Most Popular
1. It’s a New Macro, the Gold Market Knows It, But Dead Men Walking Do Not (yet)- Gary_Tanashian
2.Stock Market Presidential Election Cycle Seasonal Trend Analysis - Nadeem_Walayat
3. Bitcoin S&P Pattern - Nadeem_Walayat
4.Nvidia Blow Off Top - Flying High like the Phoenix too Close to the Sun - Nadeem_Walayat
4.U.S. financial market’s “Weimar phase” impact to your fiat and digital assets - Raymond_Matison
5. How to Profit from the Global Warming ClImate Change Mega Death Trend - Part1 - Nadeem_Walayat
7.Bitcoin Gravy Train Trend Forecast 2024 - - Nadeem_Walayat
8.The Bond Trade and Interest Rates - Nadeem_Walayat
9.It’s Easy to Scream Stocks Bubble! - Stephen_McBride
10.Fed’s Next Intertest Rate Move might not align with popular consensus - Richard_Mills
Last 7 days
How to Capitalise on the Robots - 20th June 24
Bitcoin, Gold, and Copper Paint a Coherent Picture - 20th June 24
Why a Dow Stock Market Peak Will Boost Silver - 20th June 24
QI Group: Leading With Integrity and Impactful Initiatives - 20th June 24
Tesla Robo Taxis are Coming THIS YEAR! - 16th June 24
Will NVDA Crash the Market? - 16th June 24
Inflation Is Dead! Or Is It? - 16th June 24
Investors Are Forever Blowing Bubbles - 16th June 24
Stock Market Investor Sentiment - 8th June 24
S&P 494 Stocks Then & Now - 8th June 24
As Stocks Bears Begin To Hibernate, It's Now Time To Worry About A Bear Market - 8th June 24
Gold, Silver and Crypto | How Charts Look Before US Dollar Meltdown - 8th June 24
Gold & Silver Get Slammed on Positive Economic Reports - 8th June 24
Gold Summer Doldrums - 8th June 24
S&P USD Correction - 7th June 24
Israel's Smoke and Mirrors Fake War on Gaza - 7th June 24
US Banking Crisis 2024 That No One Is Paying Attention To - 7th June 24
The Fed Leads and the Market Follows? It's a Big Fat MYTH - 7th June 24
How Much Gold Is There In the World? - 7th June 24
Is There a Financial Crisis Bubbling Under the Surface? - 7th June 24
Bitcoin Trend Forecast, Crypto's Exit Strategy - 31st May 24
Zimbabwe Officials Already Looking to Inflate New Gold-Backed Currency - 31st May 24
India Silver Imports Have Already Topped 2023 Total - 31st May 24
Gold Has Done Its Job – Isn’t That Enough? - 31st May 24
Gold Stocks Catching Up - 31st May 24
Time to take the RED Pill - 28th May 24
US Economy Slowing Slipping into Recession, But Not There Yet - 28th May 24
Gold vs. Silver – Very Important Medium-term Signal - 28th May 24
Is Gold Price Heading to $2,275 - 2,280? - 28th May 24
Stocks Bull Market Smoking Gun - 25th May 24
Congress Moves against Totalitarian Central Bank Digital Currency Schemes - 25th May 24
Government Tinkering With Prices Is Like Hiding All of the Street Signs - 25th May 24
Gold Mid Tier Mining Stocks Fundamentals - 25th May 24
Why US Interest Rates are a Nothing Burger - 24th May 24
Big Banks Are Pressuring The Fed To Losen Protection For Depositors - 24th May 24
Another Bank Failure: How to Tell if Your Bank is At Risk - 24th May 24
AI Stocks Portfolio and Tesla - 23rd May 24
All That Glitters Isn't Gold: Silver Has Outperformed Gold During This Gold Bull Run - 23rd May 24
Gold and Silver Expose Stock Market’s Phony Gains - 23rd May 24
S&P 500 Cyclical Relative Performance: Stocks Nearing Fully Valued - 23rd May 24
Nvidia NVDA Stock Earnings Rumble After Hours - 22nd May 24
Stock Market Trend Forecasts for 2024 and 2025 - 21st May 24
Silver Price Forecast: Trumpeting the Jubilee | Sovereign Debt Defaults - 21st May 24
Bitcoin Bull Market Bubble MANIA Rug Pulls 2024! - 19th May 24
Important Economic And Geopolitical Questions And Their Answers! - 19th May 24
Pakistan UN Ambassador Grows Some Balls Accuses Israel of Being Like Nazi Germany - 19th May 24
Could We See $27,000 Gold? - 19th May 24
Gold Mining Stocks Fundamentals - 19th May 24
The Gold and Silver Ship Will Set Sail! - 19th May 24

Market Oracle FREE Newsletter

How to Protect your Wealth by Investing in AI Tech Stocks

CISA Systemic Domestic Spying, U.S. Police State is Here

Politics / Intelligence Agencies Nov 03, 2015 - 12:27 PM GMT

By: BATR

Politics

Technology in cyber space is designed to be the instrument of a totality surveillance society. Secretive methods, back doors, observation and collection of data have been in place for decades. CISA is the latest legislation authorization agreement that provides liability exemption for law enforcement and spooks to conduct their systematic assimilation with the codes and functions of technological development for the intended purpose of efficient monitoring of electronic communication.  


Coercion for compliance from any resisting tech giant will provide the government with the brute force to muscle their way past any remnants of Fourth Amendment Bill of Right protections.

The fact that there is so much enthusiasm in Congress to further gut civil liberties comes as no surprise but is frightening that the push back is so weak.

Senate overwhelmingly passes historic cybersecurity bill is reported by CNN accordingly, “It took several tries, but on Tuesday the U.S. Senate approved a measure to help American companies work more closely with law enforcement to fight off hackers. The Cybersecurity Information Sharing Act (CISA) overwhelmingly passed with a vote of 74 to 21.”

The S.754 - Cybersecurity Information Sharing Act of 2015 summary is provided online.

(Sec. 3) Requires the Director of National Intelligence (DNI), the Department of Homeland Security (DHS), the Department of Defense (DOD), and the Department of Justice (DOJ) to develop and promulgate procedures to promote: (1) the timely sharing of classified and declassified cyber threat indicators in possession of the federal government with private entities, non-federal government agencies, or state, tribal, or local governments; (2) the sharing of unclassified indicators with the public; and (3) the sharing of cybersecurity threats with entities to prevent or mitigate adverse effects.

As with so much of the language used by government to sanitize the real functions of providing legal cover for unlawful practices by passing additional unconstitutional laws, CISA is a true Trojan horse. Regretfully, your virus protection will not protect your computer content or privacy.

This is how the mainstream media is framing the “so called” intent and purpose of the legislation. U.S. Senate approves measure to help companies work with law enforcement to fight hackers.

“The bill calls for "real-time" sharing. Companies in a hurry might not wipe the data enough before law enforcement gets it, expanding how much they know about Americans.

Those jumbles of code known as "cyber threat indicators" could still be revealing about Americans' daily lives.

DHS isn't allowed to wipe personal data if another agency, like NSA, objects.

And even though law enforcement is only allowed to collect "cyber threat indicators," cops can use them to investigate "an imminent threat of death," bodily harm, economic harm and "terrorist" acts.

"It creates the wrong impression about what this bill does," said Jeff Greene, a top policy attorney at Symantec who wants that language cut out of the bill.

Perhaps most importantly, companies that share too much -- and accidentally harm their customers -- are protected from lawsuits. A key provision in CISA is the complete elimination of liability for companies that share data. Last week, U.S. Senator Rand Paul warned, "It makes your privacy agreement not worth the paper it's written on."

The Presidential campaign for Rand Paul falters not because he is wrong about defending personal liberty, but because so many Americans are oblivious or reconciled to the treason of the District of Criminal political class. Disconnect is obvious and grows worse with each passing year and little ever improves. Actually, it is hard to remember when the last time a true victory came out of the Federal government.

CISA is a prime example of public apathy in an environment of voluntary Facebook disclosure using the countenance of “PC” algorithm censorship.

Objection to additional violations of privacy measures that confuse the masses, while empowering the authoritarians further is expressed in the reasoned position by the Electronic Frontier Foundation. Their assessment is spot on in, EFF Disappointed as CISA Passes Senate.

“The conference committee between the House of Representatives and the Senate will determine the bill's final language. But no amount of changes in conference could fix the fact that CISA doesn't address the real cybersecurity problems that caused computer data breaches like Target and the U.S. Office of Personnel Management (OPM).

The passage of CISA reflects the misunderstanding many lawmakers have about technology and security. Computer security engineers were against it.  Academics were against it. Technology companies, including some of Silicon Valley’s biggest like Twitter and Salesforce, were against it. Civil society organizations were against it. And constituents sent over 1 million faxes opposing CISA to Senators.”

If so many tech companies and factions express their opposition to this draconian legislation and can be ignored so easily, how can average Americans protect their most personal information? Well, the most basic common sense safeguard is to be extremely guarded with any aspect of your life that is freely placed online.

In an age of computerization germinating into an artificial intelligence matrix of human replacement, the cause of maintaining the essence of individual identity may well require carving out a wilderness reclusive retreat. However, how many people will drive their range rover with GPS tracker and an iPhone to their secret hideaway?  

Most people are acclimated to the socialization of popular culture. Addicted to smart phone trivia is a prime exemplar of technology gone awry. Nevertheless, the notion that devices are neutral and are not often designed to embody intrinsic dehumanization is a foreign concept to the trendy crowd.

However, that is exactly where high-tech corporatists are herding the sheeple into the pit of self-induced conformity and submission. Here is where the security hysteria of government imposition tyranny becomes routine in a society that has lost all self-respect.

When Edward Snowden warns that “The NSA has built an infrastructure that allows it to intercept almost everything”, CISA encodes an unconstitutional legality for a domestic spying integration with tech companies and ISP providers that expedites the collection and storage of electronic digital data on ANYONE.

This is the operational purpose of despotic agencies that once were charged with legitimate foreign intelligence gathering that has redirected their capabilities on their new enemy “Patriots”, now called domestic terrorists. The hidden translation in their ciphers is that citizen dissenters are the targets of their echelon antennas and dishes.

The use of StingRay, an IMSI-catcher (International Mobile Subscriber Identity), is a controversial cellular phone surveillance device that fits nicely under the CISA umbrella. Now that it is disclosed, IRS possessed Stingray cellphone surveillance gear, documents reveal; isn’t it convenient that CISA will indeed facilitate sharing for the benefit of added government control. No doubt DHS can be trusted? RIGHT . . . just like the IRS did not target conservative groups.

People need to get serious about the number one threat from the terror coming out of their own government. Congressional arrogance and Senate hubris in passing CISA has become the new normal. Close behind are the likes of Facebook, who may be the secret force behind the surveillance bill “CISA”. 

  • All privacy policies effectively null and void. Companies can share any private user data with the government, without a warrant, as long as the government says it is being used for a “cybersecurity” purpose.
  • In exchange, companies are given blanket immunity from civil and criminal laws, like fraud, money laundering, or illegal wiretapping (if a violation was committed or exposed in the process of sharing data).
  • Data is shared with a wide array of government agencies, from the FBI and NSA, to the IRS and local law enforcement. Many of these agencies have been breached within the last year and have outdated security systems, opening up the doors to even more cyber attacks.
  • Companies that play along can get otherwise classified intelligence data from the government, including private information about their competitors. 

This is the future of the total surveillance state. Those corporatist companies that actively seek to extract the substance of personal identity for use as a marketing asset need to be exposed and punished for their betrayal of trust. When Mark Zuckerberg once called Facebook users “dumb f*cks” for trusting him with their data, he exposed himself for the scumbag that he is.

Technology of personal privacy destruction is a curse. Marry that engineering with the insatiable appetite of the NSA Spying on Americans, and you have a formula for a system of individual identity obliteration.

Establishing and instituting legitimate cybersecurity is a function of inventing and fostering the actual solutions to protect the nation, its businesses and the public. Rewarding a corporate accord for disclosing real time information to the DHS with blanket liability immunity is one additional step towards a complete Fascist union.

Even if the Fourth Amendment is not a top priority for government worshipers, the dehumanization of one’s own dignity should give pause for anyone who still has the ability to look in the mirror. CISA only protects the power establishment as it exposes and exploits your inner most secrets.

Source: http://batr.org/autonomy/110315.html

Discuss or comment about this essay on the BATR Forum

http://www.batr.org

"Many seek to become a Syndicated Columnist, while the few strive to be a Vindicated Publisher"

© 2015 Copyright BATR - All Rights Reserved

Disclaimer: The above is a matter of opinion provided for general information purposes only and is not intended as investment advice. Information and analysis above are derived from sources and utilising methods believed to be reliable, but we cannot accept responsibility for any losses you may incur as a result of this analysis. Individuals should consult with their personal financial advisors

BATR Archive

© 2005-2022 http://www.MarketOracle.co.uk - The Market Oracle is a FREE Daily Financial Markets Analysis & Forecasting online publication.


Post Comment

Only logged in users are allowed to post comments. Register/ Log in