Archive for August, 2017

Protecting Privacy – The Weekly Standard

The Fourth Amendment is in a sorry state. The constitutional provision intended to protect us and our property from unreasonable searches and seizures has been weakened over decadesa fact that ought to be of acute concern at a time when surveillance technology is increasingly intrusive and secretive. A modernization of Fourth Amendment doctrines is long overdue.

In his new book, The Fourth Amendment in an Age of Surveillance, David Gray, a professor at the University of Marylands Francis King Carey School of Law, attempts to outline what such a modernization might look like. To establish why reform is necessary, he offers a historical account. Gray traces the concepts embodied in the amendment back to mid-18th-century concerns in both England and the American colonies about overly broad permissions for executive agents. In England, the focus of the controversy was general warrants, which were vague in purpose and almost unlimited in scope.

In the colonies, the controversy focused on writs of assistance, a specialized kind of general warrant, ripe for abuse. In a five-hour-long speech before the Massachusetts Superior Court in 1761, the lawyer James Otis Jr. condemned writs of assistance, declaring them the worst instrument of arbitrary power, the most destructive of English liberty. John Adams, who witnessed Otiss oration, decades later described it as the moment when the Child Independence was born. A distaste for needless and indiscriminate intrusions into homes and other property is thus baked into Americas revolutionary DNA. It was eventually codified in the Fourth Amendment, with its prohibition of unreasonable searches and seizures and guarantee that no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.

The doctrines used in interpreting the amendment have evolved over time. The rise of modern police forces prompted the judiciary to develop the exclusionary rule (which ensures that evidence collected via Fourth Amendment violations is inadmissible), the Miranda warning (which, as anyone who has seen a TV cop show in the last four decades can tell you, holds that once youre in police custody officers must tell you that you have the right to remain silent and the right to an attorney), and the warrant requirement (which holds that searches are per se unreasonable if theyre conducted without prior approval from a judge or magistrate).

The interpretation of the Fourth Amendment has also evolved in response to technological development. Notably, the advent of eavesdropping devices gave rise to the reasonable expectation of privacy test, first formulated in Supreme Court Justice John Harlans concurrence in Katz v. United States (1967) and subsequently adopted by the Court. According to the test, government agents have conducted what the law considers a search if they have violated an individuals subjective expectation of privacy and if that expectation is one that society is prepared to accept as reasonable.

Unfortunately, Gray writes, the Katz test has proven inadequate to the task of regulating the means, methods, and technologies that have come to define our contemporary age of surveillance. Gray puts in his crosshairs three post-Katz doctrines that have had the effect of leaving some of the most intrusive surveillance technologies outside the purview of Fourth Amendment challenge.

First, thanks to the public observation doctrine, police do not necessarily need a warrant to peek into your backyard with a drone. (Some states have passed legislation mandating warrants for drone surveillance, but these requirements go beyond what is required by current Fourth Amendment interpretation.) Nor do police need a warrant to track your public activities for days at a time. As Gray points out, there wouldnt even seem to be a Fourth Amendment issue if the government were to install GPS trackers in every car or computer and then use those trackers to keep an eye on all citizens public movements. After all, as the Katz Court held, What a person knowingly exposes to the public, even in his own home or office, is not a subject of Fourth Amendment protection.

The third-party doctrine likewise offers little reassurance. According to this doctrine, you have no reasonable expectation of privacy in information you voluntarily surrender to third parties, such as Internet providers and banks.

In an era of Big Data and ubiquitous electronic communication, the implications of the third-party doctrine are significant. For example, police today can deploy devices called stingrays that mimic cellular towers. Each cell phone is constantly playing a game of Marco Polo with nearby cell towers, seeking a connection. A stingray emits a boosted signal, forcing all nearby phones to connect to it. This allows police to monitor the location of a targets cell phone. Using a stingray, law enforcement can also uncover information about a targets communications, such as the number of texts sent, the recipients of texts, the phone numbers dialed, and the duration of calls. But stingrays can also collect all of this information about the communications of innocent people. Thanks to the third-party doctrine, there is no clear Fourth Amendment remedy to this invasion of privacy.

Finally, the rules about legal standing in Fourth Amendment cases have, according to Gray, also weakened the remedies available to citizens. Under the rules that emerged after Katz, plaintiffs must demonstrate that they have suffered a violation of their reasonable expectation of privacy. So, for example, citizens outraged about the National Security Agencys metadata collection program lack the standing to file their own Fourth Amendment suits; they have to be able to explain how the program violated their reasonable expectations of privacy. Or, in another instance, when Amnesty International challenged the FISA Amendments Act of 2008, a law giving the federal government broad power to snoop on U.S. citizens international communications, the Supreme Court ruled in 2013 that the organization lacked standing to challenge the law, even though Amnesty works with many international partners. As Justice Samuel Alito wrote for the Court, respondents cannot manufacture standing merely by inflicting harm on themselves based on their fears of hypothetical future harm that is not certainly impending.

With its citations from old dictionaries and other contemporary texts, Grays exhaustive word-by-word and clause-by-clause dissection of the Fourth Amendment should appeal to originalists. His take on standing may raise a few eyebrows, but he does a noble job of defending his claim that an original public understanding of the Fourth Amendment reveals that it protects a collective right to prospective relief, not just relief for past individual harms. The amendment does protect individuals, Gray believes, but its individual protections are derived from the collective right.

Gray proposes several ways to improve Fourth Amendment protections in light of the high-tech surveillance techniques that are now available to authorities. Surveillance conducted by drones and stingrays could, he argues, be curtailed via a remedy modeled on the Wiretap Act. Under that 1968 legislation, passed in the wake of the Katz ruling, officers seeking a wiretap order must establish probable cause, exhaust other investigative methods, and ensure that the wiretap is time-limited. The act also requires that officers regularly report back to the court that issued the wiretap warrant.

When it comes to Big Data, Gray proposes a range of constraints governing the aggregation, collection, analysis, and storage of data.

Perhaps Grays most interesting proposal flows from his collective-right theory of the Fourth Amendment. He would allow individuals and organizations to have standing to challenge programs that threaten the people as a whole. This would allow, say, the American Civil Liberties Union to challenge the legality of New York Citys stop-and-frisk program. Such other programs and technologies as persistent aerial surveillance, metadata surveillance, and license-plate readers would be open to challenge under Grays understanding of the Fourth Amendment.

Not everyone will be convinced by Grays analysis. Some critics will undoubtedly dispute his collective-right theory of the Fourth Amendment and quibble with his Wiretap Act-like remedies. However, these disagreements will not detract from the fact that his book is a welcome and informative contribution to the public debate about surveillancea debate that will lastingly shape how we live together and how we understand privacy and liberty.

Matthew Feeney is a policy analyst at the Cato Institute.

The rest is here:
Protecting Privacy - The Weekly Standard

What the Announced NSA / Cyber Command Split Means

The move to elevate Cyber Command to a full Unified Combatant Command and split it off from the National Security Agencyshows that cyber intelligence collection and information war are rapidly diverging fields. The future leadership of both entities is now in question, but the Pentagon has set out a conditions-based approach to the breakup. That represents a partial victory for the man who directs both Cyber Command and the NSA.

The move would mean that the head of Cyber Command would answer directly to the Defense Secretary and the National Security Agency would get its own head. Its a move that many have said is long overdue, and its exact timing remains unknown. So what does the split mean for the Pentagon, for Cyber Command, and for the future of U.S. cyber security?

The split will give the commander of Cyber Command central authority over resource allocation, training, operational planning and mission execution. The commander will answer to the Defense secretary directly, not the head of Strategic Command. The decision means that Cyber Command will play an even more strategic role in synchronizing cyber forces and training, conducting and coordinating military cyberforce operations and advocating for and prioritizing cyber investments within the department, said Kenneth Rapuano, assistant defense secretary for Homeland Defense and Global Security.

The Start of a Process

The move announced on Friday fulfills a mandate in the National Defense Authorization Act of 2017. Former Defense Secretary Ash Carter hinted at the split back in May 2016. But it wont happen immediately.

Instead, Defense Secretary James Mattis and Joint Chiefs Chairman Gen. Joe Dunford will nominate a flag officer to take over the new Cyber Command as well as the NSA. That person could be Adm. Michael Rogers, who currently heads both, or someone else. Trump has reportedly asked Mattis to give him the name of a nominee.Speculation has focused on Army Lt. Gen. William Mayville as the nominee to head Cyber Command.

Once that new person is nominated and confirmed and once Mattis and Dunford are satisfied that splitting the two entities will not hamper the ability of either Cyber Command or the NSA to conduct their missions independently, only then will Cyber Command and the NSA actually split.

What Does it Mean for Leadership?

Read one way, the announcement means Rogers will lose power. Even were he to become the nominee to the new elevated Cyber Command, he would still wind up losing the NSA eventually. If he were to stay on as head of NSA after the confirmation of a new Cyber Command head, as expected, he would briefly serve under Mayville until the formal split.

Read another way, the lack of a concrete timetable for the split, despite such a requirement in the authorization bill, represents a partial win for Rogers.

Rogers took over the NSA and Cyber Command in the spring of 2014. He has been resistant to the idea of a split, telling lawmakers in September that U.S. national security benefitted from the dual-hat arrangement. This view was not shared by then-Director of National Intelligence James Clapper nor then-Defense Secretary Ash Carter. Rogers resistance was one of many issues that rubbed them the wrong way.

It got so bad that in November, unnamed sources told The Washington Post that Clapper and Carter were urging President Barack Obama to fire Rogers.

The truth is a bit more nuanced. Clappers goal was to split the NSA from CyberCom. He was not a strong advocate of removal, but was willing to defer to [the Secretary of Defense] if Carter felt strongly about selecting new leadership at Cyber Command, a source inside the intelligence community said. There were other concerns unrelated to the potential split.

Rogers outlasted both Clapper, who had long planned to retire at the end of the Obama administration; and Carter, a political appointee. Rogers attitude toward an NSA-Cyber Command split evolved. In May, he testified that he would support a split was done in a way that did not hamper either the NSA or Cyber Command.

The manner in which the split was announced is in keeping with what Rogers has said he wanted.

The move toward a conditions-based split also met with the approval of Sen. John McCain, R-Ariz, a longtime Rogers ally. I appreciate the administrations commitment today to ensuring that a future separation of the so-called dual hat relationship between Cyber Command and the National Security Agency will be based on conditions, rather than arbitrary political timelines, McCain said in a statement. While Cyber Command and the National Security Agency should eventually be able to operate independent of one another, the administration must work closely with the Congress to take the necessary steps that will make this separation of responsibilities successful, and to ensure that each agency will emerge more effective and more capable as a result.

What It Means for Cyber Command, the NSA, and Cyber Operations

The elevation of Cyber Command represents a big step forward for the militarys cyber ability, but it has yet to be catch up to the NSA in terms of collecting signals intelligence or creating network accesses, according to Bill Leigher, who as a rear admiral helped stand up Navy Fleet Cyber Command. Leigher, who now directs government cyber solutions for Raytheon, applauds the split because the NSA, which collects foreign intelligence, and Cyber Command, a warfighting outfit, have fundamentally different missions.This caused tension between the two organizations under one roof. Information collected for intelligence gathering may be useful in a way thats fundamentally different from intelligence for military purposes, he says. If you collecting intelligence, its foreign espionage. You dont want to get caught. The measure of success is: collect intelligence and dont get caught. If youre going to war, I would argue that the measure of performance is what we do has to have the characteristics of a legal weapon in the context of war and the commander has to know what he or she uses it.

This puts the agencies in disagreement about how to use intel and tools that they share. From an NSA perspective, cyber really is about gaining access to networks. From aCyber Command point of view, I would argue, its about every piece of software on the battlefield and having the means to prevent that software from working the way it was intended to work [for the adversary], he said.

The split will allow the agencies to pursue the very different tools, operations, and rules each of their missions requires, he said. Expect NSA to intensify its focus on developing access for intelligence, and Cyber Command to prepare to rapidly deploy massive cyber effects at scale during military operations and shut down the enemy. Both of this will likely leverage next-generation artificial intelligence but in very different ways said Leigher.

More:
What the Announced NSA / Cyber Command Split Means

Alleged stalker chops off girl’s hand, to face NSA charge – The Hindu

The Uttar Pradesh police is considering a case under the stringent National Security Act against a person accused of stalking a minor girl and chopping off one of her hands in a brutal sword attack in Lakhimpur Kheri district.

The accused, identified as Rohit Chaurasia, allegedly attacked the minor girl in broad daylight with a sword on Wednesday completely severing her left hand, while heavily damaging her right hand. She also suffered injuries to her head.

The attack took place near a busy market place in Lakhimpur.

According to locals, the accused chased down the girl and first struck her on the head, after which he targetted her limbs and chopped off her left hand completely.

He was on the verge of dismembering her right hand too when locals overpowered him and handed him over to the police.

The victim, who suffered immense blood loss, was referred to Lucknow for treatment. Incidentally, after an 11-hour surgery, doctors at the King George Medical University managed to fix back her hand, said Dr. A. K. Singh, head of the hospital's plastic surgery department on Thursday.

The victim will be kept under observation for one week as the condition of the repaired hand is delicate, Dr. Singh said.

The victim's right hand was also injured in the attack, with damages to its flexon tendon, fingers, palm and nerve fibres, the KGMU said.

The accused, who was the victim's neighbour, was sent to jail. He was booked for attempt to murder, assaulting a woman with intent to outrage her modesty and voluntarily causing grievous hurt by dangerous weapon.

Relevant clauses of the Protection of Children from Sexual Offences Act were also invoked, said S. Chinappa, Superintendent of Police, Kheri.

Taking maximum action

The accused would be additionally booked under the NSA.

Asked on what ground was the police invoking NSA, Mr. Chinappa told The Hindu: "We are taking the maximum action in this case. It is a heinous crime, it can have [an impact] on society."

The motive behind the attack is still not clear though the family of the girl alleged that the accused had been harassing her for a while.

The police, however, said the two got engaged in an altercation over a mobile charger leading to the attack that has left the district near the Indo-Nepal border in a state of shock.

Read the original:
Alleged stalker chops off girl's hand, to face NSA charge - The Hindu

CIA’s secret spy tool helps agency steal data from NSA & FBI, WikiLeaks reveals – RT

Published time: 24 Aug, 2017 11:29 Edited time: 24 Aug, 2017 17:15

Details of an alleged CIA project that allows the agency to secretly extract biometric data from liaison services such as the NSA, the DHS and the FBI have been published by WikiLeaks.

Documents from the CIAs ExpressLane project were released by the whistleblowing organization as part of its ongoing Vault 7 series on the intelligence agencys alleged hacking capabilities.

Abranchwithin the CIA known as Office of Technical Services (OTS) provides a biometric collection system to liaison services around the world with the expectation for sharing of the biometric takes collected on the systems, according to afilereleased by WikiLeaks.

ExpressLane, however, suggests the system has inadequacies as it was developed as a covert information collection tool to secretly exfiltrate data collections from such systems provided to liaison services.

The user guide for the tool states that it was developed to support the branch in its efforts to verify that this data is also being shared with the agency.

ExpressLane v3.1.1 provides an ability to disable the biometric software if liaison doesnt provide the Agency with continued access.

ExpressLane is installed and run under the guise of upgrading the biometric software by OTS agents that visit the liaison sites.

OTS/i2c plans to revisit these sites with the cover of upgrading the biometric software to perform a collection against the biometric takes, a CIA document outlining test procedures for the project states.

Liaison officers overseeing this procedure will remain unsuspicious, as the data exfiltration is disguised behind a Windows installation splash screen.

ExpressLane was intended to remain secret until 2034, according to the files which originate from 2009.

The core components of the OTS system are based on products from Cross Match a US company specializing in biometric software for law enforcement and the Intelligence Community.

In 2011, it was reported that the US military used one of the companys products to identify Osama bin Laden during the assassination operation in Pakistan.

The White House and Department of Defense said facial recognition technology was one of the techniques used to identify Bin Laden but Cross Matchs involvement was not confirmed.

READ MORE: CIA CouchPotato tool captures video stream images remotely WikiLeaks

More:
CIA's secret spy tool helps agency steal data from NSA & FBI, WikiLeaks reveals - RT

‘Mary And The Witch’s Flower’ Was Made With Free OpenToonz Animation Software – Cartoon Brew

Hiromasa Yonebayashi and Studio Ponocs animated feature Mary and The Witchs Flower, which debuted last month in Japan and will be released in North America by GKIDS, is the first feature to incorporate the free, open source animation software OpenToonz into its production pipeline.

Japanese publisher Dwango acquired the Toonz software last year from Italian tech company Digital Video, which has been producing the animation package since 1993, and has begun distributing it as free, modifiable software that can be further developed by individual users and studios.

Even though Mary is the first film to use the open source version, earlier versions of Toonz have been used extensively in professional productions, most notably by Studio Ghibli to produce films like The Tale of the Princess Kaguya, Howls Moving Castle, and The Wind Rises. Yonebayashi himself directed two films at Ghibli The Secret World of Arrietty and When Marnie Was There which used Toonz software, so its logical that he would continue working with the open source version in his post-Ghibli work.

Read the original post:
'Mary And The Witch's Flower' Was Made With Free OpenToonz Animation Software - Cartoon Brew