Image 01 Image 03

privacy Tag

Today, a controversial cybersecurity bill aimed at making it easier for corporations to prevent hacking attacks advanced in the Senate with bipartisan support. The Cybersecurity Information Sharing Act (CISA) in its current form would make it possible for corporations to share information about cyberattacks with each other---or the goverment---without having to worry about fielding privacy-based lawsuits. The bill enjoys bipartisan support in the Senate---and has languished under bipartisan opposition, led by Kentucky Senator and Presidential hopeful Rand Paul. From Reuters:
But many privacy activists and a few lawmakers, including Republican Senator Rand Paul and Democratic Senator Ron Wyden, vehemently oppose it. Several big tech companies also have come out against the measure, arguing that it fails to protect users' privacy and does too little to prevent cyber attacks.

Today the Senate voted 67-32 to pass the USA-FREEDOM Act, a piece of surveillance (read: privacy!) reform legislation meant to extend key provisions of the PATRIOT Act, which expired Sunday night. The USA-FA passed the House with supermajority, bipartisan support, but found a more hostile crowd waiting when it arrived in the Senate chamber. Rand Paul opposed it, and on Sunday night (the same night the PATRIOT Act expired) blocked a vote that most certainly would have ended with the Act's approval. Senate leadership opposed an immediate clean passage of the Act, but for different reasons entirely---they wanted the opportunity to amend and return to the House, a tactic that was met with opposition in both chambers. From earlier today:
One amendment would extend the timeframe for transferring data collection responsibilities from the NSA to the phone companies, allowing 12 months for that handover rather than six, as the House bill stipulates. Another would force phone companies to give Congress six months' advance notice if they change the procedures they use to collect and retain data. A third would allow the Director of National Intelligence to sign off on any procedural changes by the phone companies before they go into effect. "The House's bill is not holy writ. It's not something we have to accept in its entirety without any changes...and I think where the policy debae should go would be toe embrace these amendments," explained Senate Majority Whip John Cornyn, R-Texas, during a floor speech on Tuesday. "We sure need to know that the new system would actually work. Doesn't that just make sense?"

Privacy advocates cheered when Apple announced last month that an updated encryption scheme would disallow Apple from bypassing user passcodes at the request of law enforcement officials armed with search warrants. Now, the Justice Department is fighting back against these updates, and they're using an ancient tactic to do it. The Wall Street Journal explains:
That technological shift prompted tense private meetings this fall between Apple and Justice Department lawyers... Amid that standoff, the government on Oct. 10 obtained a search warrant to examine the contents of the phone in the credit-card case. The phone was locked, so prosecutors asked U.S. Magistrate Judge Gabriel Gorenstein to order the manufacturer to unlock it. They cited the All Writs Act, originally part of a 1789 law that gives courts broad authority to carry out their duties. Judge Gorenstein agreed. “It is appropriate to order the manufacturer here to attempt to unlock the cellphone so that the warrant may be executed as originally contemplated,” he wrote on Oct. 31. The judge gave the manufacturer, referred to only as “[XXX], Inc.,” five business days after receiving the order to protest. Much remains unknown, including the maker of the phone, and what happened next. The language of the opinion suggests it could apply to a company like Apple. The order is directed at the “manufacturer of the cellphone,” and Apple is one of the few companies that produce both the phone itself and the software that would manage the encryption.
The order (full embed at bottom of post) was signed and published by a federal magistrate; this is significant because, as the article above explains, these types of decisions don't normally come down in a published opinion. (Magistrates usually just sign an order granting or denying a request.) The fact that this decision is now published is a signal to other judges who may examine it that we could be looking at the development of a new legal precedent to answer evolving technology.

A Texas appeals court has struck down a law allowing police officers to conduct warrantless blood tests on suspected drunk drivers. The law borrows concepts from the Texas Transportation Code and other statutes, and has both attorneys and Fourth Amendment advocates up in arms over what it means to conduct an "unreasonable search and seizure." In 2013, the Supreme Court ruled in Missouri v. McNeely that the natural dissipation of alcohol in the bloodstream does not constitute an exigent circumstance justifying blanket authorization for warrantless searches. Texas' "No Refusal" periods, however, throw a wrench in an easy hypo by injecting statutorily-based "implied consent" into the mix. ("No Refusal" periods are exactly what they sound like.) What happens if you refuse to provide a sample and/or perform sobriety tests in the field? Up until last week, the authorities would haul you into jail and forcibly extract the evidence from the crook of your right arm---without a warrant. The convenience of this level of "implied consent" was too much for the Texas Criminal Court of Appeals, however, and last week they ruled this type of search unconstitutional. Via the Houston Chronicle:
"We hold that a nonconsensual search of a DWI suspect's blood conducted pursuant to the mandatory-blood-draw and implied-consent provisions in the Transportation Code, when undertaken in the absence of a warrant or any applicable exception to the warrant requirement, violates the Fourth Amendment," Judge Elsa Alcala of the Texas Court of Criminal Appeals wrote on behalf of the five majority opinion judges. Four members of the nine-judge court dissented.
Constitution trumps statute, and it feels so right.

Apple's latest update to its OS includes a lot of neat bells and whistles, but one key upgrade has privacy advocates cheering. This latest reboot has eliminated Apple's longstanding capability to access users' iPhone and iPad passcodes; in the past, this allowed Apple to both help users remember forgotten passcodes---and comply with search warrants. iOS 8, however, will actually prevent Apple from accessing user passcodes. Via the Washington Post:
“Unlike our competitors, Apple cannot bypass your passcode and therefore cannot access this data,” Apple said on its Web site. “So it’s not technically feasible for us to respond to government warrants for the extraction of this data from devices in their possession running iOS 8.” As the new operating system becomes widely deployed over the next several weeks, the number of iPhones and iPads that Apple is capable of breaking into for police will steadily dwindle to the point where only devices several years old — and incapable of running iOS 8 — can be unlocked by Apple.
This update, however, does not prevent Apple from accessing data via iCloud. Apple will still have a legal obligation to give police access to any data (pictures, music, e-mails, text messages, etc.) that is backed up to the cloud. (You can turn off this setting on your individual device.) Surprising absolutely no one, law enforcement agencies have put on their "concerned face" over the new changes: