Feeds

US court rules IP address cloaks may break law

'Published' might not mean 'available to anyone'

The Power of One Infographic

If you're a normal Internet user, you probably think you have the right to access anything that's put before the public. Not any more, at least in America, where the Computer Fraud and Abuse Act has been invoked to support a user-specific ban on accessing a Website, and in which the use of a proxy to circumvent a block has been ruled illegal.

The decision was issued in a spat between Craigslist and screen-scraper 3Taps. As noted in the judgement, 3Taps was sucking down all of Craigslist's classifieds, offering an API to third parties, and created craiggers.com which the judgement says “replicated the entire Craigslist website”.

Objecting to this, the classifieds site first blocked 3Taps and then sent it a cease-and-desist. When 3Taps turned to using proxies to circumvent the ban, Craigslist then took the case to the US district court of Northern California. It asked the court to find two things: that the violation of its terms and conditions brought 3Taps under the purview of the Computer Fraud and Abuse Act (CFAA); and that circumventing the ban by disguising its IP address also broke the CFAA.

On the terms and conditions question, Craigslist was rebuffed. However, in a decision that will send chills to anyone using a proxy to get around geoblocks, the court thought otherwise about circumventing the ban on 3Taps accessing Craigslist: “under the plain language of the statute, 3Taps was 'without authorization' when it continued to pull data off of Craigslist’s website after Craigslist revoked its authorization to access the website. As the 'ordinary, contemporary, common meaning' of the word indicates, and as Brekka expressly held, “authorization” turns on the decision of the 'authority' that grants–or prohibits–access”, judge Charles Breyer writes [note: judgement has been quoted directly, with the original US spelling].

So, while not ruling all proxy use illegal, the case certainly opens a crack for wider bans on IP address cloaking. Because Craigslist had instructed 3Taps that it was not authorised to access its Website, and because that instruction was specific to 3Taps, its use of proxies constituted “circumvention” in the language of the CFAA.

However, an ordinary user – say, an Australian that took the advice of the Australian Consumers Association and used IP spoofing to get around geographically-specific software pricing – would not be in the same position. Such a user would be breaking a site's terms and conditions, which judge Breyer said did not violate the CFAA, at least until a specific ban were instituted by the site. ®

The Power of One Brief: Top reasons to choose HP BladeSystem

More from The Register

next story
Sit back down, Julian Assange™, you're not going anywhere just yet
Swedish court refuses to withdraw arrest warrant
UK Parliament rubber-stamps EMERGENCY data grab 'n' keep bill
Just 49 MPs oppose Drip's rushed timetable
MPs wave through Blighty's 'EMERGENCY' surveillance laws
Only 49 politcos voted against DRIP bill
EU's top data cops to meet Google, Microsoft et al over 'right to be forgotten'
Plan to hammer out 'coherent' guidelines. Good luck chaps!
Delaware pair nabbed for getting saucy atop Mexican eatery
Burrito meets soft taco in alleged rooftop romp outrage
British cops cuff 660 suspected paedophiles
Arrests people allegedly accessing child abuse images online
LightSquared backer sues FCC over spectrum shindy
Why, we might as well have been buying AIR
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.