meta_pixel
Tapesearch Logo
Log in
Congressional Dish

CD113: CISA is Law

Congressional Dish

Jennifer Briney

News, Congress, Government, Politics, Corporations

4.81.1K Ratings

🗓️ 27 December 2015

⏱️ 52 minutes

🧾️ Download transcript

Summary

Cybersecurity or surveillance? What does the language attached at the last minute to the 2,009 page omnibus government funding bill actually authorize? In this episode, we take a close look at what just became law. Please support Congressional Dish: to contribute with PayPal or Bitcoin; click the PayPal "Make it Monthly" checkbox to create a monthly subscription to support Congressional Dish for each episode via Patreon Mail Contributions to: 5753 Hwy 85 North #4576 Crestview, FL 32536 Thank you for supporting truly independent media! The Cybersecurity Act of 2015 was attached at the last minute to the "omnibus" government funding bill, which was 2,009 pages long and available to read for less than three days before it became law. This is and outline of what became law: "": "Any executive department, military department, Government corporation, Government controlled corporation, or other establishment in the executive branch of Government" Does NOT include the Government Accountability Office, Federal Election Commission, or Government-owned contractor-operated facilities "": An action that "may result in an unauthorized effort to adversely impact the security, availability, confidentiality, or integrity of an information system or information that is stored on, processed by, or transiting an information system". "": "Information that is necessary to describe or identify"... Spying, including strange patterns of communications that appear to be collecting technical information Security breaches Security vulnerabilities A legitimate user being used to defeat a security system Malicious cyber command and control "The actual or potential harm caused by an incident, including a description of the information exfiltrated as a result of a particular cybersecurity threat" "Any other attribute of a cybersecurity threat, if disclosure of such attribute is not otherwise prohibited by law" "": "Any , non-Federal government agency or department, or State, tribal, or local government (including a political subdivision, department, or component thereof)" Does not include a foreign power, Procedures for sharing information both within and outside the Federal government will be created by: Director of National Intelligence Secretary of Homeland Security Secretary of Defense Attorney General ... Allow real time sharing of information Include requirements for the government to protect the information from unauthorized access Require Federal entities to review cyber threat indicators for information not directly related to the threat that contains information that identifies a specific individual and remove the information Include procedures for notifying "any United States person" whose information has been shared by the Federal government Non-Federal entities sharing information mush "review" the information for "personal information of a specific individual" and "remove such information" OR have a technical way of removing the information it "knows at the time of sharing" to be personal information. and can use the information they receive for... Cybersecurity Preventing a specific threat of death, serious bodily harm, or specific threat of serious economic harm Investigating, prosecuting, and preventing serious threats to minors, including sexual exploitation and threats to physical safety ... , , , , Information shared will be Policies will be written by... Attorney General Secretary of Homeland Security Policies must create a way to share information "" Dept. of Commerce Dept. of Defense Dept. of Energy Dept. of Homeland Security Dept. of Justice Dept. of Treasury Office of the Director of National Intelligence Information ... Attorney General Secretary of Homeland Security In consultation with the "Private entities with industry expertise as the Attorney General and the Secretary consider relevant" Information shared with the Federal government The courts must dismiss any lawsuits against "any private entity" for monitoring information systems or sharing/receiving "cyber threat indicators" Heads of "appropriate Federal entities" will submit a report Inspectors General of the "appropriate Federal entities" will submit reports every two years The Comptroller General of the United States will submit a report on actions taken by the Federal Government to remove personal information. Report will be due in three years. Unclassified portions of the reports will be available to the public. Lists what this bill is not intended to do Report will be submitted by the Director of National Intelligence NEW Specifically allows the Secretary of Defense to share information These provisions expire on September 30, 2015. The will for sharing information that are created by Title I (view this mark-up of the Homeland Security Act of 2002 to see changes made by this provision) including... "Engaging with international partners... to collaborate on cyber threat indicators, defensive measures, and information related to cybersecurity risks and incidents" "Sharing cyber threat indicators, defensive measures, and other information related to cybersecurity risks and incidents with Federal and non-Federal entities... and with State and major urban area fusion centers" Participating in national exercises run by DHS Evaluating cyber threats to public safety communication systems to the list of entities that will have representatives in the National Cybersecurity and Communications Integration Center Adds protection from information to list of the Center's Orders the Center to work with the to make sure the Center follows the policies and procedures created by the Attorney General and Secretary of Homeland Security. The Center will be in charge of for information sharing. The Center for the purpose of sharing "cyber threat indicators" Orders the Center to with the Center within 60 days of enactment : Reports that will Subtitle B: Federal Cybersecurity Enhancement Act of 2015 Requires the Secretary of Homeland Security and the Director of the Office of Management and Budget to to proactively detect, identify, and remove intruders in agency information systems. The plan will not apply to the Department of Defense, a "national security system" or an element of the intelligence community In implementing the plan, the Secretary of Homeland Security The operation of the technology needed to implement the plan The actions taken need to be It is for the private entity operating the system to use the information for anything other than protecting the system but the The Secretary of Homeland Security will issue binding operational directives for agencies to secure their networks within a year. Agencies will have to... Identify sensitive and mission critical data stored by the agency Assess the need to store that data and determine which individuals need access to it Encrypt the data Implement a single sign-on platform for people using the agency website that requires user authentication Require multi-factor authentication for remote access Agencies will not have to comply if they say it's "overly burdensome to implement" or that it's not necessary. These binding operational directives to the Defense Department, a "national security system", or the intelligence community. The directives and reports on them will expire in 7 years, December 2022. The Secretary of Homeland Security can order the head of other agencies to take "lawful actions" in response to security threats. Requires an assessment of all Federal positions that have cyber-related functions Orders a study on the security of mobile devices of the Federal Government Orders a State Department report on threats from foreign sources and cooperation strategies within 90 days. The Secretary of State must consult with government officials in countries where we don't have an extradition treaty to determine what actions they've taken to catch "cyber criminals" with arrest warrant issued by US judges or Interpol. Orders the National Cybersecurity and Communications Integration Center to create a process for information sharing with Statewide Interoperability Coordinators Requires a report that will so that "the Federal Government and health care industry stakeholders may in real time, share actionable cyber threat indicators and defensive measures" Additional Reading Article: by Steve Horn, DeSmogBlog, December 16, 2015. Article: by Tom Cahill, U.S. Uncut, December 19, 2015. Article: by Eric Lipton and Liz Moyer, New York Times, December 20, 2015. Article: by Mike Gault, Wired, December 20, 2015. Music Presented in This Episode Intro & Exit: by (found on by mevio) Cover Art Design by

Transcript

Click on a timestamp to play from that location

0:00.0

I am so damn tired of being like to.

0:09.0

I don't think I can't deny it anymore.

0:15.0

You can stick to your story if you think it flies.

0:24.0

But I'm not gonna buy it anymore.

0:30.0

Hello and welcome to the 113th episode of Congressional dish. I'm your

0:35.3

host Jennifer Briny and before I do anything congressional on this episode I

0:40.1

would like to wish all of you a Merry Christmas or Happy Hanukkah or Happy Kwanza or

0:44.8

happy Solstice or whatever religious holiday type thing you're into or if you're not into religion

0:51.6

just happy time off from work but I hope you guys are

0:54.7

enjoying your holidays and the reason I'm doing this right now is that this episode

0:58.4

is airing the weekend after Christmas 2015. Now right before these holidays that we are now celebrating, your Congress did

1:05.7

something incredibly irresponsible. Your Congress decided to fund the entire

1:10.3

government for 2016 in a 2009 page bill that was available for only two and a half

1:16.1

days before the vote.

1:18.0

Now when Congress does something this irresponsible and funds the government in this way,

1:22.2

things always seem to get signed into law

1:24.4

that wouldn't get signed into law on their own, and this year was no exception.

1:28.1

One of the big scandals, if not the big scandal, in the omnibus this year was the text of cyber security bills

1:34.7

that was hidden over 1700 pages deep in this omnibus. At the time of the vote

1:39.7

there were congressmen that did not know this was in there.

1:43.2

This cyber security legislation does a little bit for cyber security.

1:48.4

But more importantly, it also is going to open the door for the government to collect massive amounts of data from private

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from Jennifer Briney, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of Jennifer Briney and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.