• Menu
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Before Header

  • About Us
  • Lexicon
  • Contact Us
  • Our Store
  • ↑
  • ↓
  • ←
  • →

Balloon Juice

Come for the politics, stay for the snark.

And now I have baud making fun of me. this day can’t get worse.

Democracy is not a spectator sport.

The arc of the moral universe does not bend itself. it is up to us to bend it.

Relentless negativity is not a sign that you are more realistic.

Of course you can have champagne before noon. That’s why orange juice was invented.

The “burn-it-down” people are good with that until they become part of the kindling.

Wake up. Grow up. Get in the fight.

Just because you believe it, that does not make it true.

Why is it so hard for them to condemn hate?

Nancy smash is sick of your bullshit.

People are complicated. Love is not.

When you’re a Republican, they let you do it.

Trump should be leading, not lying.

New McCarthy, same old McCarthyism.

Roe is not about choice. It is about freedom.

“Jesus paying for the sins of everyone is an insult to those who paid for their own sins.”

75% of people clapping liked the show!

If you voted for Trump, you don’t get to speak about ethics, morals, or rule of law.

Fucking consultants! (of the political variety)

Everybody saw this coming.

The republican ‘Pastor’ of the House is an odious authoritarian little creep.

It’s all just conspiracy shit beamed down from the mothership.

Not rolling over. fuck you, make me.

Technically true, but collectively nonsense

Mobile Menu

  • 4 Directions VA 2025 Raffle
  • 2025 Activism
  • Donate with Venmo, Zelle & PayPal
  • Site Feedback
  • War in Ukraine
  • Submit Photos to On the Road
  • Politics
  • On The Road
  • Open Threads
  • Topics
  • Authors
  • About Us
  • Contact Us
  • Lexicon
  • Our Store
  • Politics
  • Open Threads
  • 2025 Activism
  • Garden Chats
  • On The Road
  • Targeted Fundraising!
You are here: Home / CISPA

CISPA

by @heymistermix.com|  April 22, 201211:14 am| 57 Comments

This post is in: Ever Get The Feeling You've Been Cheated?

FacebookTweetEmail

Here’s the key point from the EFF’s simple outline of the provisions of CISPA, the latest attempt to turn file sharers into terrorists. Here’s the ACLU’s take on new amendments to the bill, and an ACLU memo on different cybersecurity measures that will be debated in Congress in the next few weeks.

FacebookTweetEmail
Previous Post: « The Guy’s a Genius, I Tell You
Next Post: Do I have to tell the story? »

Reader Interactions

57Comments

  1. 1.

    burnspbesq

    April 22, 2012 at 11:22 am

    There is no problem in IP law and related disciplines that Congress can’t make worse by trying to fix it.

  2. 2.

    Villago Delenda Est

    April 22, 2012 at 11:23 am

    Can we include “daring to question corporate overlords online” as one of the dire threats?

  3. 3.

    piratedan

    April 22, 2012 at 11:25 am

    the spice must flow!!!!!!!!!!!!!!!!!!!!!!!!!!!

  4. 4.

    Villago Delenda Est

    April 22, 2012 at 11:26 am

    Wouldn’t an effort to “destroy” government or private networks be more in the realm of actual physical attacks on infrastructure? Wouldn’t that be something other than a “cyberthreat”, which implies a virtualness to it, as in an DOS attack or attempting via exploits to disrupt networks?

    These morons have no fucking idea what they’re talking about. I’ll betcha the fascist pigshit of ALEC is involved in this.

  5. 5.

    gaz

    April 22, 2012 at 11:26 am

    I didn’t stop hacking shit when they called me a terrorist.

    And I certainly am not going to stop using file-sharing.

    * adjusts suicide vest *

  6. 6.

    Matoko Borgia-Steeler

    April 22, 2012 at 11:30 am

    @gaz:

    I shall wear my Rachel Ray terrorist file-sharing jihadi scarf with pride. Soil yourself with terror, Michelle Malkin!

  7. 7.

    Baud

    April 22, 2012 at 11:42 am

    However one feels about copyright protection/file sharing, I don’t think it falls under the rubric of “cybersecurity.”

  8. 8.

    Ben Franklin

    April 22, 2012 at 11:47 am

    torrentfreak.com/megaupload-trial-may-never-happen-judge-says-120420/

    A US judge has put a bomb under the Megaupload case by informing the FBI that a trial in the United States may never happen. The cyberlocker was never formally served with the appropriate paperwork by the US authorities, as it is impossible to serve a foreign company with criminal charges.

    I think The Feds are smart enough to have known this.

  9. 9.

    kdaug

    April 22, 2012 at 11:49 am

    Do love the little radiation symbol bulletpoints on the list, though.

    “If you share files, your hair will fall out and you will hemorrhage!”

  10. 10.

    Cap'n Magic

    April 22, 2012 at 11:49 am

    Now that the MegaUpload trial may never happen, you can bet the MPAA, RIAA, and the network security infrastructure industry will pull all stops to back this latest piece of offal.

  11. 11.

    Corner Stone

    April 22, 2012 at 11:52 am

    Speaking of file sharing, was this previously mentioned?
    Dotcom trial may not occur – Judge
    “The criminal charges against Kim Dotcom in the United States may never get to trial, the judge overseeing the case has told the FBI.

    United States district court judge Liam O’Grady said he didn’t know if “we are ever going to have a trial in this matter” after being told Dotcom’s file-sharing company had never been formally served with criminal papers by the US.”

    ETA, ok, talk about getting taken to the woodshed…

  12. 12.

    Corner Stone

    April 22, 2012 at 11:54 am

    @Ben Franklin: Speaking of FCPA, which we were in the Wal Mart thread, it seems our FBI did a little of the business for the Big Entertainment Industry by shutting down the site.

  13. 13.

    Cap'n Magic

    April 22, 2012 at 11:56 am

    @Corner Stone: Yep. Mentioned in a previous Open Thread.

  14. 14.

    gaz

    April 22, 2012 at 12:00 pm

    @Matoko Borgia-Steeler: lol

  15. 15.

    Ben Franklin

    April 22, 2012 at 12:02 pm

    @Corner Stone:

    Copyright is just cover for the over-arching agenda. They hate anything they can’t control.

    They don’t want the messy international red-tape, so prosecutions after-the-fact should be avoided. They want to shutthe barn door before the horse escapes.

    The goal is more pre-emptive.

  16. 16.

    Ben Franklin

    April 22, 2012 at 12:04 pm

    @Cap’n Magic:

    I recall mentioning it, but no discussion ensued.

  17. 17.

    MikeTheZ

    April 22, 2012 at 12:10 pm

    Its SOPA all over again. Leaves me with just one thought;

    They hate us for our freedoms.

    *sigh*

  18. 18.

    bemused senior

    April 22, 2012 at 12:13 pm

    I agree that the CISPA as written is too broad in some regards, but recognize that at the moment, companies like Yahoo, Google, etc. can’t share such things as log information and information about compromised accounts derived from evidence of spamming and fraud activity. Yet the people who run botnets and steal, [eta: sell and use] massive files of credentials from poorly secured commercial websites are very difficult to combat with traditional legal means…they are often in other countries, they may be state actors, they use automated changing of domain names in the command and control networks to make the descriptions of activity that occurred in even the recent past irrelevant to their current activity. The goal of sharing such information is to allow automated defenses against this activity.

  19. 19.

    gaz

    April 22, 2012 at 12:18 pm

    @bemused senior: ISPs regularly share information with each other, often for security purposes.

    Furthermore, there are organizations like CERT which already do a fine job of helping orgs protect themselves and recover from botnets and other infections. The reason most systems get infected is that the admins are not exercising appropriate and already existing measures that they could use to protect themselves. IOW, 9 times out of 10, orgs get infected because SOMEBODY isn’t doing their job.

    CISPA is paying lipservice to providing these protections, but they already exist. Unless CISPA criminalized lazy net-admins, it adds no value in terms of protecting orgs from hack attempts.

  20. 20.

    gaz

    April 22, 2012 at 12:25 pm

    @bemused senior: One more thing:

    You can legislate computer security about as effectively as you can legislate morality. Anyone that tells you different is selling something.

  21. 21.

    bemused senior

    April 22, 2012 at 12:29 pm

    @gaz: You are mistaken if you think that this information is shared to the degree that is needed. There is some sharing, but especially with regards to fraud related activity this is fraught with legal issues for the large providers of web mail and shopping. CERT is completely inadequate for rapid response for targets of botnet type attacks. There is a pretty large academic literature on these problems.

  22. 22.

    Matoko Borgia-Steeler

    April 22, 2012 at 12:35 pm

    @bemused senior:

    Could you recommend say five recent relevant items in the academic literature?

  23. 23.

    Ben Franklin

    April 22, 2012 at 12:53 pm

    Question….Who said this and when?

    “Th[e National Security Agency’s] capability at any time could be turned around on the American people, and no American would have any privacy left, such is the capability to monitor everything: telephone conversations, telegrams, it doesn’t matter. There would be no place to hide. [If a dictator ever took over, the N.S.A.] could enable it to impose total tyranny, and there would be no way to fight back.“

    Answer follows;

  24. 24.

    Ben Franklin

    April 22, 2012 at 12:56 pm

    Frank Church——-1975

    nytimes.com/2005/12/25/weekinreview/25bamford.html?_r=1&pagewanted=all

  25. 25.

    burnspbesq

    April 22, 2012 at 1:00 pm

    @Ben Franklin:

    The individual defendants are still going down.

  26. 26.

    gaz

    April 22, 2012 at 1:03 pm

    @bemused senior:

    CERT is completely inadequate for rapid response for targets of botnet type attacks. There is a pretty large academic literature on these problems

    1. CERT is inadequate to fix lazy administrators.
    2. So is the law.

    The problem cannot be solved by the law. It can be solved by due diligence. I take your academic literature and raise you all of the academic literature, and nearly every opinion of every computer security expert you can name.

    Edit: Furthermore, private institutions like ISPs do not need legislation to share information. They can do so voluntarily, unless they’ve entered some sort of NDA with a 3rd party. This almost never applies to the precise technical details of an attack. I hope you’re not suggesting that using the law to compel private companies to release more information would be a good idea, because it’s well, not.

  27. 27.

    Ben Franklin

    April 22, 2012 at 1:09 pm

    @burnspbesq:

    So, I guess Corporations are not People, after all.

  28. 28.

    Ben Franklin

    April 22, 2012 at 1:12 pm

    @gaz:

    Hammers make bad fly swatters.

  29. 29.

    danielx

    April 22, 2012 at 1:42 pm

    Makes you wonder how much the RIAA had to pony up in campaign contributions to get that language inserted, don’t it now?

    @Ben Franklin:

    Frank Church, and it’s all true. If bad guys of whatever persuasion are serious, they’re back to 1940s-type security or Moscow rules, as in assume that any electronic or telephonic communication is monitored, snail mail also.

  30. 30.

    uptown

    April 22, 2012 at 1:45 pm

    Yep, this will stop those mean hackers dead in their tracks…because they will be laughing too hard. This is aimed solely at the average consumer.

    How about a law that holds corporations and government agencies responsible for keeping their networks/data secure at current standards?

  31. 31.

    Corner Stone

    April 22, 2012 at 1:51 pm

    @danielx:

    If bad guys of whatever persuasion are serious, they’re back to 1940s-type security or Moscow rules, as in assume that any electronic or telephonic communication is monitored, snail mail also.

    Think that horse has long left the barn. And we can argue the relative “bad guy-ness” of this administration and previous others, but there’s no doubt we’re in this stage of data sweeping.

  32. 32.

    bemused senior

    April 22, 2012 at 1:59 pm

    @Matoko Borgia-Steeler: Took me a while to narrow this down. I think there are lot of relevant papers in the proceedings from the 2011 BADGER conference. Here is a link to the proceedings. iseclab.org/badgers2011/badgers2011-proceedings.pdf

    See especially the paper on legal issues.

    Public comment on an effort to come up with voluntary ISP practices against botnets are here: nist.gov/itl/botnetcomments.cfm

    The EFF comments address what is problematic in efforts to address botnets.

    Quite a bit of the frank discussion about the information sharing between large providers occurs behind closed doors (e.g. MAAWG).

    A book that you might find interesting to understand the cross-national issues around prosecuting computer fraud is Fatal System Error by Joseph Menn. Not academic, but imho pretty accurate.

  33. 33.

    uptown

    April 22, 2012 at 2:01 pm

    CISPA will also make it easier to prosecute potential whistle-blowers and make it very difficult for the media to do investigative journalism.

  34. 34.

    AA+ Bonds

    April 22, 2012 at 2:50 pm

    Well this corresponds perfectly to information assurance literature

    Although of course that business is not really concerned with the First Amendment

  35. 35.

    AA+ Bonds

    April 22, 2012 at 2:51 pm

    @uptown:

    How about a law that holds corporations and government agencies responsible for keeping their networks/data secure at current standards?

    UNFUNDED MANDATE ~(entire country burns down)~

  36. 36.

    AA+ Bonds

    April 22, 2012 at 2:52 pm

    @gaz:

    Furthermore, private institutions like ISPs do not need legislation to share information. They can do so voluntarily, unless they’ve entered some sort of NDA with a 3rd party.

    Thanks for posting this, I really wish people would remember that

  37. 37.

    AA+ Bonds

    April 22, 2012 at 2:54 pm

    @bemused senior:

    Yet the people who run botnets and steal, [eta: sell and use] massive files of credentials from poorly secured commercial websites are very difficult to combat with traditional legal means…

    emphasis mine . . . whenever I read something like this the hair on the back of my neck goes up

  38. 38.

    Bago

    April 22, 2012 at 3:02 pm

    If anything, there needs to be a commercially implemented standard for DNSSEC, and propagation policies. That and making sure browsers don’t block on DNS lookups. Sweet hair braids McChrist, waiting for a page to do DNS resolution on all of its CSS and JavaScript files, in addition to the ads. The friggin tracking pixel will add 2 seconds to the page load time. HOOOOOOOOOOOOORJ!
    /nerdrage

  39. 39.

    gaz

    April 22, 2012 at 3:08 pm

    As far as a general thought on this kind of legislation. This legislation attempts to fix something that isn’t * particularly * broken.

    Hacking happens. Gmail, Sony, et al have experienced it. MS has.

    But for all of that, it’s not a crises. It’s cost of doing business. In retail you have “shrinkage”. In IT you have hacks and fraud.

    This kind of legislation seeks to solve a problem that it cannot solve. This legislation speaks to the kind of pie in the sky vision of total security, which is basically a digital equivalent of arguing that we should have cameras on everyone so nobody gets mugged. Not only will it not stop the muggings, but…

    It’s crazy talk, and the kind of scare tactic regularly employed by politicians operating in a democratic society to backdoor you into giving up some of your rights in the interest of hanging on to as much power and money as they can get. It’s that simple.

  40. 40.

    Bago

    April 22, 2012 at 3:10 pm

    @Villago Delenda Est: Uhhhhm, no. TCP was built with redundancy in mind. Cloud solutions have fault domains to spread the risk around. At Microsoft, we lost the whole Kawajima data center, and kept on trucking.

  41. 41.

    gaz

    April 22, 2012 at 3:13 pm

    @Bago: Yep. =)

  42. 42.

    Bago

    April 22, 2012 at 3:17 pm

    @AA+ Bonds: I helped bust the GNIDA network, and they used default passwords and clear text for their account data, including passwords. Sweet alpha Jesus, how could you try and be clever with blacklists and still be so stupid?

  43. 43.

    gaz

    April 22, 2012 at 3:19 pm

    @Baud:

    However one feels about copyright protection/file sharing, I don’t think it falls under the rubric of “cybersecurity.”

    IT stands for information technology, and thus revolves around intellectual property. It’s part of the game.

    The reason I’ve taken on the IT angle is because IP is now being used to regulate IT. It was bound to happen, and I think it’s dangerous NOT to consider them intrinsically linked. I try to make a point to read IP legislation with an eye towards it’s ramifications on IT. I learned that lesson back when IBM fought for patent protection for software – and won – it’s all been downhill from there ;)

  44. 44.

    gaz

    April 22, 2012 at 3:23 pm

    @Bago: been there. seen that ;)

    many times. more often than not

    * sigh *

  45. 45.

    Bago

    April 22, 2012 at 3:24 pm

    When will people realize that on any packet switched network data will be copied, thus making copyright, the right to copy a bit awkward.

  46. 46.

    gaz

    April 22, 2012 at 3:27 pm

    @gaz: OT: also, if you ever worked for the IE team over at MS (I don’t expect you to admit it in polite company – heh) – and if that’s your nick in meat-space, and you snowboard a lot – or used to – I may know you. It’s curious, but stranger things have happened.

    If so, hai!

    If not, someone who works at MS stole your name, or maybe you stole it =)

  47. 47.

    gaz

    April 22, 2012 at 3:29 pm

    @Bago: Pretty much never. This is why we can’t have nice things. =)

  48. 48.

    Bago

    April 22, 2012 at 3:30 pm

    Don’t even get me started on F5 GTMs. One parsing error in the config file THAT THE PARSE COMMAND DETECTS winds up replicating a config that the execution engine will error out upon, THAT THE PARSING ENGINE
    CAN DETECT gets replicated all around the globe.

    Goddamn that was a long night.

  49. 49.

    Villago Delenda Est

    April 22, 2012 at 3:32 pm

    @Bago:

    TCP may have been build with redundancy in mind, but some of the SONET rings aren’t really rings. Because it’s cheaper (as a consequence of the insatiable need for telcos for profit) to lay fiber side by side, some of the rings may be topographically a ring, but physically, they’re side by side in the same conduit. One backhoe and POOF, there goes your “ring”.

    I have seen this actually happen in Oregon where a much ballyhooed “ring” was taken out by one backhoe, because it was a ring nominally, not actually.

  50. 50.

    Villago Delenda Est

    April 22, 2012 at 3:36 pm

    @AA+ Bonds:

    What we need is an Enabling Act to get past those pesky “traditional legal means”. Due process is so slow and inflexible, you know. We need summary action! Fire up the Einzatzgruppen and Sonderkommando!

  51. 51.

    Corner Stone

    April 22, 2012 at 3:40 pm

    @Villago Delenda Est: I’ve been debating for the last few minutes. Should I go with the “One ring to rule them all” joke, or the obvious “backhoe”?
    Sometimes, life is hard.

  52. 52.

    Anoniminous

    April 22, 2012 at 3:45 pm

    Kinda sorry I didn’t IP protect some of the stuff I wrote in 1979, 1980, and 1981. If I had I’d Pwn Teh Internets!

    Which brings-up the Oracle/Google court case. I find it vastly amusing – in a Black/Sick Humor way – Ellison is leading the charge against IP violations when Oracle is based on ripping-off E.F. Cobb’s development of the Relational Database Model and Cobb’s employer at the time, IBM.

  53. 53.

    Bago

    April 22, 2012 at 3:46 pm

    @Villago Delenda Est: Unless you sever at the last hop, traffic *should* be able to reroute at the transport layer.

  54. 54.

    Bago

    April 22, 2012 at 3:48 pm

    @Corner Stone: You could combine them into an amazingly sexist joke.

  55. 55.

    gaz

    April 22, 2012 at 3:54 pm

    @Villago Delenda Est: In that event TCP will reroute

  56. 56.

    Matoko Borgia-Steeler

    April 22, 2012 at 4:33 pm

    @bemused senior:

    Thank you so much for the references. I’ll check them out and get myself more informed.

  57. 57.

    LW

    April 24, 2012 at 6:00 pm

    It is so very important that we move to stop CISPA asap. We are slipping down a slippery slope towards a police state here and need to keep whatever liberty we can. For those of you that don’t understand the true and urgent need to stop bills like this from being passed, please take a few hours to watch a new and free documentary online called THRIVE. THRIVE outlines everything that is going on in our world behind the scenes and provides clear and tangible solution strategies for everyone! It’s available free from their website: http://www.thrivemovement.com

Comments are closed.

Primary Sidebar

On The Road - ema - Midtown Manhattan Fall Foliage 1
Image by ema (1/18/26)

Mary Peltola Alaska Senate

Donate

Order Your Pet Calendars!

Order Calendar A

Order Calendar B

 

Recent Comments

  • Professor Bigfoot on Good Trouble (Jan 18, 2026 @ 3:56pm)
  • sab on Sunday Morning Open Thread (Jan 18, 2026 @ 3:53pm)
  • Kayla Rudbek on Good Trouble (Jan 18, 2026 @ 3:53pm)
  • Kayla Rudbek on Good Trouble (Jan 18, 2026 @ 3:52pm)
  • Professor Bigfoot on Sunday Morning Open Thread (Jan 18, 2026 @ 3:49pm)

Balloon Juice Posts

View by Topic
View by Author
View by Month & Year
View by Past Author

Featuring

Medium Cool
Artists in Our Midst
Authors in Our Midst
On Artificial Intelligence (7-part series)

🎈Keep Balloon Juice Ad Free

Become a Balloon Juice Patreon
Donate with Venmo, Zelle or PayPal

Calling All Jackals

Site Feedback
Nominate a Rotating Tag
Submit Photos to On the Road
Balloon Juice Anniversary (All Links)
Balloon Juice Anniversary (All Posts)
Fix Nyms with Apostrophes

Balloon Juice Mailing List Signup

Social Media

Balloon Juice
WaterGirl
TaMara
John Cole
DougJ (aka NYT Pitchbot)
Betty Cracker
Tom Levenson
David Anderson
Major Major Major Major
DougJ NYT Pitchbot
mistermix
Rose Judson (podcast)

Mary Peltola Alaska Senate

Donate

Site Footer

Come for the politics, stay for the snark.

  • Facebook
  • RSS
  • Twitter
  • YouTube
  • Comment Policy
  • Our Authors
  • Blogroll
  • Our Artists
  • Privacy Policy

Privacy Manager

Copyright © 2026 Dev Balloon Juice · All Rights Reserved · Powered by BizBudding Inc

Share this ArticleLike this article? Email it to a friend!

Email sent!