Police State Harshness
CISPA about destroying freedom, not cybersecurity.
by Stephen Lendman
On April 26, the House passed HR 3523: Cyber Intelligence Sharing and Protection Act (CISPA) of 2011 248 - 168.
A companion S. 2105: Cybersecurity Act of 2012 awaits Senate consideration. Obama promised a veto if passes. He lied. He does it repeatedly.
The Senate will pass or defeat what he wants. More than likely, it'll make cosmetic changes agreed to by House/Senate negotiators. Either that or they'll draft a new bill, under a new name, little different from CISPA to matter.
Last year, Obama promised to veto the draconian FY 2012 National Defense Authorization Act. It authorizes detaining US citizens indefinitely without charge or trial based solely on suspicions, baseless allegations or none at all.
US military personnel are authorized to arrest and indefinitely detain anyone globally, including US citizens.
Due process, civil protections, and judicial fairness are null and void. Presidents may order anyone arrested and imprisoned for life without charge or trial. Abuse of power replaced rule of law protections.
After refusing support, Obama signed it into law. Doing so enacted tyranny. Cybersecurity harshness hardens it. If Congress sends him a bill, he'll sign it. He's gone along with everything he pledged opposition to as a candidate.
CISPA is more about personal freedom than online security. Post-9/11, it eroded steadily en route to destroying it altogether. CISPA is another nail in its coffin. Its burial plot awaits.
The bill gives government and corporate supporters unlimited power to access personal/privileged information online. Civil liberty concerns are ignored. Before passage, security experts, academics, and other professionals published an open letter to Congress, saying:
We are writing you today as professionals, academics, and policy experts who have researched, analyzed, and defended against security threats to the Internet and its infrastructure."
"We have devoted our careers to building security technologies, and to protecting networks, computers, and critical infrastructure against attacks of many stripes."