The problem is well known. The difficulty lies in resolving deeply felt concerns over any increase in government surveillance authority, no matter how important the purpose. We are also paralyzed by a sense of fatalism that cyber vulnerabilities are simply the price we pay for being online, and an erroneous belief that the Constitution stands in the way of any solution.
Most cybersecurity experts agree an effective public-private cyber information-sharing system is essential in stopping foreign cyber maliciousness before it causes too much damage. But information sharing isnt enough; it would be hamstrung from the start if the government cannot seamlessly and quickly track malicious cyber activity from its foreign source to its intended domestic victims. If some government agency had that legal power, then it could, for example, quickly check out a domestic IP address after an alert from the NSA that the address was communicating with a suspicious overseas server. If that IP address showed questionable activity, the government and the private sector jointly could take steps to reconfigure firewalls or otherwise curtail the hack. Admittedly, this wouldnt prevent hacks and attacks that were based on previously unknown software bugs (so called zero-day exploits). But the reality is that most large-scale hacks by foreign countries rely on already known software imperfections and hardware deficiencies.
The issue is that almost any kind of domestic cyber inspection, even in hot pursuit of a foreign adversary, would be considered a search within the Constitutions Fourth Amendment, which requires searches and seizures by the government to be not unreasonable and in many (but by no means all) cases to be based on a search warrant issued by a judge. The notion that searches could possibly be electronic was of course not in the framers minds when adopting the amendment in 1792, but the reasonableness standard has allowed courts over the years to apply it to new techniques and technologies, including cyber surveillance.
To track foreign cyber malevolence in a new domestic legal framework, we would need a cyber monitoring capability that was so limited and safeguarded that it didnt trigger the Constitutions warrant requirement. The judicial cases tell us this should be possible. After all, for over half a century, courts have approved a range of not unreasonable warrantless electronic surveillance under the Fourth Amendment, taking into account various subjective factors, including the exigency of the surveillance, whether the information had already been revealed to third parties, the level of personal sensitivity of the data, whether the surveillance is broad or tailored, how likely it is that information about nontargets will be scooped up in the surveillance, and whether there are effective oversight mechanisms.
Like a property owner who has put up a fence a few feet inside his property line just to be safe, Congress has established more restrictive structures and rules in our current system than what the Constitution would require for reasonable, warrantless monitoring. The task is to see whether a legislative solution can be crafted in that intervening space. The goal is to not change the property line; there should be no weakening of the Fourth Amendments limits.
Heres what an effective new legal authority, fully consistent with the Constitution, might look like:
Any domestic inspection or monitoring would be expressly limited by the type of both target and information collected. It would be restricted to specifically identified IP addresses or other communications equipment located in the United States that was linked (by the U.S. intelligence community or the FBI) to a foreign person or country suspected of specific cyber wrongdoing. No other targets could be examined; there would be no bulk or indiscriminate collection of data. The activity might be limited to simply a traffic analysis seeing which U.S. or foreign IP addresses were communicating with the target or examining its logbook to look at historic connections. The government would not be allowed to look at emails or otherwise collect the substance of communications, except in the rare case (perhaps with additional approvals) when it was actually necessary for cybersecurity purposes.
Internal governmental approvals would be needed, with a senior official certifying the underlying facts as to why the domestic inspection was required. The requirement would depend on the circumstances, but would need to be explicit. For example, there could be evidence that a server known to be controlled by a foreign nation was communicating with a U.S. IP address, or that certain malware or techniques that the intelligence community knew were unique to foreign cyber malefactors were being tracked to U.S. internet servers.
Housing the legal authority in the FBI, rather than the NSA, might make sense. The countries with values closest to ours, such as the United Kingdom, Australia, Canada and New Zealand, have all placed their domestic cyber monitoring authorities within their foreign signals intelligence agencies (or in new affiliates). Locating this new legal authority in the NSA would follow that pattern, but the political reality is that this would be problematic. The FBI, which sits within the Department of Justice and already investigates malicious foreign cyber activity seems like a logical and acceptable alternative. Whichever agency is chosen, a governmental partnership is critical, with the NSA supplying technical expertise and foreign intelligence insights, the FBI bringing its longtime relationships with internet service providers and other communications infrastructure owners, and the Department of Homeland Security assisting with coordination and communications with the private sector, which should be equally engaged in the process.
The domestic monitoring would be limited in time. After an initial period of 72 hours, the monitoring should end, unless further corroborating information or a demonstrated need to do deeper analysis warranted a limited extension.
The resulting data could be used by the government only for cybersecurity purposes. Those purposes would, however, include thorough investigation into exactly what the foreign cyber malefactor did and with whom it was in contact. The data would have to be deleted after some period and couldnt be searched for general foreign intelligence or law enforcement purposes, or shared with other government agencies (presumably with some limited exceptions such as discovery of actual evidence of a federal crime).
Oversight should be required and modeled on the largely successful compliance scheme for the Foreign Intelligence Surveillance Act. For example, the attorney general or the Foreign Intelligence Surveillance Court could receive periodic reports of the legal authoritys use and audit the activity, and the Privacy and Civil Liberties Oversight Board could independently verify compliance. DHS could consult with the private sector and issue annual assessments of whether the authority was indeed effective in curtailing cyber hacks and attacks.
The private sector will be required to cooperate, and not simply shut down suspect accounts. Any meaningful understanding of compromised domestic networks will likely require the assistance of owners of the affected servers or cloud service providers, so they should be required under this new legal authority to cooperate with the government, much like the way telephone companies are obligated under current law to assist the FBI with lawful wiretaps.
This proposal is by no means the only solution; its merely one way to balance the need for more cyber visibility while preserving our constitutional freedoms. After all, the Constitution is designed to protect our liberties, not to provide authoritarian regimes with no use for such liberties a means to exploit our vital online systems with virtual impunity.
View original post here:
Opinion | Theres a Big Gap in Our Cyber Defenses. Heres How to Close It. - POLITICO
- Protections for e-data clear Senate committee [Last Updated On: April 26th, 2014] [Originally Added On: April 26th, 2014]
- Quinn: Supreme Court should clarify Fourth Amendment rights in the digital age [Last Updated On: April 26th, 2014] [Originally Added On: April 26th, 2014]
- Fourth amendment | Wex Legal Dictionary / Encyclopedia ... [Last Updated On: April 26th, 2014] [Originally Added On: April 26th, 2014]
- Fourth Amendment to the United States Constitution ... [Last Updated On: April 26th, 2014] [Originally Added On: April 26th, 2014]
- The Fourth Amendment is destroyed by the Roberts led Supreme Court. - Video [Last Updated On: April 26th, 2014] [Originally Added On: April 26th, 2014]
- Court may let cops search smartphones [Last Updated On: April 28th, 2014] [Originally Added On: April 28th, 2014]
- Supreme Court to hear case on police searches of cellphones [Last Updated On: April 28th, 2014] [Originally Added On: April 28th, 2014]
- Fourth Amendment in the digital age: Supreme Court to decide if police can search cellphones without a warrant [Last Updated On: April 30th, 2014] [Originally Added On: April 30th, 2014]
- What Scalia knows about illegal searches [Last Updated On: April 30th, 2014] [Originally Added On: April 30th, 2014]
- Should police be allowed to search your smartphone - Video [Last Updated On: April 30th, 2014] [Originally Added On: April 30th, 2014]
- Fourth Amendment to the United States Constitution - Video [Last Updated On: May 1st, 2014] [Originally Added On: May 1st, 2014]
- Rand Paul Third Party Records Should Get Fourth Amendment Protection O'Reilly Factor 6 11 2013 - Video [Last Updated On: May 1st, 2014] [Originally Added On: May 1st, 2014]
- The Shaky Legal Foundation of NSA Surveillance on Americans [Last Updated On: May 2nd, 2014] [Originally Added On: May 2nd, 2014]
- Pennsylvania Supreme Court rules police don't need warrants to search cars [Last Updated On: May 3rd, 2014] [Originally Added On: May 3rd, 2014]
- Local police: Updated vehicle-search law still requires probable cause [Last Updated On: May 3rd, 2014] [Originally Added On: May 3rd, 2014]
- Liberal Supreme Court Justice Comes To The Defense Of Scalia [Last Updated On: May 3rd, 2014] [Originally Added On: May 3rd, 2014]
- Gerald Celente - Trends In The News - America's Spiritual Death - (1/20/14) - Video [Last Updated On: May 4th, 2014] [Originally Added On: May 4th, 2014]
- Smartphones and the Fourth Amendment - Video [Last Updated On: May 4th, 2014] [Originally Added On: May 4th, 2014]
- Fourth Amendment Searches And Seizures - Video [Last Updated On: May 5th, 2014] [Originally Added On: May 5th, 2014]
- Fourth Amendment Defined & Explained - Law [Last Updated On: May 6th, 2014] [Originally Added On: May 6th, 2014]
- Enforcement Techniques For Violations Of The Fourth Amendment - Video [Last Updated On: May 6th, 2014] [Originally Added On: May 6th, 2014]
- I-Team: Do police seek search warrant friendly judges? [Last Updated On: May 7th, 2014] [Originally Added On: May 7th, 2014]
- Is Big Brother Listening? Applying the Fourth Amendment in an Electronic Age - Video [Last Updated On: May 9th, 2014] [Originally Added On: May 9th, 2014]
- It Costs Less to Care [Last Updated On: May 10th, 2014] [Originally Added On: May 10th, 2014]
- The Fourth Amendment - Video [Last Updated On: May 10th, 2014] [Originally Added On: May 10th, 2014]
- Magistrate waxes poetic while rejecting Gmail search request [Last Updated On: May 11th, 2014] [Originally Added On: May 11th, 2014]
- License reader lawsuit can be heard, appeals court rules [Last Updated On: May 15th, 2014] [Originally Added On: May 15th, 2014]
- Seize the Rojo - Video [Last Updated On: May 16th, 2014] [Originally Added On: May 16th, 2014]
- NSA Spying Has a Disproportionate Effect on Immigrants [Last Updated On: May 17th, 2014] [Originally Added On: May 17th, 2014]
- Motorists sue Aurora, police in 2012 traffic stop after bank robbery [Last Updated On: May 17th, 2014] [Originally Added On: May 17th, 2014]
- Judge Says NSA Phone Surveillance Likely Unconstitutional - Video [Last Updated On: May 21st, 2014] [Originally Added On: May 21st, 2014]
- New York Attorney Heath D. Harte Releases a Statement on Fourth Amendment Rights [Last Updated On: May 22nd, 2014] [Originally Added On: May 22nd, 2014]
- Bangor Area School District teachers vote no to random drug [Last Updated On: May 24th, 2014] [Originally Added On: May 24th, 2014]
- The Fourth Amendment Rights - Video [Last Updated On: May 24th, 2014] [Originally Added On: May 24th, 2014]
- I Don't Care About The Contitution, Take Your Fourth Amendment And Shove It The Hills Hotel - Video [Last Updated On: May 27th, 2014] [Originally Added On: May 27th, 2014]
- Lonestar1776 at Illegal Checkpoint 80 Miles Inside Border - Standing UP & Pushing Back! pt 2/2 - Video [Last Updated On: September 1st, 2014] [Originally Added On: September 1st, 2014]
- Suit charges Daytona Beach's rental inspection program violates civil rights [Last Updated On: September 2nd, 2014] [Originally Added On: September 2nd, 2014]
- 4th Amendment - Laws.com [Last Updated On: September 6th, 2014] [Originally Added On: September 6th, 2014]
- YOU CAN ARREST ME NOW (cops refuse) - Video [Last Updated On: September 6th, 2014] [Originally Added On: September 6th, 2014]
- The Feds Explain How They Seized The Silk Road Servers [Last Updated On: September 8th, 2014] [Originally Added On: September 8th, 2014]
- Defence asks judge in NYC to toss out bulk of evidence in Silk Road case as illegally obtained [Last Updated On: September 9th, 2014] [Originally Added On: September 9th, 2014]
- Volokh Conspiracy: Does obtaining leaked data from a misconfigured website violate the CFAA? [Last Updated On: September 9th, 2014] [Originally Added On: September 9th, 2014]
- Family of a mentally ill woman files lawsuit against San Mateo Co. after deadly shooting [Last Updated On: September 10th, 2014] [Originally Added On: September 10th, 2014]
- Minnesota Supreme Court upholds airport drug case decision [Last Updated On: September 12th, 2014] [Originally Added On: September 12th, 2014]
- Law Talk - Obamacare Rollout; Fourth Amendment, NSA Spying Stop & Frisk DUI Check Points lta041 - Video [Last Updated On: September 12th, 2014] [Originally Added On: September 12th, 2014]
- Volokh Conspiracy: The posse comitatus case and changing views of the exclusionary rule [Last Updated On: September 15th, 2014] [Originally Added On: September 15th, 2014]
- Guest: Why the privacy of a public employees cellphone matters [Last Updated On: September 16th, 2014] [Originally Added On: September 16th, 2014]
- Volokh Conspiracy: Apples dangerous game [Last Updated On: September 19th, 2014] [Originally Added On: September 19th, 2014]
- Judge expounds on privacy rights [Last Updated On: September 20th, 2014] [Originally Added On: September 20th, 2014]
- Great privacy essay: Fourth Amendment Doctrine in the Era of Total Surveillance [Last Updated On: September 20th, 2014] [Originally Added On: September 20th, 2014]
- The Fourth Amendment By Maison Erdman - Video [Last Updated On: September 20th, 2014] [Originally Added On: September 20th, 2014]
- Volokh Conspiracy: When administrative inspections of businesses turn into massive armed police raids [Last Updated On: September 22nd, 2014] [Originally Added On: September 22nd, 2014]
- The chilling loophole that lets police stop, question and search you for no good reason [Last Updated On: September 23rd, 2014] [Originally Added On: September 23rd, 2014]
- E.O. 12333: End-Running the Fourth Amendment | The Dissenter [Last Updated On: September 25th, 2014] [Originally Added On: September 25th, 2014]
- Fourth Amendment: The History Behind "Unreasonable ... [Last Updated On: September 25th, 2014] [Originally Added On: September 25th, 2014]
- Pet Owners Look to Muzzle Police Who Shoot Dogs [Last Updated On: September 27th, 2014] [Originally Added On: September 27th, 2014]
- Volokh Conspiracy: A few thoughts on Heien v. North Carolina [Last Updated On: September 29th, 2014] [Originally Added On: September 29th, 2014]
- Volokh Conspiracy: Third Circuit on the mosaic theory and Smith v. Maryland [Last Updated On: October 1st, 2014] [Originally Added On: October 1st, 2014]
- Volokh Conspiracy: Third Circuit gives narrow reading to exclusionary rule [Last Updated On: October 2nd, 2014] [Originally Added On: October 2nd, 2014]
- Volokh Conspiracy: Supreme Court takes case on duration of traffic stops [Last Updated On: October 2nd, 2014] [Originally Added On: October 2nd, 2014]
- Search & Seizure, Racial Bias: The American Law Journal on the Philadelphia CNN-News Affiliate WFMZ Monday, October 6 ... [Last Updated On: October 4th, 2014] [Originally Added On: October 4th, 2014]
- Argument preview: How many brake lights need to be working on your car? [Last Updated On: October 4th, 2014] [Originally Added On: October 4th, 2014]
- The 'Barney Fife Loophole' to the Fourth Amendment [Last Updated On: October 4th, 2014] [Originally Added On: October 4th, 2014]
- Search & Seizure: A New Fourth Amendment for a New Generation? - Promo - Video [Last Updated On: October 4th, 2014] [Originally Added On: October 4th, 2014]
- Lubbock Liberty Workshop With Arnold Loewy On The Fourth Amendment - Video [Last Updated On: October 5th, 2014] [Originally Added On: October 5th, 2014]
- Ap Government Fourth Amendment Project - Video [Last Updated On: October 5th, 2014] [Originally Added On: October 5th, 2014]
- Volokh Conspiracy: Oral argument in Heien v. North Carolina [Last Updated On: October 6th, 2014] [Originally Added On: October 6th, 2014]
- Feds Hacked Silk Road Without a Warrant? Perfectly Legal, Prosecutors Argue [Last Updated On: October 7th, 2014] [Originally Added On: October 7th, 2014]
- Supreme Court Starts Term with Fourth Amendment Case [Last Updated On: October 7th, 2014] [Originally Added On: October 7th, 2014]
- Feds Say That Even If FBI Hacked The Silk Road, Ulbricht's Rights Weren't Violated [Last Updated On: October 8th, 2014] [Originally Added On: October 8th, 2014]
- Argument analysis: A simple answer to a deceptively simple Fourth Amendment question? [Last Updated On: October 8th, 2014] [Originally Added On: October 8th, 2014]
- Mass Collection of U.S. Phone Records Violates the Fourth Amendment - Video [Last Updated On: October 8th, 2014] [Originally Added On: October 8th, 2014]
- Leggett sides with civil liberties supporters [Last Updated On: October 10th, 2014] [Originally Added On: October 10th, 2014]
- Search & Seizure / Car Stops: A 'New' Fourth Amendment for a New Generation? - Video [Last Updated On: October 10th, 2014] [Originally Added On: October 10th, 2014]
- Broken Lights And The Fourth Amendment National Constitution Center - Video [Last Updated On: October 10th, 2014] [Originally Added On: October 10th, 2014]
- The Fourth Amendment- The Maininator Period 4 - Video [Last Updated On: October 10th, 2014] [Originally Added On: October 10th, 2014]
- Judge nukes Ulbricht's complaint about WARRANTLESS FBI Silk Road server raid [Last Updated On: October 11th, 2014] [Originally Added On: October 11th, 2014]
- Montgomery County will not hold immigrants without probable cause -- Gazette.Net [Last Updated On: October 13th, 2014] [Originally Added On: October 13th, 2014]
- Debate: Does Mass Phone Data Collection Violate The 4th Amendment? [Last Updated On: October 15th, 2014] [Originally Added On: October 15th, 2014]
- Does the mass collection of phone records violate the Fourth Amendment? [Last Updated On: October 18th, 2014] [Originally Added On: October 18th, 2014]