Internet Freedom from What?
10/5/12 06:00At the bottom, the elimination of spyware and the preservation of privacy for the consumer are critical goals if the Internet is to remain safe and reliable and credible. - Cliff Stearns
The House passed the Cyber Intelligence Sharing and Protection Act (CISPA). It now moves on to the Senate. The President has pledged to veto it in its current form. There is the usual hue and cry from the Electronic Frontier Foundation, panicky tech bloggers and the robotic signing of petitions. However, what is missing is the outcry from the public over this like there was with SOPA/PIPA.
This law is intended to allow the private sector to exchange personal information collected from the publicly accessible networks with the government to mitigate alleged threats to the publicly accessible networks by individuals. It also allows the government to use this information as necessary for covert national security operations that defy oversight.
It still contains the same perceived flaws of SOPA/PIPA. It still smacks of a lack of Due Process, suppression of free speech rights and requires no judicial oversight. As a matter of fact, the only real oversight that this requires is from the business world. This is simple law enforcement, like SOPA/PIPA was supposed to be. Am I right?
So why is there such a lack of outrage on this bill? Why aren’t there shutdown threats or wailing and gnashing of teeth? Why isn’t the publicly accessible network community looking to protect the populace from the evil government? Why are publicly accessible network companies lauding and supporting this bill? Why is everyone expected to buy into the phrase “Just trust me”?
It seems this will allow the government and private sector to invade our privacy at will without justification. Since there is an air of stealthy activity, all this can be rationalized with a claim of national security. There are also provisions in the bill that will hold harmless these private sector entities from liability, should there be litigation resulting from erroneous or malicious information exchanged.
Be aware that the bill uses the language “cyber entities” instead of internet. Loosely defined, this could also include texting, Emails, mobile phones or land lines. This could be used to eventually bypass wiretapping laws.
According to The Washington Post, the House bill would impose no new rules on businesses, a Republican imperative. If a cyber threat is found, the reporting entity will not be required to take any action to mitigate or correct the offending exploit. The scale and reach of this threat will be decided entirely by the business entity to determine if this threat needs to be reported. There aren’t even any guidelines for a business or utility to determine a cyber threat.
Conclusion.
Intellectual property is probably the most difficult property to protect. This is true whether that intellectual property is shared in the form of talent or performance with SOPA/PIPA; or it is your private intellectual property in the form of your own privacy with CISPA. The publicly accessible network has magnified this by making intellectual property more accessible, reproducible and portable.
At some point we have to determine who is going to be the gatekeepers of intellectual property when it has left our immediate care. We have to figure out who is most accountable to the American public. It has already become extremely apparent that we be wary of a private enterprise when their admitted mission is to use this intellectual property to maximize profit for their own gain. The publicly accessible network companies have shown no qualms about manipulating the public to suit their goals and will portray their own government as the adversary to do so.
Where do you want your most prized information taken and by whom?
(no subject)
Date: 10/5/12 11:42 (UTC)(no subject)
Date: 10/5/12 14:42 (UTC)Don't internet providers already determine if something constitutes a "cyber threat" to their networks and act against that threat as they see fit? They have essentially unlimited power already to ban users who are acting contrary to their terms of use policy.
This doesn’t necessarily include things that are included in terms of use regarding a cyber threat. This can also include things that are termed as incendiary. If a statement is made in a post that could be interpreted as damaging, a company can request an investigation as they do now. This statement could be something like “I will do anything to destroy Facebook”.
This bill would authorize the offended company to release information that would ordinarily be considered private by law or contract, such as billing information, purchases and information that was considered deleted by the user. This can also be combined with information obtained from other private sector sources and retained in databases by the government.
Imagine if someone bought a large amount of ammonium nitrate base fertilizer. This can be used to make bombs, fertilize a garden or fertilize marijuana plants. Since bomb making would be a threat, it would be perfectly legitimate for a vendor to report this. However, if this got cross referenced to products used to grow marijuana, it could be used in an unrelated investigation.
Also, how does this suppress free speech? You haven't really explained this either.
If a company deems a group of activists contrary to its corporate mission, it can disclose private information, such as correspondence or purchases, out of context to paint a malicious picture of this activist group as subversive to national security. The activist group would have no control over the information disclosed, and this bill would protect the business entity from civil liability.
(no subject)
Date: 10/5/12 12:02 (UTC)Because of fatigue? If it's not SOPA last week, or CISPA this week, it will just be CRAP next week.
(no subject)
Date: 10/5/12 12:17 (UTC)Anonymity - this is the fragile wall between our world of violence and world where physical violence is impossible. This boundary is very vulnerable and angering those who like to use violence and is using it with pleasure. Authorities for example. Hence the incessant attacks on the Internet and the anonymity of the Internet. Unfortunately, not without success. Most authorities are able to break this boundary easily.
(no subject)
Date: 10/5/12 14:51 (UTC)You may see it that way, but not everybody does. People with anger problems tend to gravitate to sites that echo anger problems. All this anonymity is not completely harmless. Cyber bullying is a big problem in this country. It has been cited for some teen suicides (http://abcnews.go.com/GMA/Parenting/girls-teen-suicide-calls-attention-cyberbullying/story?id=9685026).
Although some people use it as such, the internet is not much of an effective anger management tool. It may temporarily release some tension, but it is not a permanent solution. Cyber trolls tend to stay cyber trolls.
(no subject)
Date: 10/5/12 16:08 (UTC)(no subject)
Date: 10/5/12 12:28 (UTC)(no subject)
Date: 10/5/12 17:29 (UTC)(no subject)
Date: 10/5/12 12:37 (UTC)The problem with fishing expeditions is that they cast a wide net and have a large false positive result which is why we have probable cause regulations. It expends a lot of resources with little to no gain. Meanwhile, those who actually have nefarious purpose learn very quickly how to avoid getting ensnared.
(no subject)
Date: 10/5/12 17:18 (UTC)(no subject)
Date: 10/5/12 17:26 (UTC)(no subject)
Date: 10/5/12 17:28 (UTC)Because the media hasn't told people to be outraged yet. They're too busy congratulating Obama on his new enlightenment and John Edwards' silly trial.
(no subject)
Date: 10/5/12 17:55 (UTC)Congress is acting like some barking little lapdog that won't GODDAMN SHUT UP
(no subject)
Date: 10/5/12 17:59 (UTC)(no subject)
Date: 10/5/12 22:17 (UTC)It grants the government access to private information from publicly accessible networks; as opposed to privately owned networks such as company intranets and home networks. Publicly accessible networks can be, but are not limited to, the internet, texts, VOIP and public wireless networks.