Upholding Individual, State then National Sovereignty against the Enforcement of Global Governence and Tyranny

Posts Tagged ‘SOPA

Government Attacks People’s Rights

leave a comment »

The Latter Daily News

April 22, 2013

By Sovereignthink

CISPA is Back: FAQ on What it is and Why it’s Still Dangerous

The privacy-invasive bill known as CISPA—the so-called “cybersecurity” bill—was reintroduced in February 2013. Just like last year, the bill has stirred a tremendous amount of grassroots activism because it carves a loophole in all known privacy laws and grants legal immunity for companies to share your private information. EFF has compiled an FAQ detailing how the bill’s major provisions work and how they endanger all Internet users’ (indeed all electronic data) privacy. Please join us in speaking out against CISPA by contacting Congress now.


U.S. House of Representatives Shamefully Passes CISPA; Internet Freedom Advocates Prepare for a Battle in the Senate

CISPA vote records

These Utah Yea votes must not gain reelection or hold trust in public office ever again.

They have violated their oath and duty by voting away our privacy, rights, freedom and liberty.




Bishop, Rob

UT 1st



Stewart, Chris

UT 2nd



Chaffetz, Jason

UT 3rd



Matheson, Jim

UT 4th

Here is what they have to say…

Rob Bishop as the only Nay vote has not posted a comment.

Of course Jim Matheson Voted Yea because he needs to fill his NSA spy center in Bluffdale and has not yet released a statement of justification (as of 4/22).

Here is Chris Stewart’s justification for CISPA

Stewart Votes to Protect America’s Security

Apr 18, 2013

Press Release


Washington, D.C. – Rep. Chris Stewart (R-Utah) released the following statement after voting in favor of the Cyber Intelligence Sharing and Protection Act (CISPA) that passed the House of Representatives today.

“As a member of the House Committee on Homeland Security, I have been involved in a number of classified and unclassified briefings on the threat of cyber-attacks against Americans. These attacks are designed to steal personal data and trade secrets, shut down computer systems, destroy infrastructure, and otherwise harm American citizens and American companies.

Based on these briefings and conversations with the members of the Utah business community it has become clear to me that businesses and their customers are increasingly vulnerable to these attacks. They want and need the ability to know of the latest threats and to adjust their cyber security systems to protect against those threats. If we don’t act now and protect ourselves, it could lead to a catastrophic event.

Although there were initial concerns with how the bill would protect the personal data of individuals, Chairman Rogers and Ranking Member Ruppersberger have addressed those concerns and have improved the bill as a result. Although there is no perfect solution, this bill does a decent job of allowing companies to learn of and protect against cyber threats while still preserving the core principles of small-government conservatives like me—it doesn’t cost anything, it doesn’t create another government bureaucracy, it addresses privacy concerns, and there are no mandates on companies or individuals.

It’s the fundamental job of the federal government to provide for our common defense. I have a responsibility to my constituents to do everything I can to protect our security and to protect our future. I think that the Cyber Security Protection Bill helps do just that.”


Jason Chaffetz Release in Defense of CISPA

Each day, hundreds of thousands of attempts are made to access data from US corporations, government entities, critical infrastructure and even private individuals.  These cyber attacks come from foreign governments as well as criminal entities, terrorist groups, and individuals both foreign and domestic.  While government entities can warn one another about specific attack sources, tactics and methods to help thwart the theft of private information, the private sector currently has no such option.  Corporations can be sued for sharing attack signatures with each other or with the government.  Likewise, the government cannot share classified information with the private sector that might help prevent future attacks.  As a result, cybercriminals can jump from one entity to another using the same tricks over and over again.

To help facilitate collaboration between the private and public sector to identify the source and manner of specific cyber attacks, Rep. Mike Rogers introduced and the House of Representatives recently passed by an overwhelming bipartisan majority The Cyber Intelligence Sharing and Protection Act (CISPA).  As a strong proponent of civil liberties, I voted for this bill only after I was satisfied that Constitutional and civil liberty concerns in the original bill were resolved.

CISPA attempts to address cyber threats by removing outdated legal barriers that prevent organizations from pooling information to fight these crimes.  Equally important, the bill provides a mechanism for government to share classified information about cyber attacks and methods. Organizations now have the option of designating a high ranking employee to receive a security clearance that enables communication about classified threats.

The goal of this legislation is to provide tools to protect private information from being stolen without relying on government interference or control.

These improvements and amendments, among others:

  • Narrowed the definition of “cyber threat information” by removing references to intellectual property (thus removing any concerns that this bill was a sort of back door SOPA).
  • Prohibited the federal government from using library records, book sales records, book customer lists, firearms sales records, tax return records, educational records, and medical records that it receives from private entities under CISPA.
  • Significantly narrow the definitions in the bill regarding what information may be identified, obtained, and shared.
  • Sunset the provisions of the bill five years after the date of enactment.
  • Prohibit the federal government from retaining or using any of the information it receives under CISPA for anything other than one of the five permitted uses identified below.
    • 1) Cybersecurity;
    • 2) investigation and prosecution of Cybersecurity crimes;
    • 3) protection of individuals from the danger of death or physical injury;
    • 4) protection of minors from physical or psychological harm such as child pornography and rape; and
    • 5) protection of the national security of the United States.

I take privacy, civil liberties and the Fourth Amendment very seriously.  I think my work fighting against the TSA, and opposing and voting against overintrusive legislation such as SOPA, the Patriot Act, and the indefinite detention provisions in the NDAA demonstrates my commitment to civil liberties.

The final version of CISPA with the adopted amendments mentioned above will provide vital tools to assist companies in protecting themselves and their customers from cyber-attack.  It contains no new government mandates or regulations.  It protects the internet from government interference or control.  It makes our country safer, and it maintains our precious civil liberties at the same time.  For these reason I voted yes on CISPA.

Let your senators know that this will not stand and to vote this treasonous house down.

Written by sovereignthink

2013/08/07 at 9:56 am

Posted in Sovereign Think

Tagged with , , , ,

RIP, Bill of Rights – Dec 15, 1791 – Dec 31, 2011

with 2 comments

NDAA: citizen detainment – SOPA: civilian targeting

with 18 comments

NDAA: citizen detainment – SOPA: civilian targeting

Police State 2012 – The hi-tech police state

Color revolutions, hot rebellions or justice restored peacefully through adherence to fundamental principles and constitutional law.

How we could get to a point of no return, of martial law…?

This is the 12-step program to dismantling America’s purpose and principle of individual liberty and sovereignty.

Steps Taken So Far…

1. Egyptian Internet Kill Switch – United States Internet M.A.D. Switch

(see this)

2. US State Department, Google and Twitter trained Egyptian Bloggers for Revolution; Google CEO very, very proud of executive overthrowing government

(see this)

(and this)

3. News Corp Spying Operations Small Time Compared with Giant Google

(see this)

4. Twitter Google Gate – An Intelligent Prison is this Smart Grid

(see this)

5. Internet Kill Switch 2.0

(see this)

6. BART Police use Kill Switch to prevent Protest over Killer Police

(see this)

7. Internet Kill Switch? DHS Switched Killer Internet – Target Kill Switch Mislabels Over 80,000 Innocent Americans

(see this)

8. Obama Signs NDAA 2011-12 into Law, ending 222 years of the Bill of Rights?

(see this)

9. What would that look like, the NDAA Police State, the Kill-Switch of all justice and of civil liberties?

(see this)

10. What is this new army of secret police we now face?

(see this)


11. How would that happen? What could justify a roll out of full government control? The NDAA Kill Switch Police State and the i-9/11 event.

(see this)

12. Obama Blackout Agenda – Bankrupt United States Energy and Sovereignty
(see this)


(see this)

We are much more than one step over the line.

These are just a few of the steps the government has taken to get us this far down the line.




%d bloggers like this: