Commentary by Jennifer GranickThere's a new bill working its way through Congress that is cause for some alarm: the Cybersecurity Act of 2009, introduced by Senators Jay Rockefeller (D-WV) and Olympia Snowe (R-ME). The bill as it exists now risks giving the federal government unprecedented power over the Internet without necessarily improving security in the ways that matter most. It should be opposed or radically amended.Essentially, the Act would federalize critical infrastructure security. Since many of our critical infrastructure systems (banks, telecommunications, energy) are in the hands of the private sector, the bill would create a major shift of power away from users and companies to the federal government. This is a potentially dangerous approach that favors the dramatic over the sober response.One proposed provision gives the President unfettered authority to shut down Internet traffic in an emergency and disconnect critical infrastructure systems on national security grounds goes too far. Certainly there are times when a network owner must block harmful traffic, but the bill gives no guidance on when or how the President could responsibly pull the kill switch on privately-owned and operated networks.Furthermore, the bill contains a particularly dangerous provision that could cripple privacy and security in one fell swoop:The Secretary of Commerce— shall have access to all relevant data concerning (critical infrastructure) networks without regard to any provision of law, regulation, rule, or policy restricting such access…In other words, the bill would give the Commerce Department absolute, non-emergency access to “all relevant data” without any privacy safeguards like standards or judicial review. The broad scope of this provision could eviscerate statutory protections for private information, such as the Electronic Communications Privacy Act, the Privacy Protection Act, or financial privacy regulations. Even worse, it isn’t clear whether this provision would require systems to be designed to enable access, essentially a back door for the Secretary of Commerce that would also establish a primrose path for any bad guy to merrily skip down as well. If the drafters meant to create a clearinghouse for system vulnerability information along the lines of a US/CERT mailing list, that could be useful, but that’s not what the bill’s current language does.A privacy threat still in the cocoon is the provision mandating a study of the feasibility of an identity management and authentication program with just a nod to “appropriate civil liberties and privacy protections.” There’s reason to fear that this type of study is just a precursor to proposals to limit online anonymity. But anonymity isn’t inherently a security problem. What’s “secure” depends on the goals of the system. Do you need authentication, accountability, confidentiality, data integrity? Each goal suggests a different security architecture, some totally compatible with anonymity, privacy and civil liberties. In other words, no one “identity management and authentication program” is appropriate for all internet uses.Whether the bill is amended or rejected, the question remains what kind of actions would help cybersecurity, and what role the federal government has to play. As security expert Bruce Schneier has pointed out, the true causes of government cyber-insecurity are rather mundane:GAO reports indicate that government problems include insufficient access controls, a lack of encryption where necessary, poor network management, failure to install patches, inadequate audit procedures, and incomplete or ineffective information security programs.The Cybersecurity Act is an example of the kind of dramatic proposal that doesn't address the real problems of security, and can actually make matters worse by weakening existing privacy safeguards – as opposed to simpler, practical measures that create real security by encouraging better computer hygiene. We’ll be watching this bill carefully to ensure that it doesn’t pass in its present form.Sourcehttp://www.eff.org/deeplinks/2009/04/cybersecurity-actCybersecurity Act of 2009http://www.govtrack.us/congress/bill.xpd?bill=s111-773PDF summaryhttp://commerce.senate.gov/public/_files/Cyberbillsummaryonepagerplusthreepagesummarypressrelease1Apr090.pdf

You need to be a member of Ashtar Command - Spiritual Community to add comments!

Join Ashtar Command - Spiritual Community

Email me when people reply –

Replies

    • How is posting this giving energy to negativity? This is meant to inform that there’s a sinister move to regulate the web. If people knew this, they would counter this with positive energy without fear. Perhaps it is the way you received this post that you need to reassess and rediscover. I wouldn’t know because everyone has his or her own way of self-realization. What I do know is do not fear and don’t remain in the dark about certain things that are happening. Be positive no matter what comes your way. Peace
This reply was deleted.

Topics by Tags

Monthly Archives

Latest Activity

AlternateEarth left a comment on Comment Wall
"Quantum teleportation is a fascinating process that allows the transfer of quantum information from one location to another—without physically moving the object itself.
Anybody want to elaborate on this, besides the co-pilot."
2 hours ago
AlternateEarth left a comment on Comment Wall
"Quantum entanglement is the key to making a quantum internet possible. Unlike classical communication, which relies on transmitting bits (0s and 1s), quantum networks use qubits that can exist in multiple states simultaneously. Entanglement allows…"
2 hours ago
AlternateEarth left a comment on Comment Wall
"I though commercial application of quantum computing was years away;
The quantum internet network has been successfully demonstrated across three cities, marking a major step toward ultra-secure communication. Researchers created quantum-entangled…"
2 hours ago
Drekx Omega left a comment on Comment Wall
"Ever since 1689, the monarch simply rubber stamps legislation....We fought a civil war to strip political power away from kings and queens...1640-45....The English Commonwealth set up by Oliver Cromwell...and in 1689/90, the constitutional monarchy…"
8 hours ago
AlternateEarth left a comment on Comment Wall
"Exclusive: Evidence Mounts that the Reported Minnesota Assassin Vance Luther Boelter is a Patsy Who is Being Framed to Cover Up a Larger False Flag Deep State Operation
https://www.infowars.com/posts/exclusive-evidence-mounts-that-the-r..."
8 hours ago
AlternateEarth left a comment on Comment Wall
"A constitutional monarchy as is Britian where King Charles reviews recent legislation from the parliament to make sure it abides by the constitution-does King Charles actually do the reviewing or his office does and he approves or discards, or sends…"
8 hours ago
Drekx Omega left a comment on Comment Wall
"I bless Israel, jewish and Israeli arabs, as that nation stands up to barbarianism, on our behalf..Now we need to support their efforts, militarily....Not to provoke WW3, but to prevent it, by nipping this Iranian nuclear fiasco, in the bud...🇬🇧🇺🇸🇮🇱…"
8 hours ago
Drekx Omega left a comment on Comment Wall
"It's their coverup that always exposes evil doers, in the END.....The whole nation sees a corrupt and self-serving establishment in Britain, now....Only moral opposition politicians, campaigners, brave victims and Baroness Louise Casey, will have…"
9 hours ago
More…

 

   

                                                                                           Chapter XXXII

                                                                                   THE DIVINE TRINITY

The…

Read more…
Views: 11
Comments: 0