Tag Archive for Constitution

How the RESTRICT Act Will Ruin Your Online Privacy

How the RESTRICT Act Will Ruin Your Online PrivacyThe RESTRICT Act is better known as the “TikTok ban.” It is a bill where politicians are using national security rhetoric to enact sweeping legislation. The RESTRICT Act was introduced by Senators Mark Warner (D) and John Thune (R) in March 2023. RESTRICT stands for Restricting the Emergence of Security Threats that Risk Information and Communications Technology Act of 2023. The TikTok ban would give the President the ability to criminalize entire communications platforms, they oppose. The act will allow the executive branch to control what apps and technologies Americans have access to without a way to challenge those actions in court.

prohibit transactionsThe bill authorizes the President through the Secretary of Commerce to prohibit transactions involving information and communications technology (ICT) products and services in which any foreign adversary has any interest. The bill requires the Commerce Department to maintain a list of foreign entities that pose a risk to the U.S. ICT supply chain. The bill classifies China (including Hong Kong and Macau), Cuba, Iran, Russia, and Venezuela as foreign adversaries.

The RESTRICT Act

Under the RESTRICT Act, the President could criminalize the entire communications platform he or she opposes. The Commerce Department will have broad powers. The bill authorizes them to, “deter, disrupt, prevent, investigate, and mitigate transactions” involving social media they do not like. It is not unreasonable to anticipate that the next Republican President would use the act. They could shut down any platform that contains information on Reproductive Rights, Black Lives Matter, Supreme Court ethics, Criminal trials, Disney, or the outrage du jour.

The “TikTok ban” is bad for America for a number of reasons. There are technical and Constitutional problems with the bill. The biggest technical threat is banning VPNs. Banning VPNs has long been a goal of the FBI as part of their “going dark” fear-mongering.

VPN’s

A Virtual Private Network (VPN) is a service that encrypts and routes your internet traffic through a server in another location. A VPN encrypts your communications to protect your data. VPNs make it appear as if you are accessing the web from the VPN server’s location. This legislation could outlaw the use of VPNs. The bill would give the Department of Commerce broad power to impose “mitigation measures” on technology products. The bill could criminalize the use of VPNs, or even ban VPNs altogether. The bill’s vague language leaves room for interpretation and uncertainty.

First Amendment

First AmendmentExperts agree the legislation would violate our First Amendment rights of the Constitution without actually protecting American consumers. The TikTok ban is a violation of the First Amendment because it infringes on the right of millions of Americans to express themselves and access information on a popular social media platform. The ban is also overbroad and disproportionate, as it would effectively censor all social media content, regardless of its source or nature. The ban would set a dangerous precedent for government interference with free speech online and would undermine the values of democracy and openness that the First Amendment is meant to protect.

Fourth Amendment

Fourth AmendmentThe TikTok ban is a violation of the Fourth Amendment of the Constitution. The 4th Amendment protects the right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures. The RESTRICT Act allows the government to access and delete the personal data of millions of social media users without their consent, probable cause, or a warrant. This would infringe on their privacy and freedom of expression. The ban would also harm the creators and businesses that rely on social media as a source of income and exposure. The ban is not justified by any compelling national security interest, but rather by political motives and unfounded allegations.

RESTRICT Act Punishes Americans

civil and criminal penaltiesAmericans who violate The RESTRICT Act could end up with civil and criminal penalties. The bill would impose civil and criminal penalties for violations of any order or mitigation measure issued. The civil penalties include fines up to $250,000 or twice the value of the transaction that served as the basis of the order, whichever is greater. The criminal penalties of up to $1 million and up to 20 years imprisonment.

rb-

There are legitimate data privacy concerns about all social media platforms, including but not limited to TikTok. The EFF points out that all social media firms harvest and monetize our personal data and incentivize other online businesses to do the same. Nearly all social media platforms and other online businesses collect a lot of personal data from their users. The result is that detailed information about us is widely available to purchasers, thieves, and government subpoenas.

Consider location data brokers, for example. Our phone apps collect detailed records of our physical movements, without our knowledge or genuine consent. The app developers sell it to data brokers, who in turn sell it to anyone who will pay for it. An election denier bought it to try to prove voting fraud. One broker sold data on who had visited reproductive health facilities.

If China wanted to buy this data, it could probably find a way to do so. Banning TikTok from operating in the U.S. probably would not stop China from acquiring the location data of people here. The better approach is to limit how all businesses in the U.S. collect personal data. This would reduce the supply of data that any adversary might obtain.

President Biden has already said he would sign off on the RESTRICT Act if it lands on his desk,

Everybody should be allowed to make informed choices based on their own values and preferences.

 

How you can help Ukraine!

Related article

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Independence Day 2016

Independence Day is the time when Americans celebrate freedom from a tyrannical government in the 18th century. While gaining that freedom, the founding fathers used encryption. They used encryption while risking their lives to gain the freedom we celebrate on July 4th. The EFF documents how many of the Founding Fathers of the United States used encryption to secure our freedoms.

  • Thomas Jefferson Thomas Jefferson invented an encryption devicewas the principal author of the Declaration of Independence and the country’s third president. He is known to be one of the most prolific users of secret communications methods. He even invented his own cipher system—the “wheel cipher”  or the “Jefferson disk” as it is now commonly referred to. Mr. Jefferson also presented a special cipher to Meriwether Lewis for use in the Lewis and Clark Expedition.
  • George Washington was the first president of the United States. He frequently dealt with encryption and espionage issues as the commander of the Continental Army. He gave his intelligence officers detailed instructions on methods for maintaining the secrecy and for using decryption to uncover British spies.
  • John Adams was the second U.S. president. He used a cipher provided by James Lovell—a member of the Continental Congress Committee on Foreign Affairs. He was an early advocate of cipher systems—for correspondence with his wife, Abigail Adams while traveling.
  • James Madison was the author of the Bill of Rights and the country’s fourth president. He was a big user of enciphered communications. Numerous examples from his correspondence prove that. The text of one letter from Madison to Joseph Jones, a member of the Continental Congress from Virginia, dated May 2, 1782, was almost completely encrypted via cipher. And on May 27, 1789, Madison sent a partially encrypted letter to Thomas Jefferson describing his plan to introduce a Bill of Rights.

TechDirt correctly concludes that If encryption was good enough for the Founding Fathers to use in the 18th Century … it’s pretty ridiculous that we’re still having this debate now in this age of constant government monitoring, warrantless searches, corporate data aggregationdata sharing, and tools like IBM’s Non-Obvious Relationship Awareness software (NORA). The time is now to fight shortsighted “going dark” claims by the FBI and efforts by clueless politicians like Sen. Dianne Feinstein (D-CA) who have plans to ban encryption.

rb-

Seems to me that the biggest threat to America this Independence Day is the political ambitions of technically illiterate know-nothings in the gooberment. Be like the Founding Fathers and encrypt something start with HTTPS Anywhere from the EFF.

 

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Michigan Cell-Phone Spying Legislation Stalled

Michigan Cell-Phone Spying Legislation StalledA warrantless cell-phone spying bill recently introduced in the Michigan House has stalled – for now. MLive is reporting that House Bill 4006 has been pulled from the legislative agenda a second time. The bill would require cell phone companies to disclose call location information when requested by a law enforcement officer. The bill would grant legal immunity to cell phone companies for making the disclosures.

Michigan Cell-Phone Spying Legislation StalledIn a flash of rationality, Gideon D’Assandro, a spokesperson for the Republican majority, said new questions about jurisdiction and proposed immunity for wireless providers have popped up. D’Assandro told MLive,… There are still questions.

The legislation, sponsored by Republican Rep. Kurt Heise of Plymouth Township, has prompted push back from some conservative lawmakers and other privacy proponents in the state Legislature after advancing out of committee. “It’s been a heated discussion, a passionate discussion, just about the civil liberty issues that are all wrapped up in this,” said Rep. Cindy Gamrat, R-Plainwell. “My concern is … we’re setting precedent authorizing government to access our technology devices, such as phones or computers or GPS in cars. Where do you end up drawing the line?

Cell-phone spyingState Rep. Todd Courser, R-Lapeer, said he understands the value that location information could provide in some emergencies. However, made clear this week that he could not vote for the bill in its current form. He told MLive, “I think we also need to make sure we’re giving people the constitutional protections that are supposed to be afforded by our founding fathers.

In typical goobermental double-speak, Republican Heise told MLive that allowing warrantless access to private citizens’ phones could actually strengthen civil liberty protections. Heise told MLive said he does not necessarily think that a 48-hour notification for cell phone owners is warranted.

SpyOf course, law enforcement groups and Verizon Communications indicated support for the proposal. Of course they do, they get even more access to citizens’ private information. MLive states that as now written, the snooping does not require a warrant. All a police officer needs to access a private citizen’s phone records, is to have a note signed by a supervisor.

rb-

Well, maybe they don’t need to bother with any legislation to spy on us. Recent reports are that the goobermint has new ways to collect our personal data without a warrant. Stingray? FBI Spy planes? So much for the Constitution.

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Time to Review Corporate Computer Policies

Time to Review Corporate Computer Policies The National Law Journal is reporting that three recent court decisions make it important for companies to begin a thorough review of their computer policies. The National Law Journal suggests firms focus on two issues: ensuring that employees have no expectation of privacy in using the company computer systems and delineating the scope of the employee’s permissible access to the company computers. The article by Nick Akerman, a partner in the New York office of Dorsey & Whitney who specializes in trade secrets and computer data discusses three recent decisions and their implications for creating effective corporate computer policies that protect the company against the theft of its data.

Mr. Ackerman says two recent decisions, Quon v. Arch Wireless Operating Co. Inc. and Stengart v. Loving Care Agency Inc., affect a company’s ability to gather evidence from its own computers. The article states both cases found company computer policies insufficient to defeat the employee’s expectation of privacy in using the company computers for personal reasons. Whether an employee has an expectation of privacy on the company computers can become a critical issue when an employee is suspected to have stolen corporate data.

review of text messagesIn Quon, (which I wrote about here) the 9th U.S. Circuit Court of Appeals held that a review of text messages on pagers provided to municipal police officers violated the Fourth Amendment as an unreasonable search. The article explains that although the city had no express policy “directed to text messaging by use of the pagers,” it did have a general “Computer Usage, Internet and E-mail Policy” applicable to all employees that limited the “use of City-owned computers and all associated equipment, software, programs, networks, Internet, e-mail and other systems operating on these computer” to city business.  This policy was acknowledged in writing by each city employee, and it was announced orally that this policy applied to pagers according to the National Law Journal.

The article goes on to state that the 9th Circuit affirmed the district court’s finding that Quon had a reasonable expectation of privacy with respect to the text messages because the policy did not reflect the “operational reality” at the police department where the staff was told that the department “would not audit their pagers so long as they agreed to pay for any overages” that exceeded a “25,000 character limit.” Consistent with that informal policy, Quon had exceeded that limit “‘three or four times and had paid for the overages every time without anyone reviewing the text of the messages,” demonstrating that the police department “followed its ‘informal policy’ and that Quon reasonably relied on it” the author states.

YahooIn Stengart, Mr. Ackerman argues the issue of the computer policies arose in the context of the attorney-client privilege. Marina Stengart used her employer’s laptop computer to communicate with her attorney about an anticipated lawsuit against her employer “through her personal, web-based, password-protected Yahoo email account.” After Stengart filed a discrimination suit, her then-ex-employer found many e-mails on the company computer between Stengart and her attorney. The employer’s computer policy was nearly identical to the policy addressed in Quon with one significant exception. Unlike the written policy in Quon, which limited the use of the computers to the employer’s business, the policy in Stengart provided that “[o]ccasional personal use is permitted.”

The court found two specific “ambiguities” with the computer policy that “cast doubt over the legitimacy of the company’s attempt to seize and retain personal e-mails sent through the company’s computer via the employee’s personal email account.” First, the “policy neither defines nor suggests what is meant by ‘the company’s media systems and services,’ nor do those words alone convey a clear and unambiguous understanding about their scope.” Second, the court found that one could reasonably conclude “that not all personal emails are necessarily company property because the policy expressly recognizes that occasional personal use is permitted.” Given these ambiguities, Stengart could have assumed her e-mails with her attorney would be confidential.

The National Law Journal article says the third decision relates to a company’s ability to use evidence found on its own computers to bring a viable court action against the disloyal employee under the federal Computer Fraud and Abuse Act to retrieve the stolen data and prevent its dissemination in the marketplace. The CFAA, provides a civil remedy for a company that “suffers damage or loss” by reason of a violation of the CFAA. A critical element in proving most CFAA claims is that the violator accessed the computer “without authorization” or “exceeding authorized access.”

The last case, LVRC Holdings LLC v. Brekka, Mr. Ackerman argues has made it more important than ever for corporate computer policies to address what is not permissible access to the company computer system. He reports that Brekka puts into question the concept that an employee’s authorization to access the company computers is predicated on his agency relationship with his employer such that when an employee violates his duty of loyalty by stealing his employer’s data, his authorization to access the company computers terminates. Brekka refused to apply the CFAA to a theft of employer data, holding that employees cannot act “without authorization” because their employer gave them “permission to use” the company computer.

Although this division in the circuit courts will ultimately have to be resolved by the U.S. Supreme Court, the article says that from an employer’s standpoint it is important to emphasize that the agency relationship with the employee is not the only way to prove that an employee’s access to the company computer was unauthorized or exceeded authorization. Employers can proactively establish the predicate for unauthorized access by promulgating the rules of access through company policies. The “CFAA … is primarily a statute imposing limits on access and enhancing control by information providers.. Thus, a company “can easily spell out explicitly what is forbidden” through several methods including an employee handbook explains the National Law Journal article.

Mr. Ackerman concludes by suggesting that in designing corporate computer policies and employee agreements, it is important not to lose sight of the well-established operating principle that company computers are company property, and, as such, the company can “attach whatever conditions to their use it wanted to,” even if these conditions are not “reasonable.” Nonetheless, he suggests in light of Quon, Stengart and Brekka, a company should check its computer policies to make sure that they do the following:

• Clearly define the computer systems covered by the policy; expressly encompass whatever technology is used, such as text messaging or instant messaging; and address not only the servers but removable media such as thumb drives and disks.

• Make clear that all data created in furtherance of any personal use belongs to the company — including use of the company systems to access personal web-based e-mail accounts — and may be monitored by the company and will not be confidential.

• Reflect operational reality and are audited at least annually to ensure they reflect operational reality.

• Spell out precisely the scope of an employee’s permissible authorization to the company computers, particularly what they are not permitted to do, e.g., access the company computers to retrieve company data for a competitor.

The time to get this right is now before the company finds itself the victim of data theft.

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Michigan Troopers Downloading Phone Data Without Warrants?

Think about this while you are driving around this Memorial Day weekend. – The American Civil Liberties Union of Michigan claims that for several years now Michigan State Police have been using portable devices that allow them to secretly extract personal information from cell phones In an article on Help Net Security the ACLU says that the troopers have used the devices on cell phones of people pulled over for minor traffic infractions as well as people suspected of a crime.

The article says most of the devices used are from CelleBrite and can extract a great number of data from most cell phones, including contacts, text messages, deleted text messages, call history, pictures, audio and video recordings, memory file dumps, and more. GeekOSystems says the Cellebrite UFED Physical Pro Scanner (cut-sheet), were tested by the U.S Department of Justice. The DOJ reported the device was capable of pulling all photos and video from an Apple (AAPL) iPhone in under a minute and a half. Cellebrite says their devices also can extract, “existing, hidden, and deleted phone data, including call history, text messages, contacts, images, and geotags.” It can also extract your highly incriminating ringtones. These devices can also get around password protection, and work on over 3,000 cellphone models according to the website.

Cellebrite UFED Physical Pro ScannerThe ACLU is concerned that the MSP is using these devices to conduct warrantless searches without consent or a search warrant in violation of the 4th Amendment of the U.S. Constitution. Help Net Security reports that the ACLU of Michigan has been requesting information about MSP’s use of these devices for nearly three years by filing Freedom of Information Act requests to the Michigan State Police. The ACLU wants the troopers to reveal the data it collected, but it has had no luck so far. The article indicates that the MSP is stonewalling the ACLU’s Freedom of Information (FOIA) requests resulting in possible court action.

Following those accusations, the Michigan State Police posted their side of the story in an official statement published on its website according to another Help Net Security article. The MSP says it has, “fulfilled at least one ACLU FOIA request on this issue …” The web-posting also claims that devices that the MSP has in its possession can’t extract data without the officer actually having the owner’s mobile device in his hand and they claim the scanners are properly used, “The DEDs (data extraction devices) are not being used to extract citizens’ personal information during routine traffic stops,” it explains. “The MSP only uses the DEDs if a search warrant is obtained or if the person possessing the mobile device gives consent.”

rb-

Wonder why the government keeps trying to make talking on a cell phone while driving a primary offense? Could it be so the government has an excuse to stop people and collect their personal data? The last sentence from the MSP is particularly chilling since people are strongly encouraged to cooperate with the police even when they know they did nothing criminal. Warrantless searches violate the protection against unreasonable search and seizure guaranteed by the 4th Amendment of the U.S. Constitution.

Secure motoring in Michigan!

What do you think?

Does anyone care about privacy anymore?

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.