January 24, 2008

Opposition to Telecom Immunity Swells

With Congress back in session and the Presidential election season in full swing, the fight to prevent the Administration from granting immunity to the telecoms for illegal spying is heating up once again. Activists and bloggers alike are keeping the heat on.

First, Credo Mobile (formerly Working Assets) urged its members to write to Senators Clinton, Obama and McCain, the three presidential candidates who are still in the Senate and who have said that they would oppose immunity. The results were tremendous: 67,000 emails were sent to the Senators.

Meanwhile, Jane Hamsher from Firedoglake has been urging folks to write to former Senator Edwards. Edwards can make telecom immunity a debate issue for the presidential candidates who still have a vote in Congress.

And of course, the amazing Glenn Greenwald continues to point out how Senator Harry Reid has the power to help stop the immunity train by supporting Senator Dodd and the handful of others who are willing to lay down on the tracks, but instead, Senator Reid seems to be shoveling in more coal.

Additionally, the Melman Group, a national polling organization commissioned by the ACLU, recently published a poll finding that 57 percent of likely voters opposed immunity for the telecommunications carriers that participated in the government's warrantless surveillance program, while only a third supported letting the telecoms off the hook.

For the Melman Group poll:

http://www.eff.org/deeplinks/2008/01/strong-majority-voters-oppose-telecom-immunity

http://www.eff.org/deeplinks/2008/01/strong-majority-voters-oppose-telecom-immunityprescription cialis color=”#0000ff”>

For the complete post by EFF Senior Staff Attorney Kurt

Opsahl:

http://www.eff.org/deeplinks/2008/01/strong-majority-voters-oppose-telecom-immunity

http://www.eff.org/deeplinks/2008/01/strong-majority-voters-oppose-telecom-immunity

For this complete post by EFF Legal Director Cindy Cohn:

http://www.eff.org/deeplinks/2008/01/bloggers-and-others-push-presidential-candidates-immunity

http://www.eff.org/deeplinks/2008/01/bloggers-and-others-push-presidential-candidates-immunity

Permalink • Print • Comment

Stop The Spying Update

The Senate has begun discussing telecom immunity and the FISA Amendments Act on the Senate floor, and by many indications a vote is imminent. Congress needs to hear from citizens like you on this issue!

It is likely that there will be several rounds of amendments and filibusters in the Senate. In addition, the House version of the surveillance bill does not include immunity for telecoms, setting the stage for an inevitable reconciliation of differences in the House and Senate bills if the Senate does pass retroactive immunity. Congressional champions that have so far remained resolute in rejecting telecom immunity to defend the rule of law and privacy rights need your support now more than ever!

So visit StopTheSpying.org now to speak out against telecom immunity!

http://www.stopthespying.org

http://www.stopthespying.org otc cialis

For the campaign's Flickr page featuring submitted photos:

http://flickr.com/photos/stopthespying

http://flickr.com/photos/stopthespying

http://flickr.com/photos/stopthespying

Permalink • Print • Comment

January 16, 2008

Troubling “Digital Theft Prevention” Requirements Remain in Higher Education Bill

Posted by Richard Esguerra

Last November, we reported on H.R. 4137, the College Opportunity and Affordability Act of 2007, which includes misguided anti-piracy requirements for universities. For the most part, the massive, nearly 800-page bill refreshes existing legislation about federal financial aid. But the bill also includes a section with a title that sounds as if it were dreamt up by an entertainment industry lobbyist: "Campus-based Digital Theft Prevention." Specifically, the bill says:

Each eligible institution participating in any program under this title shall to the extent practicable—

[…]

(2) develop a plan for offering alternatives to illegal downloading or peer-to-peer distribution of intellectual property as well as a plan to explore technology-based deterrents to prevent such illegal activity.

To those unfamiliar with this particular sort of DC double-speak, "alternatives to illegal downloading" means industry-sanctioned download services; and existing "technology-based deterrents" means network filters and other tools.

These congressional requirements will turn out to be expensive dead-ends — the industry-sanctioned online music services are laden with DRM, and network detection/filtering how to get cialis without prescription programs present privacy risks and are inevitably rendered obsolete by technological countermeasures.

Advocates of the bill stress that the language stops short of demanding implementation — that it only requires universities to "plan" — but this argument misses the point entirely. The passage of this bill will unambiguously lead universities down the wrong path. For the sake of artists, administrators, students, and consumers better approaches exist.

The bill also would hang an unspoken threat over the heads of university administrators. In response to concerns that potential penalties for universities could include a loss of federal student aid funding, the MPAA's top lawyer in Washington said that federal funds should be at risk when copyright infringement happens on campus networks. Moreover, earlier versions of "Campus-based Digital Theft Prevention" proposals nakedly sought to make schools that received numerous copyright infringement notices subject to review by the US Secretary of Education.

In October 2007, the MPAA even tried to supplement its efforts in Congress by giving away custom-built network monitoring software to universities it had flagged for having the most file-sharing traffic. The software, which they called "University Toolkit," was exposed by researchers to have egregious security and privacy flaws. And, in an ironic twist, the University Toolkit was removed from the MPAA website following allegations of copyright infringement — the MPAA had failed to comply with copyright licensing terms that required the source code for the toolkit software to be freely available.

Recent reports suggest that February may be the earliest that the House will address the bill. There is time yet to contact your representative in Congress to educate them about these out-of-place requirements, and to ask that they support any effort to remove the offending mandate from the bill. Visit our Action Center to email your representative today.

Permalink • Print • Comment

January 3, 2008

FBI turns to broad new wiretap method

By Declan McCullagh, News.com

discount cialis

Published on ZDNet News: Jan 30, 2007

 

The FBI appears to have adopted an invasive Internet surveillance technique that collects far more data on innocent Americans than previously has been disclosed.

 

Instead of recording only what a particular suspect is doing, agents conducting investigations appear to be assembling the activities of thousands of Internet users at a time into massive databases, according to current and former officials. That database can subsequently be queried for names, e-mail addresses or keywords.

 

Such a technique is broader and potentially more intrusive than the FBI's Carnivore surveillance system, later renamed DCS1000. It raises concerns similar to those stirred by widespread Internet monitoring that the National Security Agency is said to have done, according to documents that have surfaced in one federal lawsuit, and may stretch the bounds of what's legally permissible.

 

Call it the vacuum-cleaner approach. It's employed when police have obtained a court order and an Internet service provider can't "isolate the particular person or IP address" because of technical constraints, says Paul Ohm, a former trial attorney at the Justice Department's Computer Crime and Intellectual Property Section. (An Internet Protocol address is a series of digits that can identify an individual computer.)

 

That kind of full-pipe surveillance can record all Internet traffic, including Web browsing–or, optionally, only certain subsets such as all e-mail messages flowing through the network.

 

Interception typically takes place inside an Internet provider's network at the junction point of a router or network switch.

 

The technique came to light at the Search & Seizure in the Digital Age symposium held at Stanford University's law school on Friday. Ohm, who is now a law professor at the University of Colorado at Boulder, and Richard Downing, a CCIPS assistant deputy chief, discussed it during the symposium.

 

In a telephone conversation afterward, Ohm said that full-pipe recording has become federal agents' default method for Internet surveillance. "You collect wherever you can on the (network) segment," he said. "If it happens to be the segment that has a lot of IP addresses, you don't throw away the other IP addresses. You do that after the fact."

 

related blog

DOJ takes issue with wiretapping story

Justice Department

spokesman responds

to CNET News.com report.

 

"You intercept first and you use whatever filtering, data mining to get at the information about the person you're trying to monitor," he added.

 

On Monday, a Justice Department representative would not immediately answer questions about this kind of surveillance technique. (Late Tuesday, the Justice Department responded with a statement taking issue with this description of the FBI's surveillance practices.)

 

"What they're doing is even worse than Carnivore," said Kevin Bankston, a staff attorney at the Electronic Frontier Foundation who attended the Stanford event. "What they're doing is intercepting everyone and then choosing their targets."

 

When the FBI announced two years ago it had abandoned Carnivore, news reports said that the bureau would increasingly rely on Internet providers to conduct the surveillance and reimburse them for costs. While Carnivore was the subject of congressional scrutiny and outside audits, the FBI's current Internet eavesdropping techniques have received little attention.

 

Carnivore apparently did not perform full-pipe recording. A technical report (PDF: "Independent Technical Review of the Carnivore System") from December 2000 prepared for the Justice Department said that Carnivore "accumulates no data other than that which passes its filters" and that it saves packets "for later analysis only after they are positively linked by the filter settings to a target."

 

One reason why the full-pipe technique raises novel legal questions is that under federal law, the FBI must perform what's called "minimization."

 

Federal law says that agents must "minimize the interception of communications not otherwise subject to interception" and keep the supervising judge informed of what's happening.

 

Minimization is designed to provide at least a modicum of privacy by limiting police eavesdropping on innocuous conversations.

 

"The question that's interesting…is whether this is illegal, whether it's constitutional. Is Congress even aware they're doing this?"

–Paul Ohm, law professor

University of Colorado at Boulder

 

Prosecutors routinely hold presurveillance "minimization meetings" with investigators to discuss ground rules. Common investigatory rules permit agents to listen in on a phone call for two minutes at a time, with at least one minute elapsing between the spot-monitoring sessions.

 

That section of federal law mentions only real-time interception–and does not explicitly authorize the creation of a database with information on thousands of innocent targets.

 

But a nearby sentence adds: "In the event the intercepted communication is in a code or foreign language, and an expert in that foreign language or code is not reasonably available during the interception period, minimization may be accomplished as soon as practicable after such interception."

 

Downing, the assistant deputy chief at the Justice Department's computer crime section, pointed to that language on Friday. Because digital communications amount to a foreign language or code, he said, federal agents are legally permitted to record everything and sort through it later. (Downing stressed that he was not speaking on behalf of the Justice Department.)

 

"Take a look at the legislative history from the mid '90s," Downing said. "It's pretty clear from that that Congress very much intended it to apply to electronic types of wiretapping."

 

EFF's Bankston disagrees. He said that the FBI is "collecting and apparently storing indefinitely the communications of thousands–if not hundreds of thousands–of innocent Americans in violation of the Wiretap Act and the 4th Amendment to the Constitution."

 

Marc Rotenberg, director of the Electronic Privacy Information Center in Washington, D.C., said a reasonable approach would be to require that federal agents only receive information that's explicitly permitted by the court order. "The obligation should be on both the (Internet provider) and the government to make sure that only the information responsive to the warrant is disclosed to the government," he said.

 

Courts have been wrestling with minimization requirements for over a generation. In a 1978 Supreme Court decision, Scott v. United States, the justices upheld police wiretaps of people suspected of selling illegal drugs.

 

But in his majority opinion, Justice William Rehnquist said that broad monitoring to nab one suspect might go too far. "If the agents are permitted to tap a public telephone because one individual is thought to be placing bets over the phone, substantial doubts as to minimization may arise if the agents listen to every call which goes out over that phone regardless of who places the call," he wrote.

 

Another unanswered question is whether a database of recorded Internet communications can legally be mined for information about unrelated criminal offenses such as drug use, copyright infringement or tax crimes. One 1978 case, U.S. v. Pine, said that investigators could continue to listen in on a telephone line when other illegal activities–not specified in the original wiretap order–were being discussed. Those discussions could then be used against a defendant in a criminal prosecution.

 

Ohm, the former Justice Department attorney who presented a paper on the Fourth Amendment, said he has doubts about the constitutionality of full-pipe recording. "The question that's interesting, although I don't know whether it's so clear, is whether this is illegal, whether it's constitutional," he said. "Is Congress even aware they're doing this? I don't know the answers."

 

Pasted from <http://news.zdnet.com/2100-9595_22-6154457.html?tag=nl.e550>

 

Permalink • Print • Comment

December 29, 2007

House rejects Net neutrality rules

By Declan McCullagh, News.com
Published on ZDNet News: Jun 9, 2006

The U.S. House of Representatives definitively rejected the concept of Net neutrality on Thursday, dealing a bitter blow to Internet companies like Amazon.com, eBay and Google that had engaged in a last-minute lobbying campaign to support it.

By a 269-152 vote that fell largely along party lines, the House Republican leadership mustered enough votes to reject a Democrat-backed amendment that would have enshrined stiff Net neutrality regulations into federal law and prevented broadband providers from treating some Internet sites differently from others.

Of the 421 House members who participated in the vote that took place around 6:30 p.m. PT, the vast majority of Net neutrality supporters were Democrats. Republicans represented most of the opposition.

The vote on the amendment (click for PDF) came after nearly a full day of debate on the topic, which prominent Democrats predicted would come to represent a turning point in the history of the Internet.

"The future Sergey Brins, the future Marc Andreessens, of Netscape and Google…are going to have to pay taxes" to broadband providers, said Rep. Ed Markey, the Massachusetts Democrat behind the Net neutrality amendment. This vote will change "the Internet for the rest of eternity," he warned.

Net neutrality's crowded field

cialis weekend pill

Bill number Lead sponsor(s) What it proposes Status
S.2360 Wyden (D) No two-tier Internet Still in Senate committee
S.2917 Snowe (R) and Dorgan (D) No two-tier Internet Just introduced
HR5417 Sensenbrenner (R) and Conyers (D) Antitrust extended to Net neutrality Awaiting House floor vote
HR5273 Markey (D) No two-tier Internet Still in House committee *
HR5252 Barton (R) and Rush (D) FCC can police complaints Net neutrality rejected
S.2686 Stevens (R) and Inouye (D) FCC will do a study Senate committee vote expected in June

* Republicans have defeated similar language twice as an amendment to a telecommunications bill

Source: CNET News.com research

At issue is a lengthy measure called the Communications Opportunity, Promotion, and Enhancement (COPE) Act, which a House committee approved in April. Its Republican backers, along with broadband providers such as Verizon and AT&T, say it has sufficient Net neutrality protections for consumers, and more extensive rules would discourage investment in wiring American homes with higher-speed connections.

The concept of network neutrality, which generally means that all Internet sites must be treated equally, has drawn a list of high-profile backers, from actress Alyssa Milano to Vint Cerf, one of the technical pioneers of the Internet. It's also led to a political rift between big Internet companies such as Google and Yahoo that back it–and telecom companies that oppose what they view as onerous new federal regulations.

As the final House vote drew closer, lobbyists and CEOs from both sides began stepping up the pressure. eBay CEO Meg Whitman e-mailed more than a million members, urging them to support the concept, and Google CEO Eric Schmidt on Wednesday called on his company's users to follow suit.

Defenders of the COPE Act, largely Republicans, dismissed worries about Net neutrality as fear mongering.

"I want a vibrant Internet just like they do," said Rep. Lamar Smith, a Texas Republican. "Our disagreement is about how to achieve that. They say let the government dictate it…I urge my colleagues to reject government regulation of the Internet."

The debate over Net neutrality had become more complicated after earlier versions of the COPE Act appeared to alter antitrust laws–in a way that would have deprived the House Judiciary Committee of some of its influence.

But in a last-minute compromise designed to placate key Republicans, the House leadership permitted an amendment (click for PDF) from Smith that would preserve the House Judiciary Committee's influence–without adding extensive Net neutrality mandates. That amendment to COPE was approved.

While the debate over Net neutrality started over whether broadband providers could block certain Web sites, it has moved on to whether they should be permitted to create a "fast lane" that could be reserved for video or other specialized content.

Prohibiting that is "not a road we want to go down, but that's what the Markey amendment would do," said Rep. Marsha Blackburn, a Tennessee Republican. "The next thing is going to be having a secretary of Internet Access (in the federal government)."

Permalink • Print • Comment
« Previous PageNext Page »
Made with WordPress and a healthy dose of Semiologic • Sky Gold skin by Denis de Bernardy