As CISPA Debate Rages Again, Obama Already Using Its Powers
February 12th, 2013
Reader Views: 397
Just like most draconian legislation that politicians try to pass, the government has already been using the illegal powers and hopes to justify its actions with the passage of a new law. See warrantless wiretapping. Other even worse actions, like torture and assassinations of Americans without due process, are simply kept secret because they know a law for it would never be possible.
It was recently announced that the Cyber Intelligence Sharing and Protection Act, or CISPA, will once again be coming for a vote in the United States Congress. LawmakersÂ citedÂ increased threats from hackers and cyber espionage as the motivation for its reintroduction.
This version of CISPA is reportedly identical to last year’s version thatÂ easily passedÂ in the House by a count of 248 to 168. Â Congressman Jared Polis (D-Colo), who voted against the measure, said the law “would waive every single privacy law ever enacted in the name of cybersecurity.”
Other critics have pointed out that CISPA gives Obama a “kill switch” over the Internet in a “national cyberemergency”.
CISPA has been roundly criticized by privacy advocates as enshrining the powers of the government to surveil and control the Internet in two overarching ways. First, government can lay claim to protecting “critical infrastructure” under which the Web has now been included. This opens the door for requesting that private companies like Google, Facebook and so far 800 others work openly on the initiative as well.
Both attempts to pass it in the Senate in 2012 narrowly failed with theÂ last vote of 51-47Â occurring in November which was closer than itsÂ 52-46 August vote.
After its failure, the White House and CISPA co-sponsor Joe LiebermanÂ warnedÂ the public that Obama would enact an executive order if lawmakers won’t pass the bill.
Although Obama has yet to issue a formal executive order,Â The Washington PostÂ reportedÂ that Presidential Obama signed a secret cybersecurity presidential directive: Presidential Policy Directive 20 essentially giving himself all the power that CISPA seeks to legitimize:
Presidential Policy Directive 20 establishes a broad and strict set of standards to guide the operations of federal agencies in confronting threats in cyberspace, according to several U.S. officials who have seen the classified document and are not authorized to speak on the record. The president signed it in mid-October.
The new directive is the most extensive White House effort to date to wrestle with what constitutes an â€śoffensiveâ€ť and a â€śdefensiveâ€ť action in the rapidly evolving world of cyberwar and cyberterrorism, where an attack can be launched in milliseconds by unknown assailants utilizing a circuitous route. For the first time, the directive explicitly makes a distinction between network defense and cyber-operations to guide officials charged with making often-rapid decisions when confronted with threats.
The realityÂ is that much of CISPA’s privacy-shattering policies already are taking place under the FISA Amendments Act which Obama reauthorized for an additional 5 years. As the Electronic Frontier Foundation reported back in March:
the FAA is the statute Congress passed giving immunity to telecom companies despite their participation in the NSAâ€™s massive warrantless wiretapping program, which the New York TimesÂ first exposedÂ in 2005. EFF and a host of other civil liberties groups have been involved in litigation challenging the constitutionality of warrantless wiretapping for years. (Source)
The extent of warrantless wiretapping and surveillance already being shared between the government and private companies has been exposed byÂ The Washington Post, as well as former NSA whistleblowersÂ William BinneyÂ and Thomas Drake, and formerÂ AT&T technician Mark Klein.
The Post’s investigation revealed such a massive overlap of government and corporate interests that it is already operating free of transparency and oversight. Their findings were appropriately titled, “A hidden world, growing beyond control.”
Some 1,271 government organizations and 1,931 private companies work on programs related to counterterrorism, homeland security and intelligence in about 10,000 locations across the United States. (Source)
Perhaps it is because of the exposure these whistleblowers have given that CISPA aims to go aÂ step further and give corporations the power to prevent hard evidence leaks. As Stephen C. Webster of Rawstory states:
Imagine if Bank of America knew that WikiLeaks had obtained a cache of its internal documents the very instant that transmission was made, and a financial blockade were launched before WikiLeaks could even begin examining the files. Because CISPA words the definition of ‘cyber threat intelligence’ to include ‘theft or misappropriation of private or government information’ and ‘intellectual property’,Â thatâ€™s precisely whatâ€™s at stake here.
After all, who wouldnâ€™t want a government minder as a personal bodyguard during travels abroad? By placing the NSA on guard for corporate network security, big tech firms like AT&T, Verizon, IBM, Facebook and Google wonâ€™t be as hard-pressed by market forces â€” like rival companies and, yes, even hackers â€” to innovate their security technologies, leaving the heaviest lifting, and spending, up to Big Brother instead. (Source)
There is no doubt that the apparatus of CISPA is already in effect and it’s merely going to be justified through legislation. Â The Supreme Court refuses to address privacy issues and has effectivelyÂ shut down all lawsuitsÂ aimed at holding accountable those engaging inÂ domesticÂ warrantless wiretapping. And there are many private companies ready to offer their assistance to help track everyone’s digital movements and communications.
Increasing coverage of social media was brought to the U.S.Â governmentÂ in 2010 by war criminal Raytheon’sÂ RIOT search technologyÂ which has been called a “Google for spies.” CovertÂ eavesdropping of VoIP services like SkypeÂ has been introduced by the private sector (including Microsoft) through patents filed as far back as 2007. And massive, largely unknown data mining companies like Axciom which began in 1969 now collects and analyzesÂ 50 trillion data transactions per year.
So CISPA passing or Obama’s executive order in the name of cybersecurity is of little practical consequence other than legalizing past privacy violations and offensive state-sponsored cyber attacks by the U.S. government. Â It won’t even make the government’s cybersecurity actions transparent, but it certainly will make it transparent that a whole new level of the Internet Security Industrial Complex is taking shape.
Delivered by The Daily Sheeple
Contributed by Activist Post of Activist Post.
Please share: Spread the word to sheeple far and wide
Leave A Comment...
The Daily Sheeple Home Page