Unfiltered Oversharing
In a statement posted to his website yesterday, Senator Burr wrote that “Information sharing is purely voluntary and companies can only share cyber-threat information and the government may only use shared data for cybersecurity purposes.” But in fact, the bill’s data sharing isn’t limited to cybersecurity “threat indicators”—warnings of incoming hacker attacks, which is the central data CISA is meant to disseminate among companies and three-letter agencies. OTI’s Greene says it also gives companies a mandate to share with the government any data related to imminent terrorist attacks, weapons of mass destruction, or even other information related to violent crimes like robbery and carjacking. The latest update to the bill tacks on yet another kind of information, anything related to impending “serious economic harm.” All of those vague terms, Greene argues, widen the pipe of data that companies can send the government, expanding CISA into a surveillance system for the intelligence community and domestic law enforcement.
If information-sharing legislation does not include adequate privacy
protections, then...It’s a surveillance bill by another name. Senator Ron Wyden
“CISA goes far beyond [cybersecurity], and permits law enforcement to
use information it receives for investigations and prosecutions of a
wide range of crimes involving any level of physical force,” reads the
letter from the coalition opposing CISA. “The lack of use limitations
creates yet another loophole for law enforcement to conduct backdoor
searches on Americans—including searches of digital communications that
would otherwise require law enforcement to obtain a warrant based on
probable cause. This undermines Fourth Amendment protections and
constitutional principles.”
Even when it comes to cybersecurity data-sharing, privacy advocates say
CISA would give companies a legal loophole to mix users’ personal
information into the “cyber threat indicators” they pass on to federal
agencies. The bill does have a provision designed to filter “personally
identifiable information” out of that data. But it’s far too weak as
written, says Julian Sanchez, a research fellow at the CATO institute.
He points to the language in the bill that calls on companies to “to
assess whether [a] cyber threat indicator contains any information that
the entity knows at the time of sharing to be personal information of or
identifying a specific person not directly related to a cybersecurity
threat and remove such information.”
That “knows at the time of sharing” phrase, Sanchez argues, means that
companies can share personal information they haven’t yet proven
to be unrelated to a cyber threat. And that’s especially impractical
given CISA’s purpose of spreading initial warnings of a possible threat
quickly enough to prevent it, often before it’s been fully analyzed.
Take the example of a distributed denial of service attack designed to
knock a target website offline with a stream of junk data. Sophisticated
DDOS attacks often impersonate legitimate traffic, raising the risk
that innocent traffic—and identifying IP addresses—would be included in
data shared with the government. “At the time of sharing it will be very
unclear if it’s innocent activity,” says Sanchez. “And there’s no
obligation to do due diligence to figure out if it’s innocent or isn’t.”
We’ve tried the CISA experiment, and we know it doesn’t really work. Robert Graham
The bill’s authors have been careful to note that it doesn’t compel
companies to give any data to the government. A member of Senator
Burr’s legislative staff repeated in an email to WIRED that it merely
provides a “framework” for voluntary data sharing, and added that
business groups like the Financial Services Roundtable and the National
Cable & Telecommunications Association have already expressed their
support for the bill. “Bottom line — the bill doesn’t give any
government agency additional authority to collect information,” wrote
the spokesperson.
Careful companies, of course, could in fact choose to safeguard their
users’ privacy beyond the requirements of CISA. But Cato’s Sanchez
argues that many companies seeking CISA’s security benefits will take
the path of least resistance and share more data rather than less,
without comprehensively filtering it of all personal information. “The
easiest, fastest way to share information is to select all and
copy-paste. Every additional filter is an extra effort,” he says.
“There’s no incentive to combat the tendency to err on the side of
oversharing.”