{"id":17565,"date":"2013-04-26T10:42:35","date_gmt":"2013-04-26T14:42:35","guid":{"rendered":"http:\/\/theredphoenixapl.org\/?p=17565"},"modified":"2026-04-22T09:36:47","modified_gmt":"2026-04-22T14:36:47","slug":"obama-administration-bypasses-cispa-by-secretly-allowing-internet-surveillance","status":"publish","type":"post","link":"https:\/\/redphoenix.news\/es\/2013\/04\/obama-administration-bypasses-cispa-by-secretly-allowing-internet-surveillance\/","title":{"rendered":"Obama administration bypasses CISPA by secretly allowing Internet surveillance"},"content":{"rendered":"<figure id=\"attachment_17566\" aria-describedby=\"caption-attachment-17566\" style=\"width: 490px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/i0.wp.com\/redphoenixnews.com\/wp-content\/uploads\/2013\/04\/17-si.jpg\"><img data-recalc-dims=\"1\" decoding=\"async\" loading=\"lazy\" class=\"size-full wp-image-17566\" alt=\"U.S. Deputy Defense Secretary William Lynn (2nd R).(Reuters \/ Jim Young)\" src=\"https:\/\/i0.wp.com\/redphoenixnews.com\/wp-content\/uploads\/2013\/04\/17-si.jpg?resize=490%2C275\" width=\"490\" height=\"275\" \/><\/a><figcaption id=\"caption-attachment-17566\" class=\"wp-caption-text\">U.S. Deputy Defense Secretary William Lynn (2nd R).(Reuters \/ Jim Young)<\/figcaption><\/figure>\n<p><span style=\"color:#000000\">Scared that CISPA might pass? The federal government is already using a secretive cybersecurity program to monitor online traffic and enforce CISPA-like data sharing between Internet service providers and the Department of Defense.<\/span><\/p>\n<p><span style=\"color:#000000\">The Electronic Privacy Information Center has obtained over 1,000 pages of documents pertaining to the United States government\u2019s use of a cybersecurity program after filing a Freedom of Information Act request, and CNET reporter Declan McCullagh says those pages show how the Pentagon has secretly helped push for increased Internet surveillance.<\/span><\/p>\n<p><span style=\"color:#000000\"><i>\u201cSenior Obama administration officials have secretly authorized the interception of communications carried on portions of networks operated by AT&amp;T and other Internet service providers, a practice that might otherwise be illegal under federal wiretapping laws,\u201d<\/i>\u00a0McCullagh writes.<\/span><\/p>\n<p><span style=\"color:#000000\">That practice, McCullagh recalls, was first revealed when Deputy Secretary of Defense William Lynn disclosed the existence of the<\/span>\u00a0<span style=\"color:#0000ff\"><a href=\"http:\/\/www.defense.gov\/news\/newsarticle.aspx?id=64349\" target=\"_blank\"><span style=\"color:#0000ff\">Defense Industrial Base<\/span><\/a><\/span>\u00a0<span style=\"color:#000000\">(DIB) Cyber Pilot in June 2011. At the time, the Pentagon said the program would allow the government to help the defense industry safeguard the information on their computer systems by sharing classified threat information between the Department of Defense, the Department of Homeland Security and the Internet service providers (ISP) that keep government contractors online.<\/span><\/p>\n<p><span style=\"color:#000000\"><i>\u201cOur defense industrial base is critical to our military effectiveness. Their networks hold valuable information about our weapons systems and their capabilities,\u201d<\/i>\u00a0Lynn said.\u00a0<i>\u201cThe theft of design data and engineering information from within these networks greatly undermines the technological edge we hold over potential adversaries.\u201d<\/i><\/span><\/p>\n<p><span style=\"color:#000000\">Just last week the US House of Representatives voted in favor of the Cyber Intelligence Sharing and Protection Act, or<\/span>\u00a0<span style=\"color:#0000ff\"><a href=\"http:\/\/rt.com\/usa\/congress-house-bill-cispa-031\/\" target=\"_blank\"><span style=\"color:#0000ff\">CISPA<\/span><\/a><\/span>\u00a0<span style=\"color:#000000\">\u2014 a legislation that, if signed into law, would allow ISPs and private Internet companies across the country like Facebook and Google to share similar threat data with the federal government without being held liable for violating their customers\u2019 privacy. As it turns out, however, the DIB Cyber Pilot has expanded exponentially in recent months, suggesting that a significant chunk of Internet traffic is already subjected to governmental monitoring.<\/span><\/p>\n<p><span style=\"color:#000000\">In May 2012, less than a year after the pilot was first unveiled, the Defense Department announced the expansion of the DIB program. Then this past January, McCullagh says it was renamed the Enhanced Cybersecurity Services (ECS) and opened up to a larger number of companies \u2014 not just DoD contractors. An<\/span>\u00a0<span style=\"color:#0000ff\"><a href=\"http:\/\/rt.com\/usa\/obama-signs-cyber-security-order-042\/\" target=\"_blank\"><span style=\"color:#0000ff\">executive order<\/span><\/a><\/span>\u00a0<span style=\"color:#000000\">signed by US President Barack Obama earlier this year will let all critical infrastructure companies sign-on to ECS starting this June, likely in turn bringing on board entities in energy, healthcare, communication and finance.<\/span><\/p>\n<p><span style=\"color:#000000\">Although the 1,000-plus pages obtained in the FOIA request haven\u2019t been posted in full on the Web just yet, a sampling of that trove published by EPIC on Wednesday begins to show just exactly how severe the Pentagon\u2019s efforts to eavesdrop on Web traffic have been.<\/span><\/p>\n<p><span style=\"color:#000000\">In one document, a December 2011 slideshow on the legal policies and practices regarding the monitoring of Web traffic on DIB-linked systems, the Pentagon instructs the administrators of those third-party computer networks on how to implement the program and, as a result, erode their customers\u2019 expectation of privacy.<\/span><\/p>\n<p><span style=\"color:#000000\">In one slide, the Pentagon explains to ISPs and other system administrators how to be clear in letting their customers know that their traffic was being fed to the government. Key elements to keep in mind, wrote the Defense Department, was that DIB\u00a0<i>\u201cexpressly covers monitoring of data and communications in transit rather than just accessing data at rest.\u201d<\/i><\/span><\/p>\n<p><span style=\"color:#000000\"><i>\u201c[T]hat information transiting or stored on the system may be disclosed for any purpose, including to the government,\u201d<\/i>\u00a0it continued. Companies participating in the pilot program were told to let users know that monitoring would exist\u00a0<i>\u201cfor any purpose,\u201d<\/i>\u00a0and that users have no expectation of privacy regarding communications or data stored on the system.<\/span><\/p>\n<p><span style=\"color:#000000\">According to the 2011 press release on the DIB Cyber Pilot,\u00a0<i>\u201cthe government will not monitor, intercept or store any private-sector communications through the program.\u201d<\/i>\u00a0In a privacy impact assessment of the ECS program that was published in January by the DHS though, it\u2019s revealed that not only is information monitored, but among the data collected by investigators could be personally identifiable information, including the header info from suspicious emails. That would mean the government sees and stores who you communicate with and what kind of subject lines are used during correspondence.<\/span><\/p>\n<p><span style=\"color:#000000\">The DHS says that personally identifiable information could be retained if\u00a0<i>\u201canalytically relevant to understanding the cyber threat\u201d<\/i>\u00a0in question.<\/span><\/p>\n<p><span style=\"color:#000000\">Meanwhile, the lawmakers in Congress that overwhelmingly approved CISPA just last week could arguably use a refresher in what constitutes a cyberthreat. Rep. Michael McCaul (R-Texas) told his colleagues on the Hill that\u00a0<i>&#8220;Recent events in Boston demonstrate that we have to come together as Republicans and Democrats to get this done,\u201d<\/i>\u00a0and Rep. Dan Maffei (D-New York) made unfounded claims during Thursday\u2019s debate that the whistleblowing website WikiLeaks is pursuing efforts to\u00a0<i>\u201chack into our nation\u2019s power grid.\u201d<\/i><\/span><\/p>\n<p><span style=\"color:#000000\">Should CISPA be signed into law, telecommunication companies will be encouraged to share Internet data with the DHS and Department of Justice for so-called national security purposes. But even if the president pursues a veto as his advisers have suggested, McCullagh says few will be safe from this secretive cybersecurity operation already in place.<\/span><\/p>\n<p><span style=\"color:#000000\">The tome of FOIA pages, McCullagh says, shows that the Justice Department has actively assisted telecoms as of late by letting them off the hook for<\/span>\u00a0<span style=\"color:#0000ff\"><a href=\"http:\/\/www.law.cornell.edu\/uscode\/text\/18\/2511\" target=\"_blank\"><span style=\"color:#0000ff\">Wiretap Act<\/span><\/a><\/span>\u00a0<span style=\"color:#000000\">violations. Since the sharing of data between ISPs and the government under the DIB program and now ECS violates federal statute, the Justice Department has reportedly issued an undeterminable number of \u201c2511 letters\u201d to telecoms: essentially written approval to ignore provisions of the Wiretap Act in exchange for immunity.<\/span><\/p>\n<p><span style=\"color:#000000\"><i>&#8220;The Justice Department is helping private companies evade federal wiretap laws,&#8221;<\/i>\u00a0EPIC Executive Director Marc Rotenberg tells CNET.\u00a0<i>&#8220;Alarm bells should be going off.&#8221;<\/i><\/span><\/p>\n<p><span style=\"color:#000000\">In an internal Justice Department email cited by McCullagh, Associate Deputy Attorney General James Baker is alleged to write that ISPs will likely request 2511 letters and the ECS-participating companies<i>\u201cwould be required to change their banners to reference government monitoring.\u201d<\/i><\/span><\/p>\n<p><span style=\"color:#000000\"><i>&#8220;These agencies are clearly seeking authority to receive a large amount of information, including personal information, from private Internet networks,&#8221;<\/i>\u00a0EPIC staff attorney Amie Stepanovich adds to CNET.\u00a0<i>&#8220;If this program was broadly deployed, it would raise serious questions about government cybersecurity practices.&#8221;<\/i><\/span><\/p>\n<p><span style=\"color:#0000ff\"><a href=\"http:\/\/rt.com\/usa\/epic-foia-internet-surveillance-350\/\"><span style=\"color:#0000ff\">Source<\/span><\/a><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Scared that CISPA might pass? The federal government is already using a secretive cybersecurity program to monitor online traffic and enforce CISPA-like data sharing between..<\/p>","protected":false},"author":1,"featured_media":38072,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"nf_dc_page":"","_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[166,43,187,97],"tags":[],"class_list":["post-17565","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-government","category-media-culture","category-science-tech","category-us-news"],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/redphoenix.news\/wp-content\/uploads\/2026\/04\/17-si.jpg?fit=690%2C388&ssl=1","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/redphoenix.news\/es\/wp-json\/wp\/v2\/posts\/17565","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/redphoenix.news\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/redphoenix.news\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/redphoenix.news\/es\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/redphoenix.news\/es\/wp-json\/wp\/v2\/comments?post=17565"}],"version-history":[{"count":1,"href":"https:\/\/redphoenix.news\/es\/wp-json\/wp\/v2\/posts\/17565\/revisions"}],"predecessor-version":[{"id":39470,"href":"https:\/\/redphoenix.news\/es\/wp-json\/wp\/v2\/posts\/17565\/revisions\/39470"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/redphoenix.news\/es\/wp-json\/wp\/v2\/media\/38072"}],"wp:attachment":[{"href":"https:\/\/redphoenix.news\/es\/wp-json\/wp\/v2\/media?parent=17565"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/redphoenix.news\/es\/wp-json\/wp\/v2\/categories?post=17565"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/redphoenix.news\/es\/wp-json\/wp\/v2\/tags?post=17565"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}