Media Search:



Mark Zuckerberg: Free speech forever on Facebook

Mark Zuckerberg assures Facebook users that they will forever enjoy their right to freedom of speech, after reflecting on #JeSuisCharlie

MANILA, Philippines Social Media users worldwide expressed grief and rage after the January 7 shooting at Charlie Hebdo magazine's headquarters in Paris, France, left 12 people dead.

In solidarity, Mark Zuckerberg, CEO of social networking giant Facebook, posted a statement on the social networking platform to mourn with the family of the victims:

My thoughts are with the victims, their families, the people of France and the people all over the world who choose to share their views and ideas, even when that takes courage. #JeSuisCharlie.

He also shared his experience on "extremism":

A few years ago, an extremist in Pakistan fought to have me sentenced to death because Facebook refused to ban content about Mohammed that offended him.

We stood up for this because different voices even if they're sometimes offensive can make the world a better and more interesting place.

Facebook has always been a place where people across the world share their views and ideas. We follow the laws in each country, but we never let one country or group of people dictate what people can share across the world.

Zuckerberg also assures the billions of Facebook users that they will forever enjoy their right to freedom of speech:

Yet as I reflect on yesterday's attack and my own experience with extremism, this is what we all need to reject a group of extremists trying to silence the voices and opinions of everyone else around the world.

Link:
Mark Zuckerberg: Free speech forever on Facebook

Volokh Conspiracy: E-mail warrant for all evidence of CFAA crimes violates Fourth Amendment, court holds

In a recent case, United States v. Shah, 2015 WL 72118 (E.D.N.C. Jan. 6, 2015), a district court ruled that a search warrant for an e-mail account for all evidence of violations of the federal computer hacking statute failed to comply with the Fourth Amendment because it did not particularly describe the evidence to be seized.

The warrant in the case approved the seizure from a specific gmail account of e-mails that contained the following:

All information . . . that constitutes fruits, evidence, and instrumentalities of Title 18, United States Code, Sections 1030 (Fraud and Related Activity in Connection with Computers), since account inception, including, for each account or identifier listed on Attachment A, information pertaining to the following matters: a. Preparatory steps taken in furtherance of unauthorized network activity, communications regarding execution of the unauthorized network activity, and information regarding tools used in furtherance of the unauthorized network activity. b. Records relating to who created, used, or communicated with the account or identifier, including records about their identities and whereabouts.

This description is a slightly modified version of the DOJ recommended e-mail warrant description, albeit without a date restriction; see here at 261-62. According to the district court, however, the warrant was not specific enough. From the opinion:

The provision [of the warrant] describing the documents seized makes a general reference to [a]ll information described above in Section I that constitutes fruits, evidence, and instrumentalities of Title 18, United States Code, Sections 1030 (Fraud and Related Activity in Connection with Computers). (Google Warrant, 6). This statute, also known as the federal Computer Fraud and Abuse Act (CFAA), prohibits a wide array of activities, including the use of computers to transmit information restricted by the United States without authorization, intentionally accessing a computer without authorization or exceeding authorized access to obtain financial records, accessing nonpublic computers of the United States in a way which affects the governments use, accessing protected computers without authorization in order to commit fraud, threatening to cause damage or obtain information from a protected computer, conspiracy to commit these offenses, and other activities. See 18 U.S.C. 1030(a).

A violation of the CFAA would not necessarily generate such distinctive evidence as bank robbery or narcotics. Dickerson, 166 F.3d at 694. Nor would evidence necessarily be as distinctive as that of child pornography, a type of crime more commonly targeted by warrants for electronic information. E.g. United States v. Schesso, 730 F.3d 1040, 1044 (9th Cir.2013); United States v. Deppish, 994 F.Supp.2d 1211, 1214 (D. Kansas 2014). Rather, a warrant authorizing collection of evidence of a CFAA violation comes closer to warrants seeking to collect evidence regarding violations of broad federal statutes prohibiting fraud or conspiracy. In these cases, limitation by reference to the broad statute fails to impose any real limitation. See United States v. Maxwell, 920 F.2d 1028, 1033 (D.C.Cir.1990) (Although a warrants reference to a particular statute may in certain circumstances limit the scope of the warrant sufficiently to satisfy the particularity requirement it will not do so where, as here, the warrant authorizes seizure of all records and where, as here, the reference is to a broad federal statute, such as the federal wire fraud statute.); Rickert v. Sweeney, 813 F.2d 907, 909 (8th Cir.1987) (general search limited only by broad tax evasion statute held overly broad, where probable cause existed only to search for evidence of tax evasion in connection with one particular project); United States v. Roche, 614 F.2d 6, 78 (1st Cir.1980) (warrants limitation of search to fruits and instrumentalities of the violation of federal mail fraud statute was inadequate because limitation by so broad a statute is no limitation at all.).

The Google Warrant provides no other details to clarify the particular crime at issue. Section II(a) makes reference to unauthorized network activity, yet gives no indication as to the meaning of this phrase, which would seem to be implicated in almost all of the activities prohibited by the CFAA. The warrant offers nothing about the time frame of the offense. See United States v. Hanna, 661 F.3d 271, 287 (6th Cir.2011) (noting, in upholding search warrant for electronic information, that the warrant was limited to the time period that the evidence suggested the activity occurred.) Rather, it provides for the seizure of all evidence of violations of the CFAA since account inception. (Google Warrant, 6).

Although the test for particularity is a pragmatic one, and must consider the circumstances and type of items involved, Torch, 609 F.2d at 1090, the record does not indicate that circumstances of the investigation precluded a more particularized description of the crime. Special Agent Ahearns supporting affidavit provides copious details as to the time and nature of the alleged offenses. Had the Google Warrant properly attached or incorporated this affidavit, it could have provided the necessary context for the search. Hurwitz, 459 F.3d at 471 ([A]n affidavit may provide the necessary particularity for a warrant if it is either incorporated into or attached to the warrant.) (quoting United States v. Washington, 852 F.2d 803, 805 (4th Cir.1988)). Yet the Google Warrant makes no incorporation, and it does not appear from the record that the affidavit was attached. Without the Google Warrant somehow including the additional details provided by Special Agent Ahearns affidavit, the affidavit itself cannot satisfy concerns for particularity or overbreadth. See Groh v. Ramirez, 540 U.S. 551, 557 (2004) (The Fourth Amendment by its terms requires particularity in the warrant, not in the supporting documents.).

[T]here are grave dangers inherent in executing a warrant authorizing a search and seizure of a persons papers that are not necessarily present in executing a warrant or search for physical objects whose relevance is more easily ascertainable. Williams, 592 F.3d at 52324 (quoting Andresen v. Maryland, 427 U.S. 463, 482 n. 11). Because electronic devices could contain vast quantities of intermingled information, raising the risks inherent in over-seizing data law enforcement and judicial officers must be especially cognizant of privacy risks when drafting and executing search warrants for electronic evidence. Schesso, 730 F.3d at 1042; see also In the Matter of the Search of Info. Associated with [redacted]@mac.com that is Stored at Premises Controlled by Apple, Inc., 13 F.Supp.3d 157, 16667 (D.D.C.2014) ( D.D.C. Mac.com Order ). Especially in light of the nature of the search and seizure here, the Google Warrant is not drafted with sufficient particularity. In the absence of additional details, the warrant fails to identify the particular crime for which officers were to seek evidence. Therefore, the warrant lacks the particularity required by the Fourth Amendment.

The court goes on to apply the good-faith exception, however, because the courts holding is somewhat novel under the circumstances. Heres the discussion, with a paragraph break added:

Read more here:
Volokh Conspiracy: E-mail warrant for all evidence of CFAA crimes violates Fourth Amendment, court holds

NSA OPTK 8 – Video


NSA OPTK 8

By: Silmostanbul 2014 Optik Fuar

See the original post here:
NSA OPTK 8 - Video

NSA OPTK 20 – Video


NSA OPTK 20

By: Silmostanbul 2014 Optik Fuar

Read the original post:
NSA OPTK 20 - Video

NSA chief calls for improved cyber crime response, but Snowden argues US should focus on defence

Computer hackers and cyber criminals are carrying out attacks against businesses and nation states because they believe there's "little price to pay" for stealing sensitive data.

That's according to Admiral Mike Rogers, director of the National Security Agency (NSA) and head of United States Cyber Command, who was speaking at a cyber security conference at Fordham University in New York.

His comments come a month after a massive cyber attack against Sony, which the US believes was carried out by North Korea - although there are a number of security experts who disagree with that claim.

The current number of cyber attacks represents "one of the biggest transfers of intellectual knowledge that we have ever seen," said Rogers, according to a report by the Wall Street Journal.

The NSA chief warned that a different cyber security strategy needs to be implemented if the trend of worsening cyber attacks is to be reversed.

"What we've seen in the last six to nine months in general... trends are going in the wrong direction," Rogers said. "Doing more of the same and expecting different results, my military experience tells me, is not a particularly effective strategy."

The US government wants organisations to work more closely with it by reporting incidents of cyber attacks more promptly. However, with Edward Snowden's NSA surveillance revelations still fresh in the memory, there's still corporate distrust of government security programmes.

Speaking in an interview with US broadcaster PBS, Snowden inferred that the US could have itself to blame for being the victim hacking attempts, arguing that attacks originated from US authorities - such as the Stuxnet programme against Iran in 2011 - have created a bitterness against the country and its infrastructure.

The whistleblower also suggested that the NSA should concentrate on defending the US against attacks, rather than hacking into the networks of other nations and their leaders.

"So the way the United States intelligence community operates is it doesn't limit itself to the protection of the homeland," said Snowden.

More:
NSA chief calls for improved cyber crime response, but Snowden argues US should focus on defence