Stories
Slash Boxes
Comments

SoylentNews is people

SoylentNews is powered by your submissions, so send in your scoop. Only 17 submissions in the queue.
posted by takyon on Thursday July 30 2015, @11:20PM   Printer-friendly
from the talking-about-it dept.

The Hill reports:

[...] Cybersecurity Information Sharing Act, or CISA, is an out and out surveillance bill masquerading as a cybersecurity bill. It won't stop hackers. Instead, it essentially legalizes all forms of government and corporate spying.

Here's how it works. Companies would be given new authority to monitor their users -- on their own systems as well as those of any other entity -- and then, in order to get immunity from virtually all existing surveillance laws, they would be encouraged to share vaguely defined "cyber threat indicators" with the government. This could be anything from email content, to passwords, IP addresses, or personal information associated with an account. The language of the bill is written to encourage companies to share liberally and include as many personal details as possible.

That information could then be used to further exploit a loophole in surveillance laws that gives the government legal authority for their holy grail -- "upstream" collection of domestic data directly from the cables and switches that make up the Internet.

[...] CISA would create a huge expansion of the "backdoor" search capabilities that the government uses to skirt the 4th Amendment and spy on Internet users without warrants and with virtually no oversight.

All of this information can be passed around the government and handed down to local law enforcement to be used in investigations that have nothing to do with cyber crime, without requiring them to ever pull a warrant. So CISA would give law enforcement a ton of new data with which to prosecute you for virtually any crime while simultaneously protecting the corporations that share the data from prosecution for any crimes possibly related to it.

Will CISA be used against the guilty, or the innocent?


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 0) by Anonymous Coward on Friday July 31 2015, @01:40PM

    by Anonymous Coward on Friday July 31 2015, @01:40PM (#216302)

    Completely encrypted mail already exists (plaintext only ever exists in your browser in your machine's RAM so even if the provider is strong-armed it is literally impossible for them to hand over your un-encrypted data). It's called Protonmail (www.protonmail.ch) and is Based in Switzerland and => non-US (and non-EU). It's entirely free, although they can't keep up with demand so you'll have to wait a number of weeks for your account after you request it. Protonmail to protonmail is encrypted seamlessly by default. With one click of a mouse you can encrypt mails to non-protonmail addresses, but then you'll obviously have to share the password with the recipient via some other channel.

  • (Score: 2) by Yog-Yogguth on Tuesday August 04 2015, @01:23AM

    by Yog-Yogguth (1862) Subscriber Badge on Tuesday August 04 2015, @01:23AM (#217685) Journal

    https://tutanota.com [tutanota.com] might be an alternative or additional choice.

    German, Gratis, GPL, encrypted locally, browser based/webmail, however I don't think they send encrypted to outside destinations (one could encrypt the message oneself though like copypasta GPG-encrypted message content). They don't have your password (so if you forget you lose everything) which if I remember correctly is validated locally (a salted hash perhaps?) and functions as part of your key or something like that, I'm iffy on the details because I've forgotten and not had time to look more at it.

    --
    Bite harder Ouroboros, bite! tails.boum.org/ linux USB CD secure desktop IRC *crypt tor (not endorsements (XKeyScore))