Homeland Security Today: Senate Intelligence Committee Approves Controversial Cybersecurity Bill —BE AFRAID DAMN IT!!

Be afraid, be very, very, very afraid for the last nails are being hammered into the coffin of every Americans privacy and 4th Amendment Rights. The powers arrayed against us all are legion. The power of the State to control anyone who resides within this nation, no matter how mighty politically, wealthy or socially connected as the digital transporting fibers of our demise carry the history of our lives and they are mightier than any chains could ever be in silencing, controlling and destroying all opposition. I am scared to death for America–there has never been, never, a more dangerous time for this nation and more so, much more so, for our God given freedoms.

2014.7.8.Edwards.Main (1)The Cyber Intelligence Sharing and Protection Act (CISPA) is the new law that will supersede the obsolete statutes and principles now in place.

CISPA: legislation that would allow the keepers of the country’s finances and infrastructure to share and protect the voluminous data they collect about their customers with America’s military intelligence agencies and the Department of Homeland Security. And vice versa.

  • The exchange could occur without warrants and beyond the reach of the Freedom of Information Act.
  • Ultimately, CISPA failed in the Senate that year, but in February 2013, Congressman Mike Rogers, Republican of Michigan, reintroduced it in the House of Representatives, just after the president signed his executive order on cyber-security.63 As the timing of CISPA’s re-introduction made clear, the executive order was regarded by the EWI and its friends as inadequate and flabby. In fact, they’re right; it is a lengthy list of bureaucratic provisions that inspires neither committed support nor opposition—the kind of thing that gives government a bad name for creating metric tons of paper work for little gain. In brief, the order calls for a cyber-security framework, together with recommendations, reports, consultations, and inconceivably complex policy coordination.
  • There is a determination—a tenacity and relentlessness—about the campaign for CISPA that seems unusual, even now. The forces lined up behind it are impressive: General Dynamics, Lockheed Martin, General Electric, Northrop Grumman, SAIC, Google, Yahoo, the US Chamber of Commerce, IBM, Boeing, the Business Roundtable, Time Warner Cable, American Petroleum Institute, among many others. Bank of America and Citigroup support CISPA behind the veil of the American Bankers Association and the Financial Services Roundtable. Google, Yahoo, and Microsoft also signed on through a proxy: an industry association called TechNet. It’s fairly safe to say that when you’re on the other side of the issue from this league, you’re at a distinct disadvantage.
  • We’re talking about the government legally reading your emails, Facebook messages, your Dropbox files, and pretty much anything else you had stored online, in the cloud.
  • From our perspective, the missing piece of effective cyber-security is robust, two-way information sharing, with appropriate legal and privacy protection, between business and government. The current information sharing environment is not supported by strong legal protections to safeguard companies that share and receive cyber-security information from civil or criminal action. Furthermore, there are not nearly enough security clearances. In many cases, only one or two employees are cleared even within very large global enterprises, which create difficulties in communicating problems and acting quickly across global operations.65 The fight for CISPA continued through 2013. In June,
  • The Snowden revelations are extremely inconvenient for the government-corporate surveillance complex because the hefty expenditures for the next round of cyber-battles depend on a persuasive and (at the very least) semi-hysterical cyber-terror narrative. Billions are at stake, and even if we already know the truth, the BTR and the NSA aren’t going down without a struggle.
  • Bill Binney keeps asking. And the discussion at the Bloomberg event this morning shows that these people want legal immunities. The executive order is not good enough. The just-published cyber-security framework coming out of the White House isn’t sufficient, either. There has to be legislation providing immunity.
  • The only way to convince Americans to go along with the CISPA initiative is to crank up the terror machine again.

—--The Rise of the American Corporate Security State: Six Reasons to Be Afraid (Beatrice Edwards) —AN ABSOLUTE MUST READ!! To not do so would be an acceptance of your willful ignorance.

CISPA morphed into CISA when it kept getting defeated in Congress, as it appeared then but perhaps no longer that there were still enough true civil libertarians left that could, without fear of the darkness in the night or the inadvertent slip of some past indiscretion from finding its way, miraculously, into the hands of an eager regime supportive press,  vote against the passage of this insidious law. But surprise, surprise it just keeps on surfacing and will not die as there is too much money and power behind its passage to let anything like democracy impede its passage. Perhaps, this time is the charmer, as it is supported not only by all of the covert minions slavishly working to destroy the last vestiges of Americans privacy and freedoms, but by practically every major corporation within the inner circle of the Fascist Empire that America has become.

The Cybersecurity Information Sharing Act (CISA), a bill ostensibly crafted to improve the nation’s cybersecurity, was quietly passed Tuesday by the Senate Select Committee on Intelligence by a 12-3 vote.

20140705_libertyThe legislation, authored by committee chairman, Sen. Dianne Feinstein (D-Calif.) and Vice Chairman Saxby Chambliss (R-Ga.), expands information shared about cybersecurity threats and defensive mechanisms between the government and companies and within the private sector in order to combat the rapid increase in attacks on computer systems that have resulted in the theft of millions of Americans’ personal information and hundreds of millions of dollars in losses for businesses large and small.

“Cyber attacks present the greatest threat to our national and economic security today, and the magnitude of the threat is growing,” Feinstein said. “Every week we hear about the theft of personal information from retailers and trade secrets from innovative businesses, as well as ongoing efforts by foreign nations to hack government networks. This bill is an important step toward curbing these dangerous cyber attacks.”

“To strengthen our networks,” Feinstein said, “the government and private sector need to share information about attacks they are facing and how best to defend against them. This bill provides for that sharing through a purely voluntary process and with significant measures to protect private information.”

“It is past time for Congress to address the global cyber threat facing our nation,” Chambliss said. “American businesses are attacked daily by criminals seeking trade secrets or customer’s credit card information, while the government defends our systems against cyber attacks from criminal organizations, nation-states and terrorists seeking to harm and kill Americans. In order to protect ourselves from these attacks, we must all work together.”

Chambliss added that, “The legislation passed out of committee is a strong, bipartisan bill that encourages the private sector and the government to share information voluntarily about these threats, without fear of frivolous lawsuits and without unnecessary bureaucratic obstacles. The cyber threats to our nation are all too real. The Senate should take up and pass this bill before the August recess.”

[gview file=”http://www.troutinmilk.com/wp-content/uploads/2014/07/hstoday.us-Senate_Intelligence_Committee_Approves_Controversial_Cybersecurity_Bill.pdf”]

via Homeland Security Today: Senate Intelligence Committee Approves Controversial Cybersecurity Bill.

Banks Dreading Computer Hacks Call for Cyber War Council – Bloomberg  Total Red Herring, the banks want to be protected from the complicitiy they have already undertaken to provide many different government agencies and departments all of the data, all of it pertaining to any and all Americans. 

Wall Street’s biggest trade group has proposed a government-industry cyber war council to stave off terrorist attacks that could trigger financial panic by temporarily wiping out account balances, according to an internal document.

The pro2014_621_nsa_stposal by the Securities Industry and Financial Markets Association, known as Sifma, calls for a committee of executives and deputy-level representatives from at least
eight U.S. agencies including the Treasury Department, the National Security Agency and the Department of Homeland Security, all led by a senior White House official.

The trade association also reveals in the document that Sifma has retained former NSA director Keith Alexander to “facilitate” the joint effort with the government. Alexander, in turn, has brought in Michael Chertoff, the former U.S. Secretary of Homeland Security, and his firm, Chertoff Group.

[gview file=”http://www.troutinmilk.com/wp-content/uploads/2014/07/Banks-Dreading-Computer-Hacks-Call-for-Cyber-War-Council-Bloomberg.pdf”]

viBanks Dreading Computer Hacks Call for Cyber War Council – Bloomberg.

Spying on Innocents – Judge Andrew Napolitano

In what appears to be one of Edward Snowden’s final revelations, the former CIA and NSA agent has demonstrated conclusively that the National Security Agency has collected and analyzed the contents of emails, text messages, and mobile and landline telephone calls from nine non-targeted U.S. residents for every one U.S. resident it has targeted.

This puts the lie to the government’s claims that it has only collected metadata — identifying markers such as phone numbers and email addresses — and not content from unsuspecting and unsuspected Americans. It puts the lie to the government’s claims that it has studiously avoided prying into the private lives of Americans, in whom it has no intelligence-related or lawful interest. And this puts the lie to the government’s contentions and the opinions of judges of the secret Foreign Intelligence Surveillance Court that the NSA’s spying is somehow lawful, constitutional and helpful.

[gview file=”http://www.troutinmilk.com/wp-content/uploads/2014/07/Spying-on-Innocents-Judge-Andrew-Napolit.pdf”]

via Spying on Innocents – Judge Andrew Napolitano – Townhall Finance Conservative Columnists and Financial Commentary – Page 1.

US military studied how to influence Twitter users in Darpa-funded research

• Defense Department spent millions to research social networksdarpa-globalbrain

• Studies focused on Occupy and Middle East protests

• Projects also analysed memes, celebrities and disinformation

The activities of users of Twitter and other social media services were recorded and analysed as part of a major project funded by the US military, in a program that covers ground similar to Facebook’s controversial experiment into how to control emotions by manipulating news feeds.

Research funded directly or indirectly by the US Department of Defense’s military research department, known as Darpa, has involved users of some of the internet’s largest destinations, including Facebook, Twitter, Pinterest and Kickstarter, for studies of social connections and how messages spread.

While some elements of the multi-million dollar project might raise a wry smile – research has included analysis of the tweets of celebrities such as Lady Gaga and Justin Bieber, in an attempt to understand influence on Twitter – others have resulted in the buildup of massive datasets of tweets and additional types social media posts.

[gview file=”http://www.troutinmilk.com/wp-content/uploads/2014/07/US_military_studied_how_to_influence_Twitter_users_in_Darpafunded_research.pdf”]

via US military studied how to influence Twitter users in Darpa-funded research | World news | theguardian.com.

World domination is not easy. Sometimes, even your closest allies and strongest supporters are not really backing you up. For example, SAIC, Booz Allen, and the others want contracts for defense work (cyber and otherwise) to support the American empire. At the same time, senior managers at the Pentagon, the NSA, and the CIA want them to have these contracts because SAIC, Booz Allen, and so forth offer lucrative pre- and post-retirement employment opportunities. Suppose, however, that the most efficient and effective work on cyber-defense can be done relatively inexpensively in-house. Then there’s a painful choice: a major contract for multiple billions and years to SAIC, with the vague promise of a huge cyber intelligence extravaganza of dubious legality ultimately in place. Or, a smaller-scale in-house operation that works better and costs much, much less?

The NSA has been going the first route rather than the second one for a while now. This is why intelligence has become staggeringly expensive. Like everything else produced by our economic system, SAIC concocts its surveillance programs in order to make money.

 [gview file=”http://www.troutinmilk.com/wp-content/uploads/2014/07/truth-out.org-We_Have_Met_the_Enemy_and_They_Are_Us-1.pdf”]

via We Have Met the Enemy and They Are Us.