Home / Civil Liberties
While the sand slipped through the opening
And their hands reached for the golden ring....
CNet reports Apple has been so swamped with law enforcement demands to decrypt iPhone data, it has created a waiting list.
For background on the decryption, see here and this earlier article. I've uploaded the two pages of the October, 2012 ATF search warrant discussing Apple's ability to bypass security codes and provide the information to law enforcement here. (Obtained from Pacer in the Kentucky case, it's a poor copy but readable.)[More...]
(250 words in story) There's More :: Permalink :: Comments
Via Wired's Threat Level: Buried in the 800 page proposed immigration reform bill is a provision creating a biometric database for all Americans, not just immigrants.
The bill, titled Border Security, Economic Opportunity, and Immigration Modernization Act is here.
Buried in the more than 800 pages of the bipartisan legislation is language mandating the creation of the innocuously-named “photo tool,” a massive federal database administered by the Department of Homeland Security and containing names, ages, Social Security numbers and photographs of everyone in the country with a driver’s license or other state-issued photo ID.
Employers would be obliged to look up every new hire in the database to verify that they match their photo.
Privacy advocates say "Think of it as a government version of Foursquare, with Big Brother cataloging every check-in." [More...]
(5 comments, 216 words in story) There's More :: Permalink :: Comments
The ACLU has received a new batch of documents from the Justice Department, FBI and Executive Office of the US Attorney in response to FOIA requests.
New documents from the FBI and U.S. Attorneys’ offices paint a troubling picture of the government’s email surveillance practices. Not only does the FBI claim it can read emails and other electronic communications without a warrant—even after a federal appeals court ruled that doing so violates the Fourth Amendment—but the documents strongly suggest that different U.S. Attorneys’ offices around the country are applying conflicting standards to access communications content
You can access the documents at these links:
- 5/8/13 - Documents released by FBI
- 5/8/13 - Documents released by EOUSA
- 5/8/13 - Documents released by DOJ Criminal Division
Released Last month:
- 4/10/13 – Documents released by IRS
(14 comments) Permalink :: Comments
Cindy Cohn and Trevor Timm have an excellent article at Electronic Frontier Foundation explaining why more government surveillance is not the appropriate response to the Boston bombings or terrorism.
The capture of the Boston suspect was made possible by old-fashioned police work and the willingness of the public to help in such a trying time. Technology surely assisted in this effort, but it’s important to note where it was and was not helpful, and to ensure that we don’t let the few dramatic situations lead us to downgrade our own privacy in everyday law enforcement situations.
Also, see Bruce Schneier in The Atlantic, who wrote after the bombing:
“When we react from fear, when we change our laws and policies to make our country less open, the terrorists succeed, even if their attacks fail.”
(20 comments) Permalink :: Comments
The Senate Judiciary Committee today passed a bill, originally proposed by Sen. Patrick Leahy, that would amend the Electronic Communications Privacy Act and require law enforcement to get a search warrant for emails that have been in electronic storage for more than 180 days. (A search warrant is currently required for emails in storage less than 180 days.)
Here is a copy of the bill.
Contrary to Republican disinformation, it would not affect terror cases, since there a provision that explicitly excludes FISA. [More...]
(7 comments, 543 words in story) There's More :: Permalink :: Comments
Senior Obama administration officials have secretly authorized the interception of communications carried on portions of networks operated by AT&T and other Internet service providers, a practice that might otherwise be illegal under federal wiretapping laws.
The secret legal authorization from the Justice Department originally applied to a cybersecurity pilot project in which the military monitored defense contractors' Internet links. Since then, however, the program has been expanded by President Obama to cover all critical infrastructure sectors including energy, healthcare, and finance starting June 12.
(4 comments, 205 words in story) There's More :: Permalink :: Comments
The ACLU sent an FOIA request to the IRS to determine if it has changed its policy (in effect as late as 2009) about reading emails. The IRS believed that a warrant wasn't necessary.
Based on the response to its request, and reading between the lines, the ACLU is not convinced the IRS has changed its position. [More...]
(1 comment, 177 words in story) There's More :: Permalink :: Comments
Via CNet, the DEA is complaining it can't access Apple iMessages with a pen register or wiretap order. Here's the text of the memo CNET obtained:
In 2011, Apple® Inc. developed iMessage®, an instant messaging service capable of sending plain text, pictures, movies, locations, and contacts. On February 21, 2013, the DEA San Jose Resident Office (SJRO) learned that text messages sent v1a iMessages® between Apple products (iPhone®, iPad®, iPod touch®, and iMao:ID) are not captured by pen register, trap and trace devices, or Title Ill interceptions. iMessages between two Apple devices are considered encrypted communication and cannot be intercepted, regardless of the cell phone service provider.
[More...]
(10 comments, 310 words in story) There's More :: Permalink :: Comments
What happens when you refuse to comply with a request for information about your citizenship at an immigration checkpoint within the U.S.? Apparently, they have to let you continue on your way and you don't have answer questions or go to the secondary area. At least, that's what happens to those stopped in this video that refused -- the agents backed down.
Good to know. But why are there immigration checkpoints 30 miles from the border?
(37 comments) Permalink :: Comments
Through a Freedom of Information request, the ACLU has obtained documents about a U.S. Marshal's experimental project to employ the use of drones for domestic surveillance. The documents are here. One states:
USMS Technical Operations Group's UAV Program provides a highly portable, rapidly deployable overhead collection device that will provide a multi-role surveillance platform to assist in [redacted] detection of targets.
[More...]
(19 comments, 235 words in story) There's More :: Permalink :: Comments
Republicans will make a political issue out of anything, even the implementation of existing legal and humane policies concerning undocumented immigrants.
Here is the December, 2012 Detainee Guidance Policy. It limits the use of detainers to individuals who meet the Department's enforcement priorities and restricts the use of detainers against those arrested for minor misdemeanor offenses such as traffic offenses and other petty crimes. The policy is intended to ensure that available resources are focused on apprehending felons, repeat offenders and other ICE priorities. [More...]
(3 comments, 752 words in story) There's More :: Permalink :: Comments
USA Today has obtained a draft of President Obama's proposed immigration reform bill. It reports there is a path to lawful residency included in the bill, which will take 8 years. During this time, those working towards citizenship will receive a Lawful Prospective Immigrant Visa.
The bill sounds similar to the unsuccessful 2011 Comprehensive Immigration Reform Act (S.1258)and the 2009 and 2007 bills before that. [More...]
(22 comments, 1369 words in story) There's More :: Permalink :: Comments
<< Previous 12 | Next 12 >> |