Stew Danko (stewstewstewdio) wrote in talk_politics,
Stew Danko

Internet Freedom from What?


At the bottom, the elimination of spyware and the preservation of privacy for the consumer are critical goals if the Internet is to remain safe and reliable and credible. - Cliff Stearns

The House passed the Cyber Intelligence Sharing and Protection Act (CISPA). It now moves on to the Senate. The President has pledged to veto it in its current form. There is the usual hue and cry from the Electronic Frontier Foundation, panicky tech bloggers and the robotic signing of petitions. However, what is missing is the outcry from the public over this like there was with SOPA/PIPA.

[Why is that?]

This law is intended to allow the private sector to exchange personal information collected from the publicly accessible networks with the government to mitigate alleged threats to the publicly accessible networks by individuals. It also allows the government to use this information as necessary for covert national security operations that defy oversight.

It still contains the same perceived flaws of SOPA/PIPA. It still smacks of a lack of Due Process, suppression of free speech rights and requires no judicial oversight. As a matter of fact, the only real oversight that this requires is from the business world. This is simple law enforcement, like SOPA/PIPA was supposed to be. Am I right?

So why is there such a lack of outrage on this bill? Why aren’t there shutdown threats or wailing and gnashing of teeth? Why isn’t the publicly accessible network community looking to protect the populace from the evil government? Why are publicly accessible network companies lauding and supporting this bill? Why is everyone expected to buy into the phrase “Just trust me”?

It seems this will allow the government and private sector to invade our privacy at will without justification. Since there is an air of stealthy activity, all this can be rationalized with a claim of national security. There are also provisions in the bill that will hold harmless these private sector entities from liability, should there be litigation resulting from erroneous or malicious information exchanged.

Be aware that the bill uses the language “cyber entities” instead of internet. Loosely defined, this could also include texting, Emails, mobile phones or land lines. This could be used to eventually bypass wiretapping laws.

According to The Washington Post, the House bill would impose no new rules on businesses, a Republican imperative. If a cyber threat is found, the reporting entity will not be required to take any action to mitigate or correct the offending exploit. The scale and reach of this threat will be decided entirely by the business entity to determine if this threat needs to be reported. There aren’t even any guidelines for a business or utility to determine a cyber threat.


Intellectual property is probably the most difficult property to protect. This is true whether that intellectual property is shared in the form of talent or performance with SOPA/PIPA; or it is your private intellectual property in the form of your own privacy with CISPA. The publicly accessible network has magnified this by making intellectual property more accessible, reproducible and portable.

At some point we have to determine who is going to be the gatekeepers of intellectual property when it has left our immediate care. We have to figure out who is most accountable to the American public. It has already become extremely apparent that we be wary of a private enterprise when their admitted mission is to use this intellectual property to maximize profit for their own gain. The publicly accessible network companies have shown no qualms about manipulating the public to suit their goals and will portray their own government as the adversary to do so.

Where do you want your most prized information taken and by whom?

Tags: intelligence, internet, privacy
  • Post a new comment


    Comments allowed for members only

    Anonymous comments are disabled in this journal

    default userpic

    Your reply will be screened

    Your IP address will be recorded