CISA is the latest creation of Dianne Feinstein to destroy your Constitutional rights. It grants the government authorization to ask companies to ‘voluntarily’ give them your personal information with no legal process whatsoever while it protects the companies for complying.
Every year a host of cybersecurity bills are introduced in Congress. This year, the Cyber Intelligence Sharing and Protection Act (CISPA) was introduced in the US House, and is moving through Congress. CISPA would add a dangerously vague “cybersecurity” exemption to all existing federal and state privacy laws. Click here to read our FAQ on CISPA 2.0
CISPA purports to allow companies and the federal government to “share” threat information for a “cybersecurity” purpose—to protect and defend against attacks against computer systems and networks. But the bill is written broadly enough to permit your communications service providers to identify, obtain, and share your emails and text messages with the government. While business leaders have conceded that they do not need to share personally identifying information to combat computer threats, the bill provides an exception to existing law designed to protect your personal information.
The newly granted powers are intended to thwart computer security threats against a company’s rights and property. But the definitions are broad and vague. The terms allow purposes such as guarding against “improper” information modification and ensuring “timely” access to information, functions that are not necessarily tied to attacks.
Once handed over, the government is able to use this information for investigating crimes that are unrelated to the underlying security threat and, more broadly, for “national security” purposes, which is a poorly defined term that includes “threats to the United States, its people, property, or interests” and “any other matter bearing on United States national or homeland security.”
The bill’s vague definitions like “cybersecurity purpose” and “cybersecurity system” also raise the frightening possibility of a company using aggressive countermeasures. If a company wants to combat a threat, it is empowered to use “cybersecurity systems” to identify and obtain “cyber threat information.” But the bill does not define exactly how far a company can go, leaving it open to the possibility of abuse.
Companies would also be immune from both civil and criminal liability for any action, including but not limited to violating a user’s privacy, as long as the company used the powers granted by CISPA in “good faith.” The immunity even extends to “decisions made based on” any information “directly pertaining” to a security threat. The consequences of such a clause are far-reaching.
God Protect us all from the government and hope she is not voted back into office.
she can go to hell
Another act from the Nazi books
We need drug tests, IQ tests and term limits for ALL politicians.
Her and Polosi are twins
damn woman can i call you that you are one ugly bitch really
Just as useless as Nasty Nancy.
Deport the bitch.
one of obama’s clonies
How to create zombie terrorists and jihadists to make proxy non-military wars against other countries upon your orders?
1- Bring selected persons to your prisons, institutions or camps, for any reason
2- Use mind control experts in the Pentagon, CIA, MI6, Mossad, to transform them into obedient zombies
3- One of the well-known techniques is to put them in the near-death state, then totally brain wash them
4- All they need is to inject them with neurotoxic powder and dissociative hallucinating drugs
5- As they become paralyzed, these officers start to penetrate their subconscious, brain wash and reprogram them, to mind control them completely, as if they are possessed by aliens
6- They tell them they are zombies, who slaughter Arabs, Christians, Muslims, police and army, but never attack Israel, Zionists or Masonics
7- They tell them they should eat their flesh and brains and drink their blood, and that Allah wants them to do so
8- They may add to them mind control brain micro chips for remote control, then awaken them, to become their mind slaves, who never disobey their orders
9- Then these officers may develop beards and pretend being Muslims, and call themselves Abu Omar or Ben Laden, to get their trust
10- This way they create endless number of zombies, who can make non-military, proxy wars, against any country, in an easy way
Easy, cheap, effective, endless, guaranteed and proved to be 100% successful