Three Cybersecurity Alternatives if CISA Fails

Orhan Cam/Shutterstock.com
Lawmakers have focused almost exclusively on information-sharing to boost cybersecurity after a series of high-profile government data breaches.
As senÂatÂors reÂturn from reÂcess to a heapÂing plate of leÂgisÂlatÂive priÂorÂitÂies, a cyÂberÂseÂcurÂity inÂformÂaÂtion-sharÂing bill that stalled earliÂer this sumÂmer is comÂpetÂing for lawÂmakers’ atÂtenÂtion with deÂbates over the presÂidÂent’s nucÂleÂar deal with IrÂan and the loomÂing budget deadÂline.
The CyÂberÂseÂcurÂity InÂformÂaÂtion SharÂing Act, along with the 22 amendÂments that will also get a vote when the bill comes up, is the SenÂate’s main push this sesÂsion for a bill to adÂdress cyÂberÂseÂcurÂity shortÂcomÂings in both the govÂernÂment and the private secÂtor. Two simÂilÂar bills have already passed the House.
OpÂponÂents of CISA—tech exÂperts, priÂvacy adÂvocÂates, and pro-priÂvacy lawÂmakers—have fought to delay the bill and would rather see it dropped comÂpletely. But if CISA does get burÂied unÂder the SenÂate’s packed schedÂule, exÂperts say there are alÂternÂatÂives for lawÂmakers lookÂing for ways to imÂprove cyÂberÂseÂcurÂity through leÂgisÂlaÂtion.
“There are a bunch of othÂer things they could be lookÂing at, some of which are very nonÂconÂtroÂverÂsial, don’t inÂvolve priÂvacy risks, and could be low-hanging fruit,” said Jake LaperÂruque, a proÂgram felÂlow at New AmerÂica’s Open TechÂnoÂlogy InÂstiÂtute.
After hackÂers inÂfiltÂrated comÂputer sysÂtems at the White House, the State DeÂpartÂment, the Pentagon, and the OfÂfice of PerÂsonÂnel ManÂageÂment—all withÂin the last year—ConÂgress began movÂing toÂward a cyÂberÂseÂcurÂity fix with more urÂgency.
The push for CISA has come in large part from the busiÂness comÂmunity, which has a lot to gain from the liÂabÂilÂity proÂtecÂtions built inÂto the bill.
“The ProÂtectÂing AmerÂica’s CyÂber NetÂworks CoÂaliÂtion strongly beÂlieves that CISA is the only game in town on cyÂberÂseÂcurÂity leÂgisÂlaÂtion,” said MatÂthew Eggers, seniÂor dirÂectÂor of naÂtionÂal seÂcurÂity proÂgrams at the U.S. ChamÂber of ComÂmerce, reÂferÂring to a coÂaliÂtion of nearly 50 tech asÂsoÂciÂations. “No cyÂber bill comes close to capÂturÂing both the supÂport of virÂtuÂally every ecoÂnomÂic secÂtor and the White House.”
But priÂvacy adÂvocÂates say lawÂmakers’ near-exÂclusÂive foÂcus on inÂformÂaÂtion-sharÂing was preÂmaÂture.
“In the rush to act, ConÂgress lost sight of all the othÂer soluÂtions,” said Drew MitÂnick, policy counÂsel at AcÂcess, a diÂgitÂal huÂman-rights orÂganÂizÂaÂtion.
Here are three alÂternÂatÂives to inÂformÂaÂtion-sharÂing that exÂperts have floated.
Incentives for vulnerability buybacks
When a seÂcurÂity reÂsearchÂer or a maÂliÂcious hackÂer disÂcovÂers a vulÂnerÂabÂilÂity in a comÂpany’s softÂware or hardÂware—whethÂer it’s a webÂsite, a sensÂitÂive dataÂbase, or critÂicÂal inÂfraÂstrucÂture—he or she must deÂcide what to do with the inÂformÂaÂtion. SeÂcurÂity reÂsearchÂers will ofÂten go straight to the comÂpanÂies to noÂtiÂfy them of the vulÂnerÂabÂilÂity. Some comÂpanÂies are reÂceptÂive to hearÂing about their seÂcurÂity shortÂfalls; othÂers are much slower to reÂspond.
But a hackÂer who is less inÂterÂested in the comÂpany’s well-beÂing will likely take a more profÂitÂable route, turnÂing to the shadier corners of the InÂterÂnet to pawn off the vulÂnerÂabÂilÂity.
One way comÂpanÂies can keep bugs and vulÂnerÂabÂilÂitÂies from apÂpearÂing on onÂline black and gray marÂkets is by ofÂferÂing to buy them from the people who disÂcovÂer them. Some comÂpanÂies already have buyÂback, or “bug bounty,” proÂgrams. A numÂber of tech comÂpanÂies ofÂfer upÂward of tens of thouÂsands of dolÂlars for vulÂnerÂabÂilÂitÂies; United AirÂlines reÂcently beÂcame the first airÂline to inÂtroÂduce a buyÂback proÂgram, anÂnounÂcing bounÂties of up to 1 milÂlion freÂquent-fliÂer miles for bugs in its webÂsites and apps. But it speÂcificÂally exÂcluded from the bounty proÂgram reÂsearch on vulÂnerÂabÂilÂitÂies in critÂicÂal inÂfraÂstrucÂture, like the acÂtuÂal airÂplanes United flies.
Tech exÂperts say the govÂernÂment could inÂcentivÂize buyÂback proÂgrams by ofÂferÂing the private secÂtor grants or tax write-offs for the purÂchases.
“If a comÂpany wants to pay to get a vulÂnerÂabÂilÂity off the black marÂket or the gray marÂket, then we’re goÂing to help them do that and enÂcourÂage them to do that,” said LaperÂruque.
Clarifications of anti-hacking laws
AnÂothÂer way to enÂcourÂage the seÂcurÂity reÂsearch that makes the private secÂtor safer is by claÂriÂfyÂing and trimÂming down anti-hackÂing laws like the ComÂputer Fraud and AbÂuse Act, tech actÂivÂists say.
That law is used to proÂsecÂute hackÂers who make their way inÂto proÂtecÂted comÂputer sysÂtems, but priÂvacy adÂvocÂates have long criÂtiÂcized the law for beÂing overly broad and disÂcourÂaging leÂgitÂimÂate seÂcurÂity reÂsearch.
LawÂmakers have tried in the past to cut the law down to size, with bills like Aaron’s Law—named after a seÂcurÂity reÂsearchÂer who took his own life after beÂing charged with data theft—which would claÂriÂfy when reÂsearch on vulÂnerÂabÂilÂitÂies in pubÂlic and private sysÂtems is lawÂful.
“ImÂprovÂing the law so that seÂcurÂity exÂperts can acÂtuÂally conÂduct reÂsearch without fearÂing proÂsecÂuÂtion” would be a boon to cyÂberÂseÂcurÂity, MitÂnick said.
One proÂposed amendÂment to CISA, put forÂward by Sen. ShelÂdon WhiteÂhouse, would alÂter the comÂputer-hackÂing law, but priÂvacy adÂvocÂates are worÂried that the change would make seÂcurÂity reÂsearch more difÂfiÂcult rather than easiÂer.
An end to government "stigmatization" of encryption
FBI DirÂectÂor James Comey has reÂcently waged a pubÂlic-reÂlaÂtions war on tech comÂpanÂies’ enÂcrypÂtion pracÂtices, railÂing against end-to-end enÂcrypÂtion in speeches and comÂmitÂtee hearÂings.
Comey arÂgues that strong, nearly inÂacÂcessÂible enÂcrypÂtion is a threat to naÂtionÂal seÂcurÂity beÂcause it leaves law enÂforceÂment blind to the comÂmuÂnicÂaÂtions of poÂtenÂtial terÂrorÂists and crimÂinÂals. He has asked tech comÂpanÂies to build in a way to deÂcode enÂcrypÂted comÂmuÂnicÂaÂtion that comÂpanÂies could use when asked by law enÂforceÂment. ExÂperts have warned against built-in vulÂnerÂabÂilÂitÂies, cauÂtionÂing that inÂtrepÂid hackÂers will alÂways find ways to exÂploit them.
Some lawÂmakers have taken up the pro-enÂcrypÂtion fight. Reps. Will Hurd and Ted Lieu, two comÂputer sciÂentÂists on the House OverÂsight ComÂmitÂtee, sent a letÂter to Comey in June, conÂdemning the FBI’s stance on the so-called “backÂdoors” that would alÂlow law enÂforceÂment to acÂcess enÂcrypÂted comÂmuÂnicÂaÂtion.
The conÂflict over enÂcrypÂtion has been detÂriÂmentÂal to private-secÂtor cyÂberÂseÂcurÂity, MitÂnick says, beÂcause it disÂcourÂages more busiÂnesses from takÂing up the pracÂtice.
“The govÂernÂment should stop stigÂmatÂizÂing these strong seÂcurÂity measÂures,” MitÂnick said. “I think that would proÂtect the govÂernÂment, proÂtect conÂsumers, and proÂtect busiÂnesses.”
NEXT STORY: DOE CISO heads to Commerce




