You are viewing an old blog post! That means that links will be broken, and images may be missing.

July 28, 2015

Why Obama should veto CISA

DownsizeDC.org is one of 68 organizations and security experts who signed this letter urging President Obama to veto the “cybersecurity” )illegal spying bill called the Cyber Information and Sharing Act (CISA)

:July 27, 2015
Dear President Obama,
We the undersigned civil society organizations, security experts, and academics write to urge you to
strongly oppose the Cybersecurity Information Sharing Act of 2015 (CISA, S. 754).
1 We urge that you
pledge to veto CISA, as you did twice during consideration of the similarly flawed Cyber Intelligence
Sharing and Protection Act (CISPA, H.R. 3523, H.R. 624).2
The Administration first stated its opposition to CISPA and its intention to veto it because the legislation
failed to “preserve[] Americans’ privacy, data confidentiality, and civil liberties and recognize[] the
civilian nature of cyberspace.”3 The following year the Administration again voiced strong opposition to
CISPA, and set forth the following three overarching priorities that information sharing legislation
:(1) carefully safeguard privacy and civil liberties; (2) preserve the long-standing,
respective roles and missions of civilian and intelligence agencies; and (3) provide for
appropriate sharing with targeted liability protections.4
CISA not only fails to adhere to these important principles, it also fails to effectively address the specific
concerns that were raised in those previous Statements of Administration Policy.
Concerns Regarding Requirements to Remove Personal Information: Both Statements of
Administration Policy on CISPA raised the concern that the bills “lack[ed] sufficient limitations on the
sharing of personally identifiable information”5 as companies were not required to “take reasonable
steps to remove” it.6

Similarly, CISA fails to protect users’ personal information. It allows vast amounts of personal data to be
shared with the government, even that which is not necessary to identify or respond to a cybersecurity
threat. This is because CISA permits companies to leave personal and identifying information in
indicators it shares with the government unless the company affirmatively knows that the information is
1 Cybersecurity Information Sharing Act of 2015, S. 754, 114th Cong. (2015), https://www.congress.gov/bill/114thcongress/senate-bill/754.
2 Cyber Intelligence Sharing and Protection Act, H.R. 3523, 112th Cong. (2011),
https://www.congress.gov/bill/112th-congress/house-bill/3523/titles; Cyber Intelligence Sharing and Protection
Act, H.R. 624, 113th Cong. (2013), https://www.congress.gov/bill/113th-congress/house-bill/624. See also Exec.
Office of the President, Statement of Administration Policy: H.R. 3523 – Cyber Intelligence Sharing and Protection
Act, Apr. 25, 2012,
https://www.whitehouse.gov/sites/default/files/omb/legislative/sap/112/saphr3523r_20120425.pdf [hereinafter
“CISPA SAP 2012”); and Exec. Office of the President, Statement of Administration Policy: H.R. 624 – Cyber
Intelligence Sharing and Protection Act, Apr. 16, 2013,
https://www.whitehouse.gov/sites/default/files/omb/legislative/sap/113/saphr624r_20130416.pdf [hereinafter
“CISPA SAP 2013”].
3 CISPA SAP 2012, supra note 2. 4 CISPA SAP 2013, supra note 2. 5 CISPA SAP 2012, supra note 2. 6 CISPA SAP 2013, supra note 2.
Page 2 of 4
not directly related to a threat7 – a condition that would rarely be met. Thus, it allows companies to
share virtually all personal and identifying information by default.
Authorization to Use Information in Investigations Unrelated to Cybersecurity: The Administration’s
opposition to CISPA also stemmed from concerns that CISPA failed to reasonably limit the authorized
uses for the information that companies share with the government. The Administration’s position was
that “sharing must be consistent with cybersecurity use restrictions, the cybersecurity responsibilities of
the agencies involved, as well as privacy and civil liberties protections and transparent oversight.”8
CISA significantly deviates from these limitations. It authorizes federal, state, and local governments to
use cyber threat indicators to investigate crimes that have nothing to do with cybersecurity, such as
robbery, arson, and carjacking, as well as identity theft and trade secret violations. CISA would also
permit the federal government to use information in investigations in trade secret violations and
identity fraud, and under the Espionage Act.9 Additionally, CISA authorizes companies to share
information with the government for any purpose authorized under the Act, which means that
companies could share information for the purpose of investigating these unrelated crimes.
10 While
these crimes are serious, there is no justification for undermining the legal protections that currently
apply when such investigations are underway, particularly when the data of so many innocent citizens
could be affected.
Failure to Establish Civilian Control of Domestic Cybersecurity: The Administration opposed CISPA
because it failed to follow “the longstanding tradition to treat the Internet and cyberspace as civilian
spheres”11 and it “effectively treat[ed] domestic cybersecurity as an intelligence activity.”12 These
concerns were rooted in overly expansive use authorizations and in the authorization to share
information directly with the National Security Agency (NSA).
CISA also fails to maintain civilian control. In addition to having extremely broad use authorizations, as
described above, it pre-empts all law and enables companies that operate in the civilian sector to share
cyber threat indicators with any agency of the federal government, including the NSA. While liability
protection would only attach for sharing directly to the Department of Homeland Security, this is not an
adequate safeguard because the bill permits sharing “notwithstanding any law.” Even if information
were to be shared with a civilian entity like DHS, CISA would require the government recipient of any
cyber threat indicator to automatically disseminate it, without delay or modification to remove personal
information, to the Department of Defense and the NSA, and to non-military intelligence agencies.
13
This undermines both privacy and civilian control.
CISA Raises Additional Areas of Significant Concern: CISA raises many concerns in addition to those
outlined above, as its provisions would also be detrimental to Internet security, pose further threats to
privacy and civil liberties, and undermine transparency and accountability. First, CISA could undermine
Internet security because it authorizes companies to deploy “defensive measures” (also commonly
7 CISA, Sec. 4(d).
8 CISPA SAP 2013, supra note 2. 9 CISA, Sec. 5(d)(5)(A), and CISA Sec. 4(d)(4)(A).
10 CISA, Sec.4(c)(1). 11 CISPA SAP 2013, supra note 2. 12 CISPA SAP 2012, supra note 2. 13 CISA, Sec. 5(a)(3).
Page 3 of 4
referred to as “countermeasures”), even when the countermeasure would be otherwise illegal under
the Computer Fraud and Abuse Act.14 Second, the definitions for “cyber threat,” and “cyber threat
indicator,” are concerning because they are unnecessarily broad. Finally, the bill would undermine
transparency by adding the first new exemption to the list of nine other exemptions included in the
Freedom of Information Act (5 U.S.C. 522(b)) since it passed in 1966.
CISA fails to address many of the concerns raised about preceding information sharing bills that the
Administration opposed, and it threatens to undermine privacy and civil liberties, and increase cybersurveillance.
We strongly oppose CISA and we urge you to again defend privacy and civil liberties by
voicing your opposition and your intention to veto it.
Thank you for your consideration.
Sincerely,
Civil Society Organizations and Companies
Access
Advocacy for Principled Action in Government
American Association of Law Libraries
American-Arab Anti-Discrimination Committee
American Civil Liberties Union
American Library Association
Association of Research Libraries
Benetech
Bill of Rights Defense Committee
Brennan Center for Justice
Council on American-Islamic Relations
Center for Democracy & Technology
Constitutional Alliance
The Constitution Project
Defending Dissent Foundation
Demand Progress
DownsizeDC.org
Electronic Frontier Foundation
Fight for the Future
Freedom of the Press Foundation
Free Press Action Fund
Government Accountability Project
Hackers/Founders
Human Rights Watch
Liberty Coalition
National Association of Criminal Defense Attorneys
New America’s Open Technology Institute
Niskanen Center
OpenMedia.org
OpenTheGovernment.org
14 CISA, Sec. 4(b).
Page 4 of 4
PEN American Center
Privacy Rights Clearinghouse
Restore the Fourth
RootsAction.org
R Street
Silent Circle
Student Net Alliance
Venture Politics
World Privacy Forum
Security Experts
Jacob Appelbaum, Security and privacy researcher, The Tor Project
Eric Brunner-Williams, Retired
Jon Callas, Cryptographer and Inventor
Antonios A. Chariton, Security Researcher, Institute of Computer Science, Foundation of Research and
Technology — Hellas
John Covici, Systems Administrator, Covici Computer Systems
Riley Eller, Inventor and Security Strategist; Chief Technology Officer, CoCo Communications
Rik Farrow, Editor, USENIX
Robert G. Ferrell, Special Agent, Information Security (Ret.), U.S. Dept. of Defense
Bryan Ford, Associate Professor of Computer Science, Swiss Federal Institute of Technology, Lausanne
Dr. Richard Forno, Jr. Affiliate Scholar, Stanford Center for Internet and Society*
Joe Grand, Principal Engineer, Grand Idea Studio, Inc.
J. Alex Halderman, Morris Wellman Faculty Development Assistant Professor of Computer Science and
Engineering, University of Michigan; Director, University of Michigan Center for Computer Security and
Society
Carl Hewitt, Board Chair, Standard IoT Foundation
Daniel Kahn Gillmor, Technologist
Christopher Liljenstolpe, Architect, Project Calico, IETF OpenPGP WG Co-chair, past Operations Area CoChair,
past chief architect for both Cable & Wireless, and Telstra.
Jonathan Mayer, Stanford University*
Steve Manzuik, Director of Research, Duo Security
Andrew McConachie, Internet Infrastructure Engineer
Patrick R. McDonald, Director of Network Administration and Security, C2FO
Charlie Miller, Security Researcher
Prof. Chip Pitts, Lecturer in Law, Stanford/Oxford
Ronald L. Rivest, Professor, MIT
Bruce Schneier, Fellow, Berkman Center for Internet and Society, Harvard Law School
Space Rogue (C. Thomas), Security Strategist, Tenable Network Security
Armando Stettner, Internet Technology Consultant
Matt Suiche
Dan S. Wallach, Professor, Department of Computer Science, Rice Scholar, Baker Institute of Public
Policy, Rice University
Nicholas Weaver, Researcher, International Computer Science Institute
Dr. Stefano Zanero, International Director, Information Systems Security Association
*Titles and affiliations are for information purposes only.:

If your comment is off-topic for this post, please email us at feedback@downsizedc.org

comments

Post a Comment


Notice: Undefined variable: user_ID in /var/www/archive.downsizedc.org/wordpress/wp-content/themes/downsizer/comments.php on line 89

Your email is never published nor shared. Required fields are marked *

*
*
 
© 2008–2019 DownsizeDC.org