[governance] New Legislation Would Give Power to Keyboard Cops

Riaz K Tayob riaz.tayob at gmail.com
Tue May 8 11:53:59 EDT 2012


[The Great Fall of Liberty?]

New Legislation Would Give Power to Keyboard Cops

By Naomi Wolf, The Daily Star

07 May 12



lmost no one had read the Cyber Intelligence Sharing and Protection Act 
before it was rushed through the United States House of Representatives 
in late April and sent on to the Senate.

CISPA is the successor to SOPA, the "anti-piracy" bill that was recently 
defeated after an outcry from citizens and Internet companies. SOPA, 
which was framed by its proponents in terms of protecting America's 
entertainment industry from theft, would have shackled content providers 
and users, and spawned copycat legislation around the world, from Canada 
and the United Kingdom to Israel and Australia.

Now, with CISPA, the clampdown on Internet freedom comes in the guise of 
a bill aimed at cyber terrorism that should give Internet entrepreneurs 
- and all business leaders - nightmares. And yet, this time, major 
Internet and technology companies, including Facebook and Microsoft, 
supported the bill, on the grounds that it would create a clear 
procedure for handling government requests for information. Microsoft, 
at least, belatedly dropped its support after recognizing that the law 
would allow the U.S. government to force any Internet business to hand 
over information about its users' online activities.

But the bill is far more alarming than that. For example, "the head of a 
department or agency of the Federal Government receiving cyber threat 
information ... shall provide such cyber threat information to the 
National Cybersecurity and Communications Integration Center of the 
Department of Homeland Security."

In fact, no actual threat need be made. And what counts as "threat 
information" is defined so broadly that it can mean anything. 
"Notwithstanding any other provision of law," the government may rely on 
"cybersecurity systems to identify and obtain cyber threat information."

The vague concept of "cyber threat information" does not just let the 
Department of Homeland Security investigate anyone. By including 
information pertaining to "a vulnerability of a system or network of a 
government or private entity," and the "theft or misappropriation of 
private or government information, intellectual property, or personally 
identifiable information," the bill appears to target whistleblowers and 
leakers, and threatens investigative journalism.

The respected Internet technology site Techdirt has called the bill 
"insanity." It has written that "CISPA can no longer be called a 
cybersecurity bill at all. The government would be able to search 
information ... for the purposes of investigating American citizens with 
complete immunity from all privacy protections as long as [it] can claim 
someone committed a ‘cybersecurity crime.'"

Indeed, the Department of Homeland Security may look through data 
transmitted online without restraint, regardless of what it ultimately 
finds. And, in this respect, business leaders who believe that this bill 
is aimed at terrorists - or "at most" at the domestic activists and 
documentarians who can make it harder for them to operate - should be 
careful about what they wish for.

Indeed, because the definition of cyberterrorism is so broad and 
subjective, U.S. business leaders who are pushing for CISPA risk 
exposing themselves to the Department of Homeland Security's power to 
scrutinize their personal lives, subpoena their bank records, and 
disrupt their electronic communications. And the law would give the 
Department of Homeland Security similar control over the personal and 
financial lives of anyone who does business in the United States or with 
American companies - a power that the U.S. government has already tried 
to assert by issuing a subpoena for Icelandic legislator Birgitta 
Jonsdottir's personal bank records.

Everyone has secrets: love affairs, substance-abuse problems, 
mental-health diagnoses, heterodox sexual preferences or questionable 
discussions with accountants.

In a strong civil society, these personal matters properly remain 
private. In a surveillance society, they become leverage.

I am fearful of the effects of unrestrained domestic surveillance for 
specific reasons: I worked in two U.S. presidential campaigns, and saw 
firsthand the standard tactics - nonviolent but still mafia-inflected - 
of high-level politics. There was no shortage of privately contracted 
surveillance and wiretapping. Campaigns routinely planted spies - 
interns, household staff or even lovers - in the opposing camp, and 
devoted vast numbers of man-hours to combing through private records in 
opposition research. The results were then regularly used behind the 
scenes to bully, intimidate and coerce targets.

Most of these "scandals" never saw the light of day - the goal was 
pressure, not disclosure. CISPA would give the same power to the 
Department of Homeland Security. America's business leaders may think 
that they are immune, but the bill's definition of "a threat" is so 
vague - with no distinction between a "threat" to the Internet and any 
random, even metaphorical "threat" on the Internet - that the Department 
of Homeland Security may keep tabs on anyone who says something that 
irks someone in a cubicle.

If CISPA enters into U.S. law, alongside the recently enacted National 
Defense Authorization Act - which gives the government the power to 
detain any American for anything forever - fundamental civil liberties 
will be threatened in a way that no democracy can tolerate. And because 
so much of the freedom of the Internet around the world derives from the 
freedom of expression that until recently characterized the U.S., 
enactment of CISPA poses a similar threat around the world.

The good news is that President Barack Obama has vowed to veto CISPA. 
The bad news is that he made - and then broke - a similar vow on the 
National Defense Authorization Act.


-------------- next part --------------
____________________________________________________________
You received this message as a subscriber on the list:
     governance at lists.igcaucus.org
To be removed from the list, visit:
     http://www.igcaucus.org/unsubscribing

For all other list information and functions, see:
     http://lists.igcaucus.org/info/governance
To edit your profile and to find the IGC's charter, see:
     http://www.igcaucus.org/

Translate this email: http://translate.google.com/translate_t


More information about the Governance mailing list