Wednesday, June 6, 2012

CISPA: The Finale



By Charlotte Walden


Alas, unless there is some news from the Senate, this will be the final CISPA blog.  To recap, the previous CISPA blogs have established that, if CISPA becomes law, private corporations may voluntarily share cyber threat information with the federal government. Furthermore, CISPA limits what the federal government and certified entities can do with cyber threat information; CISPA also trumps many privacy and public disclosure laws.

But what about the federal government sharing cyber threat information with private corporations? What about the federal government sharing information with other federal departments and agencies? Can I sue the government or a certified entity if they do not use my information in accordance with CISPA? Why was CISPA written? These are the questions that the following paragraphs will answer.  

The Federal Government Sharing Information With Private Companies and other Government Agencies or Departments

On April 13, 2012, Facebook Vice President of U.S. Policy,  Joel Kaplan, revealed Facebook’s support for CISPA. In that post, Kaplan wrote that CISPA will allow the federal government to share  information about  “an intrusion or other attack. . . with private companies . . . [in order to ensure] better the protection for users and . . .systems” (Kaplan, 2012). What part of CISPA was Kaplan writing about? Why section 1104 (a)(1) of course!  Yet, since CISPA gives the Director of National Intelligence the power to create regulations dealing with how the government (read: members of the intelligent community, a term that may also include private corporations) will share cyber threat intelligence with the private sector and utilities, CISPA will have to become law in order to find out what the that scheme may be. If CISPA does not pass, we will never know what the Director’s scheme would have been.  

Yet, CISPA does reveal how the federal government can share cyber threat information with other federal government agencies and departments. Section 1104 (b)(2) (A) states the head of the department of agency of the federal government who receives cyber threat information must provide that information to the National Cyber Security and Communications Integration Center of the Department of Homeland Security. Once this information is provided to the center, the federal department or agency may request the center to provide cyber threat information to another department or agency. (see section 1104(b)(2(B) of CISPA).  Some argue that this provision will allow cyber threat information to be used for massive data mining purposes.(Imagery, 2012). Others claim it will help protect cyber security (Kaplan, 2012).  Again, the age old debate of trading civil liberties for security rears its ugly head.


CISPA and Legal Recourse

But wait a minute. Earlier, these CISPA blogs revealed that Facebook supported CISPA, but wasn’t Facebook and other companies adamantly opposed to PIPA and SOPA earlier this year? What makes CISPA different? Some think that because CISPA takes the pressure to regulate users off private companies and gives that pressure to the government, Facebook and others like it (Explainers, 2012).  Others think that the provision that exemptions certified entities  from being sued is why former protestors of PIPA and SOPA like it (Kardell 2012). Section 1104 (b)(4) of CISPA is the section that exempts certified entities from being sued.

The Electronic Frontier Foundation (EFF), one of the many organizations who oppose this bill, contends that this liability exemption for certified entities  is “vague” and that the exemption could potentially harm innocent parties (Jaycox, 2012). For instance, the EFF argues, “[i]f a company learns about a security flaw, fails to fix it, and users' information is misused or stolen, companies cannot be held liable as long as the company acted ‘in good faith’”  (Jaycox, 2012). Essentially, CISPA limits judicial oversight of a certified entity’s activity with cyber threat information, which, in all honesty, could be your information (Jaycox, 2012).

However, while a person may be limited to bring a suit against a certified entity, a person may be able to bring a suit against the federal government who intentionally or willfully violates the cyber threat information use provisions of section 1104 (b)(3)(C) or subsection (c). [See section 1104 (d)(1) of CISPA]. However, one has two years after the violation of the applicable sections in order to bring a suit. Some find this to be problematic. As the EEF has pointed out, given the exemption from public disclosure, a person who has been wronged may have no idea that they have been wronged until well after the two-year statute of limitations (Timm, 2012). This, of course, depends on when the statute of limitations begins to run. Does it start the day the government violates the applicable section? Or does it start when you realize you have been wronged? Whatever the case, the EFF's point has merit.  Thus, it is quite possible, that this provision is merely smoke and mirrors and provides no judicial oversight of the federal government’s activities with your information what so ever.   

Why Was  CISPA Written In The First Place?

So, CISPA provides little judicial oversight, exempts cyber threat information from privacy and public disclosure laws, and allows private companies to voluntarily share cyber threat information (which could be your information) with the federal government. And just who is responsible for this bill and why was it created?

Congressmen Mike Rogers introduced CISPA to prevent foreign companies from stealing secret information from US databases (Beadon, 2012). The goal of CISPA is to ensure foreign companies do not gain unfair advantage over U.S. companies (Beadon, 2012). It is because of this, Rogers reasons, why private companies and the federal government need to share sensitive information.  (Beadon, 2012). It is because of this, Rogers reasons, why we need CISPA. While some argue that Roger's proposed legislation has merit to protect the U.S.'s Internet systems from cyber attacks (Kaplan, 2012), the bill, as it stands now, is too imperfect for reasons stated throughout this blog. 




After reading through these blogs and visiting the referenced links, please discuss what you think of CISPA. This blog contends that CISPA has the could create a disincentive to share certain types of information online, but this blog is also an open forum for concurrence and dissent. Perhaps you believe that the potential censorship CISPA might create would spawn a new way of sharing information. Or perhaps you see things a different way. On an additional note, for those curious, click here for a list of CISPA supporters. 

References:


Beadon, Leigh. (2012, Mat 7). CISPA sponser warns bill is needed because China’s Chinese hackers from China are stealing all-American secrets (China!).  Techdirt. Retrieved from http://www.techdirt.com/articles/20120504/08384918786/cispa-sponsor-warns-bill-is-needed-because-chinas-chinese-hackers-china-are-stealing-all-american-secrets-china.shtml.

Downes, Larry. (2012, April 27). Why CISPA can’t be fixed. Forbes. Retrieved from http://www.forbes.com/sites/larrydownes/2012/04/25/why-cispa-cant-be-fixed/.


Explainers. (2012, April). All about CISPA, the bill that wants to erode your online privacy. Lifehacker. Retrieved from http://lifehacker.com/5900962/why-microsoft-and-facebook-are-pro+cispa-but-anti+sopa.

Imagery. (2012, May 2). CISPA destroys privacy and shares data with the government. Weather imagery: A little mix of everything. Retrieved from http://www.weatherimagery.com/blog/cispa-destroys-privacy-and-shares-data-with-government/.

Jaycox, M. How the expansive immunity clauses in CISPA will facilitate abuse of user privacy. Electronic frontier foundation. Retrieved from https://www.eff.org/deeplinks/2012/04/how-expansive-immunity-clauses-cispa-will-facilitate-abuse-user-privacy-0.

Kaplan, J. (2012, April 13).  A message about CISPA. Facebook.  Retrieved from: http://www.facebook.com/note.php?note_id=10150723305109455.

Kardell, N. (2012, April 30). CISPA, approved by the House, poses threat to internet freedom. The National Law Review. Retrieved from http://www.natlawreview.com/article/cispa-approved-house-poses-threat-to-internet-freedom.

Timm, T. (2012, Aril 25). CISPA, “national security,” and NSA’s ability to read your e-mails. Electronic frontier foundation. Retrieved from https://www.eff.org/deeplinks/2012/04/cispa-national-security-and-nsa-ability-read-your-emails.

4 comments:

  1. For those of you who are curious, the information Facebook obtains from you does not come solely from their website; in fact, Facebook can collect your information from third party websites. Visit this link for more details:

    http://lifehacker.com/5843969/facebook-is-tracking-your-every-move-on-the-web-heres-how-to-stop-it

    ReplyDelete
  2. CISPA has caused many debates not only in libraries but in many cases where people are using the web to retrieve information. It is pointed out that "library consequences could relate to cloud computing, higher education networks, privatized libraries and networks, and network/vendor contracts" (ALA Asks Librarians to Oppose Cybersecurity Bill, 2012). The library where I work has recently set up all the public Internet computers to wipe off any information that can be gathered or saved by patrons so that the next patron who uses the computer cannot see or have access to what the previous patron did.

    In this link, Facebook claims that they will protect personal information.
    http://rt.com/usa/news/cispa-facebook-privacy-violation-061/

    I'm against the CIPSA because I think that it violates one's privacy. It is also important to remember that while using some social networking sites one can go onto a third party site who may not protect the user's information. This is why it is important to read into terms and conditions before just simply checking the agree to button.

    -Lindsay Fricke

    References:

    ALA asks librarians to oppose cybersecurity bill. (2012). Library Journal, 137(10), 20.

    ReplyDelete
  3. According to the link I posted in the first comment, Facebook can track you on third party websites even after you have logged out. In fact, after interviewing the library director at Lansing Community College (LCC), I learned that one of LCC's librarians just gave a presentation about how to stop Facebook, Google and others from tracking you. If CISPA passed, I wonder what innovations people would create in order to make it harder for certified entities and the federal government to access your information. Because surely if we can come up with ways to stop companies from tracking us, we could also come up with ways to make it harder for them to access our information.

    -Charlotte Walden

    ReplyDelete
  4. I found the Facebook link regarding privacy and issues to be interesting. http://developers.facebook.com/policy/ What is someone were to browse through a third party website from Facebook while still logged in? Does this mean that the websit automatically gets your information because of the terms and conditions agreed to with Facebook? I definitely agree with you that if CISPA was passed, then there would eventually be ways to work around the system to prevent the government from getting information.

    -Lindsay F.

    ReplyDelete