{"id":1635,"date":"2013-04-18T20:53:33","date_gmt":"2013-04-18T20:53:33","guid":{"rendered":"http:\/\/ncjolt.org\/?p=1635"},"modified":"2020-06-04T20:54:01","modified_gmt":"2020-06-04T20:54:01","slug":"the-new-joint-information-environment-cispa-and-cybersecurity","status":"publish","type":"post","link":"https:\/\/journals.law.unc.edu\/ncjolt\/blogs\/the-new-joint-information-environment-cispa-and-cybersecurity\/","title":{"rendered":"The New Joint Information Environment: CISPA and Cybersecurity"},"content":{"rendered":"<p>Tuesday, April 16, 2013, by Samantha Surles<br \/>\nThe Government\u2019s ability to find and apprehend cyber criminals is one of the big features in the 2014 Defense budget. One of the <a href=\"http:\/\/www.whitehouse.gov\/sites\/default\/files\/omb\/budget\/fy2014\/assets\/defense.pdf\">Department of Defense\u2019s<\/a> top priorities in 2014 is \u201cexpanding the Cyber Forces\u201d under U.S. Cyber Command and developing a system for \u201ccyber security information sharing.\u201d The information sharing system would connect many government cyber security centers in \u201creal time\u201d to create a \u201ccomprehensive coordinated cyber security information sharing system\u201d with automated information sharing, accessible by all state authorized personnel.<\/p>\n<blockquote><p>\u00a0Regardless of whether CISPA passes or which side of the privacy protection debate you root for, in future any information you inject into the \u201ccyber environment\u201d faces the paradox of easier access by some to achieve greater protection from others.<\/p><\/blockquote>\n<p>This \u201c<a href=\"http:\/\/www.nextgov.com\/cybersecurity\/2013\/04\/defense-plan-cyber-intel-sharing-looks-controversial-house-bill\/62500\/\">real time<\/a>\u201d provision requires new legislation by Congress, otherwise the potential liability would cause internet companies to delay release of sensitive user information. The resulting Cyber Intelligence Sharing and Protection Act of 2013 (CISPA) will\u00a0 reach a vote in the House later this week, after being rejected by privacy and civil liberties groups last year. Many groups <a href=\"http:\/\/mashable.com\/2013\/04\/16\/cispa-vote-this-week\/\">oppose<\/a> the bill, calling the amendments inadequate to protect consumer privacy. In response, the House Committee on Intelligence set up an informational site with letters of support and fact sheets intended to address the \u201c<a href=\"http:\/\/intelligence.house.gov\/sites\/intelligence.house.gov\/files\/documents\/cispamythvactFeb122013v2.pdf\">myths<\/a>\u201d that have been circulating about the bill.<br \/>\nThe Committee contends that the bill has \u201cnothing to do with government surveillance.\u201d It is only a voluntary allowance for internet companies to \u201cshare anonymous cyber threat information\u201d with the government to \u201cprotect their networks and their customers private information.\u201d Other concerns were addressed, including the fear that the government will be allowed warrantless access to private emails and that it will compile data on the private internet practices of U.S. Citizens. The <a href=\"http:\/\/www.politico.com\/story\/2013\/04\/cispa-white-house-cybersecurity-90123.html?hp=r3\">White House<\/a> opposed the 2012 version of CISPA and has not given approval to the current version. In a <a href=\"https:\/\/www.eff.org\/deeplinks\/2013\/04\/33-civil-liberties-organizations-oppose-cispa-after-amendments\">letter to Congress<\/a>, at least thirty-four civil liberties organizations expressed their central concern, that the bill allows private companies to disseminate information both to other private companies and the government without the privacy protections seen in previous bills, bounded only by the definition of \u201ccyber security.\u201d Private companies opposing the bill include Mozilla, Reddit, Daily Kos, and others along with many nonprofit organizations.<br \/>\nThose supporting CISPA put out their own letter, expressing relief over liability protections to help them guard their networks and users. <a href=\"http:\/\/www.technet.org\/leaders\/member-companies\/\">TechNet<\/a> and its 70 companies including Google, eBay, Facebook, and other large internet service providers, have come out <a href=\"http:\/\/www.ibtimes.com\/print\/cispa-2013-google-apple-top-massive-list-supporters-favoring-controversial-cybersecurity-bill\">in support of the bill<\/a>.\u00a0 The Department of Defense frames the argument as one of protecting critical infrastructure, and views widespread information sharing as a necessary step in the transformation into a \u201c<a href=\"http:\/\/www.defense.gov\/news\/newsarticle.aspx?id=119405\">joint information environment<\/a>\u201d to guarantee system protection. This new movement was partially a response to the President\u2019s State of the Union address and resulting executive order for <a href=\"http:\/\/www.whitehouse.gov\/the-press-office\/2013\/02\/12\/executive-order-improving-critical-infrastructure-cybersecurity\">Improving Critical Infrastructure Cybersecurity.<\/a> The order promotes a \u201ccyber environment\u201d that encourages innovation while \u201cpromoting safety, security, business confidentiality, privacy, and civil liberties\u201d through cooperation with private industry leaders for information sharing. Regardless of whether CISPA passes or which side of the privacy protection debate you root for, in future any information you inject into the \u201ccyber environment\u201d faces the paradox of easier access by some to achieve greater protection from others.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Tuesday, April 16, 2013, by Samantha Surles The Government\u2019s ability to find and apprehend cyber criminals is one of the big features in the 2014 Defense budget. One of the Department of Defense\u2019s top priorities in 2014 is \u201cexpanding the Cyber Forces\u201d under U.S. Cyber Command and developing a system for \u201ccyber security information sharing.\u201d <a href=\"https:\/\/journals.law.unc.edu\/ncjolt\/blogs\/the-new-joint-information-environment-cispa-and-cybersecurity\/\" class=\"more-link\">&#8230;<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[51],"tags":[],"_links":{"self":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts\/1635"}],"collection":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/comments?post=1635"}],"version-history":[{"count":1,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts\/1635\/revisions"}],"predecessor-version":[{"id":7597,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts\/1635\/revisions\/7597"}],"wp:attachment":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/media?parent=1635"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/categories?post=1635"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/tags?post=1635"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}