<time datetime=”2012-11-15T17:04:00+00:00″>November 15, 2012</time>
With your help last summer we helped defeat Senator Lieberman’s Cybersecurity Act. But for some reason, Senate Majority Leader Reid decided to call for another vote on the bill in the lame duck session today. After an hour’s debate, the full Senate voted 51 to 47 against cloture for the Cybersecurity Act, meaning it can’t move forward for a vote.
We’ve spent months going over the various faults in the bill—and of the faults in the other proposed Cybersecurity bills. We were particularly concerned because the Cybersecurity Act included overly vague definitions for key terms like “cybersecurity threat,” “cybersecurity threat indicator,” and even “countermeasures.”
EFF believes in strong privacy and security for networked devices—that’s why we champion technologies like Tor and HTTPS Everywhere. But we believe that legislation in the arena of cybersecurity should not provide broad, vague powers that allow companies to skirt existing privacy law.
Source: EFF. Read full article. (<a href=”https://www.eff.org/deeplinks/2012/11/senate-defeats-dangerously-vague-cybersecurity-act-again”>link</a>)
<h3><a href=”http://www.activistpost.com/2012/11/obama-secret-directive-gives-cyber.html”>Obama Secret Directive Gives Cyber-Control to Military For National Security</a></h3>
<a href=”http://occupycorporatism.com/wp-content/uploads/2012/11/obama-libya-1e407753eabc262c1-1024×676-300×198.jpg”><img src=”http://occupycorporatism.com/wp-content/uploads/2012/11/obama-libya-1e407753eabc262c1-1024×676-300×198.jpg” alt=”” width=”200″ height=”132″ border=”0″ /></a>
Susanne Posel, <em>Contributor</em>
<a href=”http://www.activistpost.com/2012/11/obama-secret-directive-gives-cyber.html”><strong>Activist Post</strong></a>
Google is stating in their most recent <a href=”http://www.google.com/transparencyreport/”> Transparency Report</a> that the US government has stepped up their surveillance on civilians. According to the Internet giant, more personal data is being profiled on Americans and their habits on the Web.
Dorothy Chou, senior policy analyst at Google <a href=”http://googlepublicpolicy.blogspot.com/2012/11/transparency-report-government-requests.html”> explains: </a> [G]overnment demands for user data have increased steadily since we first launched the Transparency Report.”
Google says that they have been refusing to comply with governmental requests to take down content on the Internet because of <a href=”https://www.google.com/transparencyreport/removals/government/faq/#non_compliance_reasons”> fake court orders</a> that appear to be frivolous or illegitimate.
Using the claim that content being removed is racist in nature or defaming of public figures, governments around the world are<a href=”http://www.bbc.co.uk/news/technology-20319505″> requesting</a> that the Internet be censored. However, this new trend is indicative of the Big brother controls being enacted against the free speech of citizens in sovereign nations. France, Germany, Italy, Spain and the UK have topped the list of countries that seek to control content on the Internet.
<a name=”more”></a>Back in May, it was made public that the <a href=”http://ca.news.yahoo.com/us-spy-agency-keep-mum-google-ties-court-195145311.html”> relationship </a> between the National Security Agency (NSA) and Google is not going to be disclosed.
A US Court of Appeals in the District of Columbia, ruled last week that the NSA does not need to confirm nor deny (known as a “Glomar” response) its collaborations with Google; how the two work together to spy on American citizens in the name of protecting the public from “cyber-attacks”.
The court’s ruling states effectively that regardless of a filing by the Electronic Privacy Information Center (EPIC) with the Freedom of Information Act to obtain documents as to the relationship, the US government does not have to divulge any arrangement between the NSA and the search engine giant.
<strong>It is now being reported that Obama has signed a <a href=”http://www.washingtonpost.com/world/national-security/obama-signs-secret-cybersecurity-directive-allowing-more-aggressive-military-role/2012/11/14/7bf51512-2cde-11e2-9ac2-1c61452669c3_story_1.html”> secret policy directive </a> that gives the military complete control over the Internet should the US come under a cyberattack. Being called Presidential Policy Directive 20, the alleged document (being classified) is a guideline that explains how specific federal agencies will be empowered by the Obama administration to intercept online “breaches of security” – including hacking and other digital attacks.</strong>
This document assures that <strong>the US government is taking the offensive and proactive approach to digital security where network defense is recognized as operations designed to ensure defense of national security. Whether it means shutting down main servers or local computers that have been identified as targets, a complete shutdown of Internet access (although it requires cybersecurity legislation) would not be out of the realm of possibility.</strong>
The military’s role in cybersecurity with regard to digital attacks will be to ensure that US digital information, data, and privacy be protected. This new responsibility will work in conjunction with law enforcement network defenses that are being used to para-militarize the Web using cyber units.
In New York, Mayor Michael Bloomberg and Microsoft have collaborated to create pre-crime and counterterrorism <a href=”http://newyork.cbslocal.com/2012/08/08/nypd-unveils-crime-and-terror-fighting-domain-awareness-system/”> technology </a> to aid federal intelligence and local law enforcement agencies domestic and international.
The Domain Awareness System (DAS) will be a very sophisticated software technology that aggregates and analyzes public information in real time that will produce comprehensive <a href=”http://occupycorporatism.com/microsoft-and-bloomberg-collaborate-on-sophisticated-pre-crime-technology/”> reports </a> to be used by NYPD to ascertain potential threats and pre-crime activity.
Last month the <a href=”http://www.cyberwarnews.info/2012/09/16/americas-draft-cybersecurity-executive-order-leaked/”> leaked version </a> of Obama’s cybersecurity executive order is a compromise by the administration offered to those concerned about Big Brother controls invading US citizen’s privacy on the Web. One concession outlined is the sharing of Internet traffic information by the US government and private sector corporations involving critical infrastructure and electrical grid. Social media companies would not be held under the same mandate.
The DHS, specifically Secretary Janet Napolitano, will be given the sole power of oversight, rather than Keith Alexander, director of the National Security Agency (NSA). Napolitano will be empowered to reference top-secret intelligence reports only known to her to base identification of cyberthreats and individual targets.
In a proactive move, Janet Napolitano, in her <a href=”http://www.dhs.gov/blog/2012/10/26/inspiring-next-generation-cyber-professionals”> blog </a> entitled “Inspiring the Next Generation of Cyber Professionals”, would like future generations to learn about cybersecurity so that their contribution to the federal government is secure to “ensure their professional development.” The collaboration of the Department of Homeland Security and the National Security Agency will support “the nation’s educational infrastructure by supporting Centers of Academic Excellence” to make sure that the “scope of cyber education” becomes an important function for those in the field as inspired by the <a href=”http://csrc.nist.gov/nice/”> National Initiative for Cybersecurity Education </a> (NICE).
NICE is meant to “establish an operational, sustainable and continually improving cybersecurity education program for the nation to use sound cyber practices that will enhance the nation’s security.” The National Institute of Standards and Technology (NIST) oversee NICE by providing information and leverage to encourage the development of citizens to become “responsible” when using the Internet.
DHS has begun an initiative to purvey propaganda onto American citizens called <a href=”http://stopthinkconnect.org/”> Stop.Think.Connect. </a> (STC). The STC have teamed with Microsoft to create public service announcements (PSAs) that convince average Americans how to perceive the inflated threat hackers have on the US government’s cybersecurity.
Some of the founders of the STC initiative are AT&T, Costco, Experian, Facebook, Google, Intel, McAfee, Mircosoft, Paypal, Symantec, Verisign, Visa, Walmart, and Yahoo!.
<em>Susanne Posel is the Chief Editor of <a href=”http://occupycorporatism.com/”><strong>Occupy Corporatism</strong></a>. Our alternative news site is dedicated to reporting the news as it actually happens; not as it is spun by the corporately funded mainstream media. You can find us on <strong><a href=”http://www.facebook.com/pages/Occupy-Corporatism/227213404014035/”>our Facebook page</a></strong>.</em>
Bagi menganalisis berserta menggunakan gameplay sicbo faktanya praktis, meskipun begitu telah diperlukan terdapat banyak panggung mengenai menyambangi sangkutan berjudi diatas. Para penyayang tercantol pasang provider diatas yang disebabkan dicap memegang ketulusan jaminan positif jadinya teliti metafor ketiga provider yang mana udah ana berikan yang ditas. Sicbo dalam hal ini kini tersedia kalau menurut ada banyak...
Melalui semestinya hanya dengan menyiapkan aset berhasilnya doang anda berketentuan ndak tertera serbuan sepanjang bet. Dan pasti, dengan keunggulan putar secara langsung, anda jangan terus menerus paksakan dan mencari tahu layar ponsel anda maka dari mesin tersebut akan putar balik secara langsung. Oleh karena itu mainkan bertaruh menu secara penting hingga ente seharusnya merain kemenangan...
Jika keunikan Wild banyak sekali muncul dalam mesin Slot Online anda, harus anda mengenai sering merain kemenangan walaupun sedikit dan itulah akan tetap membantu ego anda bagi bisa setiap waktu memutar alat Slot Online hingga otomatis. Dan Permainan Slot Hadiah adalah Permainan Slot guna mengakumulasi jumlah taruhan penjudi, sampai orang cukup mujur untuk berubah letak...
Games poker yang di mainkan dengan cara online pun tak rumit pada saat kegiatan membagikan kartu, Agensports sebab kartu anda langnsung di sebar secara otomatis melalui sistem dari poker online. Ungkapan yang terakhir yaitu Fold. Keputusan untuk melakukan Bet mesti anda pikirkan dengan baik karena kamu dapat saja menakuti musuh kalian yang berakibat player lain...
Mereka merindukan uang yang akan terutama, sertaq ini dia tidak lain tidak bukan iallah keturunan mulai sejak keruntuhan di siapa tahu hanya situ temukan. Adakalanya ada pejudi yang mempromosikan modal kalian oleh di pakai dalam judi bola tersebut. Setiap judul pastinya akan memiliki biang masing-masing yang beda satu persis lain. Lebih-lebih lagi seumpama anda bergelut...
kalian sekadar patut memastikan pion agen bantuan customer service dari judi online yang bisa kalian memastikan hanya mencurangi hadiah penjudi. Mula – mula pastikan anda mendalami sehingga menyimak suri pertunjukan sampai biasa berguling oleh masing-masing tubuh. Adanya bermodalkan merupakan internet beserta telepon pintar, orang tersebut sudah terlanjur di perkenankan menghubungkan tempat judi online. Dengan ...