- Sputnik International
World
Get the latest news from around the world, live coverage, off-beat stories, features and analysis.

Can New Cyber Strategy Legalize Sending Foreign Militaries US Citizen Data?

© AFP 2023 / CHRISTOF STACHEA photo taken on July 16, 2013 shows a sign reading "video surveillance" fixed to a lamp post in front of radomes of the former monitoring base of the US intelligence organization National Security Agency (NSA) in Bad Aibling, southern Germany
A photo taken on July 16, 2013 shows a sign reading video surveillance fixed to a lamp post in front of radomes of the former monitoring base of the US intelligence organization National Security Agency (NSA) in Bad Aibling, southern Germany - Sputnik International
Subscribe
A provision of the Pentagon’s new Cyber Defense Strategy may allow government agencies to send information about U.S. citizens to foreign militaries, some defense analysts are arguing.

Bundersnachrichtendienst - Sputnik International
German Spy Agency BND Used Data Collected for NSA – German Newspaper
This week, Defense Secretary Ashton Carter described "three missions" of his department's cyberstrategy during a speech at Stanford University.

"The first is to defend DoD networks, systems, and information," Carter said. "The second is to defend the U.S. homeland and U.S. national interests against cyberattacks of significant consequence," he said. "And the third is to provide integrated cyber capabilities to support military operations and contingency plans."

However, some analysts say a provision of the Pentagon’s new Cyber Defense Strategy may allow government agencies to send information about US citizens to foreign militaries.

The provision in the strategy made public last week reads, "As a part of its cyber dialogue and partnerships, DOD [Department of Defense] will work with key Middle Eastern allies and partners to improve their ability to secure their military networks as well as the critical infrastructure and key resources upon which U.S. interests depend. Key initiatives include improved information sharing to establish a unified understanding of the cyber threat, an assessment of our mutual cyber defense posture, and collaborative approaches to building cyber expertise."

The strategy is causing some alarm among the privacy community.

The National Security Agency building at Fort Meade, Md. The National Security Agency has been extensively involved in the U.S. government's targeted killing program, collaborating closely with the CIA in the use of drone strikes against terrorists abroad, The Washington Post reported Wednesday Oct. 16, 2013 after a review of documents provided by former NSA systems analyst Edward Snowden. - Sputnik International
US Freedom Act to Reform ‘Secret’ NSA Oversight Court -Digital Rights Group
“If the attacker can gain access to a user account with lots of access rights, like a computer administrator, they will be able to move right past all the alarms and defenses,” said Matt Kodma of the cyber intelligence analytics group Recorded Future according to DefenseOne. “However, the behavior of that user account, once it's been hijacked by a cyber attacker, will be unusual.”

Tucker also suggests monitoring certain actions like the uploading of large files with plenty of mystery code that doesn’t seem to have a clear purpose.

“This authorization would not just seriously undermine Americans’ Fourth Amendment rights, which would otherwise require the government to obtain a warrant based on probable cause to access much of that same information, it would create an expansive new means of general-purpose government surveillance. (Sec. 5(d)(5)(A)),” wrote Robyn Greene, who serves as policy counsel for the Open Technology Institute at the New America Foundation.

Mark Jaycox, a legislative analyst at the Electronic Frontier Foundation, has made similar arguments.

“Existing private rights of action for violations of the Wiretap Act, Stored Communications Act, and potentially the Computer Fraud and Abuse Act would be precluded or at least sharply restricted … It remains to be seen why such immunity is needed when just a few months ago, the FTC and DOJ noted they would not prosecute companies for sharing such information.”

 

Newsfeed
0
To participate in the discussion
log in or register
loader
Chats
Заголовок открываемого материала