“Youse guys
vote da right way or it's free colonoscopies for everyone!” Isn't
there a government funded/supported airport in almost every
congressional district? If that's not enough, VIPR expands TSA's
scope to trains, buses, elevators, tricycles, roller skates,
sneakers...
"It looks like Congress' recent
jabs at TSA were just posturing after all. Last Friday,
President Obama signed a spending act passed by both houses of
Congress. The act gives TSA a
$7.85 billion budget increase for 2012 and includes funding for
12 additional multi-modal
Visible Intermodal Prevention and Response (VIPR) teams and 140
new behavior
detection officers. It even includes funding for 250 shiny new
body scanners, which was originally
cut from the funding bill last May."
If I read this
correctly, by granting the telecomms immunity, the government took on
sole responsibility?
Appeals
Court Revives EFF’s Challenge to Government’s Massive Spying
Program
December 29, 2011 by Dissent
Woo hoo! From EFF:
The 9th U.S.
Circuit Court of Appeals today blocked the government’s attempt to
bury the Electronic Frontier Foundation’s (EFF’s) lawsuit against
the government’s illegal mass surveillance program, returning Jewel
v. NSA to the District Court for the next step.
The
court found that Jewel had alleged sufficient specifics about the
warrantless wiretapping program to proceed. Justices
rejected the government’s argument that the allegations about the
well-known spying program and the evidence of the Folsom Street
facility in San Francisco were too speculative.
“Since the
dragnet spying program first came to light, we have been fighting for
the chance to have a court determine whether it is legal,” said EFF
Legal Director Cindy Cohn. “Today, the Ninth Circuit has given us
that chance, and we look forward to proving the program is an
unconstitutional and illegal violation of the rights of millions of
ordinary Americans.”
Also
today, the court upheld the dismissal of EFF’s other case aimed
at ending the illegal spying, Hepting v. AT&T, which was the
first lawsuit against a telecom over its participation in the dragnet
domestic wiretapping. The court found that the so-called
“retroactive immunity” passed by Congress to stop
telecommunications customers from suing the companies is
constitutional, in part because the claims remained against the
government in Jewel v. NSA.
“By passing the
retroactive immunity for the telecoms’ complicity in the
warrantless wiretapping program, Congress abdicated its duty to the
American people,” said EFF Senior Staff Attorney Kurt Opsahl. “It
is disappointing that today’s decision endorsed the rights of
telecommunications companies over those over their customers.”
Today’s decision
comes nearly exactly six years after the first revelations of the
warrantless wiretapping program were published in the New York Times
on December 16, 2006. EFF will now move forward with the Jewel
litigation in the Northern District of California federal court. The
government is expected to raise the state secrets privilege as its
next line of defense but this argument has already been rejected in
other similar cases.
For the full
opinion in Jewel:
For the full
opinion in Hepting:
Previous
coverage of Jewel v. NSA on PogoWasRight.org and in
Pogo’s way-back archive.
I would really
like to hear the arguments here. Why would the DA want information
on anyone using the hashtags? (Think of it as the equivalent of
asking for all emails with the Subject “Stupid DA Tricks”) If I
commented on Occupy Boston's lack of a coherent plan using one of
those tags, does that make me an “enemy of the state?”
Update:
Judge refuses to quash subpoena of Twitter account used by person
linked to Occupy Boston
December 29, 2011 by Dissent
Martine Powers reports:
A Suffolk Superior
Court judge today ruled against a motion by lawyers from the American
Civil Liberties Union to quash a subpoena for information from
Twitter about a user involved with Occupy Boston.
On December 14,
Suffolk District Attorney Daniel F. Conley filed a subpoena with the
social networking site, asking for account information about a user
named “p0isAn0n,” who is believed to have ties to the Occupy
Boston movement.
Attorney Peter
Krupp, on behalf of the ACLU, filed a motion to invalidate the
subpoena based on First Amendment grounds.
But after a
sidebar conference between the lawyers that lasted more than 30
minutes, Suffolk Superior Court Judge Carol Ball today ruled against
the ACLU.
[...]
Read more on Boston
Globe.
I wouldn’t expect First Amendment
grounds to work if the criminal investigation concerns the
hacking of any web sites. If all the user did, however, was tweet
links to a data dump, then there are significant First Amendment
issues. Unfortunately, we do not know why the D.A. wants that
information and prosecutors generally get pretty wide latitude on
criminal investigations.
So again, I ask, what will Twitter
do? Will it turn over IP addresses associated with hashtags?
Twitter really needs to make some
public statement about how it is handling this matter. Is it waiting
to see if the lawyer appeals today’s ruling? Were Twitter’s
lawyers in court today? What are they doing about other parties
named/referenced in the subpoena where the subpoena appears defective
by using hashtags instead of accounts (or the right accounts)?
(Related)
Court
seals ACLU challenge to Twitter subpoena–Statement by the ACLU of
Massachusetts
December 29, 2011 by Dissent
Following today’s court ruling where
the court refused to quash the Twitter subpoena I’ve been covering
on this blog, the ACLU of Massachusetts released the following
statement:
We are
disappointed and concerned that a Suffolk Superior Court judge today
held a secret hearing over the objections of lawyers from the
American Civil Liberties Union of Massachusetts, and then impounded
all documents and motions filed in the case.
The matter
involves a challenge to an already publicly-available and
widely-reported administrative subpoena issued by the Suffolk
District Attorney’s office on December 14, 2011 to Twitter, seeking
personally identifying information for an anonymous Twitter user, as
well as information on anyone “associated with”
two Twitter hashtags: #d0xcak3 and #BostonPD. Twitter
hashtags are essentially key words used to indicate a topic of
conversation.
“The ACLU
believes that courtrooms and court proceedings should be open to the
public, except in rare and extraordinary circumstances,” said Carol
Rose, executive director for the ACLU of Massachusetts. “Secret
court proceedings, particularly proceedings involving First Amendment
issues, are troubling as a matter of both law and democracy. In
addition, the manner in which the administrative subpoena in this
case was used, and its purported scope, is equally troubling and, in
our opinion, well beyond what the Massachusetts statute allows.”
At the request of
the government, and over the objection of ACLU attorneys, Judge Carol
Ball today heard nearly 30 minutes of argument at sidebar–meaning
that arguments by the attorneys were closed to the public, with
several minutes of the hearing held with the judge hearing only
attorneys from the prosecutor’s office and excluding the ACLU
attorneys. Thereafter, the judge ruled that the record of the
proceedings and all documents filed by the parties were impounded by
the court.
Attorneys on the
case are Peter Krupp of Lurie & Krupp, LLP; John Reinstein,
senior legal counsel, and Laura Rótolo, staff attorney, of the ACLU
of Massachusetts; and Aden Fine, staff attorney with the national
ACLU Speech, Privacy and Technology Project.
This is where I wish a big mainstream
news outfit – like, say, Associated Press – would go fight the
seal as a matter of public interest. If the Fourth Circuit dealing
with the DOJ/WikiLeaks case can realize that some things should be
publicly available, I would hope the Massachusetts court would
appreciate the need for as much as transparency as possible.
...it comes FREE
with your social network!
December 29, 2011
EPIC
Sues DHS Over Covert Surveillance of Facebook and Twitter
"EPIC has filed a Freedom of
information Act lawsuit
against the Department of Homeland Security to force disclosure of
the details of the agency's social network monitoring program. In
news reports and a Federal
Register notice, the DHS has stated that it will
routinely monitor the public postings of users on Twitter and
Facebook. The agency plans to create fictitious user accounts and
scan posts of users for key terms. User data will be stored for five
years and shared with other government agencies. The
legal authority for the DHS program remains unclear. EPIC filed the
lawsuit after the DHS failed to reply to an April 2011 FOIA request.
For more information, see EPIC:
Social Networking Privacy."
No information is gathered from the
suspect or his phone. Data comes from the Cell Provider's logs.
Cheap way to avoid all that legal stuff?
De:
440,783 “Silent SMS” Used to Track German Suspects in 2010
December 29, 2011 by Dissent
Sean of F-Secure has an eye-opening
blog post today:
… one of the
most interesting things, from our point of view, was [Karsten] Nohl’s
brief reference to recent reports (Dec. 13th) about various German
police authorities having used nearly half a million “Silent SMS”
to track suspects in 2010.
[...]
The Federal
Ministry of the Interior provided
details on December 6th. (PDF)
In the screenshot
below, you can see the number of messages sent by three authorities
since 2006.
[...]
So what exactly
does this mean?
Well, basically,
various German law enforcement agencies have been
“pinging” mobile phones. Such pings only reply
whether or not the targeted resource is online or not, just like an
IP network ping from a computer would.
But then after
making their pings, the agencies have been requesting network logs
from mobile network operators. The logs don’t reveal information
from the mobile phones themselves, but they can be
used to locate the cell towers through which the pings traveled. And
thus, can be used to track the mobile targeted.
Read more on F-Secure.
Can law enforcement in the U.S. legally
use such silent SMS pings? Anyone know?
Business Opportunity? Buy the
copyrights to all those old medical journals? Perhaps the rights to
“How to file a copyright infringement lawsuit” are for sale?
"A recent New
England Journal of Medicine editorial talks about the
mini-mental state examination — a standardized screening test for
cognitive impairment. After years of being widely used, the
original authors claim to own copyright on the test and 'a
licensed version of the MMSE can now be purchased [...] for $1.23 per
test. The MMSE form is gradually disappearing from textbooks, Web
sites, and clinical tool kits.' The article goes on to describe the
working of copyright law and various alternative licenses, including
GNU Free Documentation License, and ends with the following
suggestion: 'We suggest that authors of widely used clinical tools
provide explicit permissive licensing, ideally with a form of
copyleft. Any new tool developed with public funds should be
required to use a copyleft or similar license to guarantee the
freedom to distribute and improve it, similar
to the requirement for open-access publication of research funded by
the National Institutes of Health.'"
In some cases these are the only
backups users have. In other cases these are the only copies.
Should/Do we care?
December 28, 2011
Commentary
- Online Archives Disappear Along With Unique Collections
… This article
by Matt Schwartz, with reporting by Eva Talmadge, in Technology
Review, provides insight into the work of some individuals with a
mission is to salvage
the "intellectual" property of millions of web users whose
terabytes of words, work and documents are disappearing despite
quick, creative and technologically adroit efforts to save what can
be called modern internet "history" on a global scale.
This article documents some of the challenges in the struggle to
manage massive data loss, the folks who are data defenders, and how
truly valuable
libraries collections are in serious danger. Variable associated
with digitizing collections (copyright, cost, shear volume of the
task, and global conflict to name just a few), continue to impact
this dynamic problem.
- "People tend to believe that Web operators will keep their data safe in perpetuity. They entrust much more than poetry to unseen servers maintained by system administrators they've never met. Terabytes of confidential business documents, e-mail correspondence, and irreplaceable photos are uploaded as well, even though vast troves of user data have been lost to changes of ownership, abrupt shutdowns, attacks by hackers, and other discontinuities of service. Users of GeoCities, once the third-most-trafficked site on the Web, lost 38 million homemade pages when its owner, Yahoo, shuttered the site in 2009 rather than continue to bear the cost of hosting it."
Can't imagine why anyone would want to
make anonymous calls? Have you been reading my Blog? This one's fir
Android...
At times, revealing your phone number
to somebody is not the wisest decision – you might be unwantedly
contacted [or subpoenaed Bob] after your
initial correspondence. Fortunately there are anonymous numbers that
can be used to call and text others.
- Similar tools: Numbr and PrivatePhone.
- Also read related article: 4
Really Popular Prank Call Websites & How They Work.
Whatever you do, don't install this on your
thumb drive and use it to hack your friend's (or the school's)
WiFi...
How
to find your Wi-Fi password
Fortunately
there's an easy-to-use program that can retrieve the security
information for networks saved on your computer.
Step 1:
Download
WirelessKeyView (or the 64-bit
version of WirelessKeyView) to a computer that can connect to the
wireless network.
(Related)
"Just a day after security
researcher Stefan Viehbock released details of a vulnerability in the
WiFi Protected Setup (WPS) standard that enables attackers to recover
the router PIN, a
security firm has published an open-source tool capable of exploiting
the vulnerability. The tool, known as Reaver, has the ability to
find the WPS PIN on a given router and then recover the WPA
passphrase for the router, as well. Tactical Network Solutions has
released the tool as an
open-source project on Google Code, but also is selling a more
advanced commercial version."
No comments:
Post a Comment