Post by Deleted on May 27, 2013 19:05:17 GMT -8
For those who don't know, RIAA stands for Recording Industry Association of America which means they do all the stuff for music where as MPAA is the Motion Picture Association of America for... movies, duh.
Anyway, the RIAA and MPAA are the leading reasons for such laws, in America, like CISPA, PIPA, SOPA, etc. Now, they have a new one named the Commission on the Theft of American Intellectual Property (CTAIP). Now, here's the thing, I will post the main things about it from 84 page shit they talked about:
Additionally, software can be written that will allow only authorized users to open files containing valuable information. If an unauthorized person accesses the information, a range of actions might then occur. For example, the file could be rendered inaccessible and the unauthorized user’s computer could be locked down, with instructions on how to contact law enforcement to get the password needed to unlock the account. Such measures do not violate existing laws on the use of the Internet, yet they serve to blunt attacks and stabilize a cyber incident to provide both time and evidence for law enforcement to become involved.
It gets even better:
Yeah... fuck you, America.
Anyway, the RIAA and MPAA are the leading reasons for such laws, in America, like CISPA, PIPA, SOPA, etc. Now, they have a new one named the Commission on the Theft of American Intellectual Property (CTAIP). Now, here's the thing, I will post the main things about it from 84 page shit they talked about:
Additionally, software can be written that will allow only authorized users to open files containing valuable information. If an unauthorized person accesses the information, a range of actions might then occur. For example, the file could be rendered inaccessible and the unauthorized user’s computer could be locked down, with instructions on how to contact law enforcement to get the password needed to unlock the account. Such measures do not violate existing laws on the use of the Internet, yet they serve to blunt attacks and stabilize a cyber incident to provide both time and evidence for law enforcement to become involved.
It gets even better:
While not currently permitted under U.S. law, there are increasing calls for creating a more permissive environment for active network defense that allows companies not only to stabilize a situation but to take further steps, including actively retrieving stolen information, altering it within the intruder’s networks, or even destroying the information within an unauthorized network. Additional measures go further, including photographing the hacker using his own system’s camera, implanting malware in the hacker’s network, or even physically disabling or destroying the hacker’s own computer or network.
Yeah... fuck you, America.