Despite recent repeated threats from North Korea about engulfing Washington, D.C., in a sea of fire and targeting nukes at everyoneโ€™s favorite SXSW host city, the U.S. has more to fear from hackers launching cyber attacks from laptops than Kim Jong-unโ€™s purported arsenal of Death-to-America weaponry. But recently introduced federal legislation hoping to improve information collection is being billed by opponents as an overreach โ€”ย which is concerning because the need for a clear cyber strategy is growing.

Consider some recent high-profile cyber attacks:

The 2013ย National Intelligence Estimate now tells us the U.S. is the target of a โ€œsustained, cyber-espionage campaign.โ€ And when BuzzFeed takes a break from โ€œ[Insert Arbitrary Number Here] Awesome Cat GIFsโ€ to make mention that our nationโ€™s “cybersecurity reckoning” is now upon us, things just got real.

From Mandiant's report, the targets of cybersecurity attacks from the Chinese army.
From Mandiant’s report, the targets of cybersecurity attacks from the Chinese army.

From this collective furor over Americaโ€™s cyber unpreparedness emerges the Cyber Intelligence Security and Intelligence Act. More commonly known as CISPA, it was reintroduced in the House of Representatives in February principally because the actโ€™s sponsorsโ€”Congressmen Mike Rogers, from Michigan, and Dutch Ruppersberger from Marylandโ€™s 2nd Districtโ€”believe itโ€™s a critical measure to enhance the governmentโ€™s ability to repel cyber breaches. The act calls for better information sharing between private companies and the federal government about cyber threats and attacks, and is up for a vote in theย House Intelligence Committeeย this week.
Maryland, with its broad cybersecurity industry of more than 19,000 employees, might stand to benefit from such a measure that looks to bridge an information gap between private cybersecurity firms and federal-level agencies. That’s in addition to cyber infrastructure: by 2016, federal spending on cyber is expected to eclipse $14 billion, and U.S. Cyber Command and the headquarters of the National Security Agency are both inside Congressman Ruppersberger’s district.
As Technically Baltimore reported Monday, privacy groups, however, have advocated strongly against this bill, maintaining that information sharing could make Internet usersโ€™ personally identifiable information fair game for egregious governmental overreach.
Think of it this way: suppose a private company hands over to the government personal information gathered off a hacker’s computer, only to discover that person isn’t a hacker?
“What the bill does is encourage companies to actively monitor information by giving them immunity to monitor and hand over the information to the government,” said Mark M. Jaycox, policy analyst with the Electronic Frontier Foundation, no friend to CISPA.
But to effectively battle cyber attacks, companiesโ€”and the governmentโ€”need actionable information, and that requires some sharing about from where attacks are launched.

  • To help the U.S. government slow or stop cyber attacks, companies โ€œhave to invite them into [their] network,โ€ said Ron Gula, CEO of Tenable Network Security in Columbia. โ€œI think a lot of corporations donโ€™t realize that if they lose this [cyber] fight figuratively, theyโ€™re going to have the government on their networks helping them to defend themselves.โ€
  • In fact, since 1997, the National Security Agency has had โ€œthe authority to develop cyber attack network techniques,โ€ according to declassified documents reported on by The Week in March.
  • What CISPA does, supporters charge, is merely provide private companies with liability protection so they can share cyber attack information with the government without fear of being sued. As Maryland Congressman Dutch Ruppersberger said at House Intelligence Committee hearings in February, thatโ€™s one of the foremost reasons why CISPA needs to become law.

Of course, the NSA knew of the importance of liability protection: as The Week reports, โ€œNSA also surmised [in 1997] that its own perception as โ€˜the bad guy,โ€™ along with legislation limited what it can do vis-ร -vis computers that donโ€™t belong to the government, would make it harder to become a cyber mission force.โ€
Access to computers โ€œthat donโ€™t belong to the governmentโ€ has been the sticking point for privacy groups arguing thereโ€™s inadequate protection within the bill for ensuring the safety of peopleโ€™s personally identifiable information.

A lot of people who are worried about privacy are right to be concerned about privacy.

โ€œNothingโ€™s changed,โ€ said Paul Kurtz, chief strategy officer for Inner Harbor cybersecurity firm CyberPoint. โ€œ[CISPAโ€™s] just been reintroduced and thereโ€™s been no substantive changes โ€ฆ about privacy-related provisions the act.โ€
Kurtz has spent significant time on Capitol Hill working on policy issues around cybersecurity, including a stint in the George W. Bush administration as senior director for critical infrastructure protection on the White Houseโ€™s Homeland Security Council.
โ€œWhen you get into the definitions about threat information, itโ€™s very, very hard to legislate that on Capitol Hill,โ€ he said. In its current form, Kurtz said, CISPA โ€œdoesnโ€™t adequately protect personal information.โ€
Assuming itโ€™s the destiny of CISPA to become law, whatโ€™s the way forward?

  • For one, amendments more clearly defining terms in the billโ€”like those introduced the last time the House took up CISPA in 2012โ€”should be added.
  • Clear revisions to the draft legislation that make personally identifiable information off limits is another step. As Kurtz told Technically Baltimore, PII is “just not necessary.”

Then again, as Tenable CEO Gula acknowledged, โ€œI donโ€™t think people realize how much data is really shared with the government already.โ€ Or, for that matter, how much data private companies like Google collect on people anyway.
โ€œA lot of people who are worried about privacy are right to be concerned about privacy,โ€ Gula said. โ€œBut they just assume that a bill like [CISPA] gets passed, [and] the federal government is going to be reading their e-mail. I hear stuff like that, and thatโ€™s not the case.โ€
This is part two of a Technically Baltimore series on CISPA.