Rosie O’Donnell’s Ex Accuses Her Of Copyright Infringement… For Posting Photos Of Their Daughter To Instagram

Almost everything gets pretty contentious in a divorce. That’s pretty much a universal truth. And now we can thank copyright for making things even more of a mess. Five years ago we wrote about a case involving a divorcing couple who fought over the thousands of photos that were amassed during two decades of marriage. As we noted at the time, it seemed a bit odd that no one brought up the copyright question during that fight. Well, now it’s come to that. Comedian/TV host Rosie O’Donnell is apparently going through a (yup) contentious divorce with her wife, Michelle Rounds, and it’s reached the point were Rounds is claiming copyright over a photo that O’Donnell posted to Instagram last week. Rounds, of course, says that she took the photo and thus holds the copyright. She even went so far as to file a takedown notice with Instagram — though as of writing this, the photo is still up on the site.

This, of course, is not what copyright law is supposed to be used for — but since so many people now see it as a sort of universal “censor this now” button, that’s how it’s being used. It would be insane for this to actually result in a lawsuit, but if it did, I would imagine that O’Donnell would have a decent set of defenses, from an implied license to fair use and more. But, really, that’s besides the point. It’s becoming fairly ridiculous how frequently people seek to use copyright law to just block things because they don’t like it, not because of anything having to do with “promoting the progress.” This is just the latest example — which (once again) highlights the sheer insanity of automatically applying copyright to every work upon creation.

Link (Techdirt)

Dennis Hastert And Federal Prosecutorial Power

This week, federal prosecutors indicted former Speaker of the House Dennis Hastert.

Hastert is charged with two federal crimes: structuring financial transactions to evade IRS reporting requirements in violation of 31 U.S.C. section 5324(a)(3) and lying to the FBI in violation of the notorious 18 U.S.C. section 1001. Both charges reflect the breadth of federal prosecutorial power.

The indictment has mostly inspired chatter about what it doesn’t say. Hastert is charged with structuring withdrawals of less than $10,000 (so that they would not be reported to the IRS) so that he could pay off an unidentified person for Hastert’s unidentified past misconduct. What past misconduct, or threatened accusation of misconduct, could lead Hastert to pay $3.5 million? The indictment doesn’t say, but it has been drafted to imply that the allegation of past misconduct relates to Hastert’s job as a teacher and coach in Yorkville, Illinois. Hastert isn’t charged with doing anything to the accuser, and the accuser isn’t charged with extortion.

As Radley Balko has pointed out, structuring (or “smurfing”) charges are extremely flexible. They demonstrate the reality of how Americans targeted by the Department of Justice can be charged. We imagine law enforcement operating like we see on TV: someone commits a crime, everyone knows what the crime is, law enforcement reacts by charging them with that crime. But that’s not how federal prosecution always works. Particularly with high-profile targets, federal prosecution is often an exercise in searching for a theory to prosecute someone that the feds would like to prosecute. There is an element of creativity: what federal statute can we find to prosecute this person?

We’ll learn more about the reasons for Hastert’s payments in the course of the case (or through Department of Justice leaks calculated to harm him). I suspect we’ll find that the investigation happened like this: the feds heard that Hastert was paying someone off based on an accusation of old misconduct, determined that the misconduct was too old (or out of their jurisdiction) to prosecute, and started subpoenaing records and interviewing witnesses until they found some element of what he was doing that was a federal crime. In other words, they targeted the man, and then looked for the crime.

The problem with this scenario is that federal criminal law is extremely broad. Practically speaking, it gives federal prosecutors vast discretion to determine who among us faces criminal charges. If you think that you’re safe because you’ve never committed a crime, you may learn to your surprise that you’re wrong.

The rational response to this situation is clear: don’t trust the feds, don’t talk to the feds. But Dennis Hastert, like many accomplished people, believed he could talk his way out of the situation. When the FBI came to interview him, he didn’t refuse to answer and call his lawyer. According to the indictment, he confirmed in response to an FBI agent’s question that he was withdrawing cash in order to store it because he didn’t feel the banking system was safe. For that, he’s been charged with lying to federal agents.

Link (Popehat)

Pakistani CEO arrested for selling degrees from “Barkley” and “Columbiana”

The CEO of a Pakistani company called Axact, which called itself the country’s largest software exporter, was arrested yesterday in Karachi. Axact and its CEO, Shoaib Ahmed Shaikh, are accused of running a global network of selling fake diplomas.

Local television showed pictures of a room filled with the fakes, according to reports in The New York Times and The Guardian. The documents were stamped with letterhead from fake Axact-owned universities with names like Bay View, Cambell State, and Oxdell.

Other Axact institutions adopted names that mimicked well-known US universities, such as “Barkley” and “Columbiana.”

“We have seized hundreds of thousands of fake degrees,” Shahid Hayat, a director for Pakistan’s federal investigative agency, told The Guardian.

Shaikh was shown on Pakistani TV being led to a waiting government car, according to The New York Times. As he got into the car, he told the officials arresting him that he would “see to every one of them.”

Several other Axact officials were arrested as well. The charges include forgery, fraud, and illegal money transfers.

Pakistan has requested FBI assistance to deal with the case, since many of the fake universities are US-based.

The nature of Axact’s business was brought to light in a New York Times article published earlier this month. That article described Axact as employing some 2,000 people, offering “Silicon Valley-style employee perks like a swimming pool and yacht.”

But the company’s real business was selling fake academic degrees on a network of some 370 websites. It was estimated to be earning several million dollars per month. The websites included slick videos, with actors hired to portray professors and students.

Telephone salespeople at Axact worked around the clock, sometimes catering to “customers who clearly understand that they are buying a shady instant degree for money,” according to the Times. Other times, agents would “manipulate those seeking a real education, pushing them to enroll for coursework that never materializes, or assuring them that their life experiences are enough to earn them a diploma.”

The company called the New York Times expose “baseless, substandard, maligning and defamatory,” and a “massive conspiracy by the seths of the Pakistani media industry.”

The arrests come as Axact was on the verge of launching its own TV network and newspaper group. It isn’t clear what will come of those plans.

Link (Ars Technica)

U.N. Report Asserts Encryption as a Human Right in the Digital Age

Encryption is not the refuge of scoundrels, as Obama administration law-enforcement officials loudly proclaim – it is an essential tool needed to protect the right of freedom of opinion and expression in the digital age, a new United Nations report concludes.

Encryption that makes a communication unintelligible to anyone but the intended recipient creates “a zone of privacy to protect opinion and belief,” says the report from David Kaye, who as Special Rapporteur on the promotion and protection of the right to freedom of opinion and expression is essentially the U.N.’s free speech watchdog.

The significance of encryption extends well beyond political speech, Kaye writes. “The ability to search the web, develop ideas and communicate securely may be the only way in which many can explore basic aspects of identity, such as one’s gender, religion, ethnicity, national origin or sexuality.”

Encryption, like anonymity, is essential to artists, journalists, whistleblowers, and many other classes of people, the report says.

And far from banning or weakening encryption, governments should embrace and strengthen it, Kaye writes. He specifically urges the U.S. Congress to “prohibit the Government from requiring companies to weaken product security or insert back-door access measures.”

Obama administration officials have been advocating for encryption with some sort of built-in measure that law enforcement could circumvent, either an intentional weakness that creates a “back door,” or some sort of split “master key”.

Newly-installed Attorney General Loretta Lynch on Wednesday became the latest to engage in fear-mongering, saying she had “grave concerns” about encryption’s use by “people whose sworn duty is to harm Americans here and abroad.”

National Security Agency director Mike Rogers took a slightly more nuanced view on Wednesday, ZDNet reported. “You’re not going to hear me say that encryption is a bad thing. I don’t think it is a bad thing. Encryption is not bad. Encryption is a fundamental part of the future; I think it would be ridiculous to pretend otherwise,” Rogers told a cyberwarfare conference in Estonia.

But he expressed his desire for a legal framework that would give law enforcement access, asking: “Can we create some mechanism where within this legal framework there’s a means to access information that directly relates to the security of our respective nations, even as at the same time we are mindful we have got to protect the rights of our individual citizens?”

Kaye’s answer is: No. He concludes from his research that “compromised encryption cannot be kept secret from those with the skill to find and exploit the weak points, whether State or non-State, legitimate or criminal.” Thus: “In the contemporary technological environment, intentionally compromising encryption, even for arguably legitimate purposes, weakens everyone’s security online.”

And Kaye points out that law enforcement officials “have not demonstrated that criminal or terrorist use of encryption serves as an insuperable barrier to law enforcement objectives.”

Indeed, FBI Director James Comey gave a much-quoted speech last fall about how increasingly common cell-phone encryption could lead law enforcement to a “very dark place” where it “misses out” on crucial evidence to nail criminals. But the examples he then gave failed the laugh test.

The United Nation’s Office of the High Commissioner for Human Rights appoints expert “special rapporteurs” to be their eyes and ears when it comes to key human rights issues. Kaye, a law professor at the University of California, Irvine, began his three-year term as the rapporteur for freedom of opinion and expression in August 2014.

His report also warns that state prohibitions of anonymity online – such as required real-name registration for online activity, SIM card registration, or banning of anonymity tools such as Tor — interfere with the right to freedom of expression.

Encryption advocates hailed the report. “This landmark report shows how fundamental — and necessary — encryption is for exercising freedom of expression,” said Access Senior Policy Counsel Peter Micek. “It’s a sober rebuke of baseless fear-mongering from those who say encryption only helps criminals and terrorists.”

Link (The Intercept)

Emails Reveal Dairy Lobbyist Crafted “Ag-Gag” Legislation Outlawing Pictures of Farms

Across the country, legislatures are responding to whistleblowers and activists who have exposed inhumane and at times unsanitary practices at farms by passing laws that criminalize the taking of photos or videos at agricultural facilities.

Farming interests have publicly backed the campaign to outlaw recording. But emails I obtained through a records request reveal that in Idaho, which passed an “ag-gag” law last year, dairy industry lobbyists actually crafted the legislation that was later introduced by lawmakers.

State Sen. Jim Patrick, R-Twin Falls, said he sponsored the bill in response to an activist-filmed undercover video that showed cows at an Idaho plant being beaten by workers, dragged by the neck with chains, and forced to live in pens covered in feces, which activists said made the cows slip, fall and injure themselves. The facility, Bettencourt Dairies, is a major supplier for Burger King and Kraft. The workers who were filmed were fired.

Introducing the bill, Patrick compared the activists behind the Bettencourt video to marauding invaders who burned crops to starve their enemies. “This is clear back in the sixth century B.C.,” Patrick said, according to Al Jazeera America. “This is the way you combat your enemies.”

Idaho is a major center for dairy production, an industry that generates $2.5 billion a year in the state.

Patrick’s bill was introduced on February 10, 2014, sailed through committee within days, and was signed by Gov. C.L. “Butch” Otter on February 28. The legislation calls for a year in jail and fines up to $5,000 for covertly recording abuses on farms or for those who lie on employment applications about ties to animal rights groups or news organizations.

But the groundwork was laid by Dan Steenson, a registered lobbyist for the Idaho Dairymen’s Association, a trade group for the industry.

Steenson testified in support of the ag-gag bill, clearly disclosing his relationship with the trade group. Emails, however, show that he also helped draft the bill. On January 30, before Sen. Patrick’s bill was formally introduced, Steenson emailed Bob Naerebout, another Dairymen lobbyist, and Brian Kane, the Assistant Chief Deputy of the state attorney general’s office, with a copy of the legislation. “The attached draft incorporates the suggestions you gave us this morning,” Steenson wrote, thanking Kane for his help in reviewing the bill. Kane responded with “one minor addition” to the legislation, which he described to Steenson as “your draft.”

The draft text of the legislation emailed by Steenson closely mirrors the bill signed into law.

“Dan and the Idaho dairymen had a large input but also Idaho Farm Bureau as well as Idaho-eastern seed growers,” Patrick said in an email to The Intercept. “This was not about only dairy so but all of agriculture since all farms have risks of distorted facts,” he added. “We only want the whole truth to be told not just a few social media sites.”

The law made Idaho the seventh state to pass “ag-gag” efforts. Similar efforts have been signed into law in recent years in Utah, Iowa and Missouri.

This week, North Carolina may become the next state to do so. The North Carolina version of the act covers not just farms and agricultural facilities, but many other workplaces, including nursing homes and daycares — an expansion of the law that critics say will muffle whistleblowers. North Carolina Gov. Pat McCrory is deciding whether to sign or veto the legislation.

Link (The Intercept)

Legendary Journalist in Private: “It Is All Fraudulent, All of It, Everywhere”

Politico recently ran a fantastic historical profile of journalist Theodore H. White by the writer Scott Porch. White invented the genre of modern presidential campaign books with The Making of the President, 1960 (and then 1964, 1968 and 1972).

The 1960 version, which won a Pulitzer Prize and sold four million copies, describes John F. Kennedy as a “forlorn and lonesome young man … lithe as an athlete … handsome and tired, with just a fleck of gray now in his glossy brown hair” who “baffled” the “old-line politicians of Tammany.” Then after Kennedy was assassinated, White helped Jackie Kennedy create the “Camelot” myth of his presidency.

In other words, White publicly took the stance that U.S. politicians and politics were just super. This is from the first pages of The Making of the President, 1960:

I owe two general acknowledgments:

First, to the politicians of America — men whom I have found over the long years the pleasantest, shrewdest and generally the most honorable of companions …

Second, I must thank my comrades of the press — whose reporting at every level of America politics purifies, protects and refreshes our system from year to year.

But what did White think about U.S. politics in private? See if you can spot the subtle difference between White’s public statements and this letter he wrote to a close friend on August 31, 1960 during the Kennedy-Nixon campaign:

…it is all fraudulent, all of it, everywhere, up and down, East and West. The movies, radio and state and books and TV — all of them are fraudulent; and the foundations and universities and scholars, they are all fraudulent too; and the executives and the financiers … and the Commissars and the Krushchevs and the Mao Tze-tungs, they are fraudulent equally; it is all a great game; and there are two dangers in this great game: first, the fraudulent people come to believe their own lies, they come to have faith in their fraud; and second, underneath it all, because people are fundamentally good, they come to realize that we live in lies and the people get angrier and angrier and they may explode.

The scenery of politics is ridiculous, absolutely ridiculous. Yet I must report all this as serious. This is the strain on me. That I must be serious, and I must exhaust myself trying to find out what is true and what is fraud and yet, even after I know, I must take them both seriously and write of them both as if I did not know the true distinctions between them.

Link (The Intercept)

Seized Megaupload Domains Link to Scam Ads and Malware

Well over three years have passed since Megaupload was shutdown, but there is still little progress in the criminal proceedings against the operation.

The United States hopes that New Zealand will extradite Kim Dotcom and his colleagues, but the hearings have been delayed several times already.

Meanwhile, several domain names including the popular Megaupload.com and Megavideo.com remain under the control of the U.S. Government. At least, that should be the case. In reality, however, they’re now being exploited by ‘cyber criminals.’

Instead of a banner announcing that the domains names have been seized as part of a criminal investigation they now direct people to a Zero-Click adverting feed. This feed often links to malware installers and other malicious ads.

One of the many malicious “ads” the Megaupload and Megavideo domain names are serving links to a fake BBC article, suggesting people can get an iPhone 6 for only £1.

And here is another example of a malicious ad prompting visitors to update their browser.

The question that immediately comes to mind is this: How can it be that the Department of Justice is allowing the domains to be used for such nefarious purposes?

Looking at the Whois records everything seems to be in order. The domain name still lists Megaupload Limited as registrant, which is as it was before. Nothing out of the ordinary.

The nameserver PLEASEDROPTHISHOST15525.CIRFU.BIZ, on the other hand, triggers several alarm bells.

CIRFU refers to the FBI’s Cyber Initiative and Resource Fusion Unit, a specialized tech team tasked with handling online crime and scams. The unit used the CIRFU.NET domain name as nameserver for various seized domains, including the Mega ones.

Interestingly, the CIRFU.NET domain now lists “Syndk8 Media Limited” as registrant, which doesn’t appear to have any connections with the FBI. Similarly, CIRFU.BIZ is not an official CIRFU domain either and points to a server in the Netherlands hosted by LeaseWeb.

It appears that the domain which the Department of Justice (DoJ) used as nameserver is no longer in control of the Government. Perhaps it expired, or was taken over via other means.

Link (TorrentFreak)

White House sides with Oracle, tells Supreme Court APIs are copyrightable

This is, to put it mildly, a disaster for anyone who does programming

The Justice Department is weighing in on the hot-button intellectual property dispute between Google and Oracle, telling the Supreme Court that APIs are protected by copyright.

The Obama administration’s position means it is siding with Oracle and a federal appeals court that said application programming interfaces are subject to copyright protections. The high court in January asked for the government’s views on the closely watched case.

The dispute centers on Google copying names, declarations, and header lines of the Java APIs in Android. Oracle filed suit, and in 2012, a San Francisco federal judge sided with Google. The judge ruled that the code in question could not be copyrighted. Oracle prevailed on appeal, however. A federal appeals court ruled that the “declaring code and the structure, sequence, and organization of the API packages are entitled to copyright protection.”

Google maintained that the code at issue is not entitled to copyright protection because it constitutes a “method of operation” or “system” that allows programs to communicate with one another.

Link (Ars Technica)

TSA Body Scanner Lobbyist Now Overseeing Spending on TSA Security

Rapiscan Systems lobbied aggressively to win a major contract with the Transportation Security Administration to provide X-ray body scanners at airports, only to lose the contract in 2013 after the company failed to deliver software to protect the privacy of passengers.

Rapiscan now has a friend on the inside.

Earlier this month, Rapiscan lobbyist Christopher Romig took a job with the House Appropriations Committee’s Homeland Security Subcommittee, which oversees the TSA budget.

During the previous push for a TSA contract, Rapiscan employed Michael Chertoff, former Secretary of Homeland Security, who now works as a pundit and a homeland security industry consultant through his firm the Chertoff Group. According to the Huffington Post, Rapiscan previously spent as much as $271,500 on lobbying per year to help secure business with the TSA.

Romig’s shift through the revolving door was first noted by Legistorm.

In his last lobbying filing statement, Romig disclosed that he lobbied Congress on “aviation, port and border security,” as well as the “budget and appropriation.” All areas he will now supervise as a professional staff member.

Link (The Intercept)

Chicago Police Put Antlers on Black Man and Posed for Pictures –

The photo shows two white Chicago Police officers posing with an unidentified black man. The officers — Timothy McDermott and Jerome Finnigan — are holding rifles as the black man lies on the floor with a dazed look on his face and with antlers on his head as if he were a prized, big buck finally hunted down.

Finnegan is smiling and grabbing the right antler, while McDermott is holding up the man’s head as if it were his trophy.

The photo was taken in a police station on the West Side of Chicago sometime between 1999 and 2003. The Chicago Police Department successfully kept it hidden from the public until a judge refused to keep it under seal and the Chicago Sun-Times pulled a copy from a court filing.

Finnigan is a notoriously dirty ex-cop who was a member of the police department’s elite Special Operations Section (SOS) until 2006, when he was charged with leading a gang of fellow officers who robbed suspects, illegally invaded homes and stole thousands of dollars in cash. He’s now serving 12 years in federal prison.

In a 2012 interview with Playboy, Finnigan admitted the SOS beat and tortured multiple suspects, and described shutting down an internal affairs investigation by appealing to one of his comrades in blue who worked in the Internal Affairs Division.

Link (The Intercept)