SUBSCRIBE TO OUR FREE NEWSLETTER
Daily news & progressive opinion—funded by the people, not the corporations—delivered straight to your inbox.
5
#000000
#FFFFFF
To donate by check, phone, or other method, see our More Ways to Give page.
Daily news & progressive opinion—funded by the people, not the corporations—delivered straight to your inbox.
The Cyber Intelligence Sharing and Protection Act (CISPA, or H.R. 624) has a number of fundamental flaws that threaten civil liberties. The bill is intended to give companies in the private sector clear authority to share more cyber threat information. CDT supports more cybersecurity information sharing. However, CISPA goes overboard in the authorities it grants, it lacks critically necessary civil liberties protections, and it inadvertently authorizes and immunizes conduct that itself constitutes a cybersecurity crime.
We were disappointed when the authors of the legislation re-introduced the same bill that passed the House last year only to stall in the Senate. Nothing was changed to address the many concerns that privacy groups had identified, nothing was changed to address the privacy concerns that drew a White House veto threat, and none of the privacy amendments that the Senate adopted when it considered its own cybersecurity bill were included in CISPA this year.
We are committed to finding the best way to facilitate information sharing between private sector companies and, under appropriate limits, with the government. We believe that the best way to further the public debate about CISPA is to be transparent about what we see as the critical problems in the bill and what we think are the solutions to those problems. Therefore, we are publishing a two-page document identifying eight critical problems in CISPA, with a solution to each. We are also publishing a redline of the bill that shows how it would change if our solutions are adopted. We are conveying these proposals to all members of the House Intelligence Committee.
Our fixes to CISPA would:
While we hope that the transparency and public debate that we promote today by releasing these documents will lead to significant improvements in the legislation, we are under no illusions: CISPA has fundamental flaws and we seek significant changes. If they are not made, CDT will continue to oppose the bill.
We also urge the House Intelligence Committee to open its process to the light of day. Last year, the Committee conducted the mark up of CISPA in secret. This fosters distrust and public misunderstanding. This year, it should hold an open mark up of CISPA. Amendments should be published in advance, so they can be assessed.
In short, we think CISPA needs major surgery, we have shown how we think it could be performed, and we're asking the Committee to do this particular operation in public.
Common Dreams is powered by optimists who believe in the power of informed and engaged citizens to ignite and enact change to make the world a better place. We're hundreds of thousands strong, but every single supporter makes the difference. Your contribution supports this bold media model—free, independent, and dedicated to reporting the facts every day. Stand with us in the fight for economic equality, social justice, human rights, and a more sustainable future. As a people-powered nonprofit news outlet, we cover the issues the corporate media never will. |
The Cyber Intelligence Sharing and Protection Act (CISPA, or H.R. 624) has a number of fundamental flaws that threaten civil liberties. The bill is intended to give companies in the private sector clear authority to share more cyber threat information. CDT supports more cybersecurity information sharing. However, CISPA goes overboard in the authorities it grants, it lacks critically necessary civil liberties protections, and it inadvertently authorizes and immunizes conduct that itself constitutes a cybersecurity crime.
We were disappointed when the authors of the legislation re-introduced the same bill that passed the House last year only to stall in the Senate. Nothing was changed to address the many concerns that privacy groups had identified, nothing was changed to address the privacy concerns that drew a White House veto threat, and none of the privacy amendments that the Senate adopted when it considered its own cybersecurity bill were included in CISPA this year.
We are committed to finding the best way to facilitate information sharing between private sector companies and, under appropriate limits, with the government. We believe that the best way to further the public debate about CISPA is to be transparent about what we see as the critical problems in the bill and what we think are the solutions to those problems. Therefore, we are publishing a two-page document identifying eight critical problems in CISPA, with a solution to each. We are also publishing a redline of the bill that shows how it would change if our solutions are adopted. We are conveying these proposals to all members of the House Intelligence Committee.
Our fixes to CISPA would:
While we hope that the transparency and public debate that we promote today by releasing these documents will lead to significant improvements in the legislation, we are under no illusions: CISPA has fundamental flaws and we seek significant changes. If they are not made, CDT will continue to oppose the bill.
We also urge the House Intelligence Committee to open its process to the light of day. Last year, the Committee conducted the mark up of CISPA in secret. This fosters distrust and public misunderstanding. This year, it should hold an open mark up of CISPA. Amendments should be published in advance, so they can be assessed.
In short, we think CISPA needs major surgery, we have shown how we think it could be performed, and we're asking the Committee to do this particular operation in public.
The Cyber Intelligence Sharing and Protection Act (CISPA, or H.R. 624) has a number of fundamental flaws that threaten civil liberties. The bill is intended to give companies in the private sector clear authority to share more cyber threat information. CDT supports more cybersecurity information sharing. However, CISPA goes overboard in the authorities it grants, it lacks critically necessary civil liberties protections, and it inadvertently authorizes and immunizes conduct that itself constitutes a cybersecurity crime.
We were disappointed when the authors of the legislation re-introduced the same bill that passed the House last year only to stall in the Senate. Nothing was changed to address the many concerns that privacy groups had identified, nothing was changed to address the privacy concerns that drew a White House veto threat, and none of the privacy amendments that the Senate adopted when it considered its own cybersecurity bill were included in CISPA this year.
We are committed to finding the best way to facilitate information sharing between private sector companies and, under appropriate limits, with the government. We believe that the best way to further the public debate about CISPA is to be transparent about what we see as the critical problems in the bill and what we think are the solutions to those problems. Therefore, we are publishing a two-page document identifying eight critical problems in CISPA, with a solution to each. We are also publishing a redline of the bill that shows how it would change if our solutions are adopted. We are conveying these proposals to all members of the House Intelligence Committee.
Our fixes to CISPA would:
While we hope that the transparency and public debate that we promote today by releasing these documents will lead to significant improvements in the legislation, we are under no illusions: CISPA has fundamental flaws and we seek significant changes. If they are not made, CDT will continue to oppose the bill.
We also urge the House Intelligence Committee to open its process to the light of day. Last year, the Committee conducted the mark up of CISPA in secret. This fosters distrust and public misunderstanding. This year, it should hold an open mark up of CISPA. Amendments should be published in advance, so they can be assessed.
In short, we think CISPA needs major surgery, we have shown how we think it could be performed, and we're asking the Committee to do this particular operation in public.