Tuesday, February 1, 2011

Controversial projects: the debate about the Internet-off switch flares up again

Barack Obama-like decision-making power over the Internet should have, as demonstrated Hosni Mubarak recently in Egypt? Yes, find members of a Senate Committee on Homeland Security - and send the controversial "kill switch" law again in the race. You do not let up: For the fifth time will be U.S. Senators bring in a few days a bill on the way that will give the U.S.

president a kind of "emergency switch" for the Internet to your hand. The U.S. president is so hats can a simple way to connect to America worth protecting so-called critical infrastructures. Specifically: A specially established for this purpose, authority, would then also against private companies reported.


How can work well and complete something, just get the parliamentarians on the basis of a negative example demonstrated, protested against the explicitly including President Barack Obama presidential statement was well on the Internet late last week in Egypt shut down normal. But the stock market may continue to be wired and the rest of the country is currently reflected in pre-Web times.

But as far-reaching to go not the president's powers in this latest version of the "Kill Switch" application. The proponents of the circle of the Committee on Homeland Security sitting senators, it's all about off the strategically important infrastructure to be able, when it comes to cyber-emergencies is: these are thus find networks of government agencies and military and networked structures of water - or other energy management and the functioning of the modern state vital industries.

Typically, large parts of these critical infrastructures are not in government control, but are privately organized - and therefore deprived of the direct influence of the state and its authorities for a good piece. Hence the idea of the emergency stop switch, which will include the independent Senator Joe Lieberman aired in monotonous regularity.

For similar legislative proposals were in the last year and a half failed several times: The first two versions were not a majority, Lieberman's attempt in June 2010 was then the acting president Barack Obama explicitly rejected. The Senate committee, however, made the slogan "Who would not, who must" adopt the law and brought a new look again at the end of the road.

The Senate committee passed it with flying colors - and then miss the deadlines in the Parliament and to fizzle again. Now it will create the fifth infusion, giving Obama a power that he does not want. The law, which nobody wants to actually define, in its latest version of the "Protecting cyberspace as a National Asset Act, more particularly, that it's not a stick for the Internet goes, but" only "for control of the basic infrastructure.

The re-start not only brought civil rights and privacy organizations in the United States won again on the palm: An unprecedented broad-based alliance of prestigious organizations such as the American Civil Liberties Union, the Electronic Frontier Foundation and the Berkman Center for Democracy & Technology through to American Library Association and civil-gun lobby Citizens Committee for the Right to Keep and Bear Arms protested publicly against the bill.

Sounds hard feelings for them include a clause that excludes the government for its decisions in the context of the law from all liability. Relevant as it is especially interesting because the criteria such as information resources by which a government should determine, in general, that whatever kind cyber emergency exists in fact, are defined in any way.

This would make the law a "Switch-off on suspicion of" making possible, without fear of financial consequences have to - and thus allow decisions to lord of the manor. Cyberwar is difficult to prove There are usually about the origin and nature of cyber attacks, possibly more or less well-founded suspicions.

For example, there remains also the proof about who carried out the so-called Google attacks, over 100 in the course of around 14 months of top American companies have been victims of industrial espionage. U.S. intelligence agencies suspect the culprit in China - is proving difficult. Criminal attacks are almost indistinguishable from war, blurred the boundaries, the methodology is the same.

In recent Symantec report on trends in the Internet pointed to the well-known security companies that are still most commonly referred to as cybercrime and cyberwar recorded attacks have their origin in the United States. Also because of the uncertainties connected with this issue and end the uncertainty Obama administration argued last summer that sufficient laws and agencies were present to respond appropriately to such threats.

The Americans are betting on cooperation between business and government, and the concentration of IT security issues are represented in the so-called Cyber-Command, the intelligence services and military. The timing for the re-filing of the application called the weekend scoffers on the scene: It is indeed difficult to imagine that the U.S.government, while Hillary Clinton demands to give up Egypt's Internet censorship.

No comments:

Post a Comment