no longerdiscloses bugs to the Canadian government.

Like Bull, Solis-Reyes discovered that the CRA's websitewas vulnerable to Heartbleed, but he accessed 900 SIN numbers in the process. Solis-Reyes who was 19and astudent at Western University was investigated by the RCMP for the breach,accused of being a terrorist by his interrogators, and pleaded guilty inMaytofour charges.

Solis-Reyes told the court that he had no malicious intent, and only intended to test the bug's severity. His lawyer argued that he did the country a service by exposing the flaw.

"If you don't provide proof of actual vulnerability exploitation, then the problem is simply ignored and downplayed as theoretical," McArthur wrote of his own experiences bringing bugs to the government's attention, which has discouraged him from disclosing more.

"On the other hand, if you provide the government the required proof, like Solis-Reyes did by demonstrating the Heartbleed vulnerability at CRA, then they classifyyou as an evil hacker and you're heading for the police cells."