DownsizeDC.org
April 16, 2012
The NSA Wants Even More Power
By James Wilson

Quote of the Day: "The NSA has been lobbying for a bigger role in the cybersecurity operations of private networks for some time, including more access to private communications." - Leslie Harris, Center for Democracy & Technology 

Two competing "cybersecurity" bills will be considered in the House the week of April 23.

Is Congress about to authorize private companies to share your personal information to the National Security Agency (NSA)? 

As this highly-recommended article by James Bamford shows, the NSA is already spending billions on supercomputers in order to unconstitutionally collect and permanently store your personal data.

Should the NSA be further empowered? Or should it be stopped?

I sent the following letter to STOP the NSA using DownsizeDC.org's Hands Off the Internet Campaign, and I urge you to do the same.

The hard-wired message says...

As a constituent, I insist that you oppose any attempts to undermine Internet freedom.

You may borrow from or copy these additional comments...

That is why I'm opposed to the Rogers bill (HR 3523) and the Lungren bill (HR 3674).

"Cybersecurity" is the new "terrorism." It's a made-up scare-word. It benefits those who seek federal power. It favors crony contractors. It does so at the expense of my privacy. It pretends I'll be safer if the internet is less free. 

Jim Dempsey, of the Center for Democracy and Technology, calls these bills a "classic case of overreach."... (http://bit.ly/I31te2)

* Victims of cyber-attacks are already permitted to share information with The State, just as they are permitted to report crimes in the real world.
* We may need a tweak in current law that allows service providers to share information about _attacks_ with one another.

But both bills go farther than a tweak.

And the Rogers bill is FAR worse than the Lungren bill. Lungren has limits on the sharing of cybersecurity information. But the Rogers bill... (http://abcn.ws/HyRizc)

* Contains vague language that could hand sweeping powers to agencies like the National Security Agency (NSA). For example, they could create "backdoor wiretaps."
* Creates a sweeping "cybersecurity exception" to every single federal and state law, including key privacy laws.
* Offers a very broad, almost unlimited definition of the information that can be shared with government agencies.
* Allows private companies to share your private communications with each other and with all other agencies of the federal government. In a cyber-crisis, warrants and prior disclosure to customers would be unnecessary.
* Gives blanket immunity to companies for cooperating with The State, thereby increasing the INCENTIVE to do so. 
* Authorizes any collected personal data to be used to prosecute ANY crime, not just cybersecurity crimes. Be careful what you write in email!

As James Bamford has reported, the NSA already has too much power. This agency is creating a Big Brother system of surveillance, called Stellar Wind. (http://www.wired.com/threatlevel/2012/03/ff_nsadatacenter/all/1)

* The NSA is currently constructing a $2 billion "data collection" facility in Utah.
* In its "near-bottomless databases will be all forms of communication, including the complete contents of private emails, cell phone calls, and Google searches."
* It will have the most powerful hacking system in the world for financial information, stock transactions, business deals, foreign military and diplomatic secrets, legal documents, and confidential personal communications, including ALL of my emails and phone calls.

Do you seriously want to give the NSA even GREATER ability to collect our data?

I'm very concerned, and I doubt you're taking it seriously. You MUST shut the Stellar Wind program down. And you do not have my consent to pass ANY cybersecurity bill that increases the NSA's power.

END LETTER

You can send your letter using DownsizeDC.org's Educate the Powerful System.

Jim Babka
President
DownsizeDC.org, Inc.

P.S. You can vote every day! You don't have to wait for elections. Using DownsizeDC.org's Educate the Powerful System, you can tell your Representative and two Senators how you want to be represented. Messages are counted and offices consider the feedback from their constituents.

And that's not all. Your dollar is ALSO a vote. DownsizeDC.org can perpetually grow into a powerful activist machine, amplifying your voice, by just averaging $1 in contributions, per subscriber, each month. You can pledge $1 per month (or fill in for others by pledging more), or you can make a generous one-time contribution at DownsizeDC.org's secure webform 

Blog commenting is currently under construction. In the meantime, you can send an email if there's something you'd like to tell us.

What Can We Do For You?

We can help you downsize the federal government, if you want that. All you have to do is join. It's free! In return...

We'll give you an army.

We're recruiting a huge army of supporters to work for what you want.

We'll give you influence.

The Downsize DC Army will exert relentless, resistance-numbing pressure on Congress.

We'll make your voice heard.

We'll use our growing army to make your beliefs heard by everyone, everywhere, every day.

We'll give you winning strategies.

Ideas like our "Read the Bills Act" and the "One Subject at a Time Act" will give you the leverage to win the public debate, control Congress, and Downsize DC!

We'll give you powerful tools.

  • Your free membership includes a subscription to our free email newsletter, the Consent Chronicle, which national talk show host Jerry Hughes calls by far the best newsletter he receives.
  • You'll be able to use our Educate the Powerful SystemSM to pressure Congress. It's easy. All it takes is a few mouse clicks and keyboard strokes. You can do it in your bathrobe while you're drinking your morning coffee, or during a break at work.
  • You'll also gain access to our 16-page strategy document, "The Downsize DC Vision." You'll learn about important insights like "ignoring an axiom," and powerful strategies like "picking off the herd." One reader called this document "the unified field theory" of political change.

To gain these benefits, just enter your email address in the box below and hit Subscribe!

Subscribe to the Consent Chronicle
Enter your email address twice: