国产视频

In Short

Version 2.0 of the Senate Intelligence Committee鈥檚 Cyber Information Sharing Act Is Cyber-Surveillance, Not Cybersecurity

Cybersecurity information sharing legislation is like a bad
penny 鈥 no matter how many times you think you鈥檝e gotten rid of it, each
Congress it keeps popping back up. The notorious Cyber Intelligence Sharing and
Protection Act (), the primary information sharing legislation
in the House of Representatives, has been
and over in the last three sessions of
Congress (the Administration issued two in advance of both ), and now the Cybersecurity Information Sharing Act (), which raised when it in the Senate Select Committee on
Intelligence (SSCI), is expected to be introduced for the second time in early
March. The version of CISA
that SSCI is expected to consider leaked online.

Despite increasing doubts about whether information-sharing
legislation could have prevented an , ,
or -style hack, CISA鈥檚 proponents insist that passing
cybersecurity information sharing legislation is the single most important way
to enhance cybersecurity. However, the bill鈥檚 primary effect will be to
increase cyber-surveillance.

,
the newest version of CISA will not just increase the sharing of impersonal technical
data that indicates a cyber threat but will also significantly increase the National
Security Agency鈥檚 access 鈥 in fact, all of government鈥檚 access 鈥 to Americans鈥 personal
information. It will also allow any entity of the federal government, including
intelligence agencies and law enforcement, to use that information for a broad
array of garden-variety investigations and prosecutions, not just for cybercrimes. Moreover, CISA would provide a blanket
authorization for companies to monitor their users鈥 activities for purposes
other than protecting their own networks, as they are currently allowed to do. It
also provides companies with complete liability protection for information
sharing and monitoring pursuant to the Act.
And, to top it all off, CISA has a few worrisome bells and whistles that
have nothing to do with information sharing at all, like an authorization for
private entities to act as cyber-vigilantes and engage in dangerous
countermeasures, and some out-of-place language that has worrisome implications
for the NSA鈥檚 development and use of cyberweapons.

What follows is our best attempt to highlight the most
glaring problems with the CISA bill鈥攁nd propose solutions.

Problem
#1: CISA authorizes excessive information sharing, including unnecessary sharing
of personal information.

First, the definition of the term 鈥渃ybersecurity threat鈥 is
very broad, allowing companies to share a wide variety of information with the
government if there is the mere possibility that there may be 鈥渁n unauthorized
effort to adversely impact鈥 an information system, or information stored on or
transiting that system. Before sharing their users鈥 information with the
government, a company should at least be required to make a determination that
the purported cyber threat is likely to cause harm. (Sec. 2(6))

Additionally, CISA authorizes companies to share an
excessive amount of their users鈥 information with the government and with one
another. It defines what can be shared,
鈥渃yber threat indicators,鈥 to include 鈥渋nformation that is necessary to
describe or identify鈥 any 鈥渁ttribute of a cybersecurity threat鈥 so long as its
disclosure is not otherwise legally prohibited.
Something that 鈥渄escribe[s]鈥 an 鈥渁ttribute鈥 of a 鈥渢hreat鈥 could be
interpreted so broadly as to include personally identifiable information (PII) or
the content of private online communications, that is not actually needed to
detect or protect against that threat. (Sec. 2(7))

Further, CISA fails to protect users鈥 PII. CISA merely
requires that companies remove personal information if the company 鈥渒nows鈥 that
it is not 鈥渄irectly related鈥 to the threat. This weak protection could result
in companies unnecessarily sharing the PII of victims, and even their contacts,
with the Department of Homeland Security and other companies. Additionally, the
鈥渒nowledge鈥 requirement allows companies to default to leaving PII in the
indicators they share, since they may not know with absolute certainty that the
PII they have identified is not directly related to the threat. Instead, CISA should require companies to
remove PII from indicators unless it is necessary to identify or mitigate a
threat. The bill should also require that government entities review indicators
for improperly shared PII, and remove it before using or disseminating the
indicators. (Sec. 4(d)(2))

Solution
#1: CISA should only authorize a company to share information, including PII,
if it is necessary to identify, block or mitigate the impact of a cyber-attack
or vulnerability that the company has determined to be likely to cause harm.
Additionally, government entities receiving that information should be required
to review it for improperly shared PII and remove that PII before disseminating
the information further.

Problem
2: CISA Requires DHS to automatically and indiscriminately disseminate to the
NSA all indicators it receives.

While CISA only authorizes companies to share threat
indicators with DHS, it also requires that DHS immediately disseminate every
threat indicator it receives, including all of the personal information that
comes with them, to a myriad of government agencies ranging from the NSA to the
Federal Bureau of Investigation (FBI) to the Department of Commerce. Management
of and response to domestic cybersecurity threats should be controlled by a
civilian agency. Requiring a civilian agency like DHS to automatically and
indiscriminately disseminate that information to military intelligence agencies
like the NSA undermines civilian control. The NSA should only have access to
information concerning significant cyber threats, such as threats that could result in a significant loss of life or
physical destruction of critical infrastructure; state sponsored espionage,
including economic espionage; or the activities of foreign criminal
organizations. (Sec. 4(b)(2))

Solution
#2: CISA-derived information should only be disseminated to the NSA to address
a discrete set of significant threats to national security.

Problem
#3: Law enforcement agencies are authorized to use CISA-derived information to investigate
a wide array of garden-variety crimes.

If excessive sharing of Americans鈥 personal information is
not enough to establish that CISA is as much a surveillance bill as it is a
cybersecurity bill, the breadth of investigations and prosecutions that law
enforcement can use the information for leaves no room for doubt. It is
reasonable to authorize federal and state law enforcement to use CISA-derived cyber
threat indicators to investigate and prosecute a clearly defined set of
computer crimes. However, CISA authorizes this and much, much more.

CISA allows any entity within the federal government,
including intelligence agencies and law enforcement to use the information it
receives from companies for investigations and prosecutions into terrorism,
which as we鈥檝e seen over the last year and a half of NSA leaks, is interpreted
by the Intelligence Community to constitute a
of . It also authorizes entities like law enforcement agencies to
use that information in regard to any crimes that could result in imminent
death or serious bodily harm, meaning this 鈥渃ybersecurity鈥 bill would also
facilitate investigations into garden-variety violent crimes that have nothing
to do with cyber threats. If that weren鈥檛
worrisome enough, the bill would also let law enforcement and other government
agencies use information it receives to investigate, without a requirement for
imminence or any connection to computer crime, even more crimes like carjacking,
robbery, possession or use of firearms, ID fraud, and espionage. And that鈥檚
just a few of the crimes on the very long list of crimes for which CISA-derived
information can be used.

While some of these are terrible crimes, and law enforcement
should take reasonable steps to investigate them, they should not do so with
information that was shared under the guise of enhancing cybersecurity. This authorization would not just seriously
undermine Americans鈥 Fourth Amendment rights, which would otherwise require the
government to obtain a warrant based on probable cause to access much of that
same information, it would create an expansive new means of general-purpose
government surveillance. (Sec. 5(d)(5))

Solution
#3: Law enforcement entities like the FBI should only be able to use
CISA-derived information to investigate or prosecute a clearly defined set of
computer crimes. Any authorization for use in investigating violent crimes
should be limited to cases where violence is imminent.

Problem
#4: CISA authorizes companies to monitor all of their users鈥 activities and communications.

CISA鈥檚 monitoring provision is unnecessary, overbroad, and
would threaten Americans鈥 privacy and Internet security. The federal protects Internet users鈥 privacy and
Internet security by only authorizing companies to monitor their users鈥
activities as necessary to protect their own systems from threats. CISA would undermine those reasonable limitations
by providing a blanket authorization for companies to generally monitor their
networks for any cybersecurity purpose. (Sec. 4(a))

This would significantly increase the scope of how companies
can monitor their customers鈥 online communications and activities. For example,
an Internet Service Provider (ISP) that is currently authorized by federal law
to monitor traffic on its network in order to identify and counter threats to
its own systems would be authorized under CISA to monitor all traffic looking for any
threat to any system. That would make
everyone a target for monitoring, not just suspicious actors threatening the
ISP鈥檚 network. This authorization could also undermine Internet security
because in order to facilitate monitoring, that ISP could attempt to decrypt
encrypted communications, or even block encrypted communications from its
network.

Solution
#4: CISA should not create any new authorization for monitoring, as adequate
authorizations already exist in the law.

Problem
#5: CISA鈥檚 liability protections leave customers no recourse if they are
wrongly harmed by information-sharing and monitoring.

CISA absolves companies of any liability associated with
sharing or monitoring of information pursuant to the Act, except for actions
that constitute gross negligence. This provision would preclude causes of
action for violations of the Computer Fraud and Abuse Act as well as privacy statutes
such as the Stored Communications Act and Wiretap Act portions of ECPA. (Sec.
6)

Solution
#5: CISA鈥檚 liability protections should be narrowed to ensure that there is
reasonable recourse for those harmed in the event that a company unnecessarily
monitors or shares their personal information.

Problem
#6: CISA authorizes companies to deploy dangerous countermeasures and has
concerning language regarding military cyber operations.

Lastly, CISA includes provisions that have nothing to do
with information sharing at all. It
authorizes companies to retaliate against perceived attackers by deploying
countermeasures on their systems, like software that would automatically 鈥渉ack
back鈥 against attackers or attempt to retrieve or destroy information that was
stolen. While it requires that the countermeasures be deployed only on the
company鈥檚 own network, countermeasures may still unintentionally have
extra-network effects, and those extra-network effects could easily include
damage to the computers of innocent people whose systems have also been
compromised by the attackers. CISA鈥檚
only other constraint on countermeasures is a weak requirement that the company
not intend for the countermeasure to have a harmful or destructive effect on
someone else. But if those countermeasures do have such an effect, the company
that deployed them would still have been acting pursuant to CISA鈥檚
authorization. (Sec. 4(c)(1))

Countermeasures are unpredictable and can be difficult to
control, and can also fall into the hands of bad actors, all of which increases
the risk of unintentional harm to innocent bystanders or victims of botnets or
other malicious attacks. And yet if a company deploys a countermeasure on its
network that unintentionally harms or destroys the computer systems of a hospital,
a Fortune 500 business, a power plant, a friendly foreign government or any
other innocent entity, that company would still have been acting within CISA鈥檚
broad authorization. Cybersecurity information sharing legislation should not
include an authorization for the use of such offensive countermeasures, no
matter how narrowly drafted, as any such authorization threatens to undermine
rather than enhance Internet security.

Finally, CISA also includes an odd rule of construction that
states that nothing in the Act should be interpreted to limit the authority of
the Secretary of Defense to 鈥渄evelop, prepare, coordinate, or, when directed by
the President, conduct military cyber operations.鈥 It is unclear why such a
statement concerning the Secretary of Defense鈥檚 authority is needed, or what
its intended effect is. What is clear is that the NSA engages in a from purchasing and , to inserting vulnerabilities into
software and ,
to , to deploying
and even cyberweapons like . Some of these activities may be reasonable;
many are certainly not. Regardless, they unquestionably impact the security and
functionality of the Internet and the broader computing environment, and their
efficacy and legality should be the subject of public debate rather than the
subject of vague carve-outs in overbroad cybersecurity information sharing bills.
(Sec. 8(m))

Solution
#6: CISA should not authorize the use of any offensive countermeasures, and it
should not include a Rule of Construction concerning military cyber operations
where the necessity and intent of that rule is unclear.

If CISA is intended to increase cybersecurity and not
surveillance, it should exclude unnecessarily and dangerously broad
authorizations for new monitoring and countermeasures, and it must narrowly
define what information can be shared (including robust requirements to remove
unnecessary personal information), when information can be shared, and how
information can be used. Unless all of
the problems we鈥檝e summarized above are addressed, CISA will do much more to
enhance the government鈥檚 cyber-surveillance
than it will do to enhance everyone鈥檚 cybersecurity, and should be strongly
opposed.

More 国产视频 the Authors

Robyn Greene

Programs/Projects/Initiatives

Version 2.0 of the Senate Intelligence Committee鈥檚 Cyber Information Sharing Act Is Cyber-Surveillance, Not Cybersecurity