Deeplinks
Although grassroots activism has dealt it a blow, the Senate Intelligence Committee's terrible bill, the Cyber Intelligence Sharing Act(CISA) keeps shambling along like the zombie it is. In July, Senator McConnell vowed to hold a final vote on the bill before Congress left for its six-week long summer vacation. In response, EFF and over 20 other privacy groups ran a successful Week of Action, which included sending over 6 million faxes in opposition to CISA, causing the Senate to postpone the vote until late September.
The following is a guest post from Eric Crampton, Head of Research at the New Zealand Initiative, who previously served as Lecturer and Senior Lecturer in Economics at the Department of Economics & Finance at the University of Canterbury.
Australia National University’s Dr. George Barker suggested that New Zealand could do well by strengthening its copyright legislation. He warned against the fair dealing exceptions that have crept into the law and asked, “Why not have copyright law like property law—i.e. it lasts forever?”
The California Legislature is on the brink of passing S.B. 178, the California Electronic Communications Privacy Act (CalECPA). This bill would bring long overdue reforms to how law enforcement searches our digital records by requiring a warrant to access our emails, locational information, documents, and other files.
This Labor Day weekend, EFF joins tens of thousands of sci-fi and fantasy fans at Dragon Con in Atlanta, Georgia. Our goal: educate and energize the fandoms about privacy, surveillance, and free speech.
In addition to an epic cosplay activism campaign, our team is sitting on almost a dozen panels covering issues such as domestic surveillance and government transparency. At our table at the Hilton, we’ll be able to give you with practical tips for protecting your privacy using EFF’s Surveillance Self-Defense Project, and help you understand what types of technology police are using in your community, with some help from the Street Level Surveillance Project .
It should be no surprise that libraries and bookstores—the places where you can go pick up a copy of 1984 or Darkness at Noon—are privacy hipsters. They’ve been fighting overbroad government surveillance since before it was cool. That’s why we’re proud to have filed an amicus brief on behalf of a coalition of associations of libraries and booksellers in Wikimedia v. NSA, a case challenging the government’s warrantless surveillance of the Internet backbone.
At long last, the U.S. Department of Justice (DOJ) has announced a slew of much-needed policy changes regarding the use of cell-site simulators. Most importantly, starting today all federal law enforcement agencies—and all state and local agencies working with the federal government—will be required to obtain a search warrant supported by probable cause before they are allowed to use cell-site simulators. EFF welcomes these policy changes as long overdue.
EFF has won a battle in its fight to get the government to disclose its policy for deciding whether to tell the public about critical flaws in software when it finds out about them. Last year, we filed suit under the Freedom of Information Act to obtain the so-called Vulnerabilities Equities Process (VEP). At first, the government told us the document was entirely classified, but just weeks before we were set to challenge those claims in court, it relented. We received the VEP late last night, right before the long weekend.
As we say goodbye to another summer of computer security conferences, we would like to take a moment to extend our thanks to the countless people who helped bolster civil liberties defense this year in Las Vegas. Organizers and attendees at Security BSides Las Vegas, Black Hat USA, DEF CON, and the kid-focused r00tz Asylum are all part of the ever-growing movement to defend digital freedom. As "hacking" loses some of its stigma, it serves us well to remember that at its core, hacking is about curiosity, problem-solving, and innovation. These key principles help ensure that technology can work in our favor and remains in our control.
The California Legislature wants the DMV to start issuing “Enhanced Driver Licenses” (EDL), similar to a REAL ID, that contain an RFID tag that could expose information about you from up to 30 feet away.
We need your help to bring S.B. 249 to a screeching halt by calling or emailing your state legislator today.
Trade negotiators have a saying—that nothing is agreed until everything is agreed. What that means is that despite all of the deals that has been struck in the Trans-Pacific Partnership (TPP) negotiations so far, they remain tentative until each country signs off on the final agreement. A consequence of this is that no matter how far advanced the parties are towards agreeing on repressive copyright rules, it is still not too late for them to turn back.
More than 120 cosplayers posed for privacy and free speech at EFF and Access Now's Project Secret Identity station at Dragon Con. Over the Labor Day weekend, we were visited by Scarecrow and "Weird Al," Marvel Zombies and self-designed Steampunk characters, and heroes and villains from anime and video games—all with a common interest in defending Internet freedom.
ProjectSecretIdentity.org has the full collection. Here are some of the cosplayers that we'll never forget:
Marvel Zombies
The 11th Doctor
Scarlet Witch
Grimlock
Earlier this summer, when FBI Director James Comey made his case for backdooring strong encryption, he told us that he wanted to hash out the policy considerations surrounding encryption, law enforcement, and security in public: “Democracies resolve such tensions through robust debate.” This week, we learned that Comey apparently actually meant that he wanted the debate resolved in secret, before a judge known only to the government, by way of a sealed wiretap order.
The Washington State Supreme Court delivered a disappointing decision last week, allowing a lawsuit to proceed against Backpage.com for the use of its classified ads service by sex traffickers. Three minor trafficking victims brought the suit against Backpage, alleging that the website played a "substantial role" in developing the content of the advertisements posted by the traffickers who abused them.
The working group at Internet Corporation for Assignment of Names and Number (ICANN) that has been tasked with designing a new domain registration database can’t seem to wrap its head around why privacy matters when it comes to domain registration services. ICANN’s Expert Working Group on gTLD Registration Directory Services (EWG) issued a Preliminary Issue Report on Next-Generation gTLD Registration Directory Services to Replace WHOIS in July, and EFF has submitted comments. Our bottom line is this:
The Attorney General’s Office of New Jersey is on a crusade to dismantle the important search and seizure protections afforded to the state’s citizens. As part of the latest assault on individual rights to due process, in State v. Lunsford, the attorney general has asked the New Jersey Supreme Court to overrule its landmark decision from 1982 in State v. Hunt that requires law enforcement to acquire a warrant to obtain an individual’s telephone billing records.
EFF welcomes our newest staff member Aaron Mackey to the team. Aaron joins us as a Frank Stanton Legal Fellow (along with current Stanton Fellow Jamie Williams), for a two-year fellowship sponsored by the Stanton Foundation. He and his family spent the last three years in Washington, D.C., where Aaron worked on speech, privacy, and freedom of information issues at the Reporters Committee for Freedom of the Press and the Institute for Public Representation at Georgetown Law. Aaron graduated from Boalt Hall in 2012, where he worked for EFF while a student in the Samuelson Law, Technology & Public Policy Clinic. Prior to law school, Aaron was a journalist at the Arizona Daily Star in Tucson, Arizona.
Yesterday, EFF filed a friend-of-the-court brief in the Court of Appeals for the Ninth Circuit, pushing back against a district court decision that expanded state law copyrights in pre-1972 sound recordings. This may sound familiar: we recently filed a similar brief in the Second Circuit. In both cases, a company called Flo & Eddie has convinced district courts that state copyright law restricts public performances of pre-1972 sound recordings, even though such a restriction has never before been recognized.
Disturbing displays of military and surveillance equipment being used by state and local police have become commonplace. So it’s not hard to imagine why Urban Shield, a four-day long “preparedness” exercise and equipment exhibition coordinated by the Alameda County Sheriff’s Department, was asked not to return to Oakland last year after community opposition.
But the Stop Urban Shield coalition wants more. They want the event cancelled entirely.
Update September 15, 2015: The Kilton Library board has met and, after hearing from Tor supporters in the community and the 4,314 people who signed our petition, have unanimously opted to reinstate the library's relay. Congratulations to the activists from the Tor Project and the Library Freedom Project who've worked on this effort.
Over the past month, trade officials have been frantically working to resolve outstanding disagreements over provisions in the Trans-Pacific Partnership (TPP) in the midst of speculation that the deal is in deep trouble. At this late stage of negotiations, the U.S. Trade Representative (USTR) has pretty much abandoned all remaining pretense of transparency in its consideration of these remaining policy issues. Since the failure to conclude the deal at the meeting in Hawaii over the summer, the USTR has held several closed-door meetings between high-level officials to finalize the agreement and it is under intensifying pressure to finish it off as soon as possible.
Popular Dating Site Has No Love for Strong Security
Back in 2012, EFF first called out OKCupid for failing to safeguard user data by not implementing HTTPS site-wide.
Three years later, OKCupid still hasn’t fixed the problem. For users who haven’t upgraded to paid accounts, their emails, chat sessions, searches, clicked links, pages viewed, and usernames are transmitted over the Internet in unencrypted plaintext, where they can be intercepted and read by anyone on the network.
This week EFF presented evidence in two of its NSA cases confirming the participation of Verizon Wireless, Sprint and AT&T in the NSA's mass telephone records collection under the Patriot Act. This is important because, despite broad public acknowledgement, the government is still claiming that it can dismiss our cases because it has never confirmed that anyone other than Verizon Business participated and that disclosing which providers assist the agency is a state secret. This argument was successful recently in convincing the D.C. Circuit to reverse and remand the case of Klayman v. Obama.
Trade secrets are seeing a resurgence of attention by policymakers at home and around the world. While there can be legitimate reasons to keep commercially valuable information secret, particularly amongst those with whom it has been shared in confidence, the latest trade secrets push goes further, potentially entangling whistleblowers and journalists.
In the United States, most States have adopted the Uniform Trade Secrets Act (UTSA), which codifies the offense of trade secret misappropriation as “acquisition of a trade secret of another by a person who knows or has reason to know that the trade secret was acquired by improper means”—whether or not that person was directly involved in that impropriety. This goes further than the laws of many other countries, which require the person who discloses a trade secret to have themselves behaved improperly in obtaining it.
On Wednesday, September 16, nine months into the 114th Congress, the Senate Judiciary Committee will hold a hearing on reforming the Electronic Communications Privacy Act (ECPA), the federal law that regulates government access to private communications records stored by third parties.
Right now, the statute allows the government to obtain private messages that are older than 180 days—including web-based emails, social media messages, text messages, and voicemails—as well as private documents stored by “cloud” service providers like Dropbox, with an administrative subpoena. ECPA was first passed in 1986 before Congress could imagine the wealth of personal information that would be stored on third-party servers rather than private hard drives.
Celebrating the First Certificate From Let’s Encrypt
Today we mark an important milestone in our march to encrypt all of the Web: the first-ever certificate issued by Let’s Encrypt.
Let’s Encrypt is a free, automated, open-source certificate authority (CA). The goal is to revolutionize encryption on websites, making HTTPS implementation a seamless, no-cost option for anyone with a domain. Forget about hours (or sometimes days) of muddling through complicated programming to set up encryption on a website, or yearly fees. Let’s Encrypt puts security in the hands of website owners.
Are you a computer scientist? A network engineer? Have you developed a new web-based protocol? If so, we want you to sign on to a statement [PDF] explaining to the DC Circuit Court that openness and neutrality are fundamental to how the Internet was designed and how it operates today.
Back in March the FCC released an Order that would prevent broadband ISPs from blocking, throttling, or interfering with their retail customers’ traffic based on the content or type of the traffic—in other words, to make sure ISPs adhere to net neutrality principles.
A federal appeals court sided with EFF yesterday on several of the major questions at issue in the long-running Lenz v. Universal copyright case. Lenz—sometimes referred to as the “Dancing Baby” case because it centers on a 29-second home video of a toddler dancing with a song by the musician Prince in the background—has long been recognized as a test of the rights enjoyed by users, and the obligations facing people who want to take down online speech.
EFF has been selected to receive a portion of CREDO's revenue in September and you can boost the amount that we receive by voting for us!

Until September 30, CREDO customers and action members can visit CREDO's ballot website and vote for EFF using their member email address. If you're not a CREDO member, you can still vote by signing up and taking one of CREDO's progressive action petitions. (CREDO Privacy Policy)
Next week the Department of Justice will likely decide whether to issue a grant to the Los Angeles Police Department to purchase 700 body-worn video cameras. Because LAPD’s body camera policy fails to ensure accountability and transparency and would, in fact, hide almost all camera footage from the public, we are urging the DOJ to deny funding.
Join us at the 24th annual Pioneer Awards to celebrate those who fight to clear the way for online freedom!
Next Thursday, we'll gather in San Francisco to proudly honor this year's winners: late international privacy expert Caspar Bowden, global human rights and security researchers The Citizen Lab, international internet access champions Anriette Esterhuysen and the Association for Progressive Communications, and digital community advocate Kathy Sierra. Learn more about the exciting accomplishments of the 2015 honorees at eff.org/pioneer.
It made me feel like I wasn’t human. It made me feel like a criminal.
Those are the words of 14-year-old Ahmed Mohamed, a smart young student who is also Muslim, and who was arrested just for bringing a home made clock to school to show to his teachers.
EFF has said before, and we will say it again: innovation is not a crime. Perhaps we need to clarify that for anyone who wants to follow the example of Irving, Texas: innovation is not a crime—no matter what your religion or skin color. And it’s not a crime just because law enforcement or even teachers don’t understand technology.
Today, the Court of Appeals for the Eleventh Circuit issued an opinion blocking the use of copyright to censor unwanted online criticism. The decision, Katz v. Chevaldina, is important because although copyright law is frequently misused as a tool to censor speech, it rarely makes it into court to be challenged. And here, the court stopped the plaintiff in his tracks.
Today, the Court of Appeals for the Federal Circuit issued its opinion in SCA Hygiene v. First Quality Baby Products, a case about adult diapers that had the potential to harm myriad small business owners and innovators.
Yesterday, Personal Audio, LLC filed a notice of appeal of the final decision of the Patent Trial and Appeal Board that invalidated all of the claims of the infamous “Podcasting Patent” that EFF challenged.
Personal Audio has an uphill battle: the Patent Office accepted virtually none of Personal Audio’s arguments and rejected their patent based on two different pieces of prior art. In order for Personal Audio to win, they’ll have to show that the Patent Office was wrong on both grounds.
EFF has long believed that the First Amendment is as important to thinking about the NSA's spying as the Fourth Amendment. When the government can track to whom you talk, when and for how long, like it did with the telephone records collection under section 215 of the Patriot Act, it knows with whom you associate. When it tracks who talks to politically active organizations, it scares people out of participating in the political and social issues of the day.
So what's the status of our flagship case raising those First Amendment concerns, First Unitarian Church of Los Angeles v. NSA? How does the passage of the USA Freedom Act change what could happen to that case? We thought it was time for a short update.
Refresher on the First Unitarian Church Case
In the last few years, FBI has been dramatically expanding its biometrics programs, whether by adding face recognition to its vast Next Generation Identification (NGI) database or pushing out mobile biometrics capabilities for “time-critical situations” through its Repository for Individuals of Special Concern (RISC). But two new developments—both introduced with next to no media attention—will impact far more every-day Americans than anything the FBI has done on biometrics in the past. Read about the first development below and the second here.
FBI Combines Civil and Criminal Fingerprints into One Fully Searchable Database
In the last few years, the FBI has been dramatically expanding its biometrics programs, whether by adding face recognition to its vast Next Generation Identification (NGI) database or pushing out mobile biometrics capabilities for “time-critical situations” through its Repository for Individuals of Special Concern (RISC). But two new developments—both introduced with next to no media attention—will impact far more ordinary Americans than anything the FBI has done on biometrics in the past. Read about the second development below and the first here.
FBI Plans to Populate its Massive Face Recognition Database with Photographs Taken in the Field
As we anticipated, the Senate Judiciary Committee's recent hearing on reforming the Electronic Communications Privacy Act focused on creating a loophole for civil law enforcement agencies like the Securities and Exchange Commission (SEC) to access personal content stored by third-party service providers without a warrant, rather than on the need to raise the standard for government access to email and other stored content across the board.
Academic researchers by necessity spend a lot of their time thinking about how to minimize harm in the conduct of their research. Prompted by the dark history of abuses in human subjects research, research ethics have become a deeply ingrained part of methods training and institutional review.
But what it means to minimize harm may be evolving in the digital age, as researchers encounter threats from an increasing number of sources. There is no easy solution to conducting research ethically in an environment of mass surveillance—but there are practices that researchers can adopt to ensure they are doing the best they can to protect their data and keep participants well informed of the evolving landscape of risks.
Copyright restricts all kinds of important, everyday uses of creative works—even worse, these strict rules last nearly two lifetimes for any given work. We are fighting to reform and push back against these restrictions in the secret Trans-Pacific Partnership (TPP), especially those that undermine the public's ability to use, research, remix, or otherwise modify digital content and devices. And one of the most critical issues in this trade deal is whether it strongly upholds and protects exceptions and limitations to copyright. As the Executive Director of Australian Digital Alliance, Jessica Coates, aptly puts it, "They are what allow teachers to use resources in the classroom, technology companies to create new services, and individuals to interact with copyright material without risking criminal liability."
On Friday, Google reported on its online security blog the faulty issuance of a certificate for google.com and www.google.com by Symantec, a prominent Certificate Authority. This misissuance is significant not only because it represents a breach in the core Internet trust mechanism; it was also the first of its kind with regards to the type of certificate issued (Extended Validation) as well as the mechanism by which the certificate was discovered (Certificate Transparency).
Automakers argue that it’s unlawful for independent researchers to look at the code that controls vehicles without the manufacturer’s permission. We’ve explained before how this allows manufacturers to prevent competition in the markets for add-on technologies and repair tools. It also makes it harder for watchdogs to find safety or security issues, such as faulty code that can lead to unintended acceleration or vulnerabilities that let an attacker take over your car.
Courts have long recognized that the First Amendment protects parodies, and last Friday, EFF filed a “friend of the court” brief urging a state court of appeals in Michigan to apply the same protections to parodies posted on Twitter as to parodies everywhere else. The plaintiff in this case, Levitt v. Felton, argued that Twitter should be treated differently. But as we explained in our amicus brief, there's simply no reason to treat Twitter differently.
EFF is working with the Center for Civic Media at MIT to organize the Freedom to Innovate Summit (F2i) at the MIT Media Lab in Cambridge, Massachusetts on October 10 and 11. The conference will bring together student innovators and researchers to discuss how to defend student tinkerers.
This gathering comes at a crucial time, as innovators confront mounting threats from copyright holders under a regime that often marginalizes fair use, as well as opportunistically aggressive government agencies and prosecutors.
On the one hand, students are encouraged to tinker: recent years have seen technology companies actively aiming to 'move fast and break things,' while security conferences like DEFCON and the Chaos Computer Congress have grown to record sizes. It should come as no surprise that high school students, college undergrads, and graduate researchers are tinkering with the software and hardware electronics that they use.
Last month South Africa released its draft Cybercrimes and Cybersecurity Bill for public comment; the latest in a wave of such laws that has been sweeping the continent and beyond. EFF is currently reviewing the Bill with a view to sending a submission by the deadline of November 30, and we'll have more to say about it before then. But there is one provision that deserves immediate comment: a clause that would criminalize essentially any infringement of copyright. This provision is oddly timed, given that South Africa is also separately considering amendments to its Copyright Act. But it's more than just the timing that's odd.
Yesterday, EFF and the ACLU filed a friend-of-the-court brief (press release) defending the Federal Communications Commission’s net neutrality rules in the federal Court of Appeals for the District of Columbia. Along with our legal arguments, we submitted a statement signed by dozens of engineers familiar with Internet infrastructure. Signers include current and former members of the Internet Engineering Task Force and Internet Corporation for Assigned Names and Numbers' committees, professors, CTOs, network security engineers, Internet architects, systems administrators and network engineers, and even a founder of the company that registered the first ".com" domain.
Update: Gov. Brown signed S.B. 178 on October 8, 2015. This open letter was crossposted to Medium.
Dear Gov. Brown,
Electronics, computers, satellites, biotechnology, robotics – these are no longer dreams. They are the driving imperative that is restructuring the world economy. These new technologies are fundamentally changing our communications, agriculture, environment, schooling, financial institutions, family life and our national security.
California is now the leader in these technologies, but we will not remain so unless we mobilize the political will and individual responsibility to act.
"Cyber-bullying" and other forms of online harassment are a serious problem. But as we have explained in the past, it is a challenge to craft laws or policies that address the harms caused by online harassment without unduly restricting speech or invading people’s privacy. New York tried and failed. And North Carolina's anti-bullying statute also goes too far.
It’s now (probably) legal to publicly sing the world's most popular song, thanks to an opinion handed down yesterday by a federal judge in Los Angeles. After years of litigation, the court held that the lyrics1 of "Happy Birthday To You" are not restricted by Warner/Chappell's copyright, handing a solid victory to a group of filmmakers producing a documentary about the song, not to mention the general public.
Pages
Deeplinks Topics
- Fair Use and Intellectual Property: Defending the Balance
- Free Speech
- Innovation
- International
- Know Your Rights
- Privacy
- Trade Agreements and Digital Rights
- Security
- State-Sponsored Malware
- Abortion Reporting
- Analog Hole
- Anonymity
- Anti-Counterfeiting Trade Agreement
- Biometrics
- Bloggers' Rights
- Broadcast Flag
- Broadcasting Treaty
- CALEA
- Cell Tracking
- Coders' Rights Project
- Computer Fraud And Abuse Act Reform
- Content Blocking
- Copyright Trolls
- Council of Europe
- Cyber Security Legislation
- CyberSLAPP
- Defend Your Right to Repair!
- Development Agenda
- Digital Books
- Digital Radio
- Digital Video
- DMCA
- DMCA Rulemaking
- Do Not Track
- DRM
- E-Voting Rights
- EFF Europe
- Encrypting the Web
- Export Controls
- FAQs for Lodsys Targets
- File Sharing
- Fixing Copyright? The 2013-2016 Copyright Review Process
- FTAA
- Genetic Information Privacy
- Hollywood v. DVD
- How Patents Hinder Innovation (Graphic)
- ICANN
- International Privacy Standards
- Internet Governance Forum
- Law Enforcement Access
- Legislative Solutions for Patent Reform
- Locational Privacy
- Mandatory Data Retention
- Mandatory National IDs and Biometric Databases
- Mass Surveillance Technologies
- Medical Privacy
- National Security and Medical Information
- National Security Letters
- Net Neutrality
- No Downtime for Free Speech
- NSA Spying
- OECD
- Offline : Imprisoned Bloggers and Technologists
- Online Behavioral Tracking
- Open Access
- Open Wireless
- Patent Busting Project
- Patent Trolls
- Patents
- PATRIOT Act
- Pen Trap
- Policy Analysis
- Printers
- Public Health Reporting and Hospital Discharge Data
- Reading Accessibility
- Real ID
- RFID
- Search Engines
- Search Incident to Arrest
- Section 230 of the Communications Decency Act
- Social Networks
- SOPA/PIPA: Internet Blacklist Legislation
- Student and Community Organizing
- Student Privacy
- Stupid Patent of the Month
- Surveillance and Human Rights
- Surveillance Drones
- Terms Of (Ab)Use
- Test Your ISP
- The "Six Strikes" Copyright Surveillance Machine
- The Global Network Initiative
- The Law and Medical Privacy
- TPP's Copyright Trap
- Trans-Pacific Partnership Agreement
- Travel Screening
- TRIPS
- Trusted Computing
- Video Games
- Wikileaks
- WIPO
- Transparency
- Uncategorized