FAS

Cybersecurity Information Sharing: A Legal Morass, Says CRS

03.23.15 | 2 min read | Text by Steven Aftergood

Several pending bills would promote increased sharing of cybersecurity-related information — such as threat intelligence and system vulnerabilities — in order to combat the perceived rise in the frequency and intensity of cyber attacks against private and government entities.

But such information sharing is easier said than done, according to a new report from the Congressional Research Service, because it involves a thicket of conflicting and perhaps incompatible laws and policy objectives.

“The legal issues surrounding cybersecurity information sharing… are complex and have few certain resolutions.” A copy of the CRS report was obtained by Secrecy News. See Cybersecurity and Information Sharing: Legal Challenges and Solutions, March 16, 2015.

Cyber information sharing takes at least three different forms: the release of cyber intelligence from government to the private sector, information sharing among private entities, and the transfer of threat information from private entities to government agencies.

“While collectively these three variants on the concept of cyber-information sharing have some commonalities, each also raises separate legal challenges that may impede cyber-intelligence dissemination more generally,” said the CRS report, which examines the legal ramifications of each category in turn.

Among the concerns at issue are: the potential for liability associate with disclosure of cybersecurity information, inappropriate release of private information through open government laws, loss of intellectual property, and potential compromise of personal privacy rights.

All of these create a legal morass that may be unreconcilable.

“A fundamental question lawmakers may need to contemplate is how restrictions that require close government scrutiny and control over shared cyber-information can be squared with other goals of cyber-information sharing legislation, like requirements that received information be disseminated in an almost instantaneous fashion,” the CRS report said.

“Ultimately, because the goals of cyber-information legislation are often diametrically opposed, it may simply be impossible for information sharing legislation to simultaneously promote the rapid and robust collection and dissemination of cyber-intelligence by the federal government, while also ensuring that the government respects the property and privacy interests implicated by such information sharing,” the report said.

Other new or newly updated CRS reports that Congress has withheld from public distribution include the following.

Cybersecurity: Authoritative Reports and Resources, by Topic, March 13, 2015

EPA’s Proposed Clean Power Plan: Conversion to Mass-Based Emission Targets, March 17, 2015

Arctic National Wildlife Refuge (ANWR): A Primer for the 114th Congress, March 17, 2015

Federal Research and Development Funding: FY2016, March 18, 2015

The Federal Communications Commission: Current Structure and Its Role in the Changing Telecommunications Landscape, March 16, 2015

Mandatory Spending Since 1962, March 18, 2015

Jordan: Background and U.S. Relations, March 17, 2015

Balancing Tourism against Terrorism: The Visa Waiver Program, CRS Insights, March 13, 2015

U.S. Strategic Nuclear Forces: Background, Developments, and Issues, March 18, 2015

 

publications
See all publications
Government Capacity
Blog
What’s Next for Federal Evidence-Based Policymaking

In recent months, we’ve seen much of these decades’ worth of progress erased. Contracts for evaluations of government programs were canceled, FFRDCs have been forced to lay off staff, and federal advisory committees have been disbanded.

11.13.25 | 6 min read
read more
Global Risk
Report
Inspections Without Inspectors: A Path Forward for Nuclear Arms Control Verification with “Cooperative Technical Means”

This report outlines a framework relying on “Cooperative Technical Means” for effective arms control verification based on remote sensing, avoiding on-site inspections but maintaining a level of transparency that allows for immediate detection of changes in nuclear posture or a significant build-up above agreed limits.

11.10.25 | 3 min read
read more
Government Capacity
Blog
A Research, Learning, and Opportunity Agenda for Rebuilding Trust in Government

At a recent workshop, we explored the nature of trust in specific government functions, the risk and implications of breaking trust in those systems, and how we’d known we were getting close to specific trust breaking points.

11.10.25 | 6 min read
read more
Education & Workforce
day one project
Policy Memo
Analytical Literacy First: A Prerequisite for AI, Data, and Digital Fluency

tudents in the 21st century need strong critical thinking skills like reasoning, questioning, and problem-solving, before they can meaningfully engage with more advanced domains like digital, data, or AI literacy.

11.07.25 | 13 min read
read more