<time datetime=”2012-11-15T17:04:00+00:00″>November 15, 2012</time>
With your help last summer we helped defeat Senator Lieberman’s Cybersecurity Act. But for some reason, Senate Majority Leader Reid decided to call for another vote on the bill in the lame duck session today. After an hour’s debate, the full Senate voted 51 to 47 against cloture for the Cybersecurity Act, meaning it can’t move forward for a vote.
We’ve spent months going over the various faults in the bill—and of the faults in the other proposed Cybersecurity bills. We were particularly concerned because the Cybersecurity Act included overly vague definitions for key terms like “cybersecurity threat,” “cybersecurity threat indicator,” and even “countermeasures.”
EFF believes in strong privacy and security for networked devices—that’s why we champion technologies like Tor and HTTPS Everywhere. But we believe that legislation in the arena of cybersecurity should not provide broad, vague powers that allow companies to skirt existing privacy law.
Source: EFF. Read full article. (<a href=”https://www.eff.org/deeplinks/2012/11/senate-defeats-dangerously-vague-cybersecurity-act-again”>link</a>)
<h3><a href=”http://www.activistpost.com/2012/11/obama-secret-directive-gives-cyber.html”>Obama Secret Directive Gives Cyber-Control to Military For National Security</a></h3>
<a href=”http://occupycorporatism.com/wp-content/uploads/2012/11/obama-libya-1e407753eabc262c1-1024×676-300×198.jpg”><img src=”http://occupycorporatism.com/wp-content/uploads/2012/11/obama-libya-1e407753eabc262c1-1024×676-300×198.jpg” alt=”” width=”200″ height=”132″ border=”0″ /></a>
Susanne Posel, <em>Contributor</em>
<a href=”http://www.activistpost.com/2012/11/obama-secret-directive-gives-cyber.html”><strong>Activist Post</strong></a>
Google is stating in their most recent <a href=”http://www.google.com/transparencyreport/”> Transparency Report</a> that the US government has stepped up their surveillance on civilians. According to the Internet giant, more personal data is being profiled on Americans and their habits on the Web.
Dorothy Chou, senior policy analyst at Google <a href=”http://googlepublicpolicy.blogspot.com/2012/11/transparency-report-government-requests.html”> explains: </a> [G]overnment demands for user data have increased steadily since we first launched the Transparency Report.”
Google says that they have been refusing to comply with governmental requests to take down content on the Internet because of <a href=”https://www.google.com/transparencyreport/removals/government/faq/#non_compliance_reasons”> fake court orders</a> that appear to be frivolous or illegitimate.
Using the claim that content being removed is racist in nature or defaming of public figures, governments around the world are<a href=”http://www.bbc.co.uk/news/technology-20319505″> requesting</a> that the Internet be censored. However, this new trend is indicative of the Big brother controls being enacted against the free speech of citizens in sovereign nations. France, Germany, Italy, Spain and the UK have topped the list of countries that seek to control content on the Internet.
<a name=”more”></a>Back in May, it was made public that the <a href=”http://ca.news.yahoo.com/us-spy-agency-keep-mum-google-ties-court-195145311.html”> relationship </a> between the National Security Agency (NSA) and Google is not going to be disclosed.
A US Court of Appeals in the District of Columbia, ruled last week that the NSA does not need to confirm nor deny (known as a “Glomar” response) its collaborations with Google; how the two work together to spy on American citizens in the name of protecting the public from “cyber-attacks”.
The court’s ruling states effectively that regardless of a filing by the Electronic Privacy Information Center (EPIC) with the Freedom of Information Act to obtain documents as to the relationship, the US government does not have to divulge any arrangement between the NSA and the search engine giant.
<strong>It is now being reported that Obama has signed a <a href=”http://www.washingtonpost.com/world/national-security/obama-signs-secret-cybersecurity-directive-allowing-more-aggressive-military-role/2012/11/14/7bf51512-2cde-11e2-9ac2-1c61452669c3_story_1.html”> secret policy directive </a> that gives the military complete control over the Internet should the US come under a cyberattack. Being called Presidential Policy Directive 20, the alleged document (being classified) is a guideline that explains how specific federal agencies will be empowered by the Obama administration to intercept online “breaches of security” – including hacking and other digital attacks.</strong>
This document assures that <strong>the US government is taking the offensive and proactive approach to digital security where network defense is recognized as operations designed to ensure defense of national security. Whether it means shutting down main servers or local computers that have been identified as targets, a complete shutdown of Internet access (although it requires cybersecurity legislation) would not be out of the realm of possibility.</strong>
The military’s role in cybersecurity with regard to digital attacks will be to ensure that US digital information, data, and privacy be protected. This new responsibility will work in conjunction with law enforcement network defenses that are being used to para-militarize the Web using cyber units.
In New York, Mayor Michael Bloomberg and Microsoft have collaborated to create pre-crime and counterterrorism <a href=”http://newyork.cbslocal.com/2012/08/08/nypd-unveils-crime-and-terror-fighting-domain-awareness-system/”> technology </a> to aid federal intelligence and local law enforcement agencies domestic and international.
The Domain Awareness System (DAS) will be a very sophisticated software technology that aggregates and analyzes public information in real time that will produce comprehensive <a href=”http://occupycorporatism.com/microsoft-and-bloomberg-collaborate-on-sophisticated-pre-crime-technology/”> reports </a> to be used by NYPD to ascertain potential threats and pre-crime activity.
Last month the <a href=”http://www.cyberwarnews.info/2012/09/16/americas-draft-cybersecurity-executive-order-leaked/”> leaked version </a> of Obama’s cybersecurity executive order is a compromise by the administration offered to those concerned about Big Brother controls invading US citizen’s privacy on the Web. One concession outlined is the sharing of Internet traffic information by the US government and private sector corporations involving critical infrastructure and electrical grid. Social media companies would not be held under the same mandate.
The DHS, specifically Secretary Janet Napolitano, will be given the sole power of oversight, rather than Keith Alexander, director of the National Security Agency (NSA). Napolitano will be empowered to reference top-secret intelligence reports only known to her to base identification of cyberthreats and individual targets.
In a proactive move, Janet Napolitano, in her <a href=”http://www.dhs.gov/blog/2012/10/26/inspiring-next-generation-cyber-professionals”> blog </a> entitled “Inspiring the Next Generation of Cyber Professionals”, would like future generations to learn about cybersecurity so that their contribution to the federal government is secure to “ensure their professional development.” The collaboration of the Department of Homeland Security and the National Security Agency will support “the nation’s educational infrastructure by supporting Centers of Academic Excellence” to make sure that the “scope of cyber education” becomes an important function for those in the field as inspired by the <a href=”http://csrc.nist.gov/nice/”> National Initiative for Cybersecurity Education </a> (NICE).
NICE is meant to “establish an operational, sustainable and continually improving cybersecurity education program for the nation to use sound cyber practices that will enhance the nation’s security.” The National Institute of Standards and Technology (NIST) oversee NICE by providing information and leverage to encourage the development of citizens to become “responsible” when using the Internet.
DHS has begun an initiative to purvey propaganda onto American citizens called <a href=”http://stopthinkconnect.org/”> Stop.Think.Connect. </a> (STC). The STC have teamed with Microsoft to create public service announcements (PSAs) that convince average Americans how to perceive the inflated threat hackers have on the US government’s cybersecurity.
Some of the founders of the STC initiative are AT&T, Costco, Experian, Facebook, Google, Intel, McAfee, Mircosoft, Paypal, Symantec, Verisign, Visa, Walmart, and Yahoo!.
<em>Susanne Posel is the Chief Editor of <a href=”http://occupycorporatism.com/”><strong>Occupy Corporatism</strong></a>. Our alternative news site is dedicated to reporting the news as it actually happens; not as it is spun by the corporately funded mainstream media. You can find us on <strong><a href=”http://www.facebook.com/pages/Occupy-Corporatism/227213404014035/”>our Facebook page</a></strong>.</em>
Malware safeguard, also known as anti-virus software, is important for safeguarding yourself out of computer viruses that are sometimes designed to steal your money. Or spyware is usually short for “malicious software” – applications or courses that can invasion your computer immediately and often trigger significant decrease of data or maybe even computer harm. The...
A mobile application, also known as a cellular app or perhaps an app, is an application designed for make use of on a smart phone, mobile tablet, or wristwatch. These applications are often used by users to reach applications and content material on the internet. It has being able to connect to an online server...
Fireball slot machine game system matches free of charge on-line, absolutely free video slot machine piece of equipment adventures modest to begin with down payment needed. Poker table pastime and also the accommodations certainly not approved by means of the very first re-opening state; nevertheless, area betting possibilities, by using best community distancing, may turned...
Here you’ll find our rankings of the top US-friendly online casinos of 2020. With mobile real money casinos , you can use your device to access the same benefits and bonuses. Online casino sites tend to support a wide range of payment methods. Our reviewers examine ease-of-navigation and software speed in determining which sites offer...
As any savvy in-bound marketer knows, blogging is a very important tool for bringing the correct visitors to your website. If you were blogging for almost any amount of time, you could have started tinkering with the concept of guest blogging, too. Of course, if you’ve been wavering with this particular idea, we’re here to...