Inherent Autonomy

CISA Systemic Domestic Spying

Inherent Autonomy Introduction
. . . . . No Despotism . . . . . Only Independence
Primacy: The Declaration of Independence
In the beginning: Let there be the Articles of Confederation
A Constitution Flawed from Inception
Articles of Confederation was Preferable
Investiture of Heretical Doctrine
The Nature of a Republic
A Culture of Death Under the Law
Two Causes, Two Results
A Senate of Subversion
The Court and your Castle
The Meaning of Independence Day
This Streetcar Lost All Desire
Why Supreme Court Selections are a False Choice
Paris is Burning
The many faces of the anti-war movement
2006 Predictions and Realities
Running Chinese Trade Deficits
Localism for a Free Republic
A Fractured Conservative Movement
Wall Street Reaps Big Bucks from the Wind
Baboon Behavior Behind Wind Projects
Party Goers - What Do You Take With Your Tea?
Assault on Liberty Originate with Secular Humanism
The TUN - a true representative council
Currency Wars among Controlled Economies
Web Attack Bodes Political Censorship
Protect Government Officials at all costs
Populism, Progressives and Public Unions
"Girlie Man" Culture of Government Schools
Midget Minds and Lost Cojones
Monetary Revolution and Alternative Money
The Federal Government Declares War on the Nation
Corporate Cronyism: Solyndra and Evergreen Solar
A True Greek Tragedy - Odyssey of the EU
A Christmas Wish List for Obama
Obama's War on the Catholic Church
The EPA an Out of Control Monster
Homeland Security in the Land of the Free
Pride in America the Stupid
Is Going Off the Grid Practical?
Political Partisan Psychological Disorders
Popular Culture Promotes the Police State
A $14 Trillion Extortion for a Global Warming Scam
Ignoring Whistleblowers
Human Liberty Is Doomed
Amnesty Capitulation Assures a Failed Society
The Actor and Clown Culture
Conservative Civil Liberties
Hobby Lobby and the Supreme Court
Technology Impact on Privacy
TV Propaganda and the Mind Control Culture
Secession Movements Intensify
Hate Laws Intended to Silence Truth
The Fourth Amendment, NSA and Metadata
The Ugly Face of the North American Union
The Dragoons Sweep the Streets
Media Message Predetermined the Scottish Referendum
Court Protects IRS Tyranny
Russia's Sergey Lavrov Clash of Civilizations
New World Order Pope - Frankie the Fake
Patriotism and Civil Disobedience
Best Government - Governs Least
The Patriot Act is now USA Freedom Act
SCOTUScare from the Same-Sex Supreme Court
Obama's Iran Nuclear Deal
Defending National Sovereignty from the NWO
CISA Systemic Domestic Spying
Jewish Banksters Identity Politics
Why Civil Liberties are No Longer Defended?
National Referendum on the Globalist Establishment
Fear of America First by GOP Establishment
Brexit Victory over the EU Globalists
Current Affairs becomes a Sinister Melodrama
UN Intervenes into American Society
Leftist Loons Want a Civil War
BREAKING ALL THE RULES
BREAKING ALL THE RULES Forum
hub
BATR Index
Forbidden History
Reign of Terror
Stuck on Stupid
Totalitarian Collectivism
Radical Reactionary
Global Gulag
View from the Mount
Strappado Wrack
Solitary Purdah
Dueling Twins
Varying Verity
911 War of Terror
HOPE
M A R K E T S
Mercantile
Corporatocracy
Negotium
Tek
Despotism
LIBERTY
PysOps
RealPolitik
WAR
Foreign Policy
Middle East
AMERICA FIRST
NWO Realpolitik
Gazette
Critique
Forum
Law
Erudite
Chaos
Conundrum
Existentialism
Existentialism Philosophy Blog
Media
Flicks
Culture
Immigration
Diversity
Partners
Links
Polls
ABOUT
Reach Me

“CISA will do very little, if anything, to protect our national cyber-security interests” Ben Johnson

stop_cisa.jpg

CISA Systemic Domestic Spying

Technology in cyber space is designed to be the instrument of a totality surveillance society. Secretive methods, back doors, observation and collection of data have been in place for decades. CISA is the latest legislation authorization agreement that provides liability exemption for law enforcement and spooks to conduct their systematic assimilation with the codes and functions of technological development for the intended purpose of efficient monitoring of electronic communication.  

Coercion for compliance from any resisting tech giant will provide the government with the brute force to muscle their way past any remnants of Fourth Amendment Bill of Right protections.

The fact that there is so much enthusiasm in Congress to further gut civil liberties comes as no surprise but is frightening that the push back is so weak.

Senate overwhelmingly passes historic cybersecurity bill is reported by CNN accordingly, “It took several tries, but on Tuesday the U.S. Senate approved a measure to help American companies work more closely with law enforcement to fight off hackers. The Cybersecurity Information Sharing Act (CISA) overwhelmingly passed with a vote of 74 to 21.”

The S.754 - Cybersecurity Information Sharing Act of 2015 summary is provided online.

(Sec. 3) Requires the Director of National Intelligence (DNI), the Department of Homeland Security (DHS), the Department of Defense (DOD), and the Department of Justice (DOJ) to develop and promulgate procedures to promote: (1) the timely sharing of classified and declassified cyber threat indicators in possession of the federal government with private entities, non-federal government agencies, or state, tribal, or local governments; (2) the sharing of unclassified indicators with the public; and (3) the sharing of cybersecurity threats with entities to prevent or mitigate adverse effects.

As with so much of the language used by government to sanitize the real functions of providing legal cover for unlawful practices by passing additional unconstitutional laws, CISA is a true Trojan horse. Regretfully, your virus protection will not protect your computer content or privacy.

This is how the mainstream media is framing the “so called” intent and purpose of the legislation. U.S. Senate approves measure to help companies work with law enforcement to fight hackers.

“The bill calls for "real-time" sharing. Companies in a hurry might not wipe the data enough before law enforcement gets it, expanding how much they know about Americans.

Those jumbles of code known as "cyber threat indicators" could still be revealing about Americans' daily lives.

DHS isn't allowed to wipe personal data if another agency, like NSA, objects.

And even though law enforcement is only allowed to collect "cyber threat indicators," cops can use them to investigate "an imminent threat of death," bodily harm, economic harm and "terrorist" acts.

"It creates the wrong impression about what this bill does," said Jeff Greene, a top policy attorney at Symantec who wants that language cut out of the bill.

Perhaps most importantly, companies that share too much -- and accidentally harm their customers -- are protected from lawsuits. A key provision in CISA is the complete elimination of liability for companies that share data. Last week, U.S. Senator Rand Paul warned, "It makes your privacy agreement not worth the paper it's written on."

The Presidential campaign for Rand Paul falters not because he is wrong about defending personal liberty, but because so many Americans are oblivious or reconciled to the treason of the District of Criminal political class. Disconnect is obvious and grows worse with each passing year and little ever improves. Actually, it is hard to remember when the last time a true victory came out of the Federal government.

CISA is a prime example of public apathy in an environment of voluntary Facebook disclosure using the countenance of “PC” algorithm censorship.

Objection to additional violations of privacy measures that confuse the masses, while empowering the authoritarians further is expressed in the reasoned position by the Electronic Frontier Foundation. Their assessment is spot on in, EFF Disappointed as CISA Passes Senate.

“The conference committee between the House of Representatives and the Senate will determine the bill's final language. But no amount of changes in conference could fix the fact that CISA doesn't address the real cybersecurity problems that caused computer data breaches like Target and the U.S. Office of Personnel Management (OPM).

The passage of CISA reflects the misunderstanding many lawmakers have about technology and security. Computer security engineers were against it.  Academics were against it. Technology companies, including some of Silicon Valley’s biggest like Twitter and Salesforce, were against it. Civil society organizations were against it. And constituents sent over 1 million faxes opposing CISA to Senators.”

If so many tech companies and factions express their opposition to this draconian legislation and can be ignored so easily, how can average Americans protect their most personal information? Well, the most basic common sense safeguard is to be extremely guarded with any aspect of your life that is freely placed online.

In an age of computerization germinating into an artificial intelligence matrix of human replacement, the cause of maintaining the essence of individual identity may well require carving out a wilderness reclusive retreat. However, how many people will drive their range rover with GPS tracker and an iPhone to their secret hideaway?  

Most people are acclimated to the socialization of popular culture. Addicted to smart phone trivia is a prime exemplar of technology gone awry. Nevertheless, the notion that devices are neutral and are not often designed to embody intrinsic dehumanization is a foreign concept to the trendy crowd.

However, that is exactly where high-tech corporatists are herding the sheeple into the pit of self-induced conformity and submission. Here is where the security hysteria of government imposition tyranny becomes routine in a society that has lost all self-respect.

When Edward Snowden warns that “The NSA has built an infrastructure that allows it to intercept almost everything”, CISA encodes an unconstitutional legality for a domestic spying integration with tech companies and ISP providers that expedites the collection and storage of electronic digital data on ANYONE.

This is the operational purpose of despotic agencies that once were charged with legitimate foreign intelligence gathering that has redirected their capabilities on their new enemy “Patriots”, now called domestic terrorists. The hidden translation in their ciphers is that citizen dissenters are the targets of their echelon antennas and dishes.

The use of StingRay, an IMSI-catcher (International Mobile Subscriber Identity), is a controversial cellular phone surveillance device that fits nicely under the CISA umbrella. Now that it is disclosed, IRS possessed Stingray cellphone surveillance gear, documents reveal; isn’t it convenient that CISA will indeed facilitate sharing for the benefit of added government control. No doubt DHS can be trusted? RIGHT . . . just like the IRS did not target conservative groups.

People need to get serious about the number one threat from the terror coming out of their own government. Congressional arrogance and Senate hubris in passing CISA has become the new normal. Close behind are the likes of Facebook, who may be the secret force behind the surveillance bill “CISA”. 

  • All privacy policies effectively null and void. Companies can share any private user data with the government, without a warrant, as long as the government says it is being used for a “cybersecurity” purpose.
  • In exchange, companies are given blanket immunity from civil and criminal laws, like fraud, money laundering, or illegal wiretapping (if a violation was committed or exposed in the process of sharing data).
  • Data is shared with a wide array of government agencies, from the FBI and NSA, to the IRS and local law enforcement. Many of these agencies have been breached within the last year and have outdated security systems, opening up the doors to even more cyber attacks.
  • Companies that play along can get otherwise classified intelligence data from the government, including private information about their competitors. 

This is the future of the total surveillance state. Those corporatist companies that actively seek to extract the substance of personal identity for use as a marketing asset need to be exposed and punished for their betrayal of trust. When Mark Zuckerberg once called Facebook users “dumb f*cks” for trusting him with their data, he exposed himself for the scumbag that he is.

Technology of personal privacy destruction is a curse. Marry that engineering with the insatiable appetite of the NSA Spying on Americans, and you have a formula for a system of individual identity obliteration.

Establishing and instituting legitimate cybersecurity is a function of inventing and fostering the actual solutions to protect the nation, its businesses and the public. Rewarding a corporate accord for disclosing real time information to the DHS with blanket liability immunity is one additional step towards a complete Fascist union.

Even if the Fourth Amendment is not a top priority for government worshipers, the dehumanization of one’s own dignity should give pause for anyone who still has the ability to look in the mirror. CISA only protects the power establishment as it exposes and exploits your inner most secrets.

SARTRE – November 3, 2015  

Subscription sign-up for the BATR RealPolitik Newsletter

Discuss or comment about this essay on the BATR Forum

“The way things are supposed to work is that we're supposed to know virtually everything about what they [the government] do: that's why they're called public servants. They're supposed to know virtually nothing about what we do: that's why we're called private individuals.”  Glenn Greenwald

BATRforum.gif
Join the BREAKING ALL THE RULES Public Forum

World_At_War200.jpg

Subscribe to Newsletter daily updates

© 2000-2016 by BATR All Rights Reserved

batr6420019161562077743551272v.gif
BATR Index Page

tumblr visit counter