Jump to content
Not connected, Your IP: 18.117.105.215
bigbrosbitch

The Internet is Dead - CISA Bill passed in US

Recommended Posts

​As a much smarter commentator than me summarised what this means in a nutshell:

CISA passed the Senate today and will become final when reconciled with the House version and signed by the President. It's a done deal.

CISA allows internet companies to voluntarily and secretly divert business and user data to the federal government so it can be reviewed and analyzed for CRIMINAL activity or hacking.

 

Participating companies are exempt from FOIA and immune from lawsuits regarding the data they provide.

It is the law that makes domestic mass surveillance all legal. In my view Windows 10 is the flagship mass surveillance data source for government, but FB, Google et al with feed the government beast too. I would imagine the government in turn will pay millions if not billions of dollars in fees for easy access to data.

In short, anything you do on the internet may be used against you as evidence in a trial for a wide variety of crimes. There is no warrant, there is no notice, there is no due process. You agreed to give the government all your data by NOT opting out of the thousands of user internet company agreements.

​Just in case you don't believe me, lets look at the specific clauses again to make sure:

[CISA Text #2 section 106(a)]:

“SEC. 106. Protection from liability [For Big Companies].

“(a) Monitoring of information systems. —No cause of action shall lie or be maintained in any court against any private entity, and such action shall be promptly dismissed, for the monitoring of information systems and information under section 104(a) that is conducted in accordance with this title.
“(b ) Sharing or receipt of cyber threat indicators.—No cause of action shall lie or be maintained in any court against any entity, and such action shall be promptly dismissed, for the sharing or receipt of cyber threat indicators or defensive measures under section 104© if—
“(1) such sharing or receipt is conducted in accordance with this title; and
“(2) in a case in which a cyber threat indicator or defensive measure is shared with the Federal Government, the cyber threat indicator or defensive measure is shared in a manner that is consistent with section 105©(1)(b ) and the sharing or receipt, as the case may be, occurs after the earlier of—
“(A) the date on which the interim policies and procedures are submitted to Congress under section 105(a)(1) and guidelines are submitted to Congress under section 105(b )(1); or
“(B ) the date that is 60 days after the date of the enactment of this Act.”

See

https://www.congress.gov/bill/114th-congress/senate-bill/754/text#toc-idc6842ed051194cfda77e2d250867c1f7

​What's the solution?

​Answer: Major root and branch political reform along with a very firm oversight of the MIC and transparency in their activities.

​Something like this is ideal:


https://blog.cyberwar.nl/2015/07/report-ten-standards-for-oversight-and-transparency-of-national-intelligence-services-july-2015-eskens-van-daalen-van-eijk/

 

1: Intelligence services need to be subject to oversight that is complete.
2: Oversight should encompass all stages of the intelligence cycle.
3: Oversight of the intelligence services should be independent.
4: Oversight should take place prior to the imposition of a measure.
5: Oversight bodies should be able to declare a measure unlawful and provide for redress.
6: Oversight should incorporate the adversary principle.
7: Oversight bodies should have sufficient resources to perform effective oversight.
8: Intelligence services and their oversight bodies should provide layered transparency.
9: Oversight bodies, civil society and individuals should be able to receive and access information about surveillance.
10: Companies and other private legal entities should be able to publish aggregate information on surveillance orders they receive.

​Conclusion:

​The "tin-foil hatters" that have been screaming - FOSS! Linux! End-end encryption! No third party trust! TAILS! Tor! Qubes! Whonix! PGP! Don't trust the government! for years - have been proven exactly right. 

​If you are still willing to use US corporate platforms under this arrangement, then you need your head read.

​We'll await our apologies since we have been confined to the fringe for sometime now as 'conspiracy theorists' ...

Share this post


Link to post

can only do so much and not be a hermit with zero technology.

 

I run the whole house through VPN but not much else.  there's plenty of me out there in social media, etc.

Share this post


Link to post

Is there anything besides using a VPN not based in the USA that a US citizen can do to fight this bullshit?


Debugging is at least twice as hard as writing the program in the first place.

So if you write your code as clever as you can possibly make it, then by definition you are not smart enough to debug it.

Share this post


Link to post

'eff it. I signed up with AirVPN for a year. I am using it now. The USA is effectively a hostile zone as far as I am concerned.

 

Good job asshats of the USA, you pushed me and many others onto a VPN so you have more work to see what we are doing. So much in fact, that it is physically impossible to manage in the lifespan of the entire Universe for even a single user.

 

I had been wanting to try the Eddie client for a long time now. And now that I have I can instantly see it is massively better than any other option I have seen. Good job AirVPN for the client. It works without fail on Windows and Linux. And has portable versions too.

 

I respect the ethics of AirVPN. They do not participate in the backhanded nonsense bullshit of other so called VPNs. And right now with the Euro so close to the Dollar in value, I had to try it.

 

I will leave a much more verbose review ater I have a bit more experience with the service. So far the only obstacle is Google being jerks about Youtube content. No big deal.


Debugging is at least twice as hard as writing the program in the first place.

So if you write your code as clever as you can possibly make it, then by definition you are not smart enough to debug it.

Share this post


Link to post

I suspect the reason pasting does not work right is to mess with bots and autoposters. They can and absolutely will destroy the forums with innumerable ads for porn and viagra and all manner of filth that no-one wants to see here. So steps have been taken to make it very hard, if not physically impossible for them to work.

 

As for valuing my data, I certainly do. So much so that no price would buy my information. I once received an e-mail from a family member "inviting" me to join Facebook. This was odd since I rarely speak with the family member in question. So I joined to see what he wanted. I did not find anything and e-mailed him back. Later that very day I had a telephone call from my brother asking why "I had invited him to join Facebook". I told him I did not and never returned to that site again. They are a permanently blacklisted site for me.

 

And furthermore I changed my e-mail provider that same day and told everyone I know *NOT* to let Facebook know anything about me. I explained why, and I can only hope they respected my choice enough to honor it.

 

I do not use Google for anything at all. They are also on my permanent blacklist. As are a number of other sites and services that have made it abundantly clear that they do not respect my privacy.

 

Basically, if I must reveal "who" I am to a site or service in order to use it, then I plainly will never use them.


Debugging is at least twice as hard as writing the program in the first place.

So if you write your code as clever as you can possibly make it, then by definition you are not smart enough to debug it.

Share this post


Link to post

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
  • Security Check
    Play CAPTCHA Audio
    Refresh Image

×
×
  • Create New...