Al Qaeda seizes the Pakistan Telecommunication Authority?

Night View of India-Pakistan Borderlands (NASA...

Night View of India-Pakistan Borderlands (NASA, International Space Station, 08/21/11) (Photo credit: NASA’s Marshall Space Flight Center)

Mr Prime Minister, development is not just launching mega-projects. Development also means expansion of freedoms and enjoyment of fundamental human rights

 

The national media was already consumed by agency-fuelled warfare when the breaking news of Altaf Hussain’s arrest by Scotland Yard over money laundering charges further shrank any space for other important social issues. While the finance minister Ishaq Dar was upbeat with economic growth and current account figures, a very retrogressive activity was in operation right under the nose of the government. In a swift and clandestine move the operatives of al Qaeda masquerading as officials of the Pakistan Telecommunication Authority (PTA) banned all social media websites that had been campaigning against extremism and militancy in the country. While we were clamouring for lifting illegal restrictions imposed on a private television channel and condemned attacks on journalists, another draconian move has silenced social media pages belonging to progressive and secular voices. These include ‘Laal’, ‘Roshni’, and many more. Interestingly the websites run by banned outfits still flourish and disseminate hate and militancy under the blissful guardianship of the PTA. Continue reading

Advertisements

House Resolution 3523, Cyber Intelligence Sharing and Protection Act Bill

by William on 25th Apr 12

clip_image002

The CISPA bill and its content posted abridgedly, and why it affects the citizen more than had the SOPA bill.

clip_image004

As posted on curiosidadesofworld.blogspot.pt

In the spirit of newspapers of record, Urban Times shall publish the current version of the United StatesCyber Intelligence Sharing and Protection Act, a piece of legislation similar to the lines of SOPA and PIPA, though with a fundamental difference—whereas SOPA, ACTA, and PIPA dealt with the shutting down of websites “infringing” on copyright, CISPA manages to entice, as opposed to alienate, companies and corporations by encouraging cooperation between intelligence organizations of the United States and the private information held by said corporations, thereby putting all culpability and infringement not upon internet corporations and websites, but upon their users, citizens of the world. Internet corporations are encouraged to share private user information with the United States federal government, in exchange for immunity from prosecution though liability—information shared, not through a forced hand via subpoena or court warrant, but by arbitrary decisions based on the management of said private corporation.

This means that there shall be no great protests directly from Facebook, or Google, against this legislation, for they are supporters of the bill. The bill is up for debate tomorrow, Thursday, April 26th, 2012, and for vote by Friday. It is past the eleventh hour, and many have missed the previous 66 bell tolls warning that once Internet companies are benefited by legislation, they will not care about you, the user. They are corporations. They don’t care about you. A corporation, as much as a person as it may be according to certain laws, has no feelings. It is up to you, the user, to fight back, and knowledge is the first step to understanding your enemy.

There is an idiom that goes, “read between the lines”. Government legislation and law interpretation are truly, truly the times where this idiom is not just good advice to live by, but a necessary thought process for your happiness, well being, and more dramatically, survival, in the face of deliberately misleading rhetoric and ambiguous terminologies.

The bill has been formatted to facilitate its reading.

Cyber Intelligence Sharing and Protection Act of 2012

http://www.gpo.gov/fdsys/pkg/BILLS-112hr3523rh/pdf/BILLS-112hr3523rh.pdf (link)

‘‘(a) INTELLIGENCE COMMUNITY SHARING OF CYBER THREAT INTELLIGENCE WITH PRIVATE SECTOR.—

‘‘(1) IN GENERAL.—The Director of National Intelligence shall establish procedures to allow elements of the intelligence community to share cyber threat intelligence with private-sector entities and to encourage the sharing of such intelligence.

Continue reading