Article Lead Image

Photo via Abri_Beluga/Flickr (CC BY 2.0) | Remix by Fernando Alfonso III

Obama reveals new cybersecurity plan

You can't please everybody, but is Obama trying to please anybody at all?

 

Kevin Collier

Tech

Posted on Jan 14, 2015   Updated on May 29, 2021, 6:44 pm CDT

Prompted perhaps by recent hacks into Sony Entertainment, or maybe the return of controversial cyber defense bill CISPA, President Obama has revealed his new cybersecurity plan.

Unsurprisingly, Internet freedom groups like it better than the Cyber Intelligence Sharing and Protection Act, but they still are far from happy with Obama’s proposal.

Obama’s proposal primarily focuses on two areas. First, he wants a way for private companies to legally share confidential information with the government when they’re under attack—theoretically the same issue CISPA addresses. Second, he’d change the scope and definition of the U.S.’s notorious hacking law, the Computer Fraud and Abuse Act (CFAA).

“Information sharing,” which really gained traction in the wake of 9/11, when reviews found federal agencies could have perhaps prevented the attacks if they’d done a better job pooling their intelligence, is a common cybersecurity proposal in D.C. Essentially, its proponents would make it easier for private companies who find themselves under attack to share what’s happening on their systems with the government—something that in other cases could be illegal.

While privacy advocates resoundingly reject CISPA for having few user privacy protections, they’re more mixed with Obama’s plan. The Center for Democracy and Technology praised elements of the White House proposal, saying in a statement that it “contains some privacy protections not present in [CISPA],” but the center worries it “relies heavily on privacy guidelines that are currently unwritten.”

The Electronic Frontier Foundation was even less forgiving. Largely critical of the very concept of information sharing as a means to increase national cybersecurity, its lawyers declared themselves “concerned that the Administration proposal will unintentionally legitimize the approach taken by [CISPA].” Instead, they argued, the White House should focus on existing, underutilized government resources like Information Sharing and Analysis Centers (ISACs) and the Department of Homeland Security’s Enhanced Cybersecurity Services.

The group more resoundingly criticized the second major part of Obama’s proposal. The CFAA is already rife with examples of instances of harsh penalization—look no further than Aaron Swartz, who committed suicide as he faced potential decades in prison for sharing academic journals from MIT. The White House would actually increase CFAA crimes, meaning two or more violations of it equals potential racketeering charges.

To be fair to the White House, it also calls for a reevaluation of what constitutes a computer crime, and this could theoretically bring about the long-delayed CFAA reform that digital rights advocates have been clamoring for. The proposal “modernizes the Computer Fraud and Abuse Act by ensuring that insignificant conduct does not fall within the scope of the statute,” it says, though it’s not clear what “insignifiant” would mean in the real world.

Of course, there’s always the question of whether any of this proposed legislation would actually solve the problems it’s supposed to. Speaking at the White House Tuesday, Obama referenced both the Sony hack and a recent defacement of the U.S. Central Command’s Twitter account. “It just goes to show how much more work we need to do,” he said, “to strengthen our cybersecurity.”

It’s clear that this proposal does that.

“[I] haven’t seen one provision that would have helped against Sony attack,” tweeted Kurt Opsahl, EFF’s deputy general counsel. And the Central Command Twitter account hack, claimed by the hacker group CyberCaliphate, was apparently nothing more complicated than a phishing operation; it would have been prevented if the Pentagon’s social media team had just turned on two-factor authentication—a basic security step everyone should follow for cases just like this. Perhaps Opsahl put it best:

Photo via Abri_Beluga/Flickr (CC BY 2.0) | Remix by Fernando Alfonso III

Share this article
*First Published: Jan 14, 2015, 12:58 am CST