|July 16, 2013
You may recall that, back during the CISPA debate, one of our biggest concerns was the broad immunity from liability that the bill gave to tech companies if they shared data with the government -- including the NSA. Many people campaigned for limitations on that, including restricting what kind of information would be shared, and trying to keep that info away from the NSA. Of course, given the revelations over the last couple months about the amount of information sharing that already happens with the NSA and the DOJ/FBI, -- including giving zero day exploits to the government and building in backdoors -- it seems doubly worrisome what CISPA would allow.
At a private meeting with financial industry officials a few years ago, Alexander spoke about the proliferation of computer malware aimed at siphoning data from networks, including those of banks. The meeting was described by a participant who spoke on the condition of anonymity because the discussion was off the record.Now, some may argue that it would be crazy to interpret CISPA liability protections from leading to that sort of situation, but given how the NSA has pushed for incredibly broad interpretations of other laws, how crazy is it really?
His proposed solution: Private companies should give the government access to their networks so it could screen out the harmful software. The NSA chief was offering to serve as an all-knowing virus-protection service, but at the cost, industry officials felt, of an unprecedented intrusion into the financial institutions’ databases.
The group of financial industry officials, sitting around a table at the Office of the Director of National Intelligence, were stunned, immediately grasping the privacy implications of what Alexander was politely but urgently suggesting. As a group, they demurred.