<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	xmlns:georss="http://www.georss.org/georss" xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#" xmlns:media="http://search.yahoo.com/mrss/"
	>

<channel>
	<title>paidContent &#187; wiretap act</title>
	<atom:link href="http://paidcontent.org/tag/wiretap-act/feed/" rel="self" type="application/rss+xml" />
	<link>http://paidcontent.org</link>
	<description>The economics of digital content</description>
	<lastBuildDate>Thu, 19 Dec 2013 20:44:31 +0000</lastBuildDate>
	<language>en</language>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.com/</generator>
<cloud domain='paidcontent.org' port='80' path='/?rsscloud=notify' registerProcedure='' protocol='http-post' />
<image>
		<url>http://0.gravatar.com/blavatar/89ee7e1250b4095eefb87d28e6e64947?s=96&#038;d=http%3A%2F%2Fs2.wp.com%2Fi%2Fbuttonw-com.png</url>
		<title> &#187; wiretap act</title>
		<link>http://paidcontent.org</link>
	</image>
	<atom:link rel="search" type="application/opensearchdescription+xml" href="http://paidcontent.org/osd.xml" title="paidContent" />
	<atom:link rel='hub' href='http://paidcontent.org/?pushpress=hub'/>
	<item>
		<title>LinkedIn is &#8220;breaking into&#8221; user emails, spamming contacts &#8211; lawsuit</title>
		<link>http://gigaom.com/2013/09/21/linkedin-is-breaking-into-user-emails-spamming-contacts-lawsuit/</link>
		<comments>http://gigaom.com/2013/09/21/linkedin-is-breaking-into-user-emails-spamming-contacts-lawsuit/#comments</comments>
		<pubDate>Sat, 21 Sep 2013 15:03:01 +0000</pubDate>
		<dc:creator><![CDATA[Jeff John Roberts]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[class action]]></category>
		<category><![CDATA[linkedin]]></category>
		<category><![CDATA[spam]]></category>
		<category><![CDATA[wiretap act]]></category>

		<guid isPermaLink="false">http://gigaom.com/?p=692253</guid>
		<description><![CDATA[Are you finding your in-box flooded with LinkedIn requests? That may be because some people are sending out the invitations against their will, according to a lawsuit that accuses the site of hacking users' email programs.<img alt="" border="0" src="http://stats.wordpress.com/b.gif?host=paidcontent.org&#038;blog=33319749&#038;post=233261&#038;subd=gigaompaidcontent&#038;ref=&#038;feed=1" width="1" height="1" />]]></description>
				<content:encoded><![CDATA[<p>In a damning class action complaint, LinkedIn users are accusing the company of &#8220;tunneling&#8221; into their email accounts in order to repeatedly spam anyone who has ever had had contact with them.</p>
<p>The complaint, filed this week in Los Angeles, accuses LinkedIn of violating laws related to hacking, wire-tapping and false endorsements. Users say the social network&#8217;s marketing practices have given rise to fear and embarrassment as a result of emails sent to business associates, ex-spouses and, in one instance, a mentally ill former contact.</p>
<p>The claims draw attention both to email privacy rights, and to the tactics underlying LinkedIn&#8217;s aggressive growth strategy.</p>
<p><strong>Update</strong>: LinkedIn has responded with a <a href="http://blog.linkedin.com/2013/09/21/setting-the-record-straight-on-false-accusations/">blog post</a> that states, &#8221;Claims that we “hack” or “break into” members’ accounts are false.&#8221;</p>
<h2 id="breaking-into-email-accounts">&#8220;Breaking into&#8221; email accounts</h2>
<p>According to the complaint, LinkedIn prompts users to enter an email address, and then uses the information to download every account from a user&#8217;s account such as Gmail or Yahoo. LinkedIn is allegedly able to do this so long as the user are logged into the email provider; if they are not, LinkedIn suggests they log-in:</p>
<div title="Page 2">
<div>
<div>
<blockquote id="quote-users-sign-up-for-li"><p>users sign up for LinkedIn they are required to provide an external email address as their username and to setup a new password for their Linkedln account. LinkedIn uses this information to hack into the user&#8217;s external email account and extract email addresses. If a LinkedIn user leaves an external email account open, LinkedIn pretends to be that user and downloads the email addresses contained anywhere in that account to Linkedln&#8217;s servers. Linkedln is able to download these addresses without requesting the password for the external email accounts or obtaining users&#8217; consent.</p></blockquote>
</div>
</div>
</div>
<p>LinkedIn does not require the password to the email account, but is nonetheless able to download not just an &#8220;address book&#8221; but any address ever sent or received. The complaint says the tactic was a deliberate strategy by LinkedIn to add users and make money, and cites a former engineer who boasts of &#8220;hacking.&#8221; Here are screenshots (the engineer&#8217;s profile is still up <a href="http://www.linkedin.com/in/brianguan">here</a>)</p>
<p><a href="http://gigaom.com/2013/09/21/linkedin-is-breaking-into-user-emails-spamming-contacts-lawsuit/screen-shot-2013-09-21-at-9-19-51-am/" rel="attachment wp-att-692254"><img  alt="LinkedIN screenshot" src="http://gigaom2.files.wordpress.com/2013/09/screen-shot-2013-09-21-at-9-19-51-am.png?w=300&#038;h=130" width="300" height="130" class="aligncenter size-medium wp-image-692254" /></a></p>
<p><a href="http://gigaom.com/2013/09/21/linkedin-is-breaking-into-user-emails-spamming-contacts-lawsuit/screen-shot-2013-09-21-at-9-19-38-am/" rel="attachment wp-att-692255"><img  alt="Screenshot linked in hacking" src="http://gigaom2.files.wordpress.com/2013/09/screen-shot-2013-09-21-at-9-19-38-am.png?w=300&#038;h=54" width="300" height="54" class="aligncenter size-medium wp-image-692255" /></a></p>
<p>LinkedIn has told Bloomberg, which <a href="http://www.bloomberg.com/news/2013-09-20/linkedin-customers-say-company-hacked-their-e-mail-address-books.html">reported</a> the complaint, that the lawsuit is without merit.</p>
<h2 id="thousands-of-invitations">Thousands of invitations</h2>
<p>The heart of the complaint involves LinkedIn&#8217;s practice of encouraging people to invite others to their network when they sign up with the service or, if they&#8217;re existing members, to expand their network.</p>
<p>If a user agrees, LinkedIn sends out an &#8220;invitation to connect&#8221; to all of the user&#8217;s contacts. If the contacts don&#8217;t respond, the service then send outs out two more reminder emails.</p>
<p>According to the complaint, the LinkedIn sign up process is deceptive and doesn&#8217;t clearly inform users that it will &#8220;spam&#8221; their contacts. The plaintiffs are a former ad manager for the New York Times, a professor, a lawyer and a movie producer. Their complaint, which is a request to sue on behalf other LinkedIn users across America, also object to the fact that LinkedIn does not provide an easy way to retract the multiple follow-up invitations.</p>
<p>The complaint also claims that LinkedIn often emails thousands of messages without disclosing it will do so:</p>
<div title="Page 14">
<blockquote id="quote-since-linkedln-routi2"><p>Since Linkedln routinely takes well over 1,000 email addresses from a user&#8217;s external email account, it displays only a very small fraction of those email addresses on the &#8220;Why not invite some people?&#8221; screen.</p></blockquote>
<p>The practice has given rise to hundreds of complaints on LinkedIn&#8217;s own website, says the claim, from people who accuse the company of sending spam, and putting them in embarrassing personal and professional situations:</p>
<div title="Page 12">
<div>
<div>
<blockquote id="quote-im-not-the-only-one-3"><p>I&#8217;m not the only one being hacked by linkedin, but extremely upset at the repercussions. one of the people on my contact list is mentally ill and the last thing I wanted was to invite her to be my connection on linkedin.</p></blockquote>
</div>
</div>
</div>
<p>The lawsuit says the practice amounts to a violation of the Wiretap Act, the Stored Communications Act and a variety of California privacy and right of publicity laws. The suit seeks millions in damages, in part by noting that, on LinkedIn&#8217;s own pricing scheme, it costs $10 to send an email to someone with whom a user is not connected.</p>
<h2 id="a-growth-strategy-for-linkedin">A growth strategy for LinkedIn</h2>
<p>LinkedIn&#8217;s aggressive email solicitations are part of a strategy to boost revenue by increasing its user base, according to the complaint. The increase in users allegedly makes it easier for the company to pull in more money from its three revenue sources: selling its database to job recruiters; advertising to users; selling premium accounts to subscribers.</p>
<p>LinkedIn is not the only company that has come under fire for using invasive tactics to grow its user base. Path, a photo-based social network, has been <a href="http://www.theverge.com/2013/4/30/4286090/path-is-spamming-address-books-with-unwanted-texts-and-robocalls">criticized</a> for scraping users contact lists in order to send messages to promote the app.</p>
<p>LinkedIn, meanwhile, has long been a hit with investors though in, recent months, the media has expressed more skepticism with stories like &#8220;<a href="http://www.thebaffler.com/past/all_linkedin_with_nowhere_to_go">All LinkedIn with Nowhere to go</a>.&#8221;</p>
<p>Here&#8217;s the complaint. I&#8217;ve underlined the key legal bits and some of the juicy stuff:</p>
<p style="margin:12px auto 6px;font-family:Helvetica, Arial, Sans-serif;font-style:normal;font-variant:normal;font-weight:normal;font-size:14px;line-height:normal;font-size-adjust:none;font-stretch:normal;display:block;"><a style="text-decoration:underline;" title="View LinkedIn Hacking on Scribd" href="http://www.scribd.com/doc/169844985/LinkedIn-Hacking">LinkedIn Hacking</a></p>
<iframe id="doc_77594" src="//www.scribd.com/embeds/169844985/content?start_page=1&amp;view_mode=scroll&amp;show_recommendations=true" height="600" width="100%" frameborder="0" scrolling="no" data-auto-height="false" data-aspect-ratio="undefined"></iframe>
</div><img alt="" border="0" src="http://stats.wordpress.com/b.gif?host=paidcontent.org&#038;blog=33319749&#038;post=233261&#038;subd=gigaompaidcontent&#038;ref=&#038;feed=1" width="1" height="1" /><p><a href="http://pubads.g.doubleclick.net/gampad/jump?iu=/1008864/PaidContent_RSS_300x250&#038;sz=300x250&#038;c=856324"><img src="http://pubads.g.doubleclick.net/gampad/ad?iu=/1008864/PaidContent_RSS_300x250&#038;sz=300x250&#038;c=856324" /></a></p>]]></content:encoded>
			<wfw:commentRss>http://gigaom.com/2013/09/21/linkedin-is-breaking-into-user-emails-spamming-contacts-lawsuit/feed/</wfw:commentRss>
		<slash:comments>47</slash:comments>
	
		<media:thumbnail url="http://gigaom2.files.wordpress.com/2011/05/linkedin_2-300x206.jpg?w=150" />
		<media:content url="http://gigaom2.files.wordpress.com/2011/05/linkedin_2-300x206.jpg?w=150" medium="image">
			<media:title type="html">linkedin_2-300x206</media:title>
		</media:content>

		<media:content url="http://0.gravatar.com/avatar/05dfcf765f1554b08954bb9e1ee63363?s=96&#38;d=retro&#38;r=PG" medium="image">
			<media:title type="html">jeffjohnroberts</media:title>
		</media:content>

		<media:content url="http://gigaom2.files.wordpress.com/2013/09/screen-shot-2013-09-21-at-9-19-51-am.png?w=300" medium="image">
			<media:title type="html">LinkedIN screenshot</media:title>
		</media:content>

		<media:content url="http://gigaom2.files.wordpress.com/2013/09/screen-shot-2013-09-21-at-9-19-38-am.png?w=300" medium="image">
			<media:title type="html">Screenshot linked in hacking</media:title>
		</media:content>
	</item>
		<item>
		<title>What you need to know about that $15 billion Facebook privacy case</title>
		<link>http://gigaom.com/2012/05/18/what-you-need-to-know-about-that-15-billion-facebook-privacy-case/</link>
		<comments>http://gigaom.com/2012/05/18/what-you-need-to-know-about-that-15-billion-facebook-privacy-case/#comments</comments>
		<pubDate>Fri, 18 May 2012 21:53:39 +0000</pubDate>
		<dc:creator><![CDATA[Jeff John Roberts]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[class action]]></category>
		<category><![CDATA[facebook]]></category>
		<category><![CDATA[mark zuckerberg]]></category>
		<category><![CDATA[Nik Cubrilovic]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[wiretap act]]></category>

		<guid isPermaLink="false">http://gigaom.com/?p=523230</guid>
		<description><![CDATA[Lawyers tried to ruin Mark Zuckerberg's big day with a sprawling lawsuit that portrays the Facebook founder as a rogue hacker, and accuses the company of tracking users on their computers and iPhones. We have a plain english Q&#38;A.<img alt="" border="0" src="http://stats.wordpress.com/b.gif?host=paidcontent.org&#038;blog=33319749&#038;post=209320&#038;subd=gigaompaidcontent&#038;ref=&#038;feed=1" width="1" height="1" />]]></description>
				<content:encoded><![CDATA[<p><a href="http://gigaom.com/2012/05/18/what-you-need-to-know-about-that-15-billion-facebook-privacy-case/privacy-8/" rel="attachment wp-att-523320"><img  title="Privacy" src="http://gigaom2.files.wordpress.com/2012/05/privacy.jpg?w=150&#038;h=128" alt=""   class="alignleft size-thumbnail wp-image-523320" /></a>Lawyers tried to ruin Mark Zuckerberg&#8217;s big day with a sprawling lawsuit that portrays the Facebook founder as a rogue hacker, and accuses the company of tracking users on their computers and iPhones. The lawyers want to collect $15 billion for you and me and nearly everyone else on Facebook.</p>
<p>Here&#8217;s a plain english Q&amp;A of what&#8217;s going on:</p>
<p><strong>What did Facebook do that was so wrong?</strong></p>
<p>The company placed files on users&#8217; computers called cookies that told the social network which websites they visited.</p>
<p><strong>Is that so unusual? I thought lots of sites do that</strong></p>
<p>The problem is that Facebook appears to have tracked you even after you logged-out. Under the company&#8217;s own policy, it promised not to do that and thus violated the limits of your consent when it did.<a href="http://gigaom.com/2012/05/18/what-you-need-to-know-about-that-15-billion-facebook-privacy-case/cookies-3/" rel="attachment wp-att-523319"><img  title="Cookies" src="http://gigaom2.files.wordpress.com/2012/05/cookies.jpg?w=128&#038;h=150" alt=""   class="alignright size-thumbnail wp-image-523319" /></a></p>
<p><strong>How exactly did Facebook track me?</strong></p>
<p>Many websites like CNN or <a href="http://www.justinbieberzone.com/">Justin Bieber Zone</a> have a &#8220;Like&#8221; button that acts like an extension of Facebook. The company collects data about your visits to those sites &#8212; including, it seems, when you are logged out. The unauthorized tracking reportedly took place across smartphones and tablets too.</p>
<p><strong>Well, maybe this was an honest mistake?</strong></p>
<p><strong></strong>After blogger Nik Cubrilovic <a href="http://www.techmeme.com/111004/p3#a111004p3">called out</a> Facebook for stalking its users, the company awkwardly suggested that the tracking of logged-out users was a &#8220;bug&#8221; or a narrow technical measure. That claim hasn&#8217;t stood up well. Cubrilovic and German regulators soon called BS and suggested Facebook was doing this deliberately for more than a year. The lawsuit also points to a Facebook <a href="http://appft.uspto.gov/netacgi/nph-Parser?Sect1=PTO2&amp;Sect2=HITOFF&amp;u=%2Fnetahtml%2FPTO%2Fsearch-adv.html&amp;r=1&amp;p=1&amp;f=G&amp;l=50&amp;d=PG01&amp;S1=20110231240.PGNR.&amp;OS=dn/20110231240&amp;RS=DN/20110231240">patent application</a> for cookies that follow users after they log out.</p>
<p><strong>So where did this lawsuit come from?</strong></p>
<p>There are actually more than a dozen cases across the country. They were recently consolidated into one lawsuit in San Jose, California.</p>
<p><strong>Why are the lawyers asking for $15 billion?<br />
</strong></p>
<p>It&#8217;s a great way to grab headlines during a week the press is already in a <a href="http://gigaom.com/2012/05/18/what-web-is-saying-the-facebook-ipo/">Facebook frenzy</a>. The $15 billion itself is loosely based on the Wiretap Act which lets people sue for $10,000 if someone records their conversation without permission. The lawsuit also cites studies that claim an individual&#8217;s web history is worth $52. There are also state law penalties. And so on. The lawyers had to pick some number so they chose $15 billion.<a href="http://gigaom.com/2012/05/18/what-you-need-to-know-about-that-15-billion-facebook-privacy-case/eavesdropping-3/" rel="attachment wp-att-523318"><img  title="Eavesdropping" src="http://gigaom2.files.wordpress.com/2012/05/eavesdropping2.jpg?w=300&#038;h=233" alt="" width="300" height="233" class="alignright size-medium wp-image-523318" /></a></p>
<p><strong>Will Facebook actually have to pay that $15 billion?</strong></p>
<p>The short answer is no. The Wiretap Act was written with telephone conversations in mind so it&#8217;s no slam dunk that a court will decide the law should apply the same way to computer cookies (Google, HTC and <a href="http://paidcontent.org/2011/12/02/419-samsung-and-htc-hit-by-wiretapping-lawsuit-over-tracking-software/">Samsung</a> are facing <a href="http://paidcontent.org/2012/03/12/419-lawsuits-mushroom-over-google-browser-tracking/">similar lawsuits</a> under the same legal theory). At the same time, some judges have ruled that Facebook-style &#8220;privacy invasions&#8221; <a href="http://paidcontent.org/2011/10/28/419-facebook-squelches-friend-finder-class-action/">aren&#8217;t worth anything</a> in dollar terms because no one has been harmed.</p>
<p>In this case, however, a judge would likely conclude that Facebook&#8217;s behavior (if the allegations are true) was egregious enough to find liability under at least one of the plaintiffs&#8217; 11 claims. But if other tech related privacy suits are anything to go by, the case will settle long before a trial.</p>
<p><strong>I&#8217;m on Facebook. Will I get some of that money?</strong></p>
<p>Doubtful. While the class action aspires to cover everyone who was on Facebook from May 2010 to September 2011, a cash payout is unlikely. As noted above, judges have a hard time putting a dollar value on this type of privacy breach. When there has been a privacy settlement in other tech-related cases (like Google Buzz or <a href="http://latimesblogs.latimes.com/technology/2009/12/what-is-facebook-beacon-settlement.html">Facebook Beacon</a>), the money has been divided up between lawyers and non-profit groups that act as privacy activists.</p>
<p><strong>What does Mark Zuckerberg have to do with all this?</strong></p>
<p>The lawsuit paints the Facebook CEO as a creep who has a long history of using his hacking skills to steal people&#8217;s personal data. The complaint opens by reproducing this email exchange:</p>
<p><a href="http://gigaom.com/2012/05/18/what-you-need-to-know-about-that-15-billion-facebook-privacy-case/zuckerberg-email/" rel="attachment wp-att-523314"><img  title="Zuckerberg email" src="http://gigaom2.files.wordpress.com/2012/05/zuckerberg-email.png?w=708" alt=""   class="aligncenter size-full wp-image-523314" /></a></p>
<p>The lawsuit also lists a chronological history intended to show that Zuckerberg and his company have long displayed a systemic disregard for user privacy. This is, of course, just a legal tactic that doesn&#8217;t necessarily prove that Facebook is any better or worse than other tech companies on privacy issues. Facebook, which <a href="http://www.bloomberg.com/news/2012-05-18/facebook-sued-for-15-billion-in-suit-over-user-tracking.html">told Bloomberg</a> the complaint is baseless, would likely add that this was an accident that shouldn&#8217;t detract from the fact it provides a popular free service to millions of people.</p>
<p><strong>Are lawsuits the best way to solve the privacy problem?</strong></p>
<p>Probably not. But since the government often has a hard time understanding (let alone regulating) the tech industry, the lawsuits can be an effective way of raising awareness and forcing companies to take care about how they handle consumer data.</p>
<p>Here&#8217;s the complaint itself:</p>
<p><a style="margin:12px auto 6px;font-family:Helvetica, Arial, Sans-serif;font-style:normal;font-variant:normal;font-weight:normal;font-size:14px;line-height:normal;font-size-adjust:none;font-stretch:normal;display:block;text-decoration:underline;" title="View Facebook Wiretap Act Complaint Copy on Scribd" href="http://www.scribd.com/doc/94073768/Facebook-Wiretap-Act-Complaint-Copy">Facebook Wiretap Act Complaint Copy</a></p><img alt="" border="0" src="http://stats.wordpress.com/b.gif?host=paidcontent.org&#038;blog=33319749&#038;post=209320&#038;subd=gigaompaidcontent&#038;ref=&#038;feed=1" width="1" height="1" /><p><a href="http://pubads.g.doubleclick.net/gampad/jump?iu=/1008864/PaidContent_RSS_300x250&#038;sz=300x250&#038;c=633974"><img src="http://pubads.g.doubleclick.net/gampad/ad?iu=/1008864/PaidContent_RSS_300x250&#038;sz=300x250&#038;c=633974" /></a></p>]]></content:encoded>
			<wfw:commentRss>http://gigaom.com/2012/05/18/what-you-need-to-know-about-that-15-billion-facebook-privacy-case/feed/</wfw:commentRss>
		<slash:comments>2</slash:comments>
	
		<media:thumbnail url="http://gigaom2.files.wordpress.com/2012/05/privacy.jpg?w=150" />
		<media:content url="http://gigaom2.files.wordpress.com/2012/05/privacy.jpg?w=150" medium="image">
			<media:title type="html">Privacy</media:title>
		</media:content>

		<media:content url="http://0.gravatar.com/avatar/05dfcf765f1554b08954bb9e1ee63363?s=96&#38;d=retro&#38;r=PG" medium="image">
			<media:title type="html">jeffjohnroberts</media:title>
		</media:content>

		<media:content url="http://gigaom2.files.wordpress.com/2012/05/privacy.jpg?w=163" medium="image">
			<media:title type="html">Privacy</media:title>
		</media:content>

		<media:content url="http://gigaom2.files.wordpress.com/2012/05/cookies.jpg?w=119" medium="image">
			<media:title type="html">Cookies</media:title>
		</media:content>

		<media:content url="http://gigaom2.files.wordpress.com/2012/05/eavesdropping2.jpg?w=300" medium="image">
			<media:title type="html">Eavesdropping</media:title>
		</media:content>

		<media:content url="http://gigaom2.files.wordpress.com/2012/05/zuckerberg-email.png" medium="image">
			<media:title type="html">Zuckerberg email</media:title>
		</media:content>
	</item>
		<item>
		<title>FAQ: What you need to know about CISPA (Update: bill passes House)</title>
		<link>http://paidcontent.org/2012/04/26/faq-what-you-need-to-know-about-fridays-cispa-vote/</link>
		<comments>http://paidcontent.org/2012/04/26/faq-what-you-need-to-know-about-fridays-cispa-vote/#comments</comments>
		<pubDate>Thu, 26 Apr 2012 18:40:36 +0000</pubDate>
		<dc:creator><![CDATA[Jeff John Roberts]]></dc:creator>
				<category><![CDATA[CISPA]]></category>
		<category><![CDATA[Cyber Intelligence Sharing and Protection Act]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[eff]]></category>
		<category><![CDATA[national security act]]></category>
		<category><![CDATA[Patriot Act]]></category>
		<category><![CDATA[sopa]]></category>
		<category><![CDATA[veto]]></category>
		<category><![CDATA[wiretap act]]></category>

		<guid isPermaLink="false">http://paidcontent.org/?p=206861</guid>
		<description><![CDATA[The U.S. House of Representatives passed a major cyber-security bill that would change how companies like Facebook can share personal information. Privacy advocates are in uproar and the Obama Administration is threatening a veto. What's going on?<img alt="" border="0" src="http://stats.wordpress.com/b.gif?host=paidcontent.org&#038;blog=33319749&#038;post=206861&#038;subd=gigaompaidcontent&#038;ref=&#038;feed=1" width="1" height="1" />]]></description>
				<content:encoded><![CDATA[<p><a href="http://paidcontent.org/2012/04/26/faq-what-you-need-to-know-about-fridays-cispa-vote/privacy-spying-eye-in-computer/" rel="attachment wp-att-111881"><img  title="privacy / spying / eye in computer" src="http://gigaompaidcontent.files.wordpress.com/2012/02/privacy-spying-eye-in-computer-o.jpg?w=150&#038;h=116" alt=""   class="alignleft size-thumbnail wp-image-111881" /></a>The U.S. House of Representatives passed a major cyber-security bill that would change how companies like Facebook can share personal information. Privacy advocates are in uproar and the Obama Administration is threatening a veto. What&#8217;s going on?</p>
<p><strong>UPDATE</strong>: The vote was originally scheduled for Friday but took place Thursday evening instead. It passed 248 to 168 on largely partisan lines. (Read our account <a href="http://gigaom.com/2012/04/26/house-unexpectedly-votes-on-cispa-which-passes/">here</a>)</p>
<p>Here&#8217;s a plain English guide to the polices and politics driving the Cyber Intelligence Sharing and Protection Act:</p>
<p><strong>So is this SOPA all over again?</strong></p>
<p>Not really. The <a href="http://paidcontent.org/2012/01/19/419-tech-industry-breaks-back-of-sopa-as-republicans-jump-ship-on-black-out/">ill-fated Stop Online Piracy Act</a> was about Hollywood trying to force tech companies to become copyright cops. CISPA, on its face, is about giving those same companies tools to confront cyber-attacks.</p>
<p><strong>Isn&#8217;t that the same thing?</strong></p>
<p>Critics said that an earlier version of CISPA was a stalking horse for the copyright industry &#8212; they worried that companies would dress up anti-piracy initiatives as security complaints. New language makes this unlikely and emphasizes that the bill is indeed about cyber-security.</p>
<p><strong>Well, what cyber-security concerns are we talking about?</strong></p>
<p>Major U.S. companies and government agencies have suffered hacking attacks in which intruders have stolen classified files, trade secrets or source code. The attackers include criminal gangs and state-sponsored (read: China) cyber espionage teams. Security experts warn that cyber-attacks lead to economic loss for companies and military vulnerabilities for the country.</p>
<p><strong>Sounds scary. What does CISPA do to address this?</strong></p>
<p>One of the bill&#8217;s main goals is to improve the sharing of information between companies and the government. In theory, it will be easier for the government to warn companies about security threats. In turn, the companies will have more ability to alert the government about suspicious activities or attacks.</p>
<p><strong>So why do we need a law new for this?</strong></p>
<p>CISPA wants to update existing laws like the National Security Act of 1947 to require authorities to share information about cyber-attacks as well as conventional military threats. There are also laws like the Wiretap Act and the Electronic Communications Privacy Act that limit what private companies can do with information about their customers. CISPA would help companies avoid getting sued under those laws when they share information about cyber-security.</p>
<p><strong>Sounds reasonable. Everyone&#8217;s got to do their part to prevent a cyber-attack, right?</strong></p>
<p>The problem, as you may have guessed, is that CISPA may be a lot broader than what is needed to get the job done. Critics worry that companies will be cavalier about passing data around if they don&#8217;t have to fear privacy lawsuits. Companies like Facebook, Amazon, Google and Netflix (many of which are <a href="http://gigaom.com/2012/04/13/facebook-clarifies-its-cispa-stance-will-the-web-care/">supporting CISPA</a>) are facing dozens of privacy-related lawsuits &#8212; CISPA might be a way to sidestep some of these in the future. Also, the government could invoke CISPA as a pretext to override civil liberties. From this perspective, CISPA is not so much SOPA but instead a new form of the Patriot Act.</p>
<p><strong>Uh, oh. Is the law actually going to pass?</strong></p>
<p>The bill passed the House amidst Democratic grumbling. <a href="http://www.politico.com/news/stories/0412/75612.html">Politico reports</a> that Sen. Joe Lieberman expects a Senate version will see floor time as soon as next month. This does not, of course, mean that the bill will become law anytime soon &#8212; the approach of the November election is likely to put Congress into its semi-annual state of paralysis. Also, there are competing bills from the White House and also from people like Lieberman who want stronger measures to protect infrastructure like dams and utilities.</p>
<p><strong>What about the veto threat?</strong></p>
<p>The White House issued a strong statement on Wednesdays that attacked CISPA for trampling privacy and civil liberties. It said the bill should include a provision obliging the government and companies to minimize the amount of personal data that passes between them. The statement stressed the &#8220;civilian nature of cyberspace&#8221; and warns of a veto. But veteran political types noted the veto threat <a href="http://www.politico.com/news/stories/0412/75625.html">contains a hedge</a> &#8212; it says advisers would recommend a veto, not that the President will veto it.</p>
<p><strong>Where can I learn more about all this?</strong></p>
<p>The Electronic Frontier Foundation has its usual top-rate privacy analysis <a href="https://www.eff.org/deeplinks/2012/04/cybersecurity-bill-faq-disturbing-privacy-dangers-cispa-and-how-you-stop-it">here</a>. CNET&#8217;s Declan McCullagh has a worthy overview of the lobbying forces <a href="http://news.cnet.com/8301-31921_3-57421624-281/advocacy-group-flip-flops-twice-over-cispa-surveillance-bill/">here</a> and GigaOM&#8217;s Derrick Harris has a cool-headed look at the bill <a href="http://gigaom.com/2012/04/12/they-cant-all-be-sopa-are-webizens-ready-to-fight-with-nuance/">here</a>. And the non-partisan Congressional Research Service has the bill and a summary <a href="http://www.govtrack.us/congress/bills/112/hr3523">here</a>.</p><img alt="" border="0" src="http://stats.wordpress.com/b.gif?host=paidcontent.org&#038;blog=33319749&#038;post=206861&#038;subd=gigaompaidcontent&#038;ref=&#038;feed=1" width="1" height="1" /><p><a href="http://pubads.g.doubleclick.net/gampad/jump?iu=/1008864/PaidContent_RSS_300x250&#038;sz=300x250&#038;c=603934"><img src="http://pubads.g.doubleclick.net/gampad/ad?iu=/1008864/PaidContent_RSS_300x250&#038;sz=300x250&#038;c=603934" /></a></p>]]></content:encoded>
			<wfw:commentRss>http://paidcontent.org/2012/04/26/faq-what-you-need-to-know-about-fridays-cispa-vote/feed/</wfw:commentRss>
		<slash:comments>2</slash:comments>
	
		<media:thumbnail url="http://gigaompaidcontent.files.wordpress.com/2012/02/privacy-spying-eye-in-computer-o.jpg?w=150" />
		<media:content url="http://gigaompaidcontent.files.wordpress.com/2012/02/privacy-spying-eye-in-computer-o.jpg?w=150" medium="image">
			<media:title type="html">privacy / spying / eye in computer</media:title>
		</media:content>

		<media:content url="http://0.gravatar.com/avatar/05dfcf765f1554b08954bb9e1ee63363?s=96&#38;d=retro&#38;r=PG" medium="image">
			<media:title type="html">jeffjohnroberts</media:title>
		</media:content>

		<media:content url="http://gigaompaidcontent.files.wordpress.com/2012/02/privacy-spying-eye-in-computer-o.jpg?w=180" medium="image">
			<media:title type="html">privacy / spying / eye in computer</media:title>
		</media:content>
	</item>
	</channel>
</rss>
