The CISPA Swindle
May 3, 2012
James Wilson, Downsize DC
5/2/2012
Despite growing protests, the House passed Cyber Intelligence Sharing and Protection Act (CISPA) last Thursday, 248-168. The House ignored you and bought the hype. You can see how your Representative voted: http://clerk.house.gov/evs/2012/roll192.xml
The bill, and the process in passing it, was a fraud. And, like the Iraq War and NDAA, it seems the House EAGERLY WANTED to be lied to about CISPA.
Your so-called “representatives” are monkeys who can see no evil and hear no evil (they can still speak evil, unfortunately).
But our numbers are growing, and the fight isn’t over. Let’s get to the root of the issue, as we DC Downsizers are prone to do.
One Comment
leave one →
Is CISPA a Trojan Horse?
Government can use CISPA to secretly (certify employees) including those that work for a Government certified cyber self-protected entity—to spy on their certified employer and clients with full immunity from lawsuits if done in good faith. In effect spies spying on spies, even for profit.
U.S. Government is not prohibited from paying any Government Certified self protected cyber entity or Certified Employee part of government forfeited assets or other compensation for providing U.S. Government a corporation’s confidential information and or client information—that otherwise would require a warrant. U.S. Government now contracts on a commission basis (self protected cyber entities) e.g. private government contractors with security clearances to facilitate arrests and Government asset forfeitures. Currently Government can’t use evidence obtained through there contractors’ illegal warrant-less spying on: Internet activity, private emails, faxes and transmitted electronic files; however that will change if CISPA is passed by Congress. Not surprisingly some of the same private security contractors involved with government asset forfeitures have lobbied Congress to pass CISPA.
Is CISPA a Trojan Horse? CISPA provides “Government Certified “Self Protected Cyber Entities” an incentive to anonymously snitch on their corporate competitors to gain an economic advantage: although CISPA states using a certified cyber status to gain an economic advantage over a competitor is prohibited, however, that appears covertly unstoppable. In either case U.S. Government can use CISPA to accumulate through warrant-less searches, any corporation’s confidential and private client information that potentially could be used by a corrupt U.S. Government to extort corporations, politicians and wealthy Citizens. Hitler and his private security Gestapo used this tactic to force corporations to support Nazi policies.
Hitler also promised to go after a corporation’s competitors if the corporation supported him. Some of the corporations (Hitler partnered with} were so greedy, they did not see that Hitler was pitting corporations against each other to reduce their combined political power so Hitler could control them. Does that Nazi Government Partnership with private corporations sound currently familiar in the U.S.?