{"id":3823,"date":"2010-03-30T12:04:42","date_gmt":"2010-03-30T16:04:42","guid":{"rendered":"https:\/\/blacknell.net\/dynamic\/?p=3823"},"modified":"2010-03-30T12:04:42","modified_gmt":"2010-03-30T16:04:42","slug":"just-trust-us","status":"publish","type":"post","link":"https:\/\/blacknell.net\/dynamic\/2010\/03\/30\/just-trust-us\/","title":{"rendered":"Just Trust Us"},"content":{"rendered":"<p><a href=\"http:\/\/www.opencongress.org\/articles\/view\/1773-Senate-panel-passes-Cybersecurity-Act-with-revised-kill-switch-language\">This<\/a> is just one of many reasons why you should be contributing to the <a href=\"http:\/\/eff.org\">Electronic Frontier Foundation<\/a>:<\/p>\n<blockquote><p>A couple weeks ago, Sen. Rockefeller partnered with\u00c2\u00a0Sen. Olympia Snowe\u00c2\u00a0to introduce a major revision to the bill that, among other things, made changes the emergency \u00e2\u20ac\u0153kill switch\u00e2\u20ac\u009d provision. The revision was adopted by the committee last Thursday and the bill was approved. It\u00e2\u20ac\u2122s now ready for consideration by the full Senate.<\/p>\n<p>The revised bill would require the President to develop an \u00e2\u20ac\u0153emergency response an restoration\u00e2\u20ac\u009d plan with the help of private industry and other government agencies, but it is vague enough that it does not actually limit what the plan can include. The President would still have authority to declare an emergency and implement the plan without first seeking congressional approval, though he would have to report to Congress within 48 hours after declaring an emergency. The revised bill also doesn\u00e2\u20ac\u2122t require the plan to be made public, so it could potentially give the President the same authority to restrict internet access as the original bill did, just without being explicitly and publicly stated in the legislation itself.<\/p><\/blockquote>\n<p>I&#8217;m sure people like <a href=\"http:\/\/en.wikipedia.org\/wiki\/John_Michael_McConnell\">former DNI Mike McConnell<\/a> will trot out their <em>cyber<\/em>scare stories (see this <a href=\"http:\/\/www.wired.com\/threatlevel\/2010\/03\/cyber-hype\/\">great piece<\/a> on how anyone using &#8220;cyber&#8221; is usually full of it.) declaring just how essential it is that we lock down the Internet. \u00c2\u00a0Not too long ago, McConnell was <a href=\"http:\/\/www.washingtonpost.com\/wp-dyn\/content\/article\/2010\/02\/25\/AR2010022502493.html\">out pushing this line<\/a>:<\/p>\n<blockquote><p>We need to develop an early-warning system to monitor cyberspace, identify intrusions and locate the source of attacks with a trail of evidence that can support diplomatic, military and legal options \u00e2\u20ac\u201d and we must be able to do this in milliseconds.\u00c2\u00a0<em>More specifically, we need to re-engineer the Internet to make attribution, geo-location, intelligence analysis and impact assessment \u00e2\u20ac\u201d who did it, from where, why and what was the result \u00e2\u20ac\u201d more manageable.<\/em> The technologies are already available from public and private sources and can be further developed if we have the will to build them into our systems and to work with our allies and trading partners so they will do the same.<\/p><\/blockquote>\n<p>Wired&#8217;s Ryan Singel <a href=\"http:\/\/www.wired.com\/threatlevel\/2010\/03\/cyber-war-hype\/\">helps clarify<\/a> that:<\/p>\n<blockquote><p>Re-read that sentence. He\u00e2\u20ac\u2122s talking about changing the internet to make everything anyone does on the net traceable\u00c2\u00a0and geo-located so the National Security Agency can pinpoint users and their computers for retaliation if the U.S. government doesn\u00e2\u20ac\u2122t like what\u00e2\u20ac\u2122s written in an e-mail, what search terms were used, what movies were downloaded. Or the tech could be useful if a computer got hijacked without your knowledge and used as part of a botnet.<\/p><\/blockquote>\n<p>Yeah, I think I&#8217;m going to pass on the advice of industry players that have devoted their lives to concealing the truth from the public. \u00c2\u00a0I just fear that they&#8217;ll be as successful with this effort as they have been before. \u00c2\u00a0That is, they never do manage to <em>actually<\/em> conceal the truth. \u00c2\u00a0All they need to do is convince enough of the generally-uninterested public to trust their version, and the public will go along with it. \u00c2\u00a0And, for the most part, that&#8217;s been a massively successful strategy. \u00c2\u00a0 I used to think the Internet would help put an end to that. \u00c2\u00a0But more and more it looks like that might help put an end to the Internet.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This is just one of many reasons why you should be contributing to the Electronic Frontier Foundation: A couple weeks ago, Sen. Rockefeller partnered with\u00c2\u00a0Sen. Olympia Snowe\u00c2\u00a0to introduce a major revision to the bill that, among other things, made changes the emergency \u00e2\u20ac\u0153kill switch\u00e2\u20ac\u009d provision. The revision was adopted by the committee last Thursday and [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"ngg_post_thumbnail":0,"activitypub_content_warning":"","activitypub_content_visibility":"","activitypub_max_image_attachments":4,"activitypub_interaction_policy_quote":"anyone","activitypub_status":"","footnotes":""},"categories":[7,4,3,14],"tags":[],"class_list":["post-3823","post","type-post","status-publish","format-standard","hentry","category-content-distribution","category-law","category-society","category-tech"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/blacknell.net\/dynamic\/wp-json\/wp\/v2\/posts\/3823","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blacknell.net\/dynamic\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blacknell.net\/dynamic\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blacknell.net\/dynamic\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/blacknell.net\/dynamic\/wp-json\/wp\/v2\/comments?post=3823"}],"version-history":[{"count":1,"href":"https:\/\/blacknell.net\/dynamic\/wp-json\/wp\/v2\/posts\/3823\/revisions"}],"predecessor-version":[{"id":3824,"href":"https:\/\/blacknell.net\/dynamic\/wp-json\/wp\/v2\/posts\/3823\/revisions\/3824"}],"wp:attachment":[{"href":"https:\/\/blacknell.net\/dynamic\/wp-json\/wp\/v2\/media?parent=3823"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blacknell.net\/dynamic\/wp-json\/wp\/v2\/categories?post=3823"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blacknell.net\/dynamic\/wp-json\/wp\/v2\/tags?post=3823"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}