Steve Lendman blog February 21 2013
Department of Homeland Security Secretary Janet Napolitano revealed September 19 that an executive order granting the president sweeping power over the Internet is “close to completion.”
Testifying before the Senate Committee on Homeland Security and Governmental Affairs, Napolitano said that the order is still “being drafted” and vetted by various high-level bureaucrats. But she also indicated that it would be issued as soon as a “few issues” were resolved. Assuming control of the nation’s Internet infrastructure is a DHS responsibility, Napolitano added.
“DHS is the Federal government’s lead agency for securing civilian government computer systems and works with our industry and Federal, state, local, tribal, and territorial government partners to secure critical infrastructure and information systems,” she informed senators.
Precisely which clause in the Constitution grants to the president specifically or the executive branch (of which DHS is a part) generally authority to exercise any sort of oversight of such matters was not cited by Secretary Napolitano.
Naturally, a document written 225 years ago would not include a reference to cybersecurity, but the principles of enumerated powers and limited government apply to any program or project of the federal government. According to the contract that created the three branches of the federal government, none of those departments may do anything unless specifically granted that authority in the Constitution.
This is a principle of constitutional interpretation often overlooked. Those promoting a larger government with increasing influence on the lives of private citizens commonly defend government growth by insisting that “nothing in the Constitution forbids us from doing” whatever federal program they are advocating.
Such a theory is contrary to that held by the Founders. As James Madison explained in The Federalist, No. 45:
Across the world, from Boston to Calgary, Oakland to Cairo, people are getting together and learning the basics of digital encryption. During a time when personal privacy is threatened by cybersecurity bills and executives measures all in the name of the war on terror, the government and even private third-parties can easily pry at your online history. At homegrown cryptoparties, though, people can come together and share the tools that are necessary and the know-how that is needed to protect one’s own privacy online. RT’s Andrew Blake explains.
Natural News ~ It is likely no coincidence that on the verge of President Obama’s plan to sign an unconstitutional Executive Order (EO) implementing police state cyber security measures, the internet gets hit with one of the worst DDoS attacks ever perpetrated. Today, GoDaddy got “nuked” with a highly-coordinated DDoS attack, taking down its name servers, websites, hosted email and all its internal phone systems. (See original story here.)
The mainstream media is blaming “Anonymous” for the attack, but this is almost certainly a cover story. The problem with being an anonymous group is that anyone can claim to be you. What’s even more revealing is that the attacker who claimed responsibility for the attack openly stated he is not part of Anonymous. His twitter name was “Anonymous Own3r,” eluding to the hacker slang of someone “owning” a selected target. This term is often used in online video games. It means this user is saying he achieved victory over Anonymous, not that he IS Anonymous.
The attack itself was devastating not only to GoDaddy’s customer base, but also to the reputation of Anonymous itself. That was probably the whole point: to make Anonymous look like a group of online terrorists when, in reality, the real Anonymous group historically only attacks selective targets with strong ties to the police state.
Across the mainstream media, from PC Magazine (http://www.pcmag.com/article2/0,2817,2409516,00.asp) to CBS News (http://www.cbsnews.com/8301-501465_162-57509744-501465/godaddy-goes-d…), the mainstream media is falsely reporting that “Anonymous” claimed responsibility for the attack. But that’s simply not true: the “Anonymous Own3r” user claimed responsibility for it. And he added, in a Tweet, these words:
The largest domain registrar on the Internet – GoDaddy.com – was taken offline on Monday, shutting down thousands and potentially million of users from websites hosted on affected servers. On Twitter, a person who claims to be affiliated with the loose knit Anonymous collective has taken credit for the attack, saying the action was necessary to test cyber security. RT web producer Andrew Blake breaks it down.
In the past few weeks, quite a few press releases have been issued regarding a Trojans attack being waged across Europe (mainly in Italy and Germany). In order to shed light on the matter, Versafe has decided to publish a detailed report that reveals the attackers’ method of operation.
Versafe is familiar with these kinds of attacks and experienced in preventing them. The company offers IT security solutions and products that enable real time detection of the attacks in real time, along with the shutdown of malicious drop zones.
Versafe’s clients have already been informed of the malicious injections and automatic transactions that have been taken place since May 2011. They will continue to receive relevant updates from the company and will remain continuously protected from future attacks.
To receive a copy of the Report, email, firstname.lastname@example.org
Just because SOPA and PIPA, the infamous internet “kill switch” bills, are largely dead does not mean the threat to internet free speech has become any less serious. The Cyber Intelligence Sharing and Protection Act (CISPA), also known as H.R. 3523, is the latest mutation of these internet censorship and spying bills to hit the U.S. Congress — and unless the American people speak up now to stop it, CISPA could lead to far worse repercussions for online free speech than SOPA or PIPA ever would have.
CNET, the popular technology news website that was among many others who spoke up against SOPA and PIPA earlier in the year, is also one of many now sounding the alarm about CISPA, which was authored by Rep. Mike Rogers (R-Mich.) and Rep. Dutch Ruppersberger (D-Md.). Though the bill’s promoters are marketing it as being nothing like SOPA or PIPA, CISPA is exactly like those bills, except worse.