146 votes

Alert! Join A Week of Action to Oppose Cybersecurity Legislation. Sign-up & Stop CISPA!

Member of The Internet Defense League

CISPA is one of the greatest threats to Internet users since SOPA.

"Now we need your help again. Can you send a message to your Representatives asking them to oppose this bill?" (from eff.org)

Send a message (here) to your representatives asking them to oppose this dangerous bill.
It takes about 30 seconds to complete.

If you run a web site, cut-and-paste a banner or popup from here.

"Reddit, Craigslist and 30,000 Other Websites Oppose CISPA" (article at Mashable.com)

"Make sure the internet never loses. Ever." Find out about and/or join the Internet Defense League.

[editors note: If there are other good (non-exhaustive) links, let me know so I can update this post. Thanks.]

Trending on the Web

Comment viewing options

Select your preferred way to display the comments and click "Save settings" to activate your changes.

Response From Forbes (VA)

From thousands of miles away, increasingly sophisticated foreign adversaries are electronically infiltrating sensitive U.S. computer networks to obtain military technologies. Foreign competitors and criminals unabashedly steal trade secrets from American companies through similar methods. Critical systems that run our financial, energy, and transportation infrastructures have also become victims of cyber attack and exploitation. Every day U.S. businesses are targeted by nation-state actors like China and Russia for cyber exploitation and theft, resulting in huge losses of valuable propriety information and sensitive information. When hackers steal this information, they take new, high-paying jobs right along with it.

H.R 624, the Cyber Intelligence Sharing and Protection Act of 2013, was introduced by Rep. Mike Rogers (R-MI) on February 13, 2013. This legislation would amend the National Security Act of 1947 to create a completely voluntary program in which private sector entities can share information regarding cyber crimes with the federal government. This program could help the U.S. Intelligence Community to collect intelligence about efforts to degrade, destroy, or disrupt system networks in the United States.

This bill does not allow the federal government to task private companies to do anything. The federal government will not have any authority to request or solicit information from a company. Additionally, the information that a company is permitted to share with the government is very narrowly limited to cyberthreat information. What cyberthreat information is exchanged comes with strict limitations on use, prohibiting the federal government from using the intelligence for any purpose other than for cyber-security, national security, to prevent death or serious bodily harm, or to protect minors from sexual exploitation, kidnapping, and trafficking. I believe that transparency is vital to ensuring that our government does not overstep its authority.

Most recently this bill was referred to the House Committee on Intelligence. Advances in technology have made it is easier for law enforcement to track down criminals for banks to prevent fraud, and for consumers to learn about new products and services. At the same time, as personal information becomes more accessible, private business, government agencies, and consumers must take precautions to protect against the misuse of our personal information. It is important that Congress continues to monitor this important issue as technology continues to change and new threats are introduced.

Garan's picture

A Privatized Solution is Equally Viable, without Creeping Laws

There is no need for the government to provide this function.
This is an idea that could easily exist in the private sector.

In the face of what seems to be inevitable governmental expansions on it's programs, it's best to keep government out of this topic all-together.

The source of the problem is that government agencies and private companies are creating systems that are vulnerable.
Sensitive data should simply not be connected in any way to externally exposed networks.

Another danger is that of the general public getting used to the government routinely passing legislation associated with the internet, when it appears that legislators are not good at understanding the nature and technical details of the internet. They are not fit for making these type of decisions. So, even (initially) periphery internet legislation should be avoided.

Where is this bill right now?

Where is this bill right now? What's up with it??


It's HR624

https://www.popvox.com/bills/us/113/hr624 <<< sign petition to kill Bill and email ISP telling them that you'll close your account if they support this Bill--

I say: if you can't make it better, don't make it worst!

And why was i just taxed

And why was i just taxed online for a book i ordered ??


Politicalless Mesh Networks

Politicalless Mesh Networks that James Corbett talks about. Very interesting. I think I just invented a new meme, (PMN).

If Aaron Russo was alive

If Aaron Russo was alive today, he would make a movie called, "American Government Hackers". If you want to make a movie about this, you are perfectly welcome to use this title.

i am thinking about

i am thinking about trademarking the name Michaelwiseguy,- you have been forewarned.


Try deleting it from the

Try deleting it from the Internet. Good luck.

i spammed the northwest

i spammed the northwest pensnylvania congressman. i did my small part.


i'm not evil. i'm not going

i'm not evil. i'm not going to support CISPA


Try exercising some

Try exercising some etiquette.

i haven't read Amy

i haven't read Amy Vanderbilt's book on it. there are 665 pages in that book. i've got the feeling she attached a page for her illuminati friends.


I can't believe you're still up.

I can't believe you're still up.

Go to bed.

Is there a documentary on the

Is there a documentary on the Federal Governments war on the Internet with all their communications hacking and development of viruses? The Federal Government is the worlds greatest hacker. You can be sure the NSA is recording this thread.

Jay Rockefeller quote Internet shouldn't have been invented

Garan's picture

This video should have it's own post.

..and I should resist commenting, yet..

This is what gets me.
People will say things like: "This is the number one threat..".

However, in a situation where these isn't much of a threat, there still may exist a list of these "threats", and the top item is "The number one threat", which only sounds bad. These type of arguments scare people because they are gullible and mislead.

What is also side-stepped is the idea that a flimsy defense is largely the fault of the defender (in a situation of abundance resources). If a better defense against cyber threats is needed, then improve existing systems with a better use of technology. It is possible to create network entry points that don't fall apart and spill their beans.

There always is a number one threat. No big deal.

Cyril's picture

Why am I not surprised?

Why am I not surprised?

"Cyril" pronounced "see real". I code stuff.


"To study and not think is a waste. To think and not study is dangerous." -- Confucius

They are relentless

Corbett did a good piece on this recently:

How to Defeat #CISPA Once and for All
"From SOPA and PIPA to ACTA to CISPA to the TPP and now back to CISPA, internet activists have been caught up in a deliberately bewildering game of whack-a-mole with freedom-crushing legislation. Now, ISPs are doing an end run around the whole legislative process altogether and voluntarily collaborating with the entertainment industry to spy on their own customers. All of this is enough to leave concerned netizens demoralized, and in the war of attrition that is exactly the goal. Join us today on The Corbett Report as we explore a real, grassroots, alternative solution to the problem of internet censorhip that can help to end this government/corporate control over our communication once and for all."

Even if we defeated cispa or whatever it'll be called a hundred times they'll keep on trying and one day they'll get through. Sad really but I think we need to explore alternatives to the internet.

Thanks for the link. I wanted

Thanks for the link. I wanted to see that.

me too, this is

me too, this is horrible.

They are going for the guns and they are going for the medium.

That can't have an FCC like they did in the past.

What the hell were people thinking 100 years ago? 5 generations later and it's bloody Beyonce and JayZ


Cyril's picture

You forgot Chris Rock, to make for a trinity.

You forgot Chris Rock, to make for a trinity.

"Cyril" pronounced "see real". I code stuff.


"To study and not think is a waste. To think and not study is dangerous." -- Confucius

Another way to thwart CISPA James failed to mention...

I love Corbett Report, and that episode in particular has the ultimate solution for defeating Web tyranny: Private internet through mesh networks.

That being said, such an alternative does not yet exist, and as long as we must use the current Internet, remaining anonymous and encrypted is the best and only way to remain private from the surveillance state. Everyone concerned about internet privacy and freedom in light of the barrage of legislation and executive orders seeking to destroy it needs to go out and get a good VPN right now. PrivateInternetAccess.com is a good one, and there's a price, but free options are also available.

Encrypted VPN tunneling and other alternatives like Tor are by no means infallible, but unveiling the identity of a VPN-connected machine would take time and money the NSA and Comcast don't have for someone who's broken no laws. You can't legislate what you can't see.

"The state is the great fictitious entity by which everyone seeks to live at the expense of everyone else."
-Frederic Bastiat

Unless the VPN server and or TOR are in fact the government

As Winston Smith in 1984 found out, There IS no underground.

Leges sine moribus vanae

As stated before...

Certain encryption methods, like PGP, inevitably have government assistance and funding through groups like InQTEL. That by no means implies that such encryption methods, like TOR and VPN, are completely at the mercy of such groups.

While the NSA and corporatists like Comcast and Charter have methods of unencrypting such data, it costs literally HUNDREDS OF THOUSANDS OF DOLLARS to do so. Just look at LulzSec, a group of hackers that wreaked havoc on governments and corporations for months before being caught. They were ultimately nailed not through the unencryption of the VPN they were using, but by asking HMA (the VPN being used by certain LulzSec members) for their data logs, demonstrating the need for consumers to pick a VPN that respects their privacy.

WHY did the FBI not simply decrypt the VPN tunnel being used by LulzSec members? Because it's SUPER DUPER EXPENSIVE. If everyone in the world were to use systems like VPN, there's no way private and state intelligence could afford to bust everyone, buying much needed time to create the true solution, an alternate internet, in the interim.

While 1984 has a lot of parallels to modern society, the control grid is by no means infallible; in fact, some of the very methods it employs have allowed for individual liberation, like the Internet. Viable tactics to fight globalism must be wary of the forces you speak of, but must also be unafraid to utilize potentially decentralizing technologies, because they're sure as hell better than nothing.

"The state is the great fictitious entity by which everyone seeks to live at the expense of everyone else."
-Frederic Bastiat

there are no independently

there are no independently rogue men in caves that have high tech installations, like Cobra Commander.


Garan's picture

If there are, you would never know.

I don't know about cobra commander.
Regarding independent men in caves...

Like mathematics, systems of security can be "made-up".
There is also "security through obscurity".
Also, at the core of data encryption is solid mathematics.

The internet could be thought of as one big phone network.
What gets transmitted over the network, can be completely determined by the end points of communication.
Those end points can be privately determined to the point that any "sniffer" between the points of communication have no idea of what is being communicated, how it was created, or how to decrypt.

Ultimately, all communications can not be decrypted.

The fact that government entities and private companies implement systems that can be compromised, ultimately is their own fault.

Total security along with human involvement, is a myth. But that's a different topic, ..as well as all the detailed posting on this post. Oops. :)

my friend is a network

my friend is a network engineer who subcontracted for Disney. Disney puts in a firetap so you don't know you're being spied on by them.


Garan's picture

What is a "firetap"?

I googled it an am guessing that Disney did not put an Ale House on their network.


i'll have to ask him. he's

i'll have to ask him. he's hard to get ahold of.


- Downsize DC has a 'thank or spank' feature at their site

Angry Birds Unite: You can spank or thank your congressman and senators @


This makes me both angry and sad. Downsize DC has been fighting this for a while. Just called and e-mailed all my representatives and Senators.

"Hence, naturally enough, my symbol for Hell is something like the bureaucracy of a police state or the office of a thoroughly nasty business concern." ~~C.S. Lewis
Love won! Deliverance from Tyranny is on the way! Col. 2:13-15