So, what will this cost? What's the source of the funding? I dunno about the source of the $$$, since it's not stipulated. Here are the FY2010 estimated costs; others are at the link:
- NSF Grants: $150,000,000
- Centers: $ 50,000,000
- Buildings: $ 40,000,000
- Tech grants:$ 5,000,000
- Training: $ 20,000,000
- Scholarships:$ 50,000,000
Is any of this shit legal? Can we get away with it? FUCK IT, WE'LL DO IT LIVE! (from Elfdart)
So this shit goes live for a full year before any verdict is reached on its legality? What. The. Fuck? Shouldn't this shit be vetted for legality BEFORE it goes to a vote? I guess it doesn't matter, or as Darth Sidious said:SEC. 16. LEGAL FRAMEWORK REVIEW AND REPORT. wrote:a) IN GENERAL- Within 1 year after the date of enactment of this Act, the President, or the President's designee, through an appropriate entity, shall complete a comprehensive review of the Federal statutory and legal framework applicable to cyber-related activities in the United States, including--
(1) the Privacy Protection Act of 1980 (42 U.S.C. 2000aa);
(2) the Electronic Communications Privacy Act of 1986 (18 U.S.C. 2510 note);
(3) the Computer Security Act of 1987 (15 U.S.C. 271 et seq.; 40 U.S.C. 759);
(4) the Federal Information Security Management Act of 2002 (44 U.S.C. 3531 et seq.);
(5) the E-Government Act of 2002 (44 U.S.C. 9501 et seq.);
(6) the Defense Production Act of 1950 (50 U.S.C. App. 2061 et seq.);
(7) any other Federal law bearing upon cyber-related activities; and
(8) any applicable Executive Order or agency rule, regulation, guideline.
"I will make it legal."
Then we get to section 17, the "Authentication and Civil Liberties Report" which in actuality has fuck-all to do with civil liberties:
Bye-bye anonymous logins on any government or "critical infrastructure" network! Hey, maybe that will cut down on government workers browsing for porn!SEC. 17. AUTHENTICATION AND CIVIL LIBERTIES REPORT. wrote:Within 1 year after the date of enactment of this Act, the President, or the President's designee, shall review, and report to Congress, on the feasibility of an identity management and authentication program, with the appropriate civil liberties and privacy protections, for government and critical infrastructure information systems and networks.
One of the Findings at the beginning of the bill cited foreign espionage as a reason for this bill's need. Logically, that would mean we should take action to keep foreign entities out of our government and "critical infrastructure" networks, right? WRONG!
Which foreign governments? The Israelis, who had a spy in the CIA (Pollard)? The Chinese, our Most Favored Nation trading partners, who do this all the time? France? Germany? South Korea? Japan? Gee whiz, why aren't the nations conducting espionage against US firms named in this bill? Is it because they're "allies" of the USA? A puzzle indeed.SEC. 21. INTERNATIONAL NORMS AND CYBERSECURITY DETERRANCE[[i]sic[/i]] MEASURES. wrote:The President shall--
(1) work with representatives of foreign governments--
(A) to develop norms, organizations, and other cooperative activities for international engagement to improve cybersecurity; and
(B) to encourage international cooperation in improving cybersecurity on a global basis; and
(2) provide an annual report to the Congress on the progress of international initiatives undertaken pursuant to subparagraph (A).
Now, earlier in the thread Darth Wong asked:
Here it is:Darth Wong wrote:For the second time, show us the part where it says Obama can shut down the Internet and take information from any private network at will. Is English not your first language or something? Do you not understand a simple request of that nature?
My initial impression that the Commerce Secretary would have carte blanche to snoop at will looks like it was wrong, and I'm more than okay with that. However, it's pretty fucking clear that the President can order the shutdown of pretty much ANY GOVERNMENT OR "CRITICAL INFRASTRUCTURE" network he wants, based on criteria and input that are defined by nobody but himself. Please note that I don't think Obama would do that on a whim, but as written that dictatorial authority exists. And there's no sunset clause, so any powers granted to Obama would accrue to future Presidents. I have T-Mobile as my only phone, and RoadRunner as my Internet/cable service; theoretically, I and everyone else on those networks could be cut off from external access at a word from Washington. Bam! No two-way communication and we are fuckee-fuckeed. About the only thing not included in this bill is the ability to control AM and FM or satellite radio transmissions (unless they're designated critical infrastructure).SEC. 18. CYBERSECURITY RESPONSIBILITIES AND AUTHORITY. wrote:The President--....
(2) may declare a cybersecurity emergency and order the limitation or shutdown of Internet traffic to and from any compromised Federal Government or United States critical infrastructure information system or network;
(6) may order the disconnection of any Federal Government or United States critical infrastructure information systems or networks in the interest of national security;
And finally, we get to a few definitions, such as the answer to "what the flying fucking monkey fart is a critical infrastructure information system and network?" And at long last, all is made clear:
Well alrighty then! I guess by this criteria Pasco County's Web site is critical infrastructure, since "Stormin' Norman" Schwartzkopf lives in Dade City and may be called on to serve again! Or perhaps Hillsborough County, home to MacDill Air Force Base and CENTCOM, is critical! In a "cyber-Katrina" event maybe Bright House should just shut down to prevent dastardly access to Central Command's servers![23](3) FEDERAL GOVERNMENT AND UNITED STATES CRITICAL INFRASTRUCTURE INFORMATION SYSTEMS AND NETWORKS wrote:The term `Federal Government and United States critical infrastructure information systems and networks' includes--
(A) Federal Government information systems and networks; and
(B) State, local, and nongovernmental information systems and networks in the United States designated by the President as critical infrastructure information systems and networks.
Frankly, this bill as it stands is simply breathtaking in its reach, scope and dictatorial authority, placed in the hands of one man. In scope, this is as far-reaching as the reviled Patriot Act but with more far-reaching ramifications in its ability to cut off access to information to wide swaths of the American populace.
I don't need calculus to figure this equation: Patriot Act + Cybersecurity Act = 1984 (if both are implemented to their full potential). If Obama signs this bill as it stands (assuming it passes the House unaltered), he'll be a one-term President, and the Congress and Senate will see unprecedented turnover in the next elections.