Deeplinks
When it comes to net neutrality, 2015 started off with a blast. In February the FCC reclassified retail broadband Internet service as a telecommunications service, and issued strong new net neutrality rules while forbearing from almost all the other Title II regulations. In other words, Team Internet started the year off with a huge victory (with a few caveats, which we’ll return to at the end).
The real test of whether you have rights is not what the law says: it's what happens when you try to exercise them. For too many bloggers and technologist around the world, the price of using the Net in innovative, legitimate ways, has been jail. Some of the cases of imprisonment around the world that we've tracked the most closely were freed in 2015, but others continue to languish in need of our support.
Zone 9 bloggers freed in Ethiopia
There's been one undeniably happy ending for this year even if it is for a tale that should never have had to have beeen told.
In October 2015, all six editors of the linguistics journal Lingua quit at once, along with its 31-member editorial board. The walkout brought mainstream attention to a debate that has been brewing for years over the future of academic publishing.
2015 was a busy year for transparency at EFF. We are currently litigating 10 different public records cases—the highest number of transparency cases EFF has had pending at one time in our 25 year history. The majority of the cases are in federal courts (in San Francisco and Washington, D.C.), although we have two cases pending in California state courts.
Here's a brief, year-end rundown of each case, including what we’re after, who we sued, and the status of the case.
FEDERAL FREEDOM OF INFORMATION ACT LAWSUITS
Chances are that you didn't go a few days without hearing the word "cyber" last year. It's for good reason. It was a year of data breaches and hacks, impacting the public and private sector alike. Congress used some of these incidents to fear-monger and pass fundamentally flawed legislation, chiefly the Cybersecurity Information Sharing Act (CISA), that didn't even address the basic problem of poor security practices. So as 2015 comes to a close, we thought we would revisit a few.
OPM Hack and Breaches Upon Breaches
This year the fight to protect student privacy hit a boiling point with our Spying on Students campaign, an effort to help students, parents, teachers, and school administrators learn more about the privacy issues surrounding school-issued devices and cloud services. We're also working to push vendors like Google to put students and their parents back in control of students’ private information.
Back in November, T-Mobile announced a new service for its mobile customers called Binge On, in which video streams from certain websites don’t count against customers’ data caps.1 The service is theoretically open to all video providers without charge, so long as T-Mobile can recognize and then “optimize” the provider’s video streams to a bitrate equivalent to 480p.
Just before the holidays, a Department of Homeland Security (DHS) working group released guidance for state and local agencies using drone aircraft. The document, Best Practices for Protecting Privacy, Civil Rights & Civil Liberties In Unmanned Aircraft Systems Programs, addresses concerns over the implications of high-tech tools that, without rigorous controls and oversight embedded in law and embodied in code, can easily be abused.
The U.S. Department of Health and Human Services (HHS) has proposed a sweeping update to the federal regulations that govern scientific experiments involving human subjects, whether it’s studying behavior, testing biological specimens, or analyzing DNA. While the proposed policy [.pdf] generally moves in the right direction, EFF has filed formal comments outlining several serious concerns about how these rules will impact privacy.
At Noon Today, Demand Real Answers from John Legere, CEO of T-Mobile
T-Mobile's Binge On service could have been great. Giving customers a choice about how to use their data so that they can stream more video without hitting their data cap is a wonderful idea. Unfortunately, T-Mobile botched the roll out. Without asking, they made it the default for all of their customers. In other words, they decided to throttle all video—not just zero-rated video. And they claimed to be using “video optimization technology throughout [their] network” even though their network doesn’t actually alter video content in any way. EFF uncovered these facts and more through testing earlier this week, and our research ignited a backlash across T-Mobile’s Netflix-loving community.
Over the holiday break, Congress was up in arms over a Wall Street Journal report revealing lawmakers' private conversations with Israeli officials and interest groups were swept up by the National Security Agency during the US-Iran nuclear negotiations. But these aren't the only congressional communications collected by the NSA.
How vast is the dragnet? On what other national policy matters has NSA surveillance impacted Members of Congress? A congressional investigation remains long overdue, but these revelations should prompt Congress to create a Church Committee for the 21st Century.
Why Were the Communications Collected?
In a colorful selfie video released today, John Legere, CEO of T-Mobile, got riled up and demanded to know who EFF is.
This came in response to questions that EFF submitted during Legere’s Twitter Q&A session about the new T-Mobile service, Binge On. Earlier this week, EFF published a report showing how the service—which T-Mobile claimed used adaptive video technology to optimize streaming for mobile devices—actually just throttled video and left the optimization to the video providers. Check out our detailed report.
Of course, there are lots of unanswered questions about Binge On, which is why EFF and our followers were happy to engage with Mr. Legere during today’s Twitter conversation.
Xinjiang, home of the China's muslim Uighur minority, has long been the world's laboratory for Internet repression. Faced with widespread local unrest, and online debate, China has done everything it can to enforce its vision of the Net in the region, from imprisoning bloggers and online publishers, to quarantining the entire Xinjiang network from the rest of the Internet for over ten months in 2009. Nonetheless, Xinjiang residents still circumvent censorship and surveillance in the pursuit of privacy and free expression. They use virtual private networks and other methods to get around the Great Firewall.
January 12, 2016 Update: It is important to note that some of the language that was added to the Twitter Rules on December 30, 2015 is not entirely new and was recycled from other Twitter Help pages, such as the Abusive behavior policy page. We consider the direct and explicit inclusion of this language in the Twitter Rules significant for the reasons discussed in the post below.
“One of the minor puzzles of American life is what question to ask people at parties and suchly to get to know them,” a nineteen-year-old Aaron Swartz wrote in 2006.
“‘How ya doin’?’ is of course mere formality, only the most troubled would answer honestly for anything but the positive. […] ‘What do you do?’ is somewhat offensive.” Aaron walks through various other options—“Where are you from?” “What’s your major?” “What book have you read recently?”—and articulates why each one fails to start a worthwhile discussion. And then he offers his own hack:
When courts fail to quickly address serious defects in a patent litigation complaint, it can harm not only the parties to the case, but also the public at large. Yesterday, EFF and Public Knowledge filed a friend-of-the-court brief with the Court of Appeals for the Federal Circuit in a case where the Eastern District of Texas is allowing expensive litigation to drag on even though the defendant has already fully briefed validity issues that almost surely will dispose of the case, and stop the patent owner from suing on them in the future.
Old laws can cause confusion and unduly harsh consequences, particularly when courts confront situations Congress did not anticipate. This is particularly true for the Computer Fraud and Abuse Act, 18 U.S.C. § 1030—the federal "antihacking" statute prompted in part by fear generated by the 1983 technothriller "WarGames." The CFAA was enacted in 1986, and the government's current prosecution of journalist Matthew Keys—who faces sentencing on Jan. 20 for three counts of violating the CFAA—illustrates the 30-year-old statute's many problems.
Congressional Representatives grilled the parties responsible for the U.S. implementation of controversial changes to the Wassenaar Arrangement in a joint hearing before subcommittees of the House Oversight and Homeland Security Committees today. Witnesses included officials from the Department of Commerce, the Department of Homeland Security, and the Department of State, as well as representatives of the tech industry, including Symantec, Microsoft, VMWare, and the Information Technology Industry Council.
The World Wide Web Consortium (W3C), the nonprofit body that maintains the Web's core standards, made a terrible mistake in 2013: they decided to add DRM—the digital locks that train your computer to say "I can't let you do that, Dave"; rather than "Yes, boss"—to the Web's standards.
At the time, we fought the proposal on a principled basis: DRM has no place in the open Internet because of the many ways it shuts down legal, legitimate activities.
We lost.
The President’s State of the Union address examined a great many pressing issues confronting our nation and the world. One of the most dire, however, somehow escaped his attention: the continuing threat to democracy presented by unaccountable, secret mass surveillance in violation of the Constitution.
The President’s promise to rethink security policies hastily adopted under his predecessor was a significant part of his platform when he ran for the White House. During his first presidential campaign back in 2008, President Obama made a written promise to:
EFF has been steadfast in its criticism of officials like FBI Director James Comey, who have implored tech companies to provide a backdoor to their customers’ encrypted communications. Now it appears as though the White House would like a backdoor to the First Amendment’s free speech protections by requiring private tech companies to monitor, censor, and automatically report speech on topics related to ISIS and terrorism.
The Foilies are back!
Last year, EFF launched our inaugural, tongue-in-cheek awards series for government agencies who thwarted, stymied, foot-dragged, and retaliated in response to Freedom of Information Act (FOIA) and other public records requests. We called out secrecy over cell-site simulators, marveled at the $1.4 million fee estimate for the DEA’s “El Chapo” file, and panned Chicago Public Schools’ refusal to disclose what’s in its mystery meats.
Sadly, the government didn’t learn its lesson.
With the U.S. House of Representatives passing a bill this week to amend the Freedom of Information Act (FOIA), EFF and a coalition of other groups are calling on members of the Senate [.pdf] to pass a law that meaningfully improves government transparency and accountability through access to federal records.
After we filed our complaint with the Federal Trade Commission (FTC) about Google's unauthorized collection of personal information from school children using Chromebooks and the company's educational apps, we heard from hundreds of parents around the country concerned about K-12 student privacy. This week, an important voice in Washington joined their growing chorus.
On Wednesday, Senator Al Franken (D-MN) wrote a letter to Google CEO Sundar Pichai asking for information about the privacy practices of Google Apps for Education (GAFE). Several of his questions reflect concern over the issues we raised with the FTC. Sen. Franken is the ranking member of the Senate Judiciary Subcommittee on Privacy, Technology and the Law.
Today marks the 55th anniversary of a world-historical speech by the last victorious military commander to occupy the White House: President Dwight D. “Ike” Eisenhower. His last speech while in office holds crucial implications for the U.S. today, as well as the history we celebrate tomorrow, on Martin Luther King Day.
Ike served in World War II as the Supreme Commander of the Allied Forces in Europe before becoming President. He helped encourage an industrial mobilization that enabled the U.S. to liberate Europe and defend democracy from the global threat of fascism, but he expressed concerns about its future consequences.
Until just last week, the U.S. government kept up the charade that its use of a stockpile of security vulnerabilities for hacking was a closely held secret.1 In fact, in response to EFF’s FOIA suit to get access to the official U.S. policy on zero days, the government redacted every single reference to “offensive” use of vulnerabilities. To add insult to injury, the government’s claim was that even admitting to offensive use would cause damage to national security.
We're taking part in Copyright Week, a series of actions and discussions supporting key principles that should guide copyright policy. Every day this week, various groups are taking on different elements of the law, and addressing what's at stake, and what we need to do to make sure that copyright promotes creativity and innovation.
In a mere 24 months, Mickey Mouse will enter the public domain—right?
Wrong.
Mickey Mouse is synonymous with copyright term extension, and with good reason. Every time the first Mickey cartoons creep towards the public domain, Disney's powerful lobbyists spring into action, lobbying Congress for a retrospective term-extension on copyright, which means that works that have already been created are awarded longer copyright terms. In the USA, copyright law is supposed to serve an incentive to make new works, and there's no sensible way that getting a longer copyright on something you've already made can provide an incentive to do anything except lobby for more copyright, and sue people who want to make something new out of your creation.
One of the most crucial issues in the fight for digital freedom is the question of who will control the hardware that you have in your home, in your pocket, or in your own body.
Through the lens of someone with little direct experience with prisons and jails, corrections systems in the United States may look like they're improving how prisoners communicate with the outside world through new technologies, such as inmate email, video visitation, and media tablets.
Just over 30 years ago, the Supreme Court issued its landmark ruling in Sony v. Universal City Studios (usually referred to as the Sony/Betamax case), clearing the way for a technology company to sells its products (Betamaxes, and by extension, VCRs) even though they could potentially be used for infringing purposes. After all, the court reasoned, customers also deployed their VCRs to engage in non-infringing fair uses, such as recording soap operas to watch after work. If a product was capable of “substantial noninfringing uses,” the fact that it could also be used for unlawful purposes shouldn’t be enough to force it off the market (and/or require its maker to pay millions in damages).
The Proposal Is Unfair to Both Users and Media Platforms
There’s a debate happening right now over copyright bots, programs that social media websites use to scan users’ uploads for potential copyright infringement. A few powerful lobbyists want copyright law to require platforms that host third-party content to employ copyright bots, and require them to be stricter about what they take down. Big content companies call this nebulous proposal “notice-and-stay-down,” but it would really keep all users down, not just alleged infringers. In the process, it could give major content platforms like YouTube and Facebook an unfair advantage over competitors and startups (as if they needed any more advantages). “Notice-and-stay-down” is really “filter-everything.”
Transparent and Participatory Processes Are Vital to Creating Copyright Rules that Work for Everyone
If copyright is to succeed in promoting the creation and dissemination of culture, then it needs to address the diverse needs of creators, fans, and critics. Copyright law achieves this in some jurisdictions through policies such as fair use, but more often than not it fails to address the concerns of anyone who isn't a copyright holder. Much of the blame for why copyright grows increasingly out of touch with how people experience culture lies with a lack of transparency in, and industry capture of, copyright policymaking.
Last week, as part of EFF’s annual Copyright Week, we wrote about the need for transparency in creating copyright restrictions in the international arena. As a current legal battle shows, however, it is equally important that copyright restrictions not interfere with transparency and open access to the law itself.
Now that the mass collection of telephone records by the NSA under Section 215 of the Patriot Act has ended due to the passage of USA Freedom, the question has arisen: what should the NSA do with the big mass of records that it already has? The secret FISA Court recently asked the government what it thinks should happen, and EFF sent a letter to the FISA Court (by way of the Department of Justice, asking that it be conveyed to the Court) giving our perspective.
"No Cost" License Plate Readers Are Turning Texas Police into Mobile Debt Collectors and Data Miners
Vigilant Solutions, one of the country’s largest brokers of vehicle surveillance technology, is offering a hell of a deal to law enforcement agencies in Texas: a whole suite of automated license plate reader (ALPR) equipment and access to the company’s massive databases and analytical tools—and it won’t cost the agency a dime.
Even though the technology is marketed as budget neutral, that doesn’t mean no one has to pay. Instead, Texas police fund it by gouging people who have outstanding court fines and handing Vigilant all of the data they gather on drivers for nearly unlimited commercial use.
We're pleased to announce the 2016 edition of Hacking the Patent System, a guide to alternative patent licensing produced by the Juelsgaard Intellectual Property & Innovation Clinic at Stanford Law School in partnership with EFF and Engine. First published in 2014, the guide provides a high-level overview of several tools that inventors and innovators could use to avert unnecessary and costly patent litigation (or at least to avoid trollish behavior themselves).
As Congress considers big changes to the Freedom of Information Act, a court’s decision on Monday underscores how some of the best ways to fix the ailing transparency statute are really small—like adding a comma.
Last fall in Naji Hamdan v. U.S. Department of Justice, the U.S. Court of Appeals for the Ninth Circuit read the lack of a comma in FOIA’s law enforcement exemption to limit public access to investigatory techniques and procedures.
Thursday, January 28, is Data Privacy Day—a day dedicated to promoting and raising awareness of privacy and data protection around the globe. It commemorates the January 28, 1981 signing of Convention 108, the first legally binding international treaty dealing with privacy and data protection. And it’s a great day to take charge of not only your own privacy, but also the privacy of any school children in your life.
The House Judiciary Committee has plans for a “members only” meeting next week to discuss Section 702 of the FISA Amendment Acts, the law the NSA relies on to operate its notorious PRISM surveillance program and to tap into the backbone of the Internet, also known as “upstream” collection.
While we wish that “members only” meant that Congressional watchdogs would all don vintage jackets from the 1980s while reining in the NSA, the sad truth is that our elected representatives are once again cutting out the public from an important debate over mass surveillance.
A Tired Argument Over Software Patents Is Holding Up Common-Sense Reforms
In December, over 3,000 of you rallied in support in support of a proposed Department of Education (ED) policy that would make ED-funded educational resources a lot more accessible to educators and students around the world.
Blogging platform Medium is now blocked in Malaysia, apparently in an effort to censor an investigative news outlet critical of the government. The Sarawak Report has mirrored its articles on Medium at least since its own site was blocked in mid-2015, when it published allegations of corruption.
Back when you were a kid, you may (depending on your age) have checked books out of your library using a circulation card. The cards, like the one pictured to the right, would allow the librarian to keep track of the books, who had them, and when they were expected back at the library.
This month’s Stupid Patent is awarded to Xerox, who on January 19, 2016 was awarded a patent on essentially the library circulation card, but done electronically.
The U.S. Commerce Department released its long-awaited White Paper on fixes to copyright law yesterday and it's a pretty mixed bag. It includes some good recommendations on how Congress should change the law, but punts on some crucial enduring problems.
Deeplinks Topics
- Fair Use and Intellectual Property: Defending the Balance
- Free Speech
- Innovation
- International
- Know Your Rights
- Privacy
- Trade Agreements and Digital Rights
- Security
- State-Sponsored Malware
- Abortion Reporting
- Analog Hole
- Anonymity
- Anti-Counterfeiting Trade Agreement
- Biometrics
- Bloggers' Rights
- Broadcast Flag
- Broadcasting Treaty
- CALEA
- Cell Tracking
- Coders' Rights Project
- Computer Fraud And Abuse Act Reform
- Content Blocking
- Copyright Trolls
- Council of Europe
- Cyber Security Legislation
- CyberSLAPP
- Defend Your Right to Repair!
- Development Agenda
- Digital Books
- Digital Radio
- Digital Video
- DMCA
- DMCA Rulemaking
- Do Not Track
- DRM
- E-Voting Rights
- EFF Europe
- Encrypting the Web
- Export Controls
- FAQs for Lodsys Targets
- File Sharing
- Fixing Copyright? The 2013-2016 Copyright Review Process
- FTAA
- Genetic Information Privacy
- Hollywood v. DVD
- How Patents Hinder Innovation (Graphic)
- ICANN
- International Privacy Standards
- Internet Governance Forum
- Law Enforcement Access
- Legislative Solutions for Patent Reform
- Locational Privacy
- Mandatory Data Retention
- Mandatory National IDs and Biometric Databases
- Mass Surveillance Technologies
- Medical Privacy
- National Security and Medical Information
- National Security Letters
- Net Neutrality
- No Downtime for Free Speech
- NSA Spying
- OECD
- Offline : Imprisoned Bloggers and Technologists
- Online Behavioral Tracking
- Open Access
- Open Wireless
- Patent Busting Project
- Patent Trolls
- Patents
- PATRIOT Act
- Pen Trap
- Policy Analysis
- Printers
- Public Health Reporting and Hospital Discharge Data
- Reading Accessibility
- Real ID
- RFID
- Search Engines
- Search Incident to Arrest
- Section 230 of the Communications Decency Act
- Social Networks
- SOPA/PIPA: Internet Blacklist Legislation
- Student and Community Organizing
- Student Privacy
- Stupid Patent of the Month
- Surveillance and Human Rights
- Surveillance Drones
- Terms Of (Ab)Use
- Test Your ISP
- The "Six Strikes" Copyright Surveillance Machine
- The Global Network Initiative
- The Law and Medical Privacy
- TPP's Copyright Trap
- Trans-Pacific Partnership Agreement
- Travel Screening
- TRIPS
- Trusted Computing
- Video Games
- Wikileaks
- WIPO
- Transparency
- Uncategorized