Page 1 of 2 12 LastLast
Results 1 to 10 of 14
Like Tree3Likes

Thread: New Internet Censorship bill WOULD PUT commenter in jail about ILLEGALS IMMIGRATION

Thread Information

Users Browsing this Thread

There are currently 1 users browsing this thread. (0 members and 1 guests)

  1. #1
    Member
    Join Date
    Mar 2012
    Posts
    64

    New Internet Censorship bill WOULD PUT commenter in jail about ILLEGALS IMMIGRATION

    Take a look at this. 48 States including Arizona are going to sign Cyber Bullying laws that would make this forum illegal and perhaps be put in jail for 6 months for saying something politically incorrect.

    Arizona Passes Internet Bullying Bill - ABC News

    The Daily Bell - US Internet Criminalization Now Pursued at State Level

    http://www.cyberbullying.us/Bullying...lying_Laws.pdf

    People like Congressman Lamar Smith(R) of Texas would like you to think his E-Verify bill would stop illegal immigration, but it would allow the illegals in this country to stay and become citizens only NEW illegals would be effected. Take a look at Pennsylvania Congressman and former Hazeltown PA Congressman Lou Barletta statements on Congressman Smiths E-Verify Bill.

    If Lou Barletta Is STILL Against Lamar Smith's E-Verify Bill - Then So Am I | VDARE.com

    Lou Barletta for Congress » National Journal: Longtime Illegal-Immigration Foe Vows to Kill E-Verify

    You see like Congressman Lamar Smith's SOPA Internet Censorship bill, Government is once again getting tired of the voice of the American People and is trying to silence FREE SPEECH. Sites like this would have the Southern Poverty Law Center putting people in jail for exercising there rights to comment about the dangers of illegal immigration. Please call Congress 2022243121 and tell them NO to the Cyber Bullying BILLS. This is not about bullying, these bills will silence FREE SPEECH.
    Last edited by sorg127; 04-04-2012 at 02:19 AM.

  2. #2
    working4change
    Guest
    Last edited by working4change; 04-04-2012 at 07:21 AM.

  3. #3
    Senior Member stevetheroofer's Avatar
    Join Date
    Sep 2010
    Location
    somewhere near Mexico I reckon!
    Posts
    9,681
    We let this pass, it's over for the "Home Team" click on this link, and contact your federal senate and House Reps! It really is fast!

    http://www.alipac.us/f9/congressiona...atives-248063/
    Last edited by stevetheroofer; 04-04-2012 at 07:58 AM.
    Support our FIGHT AGAINST illegal immigration & Amnesty by joining our E-mail Alerts at http://eepurl.com/cktGTn

  4. #4
    Senior Member artclam's Avatar
    Join Date
    Apr 2006
    Posts
    728
    I looked at the Arizona bill at Documents For Bill and don't see how it could be interpreted this way. What I do find bizarre about this bill is paragraph D "For the purposes of this section, "electronic or digital device" includes any wired or wireless communication device and multimedia storage device. " This definition includes a book and stone tablet as an "electronic or digital device".

  5. #5
    Senior Member artclam's Avatar
    Join Date
    Apr 2006
    Posts
    728
    OK, I was wrong in the above post. Paragraph A states, " It is unlawful for any person, with intent to terrify, intimidate, threaten, harass, annoy or offend, to use any electronic or digital device and use any obscene, lewd or profane language or suggest any lewd or lascivious act, or threaten to inflict physical harm to the person or property of any person. It is also unlawful to otherwise disturb by repeated anonymous electronic or digital communications the peace, quiet or right of privacy of any person at the place where the communications were received."

  6. #6
    Member
    Join Date
    Mar 2012
    Posts
    64

    Bill would stop alipac from sending e-mails in regard to illegal immigration issues

    The day of a free internet and to protest against amnesty may be over if CISPA passes.

    Worse than SOPA, CISPA will allow monitoring, censorship, alteration of ANY online communication - Democratic Underground

    So if the Government decides ALIPAC passing information by e-mail to stop Amnesty for illegal, THE GOVERNMENT CAN BLOCK IT.

    As one part of this article says:

    There are almost no restrictions on what can be collected and how it can be used, provided a company can claim it was motivated by ‘cybersecurity purposes,’” the EFF continues. “That means a company like Google, Facebook, Twitter, or AT&T could intercept your emails and text messages, send copies to one another and to the government, and modify those communications or prevent them from reaching their destination if it fits into their plan to stop cybersecurity threats.”

    The house is going to be debating this bill next week, should it pass the Government would be able to block sites that oppose its agenda and block e-mails to stop people from finding out what they are about to pass.

    CALL CONGRESS 2022243121 and tell them NO to CISPA.

  7. #7
    Senior Member stevetheroofer's Avatar
    Join Date
    Sep 2010
    Location
    somewhere near Mexico I reckon!
    Posts
    9,681
    Quote Originally Posted by sorg127 View Post
    The day of a free internet and to protest against amnesty may be over if CISPA passes.
    It's the weekend so Washington is closed, after leaving a scathing voicemail please feel free to contact any backstabbing congress members via stevetheroofer's congressional contact pg. it's fast and easy, and America will thank you for it! And it's "Free!"

    http://www.alipac.us/f9/congressiona...atives-248063/
    Support our FIGHT AGAINST illegal immigration & Amnesty by joining our E-mail Alerts at http://eepurl.com/cktGTn

  8. #8
    Administrator ALIPAC's Avatar
    Join Date
    Nov 2004
    Location
    Gheen, Minnesota, United States
    Posts
    67,787
    Im going to ask some of our top activists to come in and dig in on the full text of this bill and debate any impact it could have on groups like ALIPAC and free speech in America.

    W
    Join our efforts to Secure America's Borders and End Illegal Immigration by Joining ALIPAC's E-Mail Alerts network (CLICK HERE)

  9. #9
    Senior Member JohnDoe2's Avatar
    Join Date
    Aug 2008
    Location
    PARADISE (San Diego)
    Posts
    99,040
    H.R.3523 -- Cyber Intelligence Sharing and Protection Act of 2011 (Introduced in House - IH)

    HR 3523 IH
    112th CONGRESS
    1st Session

    H. R. 3523

    To provide for the sharing of certain cyber threat intelligence and cyber threat information between the intelligence community and cybersecurity entities, and for other purposes.

    IN THE HOUSE OF REPRESENTATIVES

    November 30, 2011

    Mr. ROGERS of Michigan (for himself, Mr. RUPPERSBERGER, Mr. KING of New York, Mr. UPTON, Mrs. MYRICK, Mr. LANGEVIN, Mr. CONAWAY, Mr. MILLER of Florida, Mr. BOREN, Mr. LOBIONDO, Mr. CHANDLER, Mr. NUNES, Mr. GUTIERREZ, Mr. WESTMORELAND, Mrs. BACHMANN, Mr. ROONEY, Mr. HECK, Mr. DICKS, Mr. MCCAUL, Mr. WALDEN, Mr. CALVERT, Mr. SHIMKUS, Mr. TERRY, Mr. BURGESS, Mr. GINGREY of Georgia, Mr. THOMPSON of California, Mr. KINZINGER of Illinois, Mr. AMODEI, and Mr. POMPEO) introduced the following bill; which was referred to the Select Committee on Intelligence (Permanent Select)

    --------------------------------------------------------------------------

    A BILL

    To provide for the sharing of certain cyber threat intelligence and cyber threat information between the intelligence community and cybersecurity entities, and for other purposes.

    Be it enacted by the Senate and House of Representatives of the United States of America in Congress assembled,

    SECTION 1. SHORT TITLE.

    This Act may be cited as the `Cyber Intelligence Sharing and Protection Act of 2011'.

    SEC. 2. CYBER THREAT INTELLIGENCE AND INFORMATION SHARING.

    (a) In General- Title XI of the National Security Act of 1947 (50 U.S.C. 442 et seq.) is amended by adding at the end the following new section:

    `CYBER THREAT INTELLIGENCE AND INFORMATION SHARING

    `Sec. 1104. (a) Intelligence Community Sharing of Cyber Threat Intelligence With Private Sector-
    `(1) IN GENERAL- The Director of National Intelligence shall establish procedures to allow elements of the intelligence community to share cyber threat intelligence with private-sector entities and to encourage the sharing of such intelligence.
    `(2) SHARING AND USE OF CLASSIFIED INTELLIGENCE- The procedures established under paragraph (1) shall provide that classified cyber threat intelligence may only be--
    `(A) shared by an element of the intelligence community with--
    `(i) certified entities; or
    `(ii) a person with an appropriate security clearance to receive such cyber threat intelligence;
    `(B) shared consistent with the need to protect the national security of the United States; and
    `(C) used by a certified entity in a manner which protects such cyber threat intelligence from unauthorized disclosure.
    `(3) SECURITY CLEARANCE APPROVALS- The Director of National Intelligence shall issue guidelines providing that the head of an element of the intelligence community may, as the head of such element considers necessary to carry out this subsection--
    `(A) grant a security clearance on a temporary or permanent basis to an employee or officer of a certified entity;
    `(B) grant a security clearance on a temporary or permanent basis to a certified entity and approval to use appropriate facilities; and
    `(C) expedite the security clearance process for a person or entity as the head of such element considers necessary, consistent with the need to protect the national security of the United States.
    `(4) NO RIGHT OR BENEFIT- The provision of information to a private-sector entity under this subsection shall not create a right or benefit to similar information by such entity or any other private-sector entity.
    `(b) Private Sector Use of Cybersecurity Systems and Sharing of Cyber Threat Information-
    `(1) IN GENERAL-
    `(A) CYBERSECURITY PROVIDERS- Notwithstanding any other provision of law, a cybersecurity provider, with the express consent of a protected entity for which such cybersecurity provider is providing goods or services for cybersecurity purposes, may, for cybersecurity purposes--
    `(i) use cybersecurity systems to identify and obtain cyber threat information to protect the rights and property of such protected entity; and
    `(ii) share such cyber threat information with any other entity designated by such protected entity, including, if specifically designated, the Federal Government.
    `(B) SELF-PROTECTED ENTITIES- Notwithstanding any other provision of law, a self-protected entity may, for cybersecurity purposes--
    `(i) use cybersecurity systems to identify and obtain cyber threat information to protect the rights and property of such self-protected entity; and
    `(ii) share such cyber threat information with any other entity, including the Federal Government.
    `(2) USE AND PROTECTION OF INFORMATION- Cyber threat information shared in accordance with paragraph (1)--
    `(A) shall only be shared in accordance with any restrictions placed on the sharing of such information by the protected entity or self-protected entity authorizing such sharing, including, if requested, appropriate anonymization or minimization of such information;
    `(B) may not be used by an entity to gain an unfair competitive advantage to the detriment of the protected entity or the self-protected entity authorizing the sharing of information; and
    `(C) if shared with the Federal Government--
    `(i) shall be exempt from disclosure under section 552 of title 5, United States Code;
    `(ii) shall be considered proprietary information and shall not be disclosed to an entity outside of the Federal Government except as authorized by the entity sharing such information; and
    `(iii) shall not be used by the Federal Government for regulatory purposes.
    `(3) EXEMPTION FROM LIABILITY- No civil or criminal cause of action shall lie or be maintained in Federal or State court against a protected entity, self-protected entity, cybersecurity provider, or an officer, employee, or agent of a protected entity, self-protected entity, or cybersecurity provider, acting in good faith--
    `(A) for using cybersecurity systems or sharing information in accordance with this section; or
    `(B) for not acting on information obtained or shared in accordance with this section.
    `(4) RELATIONSHIP TO OTHER LAWS REQUIRING THE DISCLOSURE OF INFORMATION- The submission of information under this subsection to the Federal Government shall not satisfy or affect any requirement under any other provision of law for a person or entity to provide information to the Federal Government.
    `(c) Report on Information Sharing- The Privacy and Civil Liberties Oversight Board established under section 1061 of the Intelligence Reform and Terrorism Prevention Act of 2004 (5 U.S.C. 601 note) shall annually submit to Congress a report in unclassified form containing--
    `(1) a review of the sharing and use of information by the Federal Government under this section and the procedures and guidelines established or issued by the Director of National Intelligence under subsection (a); and
    `(2) any recommendations of the Board for improvements or modifications to such authorities to address privacy and civil liberties concerns.
    `(d) Federal Preemption- This section supersedes any statute of a State or political subdivision of a State that restricts or otherwise expressly regulates an activity authorized under subsection (b).
    `(e) Savings Clause- Nothing in this section shall be construed to limit any other authority to use a cybersecurity system or to identify, obtain, or share cyber threat intelligence or cyber threat information.
    `(f) Definitions- In this section:
    `(1) CERTIFIED ENTITY- The term `certified entity' means a protected entity, self-protected entity, or cybersecurity provider that--
    `(A) possesses or is eligible to obtain a security clearance, as determined by the Director of National Intelligence; and
    `(B) is able to demonstrate to the Director of National Intelligence that such provider or such entity can appropriately protect classified cyber threat intelligence.
    `(2) CYBER THREAT INTELLIGENCE- The term `cyber threat intelligence' means information in the possession of an element of the intelligence community directly pertaining to a vulnerability of, or threat to, a system or network of a government or private entity, including information pertaining to the protection of a system or network from--
    `(A) efforts to degrade, disrupt, or destroy such system or network; or
    `(B) theft or misappropriation of private or government information, intellectual property, or personally identifiable information.
    `(3) CYBERSECURITY PROVIDER- The term `cybersecurity provider' means a non-governmental entity that provides goods or services intended to be used for cybersecurity purposes.
    `(4) CYBERSECURITY PURPOSE- The term `cybersecurity purpose' means the purpose of ensuring the integrity, confidentiality, or availability of, or safeguarding, a system or network, including protecting a system or network from--
    `(A) efforts to degrade, disrupt, or destroy such system or network; or
    `(B) theft or misappropriation of private or government information, intellectual property, or personally identifiable information.
    `(5) CYBERSECURITY SYSTEM- The term `cybersecurity system' means a system designed or employed to ensure the integrity, confidentiality, or availability of, or safeguard, a system or network, including protecting a system or network from--
    `(A) efforts to degrade, disrupt, or destroy such system or network; or
    `(B) theft or misappropriation of private or government information, intellectual property, or personally identifiable information.
    `(6) CYBER THREAT INFORMATION- The term `cyber threat information' means information directly pertaining to a vulnerability of, or threat to a system or network of a government or private entity, including information pertaining to the protection of a system or network from--
    `(A) efforts to degrade, disrupt, or destroy such system or network; or
    `(B) theft or misappropriation of private or government information, intellectual property, or personally identifiable information.
    `(7) PROTECTED ENTITY- The term `protected entity' means an entity, other than an individual, that contracts with a cybersecurity provider for goods or services to be used for cybersecurity purposes.
    `( SELF-PROTECTED ENTITY- The term `self-protected entity' means an entity, other than an individual, that provides goods or services for cybersecurity purposes to itself.'.
    (b) Procedures and Guidelines- The Director of National Intelligence shall--
    (1) not later than 60 days after the date of the enactment of this Act, establish procedures under paragraph (1) of section 1104(a) of the National Security Act of 1947, as added by subsection (a) of this section, and issue guidelines under paragraph (3) of such section 1104(a); and
    (2) following the establishment of such procedures and the issuance of such guidelines, expeditiously distribute such procedures and such guidelines to appropriate Federal Government and private-sector entities.
    (c) Initial Report- The first report required to be submitted under subsection (c) of section 1104 of the National Security Act of 1947, as added by subsection (a) of this section, shall be submitted not later than one year after the date of the enactment of this Act.
    (d) Table of Contents Amendment- The table of contents in the first section of such Act is amended by adding at the end the following new item:
    `Sec. 1104. Cyber threat intelligence and information sharing.'.

    Bill Text - 112th Congress (2011-2012) - THOMAS (Library of Congress)
    NO AMNESTY

    Don't reward the criminal actions of millions of illegal aliens by giving them citizenship.


    Sign in and post comments here.

    Please support our fight against illegal immigration by joining ALIPAC's email alerts here https://eepurl.com/cktGTn

  10. #10
    Senior Member JohnDoe2's Avatar
    Join Date
    Aug 2008
    Location
    PARADISE (San Diego)
    Posts
    99,040
    NO AMNESTY

    Don't reward the criminal actions of millions of illegal aliens by giving them citizenship.


    Sign in and post comments here.

    Please support our fight against illegal immigration by joining ALIPAC's email alerts here https://eepurl.com/cktGTn

Page 1 of 2 12 LastLast

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •