Wednesday, 30 May 2012 04:56

Privacy-eliminating CISPA Awaits Its Fate in the Senate

Written by 

Despite an increasingly noisy chorus of resistance to many of its provisions, the Cyber Intelligence Sharing and Protection Act (CISPA) passed the House, 248-168, on April 26. Passage in the House was assured with more than 70 percent of those supported by the Tea Party voting for it. It moved to an uncertain future in the Senate. 

That opposition noted that the bill’s many flaws included precious little “protection” for rights guaranteed in the Bill of Rights, especially those guaranteed by the Fourth Amendment:

The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.

In the zeal to “protect” the country against “cybersecurity threats,” Internet providers and other communications companies would be allowed to share their customers' private information with agencies of the federal government, and vice versa. As Techdirt’s Leigh Breadon explained,

[The] government would be able to search information it collects under CISPA for the purposes of investigating American citizens with complete immunity from all privacy protections as long as they can claim someone committed a “cybersecurity crime.”

        Basically it says the 4th Amendment does not apply online, at all.

Republican presidential candidate Ron Paul said virtually the same thing in his opposition to CISPA:

CISPA permits both the federal government and private companies to view your private online communications without judicial oversight [as required by the Fourth Amendment] provided that they do so of course in the name of cybersecurity.

The bill is another heavy-handed effort to expand government’s surveillance of private citizens’ communications without restraint. By using words such as “may” instead of “must” and “cybersecurity” without defining the term, the bill creates just the sort of opening through the Fourth Amendment that has, until now, largely protected such private communications from governmental view. As Juan Williams, a commentator at Fox News, put it, CISPA gives “the government a whole new box of tools to fight terrorism … free of any legal restraint.”

Although the bill doesn’t require telecommunications giants such as Facebook, Google, or Yahoo to share information with government agencies, it creates the opportunity for the government to pressure them into disclosing all personal communications. As Paul noted,

CISPA encourages some of our most successful internet companies to act as government spies, sowing distrust of social media and chilling communications in one segment of the world economy where Americans still lead.

Even some liberal Democrats are gravely concerned about CISPA if it becomes law. Representative Jared Polis (D-Colo.), who sports a dismal Freedom Index rating of 11, said during the debate that “allowing the military and NSA [National Security Agency] to spy on Americans on American soil goes against every principle this country was founded on.” But he found himself in the minority.

One of the key passages of CISPA that concerns civil libertarians is the section that says, “Notwithstanding any other provision of law [companies may share information] with any other entity, including the federal government.” With that single word “notwithstanding,” the bill would sweep away all privacy protections built into the Fourth Amendment and all existing federal and state civil and criminal statutes. This would include Internet companies’ privacy protections, educational record laws, gun laws, census data, medical records, and every other statute that protects private information.  

But the majority in the House weren’t listening, or weren’t interested. Instead they bought the line presented by one of the authors of the bill, Rep. Mike Rogers (R-Mich.):

In just the last few years, nation states like China have stolen enough intellectual property from just defense contractors, that would be equivalent to 50 times the print collection of the US Library of Congress. We have nation states who are literally stealing jobs and our future. We also have countries that are engaged in activities and have capabilities that have the ability to break networks, computer networks. Which means you can't just reboot. It means your system is literally broken. Those kinds of disruptions can be catastrophic when you think about the financial sector, or the energy sector, or our command and control elements for all our national security apparatus.

You know, without our ideas, without our innovation that countries like China are stealing every single day; we will cease to be a great nation. They are slowly and silently and quickly stealing the value and prosperity of America. One credit card company said that they get attacked for your personal information 300,000 times a day, one company.

And so, for this “protection” the House sold out the privacy of American citizens.

But CISPA is far from becoming law. Built into the Constitution that the House is so willing to ravage is the path by which all bills, including odoriferous ones such as CISPA, must travel in order to become law. The path is arduous and tortuous and slow, and may spell the end, temporarily at least, of CISPA.

When the bill moves to the Senate, it could be voted up or down, and then move to the President’s desk for signing. But in this case, that is highly unlikely. First of all it is an election year, and the citizens whose privacy is being threatened are paying more attention than usual to Washington’s goings-on. Second, the White House, surprisingly, has come down against CISPA for many of these same reasons, and the President has promised to veto the bill if it arrives on his desk in its present form. Third, 34 Senators are up for reelection this year, many of them Democrats whose races are in serious doubt. So, passing CISPA in its present form would be, according to Alex Wilhelm in his blog,, “a fool’s errand.”

Besides, the bill is complex and lengthy and has suffered many revisions and amendments in order to get past the House. Those would have to be sorted out and approved before passage. Finally, there are two other so-called “cybersecurity” bills pending in the Senate already — the McCain bill and the Lierberman bill — neither of which is much better than CISPA but both of which would further complicate, and delay, final approval.

Wilhelm is pessimistic about the Senate coming up with something much better than CISPA but offers hope that perhaps another bill, more respectful and protective of precious rights guaranteed by the Constitution, might be offered. At present there doesn’t appear to be any such bill in the offing, but time will tell.

And that is the beauty of the Constitution and the wisdom of the Founders who created it. They well knew the federal government’s propensity to try to control everything that moves, and that by slowing down the legislative process, and dividing it up between competing branches of the government, it would reduce the chances of such a travesty as CISPA from ever seeing the light of day.




1 comment

  • Comment Link Ross Wolf Thursday, 31 May 2012 22:34 posted by Ross Wolf

    Is CISPA A Government Trojan Horse?

    U.S. Government Can Use CISPA Internet Spying To Control and Forfeit Businesses—Seize Your Property:

    CISPA: The Cyber Information Sharing and Protection Act if passed by Congress would allow U.S. Spy and other government agencies to share Americans’ confidential Internet and other information with Government Certified Self Protected Cyber Entities, Certified Cyber Entity Employees and Elements in both government and private sectors to help protect them—against Cyber threats.

    However—CISPA would also allow Government agencies, police and government quasi/contractors (WITHOUT WARRANTS) OR LIABILITY to take out of context—any innocent hastily written email, fax or other Internet activity to allege a crime or violation was committed to cause a person’s arrest, assess fines or civilly forfeit a business or person’s property. There are more than 350 laws and violations that can subject property to government asset forfeiture. Government civil asset forfeiture requires only a civil preponderance of evidence for police to forfeit property, little more than hearsay. No one need be charged with a crime. Corrupt Police can even create the hearsay. Government can use CISPA to (certify any Self Protected Cyber Entity or their employee—to spy on their employers and clients: (CIVIL Asset Forfeiture Incentive). U.S. Government is not prohibited from paying any Government Certified Cyber Self Protected Entity or Employee; or Element part of government forfeited assets or other compensation that result from the aforementioned providing U.S. Government a corporation’s or clients’ private/confidential information—that (now) require a warrant or court order. Federal. Government currently contracts on a fee/commission-sharing basis with Self Protected Cyber Entities, Elements and Contractors that have security clearances to participate in facilitating arrests and Government asset forfeitures. It is expected U.S. Government, police and private contractors’—Civil Asset Forfeiture of Americans’ property will greatly escalate if CISPA is passed allowing Government certified private cyber entities and their employees—No Warrant Searches of persons’ and Businesses’ confidential Internet Information—that can be handed over to the government e.g. private emails, faxes, phone and transmitted files for investigation, prosecution and asset forfeiture—circumventing the Fourth Amendment.

    CISPA Internet Spying: Since CISPA was passed by the House, two additional cyber-security bills have been created in the Senate called, “The Cyber Security Act of 2012” and “SECURE IT Act”. Both bills appear unconstitutional; appear designed to circumvent the Fourth Amendment and public Freedom of Information Requests. The Cyber Security Act of 2012 formally known as S. 2105 was created by Senate Democrats, Joe Lieberman and Susan Collins. Similar to CISPA, the Cyber security Act of 2012 would abolish legal walls that stop Federal government and private companies sharing information. The SECURE IT ACT: S.2151 was introduced by Senate Republicans on March 1st 2012: would (require) federal contractors to alert government about any cyber threats, forcing such communications between government regulators and corporations. The SECURE IT Act authorizes sharing of persons’ private Internet information (without a warrant) going beyond what is necessary to report a believed cyber threat. SECURE It Act fails to create a regulatory system at the Federal level to oversee cyber-security threats opening the door for persons’ and businesses’ confidential information to be misused and misappropriated by government agencies and private sector government certified cyber entities.

    Under CISPA: Government should be prohibited from using so-call (Certified Self Protected Cyber Entities, their Employees) and Elements to circumvent the Fourth Amendment; escape Public Freedom of Information Requests. CORRUPTED: Government Certified Self Protected Cyber Entities and Employees, U.S. Government Agencies, Contractors and Police too easily may use someone’s confidential Internet Information, e.g. transmitted files and private emails collected (without warrants) to extort Americans, corporations, politicians; for compensation, target a businesses’ competitor; or sell private information gleaned from warrant-less Internet Surveillance.

    If CISPA is passed allowing NO Warrant private self protected cyber entity spying, some Internet writers and political activists might be dead-meat under NDAA. Americans” who write on the Internet or verbally express an opinion against any entity of U.S. Government or its coalition partners—may under The Defense Authorization Act of 2012—be deemed by U.S. Government (someone likely to engage in, support or provoke violent acts or threaten National Security)— or (Belligerent) to order an American writer or activist’s indefinite prison detention.

Please Log In To Comment
Log in