Cybersecurity

Our world runs on computers and the Internet. We use them for everything, from communicating with long-lost classmates to managing our bank accounts to buying anything from cars to diapers. The effort to keep these systems secure is known as cybersecurity. Unfortunately, all too often, simple, effective cybersecurity steps are not taken, like changing passwords routinely or updating and patching holes in software. Even when they are, sophisticated hackers can sometimes get around these defenses. The government is using this threat to try to expand its power and permit companies to funnel our sensitive, personal online information to it. Learn more >>

Friday links roundup

Friday links roundup

By Jay Stanley, Senior Policy Analyst, ACLU Speech, Privacy & Technology Project at 5:38pm
A few links that have caught our eye this past week:
New Senate Cyber Bill No Better Than Last Version

New Senate Cyber Bill No Better Than Last Version

By Michelle Richardson, Legislative Counsel, ACLU Washington Legislative Office at 5:41pm

Yesterday, Republican Senators introduced a rewrite of their cybersecurity bill, known as SECURE IT. Advocates registered their opposition to the bill last month and its CISPA-like expansion of military authority to collect sensitive information…

Next Round in Cybersecurity Battle: The Senate

By Michelle Richardson, Legislative Counsel, ACLU Washington Legislative Office at 3:36pm

Two weeks ago, the House of Representatives passed the Cyber Intelligence Sharing and Protection Act (CISPA). But thanks to internet activism and advocacy by organizations like the ACLU and the Electronic Frontier Foundation, 168 Congressmen voted…

On the Agenda: Week of May 14–18, 2012

On the Agenda: Week of May 14–18, 2012

By Suzanne Ito, ACLU at 12:39pm

This week the House will debate the NDAA for fiscal year 2013. We'll be monitoring the debate and pulling for an amendment that fixes the terrible detention provisions in last year's bill.

Cybersecurity Legislation and Common Sense – Still Waiting for the Two to Meet

By Zachary Katznelson, Senior Staff Attorney, ACLU National Security Project at 1:25pm

During the past two weeks, we’ve been highlighting cybersecurity and the dangers that various legislative proposals pose to our civil liberties. One major concern is the prospect of private companies sharing vast amounts of our personal information…

On the Agenda: Week of April 30 – May 5, 2012

On the Agenda: Week of April 30 – May 5, 2012

By Suzanne Ito, ACLU at 12:00pm

Congress is out this week, but May will be a busy month with cybersecurity in the Senate, the 2013 NDAA and the arraignment of Khalid Sheikh Mohammed.

This Week in Civil Liberties (4/27/2012)

This Week in Civil Liberties (4/27/2012)

By Rekha Arulanantham, ACLU at 5:23pm

What law threatens the Occupy movement’s and other activists’ right to protest?

What bill recently passed by the House did the President threaten to veto because of its privacy problems?

Which court heard arguments this…

Civil Liberties in the Digital Age: Weekly Highlights (4/27/2012)

Civil Liberties in the Digital Age: Weekly Highlights (4/27/2012)

By Anna Salem, ACLU of Northern California at 4:01pm

In the digital age that we live in today, we are constantly exposing our personal information online. From using cell phones and GPS devices to online shopping and sending e-mail, the things we do and say online leave behind ever-growing trails of…

Keep Domestic Cybersecurity Efforts in Civilian Hands

By Michelle Richardson, Legislative Counsel, ACLU Washington Legislative Office at 8:37am

Last night the House of Representatives passed HR 3523, the Cyber Intelligence Sharing and Protection Act, or CISPA. We’ve written about the many privacy problems with this bill, but here I would like to focus on one of its biggest and most fundamental…

House of Representatives Passes Privacy-Busting CISPA

House of Representatives Passes Privacy-Busting CISPA

By Ateqah Khaki at 6:33pm

CISPA is a dangerously overbroad bill that would allow companies to share our private and sensitive information with the government without a warrant and without proper oversight.

Statistics image