Self-Proclaimed ‘Badass Lawyer’ Loses Defamation Suit Against Parody Twitter Account | Techdirt

Another defamation lawsuit against a parody account has failed, brought on by a lawyer who should have known better but didn’t. Todd Levitt — self-proclaimed “Badass Lawyer” — has a verifiable history of bad decisions that perhaps made this sort of bogus litigation a foregone conclusion, however.Levitt tried to fire up his own reality show, which would have presumably covered such lawyeriffic behavior as singing karaoke with college students, inviting comparisons to TV’s sleaziest lawyer (Saul Goodman of Breaking Bad), creating a Top College Lawyers website solely for the purpose of awarding himself the title of “Top College Lawyer,” and somehow mistaking alleged defamation for a criminal offense.

Source: Self-Proclaimed ‘Badass Lawyer’ Loses Defamation Suit Against Parody Twitter Account | Techdirt

Lucasfilm Uses DMCA to Kill Star Wars Toy Picture – TorrentFreak


Star Wars: The Force Awakens has gone into an early and bizarre anti-piracy overdrive. Earlier this week a fansite posted an image of a ‘Rey’ action figure legally bought in Walmart but it was taken down by Facebook and Twitter following a DMCA notice. Meanwhile, webhosts are facing threats of legal action.

Source: Lucasfilm Uses DMCA to Kill Star Wars Toy Picture – TorrentFreak

Turkish Censorship Order Targets Single Blog Post, Ends Up Blocking Access To 60 Million WordPress Sites

Last week, a Turkish court ordered an access ban on a single post in the vast sea of more than 60 million individual blogs on WordPress. But for many users, that meant their Internet service providers blocked WordPress entirely.

A lawyer and Turkish Pirate Party member tracked down the root of the sudden ban on all of WordPress: a court order seeking to block a single blog post written by a professor accusing another professor of plagiarism. This post apparently led to several defamation lawsuits and the lawsuits led to a court order basically saying that if blocking the single post proved too difficult, fuck it, block the entire domain.

It is the second sentence in the order, however, that caused the complete ban of WordPress in the country. “If the access to the single page cannot be possible due to technical reasons,” it reads, “block access to wordpress.com.”

Link (Techdirt)

Under President’s New Cybersecurity Executive Order… Is Wikileaks Now An Evil Cyberhacker For Releasing Trade Deal?

Yesterday we talked about the ridiculousness of President Obama’s new cybersecurity executive order, in which he declares a national emergency around “malicious cyber-enabled activities” and enables his own government to do mean things to anyone they think is responsible for cyber badness (that his own NSA is the primary instigator of serious cyberattacks gets left ignored, of course). One of the points we made is that the definitions in the executive agreement were really vague, meaning that it’s likely that they could be abused in all sorts of ways that we wouldn’t normally think of as malicious hacking.

Helpfully, the ever vigilant Marcey Wheeler has provided some examples of how the vague language can and likely will be twisted:

The EO targets not just the hackers themselves, but also those who benefit from or materially support hacks. The targeting of those who are “responsible for or complicit in … the receipt or use for commercial or competitive advantage … by a commercial entity, outside the United States of trade secrets misappropriated through cyber-enabled means, … where the misappropriation of such trade secrets is reasonably likely to result in, or has materially contributed to, a significant threat to the national security, foreign policy, or economic health or financial stability of the United States” could be used to target journalism abroad. Does WikiLeaks’ publication of secret Trans-Pacific Partnership negotiations qualify? Does Guardian’s publication of contractors’ involvement in NSA hacking?

And, that’s not all. How about encryption providers? Not too hard to see how they might qualify:

And the EO creates a “material support” category similar to the one that, in the terrorism context, has been ripe for abuse. Its targets include those who have “provided … material, or technological support for, or goods or services in support of” such significant hacks. Does that include encryption providers? Does it include other privacy protections?And the EO creates a “material support” category similar to the one that, in the terrorism context, has been ripe for abuse. Its targets include those who have “provided … material, or technological support for, or goods or services in support of” such significant hacks. Does that include encryption providers? Does it include other privacy protections?

We’ve already seen some — including government officials — argue that Twitter could be deemed to be providing “material support” to ISIS if it didn’t take down Twitter accounts that support ISIS. Twitter wouldn’t directly qualify under this executive order (which targets non-US actors), but it shows you how easy it is to stretch this kind of thinking in dangerous ways.

Making sure the technology we use every day is secure is important. But vaguely worded executive orders and an over-hyped “national emergency” isn’t the solution. Instead, it’s likely to be abused in serious ways that harm our freedoms.

Link (Techdirt)

France To Require Internet Companies To Detect ‘Suspicious’ Behavior Automatically, And To Decrypt Communications On Demand

[the proposed law] wants to force intermediaries to “detect, using automatic processing, suspicious flows of connection data”. Internet service providers as well as platforms like Google, Facebook, Apple and Twitter would themselves have to identify suspicious behavior, according to instructions they have received, and pass the results to investigators. The text does not specify, but this could mean frequent connections to monitored pages.

As well as being extremely vague, none of this “automatic detection” will require a warrant, which means that the scope for abuse and errors will be huge. And then there’s this:

the Intelligence bill also addresses the obligations placed on operators and platforms “concerning the decryption of data.” More than ever, France is keen to have the [encryption] keys necessary to read intercepted conversations, even if they are protected.

As we’ve noted before, there is a global push to demonize encryption by presenting it as a “dark place” where bad people can safely hide. What’s particularly worrying is that the measures propposed by France are easy to circumvent using client-side encryption. The fear has to be that once the French government realizes that fact, it will then seek to control or ban this form too.

Link (Techdirt)

Is Retweeting ISIS ‘Material Support Of Terrorism’?

Last week there was a bizarre and ill-informed post by music industry lawyer Chris Castle — who has a weird infatuation with the idea that Google must be pure evil — in which he tried to argue that because YouTube wasn’t able to take down propaganda videos showing ISIS atrocities fast enough, that Google was providing “material support” for terrorism. As Castle notes:

Google’s distribution of jihadi videos on Google’s monopoly video search platform certainly looks like material support of terrorists which is itself a violation of the federal law Google claims to hold so dear. (See 18 U.S. Code §2339A and §2339B aka the U.S. Patriot Act.)

Of course, there are all sorts of problems with the Patriot Act, including its definitions of “material support of terrorism,” but to stretch the law to argue that providing an open platform and simply not removing videos fast enough (the videos in question all got removed pretty rapidly anyway, but not fast enough for Castle) is somehow “material support for terrorism” is flat out crazy. It stems from the same sort of confused logic that Castle has used in the past, arguing that Google and others must magically “just know” what is infringing and what is not — suggesting a true lack of understanding about the scale of offerings like YouTube and the resources needed to sort through all the content.

We were inclined to simply dismiss Castle’s nuttiness to the category of “WTF” where it belongs… until at a conference earlier this week, a DOJ official, John Carlin, who holds the role of assistant attorney general for national security, appeared to suggest that anyone helping ISIS’s social media campaign could be guilty of “material support” for terrorism:

John Carlin, the assistant attorney general for national security, told a cybersecurity conference in Washington on Monday that officials could try to blunt ISIS’s violent PR operation by essentially trying propagandists as terrorists. He suggested the Justice Department could bring prosecutions under the law against providing material support to a terrorist organization. His remarks were believed to be the first time a U.S. official has ever said that people who assist ISIS with online media could face criminal prosecution.

Carlin was asked at the conference whether he would “consider criminal charges” against people who are “proliferating ISIS social media.”

His answer: “Yes. You need to look at the particular facts and evidence.” But Carlin noted that the United States could use the material support law to prosecute “technical expertise” to a designated terrorist organization. And spreading the word for ISIS online could count as such expertise.

Link (Techdirt)

FBI Flouts Obama Directive to Limit Gag Orders on National Security Letters

Despite the post-Snowden spotlight on mass surveillance, the intelligence community’s easiest end-run around the Fourth Amendment since 2001 has been something called a National Security Letter.

FBI agents can demand that an Internet service provider, telephone company or financial institution turn over its records on any number of people — without any judicial review whatsoever — simply by writing a letter that says the information is needed for national security purposes. The FBI at one point was cranking out over 50,000 such letters a year; by the latest count, it still issues about 60 a day.

The letters look like this:

Recipients are legally required to comply — but it doesn’t stop there. They also aren’t allowed to mention the order to anyone, least of all the person whose data is being searched. Ever. That’s because National Security Letters almost always come with eternal gag orders. Here’s that part:

That means the NSL process utterly disregards the First Amendment as well.

More than a year ago, President Obama announced that he was ordering the Justice Department to terminate gag orders “within a fixed time unless the government demonstrates a real need for further secrecy.”

And on Feb. 3, when the Office of the Director of National Intelligence announced a handful of baby steps resulting from its “comprehensive effort to examine and enhance [its] privacy and civil liberty protections” one of the most concrete was — finally — to cap the gag orders:

In response to the President’s new direction, the FBI will now presumptively terminate National Security Letter nondisclosure orders at the earlier of three years after the opening of a fully predicated investigation or the investigation’s close.

Continued nondisclosures orders beyond this period are permitted only if a Special Agent in Charge or a Deputy Assistant Director determines that the statutory standards for nondisclosure continue to be satisfied and that the case agent has justified, in writing, why continued nondisclosure is appropriate.

Despite the use of the word “now” in that first sentence, however, the FBI has yet to do any such thing. It has not announced any such change, nor explained how it will implement it, or when.

Link (The Intercept)

Internet Industry Now Considers The Intelligence Community An Adversary, Not A Partner

In an interview last month, Timothy D. Cook, Apple’s chief executive, said the N.S.A. “would have to cart us out in a box” before the company would provide the government a back door to its products. Apple recently began encrypting phones and tablets using a scheme that would force the government to go directly to the user for their information. And intelligence agencies are bracing for another wave of encryption.

In fact, it seems noteworthy that this whole issue of increasing encryption by the tech companies to keep everyone out has been left off the official summit schedule. As the NY Times notes, Silicon Valley seems to be pretty much completely fed up with the intelligence community after multiple Snowden revelations revealed just how far the NSA had gone in trying to “collect it all” — including hacking into the foreign data centers of Google and Yahoo. And, on top of that, the NSA’s efforts to buy up zero day vulnerabilities before companies can find out and patch them:

“What has struck me is the enormous degree of hostility between Silicon Valley and the government,” said Herb Lin, who spent 20 years working on cyberissues at the National Academy of Sciences before moving to Stanford several months ago. “The relationship has been poisoned, and it’s not going to recover anytime soon.”

Link (Techdirt)