Archive | Privacy

EFF Week 3: The First and Fourth Amendments — down, but hopefully not out

It was a busy week at EFF. The phones have been ringing almost non-stop with journalists, supporters, and concerned people. The news outlets wanted interviews with attorneys. The supporters wanted to commiserate. The concerned people wanted answers — how can the government do this, and what does it mean? Of course, the fact that the National Security Agency has been spying on Americans’ phone records was the big story, but that’s not the only threat to our rights to privacy and free speech that we suffered this week.

Warrantless DNA searches

On Monday, the Supreme Court ruled that police can take a DNA sample from someone who is arrested — not even convicted of a crime — without a warrant. A DNA swab is a search under the Fourth Amendment, and this is the first time the Court has allowed an exception to the need for a warrant for general crime solving and investigative purposes. The majority held that the “search” was only the cheek swab to collect the DNA, not the subsequent steps of extracting the DNA profile and comparing it to an FBI database of DNA left at crime scenes.

Revenge porn

Also on Monday, new legislation passed the California State Senate’s Public Safety Committee that would make the electronic distribution of revenge porn a misdemeanor. Revenge porn is the practice of posting pictures of former romantic or sexual partners online. EFF Staff Attorney Nate Cardozo was interviewed by ABC about the bill’s First Amendment implications.

Nate being interviewed by ABC News. The interns were filmed for some B-roll, but we didn’t make the cut.

Nate being interviewed by ABC News. The interns were filmed for some B-roll, but we didn’t make the cut.

 Nate said that while revenge porn is a “serious issue,” the California bill is not narrowly tailored enough to pass First Amendment scrutiny because it punishes not only the “bad actor” (the person who posts pornographic pictures) but also everyone who distributes the images once they are posted.

NSA phone and Internet data collection

On Wednesday and Thursday, The Guardian published leaks from Edward Snowden revealing that the National Security Administration has been operating a broad, untargeted phone and Internet spying regime for at least seven years. Wednesday’s leak revealed that the NSA has been collecting the phone records of millions of Verizon customers, including all calls made into, within, and out of the United States. Thursday’s leak revealed that the NSA has been intercepting certain information from major Internet companies including Google, Microsoft, Apple, Facebook, and Skype.

These leaks confirm that the government has been using secret law to justify warrantless spying on Americans. The Fourth Amendment generally protects us from warrantless, suspicionless searches by the government. The NSA derives its authority to collect phone records from secret opinions and orders from the Foreign Intelligence Surveillance Court interpreting the Patriot Act. Unlike other courts, whose opinions are public, FISA Court opinions and orders are kept secret.

Why we should care that the government is collecting our phone records

In a statement on Thursday, President Obama said we shouldn’t worry about the NSA’s data collection because the government is not listening to our phone calls. It’s true that the NSA needs to obtain a warrant, based on reasonable suspicion, to listen to the content of someone’s phone call. But even without hearing your conversation, the NSA can obtain an alarming amount of data about you based on whom you called, where you called to and from, and when the calls were made. This information is commonly referred to as “metadata,” and EFF Senior Staff Attorney Kurt Opsahl’s new blog post explains why it matters. These are some of Kurt’s examples illustrating what your phone records might reveal to the NSA:

  • They know you called the suicide prevention hotline from the Golden Gate Bridge. But the topic of the call remains a secret.
  • They know you spoke with an HIV testing service, then your doctor, then your health insurance company in the same hour. But they don’t know what was discussed.
  • They know you received a call from the local NRA office while it was having a campaign against gun legislation, and then called your senators and congressional representatives immediately after. But the content of those calls remains safe from government intrusion.

President Obama also said that we can’t have 100 percent privacy and 100 percent security. He believes the government has struck the correct balance. He said he welcomes a national debate about how much privacy we want to give up in the name of fighting terrorism. However, he also said he does not welcome leaks about the NSA’s spying programs. How can we have a real debate about how much spying is too much, and how can the American people have a say in the so-called balance between privacy and security, when the government does all it can to hide the details of and justifications for its data collection programs?

Woody comes to California!

Me and Woody at a reception for the Privacy Law Scholars Conference.

Me and Woody at a reception for the Privacy Law Scholars Conference.

Woodrow Hartzog, brilliant privacy scholar, law professor, UNC J-School alumnus (Ph.D. 2011), and the best mentor a nerd could ask for, came to town this week for the annual Privacy Law Scholars Conference. Woody presented a working paper with Daniel Solove on privacy law and the FTC. It was so great to catch up!

0

EFF Internship Week 2: Facial Recognition and Privacy

[Ed: This is the second in a series of posts by Natasha Duarte, who is blogging about her summer internship experience at EFF.] This week I researched how state law enforcement agencies use facial recognition software to track individuals. I’m helping EFF prepare public records requests to gather more information on the facial recognition and biometric tracking programs being deployed throughout the United States.

If you’ve ever had your picture taken for a driver’s license or other photo ID, your face is probably in a database used by the DMV, state law enforcement agencies, and the FBI for almost limitless tracking purposes.  Some agencies use mobile systems in the field to detect a person’s facial measurements, fingerprints, and other biometrics. The system automatically scans a database and matches the person’s face with any other information the government has access to.

The U.S. Department of Homeland Security is reportedly developing systems that will scan crowds in stadiums or other areas, matching faces in the crowd with these extensive databases. While it might help track criminal suspects, the curre

nt technology is susceptible to mismatches, and the databases include photos of individuals who have never been arrested, charged, or convicted.

Despite its dangerous privacy implications, the use of facial recognition technology by the government remains unregulated. In Arizona, facial recognition systems developed to find “terrorists” reportedly have been used to track protestors associated with the Occupy movement and to do instant immigration background checks at traffic stops.

But the most detailed facial recognition database is not the FBI’s—it’s Facebook’s. Facebook already uses facial recognition software (that’s how it knows whom to tag when you upload a photo). Some proponents of facial recognition programs have suggested that the government should incorporate social network photos into its databases. Unlike most frontal driver’s license photos, Facebook photos reveal what a person looks like from different angles, how tall she is, how she dresses, whom she hangs out with, and where she hangs out. Facebook has not indicated that it would cooperate with requests to search its database, but access to social network data could be a powerful and dangerous tool for law enforcement.

Living in San Francisco:

 

Dancers in a parade at Carnaval, an annual Latin American and Caribbean festival that takes place in San Francisco’s Mission District.

Dancers in a parade at Carnaval, an annual Latin American and Caribbean festival that takes place in San Francisco’s Mission District.

Carnaval, a Latin American and Caribbean festival, took place in my neighborhood last weekend. I love how many different cultures intersect in San Francisco, especially in the Mission District. Here’s a photo I took of some of the dancers in the Carnaval parade.

0

Final Interdisciplinary Lunch of the Year

This Friday the Center will hold its final interdisciplinary lunch of the year from noon to 1:15 p.m. in the Halls of Fame Room in Carroll Hall. The topic for this lunch is “Privacy by Design.” More information on the lunch (and how to RSVP) is available here.

If you haven’t attended one of our lunches yet, here’s what you’re missing:

The chance to meet new people
The lunches are open to Carolina graduate students and faculty. And the lunches truly are interdisciplinary. We have had students, faculty, and staff from the School of Information and Library Science, School of Law, School of Journalism and Mass Communication, Department of Computer Science, Health Sciences, Office of Human Research Ethics, University Libraries, and more. If you’re looking for opportunities to collaborate across disciplines, there could not be a better place to start than with a conversation over lunch.

Exposure to new topics and new ideas
Between the suggested readings and the conversation at the lunch, attendees are guaranteed exposure to research topics and ideas they hadn’t previously considered. Though the topic for each lunch is set in advance, the conversation is only loosely structured, which means that each lunch can cover a lot of scholarly ground. At each lunch we address a different topic; over the course of a year we tackle between four and six media law and policy-related issues.

Great conversation
By the time Friday rolls around, maybe you’re feeling a little burned out and you’re looking forward to the weekend. What better way to slip into the weekend than with some great scholarly conversation? Given the interdisciplinary nature of these lunches, everyone comes at these topics from a different perspective, which makes for a fun discussion.

Input on future lunches and topics
One of the best parts of bringing together people from across the University is that everyone brings something different to the table. And when it comes to thinking about topics for future lunches, that means that you can suggest an interesting topic for our next lunch! Do you have an idea for a future topic? We are all ears.

And last, but certainly not least: Good food!
If you show up, we are happy to feed you – usually sandwiches or wraps from some of the great restaurants in Chapel Hill. Free food and interesting discussion. What could be better?

Here’s a list of topics we’ve been talking about at these lunches over the past two years:

  • Privacy and Human Subject Research
  • Wikipedia as an Example of The Promises and Pitfalls of Peer-Produced Media
  • Who Owns Research Data?
  • Studying Social Media
  • Social Networks, Privacy, and Politics
  • The Right to Be Forgotten

What are you waiting for? RSVP for Friday’s lunch by 5 p.m. Wednesday, April 10. More information on the lunch (and how to RSVP) is available here.

0

UNC Students Presenting Research at AEJMC Southeast Colloquium

UNC School of Journalism and Mass Communication graduate students will present 13 research papers at the AEJMC Southeast Colloquium in Tampa this week. Ph.D. student Liz Woolery, who works in our media law center, will present two papers, one of which won third place in the Law and Policy Division. Both of Liz’s papers are about the rights of journalists and others to gather news.

For this conference, papers go through a process of blind review, and then the best papers are selected to be presented at the conference. Faculty and student authors compete against one another.

This will be the first academic conference for most of the students, but they’re ready. They have polished their papers and rehearsed their presentations.

 

Accepted Law and Policy Division papers include:

“Documenting Fair Use: Has the Statement of Best Practices Loosened the Fair Use Reins for Documentary Filmmakers?” — Jesse Abdenour, first-year doctoral student

“The Advertising Regulation ‘Green Zone’: Analyzing Parallels of Commercial Speech Jurisprudence As It Might Apply to the Growing Issue of Medicinal Marijuana Advertising, Using the Denver Advertising Ban as an

Illustrative Example” — Joseph Cabosky, first-year doctoral student

“Hazelwood’s Footnote Seven” — Ryan N. Comfort, first-year master’s student

“Consumer Protection Challenges on the Social Web: How the FTC Regulates Consumer-Generated Media as Endorsements and Testimonials in Advertising” — Emily A. Graban, first-year master’s student

“Abortion Informed Consent Laws: How Have Courts Considered First Amendment Challenges?” — Jaya Mathur, first-year master’s student

“How the FTC Has Enforced Its Deception Jurisdiction in Cases Involving an Ill, and Therefore, Vulnerable Audience” — Emery Rogers, first-year master’s student

“A Decade of True Threats Decisions Since Virginia v. Black: The Digital Age Demands Supreme Court Attention to True Threats Definition and Doctrine” — Lynn Marshele Waddell, first-year master’s student

“The Press, the Public, and Capital Punishment: California First Amendment Coalition and the Development of a First Amendment Right to Witness Executions” — Elizabeth Woolery, second-year doctoral student

“When News(Gathering) Isn’t Enough: The Right to Gather Information in Public Places” — Elizabeth Woolery, second-year doctoral student

 

Accepted Newspaper and Online Division papers include:

“Three Days a Week: Has a New Production Cycle Altered The Times-Picayune’s News Coverage?” — David Bockino, first-year doctoral student

 

Accepted Open Division papers include:

“The Creepiness Factor: Explaining Conflicting Audience Attitudes toward Tailored Media Content” — Lisa Barnard, second-year doctoral student

“What Motivates People to Pass on Anti-brand Rumors Online?” — Hyosun Kim, second-year doctoral student

“What Sports Journalists Need to Know: Four Areas of Student-athlete Privacy Invasion” — Sada Reed, first-year doctoral student

0

Employment Opportunities at Harvard’s Berkman Center for Internet & Society

berkmanIf you are a lawyer (or law student) looking for a chance to learn about Internet Law, Privacy, Copyright etc., you can’t do better than to spend some time at Harvard’s Berkman Center for Internet & Society (full disclaimer: I spent 5 years there myself). If you don’t believe me, read Tabitha Messick’s account of  her internship at Berkman last summer.  For those you looking for that kind of experience, I’ve got two announcements to pass along.

First, they are looking for a full-time legal fellow to join the Berkman Center’s Privacy Tools for Sharing Research Data Project:

This project is a collaboration with Harvard’s Center for Research on Computation and Society (CRCS) and the Institute for Quantitative Social Science (IQSS), generously funded by National Science Foundation.  It aims to develop computational and legal methods, tools, and policies to further the tremendous value can can come from collecting, analyzing, and sharing data while more fully protecting individual privacy.

The fellowship is a great opportunity for experienced legal practitioners who want to serve the public interest, transition to academic pursuits, or work in an intellectually invigorating environment.  The fellow’s primary responsibilities are to provide managerial support and substantive contributions to the Berkman Center’s role project, including but not limited to:

  • working closely with faculty from the Berkman Center to coordinate, oversee, and conduct legal research, written project outputs, and publications;
  • cultivating and supporting relationships between faculty and other experts in law, social science, applied mathematics, computer science, and other fields to understand non-legal substantive issues and objectives, assess needs and capabilities, and collaboratively develop new legal instruments (e.g., contractual agreements, policies, and procedures) to meet the project’s broader goals;
  • planning, communicating, and implementing privacy-related workshops and convenings;
  • managing the selection, oversight, and mentorship of student interns and research assistants;
  • developing plans and timelines to advance project priorities and meet deadlines; and
  • providing additional project support.

In order to most fully and efficiently carry out his or her duties, the candidate will attend workshops and conferences at the Center and at Harvard Law School, and will have frequent opportunities to expand his/her knowledge of technology and law.

More information about the position and the application process is below and at http://cyber.law.harvard.edu/getinvolved/fellowships/privacy.

Second, applications are now open for the 2013 summer internship program, which provides an opportunity to work on a more than a dozen “awesome” projects.  If you want to know more about what it’s like to be a law student at Berkman, read Tabitha’s blog post: A UNC Student’s Summer Experience in Media Law.  Act fast, however, as applications are due on Sunday, February 10, 2013 at 11:59 p.m. ET.

 

0