Stories
Slash Boxes
Comments

SoylentNews is people

posted by takyon on Thursday July 30 2015, @11:20PM   Printer-friendly
from the talking-about-it dept.

The Hill reports:

[...] Cybersecurity Information Sharing Act, or CISA, is an out and out surveillance bill masquerading as a cybersecurity bill. It won't stop hackers. Instead, it essentially legalizes all forms of government and corporate spying.

Here's how it works. Companies would be given new authority to monitor their users -- on their own systems as well as those of any other entity -- and then, in order to get immunity from virtually all existing surveillance laws, they would be encouraged to share vaguely defined "cyber threat indicators" with the government. This could be anything from email content, to passwords, IP addresses, or personal information associated with an account. The language of the bill is written to encourage companies to share liberally and include as many personal details as possible.

That information could then be used to further exploit a loophole in surveillance laws that gives the government legal authority for their holy grail -- "upstream" collection of domestic data directly from the cables and switches that make up the Internet.

[...] CISA would create a huge expansion of the "backdoor" search capabilities that the government uses to skirt the 4th Amendment and spy on Internet users without warrants and with virtually no oversight.

All of this information can be passed around the government and handed down to local law enforcement to be used in investigations that have nothing to do with cyber crime, without requiring them to ever pull a warrant. So CISA would give law enforcement a ton of new data with which to prosecute you for virtually any crime while simultaneously protecting the corporations that share the data from prosecution for any crimes possibly related to it.

Will CISA be used against the guilty, or the innocent?


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 3, Interesting) by mhajicek on Friday July 31 2015, @04:34AM

    by mhajicek (51) on Friday July 31 2015, @04:34AM (#216164)

    Encryption may not be the only way to fight back. I bet a few knowledgeable people could poison the metadata by adding bogus traffic.

    --
    The spacelike surfaces of time foliations can have a cusp at the surface of discontinuity. - P. Hajicek
    Starting Score:    1  point
    Moderation   +1  
       Interesting=1, Total=1
    Extra 'Interesting' Modifier   0  
    Karma-Bonus Modifier   +1  

    Total Score:   3  
  • (Score: 2, Interesting) by Anonymous Coward on Friday July 31 2015, @08:49AM

    by Anonymous Coward on Friday July 31 2015, @08:49AM (#216216)

    DOS It!

    • (Score: 1, Touché) by Anonymous Coward on Friday July 31 2015, @04:39PM

      by Anonymous Coward on Friday July 31 2015, @04:39PM (#216380)

      WINDOWS it!

  • (Score: 1) by AnonymousCowardNoMore on Friday July 31 2015, @03:45PM

    by AnonymousCowardNoMore (5416) on Friday July 31 2015, @03:45PM (#216348)

    I disagree. Your Dear Leaders are collecting data in case they ever need to put you away for something "evil". You are presumed guilty based on having any suspicious traffic, not based on the percentage of your traffic that is suspicious. Put simply, bogus traffic gives the old cardinal another six lines if he wants to find something to hang you by and has no real impact if he doesn't.

    • (Score: 2) by mhajicek on Tuesday August 04 2015, @02:06AM

      by mhajicek (51) on Tuesday August 04 2015, @02:06AM (#217700)

      Hence Windows 10.

      --
      The spacelike surfaces of time foliations can have a cusp at the surface of discontinuity. - P. Hajicek