The Cyber Intelligence Sharing and Protection Act, or CISPA, is headed to a full vote in the House of Representatives Wednesday or Thursday of this week.
CISPA passed the House Intelligence Committee last week following a closed-door debate, during which committee members approved four amendments. One particularly significant change was made which disallows the government from using information collected under CISPA for national security purposes — language opponents argued was overly vague and easily manipulatable.
However, most of the amendments which would have made a significant impact on CISPA’s privacy implications were voted down. Despite the insistence of CISPA authors Rep. Mike Rogers (R-Mich.) and Rep. Dutch Ruppersberger (D-Md.), pictured above, that "multiple amendments were made based on input from privacy and civil liberties groups," many of those groups are still opposing the bill.
"The changes to the bill don’t address the major privacy problems we have been raising about CISPA for almost a year and a half," said Michelle Richardson, legislative counsel at the ACLU’s Washington Legislative Office, in a statement. The Center for Democracy and Technology’s Greg Nojeim warns "CISPA could shift control of the federal government’s cybersecurity program for the private sector to a secretive military intelligence agency."
Apparently not content to let CISPA opponents dominate the online conversation around the technology policy bill, the House Intelligence Committee published a five-page CISPA Q&A which Ruppersberger referred to on Twitter as a "mythbuster." The document hits back against privacy advocates’ most common criticisms of CISPA, claiming the bill "has nothing to do with government surveillance" and that CISPA contains "rigorous" privacy oversight.
"During our markup, we added an amendment that expanded our privacy protections and oversight requirements by adding an extra layer of review by the Privacy and Civil Liberties Oversight Board and requiring senior privacy officials from the government agencies to complete annual reviews evaluating the cyber threat information sharing regime’s effect on privacy," reads the document.
Document Confirms British were Plotting to Invade Germay Before Germany Invaded Poland 2014 09 02 The declaration of war against Germany had nothing to do with Poland, and was in fact a brutal war of aggression launched for economic reasons against the peaceful German people. As you can see in Judea Declares War on Germany.
An early version of the ‘King’s Speech’ reveals Britain was preparing to declare war on Germany before Hitler invaded ...
Study Claims Cave Art Made by Neanderthals 2014 09 02 A series of lines scratched into rock in a cave near the southwestern tip of Europe could be proof that Neanderthals were more intelligent and creative than previously thought.
The cross-hatched engravings inside Gorham’s Cave in Gibraltar are the first known examples of Neanderthal rock art, according to a team of scientists who studied the site. The find is significant because ...
Nigeria launches new biometric ID card - brought to you by Mastercard 2014 09 02
Yesterday afternoon, president Goodluck Jonathan became the first recipient of Nigeria’s new national eID card, in a ceremony at the presidential villa in the capital Abuja. The cards will be issued to 13 million Nigerians as part of a pilot project, with the ultimate aim of producing a national identity management system (NIMS).
Nigeria’s NIMS is an ambitious attempt to consolidate ...
LA Times Now Describing Illegal Aliens As ’Informal Workers’ Who ’Labor Unofficially’ 2014 09 02 Via Weasel Zippers, we learned the Los Angeles Times has a new term for illegal aliens in the work force: they’re “informal workers,” and that doesn’t mean they don’t arrive on the job in a tuxedo.
Times reporter Tiffany Hsu (a "UC Berkeley grad") began her Saturday story with the new I-word (and illegal immigrants also “labored unofficially” in "gray employment"):