« Targeting Jeremy HammondIsrael's War Criminal of the Year Award »

CISPA Is Back

February 21st, 2013

by Stephen Lendman

It shouldn't surprise. The 2011 Cyber Intelligence Sharing and Protection Act (CISPA) never really went away. It ducked and covered for another day.

It's more about destroying personal freedom than online security. It gives government and corporate supporters unlimited power to access personal/privileged information online.

Civil liberty protections are ignored. Security experts, academics, and other professionals expressed outrage. They called CISPA and John McCain's SECURE IT Act measures that "allow entities who participate in relaying or receiving Internet traffic to freely monitor and redistribute those network communications" unjustifiably.

They encourage transferring private communications to government agencies. Accountability and transparency are lacking. Vague language describes network security attacks, threat indicators, and countermeasures.

Innocuous online activities can be called cybersecurity threats. Eroded privacy laws will be gutted. Web sites visited, personal emails, and other online contact may be freely accessed.

Obama's State of the Union address stressed no-holds-barred cyberwar. Earlier he declared waging it globally.

In May 2009, he prioritized cybersecurity. He called cyber-threats "one of the most serious economic and national security challenges we face as a nation."

"America's economic prosperity in the 21st century will depend on cybersecurity," he claimed.

He ordered a top-to-bottom assessment. A Cyberspace Policy Review followed. He supports draconian cybersecurity bills. Passage threatens constitutional freedoms.

His February 12 Executive Order (EO) called for "Improving Critical Infrastructure Cybersecurity."

Threats continue to grow, it said. National security challenges must be met.

"It is the policy of the United States to enhance the security and resilience of the Nation's critical infrastructure and to maintain a cyber environment that encourages efficiency, innovation, and economic prosperity while promoting safety, security, business confidentiality, privacy, and civil liberties."

"We can achieve these goals through a partnership with the owners and operators of critical infrastructure to improve cybersecurity information sharing and collaboratively develop and implement risk-based standards."

Following Obama's EO, lawmakers revisited CISPA. On February 14, Rep. Mike Rogers (R. MI) and Dutch Ruppersberger (D. MD) reintroduced it.

Last April, it passed the House 248 - 168. Civil libertarian outrage gave senators second thoughts. The bill died in committee. It's now back from the dead.

On February 13, the ACLU responded. It said CISPA "fails to protect privacy."

Reintroducing it lets "companies share sensitive and personal American internet data with the government, including the National Security Agency and other military agencies."

"CISPA does not require companies to make reasonable efforts to protect their customers’ privacy and then allows the government to use that data for undefined 'national-security' purposes and without any minimization procedures, which have been in effect in other security statutes for decades."

On February 13, the Electronic Frontier Foundation (EFF) headlined "CISPA, the Privacy-Invading Cybersecurity Spying Bill, is Back in Congress."

It's the same "contentious bill civil liberties advocates fought last year." It poorly defines cybersecurity exemptions to privacy law."

It offers "broad immunities to companies (wishing) to share data with government agencies (including the private communications of users) in the name of cybersecurity."

It lets companies share data with federal agencies. They include military intelligence ones like NSA.

EFF categorically opposes CISPA. It's deeply flawed. According to the Project on Freedom, Security & Technology at the Center for Democracy & Technology:

"Under a broad cybersecurity umbrella, it permits companies to share user communications directly with the super secret National Security Agency and permits the NSA to use that information for non-cybersecurity reasons."

"This risks turning the cybersecurity program into a back door intelligence surveillance program run by a military entity with little transparency or public accountability."

"Members should seriously consider whether CISPA - which inflamed grassroots activists last year and was under a veto threat for these and other flaws - is the right place to start."

Last October, Obama signed a secret directive. It addressed cyberattack defense. It set guidelines for confronting cyberspace threats. It lets military personnel act more aggressively.

Called Presidential Policy Directive 20, it's "the most extensive White House effort to date to wrestle with what constitutes an 'offensive' and a 'defensive' action in the rapidly evolving world of cyberwar and cyberterrorism, where an attack can be launched in milliseconds by unknown assailants utilizing a circuitous route."

"For the first time, (it) explicitly makes a distinction between network defense and cyber operations to guide officials charged with making often rapid decisions when confronted with threats."

The order updates Bush's 2004 presidential directive. It vets operations outside government owned systems.

Fiber operations previously considered offensive (because they go outside defended networks) are now called defensive. They include "severing the link between an overseas server and a targeted domestic computer."

Pentagon officials are expected to finalize new cyberwar rules of engagement. They set guidelines for military commanders. They'll be able to act outside government networks.

They'll be able to compromise personal privacy. Preventing cyberattacks will be claimed as pretext.

Last fall, Defense Secretary Leon Panetta warned of a "cyber Pearl Harbor." It could "cause physical destruction and loss of life," he said. It could "paralyze and shock the nation and create a new profound sense of vulnerability."

US officials never lack for hyperbole. Fear-mongering is longstanding policy. Lies substitute for truth and full disclosure.

CISPA 2.0 reflects old wine in new bottles. Troublesome issues remain. EFF addressed them.

New legislation lets business use cybersecurity systems. Doing so permits accessing alleged cybersecurity threat information (CTI).

Personal communications are included. Perceived threats to networks or systems are pretexts.

Imposed limitations are weak. They only involve acting for vaguely defined cybersecurity purposes.

At the same time, broad immunity from legal liability for monitoring, acquiring, or sharing CTI is extended. It's given as long as entities act "in good faith."

EFF expressed grave concerns. Provisions this broad will "override existing privacy laws." They include the Wiretap Act and Stored Communications Act.

The new law also provides immunity "for decisions made based on" CTI. Doing so makes bad legislation worse. "A rogue or misguided company could easily make bad 'decisions.' " They'll do lots more harm than good.

CISPA "raises major transparency and accountability issues." Information given Washington will be exempt from FOIA requests and state laws requiring disclosure.

Users probably won't know if their private data ends up compromised. They'll have little recourse either way.

If companies send information about users claimed unrelated to cyberthreats, government agencies getting it won't notify them. Companies alone may or not do it. Who monitors them to make sure?

"CISPA is a dangerous bill," said EFF. So is CISPA 2.0. It "equates cybersecurity with greater surveillance and information sharing."

It's little changed from its original form. It lets government and companies bypass existing laws, access what they wish, filter content, and potentially shut down online access for cybersecurity or national security reasons.

It assures unrestricted Big Brother spying. Government and business will take full advantage.

Many cybersecurity problems arise from software vulnerabilities. Human failings compound them. CISPA leaves these and other important issues unaddressed.

Obama's EO encourages government agencies to share cybersecurity information with companies. It leaves plenty of room for abusive practices. Business will take full advantage. So will government agencies.

Enacting CISPA 2.0 ensures abuse. Freedoms taken for granted will disappear. Any site, blog, or personal content can be called a cyber threat.

Online users will lose out. So will everyone. Police state harshness will be hardened. America's already hugely repressive. It's a hair's breath from full-blown tyranny.

-###-

Stephen Lendman lives in Chicago and can be reached at lendmanstephen@sbcglobal.net.

His new book is titled "Banker Occupation: Waging Financial War on Humanity"

http://www.claritypress.com/Lendman.html

Visit his blog site at sjlendman.blogspot.com and listen to cutting-edge discussions with distinguished guests on the Progressive Radio News Hour on the Progressive Radio Network Thursdays at 10AM US Central time and Saturdays and Sundays at noon. All programs are archived for easy listening.

http://www.progressiveradionetwork.com/the-progressive-news-hour

http://www.dailycensored.com/cispa-is-back/

No feedback yet

Voices

Voices

  • Cathy Smith The Myth of African Poverty Concocted by the Oligarchy The relations of the global powers to the continent, especially America, Russia, China, and Israel, have mainly been based on resource extraction, strategic economic influence, and…
  • Feminism was once a revolutionary force, a creed born out of struggle, resilience, and the dream of a world much different from what we had been given. It was born from the pain of millions of women working, poor, Black, Indigenous, women of color who refused to take the world as it was. And yet, today, feminism is an idea manipulated, diluted, commodified, and often controlled by those very forces that it initially came into being to dismantle from the military-industrial complex to corporate media giants; feminism today hardly resembles its initial mission of radical social transformation. This has happened because things are ingrained in how our media landscape rolls along. We hardly notice how forces remake feminist discourse into more palatable, consumer-friendly, and politically neutral forms. The corporations that run the media, the intelligence agencies that shape public opinion, and the political powers that remain in control have combined a grand symphony of influence that has redefined feminism, replacing its radical edges with a glittering but hollow vision of empowerment. It is time to reclaim the radical roots of feminism to inspire a new generation of activists to fight for real change.
  • Paul Craig Roberts President Trump’s economic proposals, with one exception, constitute a coherent package. I will address his proposals in a later column. Today I address his bad idea that would cause the failure of Trump’s renewal of the American…
  • Cindy Harper DeepSeek offers open-source generative AI with localized data storage but raises concerns over censorship, privacy, and disruption of Western markets. A recent regulatory clampdown in the United States on TikTok, a Chinese-owned social…
  • Fred Gransville 1) Water Monopolies: Who, When, Where, Why, and How? Water monopolies, a burgeoning threat of the 21st century, are rapidly gaining control over a resource that was once considered a public good. The scale of commercialization has surged…
  • Tracy Turner In a better world, the Arctic would be left to wolves, polar bears, seals, and whales. But not in this world, with our Robber Baron Politicians and Criminal CEOs. The Arctic, once a remote, frozen frontier, is now a hotbed of fierce…
  • Tracy Turner Abstract: The building blocks of 21st century American life, from suburban homes and lawns to gas-guzzling SUVs that clog roadways, have been rooted in excess. Today's culture of consumption controls almost every phase of our lives; excess…
  • Chris Spencer The State of Israel is an intricately interlinked part of the geopolitics of the region, largely through its special relationship with the United States, complemented by that with Russia, and now spreading toward Africa, Latin America, and…
  • By Cathy Smith God, my blade-server, encrypts my soul in the fortress of His protection, shielding me from the firewalls of fear. His commands are my protocols, sharpening my spirit like a flawless algorithm in the face of battle. Though the route of my…
  • Governor Gavin Newsom's ban on gas-powered string trimmers and leaf blowers in California is a step toward reducing emissions, but it highlights a larger issue: the growing environmental impact of gas-guzzling SUVs. While small engine reforms are positive, the SUV culture continues to drive global resource depletion, energy crises, and food insecurity…
January 2025
Sun Mon Tue Wed Thu Fri Sat
 << <   > >>
      1 2 3 4
5 6 7 8 9 10 11
12 13 14 15 16 17 18
19 20 21 22 23 24 25
26 27 28 29 30 31  

  XML Feeds

Open-Source CMS
FAIR USE NOTICE: This site contains copyrighted articles and information about environmental, political, human rights, economic, democratic, scientific, and social justice issues, etc. This news and information is displayed without profit for educational purposes, in accordance with, Title 17 U.S.C. Section 107 of the US Copyright Law. Thepeoplesvoice.org is a non-advocacy internet web site, edited by non-affiliated U.S. citizens. editor
ozlu Sozler GereksizGercek Hava Durumu Firma Rehberi Hava Durumu Firma Rehberi E-okul Veli Firma Rehberi