Stories
Slash Boxes
Comments

SoylentNews is people

posted by takyon on Thursday July 30 2015, @11:20PM   Printer-friendly
from the talking-about-it dept.

The Hill reports:

[...] Cybersecurity Information Sharing Act, or CISA, is an out and out surveillance bill masquerading as a cybersecurity bill. It won't stop hackers. Instead, it essentially legalizes all forms of government and corporate spying.

Here's how it works. Companies would be given new authority to monitor their users -- on their own systems as well as those of any other entity -- and then, in order to get immunity from virtually all existing surveillance laws, they would be encouraged to share vaguely defined "cyber threat indicators" with the government. This could be anything from email content, to passwords, IP addresses, or personal information associated with an account. The language of the bill is written to encourage companies to share liberally and include as many personal details as possible.

That information could then be used to further exploit a loophole in surveillance laws that gives the government legal authority for their holy grail -- "upstream" collection of domestic data directly from the cables and switches that make up the Internet.

[...] CISA would create a huge expansion of the "backdoor" search capabilities that the government uses to skirt the 4th Amendment and spy on Internet users without warrants and with virtually no oversight.

All of this information can be passed around the government and handed down to local law enforcement to be used in investigations that have nothing to do with cyber crime, without requiring them to ever pull a warrant. So CISA would give law enforcement a ton of new data with which to prosecute you for virtually any crime while simultaneously protecting the corporations that share the data from prosecution for any crimes possibly related to it.

Will CISA be used against the guilty, or the innocent?


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 2) by c0lo on Friday July 31 2015, @11:12AM

    by c0lo (156) Subscriber Badge on Friday July 31 2015, @11:12AM (#216249) Journal

    I think more of them are doing that sort of thing with cloud accounts, so the social inertia has already been overcome.

    I reckon it wasn't about "social inertia" (as in "reluctance to make your files public"), but rather about the easy way of sharing (like easier than connecting to a FTP server; so easy that you don't have to think too much).

    If I'm right on my assertion, then there's your explanation why freenode hasn't quite take off: "you need to understand a bit this mumbo-jumbo like darknet/opennet, keys, distributed storage and... and... all this non-sense. Why can't we have just a username and password and be done with it with just simple drag-drop?"

    --
    https://www.youtube.com/watch?v=aoFiw2jMy-0 https://soylentnews.org/~MichaelDavidCrawford
    Starting Score:    1  point
    Karma-Bonus Modifier   +1  

    Total Score:   2