Obama Says Terrorism Is Not an Existential Threat

What I do insist on is that we maintain a proper perspective and that we do not provide a victory to these terrorist networks by overinflating their importance and suggesting in some fashion that they are an existential threat to the United States or the world order. You know, the truth of the matter is that they can do harm. But we have the capacity to control how we respond in ways that do not undercut what’s the — you know, what’s essence of who we are.

Link (Bruce Schneier)

Canarywatch.org

“Warrant canary” is a colloquial term for a regularly published statement that an internet service provider (ISP) has not received legal process that it would be prohibited from saying it had received, such as a national security letter. The term “warrant canary” is a reference to the canaries used to provide warnings in coalmines, which would become sick from carbon monoxide poisoning before the miners would—warning of the otherwise-invisible danger. Just like canaries in a coalmine, the canaries on web pages “die” when they are exposed to something toxic—like a secret FISA court order.

Warrant canaries rely upon the legal theory of compelled speech. Compelled speech happens when a person is forced by the government to make expressive statements they do not want to make. Fortunately, the First Amendment protects against compelled speech in most circumstances. In fact, we’re not aware of any case where a court has upheld compelled false speech. Thus, a service provider could argue that, when its statement about the legal process received is no longer true, it cannot be compelled to reissue the now false statement, and can, instead, remain silent. So far, no court has addressed this issue.

But if you’re not paying attention to a specific canary, you may never know when it changes. Plenty of providers don’t have warrant canaries. Those that do may not make them obvious. And when warrant canaries do change, it’s not always immediately obvious what that change means.

That’s why EFF has joined with a coalition of organizations, including the Berkman Center for Internet and Society, New York University’s Technology Law & Policy Clinic, and the Calyx Institute to launch Canarywatch.org. The Calyx Institute runs and hosts Canarywatch.org.

Link (EFF)

Michael Hayden: September 11th Gave Me Permission To Reinterpret The 4th Amendment

Michael Hayden, the former CIA and NSA director, has revealed what most people already suspected — to him, the Constitution is a document that he can rewrite based on his personal beliefs at any particular time, as noted by Conor Friedersdorf at the Atlantic. Specifically, he admits that after September 11th, 2001, he was able to totally reinterpret the 4th Amendment to mean something entirely different:

In a speech at Washington and Lee University, Michael Hayden, a former head of both the CIA and NSA, opined on signals intelligence under the Constitution, arguing that what the 4th Amendment forbids changed after September 11, 2001. He noted that “unreasonable search and seizure,” is prohibited under the Constitution, but cast it as a living document, with “reasonableness” determined by “the totality of circumstances in which we find ourselves in history.”

He explained that as the NSA’s leader, tactics he found unreasonable on September 10, 2001 struck him as reasonable the next day, after roughly 3,000 were killed. “I actually started to do different things,” he said. “And I didn’t need to ask ‘mother, may I’ from the Congress or the president or anyone else. It was within my charter, but in terms of the mature judgment about what’s reasonable and what’s not reasonable, the death of 3,000 countrymen kind of took me in a direction over here, perfectly within my authority, but a different place than the one in which I was located before the attacks took place. So if we’re going to draw this line I think we have to understand that it’s kind of a movable feast here.”

Link (Techdirt)

Torture If You Must, But Do Not Under Any Circumstances Call the New York Times

Monday’s guilty verdict in the trial of former CIA officer Jeffrey Sterling on espionage charges — for talking to a newspaper reporter — is the latest milepost on the dark and dismal path Barack Obama has traveled since his inaugural promises to usher in a “new era of openness.”

Far from rejecting the authoritarian bent of his presidential predecessor, Obama has simply adjusted it, adding his own personal touches, most notably an enthusiasm for criminally prosecuting the kinds of leaks that are essential to a free press.

The Sterling case – especially in light of Obama’s complicity in the cover-up of torture during the Bush administration – sends a clear message to people in government service: You won’t get in trouble as long as you do what you’re told (even torture people). But if you talk to a reporter and tell him something we want kept secret, we will spare no effort to destroy you.

There’s really no sign any more of the former community organizer who joyously declared on his first full day in office that “there’s been too much secrecy in this city… Starting today, every agency and department should know that this administration stands on the side not of those who seek to withhold information but those who seek to make it known.”

Instead, as author Scott Horton explained to me a few weeks ago, Obama’s thinking on these issues was swayed by John Brennan, the former senior adviser he eventually named CIA director. And for Brennan and his ilk, secrecy is a core value — partly for legitimate national security reasons and partly as an impregnable shield against embarrassment and accountability.

Link (The Intercept)

Drug Dealers Swapping Down To Old Cellphones To Stay One Step Ahead In The ‘Tech Arms Race’

A dealer in Handsworth, Birmingham—who would only give his name as “K2″—told me: “I’ve got three Nokia 8210 phones and have been told they can be trusted, unlike these iPhones and new phones, which the police can easily [use to] find out where you’ve been… Every dealer I know uses old phones, and the Nokia 8210 is the one everyone wants because of how small it is and how long the battery lasts.

Link (Techdirt)

Nobody Saw This Coming: Now China Too Wants Company Encryption Keys And Backdoors In Hardware And Software

A concerted campaign among officials on both sides of the Atlantic to attack strong encryption has intensified in the wake of the Charlie Hebdo killings. Most recently, we’ve had a leak of a document in which the EU’s “Counter-Terrorism Co-ordinator” recommended that Internet companies should be forced to hand over their crypto keys; and now Leslie Caldwell, an assistant attorney general at the US Justice Department, is reported by Vice.com to have made the following comment:

“We understand the value of encryption and the importance of security,” she said. “But we’re very concerned they not lead to the creation of what I would call a ‘zone of lawlessness,’ where there’s evidence that we could have lawful access through a court order that we’re prohibited from getting because of a company’s technological choices.”

She said that she hopes Apple and Google will consider building in back doors that will allow the companies to decrypt the phones if they are physically mailed back to the manufacturer.
As Techdirt has noted before, this narrative plays right into the hands of repressive governments around the world, which can simply point to the West’s argument, and say: “We agree.” So it will not come as a huge surprise to readers of this site to learn that when it comes to demanding encryption keys and backdoors from computer companies, China now agrees:

The Chinese government has adopted new regulations requiring companies that sell computer equipment to Chinese banks to turn over secret source code, submit to invasive audits and build so-called back doors into hardware and software, according to a copy of the rules obtained by foreign technology companies that do billions of dollars’ worth of business in China.

Link (Techdirt)

Feds Gagged Google Over Wikileaks Warrants Because They Were ‘Upset By The Backlash’ To Similar Twitter Warrants

According to Gidari, whose firm has represented both firms, Google’s delay was not the result of foot-dragging but of opposition from prosecutors who were upset by the backlash that followed the disclosure of their court orders to Twitter.

[….]

“The U.S. attorney’s office thought the notice and the resulting publicity was a disaster for them,” Gidari said. “They were very upset” about the prosecutor’s name and phone number being disclosed, he said. “They went through the roof.”

Link (Techdirt)

FBI Seeks To Legally Hack You If You’re Connected To TOR Or a VPN

The investigative arm of the Department of Justice is attempting to short-circuit the legal checks of the Fourth Amendment by requesting a change in the Federal Rules of Criminal Procedure. These procedural rules dictate how law enforcement agencies must conduct criminal prosecutions, from investigation to trial. Any deviations from the rules can have serious consequences, including dismissal of a case. The specific rule the FBI is targeting outlines the terms for obtaining a search warrant. It’s called Federal Rule 41(b), and the requested change would allow law enforcement to obtain a warrant to search electronic data without providing any specific details as long as the target computer location has been hidden through a technical tool like Tor or a virtual private network. It would also allow nonspecific search warrants where computers have been intentionally damaged (such as through botnets, but also through common malware and viruses) and are in five or more separate federal judicial districts. Furthermore, the provision would allow investigators to seize electronically stored information regardless of whether that information is stored inside or outside the court’s jurisdiction.

Link (Slashdot)

Rep. Jared Polis Calls For 24 Hour Surveillance On Senator Marco Rubio

Rep. Jared Polis has a bit of a history of making hilarious, but incredibly on point, sarcastic and satirical suggestions in response to government officials saying something stupid. Last year, he asked the Treasury Department to ban dollar bills after Senator Joe Manchin asked the Treasury Department to ban Bitcoin. Polis, of course, took the same arguments Manchin used against Bitcoin and highlighted how dollar bills had the same characteristics.

His latest move is in response to Senator Marco Rubio’s ridiculous and clueless call for greater levels of mass surveillance of Americans. Rubio calls for new laws to force tech companies to help the government spy on everyone and also a permanent extension of the controversial Section 215 of the Patriot Act, the part of the law that was twisted by the DOJ and the NSA to pretend it means they can demand every phone record on every American because they might be able to sniff through it all and find something interesting.

In response, Polis has asked the US Intelligence Community to begin “24 hour monitoring” of Senator Rubio

Link (Techdirt)

Canada Casts Global Surveillance Dragnet Over File Downloads

Canada’s leading surveillance agency is monitoring millions of Internet users’ file downloads in a dragnet search to identify extremists, according to top-secret documents.

The covert operation, revealed Wednesday by CBC News in collaboration with The Intercept, taps into Internet cables and analyzes records of up to 15 million downloads daily from popular websites commonly used to share videos, photographs, music, and other files.

The revelations about the spying initiative, codenamed LEVITATION, are the first from the trove of files provided by National Security Agency whistleblower Edward Snowden to show that the Canadian government has launched its own globe-spanning Internet mass surveillance system.

According to the documents, the LEVITATION program can monitor downloads in several countries across Europe, the Middle East, North Africa, and North America. It is led by the Communications Security Establishment, or CSE, Canada’s equivalent of the NSA. (The Canadian agency was formerly known as “CSEC” until a recent name change.)

Link (The Intercept)