For sure. But does that make those computers and servers "critical infrastructure"? If disabled, they compromise the viability of the country? Or only the IT infrastructure directly connected to the dam or power plant in question (to quote just the things that were not prospective, i.e. 'new plane', 'new industrial process')?<br>

<br><div class="gmail_quote">On Mon, Mar 4, 2013 at 11:30 PM, Suresh Ramasubramanian <span dir="ltr"><<a href="mailto:suresh@hserus.net" target="_blank">suresh@hserus.net</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">


<div text="#000000" bgcolor="#ffffff">
<p>You will find that are strictly enforced controls about keeping data
within the usa and restricting access only to US citizens with a
mandatory security clearance <br>
<br>
--srs (htc one x)<br>
</p><div><div class="h5">
<br><p>
</p><p>On 5 March 2013 9:45:31 AM Diego Rafael Canabarro
<u></u> wrote:</p>
<blockquote type="cite">
The mere fact of storing that classified information makes the computer
part of the "critical infrastructure of a country"? How to
deal with the fact that R&D in the US is heavily conducted by
contractors? Are the computers of RAND, Lockheed Martin, and Raytheon
part of the critical infrastructure of the US? And if those computers
are located abroad?<br>

<br><div class="gmail_quote">On Mon, Mar 4, 2013 at 5:06 PM, Suresh
Ramasubramanian <span dir="ltr"><<a href="mailto:suresh@hserus.net" target="_blank">suresh@hserus.net</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">



<div dir="auto"><div>The proposal to set up a clearinghouse for
Internet threat data is actually a good one.  And seems to have nothing
to do with either copyright infringement.</div><div><br></div><div>What
can be considered critical infrastructure is necessarily a broad
definition,</div>

<div><br></div><div>The article doesn't connect the dots between
that and copyright infringement. IP theft .. what do you call it when a
computer network is penetrated and  the plans for a new fighter plane,
control data for a dam or power plant, blueprints for a new industrial
process etc stolen?<br>

<br>--srs (iPad)</div><div><div><div><br>On 04-Mar-2013, at
21:47, Riaz K Tayob <<a href="mailto:riaz.tayob@gmail.com" target="_blank">riaz.tayob@gmail.com</a>>
wrote:<br><br></div><blockquote type="cite">

<div>
  

    
  
  
    <h1><a href="http://www.washingtonsblog.com/2013/03/copyright-infringement-now-seen-as-terrorism.html" target="_blank">Is
        Copyright Infringement Now Seen As Terrorism?</a></h1>
    <div> <span>Posted
        on</span> <a href="http://www.washingtonsblog.com/2013/03/copyright-infringement-now-seen-as-terrorism.html" title="5:13 am" rel="bookmark" target="_blank"><span>March 4,
          2013</span></a> <span>by</span> <span><a href="http://www.washingtonsblog.com/author/washingtonsblog" title="View all posts by WashingtonsBlog" target="_blank">WashingtonsBlog</a></span>
    </div>
    <div>
      <h3 style="color:#000099">Government Uses Law As a Sword Against
        Dissent</h3>
      <p>We <a title="reported" href="http://www.washingtonsblog.com/2012/02/ter%C2%B7ror%C2%B7ist-noun-anyone-who-disagrees-with-the-government-2.html" target="_blank">reported</a>
        last year:</p>
      <blockquote>
        <p>The government treats copyright infringers as terrorists, and
          swat teams have been deployed against them. See <a title="this" href="http://news.cnet.com/Terrorist-link-to-copyright-piracy-alleged/2100-1028_3-5722835.html" target="_blank">this</a>, <a title="this" href="http://techliberation.com/2007/01/17/swat-teams-enforcing-copyright/" target="_blank">this</a>, <a title="this" href="http://en.wikipedia.org/wiki/Controversial_invocations_of_the_USA_PATRIOT_Act#Investigating_copyright_infringement" target="_blank">this</a> and <a title="this" href="http://www.techdirt.com/articles/20100129/0630057974.shtml" target="_blank">this</a>.</p>




        <p>As the executive director of the Information Society Project
          at Yale Law School <a title="notes" href="http://www.theatlantic.com/technology/archive/2012/02/enough-already-the-sopa-debate-ignores-how-much-copyright-protection-we-already-have/252742/#bio" target="_blank">notes</a>:</p>




        <blockquote>
          <p>This administration … publishes a newsletter about its
            efforts with language that compares copyright infringement
            to terrorism.</p>
        </blockquote>
      </blockquote>
      <p><b>The American government is using copyright laws to crack
          down on political dissent </b><b><a title="just like China
            and
Russia" href="http://www.washingtonsblog.com/2011/12/americas-future-russians-and-chinese-use-copyright-crusade-to-crush-government-criticism.html" target="_blank">just
            like China and Russia</a></b><b>.</b></p>
      <p>We noted last month that the “cyber-security” laws have <a title="very little to do with security" href="http://www.washingtonsblog.com/2013/02/the-white-house-is-judge-jury-and-executioner-of-both-drone-and-cyber-attacks.html" target="_blank"><em>very
            little</em> to do with security</a>.</p>
      <p>The Verge <a title="reported" href="http://www.theverge.com/2013/2/14/3989686/white-house-says-cyber-threats-include-web-site-defacement-ip-theft" target="_blank">reported</a>
        last month:</p>
      <blockquote>
        <div>In the State of the Union address Tuesday, President Obama
          <a title="announced" href="http://www.theverge.com/2013/2/12/3982302/president-obama-signs-cybersecurity-order" target="_blank">announced</a>
          a sweeping <a title="executive order" href="http://www.whitehouse.gov/the-press-office/2013/02/12/executive-order-improving-critical-infrastructure-cybersecurity" target="_blank">executive order</a> implementing new
          national cybersecurity measures, opening the door for
          intelligence agencies to share more information about
          suspected “cyber threats” with private companies that oversee
          the nation’s “critical infrastructure.” The order is
          voluntary, giving companies the choice of whether or not they
          want to receive the information, and takes effect in four
          months, by June 12.</div>
        <p>***</p>
        <p>“Cyber threats cover a wide range of malicious activity that
          can occur through cyberspace,” wrote Caitlin Hayden,
          spokeswoman for the White House National Security Council, in
          an email to <em>The Verge</em>. “Such threats include web
          site defacement, espionage,<strong> theft of intellectual
            property</strong>, denial of service attacks, and
          destructive malware.”</p>
        <p>***</p>
        <p>“The EO [executive order] relies on the definition of
          critical infrastructure found in the Homeland Security Act of
          2002,” Hayden wrote.</p>
        <p><a title="The Homeland Security Act of 2002 (PDF)" href="http://www.dhs.gov/xlibrary/assets/hr_5005_enr.pdf" target="_blank">The Homeland Security Act of 2002 (PDF)</a>,
          passed in the wake of the September 11, 2001 terror attacks,
          was what created the Department of Homeland Security. At that
          time, the US was still reeling from the attacks and Congress
          sought to rapidly bolster the nation’s defenses, including
          “critical infrastructure” as part of its definition of
          “terrorism.” As the act states: “The term ‘terrorism’ means
          any activity that involves an act that is dangerous to human
          life or potentially destructive of critical infrastructure or
          key resources…”</p>
        <p>But again, that act doesn’t exactly spell out which
          infrastructure is considered “critical,” instead pointing to
          the definition as outlined in a <a title="2001 bill" href="http://www.law.cornell.edu/uscode/text/42/5195c" target="_blank">2001 bill</a>, also passed in response to
          September 11, which reads:</p>
        <blockquote>
          <p>“The term “critical infrastructure” means systems and
            assets, whether physical or virtual, so vital to the United
            States that the incapacity or destruction of such systems
            and assets would have a debilitating impact on security,
            national economic security, national public health or
            safety, or any combination of those matters.”</p>
        </blockquote>
        <p>This is the same exact definition that was originally
          provided in the <a title="president’s
            cybersecurity
order" href="http://www.whitehouse.gov/the-press-office/2013/02/12/executive-order-improving-critical-infrastructure-cybersecurity" target="_blank">president’s
            cybersecurity order</a> as originally published on Tuesday,
          meaning that the White House appears to be relying to some
          degree on <a title="circular reasoning" href="http://dictionary.reference.com/browse/circular+reasoning" target="_blank">circular reasoning</a> when it comes to that
          definition. Some in Washington, including the right-leaning
          think tank <a title="The Heritage Foundation" href="http://www.heritage.org/research/reports/2013/02/obama-s-cybersecurity-executive-order-falls-short" target="_blank">The Heritage Foundation</a>, are worried
          that the definition is too broad and “could be understood to
          include systems normally considered outside the cybersecurity
          conversation, such as agriculture.”</p>
        <p>In fact, the Department of Homeland Security, which is one of
          the agencies that will be sharing information on cyber threats
          thanks to the order, includes <a title="18 different
           
industries" href="http://www.dhs.gov/critical-infrastructure-sectors" target="_blank">18 different industries</a> in its own label
          of “critical infrastructure,” from agriculture to banking to
          national monuments. There’s an argument to be made that
          including such a broad and diverse swath of industries under
          the blanket term “critical” is reasonable given the overall
          increasing dependence of virtually all businesses on the
          internet for core functions. But even in that case, its
          unclear how casting such a wide net would be helpful in
          defending against cyber threats, especially as there is a
          limited pool of those with the expertise and ability to do so.</p>
      </blockquote>
      <p>It’s not just intellectual property.  The government is widely
        using <a title="anti-terror laws" href="http://www.washingtonsblog.com/2012/02/government-uses-anti-terror-laws-to-crush-dissent-and-help-big-business.html" target="_blank">anti-terror
          laws</a> to help giant businesses … and to <a title="crush
          those who speak out against their abusive
practices" href="http://www.washingtonsblog.com/2012/12/government-and-big-banks-joined-forces-to-violently-crush-peaceful-protests.html" target="_blank">crush
          those who speak out against their abusive practices</a>,
        labeling anyone who speaks out against as a <a title="potential
          bad
guy" href="http://www.washingtonsblog.com/2012/12/the-fbi-drowning-in-counter-terrorism-money-power-and-other-resources-will-apply-the-term-terrorism-to-any-group-it-dislikes-and-wants-to-control-and-suppress.html" target="_blank">potential
          bad guy</a>.</p>
    </div>
    <div> This entry was posted in <a href="http://www.washingtonsblog.com/cat/business-economics" title="View all posts in Business / Economics" rel="category
       
tag" target="_blank">Business / Economics</a>, <a href="http://www.washingtonsblog.com/cat/politics-and-war-and-peace" title="View
all posts in Politics / World News" rel="category
       
tag" target="_blank">Politics / World News</a>. Bookmark the <a href="http://www.washingtonsblog.com/2013/03/copyright-infringement-now-seen-as-terrorism.html" title="Permalink
to Is Copyright Infringement Now Seen As
        Terrorism?" rel="bookmark" target="_blank">permalink</a>. </div>
  

</div></blockquote></div></div><blockquote type="cite"><div><span>____________________________________________________________</span><br><span>You
received this message as a subscriber on the list:</span><br><span>
    <a href="mailto:governance@lists.igcaucus.org" target="_blank">governance@lists.igcaucus.org</a></span><br>

<span>To be removed from the list, visit:</span><br><span>     <a href="http://www.igcaucus.org/unsubscribing" target="_blank">http://www.igcaucus.org/unsubscribing</a></span><br><span></span><br><span>For
all other list information and functions, see:</span><br>

<span>     <a href="http://lists.igcaucus.org/info/governance" target="_blank">http://lists.igcaucus.org/info/governance</a></span><br><span>To
edit your profile and to find the IGC's charter,
see:</span><br><span>     <a href="http://www.igcaucus.org/" target="_blank">http://www.igcaucus.org/</a></span><br>

<span></span><br><span>Translate this email: <a href="http://translate.google.com/translate_t" target="_blank">http://translate.google.com/translate_t</a></span><br></div></blockquote></div><br>____________________________________________________________<br>




You received this message as a subscriber on the list:<br>
     <a href="mailto:governance@lists.igcaucus.org" target="_blank">governance@lists.igcaucus.org</a><br>
To be removed from the list, visit:<br>
     <a href="http://www.igcaucus.org/unsubscribing" target="_blank">http://www.igcaucus.org/unsubscribing</a><br>
<br>
For all other list information and functions, see:<br>
     <a href="http://lists.igcaucus.org/info/governance" target="_blank">http://lists.igcaucus.org/info/governance</a><br>
To edit your profile and to find the IGC's charter, see:<br>
     <a href="http://www.igcaucus.org/" target="_blank">http://www.igcaucus.org/</a><br>
<br>
Translate this email: <a href="http://translate.google.com/translate_t" target="_blank">http://translate.google.com/translate_t</a><br>
<br></blockquote></div><br><br clear="all"><div><br></div>-- <br>Diego
R. Canabarro<div><font face="arial, helvetica, sans-serif"><span style="vertical-align:top;text-align:left"><a href="http://lattes.cnpq.br/4980585945314597" target="_blank">http://lattes.cnpq.br/4980585945314597</a></span> </font><br>



<br>--<br>diego.canabarro [at] <a href="http://ufrgs.br" target="_blank">ufrgs.br</a></div><div>diego [at] <a href="http://pubpol.umass.edu" target="_blank">pubpol.umass.edu</a><br>MSN: diegocanabarro [at] <a href="http://gmail.com" target="_blank">gmail.com</a><br>



Skype: diegocanabarro<br>Cell # <a href="tel:%2B55-51-9244-3425" value="+555192443425" target="_blank">+55-51-9244-3425</a> (Brasil) /
<a href="tel:%2B1-413-362-0133" value="+14133620133" target="_blank">+1-413-362-0133</a> (USA)<br>--<br></div>
</blockquote>
<p></p></div></div></div>

</blockquote></div><br><br clear="all"><div><br></div>-- <br>Diego R. Canabarro<div><font face="arial, helvetica, sans-serif"><span style="vertical-align:top;text-align:left"><a href="http://lattes.cnpq.br/4980585945314597" target="_blank">http://lattes.cnpq.br/4980585945314597</a></span> </font><br>

<br>--<br>diego.canabarro [at] <a href="http://ufrgs.br" target="_blank">ufrgs.br</a></div><div>diego [at] <a href="http://pubpol.umass.edu" target="_blank">pubpol.umass.edu</a><br>MSN: diegocanabarro [at] <a href="http://gmail.com" target="_blank">gmail.com</a><br>

Skype: diegocanabarro<br>Cell # +55-51-9244-3425 (Brasil) / +1-413-362-0133 (USA)<br>--<br></div>