Imagine, if
you will, a world where your personal information is tattooed upon your
forehead; clearly visible to all who see you.
Everything that has ever been recorded about you put on display without
your permission. Such a world would
allow anyone to access your most confidential information and use it as they
please. Now, you may be thinking to
yourself that such an idea is clearly fictional and would never happen in real
life. I long for the days when that
sentiment was true, nothing like this could happen. Times have changed and so have technology;
all of a sudden this fictional world is becoming a reality. No, no one is going to make you tattoo your
social security number to your forehead or write your medical history on your
arm. However, steps are being taken to make such information easily accessible
by any and all corporations. The worst
part is, we are more than happy to let it happen. Why? Because of terrorism,
that’s why.
Image from WebProNews |
Wikipedia's Homepage during Operation Blackout Image from membrane.com |
It wasn’t
long before sites like Wikipedia and Reddit began forming plans for an online
protest in the form of a blackout. A major hacktivist group known as Anonymous dubbed the movement Operation Blackout. On
January 18th, 2012, a multitude of websites blacked out their
homepages, including a few lines of text explaining the dangers of SOPA and the
need to take action. The blackout was an
incredible display of the ability of users to come together and defend their
rights. Unfortunately, not everyone was
pleased with the protests. Free.com reports Former Sen. Chris Dodd, CEO of the Motion Picture Association of
America, calling the protests "an abuse of power."
” ‘It’s a dangerous and troubling development when the platforms that serve as
gateways to information intentionally skew the facts to incite their users in
order to further their corporate interests,’ his statement said.” Despite
the former senator’s view, the blackout was actually quite successful. It raised awareness of the act by a
significant amount and contributed to several major companies withdrawal of
support for the act.
Since
SOPA’s eventual rejection, the sense of urgency felt by those participating in
the blackout has begun to fade. A
victory was won that day for Internet users worldwide. We had won the battle, but it was naïve to
assume we had won the war. There is no
clearer evidence of this than the presence of CISPA. CISPA looms over the Internet, darkening its
future and the lives of its users. While
such descriptions may seem a bit exaggerated, one need only examine the bill
further to feel the icy realization of CISPA’s implications. The bill itself directly states that
“[private information may be shared] notwithstanding any other provision of
law.” In simpler terms, this means that
CISPA is above any previously passed legislation that serves to protect one’s
online privacy. If that does not send
chills down your spine then I suggest you keep reading. A bill that can go
above all others has serious implications for the public.
Infographic from cyberspying.eff.org |
I recently had the good fortune of
coming across an infographic which captured CISPA’s idea rather nicely. According to said infographic, CISPA means
that “access to any information regarding a "cyber threat" is granted to the government, private security
agencies, and private companies". To most people, such an explanation would not
seem to be cause for concern. Who could
argue with a government that simply wants to protect us from cyber threats? As wonderfully comforting as this sounds, the
government has little interest in protecting us with this bill. CISPA defines a cyber threat as “efforts to degrade, disrupt,
or destroy government or private systems and networks” as well as “theft or misappropriation of private or government
information, intellectual property, or personally identifiable information.”
Once again, such wording is intended
to inspire confidence and reassure users that their best interests are being
looked after. Upon closer inspection
however, the bill’s transparency is all too obvious. One of the definitions for a cyber threat
includes misappropriation of intellectual property. Once again we run into the same issue we had
with SOPA. Intellectual property can
mean anything from the picture I made in Photoshop to the idea for a
website. Such a definition is vague and
can be applied to almost anything.
Once a user has been flagged as a
potential cyber threat, his data may then be shared with the government,
private security agencies, and private companies. Any and all data concerning the user in
question may be freely distributed under CISPA to help protect against a
potential cyber threat. This makes it
possible for Facebook and other sites to suddenly obtain considerable amounts
of personal information about you that they otherwise would not be able to
access. As if this wasn’t bad enough,
under CISPA, if you are seen as a threat neither the government nor any private
companies are obligated to notify you in any way. They are free to pass around the most
sensitive data they have on you without so much as a courtesy email explaining
why you are suddenly considered a threat to the nation. Also, if an error occurs and some of your
information is misinterpreted or you are falsely accused of committing a cyber
crime, you have absolutely no ability to take legal action. As stated before, you may not even know that
you are being monitored for a crime in the first place.
Using the vague definitions
outlined in the CISPA bill, the government and many private companies will be
free to gain access to any and all information about you. If SOPA was the end of free speech on the
Internet, then CISPA is the end of privacy on the Internet. To borrow a term from George Orwell’s 1984,
it seems as if Big Brother truly is watching us. In 1984, Big Brother kept an eye on
the people by watching them constantly through the telescreens each person was
required to have in every room. These
methods of constant surveillance and an all-knowing authority figure have long
since been discussed in English classes as elements of fictional
literature. It is time to stop viewing
such things as fiction and face the facts.
A bill like CISPA would essentially convert our computers into
telescreens, allowing the government officials and corporations to watch our
every move. Big Brother is real, the
government is striving every day to extend their power over us.
We may have beat SOPA, we may even beat
CISPA, but what will come next? We
cannot simply keep fighting these battles without realizing that they are a
part of a larger war; a war on our rights.
As I mentioned before, there are many times when we are all too happy to
throw our support behind the government.
Ever since the events of 9/11, the United States government has gone
into full attack mode in regards to terrorists.
Every move they make is to prevent terrorists. It seems that the government need only hint
at terrorists and voters are all to willing to vote yes without even reading
the fine text. SOPA used piracy to seem
noble and just, and now CISPA is claiming to prevent acts of cyber
terrorism. Such bills may very well be
able to impact terrorism’s presence in the U.S. however, at what cost? What are you willing to give up in order to
sleep better at night?
1.) Does the essay make a clear argument?
ReplyDeleteYes
2.) Find on sentence that you think best describes the thesis of the blog essay.
The source of my concern is the Cyber Intelligence Sharing and Protection Act, better known as CISPA. CISPA is the government’s latest attempt to infringe upon our rights and rob us of our privacy.
3.) Does the article clearly identify a problem so that the reader understands who was involved, what happened, where it happened, when and why?
Yes the article clearly defines CISPA as the problem and goes into detail about its origins.
4.) Does the article provide plenty of level-1 abstractions to support their argument?
Yes, however a few more wouldn’t hurt
5.) Are there any images or video in the essay? If so, are the significances of all videos and images clearly explained in the essay?
Yes, the author made great use of images and video. I particularly liked the first image that relates to V for Vendetta.
6.) Are their any claims in the essay that you are skeptical of?
No
7.) Are the aspects of the essay that you found to be very interesting or effective?
I liked the opening; it was an effective way to get me interested in the topic.