Feeds

Cyber-Senate's cyber-security cyber-law cyber-scares cyber-rights cyber-fighters

Proposed rules put private data into hands of Uncle Sam

Beginner's guide to SSL certificates

On Tuesday the US Senate will meet in a closed-door session to mark up the forthcoming Cybersecurity Information Sharing Act of 2014 (CISA) – and the proposed new rules on data sharing between big biz and government have privacy groups seriously worried.

CISA is an offshoot of the proposed Cyber Intelligence Sharing and Protection Act (CISPA), which was introduced nearly three years ago and has had a rocky road. The ostensible reason for the new law is to formalize information sharing between the US government and companies on ongoing security threats – provided firms hand over users' information to the government to help identify new attack vectors.

CISPA passed a vote in the US House of Representatives, but went no further. CISA is the Senate's response to CISPA, and was cowritten by NSA-friendly Dianne Feinstein (D-CA), chairwoman of the Senate Select Committee on Intelligence.

The new bill is somewhat broader in scope than CISPA and the language used so far has led more than 30 groups, from both sides of the political spectrum, to issue an open letter on its failings.

"In the year since Edward Snowden revealed the existence of sweeping surveillance programs, authorized in secret and under classified and flawed legal reasoning, Americans have overwhelmingly asked for meaningful privacy reform and a roll back of the surveillance state created since passage of the Patriot Act. This bill would do exactly the opposite," the open letter [PDF] warns.

Under the terms of the new legislation, the government would be allowed to collect people's data from firms not just for cyber threats to infrastructure, but also for terms of service violations, the prosecution of identity theft, aiding prosecutions under the Espionage Act, or even to find the identity of whistleblowers.

The data that companies hand over should be stripped of personally identifiable information, but according to the new bill this only applies if the supplying firm has evidence that the user is a US citizen and if the information isn't directly related to a "cybersecurity threat."

In addition, companies that take part in such information sharing are exempt from public disclosure laws that would require them to tell users what is going on. Government agencies using that data also get broad liability protection and have very limited oversight.

"We do not discount the legitimate dangers posed by cyber threats, both from domestic criminals and hostile foreign powers," concludes the letter writers – which include the likes of the EFF, the ACLU and the National Latino Farmers and Ranchers Trade Association.

"But, as with all national security authorities, we need not sacrifice crucial civil liberties and privacy safeguards, and especially whistleblower protections, in order to effectively address such dangers. We urge the committee and Congress to carefully reconsider CISA as drafted, and to bring it in line with our law, our Constitution and our national values."

The White House has shown concern over the overarching scope of the CISPA/CISA legislation and sort-of threatened to veto the laws as they stand – but we all know how jellylike President Obama's promises can be. ®

Choosing a cloud hosting partner with confidence

More from The Register

next story
Webcam hacker pervs in MASS HOME INVASION
You thought you were all alone? Nope – change your password, says ICO
You really need to do some tech support for Aunty Agnes
Free anti-virus software, expires, stops updating and p0wns the world
USB coding anarchy: Consider all sticks licked
Thumb drive design ruled by almighty buck
Attack reveals 81 percent of Tor users but admins call for calm
Cisco Netflow a handy tool for cheapskate attackers
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Reducing the cost and complexity of web vulnerability management
How using vulnerability assessments to identify exploitable weaknesses and take corrective action can reduce the risk of hackers finding your site and attacking it.
Top 5 reasons to deploy VMware with Tegile
Data demand and the rise of virtualization is challenging IT teams to deliver storage performance, scalability and capacity that can keep up, while maximizing efficiency.