Commentary by Jennifer GranickThere's a new bill working its way through Congress that is cause for some alarm: the Cybersecurity Act of 2009, introduced by Senators Jay Rockefeller (D-WV) and Olympia Snowe (R-ME). The bill as it exists now risks giving the federal government unprecedented power over the Internet without necessarily improving security in the ways that matter most. It should be opposed or radically amended.Essentially, the Act would federalize critical infrastructure security. Since many of our critical infrastructure systems (banks, telecommunications, energy) are in the hands of the private sector, the bill would create a major shift of power away from users and companies to the federal government. This is a potentially dangerous approach that favors the dramatic over the sober response.One proposed provision gives the President unfettered authority to shut down Internet traffic in an emergency and disconnect critical infrastructure systems on national security grounds goes too far. Certainly there are times when a network owner must block harmful traffic, but the bill gives no guidance on when or how the President could responsibly pull the kill switch on privately-owned and operated networks.Furthermore, the bill contains a particularly dangerous provision that could cripple privacy and security in one fell swoop:The Secretary of Commerce— shall have access to all relevant data concerning (critical infrastructure) networks without regard to any provision of law, regulation, rule, or policy restricting such access…In other words, the bill would give the Commerce Department absolute, non-emergency access to “all relevant data” without any privacy safeguards like standards or judicial review. The broad scope of this provision could eviscerate statutory protections for private information, such as the Electronic Communications Privacy Act, the Privacy Protection Act, or financial privacy regulations. Even worse, it isn’t clear whether this provision would require systems to be designed to enable access, essentially a back door for the Secretary of Commerce that would also establish a primrose path for any bad guy to merrily skip down as well. If the drafters meant to create a clearinghouse for system vulnerability information along the lines of a US/CERT mailing list, that could be useful, but that’s not what the bill’s current language does.A privacy threat still in the cocoon is the provision mandating a study of the feasibility of an identity management and authentication program with just a nod to “appropriate civil liberties and privacy protections.” There’s reason to fear that this type of study is just a precursor to proposals to limit online anonymity. But anonymity isn’t inherently a security problem. What’s “secure” depends on the goals of the system. Do you need authentication, accountability, confidentiality, data integrity? Each goal suggests a different security architecture, some totally compatible with anonymity, privacy and civil liberties. In other words, no one “identity management and authentication program” is appropriate for all internet uses.Whether the bill is amended or rejected, the question remains what kind of actions would help cybersecurity, and what role the federal government has to play. As security expert Bruce Schneier has pointed out, the true causes of government cyber-insecurity are rather mundane:GAO reports indicate that government problems include insufficient access controls, a lack of encryption where necessary, poor network management, failure to install patches, inadequate audit procedures, and incomplete or ineffective information security programs.The Cybersecurity Act is an example of the kind of dramatic proposal that doesn't address the real problems of security, and can actually make matters worse by weakening existing privacy safeguards – as opposed to simpler, practical measures that create real security by encouraging better computer hygiene. We’ll be watching this bill carefully to ensure that it doesn’t pass in its present form.Sourcehttp://www.eff.org/deeplinks/2009/04/cybersecurity-actCybersecurity Act of 2009http://www.govtrack.us/congress/bill.xpd?bill=s111-773PDF summaryhttp://commerce.senate.gov/public/_files/Cyberbillsummaryonepagerplusthreepagesummarypressrelease1Apr090.pdf

You need to be a member of Ashtar Command - Spiritual Community to add comments!

Join Ashtar Command - Spiritual Community

Email me when people reply –

Replies

    • How is posting this giving energy to negativity? This is meant to inform that there’s a sinister move to regulate the web. If people knew this, they would counter this with positive energy without fear. Perhaps it is the way you received this post that you need to reassess and rediscover. I wouldn’t know because everyone has his or her own way of self-realization. What I do know is do not fear and don’t remain in the dark about certain things that are happening. Be positive no matter what comes your way. Peace
This reply was deleted.

Topics by Tags

Monthly Archives

Latest Activity

Drekx Omega left a comment on Comment Wall
"It's their coverup that always exposes evil doers, in the END.....The whole nation sees a corrupt and self-serving establishment in Britain, now....Only moral opposition politicians, campaigners, brave victims and Baroness Louise Casey, will have…"
57 minutes ago
rev.joshua skirvin posted a blog post
 Soul mission retrieval, or expansion.Polarity integration starts – moving into a neutral space of unconditional love and compassion for All.Polarity integration is a lifetime inner work, for we are always going to be humans in this realm and have…
4 hours ago
rev.joshua skirvin posted a blog post
 Greetings in the Light and Love of our Infinite Creator.We enjoy the moments we share with all of you. Thank you for this TransmissionThere are many individuals who are beginning to awaken in these transformative moments. They are no longer…
4 hours ago
Love & Joy posted a discussion
...A Vision Of New Earth By Steve Nobel  Yes, we must be conscious about where we place our attention and focus. It is important that we do not allow the media to determine the quality of our thoughts or our choices.  There is much fear and…
5 hours ago
Drekx Omega left a comment on Comment Wall
"Most Iranians despise the theocracy and want a return to the monarchy...There is a son of the former Shah in exile and he is Reza Pahlavi.....And is very popular with the people in Iran and those many fellow exiles...…"
6 hours ago
AlternateEarth left a comment on Comment Wall
"That AI is reminding me of HAL-2001 Space Odyssey"
10 hours ago
AlternateEarth left a comment on Comment Wall
"Supposedly Isreal needs bunker buster bombs that the US military has, which would bring the US into the war which Trump has said he wouldn't do.
Let's say Mohummad's bloodline mullahs surrender (so they say), what or who will fill the…"
15 hours ago
Drekx Omega left a comment on Comment Wall
"Yes, very close, but their uranium enrichment program has just lost several key scientists....And their missiles are being destroyed, as well as leading generals...
Which renders Ali Khamenei in the role of a tart who is all dressed up, but nowhere…"
16 hours ago
More…

 

   

                                                                                           Chapter XXXII

                                                                                   THE DIVINE TRINITY

The…

Read more…
Views: 11
Comments: 0