How The NSA's 'Cybersecurity' Surveillance Should Completely Change The Debate On Cybersecurity Bills

from the they're-about-surveillance dept

For quite some time now, we've been warning about the government's questionable attempts to pass "cybersecurity" bills that focus on "information sharing" with names like CISA and CISPA. Defenders of these bills insist that they're "just voluntary" and are necessary because it would enable private companies to share threat information with the US government, so that the US government could help stop attacks. Of course, we've been asking for years (1) why, if this is so useful, companies can't already share this information and (2) what attacks these bills would have actually stopped? No one ever seems to have any answers.

Defenders of the bill also insist that there really shouldn't be any privacy concerns because companies can just hand over the limited information on the attacks, not any personal user info. However, with the recent revelations from Pro Publica and the NY Times (via Snowden documents) about how the NSA uses "cyber signatures" in sniffing through the upstream collection (i.e., sniffing through all internet traffic by tapping into fiber backbones) computer security expert Jonathan Mayer notes that this completely changes the equation on just how bad these "information sharing" cybersecurity bills really are.

Before it was known that the NSA could do this, the argument was that sharing details of a cybersecurity threat would just lead to DHS and NSA taking that "threat" information, and then seeing if it can help figure out ways to prevent the threat. But, now that we know the NSA can sniff the entire upstream collection using such "cyber signatures" and then is allowed to collect and keep whatever it finds as an incidental collection, this becomes very clearly a surveillance bill -- just as Senator Ron Wyden warned.

That's because the new documents make it clear that the NSA not only wants to search based on these broad "cyber signatures" but then claims it gets to keep that data and can search through whatever it collects. These are the infamous "backdoor searches" that Senator Wyden has been warning about for ages.

So, these "information sharing" bills don't just give the NSA access to private information from companies, but really give the NSA the "cyber signatures" it needs to then snarf up a ton of other private information that it has long wanted access to. This is why closing the "backdoor search" loophole is so important as well -- and not letting any of these "information sharing" bills pass is also of utmost importance.

Oh, and one other sneaky thing in all of this that Mayer highlights: defenders of these information sharing bills insist that they're not surveillance bills because, as Rep. Adam Schiff noted: "this bill makes clear in black and white legislative text that nothing authorizes government surveillance in this act." But, as Mayer points out that's incredibly misleading because the government already has the authorization it needs, under the secret program that was just revealed. What the information sharing does is make that authorization much more powerful by making it easier for the NSA to collect the information it then can slide into the program in order to snarf up much more important private information.
Hide this

Thank you for reading this Techdirt post. With so many things competing for everyone’s attention these days, we really appreciate you giving us your time. We work hard every day to put quality content out there for our community.

Techdirt is one of the few remaining truly independent media outlets. We do not have a giant corporation behind us, and we rely heavily on our community to support us, in an age when advertisers are increasingly uninterested in sponsoring small, independent sites — especially a site like ours that is unwilling to pull punches in its reporting and analysis.

While other websites have resorted to paywalls, registration requirements, and increasingly annoying/intrusive advertising, we have always kept Techdirt open and available to anyone. But in order to continue doing so, we need your support. We offer a variety of ways for our readers to support us, from direct donations to special subscriptions and cool merchandise — and every little bit helps. Thank you.

–The Techdirt Team

Filed Under: cisa, cispa, cybersecurity, information sharing, jonathan mayer, nsa, surveillance


Reader Comments

Subscribe: RSS

View by: Time | Thread


  • identicon
    Anonymous Coward, 5 Jun 2015 @ 1:54pm

    with the UK GCHQ eagerly jumping in to take the place of the NSA, the USA will still get all of the information on everyone anyway. what is needed is a much wider and stronger portrayal to the UK citizens of exactly what is going to take place unless there is some push back against Cameron and May. they both want a country and a world that is under constant surveillance, with no privacy and no freedom but one that can still turn round and condemn other countries that are already doing the self-same things! it's hypocrisy at it's worst and must be stopped! the problem being the UK government hasn't yet taken any notice of the EUCJ ruling that the data retention act is illegal and must be stopped. that being the case, what are the chances of it taking any notice of stopping this? they already know it's doomed to failure and the USA is the most prime example. if it worked, regardless of what was ordered, the NSA and others would continue to collect this never ending stream of data. as it is, if it did continue out of sight so to speak, i think there would be some serious charges laid at certain peoples feet if it was again discovered that the security forces had continued to go down the spying road!

    link to this | view in chronology ]

  • icon
    John Fenderson (profile), 5 Jun 2015 @ 2:18pm

    Red flag words

    "this bill makes clear in black and white legislative text that nothing authorizes government surveillance in this act."


    Whenever you see words like "in this act" or "under this authority", that needs to be taken as big red flag that what is being discussed is authorized under a different act/authority, and the person speaking is probably trying to trick you.

    link to this | view in chronology ]

    • identicon
      Anonymous Coward, 5 Jun 2015 @ 2:47pm

      Re: Red flag words

      True. "this bill" means legislation enacted by Congress; in other words statutes and/or 'public laws'. (Assuming said bill gets signed by the President and not vetoed.)

      What about the Code of Federal Regulations? You know: the other set of laws that doesn't require an act of Congress or a Presidential signature.

      link to this | view in chronology ]

  • identicon
    Personanongrata, 5 Jun 2015 @ 2:50pm

    The Beginning Of Wisdom Is To Call Things By Their Proper Name - Confucius

    If we called things by their true name the bill would be called:

    You Will Collaborate With The US Government Or Else Cyberpurgatory Act

    link to this | view in chronology ]

  • identicon
    alan turing, 7 Jun 2015 @ 4:01am

    There are way more than Five Eyes

    Five comments. Really? This is huge , I guess people are either numbed by all this crap or just don't give a rats ass. I, for one, am disgusted and quite saddened by where we are today in terms of trampled rights and constitutional dismissal.

    link to this | view in chronology ]


Follow Techdirt
Essential Reading
Techdirt Deals
Report this ad  |  Hide Techdirt ads
Techdirt Insider Discord

The latest chatter on the Techdirt Insider Discord channel...

Loading...
Recent Stories

This site, like most other sites on the web, uses cookies. For more information, see our privacy policy. Got it
Close

Email This

This feature is only available to registered users. Register or sign in to use it.