The strongest passions and most dangerous weaknesses of the human breast; ambition, avarice, vanity, the honorable or venial love of fame, are all in conspiracy against the desire and duty of peace.
Man doth usurp all space,
States thee, in rock, bush, river, in the face.
Never yet thine eyes behold a tree;
‘Tis no sea thou seest in the sea,
‘Tis but a disguised humanity.
To avoid thy fellow, vain thy plan;
All that interests a man, is man.
I have met people who exaggerate the differences, because they have not distinguished between differences of morality and differences of belief about facts. For example, one man said to me, ‘Three hundred years ago people in England were putting witches to death. Was that what you call the Rule of Human Nature or Right Conduct?’ But surely the reason we do not execute witches is that we do not believe there are such things. If we did – if we really thought that there were people going about who had sold themselves to the devil and received supernatural powers from him in return and were using these powers to kill their neighbours or drive them mad or bring bad weather, surely we would all agree that if anyone deserved the death penalty, then these filthy quislings did. There is no difference of moral principle here: the difference is simply about matter of fact. It may be a great advance in knowledge not to believe in witches: there is no moral advance in not executing them when you do not think they are there. You would not call a man humane for ceasing to set mousetraps if he did so because he believed there were no mice in the house.
I wrote to California Senator Diane Feinstein in opposition to CISPA, and this is what she wrote back. Not only does she ignore that I am completely opposed to it, but she’s proud of having sponsored and co-written the Senate iteration of it. Despite the liberals’ outrage against SOPA/PIPA/CISPA, they will continue to re-elect her. What a joke.
Dear Mr. Mehta:
Thank you for your letter about the “Cyber Intelligence Sharing and Protection Act” (H.R. 3523). I appreciate your taking the time to write and welcome the opportunity to respond.
The Cyber Intelligence Sharing and Protection Act passed the House of Representatives on April 29, 2012. The bill would, among other things, establish procedures to allow the Intelligence Community to share cyber threat intelligence with the private sector. On May 7, 2012, the bill was referred to the Senate Intelligence Committee, which I chair.
I agree with the authors of the House bill that our nation faces a serious and growing threat from cyber attack and espionage—threats to both our national security and our economy. Effective cybersecurity requires that the information on cyber threats and defenses in our government’s hands be passed to the private sector, and that information from industry be shared with the government.
That is why I authored the Cybersecurity Information Sharing Act of 2012 (S. 2102). That legislation—which became Title VII in the comprehensive Cybersecurity Act of 2012 (S. 2105) co-sponsored by Senators Susan Collins (R-ME), Joseph Lieberman (I-CT) and Jay Rockefeller (D-WV)—authorizes companies to monitor and defend their own networks. It establishes procedures for private sector companies to share cyber threat information with each other and with the federal government, and establishes procedures for the government to share classified cybersecurity threat information with certified private sector entities.
Importantly, however, the Cybersecurity Act of 2012 includes substantially more robust privacy protections, as well as better safeguards against the private sector abusing new information sharing authorities, than the bill the House passed.
In particular, our legislation narrowly defines cybersecurity information that can be shared; places limits on how that information can be used by the government; requires that government bodies for collecting and sharing information be civilian institutions; and prevents any information to be shared or government action to be taken based on activities that are protected under the Constitution. I have worked closely with privacy and civil liberty organizations to draft the legislation, and have continued to make changes to the bill to ensure proper protections are in place.
Like you, I recognize that cybersecurity is a very serious issue. We must ensure our national security, and at the same time, protect our civil liberties and our fundamental rights to privacy and free speech. Determining the best way to strike that balance will require careful consideration, and I will certainly keep your views in mind as the debate on this issue advances.
Once again, thank you for your letter. I am pleased that you are engaged in this important issue and hope you continue to inform me of issues that matter to you. If you have any additional questions or concerns, please do not hesitate to contact my office in Washington, D.C. at (202) 224-3841, or visit my website.
United States Senator
The United States’ debt in 1861 was $90 million. By 1865, it was $2.7 billion, a 3000% increase in 4 years to take away the states’ rights to secede from the union. Similarly, from 1932 to 1945, the US debt went from $19.4 billion to $258 billion, a 1330% increase, in order to “save” the nation from ruin. Both of these moments were followed by periods of massive increases in government spending as well as increased government interference in the lives of the citizenry. The reason? As Hans Sennholz put it, “A government debt is a government claim against personal income and private property – an unpaid tax bill.”