Cybersecurity Bill: Protecting Us From Attacks… Or Keeping Our Own Attacks Secret?

from the seems-quite-likely dept

We’ve been discussing the fight in the Senate over the latest version of the Cybersecurity Act. One of the things we mentioned is that, at 211-pages, it’s quite likely there are a ton of little “easter egg” gems in there that the public doesn’t want or need, but which we’ll be stuck with — and only discover way down the road. Paul Rosenzweig, over at the Lawfare Blog, may have turned up one of them, in trying to understand Section 706(d), which reads:

(d) DELAY OF NOTIFICATION AUTHORIZED FOR LAW ENFORCEMENT, NATIONAL SECURITY, OR HOMELAND  SECURITY PURPOSES.—No civil or criminal cause of action shall lie or be maintained in any Federal or Statecourt against any entity, and any such action shall be dismissed promptly, for a failure to disclose a cybersecurity threat indicator if—

(1) the Attorney General or the Secretary determines that disclosure of a cybersecurity threat indicator would impede a civil or criminal investigation and submits a written request to delay notification for up to 30 days, except that the Attorney General or the Secretary may, by a subsequent written request, revoke such delay or extend the period of time set forth in the original request made under this paragraph if further delay is necessary;

(2) the Secretary, the Attorney General, or the Director of National Intelligence determines that disclosure of a cybersecurity threat indicator would threaten national or homeland security and submits a written request to delay notification, except that  the Secretary, the Attorney General, or the Director,may, by a subsequent written request, revoke such delay or extend the period of time set forth in the original request made under this paragraph if further delay is necessary.

What’s odd about this? Well, it suggests that it says that companies might not get in legal trouble if they don’t disclose info. But, as we’re constantly reminded, the whole point of the info sharing from companies in this bill is that it’s voluntary. So there wouldn’t be any cause of action generally when they choose not to share. But, as Rosenzweig thinks through it, there is another scenario where this could come into play: if a company wanted to share info but was stopped — perhaps because that info implicated the US government itself:

I suppose there is another possibility as well – that they might want to stop temporarily the sharing of CTI when the threat being disclosed is one that has been created by …. Well, NSA. In fact, if you believe that, then the reason the government so much wants to be at the center of CTI sharing is not just to protect the public but also to protect its own methods.

This actually makes a fair amount of sense. Remember, the only two serious cases of digital attacks that we know of — Stuxnet and Flame — both appear to have originated from US government officials, and both eventually got out when security firms discovered their existence, and tried to make sense of the malware. So, perhaps part of the “urgency” in trying to pass this bill is to help silence researchers who discover what other malware the US government has put out itself!

Filed Under: , , , , ,

Rate this comment as insightful
Rate this comment as funny
You have rated this comment as insightful
You have rated this comment as funny
Flag this comment as abusive/trolling/spam
You have flagged this comment
The first word has already been claimed
The last word has already been claimed
Insightful Lightbulb icon Funny Laughing icon Abusive/trolling/spam Flag icon Insightful badge Lightbulb icon Funny badge Laughing icon Comments icon

Comments on “Cybersecurity Bill: Protecting Us From Attacks… Or Keeping Our Own Attacks Secret?”

Subscribe: RSS Leave a comment
20 Comments
The Luke Witnesser says:

Re: Re:

Gun control, miniature SOPA-esque provisions, now this. It’s pretty clear at this point that the bill was first presented as a version that “addressed” privacy concerns just so they could smuggle the really evil shit in there through amendments. Frankly, I am disgusted with these politicians (as if I wasn’t already). Vast majority of them are pretty much soulless scum and all about the power.

Anonymous Coward says:

Re: Re:

Consipracy theories are only tinfoil hat worthy when you don’t have proof of one. And it just so happens the only “cyberwar” malware was put out by our own goverment.

That’s far more evidence than the anti big search crowd
who claim google is in control of both the deafeat of SOPA and is controlling MIke have.

Anonymous Coward says:

it’s definitely to keep secret the invasion of privacy being executed on our own people. any and all so-called security bills are meant to do the same thing with the addition of stopping the people from finding out what the government is really up to, so corrupt politicians and corporation execs can continue to line their own pockets at the expense of others.

Anonymous Coward says:

Remember, the only two serious cases of digital attacks that we know of — Stuxnet and Flame — both appear to have originated from US government officials, and both eventually got out when security firms discovered their existence, and tried to make sense of the malware.

Weren’t most of these security firms from other countries?

Anonymous Coward says:

Any time they get a case they don’t quite know what to do with it seems it always comes back to a national security issue.

I would like to remind readers that not to long ago, the US military claimed that a cyber attack was the same as provocation for war. In essence the US has through the release of cyber attacks already declared war on Iran.

Add Your Comment

Your email address will not be published. Required fields are marked *

Have a Techdirt Account? Sign in now. Want one? Register here

Comment Options:

Make this the or (get credits or sign in to see balance) what's this?

What's this?

Techdirt community members with Techdirt Credits can spotlight a comment as either the "First Word" or "Last Word" on a particular comment thread. Credits can be purchased at the Techdirt Insider Shop »

Follow Techdirt

Techdirt Daily Newsletter

Ctrl-Alt-Speech

A weekly news podcast from
Mike Masnick & Ben Whitelaw

Subscribe now to Ctrl-Alt-Speech »
Techdirt Deals
Techdirt Insider Discord
The latest chatter on the Techdirt Insider Discord channel...
Loading...