Archive for April, 2017

Germany to fine social networks up to 50m for not taking down illegal ‘fake news’ posts – The Independent

Social networks that fail to remove defamatoryfake news, hate speech and otherillegal content will be fined up to 50m (43m) under new plans agreed by the German government.

Angela Merkels cabinet voted on the measures amid concerns over free speech, with campaigners, technology firms and journalists raising fears that tightened regulations could restrict expression.

Heiko Maas, the German justice minister, vowed to push for similar rules Europe-wide, adding: There should be just as little tolerance for criminal incitement on social networks as on the street.

Trump calls leak fake newsand something that Nazi Germany would have done

We owe it to the victims of hate crime to manage this better.

The bill strengthens Germanys existing laws covering hate speech, slander, defamation, threats and incitement, adding to prison sentences already enforceable for Holocaust denial or inciting hatred against minorities.

The issue has taken on increasing urgency ahead of the countrys federal elections in September, with concerns the proliferation of fake news and racist content online could affect the outcome.

Fears over terror attacks claimed by Isis have been a point of contention, as has the reaction to the arrival of more than 1 million refugees in Germany over the past two years.

Facebookwon a court case last month after a Syrian refugee falsely accused of being a terrorist and attempted murderer in a series of xenophobic posts attempted to sue the social networking giant for damages.

Anas Modamani, whose chance selfie with Ms Merkel is one of a series of images seized upon by far-right groups, argued that failure to remove the posts put him at risk.

His lawyer pointed out that Facebooks community standards violations did not include libel, which is a criminal offence in Germany, the UK and elsewhere.

A photo of Anas Modamani taking a selfie with Angela Merkel went viral after it was used by news organisations around the world (Getty)

The new law would give social networks 24 hours to delete or block criminal content and seven days to deal with less clear-cut cases, with an obligation to report back to the person who filed the complaint about how it was handled.

Failure to comply could see a company fined up to 50m (43m), with its chief representative in Germany handed an additional penalty of 5m (4.3m).

The Digital Society Association was among the groups opposing the move, with its head Volker Tripp saying: It is the wrong approach to make social networks into a content police.

Bitkom, an association that represents digital companies, said the government should build up specialist teams to monitor online content for potential infringements, rather than expect social networks to do it themselves.

Given the short deadlines and the severe penalties, providers will be forced to delete doubtful statements as a precaution,said Bitkom manager Bernhard Rohleder.

That would have a serious impact on free speech on the internet.

Since it was unveiled last month, the draft law has been amended to include new categories of content, such as child pornography and now allows courts to order social networks to reveal the identity of the user behind criminal posts.

To address concerns over free speech, the legislation was tweaked to make clear that a fine would not necessarily be imposed after just one infraction, and still needs to be approved by the Bundestag.

Mr Maas said freedom of expression was of huge importance in Germany, but that freedom of expression ends where criminal law begins.

The justice ministry said research showed that Facebook deleted just 39 per cent of content reported by users and Twitteronly 1 per cent, despite signing a code of conduct in 2015 that included a pledge to delete hate speech within 24 hours.

The cabinet also approved a new law cracking down on the recognition of child marriage among arriving refugees on Wednesday.

It proposes automatically declaring certificates void if one of the partners was under the age of 16 when they wed, despite concerns that the move would leave young female asylum seekers and those with children vulnerable.

In principle, marriages involving under-18s will also not be recognised, but courts will be allowed to decide whether to annul them on a case-by-case basis after receiving advice from youth protection agencies.

Cabinet members agreed the measure as a newspaper report claimed that about 270,000 Syrians living in Germany have the right to bring their family members into the country.

Bilds report could add fuel to the raging debate about migration less than six months before national elections, where Ms Merkel is seeking a fourth term as Chancellor.

Her conservative bloc faces opposition from the anti-immigration Alternative for Germany (AfD) party, which haslost support in recent months amid improving poll performances by the centre-left Social Democrats.

Continued here:
Germany to fine social networks up to 50m for not taking down illegal 'fake news' posts - The Independent

The coder who built Mastodon is 24, fiercely independent, and … – Mashable


Naked Security
The coder who built Mastodon is 24, fiercely independent, and ...
Mashable
Mastodon, that giant cartoon mammal that's been rampaging across the internet this week, is not the product of a Silicon Valley start-up. Instead, the social ...
Mastodon: new beast to challenge Big Social, or another white elephant?Naked Security
Mastodon, the social network that wants to crush TwitterBlasting News
Mastodon's sudden popularity should serve as Twitter's wakeup callEngadget
The Verge -Patreon
all 44 news articles »

Read the rest here:
The coder who built Mastodon is 24, fiercely independent, and ... - Mashable

Amendment IV – The United States Constitution

The Fourth Amendment

Imagine youre driving a car, and a police officer spots you and pulls you over for speeding. He orders you out of the car. Maybe he wants to place you under arrest. Or maybe he wants to search your car for evidence of a crime. Can the officer do that?

The Fourth Amendment is the part of the Constitution that gives the answer. According to the Fourth Amendment, the people have a right to be secure in their persons, houses, papers and effects, against unreasonable searches and seizures. This right limits the power of the police to seize and search people, their property, and their homes.

The Fourth Amendment has been debated frequently during the last several years, as police and intelligence agencies in the United States have engaged in a number of controversial activities. The federal government has conducted bulk collection of Americans telephone and Internet connections as part of the War on Terror. Many municipal police forces have engaged in aggressive use of stop and frisk. There have been a number of highly-publicized police-citizen encounters in which the police ended up shooting a civilian. There is also concern about the use of aerial surveillance, whether by piloted aircraft or drones.

The application of the Fourth Amendment to all these activities would have surprised those who drafted it, and not only because they could not imagine the modern technologies like the Internet and drones. They also were not familiar with organized police forces like we have today. Policing in the eighteenth and early nineteenth centuries was a responsibility of the citizenry, which participated in night watches. Other than that, there was only a loose collection of sheriffs and constables, who lacked the tools to maintain order as the police do today.

The primary concerns of the generation that ratified the Fourth Amendment were general warrants and writs of assistance. Famous incidents on both sides of the Atlantic gave rise to placing the Fourth Amendment in the Constitution. In Britain, the Crown employed general warrants to go after political enemies, leading to the famous decisions in Wilkes v. Wood (1763) and Entick v. Carrington (1765). General warrants allowed the Crowns messengers to search without any cause to believe someone had committed an offense. In those cases the judges decided that such warrants violated English common law. In the colonies the Crown used the writs of assistancelike general warrants, but often unbounded by time restraintsto search for goods on which taxes had not been paid. James Otis challenged the writs in a Boston court; though he lost, some such as John Adams attribute this legal battle as the spark that led to the Revolution. Both controversies led to the famous notion that a persons home is their castle, not easily invaded by the government.

Today the Fourth Amendment is understood as placing restraints on the government any time it detains (seizes) or searches a person or property. The Fourth Amendment also provides that no warrants shall issue, but upon probable cause, supported by oath or affirmation, and particularly describing the place to be searched and the persons or things to be seized. The idea is that to avoid the evils of general warrants, each search or seizure should be cleared in advance by a judge, and that to get a warrant the government must show probable causea certain level of suspicion of criminal activityto justify the search or seizure.

To the extent that a warrant is required in theory before police can search, there are so many exceptions that in practice warrants rarely are obtained. Police can search automobiles without warrants, they can detain people on the street without them, and they can always search or seize in an emergency without going to a judge.

The way that the Fourth Amendment most commonly is put into practice is in criminal proceedings. The Supreme Court decided in the mid-twentieth century that if the police seize evidence as part of an illegal search, the evidence cannot be admitted into court. This is called the exclusionary rule. It is controversial because in most cases evidence is being tossed out even though it shows the person is guilty and, as a result of the police conduct, they might avoid conviction. The criminal is to go free because the constable has blundered, declared Benjamin Cardozo (a famous judge and ultimately Supreme Court justice). But, responded another Supreme Court justice, Louis Brandeis, If the government becomes the lawbreaker, it breeds contempt for the law.

One of the difficult questions today is what constitutes a search? If the police standing in Times Square in New York watched a person planting a bomb in plain daylight, we would not think they needed a warrant or any cause. But what about installing closed circuit TV cameras on poles, or flying drones over backyards, or gathering evidence that you have given to a third party such as an Internet provider or a banker?

Another hard question is when a search is acceptable when the government has no suspicion that a person has done something wrong. Lest the answer seem to be never, think of airport security. Surely it is okay for the government to screen people getting on airplanes, yet the idea is as much to deter people from bringing weapons as it is to catch themthere is no cause, probable or otherwise, to think anyone has done anything wrong. This is the same sort of issue with bulk data collection, and possibly with gathering biometric information.

What should be clear by now is that advancing technology and the many threats that face society add up to a brew in which the Fourth Amendment will continue to play a central role.

In the Supreme Courts decisions interpreting the Fourth Amendment, there are a lot of cross-cutting arguments.

The biggest challenge ahead for the Fourth Amendment is how it should apply to computers and the Internet.

What the Fourth Amendment Fundamentally Requires by Barry Friedman

In the Supreme Courts decisions interpreting the Fourth Amendment, there are a lot of cross-cutting arguments.

For example, sometimes the Justices say that there is a strong preference for government agents to obtain warrants, and that searches without warrants are presumptively invalid. At other times they say warrants are unnecessary, and the only requirement is that searches be reasonable. At times the Justices say probable cause is required to support a search; at others they say probable cause is not an irreducible minimum.

This is your Fourth Amendment. It describes [t]he right of the people to be secure in their persons, houses, papers and effects, against unreasonable searches and seizures. It is important for each American to focus on some basics and decideseparate and apart from what the Justices saywhat this vital amendment means.

People say that the Fourth Amendment protects privacy, but that trivializes it. In this world you give up a lot of privacy, whether you wish to or not. Internet cookies, or data stored in web browsers, are just one example. But the Internet companies are not going to come take you away. The government might. What the Fourth Amendment protects is the right of the people to be secure. The Fourth Amendment is the means of keeping the government out of our lives and our property unless it has good justification.

In evaluating how the Fourth Amendment should be interpreted, it is essential to bear in mind the vast changes in policing since the time it was ratified. Whereas policing once was reactive, tasked with identifying and catching criminals, today it has become proactive and is based in deterrence. Before, policing was mostly based on suspicion, it was aimed at people for whom there was cause to believe they had violated or were about to violate the law. Today, policing is aimed at all of usfrom red light cameras to bulk data collection by intelligence agencies to airport security.

There are some basic principles that should govern searches and seizures.

First, no member of the Executive branch should be permitted to intervene in our lives without the say-so of at least one other branch. This is fundamental, and all the more important when that Executive actor engages in surveillance of the citizenry and can use force and coercion against them.

Second, a central purpose of the Fourth Amendment is preventing arbitrary or unjustified intrusions into the lives and property of citizens.

In light of these basic principles, certain interpretations of the Fourth Amendment follow:

No search or seizure is reasonable if it is not based on either legislative authorization or pursuant to rules that have some form of democratic say in their making. The police can write rulesall other agencies of executive government dobut absent a critical need for secrecy those rules should be public and responsive to public wishes.

Second, warrants are to be preferred. Policing agencies are mission-oriented. We want them to bethey have a vital role protecting public safety. But because they are mission-oriented, warrants should be obtained in advance of searching whenever possible so that a neutral judge can assess the need to intrude on peoples lives.

Third, we should distinguish between searches aimed at suspects and those aimed at society in general. When there is a particular suspect, the protections of a warrant and probable cause apply. But those protections make no sense when we are all the target of policing. In the latter instance the most important protection is that policing not discriminate among us. For example, at airport security all must be screened the same unless and until there is suspicioncause to single someone out.

Finally, often todays policing singles out a particular group. Examples include profiling (based on race, religion, or something else) or subjecting only workers in some agencies to drug tests. When policing is group-based, the proper clause of the Constitution to govern is the Equal Protection Clause. When discriminatory searching or seizing occurs, the government should have to prove two things: that the group it is selecting for unfavorable treatment truly is more likely to contain people worthy of the governments attention, and that the incidence of problematic behavior is sufficiently great in that group to justify burdening everyone. Otherwise, the government should go back to either searching individuals based on suspicion, or search us all.

The Future of the Fourth Amendment by Orin Kerr

The biggest challenge ahead for the Fourth Amendment is how it should apply to computers and the Internet.

The Fourth Amendment was written over two hundred years ago. But todays crimes often involve computers and the Internet, requiring the police to collect digital evidence and analyze it to solve crimes.

The major question is, how much power should the police have to collect this data? What is an unreasonable search and seizure on the Internet?

Consider the example of a Facebook account. If you log in to Facebook, your use of the account sends a tremendous amount of information to Facebook. Facebook keeps records of everything. What you post, what messages you send, what pictures you like, even what pages you view. Facebook gets it all, and it keeps records of everything you do. Now imagine that the police come to Facebook and want records of a particular user. The police think the suspect used Facebook to commit the crime or shared evidence of the crime using the site. Maybe the suspect was cyberstalking and harassing a victim on Facebook. Or maybe the suspect is a drug dealer who was exchanging messages with another drug dealer planning a future crime. Or perhaps the suspect committed a burglary, and he posted pictures of the burglary for all of his Facebook friends to see.

Heres the hard question: What limits does the Fourth Amendment impose on the government getting access to the account records? For example, is it a Fourth Amendment search or seizure for the government to get what a person posted on his Facebook wall for all of his friends to see? Is it a search or seizure to get the messages that the suspect sent? How about records of what page the suspect viewed? And if it is a search or seizure, how much can the government seize with a warrant? Can the government get access to all of the account records? Only some of the account records?

The courts have only begun to answer these questions, and it will be up to future courts to figure out what the Fourth Amendment requires. As more people spend much of their lives online, the stakes of answering these questions correctly becomes higher and higher.

In my view, courts should try to answer these questions by translating the traditional protections of the Fourth Amendment from the physical world to the networked world. In the physical world, the Fourth Amendment strikes a balance. The government is free to do many things without constitutional oversight. The police can watch people in the public street or watch a suspect in a public place. They can follow a car as it drives down the street. On the other hand, the police need cause to stop people, and they need a warrant to enter private places like private homes.

The goal for interpreting the Fourth Amendment should be to strike that same balance in the online setting. Just like in the physical world, the police should be able to collect some evidence without restriction to ensure that they can investigate crimes. And just like in the physical world, there should be limits on what the government can do to ensure that the police do not infringe upon important civil liberties.

A second important area is the future of the exclusionary rule, the rule that evidence unconstitutionally obtained cannot be used in court. The history of the exclusionary rule is a history of change. In the 1960s and 1970s, the Supreme Court dramatically expanded the exclusionary rule. Since the 1980s, however, the Supreme Court has cut back on when the exclusionary rule applies.

The major disagreement is over whether and how the exclusionary rule should apply when the police violate the Fourth Amendment, but do so in good faith, such as when the law is unclear or the violation is only technical. In the last decade, a majority of the Justices have expanded the good faith exception to the exclusionary rule. A central question is whether the good faith exception will continue to expand, and if so, how far.

In the Supreme Courts decisions interpreting the Fourth Amendment, there are a lot of cross-cutting arguments.

The biggest challenge ahead for the Fourth Amendment is how it should apply to computers and the Internet.

Excerpt from:
Amendment IV - The United States Constitution

NSA cyber-defense chief: ‘I have never been more busy’ – FedScoop

This report first appeared on CyberScoop.

The man responsible for leading the National Security Agencys defensive mission says his team is fielding more calls than ever from agencies across the government.

Dangerous, highly capable hackers and a desire by agencies to adopt cloud technology have increased the workload forInformation Assurance chief Paul Pitelli and his office, which he says is sort of like the Geek Squad for defense in government.

Pitelli is acareer professionalwho has served in the NSA for more than 20 years as the secretive spy agency transformed into what it is today a highly sophisticated technology behemoth with an array of federal responsibilities, including both signals intelligence and protecting sensitive government systems. With the recent retirement of former Information Assurance Directorate head Curtis Dukes, a renown computer scientist and intelligence community icon, Pitelli took on an increased role in an ever important effort to ensure that the Defense Department and broader government arent hacked.

Well get a wide range of calls from Hey were trying to set up a whole new [information technology] environment and that could be the White House calling, Pitelli said.

A big focus in recents years for Information Assurance, according to Pitelli, has been helping a variety of different federal agencies establish secure cloud data storage processes.

I have never been more busy, Pitelli told CyberScoop in an interview Thursday after he spoke at the McAfee Security Through Innovation Summit.We are getting calls because they all need help. Everyone wants to take advantage of cloud services, thats sort of one thing were getting called for, but its also traditional issues because our nation is being constantly attacked. Were one of the few agencies that get to see when and how the adversary starts operating.

Federal lawmakers have increasingly encouraged agencies in recent years to adopt cloud data storage technologies as a way to both save costs and phase out old on-premise servers.

Because of the economics of cloud services theres so much incentive [for agencies] to migrate many of their capabilities, Pitelli said. A lot of people in government want the NSAs help.

Nobody in government wants to be the next to suffer a hack like the2015 data breach that exposed federal employee information held by theOffice of Personnel Management, he said.

So were getting a lot of calls where its basically, Hey we want to make this move, but how do we do it well? Pitelli said.

Turnoverat the White House also adds to the Information Assurance divisions current workload.

With a change of administration, you know, they typically take a fresh look. And for us thats an opportunity because it allows us to sometimes make an [IT] environment better, Pitelli said. The cyber dimension is adding, on one hand, what you can call issues or events, but I think can be opportunities.

Historically, Fort Meades defensive efforts in cyberspace have been overshadowed by the spy agencys more offensive-centric, intelligence gathering mission set. This is evident from a labor perspective, given that the NSAs Signals Intelligence workforce remains much larger than the Information Assurance unit.

An overwhelming majority of budget dollars are allocated to offense rather than defense, former intelligence officials say, and thats resulted in an agency that is known almost exclusively for digital espionage rather than cyber-defense.

Dukes, former IAD head Debora Plunkett and departing NSA Deputy Director Rick Ledgett recently voiced their concerns that the NSA should be focusing on defense more than it has in the past.

Roughly 90 percent of the U.S. government cybersecurity spending is used to fuel offensive operations, Ledgett told Reuters.

I absolutely think we should be placing significantly more effort on the defense, particularly in light of where we are with exponential growth in threats and capabilities and intentions, Plunkett, who oversaw the NSAs defensive mission from 2010 to 2014, recently told Reuters.

Defense under NSA21

The trios comments come amid an expansive reorganization effort by the NSA, instituted by agency Director Michael Rogers, that works to combine what was once called the Information Assurance Directorate and Signals Intelligence Directorate into a single, joint entity.

Although Rogers plan, known as NSA21, is intended to streamline operations, it has also spurred new concerns that the spy agencys defensive mission will receive even less resources in the future.

When the NSA goes through a change a lot of that discussion goes on because theres a big difference between offense and defense as far as the budget and so that was one of the big concerns that some folks vocalized, said Pitelli, I see a need, a bigger need for cybersecurity not just at NSA but for everybody.

The dual impact of NSA21s rollout and Dukes recent retirement has caused some confusion in government.

I know Curt voiced concerns that as we make this move [towards NSA21] there can be this perception that Oh well who do I call? And if they dont know who to call the question is, Well where did it go? Curt was really one of the great, visible icons of Information Assurance and he retired and so there is that time right now where we are waiting to find out whose going to be given the mantle next, Pitelli said.

Pitelli declined to specifically discuss the NSAs budget but said he would like to see Congress broadly allocate greater resources for cybersecurity writ large, across the entire government.

I will go so far as to say I would hope that the government not just at NSA, but the government really tries to allocate additional funds for the cybersecurity information assurance mission, Pitelli said. Alot of times people have lumped in their information assurance budgets with their IT budgets and the challenge I think youre seeing now is that we havent kept up with the budgets of cybersecurity.

Original post:
NSA cyber-defense chief: 'I have never been more busy' - FedScoop

Alleged NSA hack group Shadow Brokers releases new trove of exploits – TechCrunch


TechCrunch
Alleged NSA hack group Shadow Brokers releases new trove of exploits
TechCrunch
Shadow Brokers, the group behind last year's release of hacking exploits allegedly used by the National Security Agency, has dropped another trove of files. In a Medium post today, the hacker group offered up a password giving free access to files it ...

See the article here:
Alleged NSA hack group Shadow Brokers releases new trove of exploits - TechCrunch