Will CISPA ever be permanently defeated?

StillADotcommer

It seems like an annual ritual now for some Senator and/or Congressman to reintroduce CISPA, the NSA friendly legislation to make it easier for the government to get personal information from private companies. The director of the NSA was calling for CISPA just a few weeks ago. For the children. Senators Chambliss and Feinstein obliged. One is Republican and one Democrat, so everyone has someone to be mad at, luckily. I’m going to go through the steps of calling and emailing my congressmen over this again, and hope other people will as well, but man, it seems like a Sisyphean effort at times. Any ideas how to fight CISPA more effectively?

Tags: CISPA, privacy
Topic: Government
Answer this Question

Answers

3 total
jimlynch
Vote Up (8)

Bad legislation hardly ever seems to go away. You know what they say: The price of liberty is eternal vigilance.

jluppino
Vote Up (4)

They will try again and again and again. At least this time it might be a little less Orwellian, according to Mother Jones. Donate to EFF, write and call your Senators and Representatives. Make sure to do some basic research before you call, so that it is clear that you are an informed voter voicing valid concerns

Faizan Ali
Vote Up (4)

"Any ideas how to fight CISPA more effectively?"

 

I have been working with a company which is foucsed on providing the internet Users cyber security, I have been interviewing many influencers on this subjects and all of them have said that the best way to hide from CISPA and NSA is to hide. You need to be smart enough to know what to share and what NOT to share on the internet. People are bent on compromising their own privacy for no reason at all and the Govt is using this oppurtunity to exploit your privacy.

 

Recently a renokned hacker Kevin Mitnick said that the best way to hide from NSA is to use a VPN. VPN can hide all your activity from these spying authorities. But it would be ignorant to say that they do not hve the tecnology to Crack it but they wouldnt spend hundreds of dollars on just  a suspicion. As long as you are not involved in a terroist activity you have nothing to be afraid off! VPNs are a must along with tor and other firewalls.

Ask a question

Join Now or Sign In to ask a question.
As part of an EU-wide crackdown on Google's data collection practices, Germany has ordered the company to change its user data processing, which is in violation of the country's laws.
The European Commission believes Apple could have received significant tax reductions from Irish authorities, and is focusing its investigation on tax rulings that favored two Apple subsidiaries, according to a newly revealed Commission document.
Microsoft CEO Satya Nadella wooed India's government and banks on Tuesday with an offer to host cloud services including Azure and Office 365 in the country.
Apple's iPhone 6 will go on sale on Oct. 17 in mainland China, one of the biggest markets for the company, with high demand expected from existing iPhone users.
China has effectively cleared the iPhone 6 for sale in the country, granting the product a license, but not before a government regulator demanded Apple make some security changes in the iOS operating system to fix suspected flaws in the software.
Chinese custom agents literally have their hands full with Apple's iPhone 6, as they seize hundreds of units from smugglers attempting to bring them into the country.
Apple's alleged favorable tax treatment by the Irish government will come under renewed scrutiny Tuesday, when the European Commission publishes its reasons for opening an in-depth investigation into the company's tax affairs.
China started blocking the popular photo-sharing app Instagram on Sunday, as part of its moves to squelch any mention of the use of tear gas on pro-democracy protests in Hong Kong.
Republicans and Democrats in Congress rarely seem to agree on anything anymore, but top members from both sides Friday offered qualified support for efforts to consolidate federal data centers.
The expansion and blurring of the traditional government network environment require federal IT officials to rethink contracting processes and embrace real-time security monitoring.

White Papers & Webcasts

See more White Papers | Webcasts

Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+

randomness