#OpCyberPrivacy | ~ | 2015 AUG 13


SUBMITTED BY: 0bitcoincidence0

DATE: Aug. 15, 2015, 11:43 p.m.

FORMAT: Text only

SIZE: 3.2 kB

HITS: 366

  1. #OpCyberPrivacy | ~ | 2015 AUG 13
  2. '''Fact: CISA does not permit so-called hacking back -- companies are not authorized to destroy or render computer systems unusable. The bill ensures that "defensive measures" (DMs) are properly bounded. The managers' amendment clarifies that companies are not allowed to gain unauthorized access to a computer network.'''
  3. - Debunk: Only the NSA and other affiliated agencies and groups such as Equation are allowed to hack back and infect thousands of systems in remote countries and internally through generalization in legal terminology and definitions reaching beyond the bill, everything else is permissible through other means to retrieve data for a given reason in point as to whom, what has done something in regards.
  4. '''Myth: Businesses are encouraged to share information with the Department of Defense (DoD) and the National Security Agency (NSA).
  5. Fact: Businesses are not granted liability protection when sharing CTIs with the DoD and the NSA -- which preserves the status quo. CTIs that businesses pass on to the federal government must go through the Department of Homeland Security (DHS), which is a civilian entity.'''
  6. Not truthful in the entirety and only takes out one point in reference. Businesses are not encouraged, they are forced and bullied through scare tactics, Take Lavabit as an example. All else with working with private business or proxy orgs and business/service such as facebook,yahoo,gmail etc to do the work as indirect in relation. So to attempt to make them fall in the liability because anything done is not directly the workings from an agency. A fall back for them selfs, not only evading general rules and workings through other bills and protocols, but a tactic to smoke them selfs out if anything falls back
  7. '''Myth: CISA is a surveillance bill.
  8. Fact: CISA does not authorize the government to surveil individuals, such as targeting crimes unrelated to cybersecurity. First, a revised version of CISA eliminates the government's ability to use CTIs to investigate and prosecute "serious violent felonies" -- which is a significant pro-privacy change to the bill.'''
  9. - Debunk: not individuals, but groups and other organizations and the sorts, and then when reaching further, use other means outside the bill to intercept and moreover then pick out individuals, which is and has been done and can be seen in history as to what has been done.
  10. In it's entirety, the contemplated and horrid bill will not work just by itself. There are other bills and protocols in place that can coincide with it and break out the stature in what is written, Not only invoke more, rule over the cyber front and outside, but in attempt to control it through a proxy war and twisted bi-truths with escalating propaganda.
  11. If it is that you cannot protect this country as whole with what we have, a strong nation, a nation of brilliant minds willing to adapt, then maybe those in place shouldn't be in power, for they have proven them selfs capable, without lies, misuse of funds, and resources of great amount, and only have mutilated the nation.
  12. Within love and resistance, anything is possible.

comments powered by Disqus