A coalition of US civil liberties organizations have declared this to be Stop Cyber Spying Week, with the goal of scuttling CISPA, the Internet spying bill that promotes web-censorship, bulk surveillance, and warrantless wiretapping by government and Internet companies, while turning over spying governance to the unaccountable, secretive NSA.
CISPA's supporters, notably CISPA sponsor Rep Mike Rogers (R-MI), have pooh-poohed the Internet's concerns, and say that the bill is a lock, and nothing we say can change Congress's mind (apparently, they've forgotten the lesson of SOPA). Now, the Electronic Frontier Foundation replies with specific, Internet-breaking, out-of-control surveillance scenarios CISPA would create:
One of the scariest parts of CISPA is that the bill goes above and beyond information sharing. Its definitions allow for countermeasures to be taken by private entities, and we think these provisions are ripe for abuse. Indeed, the bill defines "cybersecurity purpose" as any threat related to safeguarding or protecting a network. As long as companies act in "good faith" for a cybersecurity purpose, they have leeway to protect against “efforts to degrade, disrupt, or destroy [a] system or network.” This opens the door for ISPs and other companies to perform aggressive countermeasures like dropping or altering packets, so long as this is used as part of scheme to identify cybersecurity threats. These countermeasures could put free speech in peril, and jeopardize the ordinary functioning of the Internet. This could also mean blocking websites, or disrupting privacy-enhancing technologies such as Tor. These countermeasures could even serve as a back door to enact policies unrelated to cybersecurity, such as disrupting p2p traffic.
Yes, CISPA Could Allow Companies to Filter or Block Internet Traffic
The week, the US CBP published a notice in the Federal Register proposing a change to the Form I-94 Arrival/Departure Record paperwork that visitors to the US fill out when they cross the border, in which they announce plans to ask travellers to “please enter information associated with your online presence.”
Texas’s prison system must provide safe drinking water to its inmates, a judge in Houston federal court ruled Thursday. The Associated Press reports on a case that saw Texas fight all the way to court to continue supplying arsenic-laden water to prisoners— a position U.S. District Judge Keith Ellison wrote violates “contemporary standards of decency.” […]
“The U.S. government wants to use an obscure procedure—amending a federal rule known as Rule 41— to radically expand their authority to hack,” the EFF says. “The changes to Rule 41 would make it easier for them to break into our computers, take data, and engage in remote surveillance.
Some truths are universal. For one, your phone will always run out of power when you most need it. For another, the charging cords that come packaged with your Apple device will fray, split, and rip faster than Usain Bolt in a game of tag.Instead, pick up a charging cord that anyone would have a tough […]
Some people say magic tricks are nerdy and best left to your 12-year-old asthmatic cousin. But others see value in perfecting the slight of hand and showmanship associated with a perfectly executed routine. We’re firmly in the latter camp. And now, we’re giving you the ability to put a few parlor tricks up your sleeve with the Penguin […]
Bluetooth speakers may be convenient to use, but many of them just aren’t that powerful. Sure, it may be fine if you’re seated in front of the speaker. But move across the room, and you may strain to hear what’s coming from those tiny drivers.There’s a reason why the G-BOOM Wireless Bluetooth Boombox (now $79.99 in the Boing […]