Balkinization |
Balkinization
Balkinization Symposiums: A Continuing List E-mail: Jack Balkin: jackbalkin at yahoo.com Bruce Ackerman bruce.ackerman at yale.edu Ian Ayres ian.ayres at yale.edu Corey Brettschneider corey_brettschneider at brown.edu Mary Dudziak mary.l.dudziak at emory.edu Joey Fishkin joey.fishkin at gmail.com Heather Gerken heather.gerken at yale.edu Abbe Gluck abbe.gluck at yale.edu Mark Graber mgraber at law.umaryland.edu Stephen Griffin sgriffin at tulane.edu Jonathan Hafetz jonathan.hafetz at shu.edu Jeremy Kessler jkessler at law.columbia.edu Andrew Koppelman akoppelman at law.northwestern.edu Marty Lederman msl46 at law.georgetown.edu Sanford Levinson slevinson at law.utexas.edu David Luban david.luban at gmail.com Gerard Magliocca gmaglioc at iupui.edu Jason Mazzone mazzonej at illinois.edu Linda McClain lmcclain at bu.edu John Mikhail mikhail at law.georgetown.edu Frank Pasquale pasquale.frank at gmail.com Nate Persily npersily at gmail.com Michael Stokes Paulsen michaelstokespaulsen at gmail.com Deborah Pearlstein dpearlst at yu.edu Rick Pildes rick.pildes at nyu.edu David Pozen dpozen at law.columbia.edu Richard Primus raprimus at umich.edu K. Sabeel Rahman sabeel.rahman at brooklaw.edu Alice Ristroph alice.ristroph at shu.edu Neil Siegel siegel at law.duke.edu David Super david.super at law.georgetown.edu Brian Tamanaha btamanaha at wulaw.wustl.edu Nelson Tebbe nelson.tebbe at brooklaw.edu Mark Tushnet mtushnet at law.harvard.edu Adam Winkler winkler at ucla.edu Compendium of posts on Hobby Lobby and related cases The Anti-Torture Memos: Balkinization Posts on Torture, Interrogation, Detention, War Powers, and OLC The Anti-Torture Memos (arranged by topic) Recent Posts One Step Forward, Two Steps Back: A Review of the Amendments to CISPA
|
Monday, April 30, 2012
One Step Forward, Two Steps Back: A Review of the Amendments to CISPA
Guest Blogger Anjali Dalal After a flurry of last minute amendments last week, the House unexpectedly passed CISPA on Thursday evening. A week ago, I described my concerns with the version of the bill that made it out of the House Committee on Intelligence. In the intervening week, there was considerable outcry around the bill led in part by EFF, ACLU, and CDT. And, learning their lesson from SOPA, the House decided to invite civil liberties constituencies to the table so as to avoid having to witness another implosion of a major legislative goal. As a result, a number of amendments were introduced that began to address some of the most egregious parts of the bill, and, in response, some members of the civil liberties community decided to withhold further, vocal opposition. Then, on Thursday evening, it all fell apart. As Josh Smith at the National Journal described, the CISPA that was passed by the House on Thursday didn’t reflect this negotiation: The Center for Democracy and Technology and the Constitution Project never really dropped objections to the Cyber Intelligence Sharing and Protection Act, but after discussions with the bill’s sponsors, the groups said on April 24 they would not actively oppose the bill and focus on amendments instead. But on April 25, the House Rules Committee shot down 22 of 43 submitted amendments to the bill, known as CISPA. All but one Republican amendments were made in order, while four out of 19 Democratic amendments and four with 10 bipartisan support made the cut. Five amendments were withdrawn. Unhappy with this outcome, the civil liberties groups are doubling down their efforts for the next stage of this battle -- the Senate. That’s the quick recap of what happened last week. This bill still poses serious issues. Here is the version of the bill that reflects all the amendments made. For those who want to compare, this is the original bill without the amendments and these are the eleven amendments that were added on top of it. I’ll spend the rest of this post providing a summary of the amendments made and provide my thoughts on the problems they create and solve. I’ve ordered them, roughly, by importance. 1. Goodlatte Amendment: Provides more detail around what “cybersercurity” means under this bill This amendment places under the umbrella of cybersecurity: (i) a vulnerability of a system or network of a government or private entity; (ii) a threat to the integrity, confidentiality, or availability of a system or network of a government or private entity or any information stored on, processed on, or transiting such a system or network; (iii) efforts to degrade, disrupt, or destroy a system or network of a government or private entity; or (iv) efforts to gain unauthorized access to a system or network of a government or private entity, including to gain such unauthorized access for the purpose of exfiltrating information stored on, processed on, or transiting a system or network of a government or private entity Cyber threat information, under this amendment, now specifically covers information relating to a threat to the “integrity, confidentiality, or availability of a system or network of a government or private entity or any information stored on, processed on, or transiting such a system or network.” Confidentiality is defined as “including the means for protecting proprietary information.” This sounds a lot like intellectual property. If that’s correct, than it means that cybersecurity threats now include intellectual property piracy. Accordingly, private companies can send warrantless surveillance information regarding threats of copyright piracy to the government, and the government is authorized to act on them. It’s not exactly the Son of SOPA, but it does elevate the crime of copyright piracy so that it is now on par with distributed denial of service (DDoS) attacks and Stuxnet type viruses. Availability is defined as “timely and reliable access to and use of information.” This would imply that information about any activity that might slow down a network might be considered cyber threat information. VPN, used by businesses everywhere, slows down the network. End to end encryption, used by programs like Skype, slows down the network. Streaming video, like Netflix, slows down the network. These are all legal, common uses of the Internet, and under this bill, an individual using these applications and services can have her use data passed onto the government as cyber threat information. And more generally, including as a threat any vulnerability to a system or network is dangerously overbroad. As EFF notes, “CISPA currently defines a ‘cybersecurity system,’ as something that is designed to protect a ‘system or network.’” Rainey Reitman, EFF’s activism director explained that this definition “could mean anything—a Local Area Network, a Wide Area Network, a microchip, a website, online service, or a DVD.” Very importantly, the bill does make clear that violation of terms of use or licensing agreements “does not constitute unauthorized access” for the purposes of this bill. This is something that Orin Kerr has discussed at length with respect to Computer Fraud and Abuse Act and is a very good addition to this bill. 2a. Quayle Amendment: Extends the authorized government use of cyber threat information to cover: 1. Cybersecurity 2. Investigation and Prosecution of cybersecurity crimes 3. Protection of “individuals from the danger of death or serious bodily harm” and the investigation and prosecution of such crimes 4. Protection of “minors from child pornography, any risk of sexual exploitation, and serious threats to the physical safety of such minor” and the investigation and prosecution of such crimes 5. National Security This amendment seriously and dangerously expands the scope of this bill and really shares the number one spot with the Goodlatte Amendment. I made a comment about mission creep in my earlier blog post and this amendment seems to exemplify my point. A week ago, we were talking about a cybersecurity bill. Now, we’ve got a bill about fighting crime and child pornography. Practically speaking, this means that when Comcast or Google hands warrantless surveillance information over to the government, the government can use it as long it’s about an issue of cybersecurity or national security. Or about someone who might be in danger. Or about the safety of a minor. Its especially disturbing because fighting crime writ large has long been the responsibility of the government and those responsibilities have long been accompanied by clearly articulated limitations on government power. Those limitations were created to maintain the fine balance between protecting the country and protecting individual liberties. Cybersecurity is a new responsibility the government needs to take on, so one can at least understand how the government might feel that in this Brave New World of wars waged on the Internet, they need new, more expansive authorities. But, to circumvent the protections of the Fourth Amendment for issues that fall squarely into traditional government policing and prosecution seems to be unprecedented and deeply unsettling. 2b. Quayle Amendment: Defines the scope of what constitutes a cybercrime. Under this amendment, cybercrimes includes crimes under state or federal law that involve: 1. efforts to degrade, disrupt, or destroy a system or a network 2. efforts to gain unauthorized access to a system or a network 3. efforts to exfiltrate information from a system or network without authorization 4. the violation of a provision of Federal law relating to computer crimes including the Computer Fraud and Abuse Act of 1986 This is the second part of the Quayle Amendment. It makes very clear that the government can use information obtained without a warrant to investigate and prosecute existing computer crime laws like CFAA. As I have said before, this seems to be a circumvention of the Constitution. Additionally, allowing the government to use this surveillance information to investigate instance of network disruption and degradation causes concern because the definition of network disruption and degradation is still vague. And this raises the same type of void for vagueness concerns I discussed in my last post. Legitimate uses of the network, like Skype, YouTube, and Netflix, can now be caught under the purview of cybercrime. And such an extension of the term is not unfathomable. During the Comcast/Bittorrent battle, Comcast seemed to argue that any application that taxes their network threatens to degrade or disrupt the network. 3. Mulvaney Amendment 1: Attempts to protect civil liberties This amendment does three things. First, it says that the government “may, consistent with the need to protect Federal systems and critical information infrastructure from cybersecurity threats and to mitigate such threats, undertake reasonable efforts to limit the impact on privacy and civil liberties of the sharing of cyber threat information with the Federal Government.” Importantly, this amendment creates no affirmative duty and simply authorizes the government to protect civil liberties insofar as 1) efforts to do so are reasonable 2) such efforts don’t limit the ability of the government to protect against cybersecurity threats. The language here is surprisingly blithe. It does not view civil liberties concerns as equal to national security concerns and instead actively places civil liberties in the back seat. Second, this amendment requires agencies that receive non-cyber threat information to let the responsible company know that the information was a non-cyber threat. Notably, the government is not required to stop interacting with companies that regularly over share nor does is government required to clarify the scope of cyber threat information in order to reduce further instances of over sharing. Third, this amendment requires the government to dispose of information that is given to them unless it conforms to one of the listed purposes for which it can be used. This is a very good thing. However, it should also require that such information be discarded in some reasonably quick time frame. This is a point of concern in part because the government is a major target of cyber attacks. The VA has experienced serious attacks that ended up exposing private information of our veterans. Properly minimizing risk requires such information to be disposed of quickly. 4. Pompeo Amendment 1: Broadens the immunity provision This amendment extends the immunity provision to include any claims arising from the identification and obtaining of cyber threat information, in addition to the original immunity for claims arising from the sharing of such information. As I noted before, the problem with immunity is that it leaves us with no legal recourse. We can’t sue the government because they didn’t actually do anything. We can’t sue the company who violated our privacy because the bill forbids it. 5. Flake Amendment: Requires executive branch to report to Congress a list of which federal agencies receive information under CISPA This amendment requires the government to provide a list of all departments and agencies receiving cyber threat information in its annual report to the Inspector General of the Intelligence Community. The shortcoming of this well-intentioned amendment is, as I mentioned last week, the information in the report can be classified, and thus kept out of the public eye. So, for example, if the NSA is receiving information on American citizens, the mere fact of this might be considered sensitive information and can thus be kept classified. And I’m not just being a skeptic. Consider the Glomar response to Freedom of Information Act Request (FOIA). The Glomar response allows the government to respond to a FOIA request by saying that they can “neither confirm nor deny” the existence of the information requested and has been traditionally used in national security cases. The Glomar exemption cripples FOIA law, because it prevents transparency in instances when it is often needed most. In this same way, the annual report mandated in CISPA can quickly become an ineffective method of internal review if the behavior most in need of review is classified. 6. Amash Amendment: Forbids the government from using personally identifiable library circulation records, library patron lists, book sales records, book customer lists, firearms sales records, tax returns, educational records, and medical records that it receives from private entities under CISPA. This is a good amendment. It prevents the government from using certain, very private information. That said, a private entity under CISPA can still hand over this information without any threat of liability whatsoever. 7. Pompeo Amendment 2: Reiterates that the Federal Government cannot do anything it couldn’t do pre-CISPA when it comes to forcibly deploying cybersecurity tools on private sector networks This amendment just clarifies that CISPA doesn’t alter existing authorities or provide new authority to any federal agency to install, employ, or otherwise use cybersecurity systems on private sector networks. This means that existing law might already authorize the government to require Comcast or Facebook to install certain software on its network and platform, respectively, but CISPA does not – and nor does it affect that existing authority. I don’t know if the government has such an authority under exiting law; maybe under the Communications Assistance for Law Enforcement Act (CALEA), but I’m not sure. 8. Woodall Amendment: Assures private companies that they don’t get punished for choosing not to play ball This amendment assures companies that they won’t be subject to new liabilities if they decide not to participate in the surveillance and sharing of private information authorized by CISPA. 9. Rogers Amendment: Clarifies that CISPA doesn’t affect: i. existing laws that require individuals to provide information to the government ii. the way FOIA applies to information required to provided to the government This amendment clarifies that CISPA doesn’t affect information already required to be provided to the government and the way FOIA applies to said information. 10. Mulvaney Amendment 2: Creates a sunset provision for CISPA This amendment ensures that the provisions of the bill are terminated five years after the date of enactment. 11. Turner Amendment: Makes language consist across Executive Branch This amendment changes the uses of the word “degrade” to “deny access to or” in a multiple places across the bill. Anjali Dalal is a resident fellow at the Yale Information Society Project. You can reach her by e-mail at anjali.dalal at yale.edu Posted 3:00 PM by Guest Blogger [link]
|
Books by Balkinization Bloggers ![]() Linda C. McClain and Aziza Ahmed, The Routledge Companion to Gender and COVID-19 (Routledge, 2024) ![]() David Pozen, The Constitution of the War on Drugs (Oxford University Press, 2024) ![]() Jack M. Balkin, Memory and Authority: The Uses of History in Constitutional Interpretation (Yale University Press, 2024) ![]() Mark A. Graber, Punish Treason, Reward Loyalty: The Forgotten Goals of Constitutional Reform after the Civil War (University of Kansas Press, 2023) ![]() Jack M. Balkin, What Roe v. Wade Should Have Said: The Nation's Top Legal Experts Rewrite America's Most Controversial Decision - Revised Edition (NYU Press, 2023) ![]() Andrew Koppelman, Burning Down the House: How Libertarian Philosophy Was Corrupted by Delusion and Greed (St. Martin’s Press, 2022) ![]() Gerard N. Magliocca, Washington's Heir: The Life of Justice Bushrod Washington (Oxford University Press, 2022) ![]() Joseph Fishkin and William E. Forbath, The Anti-Oligarchy Constitution: Reconstructing the Economic Foundations of American Democracy (Harvard University Press, 2022) Mark Tushnet and Bojan Bugaric, Power to the People: Constitutionalism in the Age of Populism (Oxford University Press 2021). ![]() Mark Philip Bradley and Mary L. Dudziak, eds., Making the Forever War: Marilyn B. Young on the Culture and Politics of American Militarism Culture and Politics in the Cold War and Beyond (University of Massachusetts Press, 2021). ![]() Jack M. Balkin, What Obergefell v. Hodges Should Have Said: The Nation's Top Legal Experts Rewrite America's Same-Sex Marriage Decision (Yale University Press, 2020) ![]() Frank Pasquale, New Laws of Robotics: Defending Human Expertise in the Age of AI (Belknap Press, 2020) ![]() Jack M. Balkin, The Cycles of Constitutional Time (Oxford University Press, 2020) ![]() Mark Tushnet, Taking Back the Constitution: Activist Judges and the Next Age of American Law (Yale University Press 2020). ![]() Andrew Koppelman, Gay Rights vs. Religious Liberty?: The Unnecessary Conflict (Oxford University Press, 2020) ![]() Ezekiel J Emanuel and Abbe R. Gluck, The Trillion Dollar Revolution: How the Affordable Care Act Transformed Politics, Law, and Health Care in America (PublicAffairs, 2020) ![]() Linda C. McClain, Who's the Bigot?: Learning from Conflicts over Marriage and Civil Rights Law (Oxford University Press, 2020) ![]() Sanford Levinson and Jack M. Balkin, Democracy and Dysfunction (University of Chicago Press, 2019) ![]() Sanford Levinson, Written in Stone: Public Monuments in Changing Societies (Duke University Press 2018) ![]() Mark A. Graber, Sanford Levinson, and Mark Tushnet, eds., Constitutional Democracy in Crisis? (Oxford University Press 2018) ![]() Gerard Magliocca, The Heart of the Constitution: How the Bill of Rights became the Bill of Rights (Oxford University Press, 2018) ![]() Cynthia Levinson and Sanford Levinson, Fault Lines in the Constitution: The Framers, Their Fights, and the Flaws that Affect Us Today (Peachtree Publishers, 2017) ![]() Brian Z. Tamanaha, A Realistic Theory of Law (Cambridge University Press 2017) ![]() Sanford Levinson, Nullification and Secession in Modern Constitutional Thought (University Press of Kansas 2016) ![]() Sanford Levinson, An Argument Open to All: Reading The Federalist in the 21st Century (Yale University Press 2015) ![]() Stephen M. Griffin, Broken Trust: Dysfunctional Government and Constitutional Reform (University Press of Kansas, 2015) ![]() Frank Pasquale, The Black Box Society: The Secret Algorithms That Control Money and Information (Harvard University Press, 2015) ![]() Bruce Ackerman, We the People, Volume 3: The Civil Rights Revolution (Harvard University Press, 2014) Balkinization Symposium on We the People, Volume 3: The Civil Rights Revolution ![]() Joseph Fishkin, Bottlenecks: A New Theory of Equal Opportunity (Oxford University Press, 2014) ![]() Mark A. Graber, A New Introduction to American Constitutionalism (Oxford University Press, 2013) ![]() John Mikhail, Elements of Moral Cognition: Rawls' Linguistic Analogy and the Cognitive Science of Moral and Legal Judgment (Cambridge University Press, 2013) ![]() Gerard N. Magliocca, American Founding Son: John Bingham and the Invention of the Fourteenth Amendment (New York University Press, 2013) ![]() Stephen M. Griffin, Long Wars and the Constitution (Harvard University Press, 2013) Andrew Koppelman, The Tough Luck Constitution and the Assault on Health Care Reform (Oxford University Press, 2013) ![]() James E. Fleming and Linda C. McClain, Ordered Liberty: Rights, Responsibilities, and Virtues (Harvard University Press, 2013) Balkinization Symposium on Ordered Liberty: Rights, Responsibilities, and Virtues ![]() Andrew Koppelman, Defending American Religious Neutrality (Harvard University Press, 2013) ![]() Brian Z. Tamanaha, Failing Law Schools (University of Chicago Press, 2012) ![]() Sanford Levinson, Framed: America's 51 Constitutions and the Crisis of Governance (Oxford University Press, 2012) ![]() Linda C. McClain and Joanna L. Grossman, Gender Equality: Dimensions of Women's Equal Citizenship (Cambridge University Press, 2012) ![]() Mary Dudziak, War Time: An Idea, Its History, Its Consequences (Oxford University Press, 2012) ![]() Jack M. Balkin, Living Originalism (Harvard University Press, 2011) ![]() Jason Mazzone, Copyfraud and Other Abuses of Intellectual Property Law (Stanford University Press, 2011) ![]() Richard W. Garnett and Andrew Koppelman, First Amendment Stories, (Foundation Press 2011) ![]() Jack M. Balkin, Constitutional Redemption: Political Faith in an Unjust World (Harvard University Press, 2011) ![]() Gerard Magliocca, The Tragedy of William Jennings Bryan: Constitutional Law and the Politics of Backlash (Yale University Press, 2011) ![]() Bernard Harcourt, The Illusion of Free Markets: Punishment and the Myth of Natural Order (Harvard University Press, 2010) ![]() Bruce Ackerman, The Decline and Fall of the American Republic (Harvard University Press, 2010) Balkinization Symposium on The Decline and Fall of the American Republic ![]() Ian Ayres. Carrots and Sticks: Unlock the Power of Incentives to Get Things Done (Bantam Books, 2010) ![]() Mark Tushnet, Why the Constitution Matters (Yale University Press 2010) Ian Ayres and Barry Nalebuff: Lifecycle Investing: A New, Safe, and Audacious Way to Improve the Performance of Your Retirement Portfolio (Basic Books, 2010) ![]() Jack M. Balkin, The Laws of Change: I Ching and the Philosophy of Life (2d Edition, Sybil Creek Press 2009) ![]() Brian Z. Tamanaha, Beyond the Formalist-Realist Divide: The Role of Politics in Judging (Princeton University Press 2009) ![]() Andrew Koppelman and Tobias Barrington Wolff, A Right to Discriminate?: How the Case of Boy Scouts of America v. James Dale Warped the Law of Free Association (Yale University Press 2009) ![]() Jack M. Balkin and Reva B. Siegel, The Constitution in 2020 (Oxford University Press 2009) Heather K. Gerken, The Democracy Index: Why Our Election System Is Failing and How to Fix It (Princeton University Press 2009) ![]() Mary Dudziak, Exporting American Dreams: Thurgood Marshall's African Journey (Oxford University Press 2008) ![]() David Luban, Legal Ethics and Human Dignity (Cambridge Univ. Press 2007) ![]() Ian Ayres, Super Crunchers: Why Thinking-By-Numbers is the New Way to be Smart (Bantam 2007) ![]() Jack M. Balkin, James Grimmelmann, Eddan Katz, Nimrod Kozlovski, Shlomit Wagman and Tal Zarsky, eds., Cybercrime: Digital Cops in a Networked Environment (N.Y.U. Press 2007) ![]() Jack M. Balkin and Beth Simone Noveck, The State of Play: Law, Games, and Virtual Worlds (N.Y.U. Press 2006) ![]() Andrew Koppelman, Same Sex, Different States: When Same-Sex Marriages Cross State Lines (Yale University Press 2006) Brian Tamanaha, Law as a Means to an End (Cambridge University Press 2006) Sanford Levinson, Our Undemocratic Constitution (Oxford University Press 2006) Mark Graber, Dred Scott and the Problem of Constitutional Evil (Cambridge University Press 2006) Jack M. Balkin, ed., What Roe v. Wade Should Have Said (N.Y.U. Press 2005) Sanford Levinson, ed., Torture: A Collection (Oxford University Press 2004) Balkin.com homepage Bibliography Conlaw.net Cultural Software Writings Opeds The Information Society Project BrownvBoard.com Useful Links Syllabi and Exams |