Feeds

US House of Representatives passes CISPA by 288-127

Co-sponsor dismisses opponents as '14 year-olds tweeting'

Reducing security risks from open source software

The Cyber Intelligence Sharing and Protection Act (CISPA) has been approved by the US House of Representatives, despite a last-minute gaffe from its co-sponsor.

The 288-127 vote saw an increased majority from CISPA's first passage last April, with a broadly bipartisan turnout. CISPA was filibustered in the Senate but resurrected this year by Rep. Mike Rogers (R-MI), chairman of the House Intelligence Committee, and "Dutch" Ruppersberger, a Maryland democrat whose congressional district covers the home of the NSA in Fort Meade.

The legislation sets up as framework for federal government agencies to share information on security threats with private companies in order to help protect their systems. In return, private companies can choose to hand over user information (anonymized or not) to the government for "cybersecurity purposes" with full legal indemnity, whatever their terms and conditions say.

"CISPA is a poorly drafted bill that would provide a gaping exception to bedrock privacy law," EFF senior staff attorney Kurt Opsahl said in a statement. "While we all agree that our nation needs to address pressing Internet security issues, this bill sacrifices online privacy while failing to take common-sense steps to improve security."

Despite opposition, however, the bill looked to be an increasingly done deal as the vote approached. On Monday, 36 new congressional co-sponsors decided to add official support, and IBM said that it had flown in lobbying muscle to help push for CISPA.

"We're going to put our shoe leather where our mouth is," Chris Padilla, vice president of governmental affairs at IBM, told The Hill. "The message we're going to give [lawmakers] is going to be a very simple, clear message: support the passage of CISPA."

The technology industry broadly approves of CISPA, in that it might do some good and limits their liability, just in case. Facebook has been a vocal supporter, saying that the bill clarifies a lot of things and puts it under no onus to share its user's data with the government if it doesn’t want to. Of course, if it changes that view, it's unlikely the customers would be able to find out about it.

During the debate, Representative Rogers said that Silicon Valley CEOs supported him and opponents of were "people on the internet, a 14 year-old tweeter in the basement," just like his nephew who gave him aggravation for sponsoring the bill.

"Once you understand the threat, and you understand how the mechanics of it works, and you understand that people are not monitoring the content of your emails, most people go 'Got it, I'm in'," he said.

This prompted a flood of angry tweets from the vast majority of CISPA opponents who are over 14, live successful lives (many in the fields of security, computing and law), but who presumably don't count.

CISPA isn't in force yet. The Senate still has to pass legislation, and shows no sign of doing so. Even then, the President has sort-of threatened to veto the legislation as it stands.

"The Administration recognizes and appreciates that the House Permanent Select Committee on Intelligence (HPSCI) adopted several amendments to H.R. 624 in an effort to incorporate the Administration's important substantive concerns," the White House said in a statement.

"However, the Administration still seeks additional improvements and if the bill, as currently crafted, were presented to the President, his senior advisors would recommend that he veto the bill."

We shall see if he takes that advice. ®

Bootnote

Calling opponents names is an increasingly essential part of politics in America these days. To see how politicians can use the rapier rather than the cudgel in debate El Reg suggests checking out Wednesday's performance by New Zealand MP Maurice Williamson, a man who describes C++ coding as just below sex in terms of pleasure.

Maximizing your infrastructure through virtualization

More from The Register

next story
Yorkshire cops fail to grasp principle behind BT Fon Wi-Fi network
'Prevent people that are passing by to hook up to your network', pleads plod
Major problems beset UK ISP filth filters: But it's OK, nobody uses them
It's almost as though pr0n was actually rather popular
UK government officially adopts Open Document Format
Microsoft insurgency fails, earns snarky remark from UK digital services head
ITC: Seagate and LSI can infringe Realtek patents because Realtek isn't in the US
Land of the (get off scot) free, when it's a foreign owner
HP, Microsoft prove it again: Big Business doesn't create jobs
SMEs get lip service - what they need is dinner at the Club
MPs wave through Blighty's 'EMERGENCY' surveillance laws
Only 49 politcos voted against DRIP bill
EU's top data cops to meet Google, Microsoft et al over 'right to be forgotten'
Plan to hammer out 'coherent' guidelines. Good luck chaps!
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.