#enduser rights? cybersecurity vs internet freedom? the Internet saga #CISPA BILL – @ RT the act, if passed, would grant permission to the US government to monitor any online communications

Posted on April 16, 2012


A coalition of advocacy groups have begun intensive protests against the latest attack on free and open internet, called The Cyber Intelligence Sharing and Protection Act.   This is what some of the mainstream & many social media activist are saying and voicing out.

“The draconian legislation would force companies to ignore existing privacy laws and share information with the federal government” which critics say would allow the government to snoop on private files and Internet Services Providers ( ISP)  could even interpret this bill as allowing them to block accounts believed to be infringing, block access to websites like The Pirate Bay believed to carry infringing content, or take other measures provided they claimed it was motivated by cyber security concerns”

We all remember the big internet protest on January 17, 2012 some of the internet technology websites locked their doors, blacking out for hours at a time to protest the Stop Online Piracy Act, a US Congressional Bill  that would have censored certain websites if they were found to host pirated content.

Now three  months later, the Internet & Civil Societies is again at crossroads and cyber war zone battlefield with the US Congress and this  time over  ” Cyber Intelligence Sharing and Protection Act of 2011 – Amends the National Security Act of 1947 to add provisions concerning cyber threat intelligence and information sharing. Defines “cyber threat intelligence” as information in the possession of an element of the intelligence community directly pertaining to a vulnerability of, or threat to, a system or network of a government or private entity, including information pertaining to the protection of a system or network from: (1) efforts to degrade, disrupt, or destroy such system or network; or (2) theft or misappropriation of private or government information, intellectual property, or personally identifiable information.

Requires the Director of National Intelligence to: (1) establish procedures to allow intelligence community elements to share cyber threat intelligence with private-sector entities, and (2) encourage the sharing of such intelligence.

Requires the procedures established to ensure that such intelligence is only: (1) shared with certified entities or a person with an appropriate security clearance, (2) shared consistent with the need to protect U.S. national security, and (3) used in a manner that protects such intelligence from unauthorized disclosure. Provides for guidelines for the granting of security clearance approvals to certified entities or officers or employees of such entities.

Authorizes a cybersecurity provider (a non-governmental entity that provides goods or services intended to be used for cybersecurity purposes), with the express consent of a protected entity (an entity that contracts with a cybersecurity provider) to: (1) use cybersecurity systems to identify and obtain cyber threat information in order to protect the rights and property of the protected entity; and (2) share cyber threat information with any other entity designated by the protected entity, including the federal government. Regulates the use and protection of shared information, including prohibiting the use of such information to gain a competitive advantage and, if shared with the federal government, exempts such information from public disclosure. Prohibits a civil or criminal cause of action against a protected entity, a self-protected entity (an entity that provides goods or services for cybersecurity purposes to itself), or a cybersecurity provider acting in good faith under the above circumstances.

Directs the Privacy and Civil Liberties Oversight Board to submit annually to Congress a review of the sharing and use of such information by the federal government, as well as recommendations for improvements and modifications to address privacy and civil liberties concerns.

Preempts any state statute that restricts or otherwise regulates an activity authorized by the Act”

SOURCE: Cyber Intelligence Sharing and Protection Act (Reported in House – RH) [H.R.3523.RH] [PDF]

source 3501 – 3600 – Bill Text – 112th Congress (2011-2012) – THOMAS


CISPA is supported by several trade groups containing more than eight hundred private companies, including the Business Software Alliance, CTIA – The Wireless Association, Information Technology Industry Council, Internet Security Alliance, National Cable & Telecommunications Association, National Defense Industrial Association, TechAmerica and United States Chamber of Commerce, in addition to individual major telecommunications and information technology companies like AT&T, Facebook, IBM, Intel, Microsoft, Oracle Corporation, Symantec, and Verizon

Several opposition groups such as  Electronic Frontier Foundation, Center for Democracy and Technology, global activists  & advocacy groups, may and I say may experience possible resistance this time around, while some of the largest Internet Technology Companies and Digital Technology Companies  supported the #SOPA protests, this time  around many of these companies  have switched sides for #CISPA, including the famous Facebook,  and these opposition groups & organizations are creating  a viral grassroots movement getting Internet users to protest #CISPA.

SO WHAT DOES THIS ALL MEAN to end user in different countries,  I am questioning & wondering ….. UM  this is a UNITED STATES  bill,  so how does it effect us who are not in the United States, how does this apply to us globally who are not citizens of UNITED STATES!  who will protect you, me and  us as end users in our countries?  what rights do we have in our countries?  when we are on the  INTERNET and on many of these  internet social networking  sites?  IS there another solution we as end users can adopt or utilize to keep our information safe ?  heck yes!! just follow my advocacy and you will understanding  what I am doing from an end user point of view.  In a few weeks I may just decide to post a solution for end users for protected tools solution as I have been working at it, since 2004 a long journey to get to the goal post and I always take a neutral stand.

Meanwhile,  CISPA on going saga! and different opinions take place on the internet technology sites.  According to RT, the act, if passed, would grant permission to the US government to monitor any online communications if it has good reason to suspect cyber crime. What they are advocating is on this link the “sequel to SOPA” It would “empower the NSA to spy on the whole world in search of individuals engaging in distribution of protected media, like Internet streams of television channels or peer-to-peer networks sharing multimedia files.” Not only that, “CISPA could even see the NSA wiretapping publications like The New York Times, The Guardian and Wikileaks in the likely event that they obtain classified, secret or otherwise inconvenient information on governments or corporations.”

Lifehacker reports that most of the support is due to the transfer of liability and responsibility for cyber security that the bill would provide. Currently, the private companies themselves must keep track of user activity on their websites. But CISPA would give that responsibility to a separate government agency, relieving companies of the burden.

Internet technology sites and online social media activists are in a uproar, ultimately the power is in the hands of governments, internet technology companies.

Catch this post on “IdeaLab” Talking Point Memo website and it states:  ‘Anonymous’ Launches Boycott Over Netflix PAC or follow  @TPMNetflix.

Netflix users have  canceled their accounts due to the company’s support of CISPA and Netflix’s creation of this political action committee to work toward passing CISPA a  response  Netflix said, “[The PAC] was not set up for the purpose of supporting SOPA or PIPA. Instead, Netflix has engaged on other issues including network neutrality, bandwidth caps, usage based billing and reforming the Video Privacy Protection Act.”