112 online
 
Most Popular Choices
Share on Facebook 14 Printer Friendly Page More Sharing
OpEdNews Op Eds   

CISPA Is Back

By       (Page 4 of 8 pages) Become a premium member to see this article and all articles as one long page.   No comments
Message Stephen Lendman
Become a Fan
  (191 fans)

This piece was reprinted by OpEd News with permission or license. It may not be reproduced in any form without permission or license from the source.

"Under a broad cybersecurity umbrella, it permits companies to share user communications directly with the super secret National Security Agency and permits the NSA to use that information for non-cybersecurity reasons." 

"This risks turning the cybersecurity program into a back door intelligence surveillance program run by a military entity with little transparency or public accountability." 

"Members should seriously consider whether CISPA - which inflamed grassroots activists last year and was under a veto threat for these and other flaws - is the right place to start."

Last October, Obama signed a secret directive. It addressed cyberattack defense. It set guidelines for confronting cyberspace threats. It lets military personnel act more aggressively.

Called Presidential Policy Directive 20, it's "the most extensive White House effort to date to wrestle with what constitutes an 'offensive' and a 'defensive' action in the rapidly evolving world of cyberwar and cyberterrorism, where an attack can be launched in milliseconds by unknown assailants utilizing a circuitous route." 

"For the first time, (it) explicitly makes a distinction between network defense and cyber operations to guide officials charged with making often rapid decisions when confronted with threats."

The order updates Bush's 2004 presidential directive. It vets operations outside government owned systems.

Fiber operations previously considered offensive (because they go outside defended networks) are now called defensive. They include "severing the link between an overseas server and a targeted domestic computer."

Pentagon officials are expected to finalize new cyberwar rules of engagement. They set guidelines for military commanders. They'll be able to act outside government networks. 

Next Page  1  |  2  |  3  |  4  |  5  |  6  |  7  |  8

(Note: You can view every article as one long page if you sign up as an Advocate Member, or higher).

Rate It | View Ratings

Stephen Lendman Social Media Pages: Facebook page url on login Profile not filled in       Twitter page url on login Profile not filled in       Linkedin page url on login Profile not filled in       Instagram page url on login Profile not filled in

VISIT MY WEBSITE: stephenlendman.org (Home - Stephen Lendman). Contact at lendmanstephen@sbcglobal.net.  My two Wall Street books are timely reading: "How Wall Street Fleeces America: Privatized Banking, Government (more...)
 

Go To Commenting
The views expressed herein are the sole responsibility of the author and do not necessarily reflect those of this website or its editors.
Writers Guidelines

 
Contact AuthorContact Author Contact EditorContact Editor Author PageView Authors' Articles
Support OpEdNews

OpEdNews depends upon can't survive without your help.

If you value this article and the work of OpEdNews, please either Donate or Purchase a premium membership.

STAY IN THE KNOW
If you've enjoyed this, sign up for our daily or weekly newsletter to get lots of great progressive content.
Daily Weekly     OpEd News Newsletter
Name
Email
   (Opens new browser window)
 

Most Popular Articles by this Author:     (View All Most Popular Articles by this Author)

The McCain-Lieberman Police State Act

Daniel Estulin's "True Story of the Bilderberg Group" and What They May Be Planning Now

Continuity of Government: Coup d'Etat Authority in America

America Facing Depression and Bankruptcy

Lies, Damn Lies and the Murdoch Empire

Mandatory Swine Flu Vaccine Alert

To View Comments or Join the Conversation:

Tell A Friend