Power of Story
Send a Tweet        
- Advertisement -
OpEdNews Op Eds

CISPA Is Back

By       Message Stephen Lendman     Permalink
      (Page 4 of 8 pages) Become a premium member to see this article and all articles as one long page.
Related Topic(s): ; ; ; ; , Add Tags Add to My Group(s)

View Ratings | Rate It

opednews.com

Author 194
Become a Fan
  (191 fans)
- Advertisement -
"Under a broad cybersecurity umbrella, it permits companies to share user communications directly with the super secret National Security Agency and permits the NSA to use that information for non-cybersecurity reasons." 

"This risks turning the cybersecurity program into a back door intelligence surveillance program run by a military entity with little transparency or public accountability." 

"Members should seriously consider whether CISPA - which inflamed grassroots activists last year and was under a veto threat for these and other flaws - is the right place to start."

- Advertisement -

Last October, Obama signed a secret directive. It addressed cyberattack defense. It set guidelines for confronting cyberspace threats. It lets military personnel act more aggressively.

- Advertisement -
Called Presidential Policy Directive 20, it's "the most extensive White House effort to date to wrestle with what constitutes an 'offensive' and a 'defensive' action in the rapidly evolving world of cyberwar and cyberterrorism, where an attack can be launched in milliseconds by unknown assailants utilizing a circuitous route." 

"For the first time, (it) explicitly makes a distinction between network defense and cyber operations to guide officials charged with making often rapid decisions when confronted with threats."

The order updates Bush's 2004 presidential directive. It vets operations outside government owned systems.

Fiber operations previously considered offensive (because they go outside defended networks) are now called defensive. They include "severing the link between an overseas server and a targeted domestic computer."

- Advertisement -

Pentagon officials are expected to finalize new cyberwar rules of engagement. They set guidelines for military commanders. They'll be able to act outside government networks. 

Next Page  1  |  2  |  3  |  4  |  5  |  6  |  7  |  8

 

- Advertisement -

View Ratings | Rate It

I was born in 1934, am a retired, progressive small businessman concerned about all the major national and world issues, committed to speak out and write about them.

Share on Google Plus Submit to Twitter Add this Page to Facebook! Share on LinkedIn Pin It! Add this Page to Fark! Submit to Reddit Submit to Stumble Upon



Go To Commenting
/* The Petition Site */
The views expressed in this article are the sole responsibility of the author and do not necessarily reflect those of this website or its editors.

Writers Guidelines

Contact AuthorContact Author Contact EditorContact Editor Author PageView Authors' Articles
Related Topic(s): ; ; ; ; , Add Tags
- Advertisement -

Most Popular Articles by this Author:     (View All Most Popular Articles by this Author)

The McCain-Lieberman Police State Act

Daniel Estulin's "True Story of the Bilderberg Group" and What They May Be Planning Now

Continuity of Government: Coup d'Etat Authority in America

America Facing Depression and Bankruptcy

Lies, Damn Lies and the Murdoch Empire

Mandatory Swine Flu Vaccine Alert