Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

It is likely you are working from the first draft of the bill without its amendments. In particular, later amendments narrow "cyber threats" to:

  ‘(3) CYBER THREAT INFORMATION.—
  ‘‘(A) IN GENERAL.—The term ‘cyber 
  threat information’ means information directly 
  pertaining to—
  ‘‘(i) a vulnerability of a system or net-
  work of a government or private entity; 
  ‘‘(ii) a threat to the integrity, con-
  fidentiality, or availability of a system or 
  network of a government or private entity 
  or any information stored on, processed on, 
  or transiting such a system or network; 
  ‘‘(iii) efforts to degrade, disrupt, or 
  destroy a system or network of a govern-
  ment or private entity; or 
  ‘‘(iv) efforts to gain unauthorized ac-
  cess to a system or network of a govern-
  ment or private entity, including to gain 
  such unauthorized access for the purpose 
  of exfiltrating information stored on, proc-
  essed on, or transiting a system or network 
  of a government or private entity
I'm not seeing BitTorrent in there.

(By the way, I don't think you deserve the downvotes for bringing this up. I found the amendments aggravating to track down, too. I'd been working from an earlier draft of CISPA that struck "intellectual property", which turned out not to be the one the House voted on.)



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: