“Although we appreciate the Intelligence Committee’s efforts to improve the bill and willingness to engage in a dialogue with privacy advocates, the changes in its most current draft do not come close to addressing the civil liberties threats posed by the bill, and some of the proposals would actually make CISPA worse. Therefore, Congress should not pass CISPA” – Sharan Bradford Franklin, of the Constitution Project

“To date, the authors of the bill have been unresponsive to these criticisms, offering amendments that are largely cosmetic. Dismissing the grave concerns about how this bill could undermine the core privacy rights of everyday Internet users, Rep. Mike Rogers characterized the growing protests against CISPA as ‘turbulence’ and vowed to push for a floor vote without radical changes.” – Rainey Reitman, of the Electronic Frontier Foundation

“The authors of CISPA have made some positive changes recently. Unfortunately, none of the changes gets to the heart of the privacy concerns that Internet users and advocacy groups have expressed.” – Kendall Burman of the Center for Democracy and Technology

“essentially means CISPA would override the relevant provisions in all other laws—including privacy laws.” – Electronic Frontier Foundation

“we must do everything within our power to safeguard the privacy rights of individual Internet users and ensure that Congress does not sacrifice those rights in a rush to pass vaguely-worded cybersecurity bills.” – Electronic Frontier Foundation

“using the Sony Hack as a hook is a cynical political ploy for a losing idea that is designed to harm the public and take away their privacy.” – TechDirt’s Mike Masnick

“CISPA 2015 would provide for an even cozier relationship between Silicon Valley and the US government at the detriment of civil liberties and privacy for everyone else” – writer Rachael Tacket

“More needs to be done to protect cyberspace and enhance computer security. But President Obama’s cybersecurity legislative proposal recycles old ideas that should remain where they’ve been since May 2011: on the shelf ” – Electronic Frontier Foundation

“We must do everything within our power to safeguard the privacy rights of individual Internet users and ensure that Congress does not sacrifice those rights in a rush to pass vaguely worded cyber security bills,” – Lee Tien, staff atty EFF

“I do worry about its chilling effects if enacted into law. Unless there is a carve out for research, the liability for clicking on links to security tools alone is worrying…even more so if RICO style laws are applied due to their broad nature and potential for abuse by aggressive prosecutors. We have had many decades to get used to prosecuting organized crime, but prosecuting technical computer crime is newer and harder to explain to juries. In that regard clear and easy to understand ‘red lines’ while more simplistic might be a better place to start” – Jeff Moss, the founder of Black Hat and DEFCON conferences

“the expansion of the definition may impact researchers who commonly scan public websites to detect potential vulnerabilities. These researchers should not have to face a felony charge if a prosecutor thinks they should have known the site prohibited scanning” – Mark Jaycox, of the EFF

“I fear we may have taken the wrong lesson from these recent high-profile attacks. These attacks were not the result of a missed opportunity to share information, but rather caused by substantial and obvious security failures and a culture of treating cyber security as an afterthought” – CA Democratic representative, Zoe Lofgren

“CISPA (1) fails to comprehend the ways in which existing laws allow sharing, but with accountability; (2) runs roughshod over federal and state laws protecting privacy; (3) could inadvertently immunize retaliatory hack-back security techniques; and (4) creates an “inner circle” of private entities willing to share and share alike with the government, but leaves disfavored service providers in the cybersecurity dark” – Jennifer Granick

“The bill amends the National Security Act of 1947 to grant access to any data regarding a so-called cyber-threat to not just the government but also private security agencies” – Jackie Cohen