• Tag Archives EFF
  • Copyright Shouldn’t Hold Technology Back

    The FCC is about to make a decision about whether third-party companies can market their own alternatives to the set-top boxes provided by cable companies. Under the proposed rules, instead of using the box from Comcast, you could buy your own from a variety of different manufacturers. It could even have features that Comcast wouldn’t dream of, like letting you sync your favorite shows onto your mobile phone or search across multiple free TV, pay TV, and amateur video sites.

    We’ve been closely following the “Unlock the Box” proposal since it was first introduced in February, but its history goes back much further. Congress first authorized the FCC to enact rules bringing competition to the set-top box market 20 years ago, as a part of the Telecommunications Act of 1996. We’re so close to finally unlocking the box, but pay TV providers and big content companies have been throwing out every distracting argument they can to stop it.

    This week, the FCC commissioners will testify before the Senate Commerce Committee. This might be our last chance. Let’s use this opportunity to send the commissioners a clear message: consumers should drive the set-top box market, not media conglomerates.

    When people have talked about Unlock the Box, it’s mainly been about how the rule would stimulate competition. It’s a basic principle of economics that when companies have to compete for your money, the product improves. That’s why we have antitrust laws preventing companies from maintaining a monopoly through unfair means. If your cable company has to compete with other set-top box manufacturers, then they’ll have to create a better product.

    This isn’t just about healthy competition, though. It’s about much more. It’s about how much control we give big content owners over our technology. It’s about whether media giants can use copyright to hold our tech back.

    Just as they did thirty years ago in the fight over VCRs, media conglomerates are trying to dominate the discussion. Cable companies and big movie and television studios have been arguing that the FCC’s proposal takes too much power out of the hands of content companies. Implicit in their argument is the assertion that copyright should let them control how, where, and when you watch TV, and what hardware you use to do it.

    That’s not how copyright works, and it’s easy to see why. Imagine if a cable network tried to require that viewers watch its programs on a 42-inch television, or if a book publisher made you sign an agreement that you can only use a certain brand of light bulb to see its books. By design, copyright grants rights holders a specific and limited set of rights to their works—it does not give them the right to attach unlimited strings to others’ use of those works.

    The fight over set-top boxes isn’t just about stimulating competition to bring higher quality products to market (as important as that is)—it’s about your basic rights as a consumer. It’s crucial that we send the message to the FCC commissioners: copyright doesn’t let content companies unfairly control technology.

    Source: Copyright Shouldn’t Hold Technology Back | Electronic Frontier Foundation


  • Word Games: What the NSA Means by “Targeted” Surveillance Under Section 702

    We all know that the NSA uses word games to hide and downplay its activities. Words like “collect,” “conversations,” “communications,” and even “surveillance” have suffered tortured definitions that create confusion rather than clarity.

    There’s another one to watch: “targeted” v. “mass” surveillance.

    Since 2008, the NSA has seized tens of billions of Internet communications. It uses the Upstream and PRISM programs—which the government claims are authorized under Section 702 of the FISA Amendments Act—to collect hundreds of millions of those communications each year. The scope is breathtaking, including the ongoing seizure and searching of communications flowing through key Internet backbone junctures,[1] the searching of communications held by service providers like Google and Facebook, and, according to the government’s own investigators, the retention of significantly more than 250 million Internet communications per year.[2]

    Yet somehow, the NSA and its defenders still try to pass 702 surveillance off as “targeted surveillance,” asserting that it is incorrect when EFF and many others call it “mass surveillance.”

    Our answer: if “mass surveillance” includes the collection of the content of hundreds of millions of communications annually and the real-time search of billions more, then the PRISM and Upstream programs under Section 702 fully satisfy that definition.

    This word game is important because Section 702 is set to expire in December 2017. EFF and our colleagues who banded together to stop the Section 215 telephone records surveillance are gathering our strength for this next step in reining in the NSA. At the same time, the government spin doctors are trying to avoid careful examination by convincing Congress and the American people that this is just “targeted” surveillance and doesn’t impact innocent people.

    Section 702 Surveillance: PRISM and Upstream

    PRISM and Upstream surveillance are two types of surveillance that the government admits that it conducts under Section 702 of the FISA Amendments Act, passed in 2008. Each kind of surveillance gives the U.S. government access to vast quantities of Internet communications.[3]

    Upstream gives the NSA access to communications flowing through the fiber-optic Internet backbone cables within the United States.[4] This happens because the NSA, with the help of telecommunications companies like AT&T, makes wholesale copies of the communications streams passing through certain fiber-optic backbone cables. Upstream is at issue in EFF’s Jewel v. NSA case.

    PRISM gives the government access to communications in the possession of third-party Internet service providers, such as Google, Yahoo, or Facebook. Less is known about how PRISM actually works, something Congress should shine some light on between now and December 2017.[5]

    Note that those two programs existed prior to 2008—they were just done under a shifting set of legal theories and authorities.[6] EFF has had evidence of the Upstream program from whistleblower Mark Klein since 2006, and we have been suing to stop it ever since.

    Why PRISM and Upstream are “Mass,” Not “Targeted,” Surveillance

    Despite government claims to the contrary, here’s why PRISM and Upstream are “mass surveillance”:

              (1) Breadth of acquisition:  First, the scope of collection under both PRISM and Upstream surveillance is exceedingly broad. The NSA acquires hundreds of millions, if not billions, of communications under these programs annually.[7] Although, in the U.S. government’s view, the programs are nominally “targeted,” that targeting sweeps so broadly that the communications of innocent third parties are inevitably and intentionally vacuumed up in the process. For example, a review of a “large cache of intercepted conversations” provided by Edward Snowden and analyzed by the Washington Post revealed that 9 out of 10 account holders “were not the intended surveillance targets but were caught in a net the agency had cast for somebody else.”[8] The material reviewed by the Post consisted of 160,000 intercepted e-mail and instant message conversations, 7,900 documents (including “medical records sent from one family member to another, resumes from job hunters and academic transcripts of schoolchildren”), and more than 5,000 private photos.[9] In all, the cache revealed the “daily lives of more than 10,000 account holders who were not targeted [but were] catalogued and recorded nevertheless.”[10] The Post estimated that, at the U.S. government’s annual rate of “targeting,” collection under Section 702 would encompass more than 900,000 user accounts annually. By any definition, this is “mass surveillance.”

              (2) Indiscriminate full-content searching.  Second, in the course of accomplishing its so-called “targeted” Upstream surveillance, the U.S. government, in part through its agent AT&T, indiscriminately searches the contents of billions of Internet communications as they flow through the nation’s domestic, fiber-optic Internet backbone. This type of surveillance, known as “about surveillance,” involves the NSA’s retention of communications that are neither to nor from a target of surveillance; rather, it authorizes the NSA to obtain any communications “about” the target.[11] Even if the acquisition of communications containing information “about” a surveillance target could, somehow, still be considered “targeted,” themethod for accomplishing that surveillance cannot be: “about” surveillance entails a content search of all, or substantially all, international Internet communications transiting the United States.[12]  Again, by any definition, Upstream surveillance is “mass surveillance.”  For PRISM, while less is known, it seems the government is able to search through—or require the companies like Google and Facebook to search through—all the customer data stored by the corporations for communications to or from its targets.

    Seizure: Fourth Amendment and the Wiretap Act

    To accomplish Upstream surveillance, the NSA copies (or has its agents like AT&T copy) Internet traffic as it flows through the fiber-optic backbone. This copying, even if the messages are only retained briefly, matters under the law. Under U.S. constitutional law, when the federal government “meaningfully interferes” with an individual’s protected communications, those communications have been “seized” for purposes of the U.S. Constitution’s Fourth Amendment. Thus, when the U.S. government copies (or has copied) communications wholesale and diverts them for searching, it has “seized” those communications under the Fourth Amendment.

    Similarly, U.S. wiretapping law triggers a wiretap at the point of “interception by a device,” which occurs when the Upstream mechanisms gain access to our communications.[13]

    Why does the government insist that it’s targeted?  For Upstream, it may be because the initial collection and searching of the communications—done by service providers like AT&T on the government’s behalf—is really, really fast and much of the information initially collected is then quickly disposed of. In this way the Upstream collection is unlike the telephone records collection where the NSA kept all of the records it seized for years. Yet this difference should not change the conclusion that the surveillance is “mass surveillance.” First, all communications flowing through the collection points upstream are seized and searched, including content and metadata. Second, as noted above, the amount of information retained—over 250 million Internet communications per year—is astonishing.

    Thus, regardless of the time spent, the seizure and search are comprehensive and invasive. Using advanced computers, the NSA and its agents can do a full-text, content search within a blink of an eye through billions, if not trillions of your communications, including emails, social media, and web searches. Second, as demonstrated above, the government retains a huge amount of the communications—far more about innocent people than about its targets—so even based on what is retained the surveillance is better described as “mass” rather than “targeted.”

    Yes, it is Mass Surveillance

    So it is completely correct to characterize Section 702 as mass surveillance. It stems from the confluence of: (1) the method NSA employs to accomplish its surveillance, particularly Upstream, and (2) the breadth of that surveillance.

    Next time you see the government or its supporters claim that PRISM and Upstream are “targeted” surveillance programs, you’ll know better.

    Source: Word Games: What the NSA Means by “Targeted” Surveillance Under Section 702 | Electronic Frontier Foundation


  • House Leaders Politicize a Tragedy to Block Bipartisan Surveillance Reforms

    After hurdling procedural barriers, a congressional attempt to protect privacy and encryption failed on the House floor yesterday, falling short of a majority by a mere 24 votes.

    Two years ago, the House stood united across party lines, voting by a remarkable margin of 293–123 to support the same measures, which would enhance security and privacy by limiting the powers of intelligence agencies to conduct warrantless backdoor searches targeting Americans, and to undermine encryption standards and devices.

    This week, the intelligence community broke that consensus by inappropriately politicizing the recent tragedy in Orlando. Before Thursday’s vote, the chair of the House Intelligence Committee, Rep. Devin Nunes (R-CA), circulated a letter falsely claiming that:

    If this amendment were enacted, the Intelligence Community would not be able to look through information lawfully collected under FISA Section 702 to see if…the Orlando nightclub attacker was in contact with any terrorist groups outside the United States.

    These claims were downright disingenuous.

    As members of the intelligence committee well know, the government will have no problem securing warrants to search the Orlando attacker’s online communications. Warrants are not difficult to secure when appropriate. The only thing a warrant requirement would do is prevent the government from abusing its powers, as it repeatedly has in the past.

    The clever misrepresentations about the proposed amendment, and unproven and ultimately spurious claims that it would undermine national security, prompted efforts to correct the debate and inform policymakers of the truth, leading dozens of members of Congress to switch sides in both directions. Ultimately, the House chose to reverse two previous votes overwhelmingly supporting precisely the same amendment.

    We are greatly disappointed that the House chose to abandon its prior votes defending the rights of constituents, and particularly in those members who accepted the canard that simply requiring the government to obtain a judicial warrant before searching Section 702 intelligence databases would hinder investigations.

    Observers who share our concerns have opportunities to impact the debate going forward. First, contact your federal representative to share your views, especially if yours was one of the dozens who shifted their position.

    But don’t stop there: August will present a key point in time when—visiting their districts just a few months before an election with likely high turnout driven by a presidential election cycle—members of Congress will be at their most politically vulnerable, exposed, and therefore receptive to grassroots concerns.

    If you’d like to take advantage of the opportunity to share your views with your representatives in a forum more influential than a phone call, confirm how your representative voted, recruit a handful of friends to form a local group, and join the Electronic Frontier Alliance.

    Source: House Leaders Politicize a Tragedy to Block Bipartisan Surveillance Reforms | Electronic Frontier Foundation