Support the IEET




The IEET is a 501(c)3 non-profit, tax-exempt organization registered in the State of Connecticut in the United States. Please give as you are able, and help support our work for a brighter future.



Search the IEET
Subscribe and Contribute to:


Technoprogressive? BioConservative? Huh?
Quick overview of biopolitical points of view




whats new at ieet

On Steven Pinker’s “The Better Angels of our Nature”

Cyberwarfare ethics, or how Facebook could accidentally make its engineers into targets

The Next X Prize: Artificial Intelligence!

Sequencing the Ebola virus

The Near Future Of Implantable Technology

Future News From The Year 2137


ieet books

Superintelligence: Paths, Dangers, Strategies
Author
by Nick Bostrom


comments

Rick Searle on 'How our police became Storm-troopers' (Aug 31, 2014)

instamatic on 'How our police became Storm-troopers' (Aug 31, 2014)

Rick Searle on 'How our police became Storm-troopers' (Aug 31, 2014)

instamatic on 'How our police became Storm-troopers' (Aug 31, 2014)

Rick Searle on 'How our police became Storm-troopers' (Aug 31, 2014)

instamatic on 'How our police became Storm-troopers' (Aug 31, 2014)

Rick Searle on 'How our police became Storm-troopers' (Aug 31, 2014)







Subscribe to IEET News Lists

Daily News Feed

Longevity Dividend List

Catastrophic Risks List

Biopolitics of Popular Culture List

Technoprogressive List

Trans-Spirit List



JET

Transhumanism and Marxism: Philosophical Connections

Sex Work, Technological Unemployment and the Basic Income Guarantee

Technological Unemployment but Still a Lot of Work…

Hottest Articles of the Last Month


Enhancing Virtues: Self-Control and Mindfulness
Aug 19, 2014
(7875) Hits
(0) Comments

Is using nano silver to treat Ebola misguided?
Aug 16, 2014
(6670) Hits
(0) Comments

“Lucy”: A Movie Review
Aug 18, 2014
(5778) Hits
(0) Comments

High Tech Jainism
Aug 10, 2014
(5294) Hits
(5) Comments



IEET > Security > Cyber > Military > SciTech > Rights > FreeThought > Privacy > Life > Access > Vision > Contributors > Jonathan Lin

Print Email permalink (0) Comments (2641) Hits •  subscribe Share on facebook Stumble This submit to reddit submit to digg


CISPA Reborn


Jonathan Lin
Jonathan Lin
Ethical Technology

Posted: Apr 20, 2013

The US House of Representatives revitalized efforts to pass the Cyber Intelligence Sharing and Protection Act (CISPA), which never got the approval of the Senate last year. Yesterday the bill passed by a margin of 288 to 127 after two days of debate, which included the potential of malicious cyber attacks raining down on American power grids and disrupting livelihoods.

Representative Joe Heck (R-NV) warned that "our nation is under attack," while Representative Mike McCaul (R-TX) made the comparison to the recent Boston marathon bombing tragedy earlier on Monday: "In case of Boston they were real bombs: in this case they're digital bombs." Representative Candice Miller (R-MI) even evoked the threat of North Korean hackers to convince the House that the time to introduce the bill was now.

CISPA facilitates the sharing of information concerning online attacks by companies with one another, in addition to disclosing such data with government agencies in order to quickly locate and capture those responsible. The primary purpose of introducing the bill is to beef up defensive measures against the numerous cyber threats that have lately attracted more mainstream and governmental attention.

Earlier in January, after New York Times journalist David Barboza wrote a Pulizer Prize-winning article on previous Chinese Premier Wen Jiabao's personal assets and wealth, the PRC government banned him from the country. Soon after the publication of his story, Barboza's email account along with the personal computers of fifty three other NY Times employees were infiltrated by hackers. Two months later in March, Sino-American ties were once again strained, when the U.S. demanded Chinese authorities to take more decisive action in tracking down individual hackers who had compromised the privacy and security of major American corporations.

Though denying any relation with the cyber attackers, the PRC government is thought to harbor groups of "nationalist" hackers who target the networks of China's rivals.

To its supporters, CISPA would enable the U.S. government to gain more access to information concerning these attacks. Currently many corporations, such as Bank of America, that are the victims of cyber attacks do not publicly disclose the online break-ins for fear of upsetting clients and customers.

Thus CISPA allows information to be shared only with government authorities, effectively meandering around the challenge of providing information of these hackings without scaring users away from its services. But therein remains the question of privacy and the potential for unfettered sharing of user information to the government in the name of "cyber security."

Returning to the two days of Congressional debate that eventually passed CISPA, the evocation of North Korean attackers and the Boston marathon bombing illustrates a new sense of urgency that informs cyber lawmaking. Pointing to existing and potential vulnerabilities in the system prove to be less efficient than citing the real blood and tragedy of an event that dominated domestic and international headlines. Meanwhile North Korea and its provocative behavior―though a norm in the international system these days―carries the real possibility of deadly attack and confrontation. Nuclear weapons are a significant threat, but the world hasn't (thankfully) yet seen the successful use of nukes from the DPRK.

But a few weeks earlier, cyber attacks had already successfully struck and disrupted many South Korean banks and corporations, with analysts and government officials confident that the assault originated from the north. These attacks prove to the world North Korea's capacity to break and enter, cause damage, and do more than simply cause inconvenience. And if the DPRK has the capability, one can only imagine the significantly more advanced and potentially devastating pieces of the Chinese cyber arsenal.

CISPA will undoubtedly continue to stir up resistance amongst individuals and advocacy groups concerned with digital liberties and the protection of private information. The introduction of the bill prompted increased awareness of personal data as property of corporations, and the vulnerability of this information to both malicious online assault and governmental perusal.

The intentions of the bill are not inherently misplaced; if opening up pathways for information sharing will help bolster defense, it seems only reasonable to agree to these procedures. Yet as damage continues to be inflicted in both the cyber and offline domains, the stakes only get higher, and the urgency to pass more stringent laws and restrictions in response will continue to grow.


Jonathan Lin is a Bookworm, Music Junkie, Cineaste, Tech Enthusiast, Gadget Guru, Blogger, Musician, Jogger, Dreamer, and in the Carleton College class of '13.
Print Email permalink (0) Comments (2642) Hits •  subscribe Share on facebook Stumble This submit to reddit submit to digg


COMMENTS


YOUR COMMENT (IEET's comment policy)

Login or Register to post a comment.

Next entry: Abundance is our future

Previous entry: Welcome to the 2030s (Future Timeline Events 2030-2039)

HOME | ABOUT | FELLOWS | STAFF | EVENTS | SUPPORT  | CONTACT US
SECURING THE FUTURE | LONGER HEALTHIER LIFE | RIGHTS OF THE PERSON | ENVISIONING THE FUTURE
CYBORG BUDDHA PROJECT | AFRICAN FUTURES PROJECT | JOURNAL OF EVOLUTION AND TECHNOLOGY

RSSIEET Blog | email list | newsletter |
The IEET is a 501(c)3 non-profit, tax-exempt organization registered in the State of Connecticut in the United States.

Contact: Executive Director, Dr. James J. Hughes,
Williams 119, Trinity College, 300 Summit St., Hartford CT 06106 USA 
Email: director @ ieet.org     phone: 860-297-2376