Author of controversial cyber espionage bill says it would let U.S. stop predators, not spy on its own
If there's something the author of the Cyber Intelligence Sharing and Protection Act wants you to know, it's that CISPA isn't about spying on ordinary Americans--it's about stopping China from stealing America's stuff.
"I've never seen something grow more exponentially serious than China's capabilities in cyber espionage," Congressman Mike Rogers said at a breakfast in Washington, D.C., Tuesday. "It is so prolific--it's breathtaking. In the last year, China has stolen so much intellectual property that it would be considered 50 times the print collection of the United States Library of Congress."
China is using those patents to become an "economic predator," he said.
The bill would allow the government to share all of its classified cyber-security knowledge with private companies, forming knowledge-sharing agreements that would hopefully keep China (and other countries and hackers) out of American computer networks. The catch is that the information shared is a two-lane street--companies would also be allowed to share private data with the federal government, provided there is a reasonable "cyber threat."
That last bit has made CISPA an increasingly controversial bill on Capitol Hill--critics say that the bill is overly broad and can allow the government to spy on personal E-mails and the web browsing habits of ordinary Americans. On Monday, the American Civil Liberties Union and the Electronic Frontier Foundation launched a "week of protest" to let Congress know that Internet users are concerned about their privacy.
Rogers doesn't see what the big deal is.
"At home on your laptop, you won't see any bit of a difference, other than you'll have the comfort that somebody ... has applied that malicious software filter on their systems so it's not getting through to your laptop computer," he said. "Pretty good stuff."
He says that recent meetings with privacy advocates have been productive.
Over the past several days, there have been indications that Congress is willing to back off some of the most controversial language in the bill. In the current version, most personal information would be stripped from data shared with the government, and the bill no longer defines intellectual property theft as something relating to national security.
"We think we're making huge progress with the privacy groups, so they understand what we're trying to accomplish, which isn't anything nefarious," Rogers said. "We've found that sweet spot."
But just because your personal information can be stripped from the data doesn't mean that it will be. "Your personal data can be minimized in this as needed," he said. "In some cases, you'll want that personal data, because something [malicious] is embedded in it."
- Taking a Break from Emails Decreases Stress
- New Facebook Effort Targets Educating School Counselors
- Verizon's High-Speed Internet Collusion
- RapidShare: Megaupload File-Sharing Pirates Are Unwelcome
- Twitter Cuts Two Ways
- China's Cyber 'Predators' Must Be Stopped
- CISPA Lacks Protections for Individual Rights
- CISPA Not the Right Way to Achieve Cybersecurity
- CISPA Effectively Addresses Threat of Cybercrime
- Dawn of the Phablet
- Price-Fixing Suit Could be a Spot on Apple
- Avoiding Fragmented Infrastructure in the Data Center
- Internet Service Providers Close to Implementing System to Punish Piracy
- Inside the Silicon Valley Gender Gap
- Why the FCC Fined Google Just 68 Seconds in Profits
- Is There an Internet Off Switch?
- Power of the iMob
- Widespread Android Virus Could Hide in Popular App Updates
- Under the Hood: A Look Inside the Ultrabook
- That's Entertainment: 3D Leaps From Theater to Home
- Are You a Tech Geek?
- Is Your Office Preparing For an iPad Insurgency?
- How to Find Happiness on Social Networks
- The Pirate Bay to Fly 'Server Drones' to Avoid Law Enforcement
- DevOps: Indispensable Approach or Costly Distraction?
- New Programming Languages to Watch
- How to Conquer Tech Buyer's Remorse
- Trade in Your Old Gadgets for Cash or Credit
- Why the New iPad Features Don't Really Matter
- Chinese Computer Games
- Why Do We Need Intelligent Desktop Virtualization?
- Lawsuit Says Facebook Tracks Users After Logging Out
- Facebook and Twitter Cause Insider Trading Headaches for the SEC
- Avoid Social Media MBAs, Some Students Say
- 5 iPhone Apps I Cannot Live Without
- The New Mobile Landscape
- Is Free Public Wi-Fi Safe?
- Keep Your Data Safe When Telecommuting
- Security Issues for Multicore Processors
- How to Reduce Smartphone Security Risks
- Are You Too Snarky Online?
- Who's Gawking at Your Photos?
- Is Social Media a Waste of Time?
- 5 New Ways to Feed Your Online Addiction
- Investors Increasingly Tap Social Media for Stock Tips
- McAfee's Edward Metcalf Shares Hybrid Rootkit-thwarting Strategy
- A Game Plan for Protecting Stored Data
- Think Big When It Comes to Data Breaches
- Information Security MBA's Teach Business Side of Cybersecurity
- Apple Predicts 'Death of the Big Backpack' with New iPad Textbooks
- FBI Wants to Monitor Social Media for 'Emerging Threats'
- Youth on the Web: Reason? Who Needs a Reason
- Google Unveils 'Find My Face' Recognition Tool
- Why Investors Should Keep Their Eyes on the Cloud
- 10 Ways to Stay Safe While Shopping Online
- Take Advantage of Free Shipping Deals This Holiday Season
- Online Shopping Deals Hurt State Budgets
- Tips for Shopping With Your Smartphone
- Seven Rules of Successful Bloggers
- Twitter Redesigns Site, Aims for Simplicity
- 3 Ways to Use Foursquare to Connect With Your College
- United States Reacts to Indian Government's Efforts to Censure Online Content
- Will Apple Be the Same Without Steve Jobs?
- Steve Jobs: 6 Secrets of Success
- Open Clouds
- The Cloud: A Security Solution for Small Business
- 4 Twitter Tips for Business Success
- Twitter: How to Tweet to Get Results
- 3 Sneaky New Online Scams to Avoid
(c) 2012 U.S. News & World Report