Accurate, Focused Research on Law, Technology and Knowledge Discovery Since 2002

Category Archives: E-Mail

A Review of Security Requirements for Local Number Portability Administration

A Review of Security Requirements for Local Number Portability Administration, The Chertoff Group, September 29, 2014: “For years, Americans have had the legal right to keep their wireless and wireline telephone numbers when switching carriers, and they frequently exercise this right. Carriers must constantly keep track of this switching of carriers in order to route telephone calls correctly. They do this through the nation’s seven Number Portability Administration Centers (“NPACs”),  each of which is operated by a single Local Number Portability Administrator (“LNPA”). Carriers electronically consult information delivered by these NPACs before completing virtually every call and text. Therefore, NPACs are critical to the completion of all telephone calls to numbers that have ever been ported between carriers, and also to numbers that have been updated by the carriers for the purpose of network upgrades and consolidations. They are also essential to local and national law enforcement agencies, which must know on a current and historical basis which carriers are associated with telephone numbers that are subject to lawful search warrants and subpoenas. The NPACs are thus an essential part of the U.S. telecommunications system and critical infrastructure. If NPACs were compromised, telephone calls and text messages might not be completed, many search warrants and subpoenas might not  be served correctly, and our system for prioritizing communications in a national emergency might not function.”

Appeals Court Limits Military Surveillance of Civilian Internet Use

“The U.S. Court of Appeals for the Ninth Circuit ruled in United States v. Dreyer that an agent for the Naval Criminal Investigative Service violated Defense Department regulations and the Posse Comitatus Act when he conducted a surveillance operation in Washington state to identify civilians who might be sharing illegal files. The 1878 Act prevents the U.S.Continue Reading

Academic Skills on Web Are Tied to Income Level – Report

Motoko Rich: “Wealthier students tend to perform better on tests of reading comprehension than their poorer peers, a longstanding trend that has been documented amply. But with the Internet having become an indispensable part of daily life, a new study shows that a separate gap has emerged, with lower-income students again lagging more affluent students inContinue Reading

International Law and Secret Surveillance: Binding Restrictions upon State Monitoring of Telephone and Internet Activity

CDT: “In the year that has followed Edward Snowden’s first disclosures concerning secret US and UK surveillance practices, many governments, human-rights groups, and UN bodies have debated—and at times disagreed sharply—about whether the Internet and telephone surveillance practices that governments employ today are consistent with international law. With a view to informing these discussions, thisContinue Reading

EPIC (Finally) Obtains Memos on Warrantless Wiretapping Program

“More than eight years after filing a Freedom of Information Act request for the legal justification behind the “Warrantless Wiretapping” program of President Bush, EPIC has now obtained a mostly unredacted version of two key memos (OLC54)and (OLC85) by former Justice Department official Jack Goldsmith. EPIC requested these memos just four hours after the New York Times broke the story about theContinue Reading

New on LLRX – Online tools to streamline your email

Via LLRX.com - Online tools to streamline your email - Nicole Black talks about email add-ons to assist busy lawyers respond more effectively to a continuous avalanche of communications that require sorting, prioritizing, tagging and timely actions. She highlights several effective online tools designed to solve these problems by integrating with your Gmail account and other programs as well.

The executive order that led to mass spying, as told by NSA alumni

Cyrus Farivar - Ars Technica: [Executive Order] 12333 is used to target foreigners abroad, and collection happens outside the US,” whistleblower John Tye, a former State Department official, told Ars recently. “My complaint is not that they’re using it to target Americans, my complaint is that the volume of incidental collection on US persons is unconstitutional.” The document, known inContinue Reading

Two Factor Auth

Two Factor Auth (2FA): “Two-step verification, abbreviated to TSV (not equal to two step authentication TSA nor to Two-factor authentication, abbreviated to TFA) is a process involving two subsequent but dependent stages to check the identity of an entity trying to access services in a computer or in a network with just one factor or secret,Continue Reading

CIA IG Report Confirms Searches of Senate Computers

Feinstein Statement on CIA IG Report, Washington -  Senate Intelligence Committee Chairman Dianne Feinstein (D-Calif.) released the following statement: “I was briefed Tuesday by CIA Inspector General David Buckley on the results of an IG investigation [summary only available at this time]. The investigation confirmed what I said on the Senate floor in March – CIA personnel inappropriatelyContinue Reading

Surveillance Costs: The NSA’s Impact on the Economy, Internet Freedom & Cybersecurity

New America Foundation – “It has been over a year since The Guardian reported the first story on the National Security Agency’s surveillance programs based on the leaks from former NSA contractor Edward Snowden, yet the national conversation remains largely mired in a simplistic debate over the tradeoffs between national security and individual privacy. It is timeContinue Reading

Deeper Dive into EFF’s Motion on Backbone Surveillance

News release: “Yesterday we filed a motion for partial summary judgment in our long running Jewel v. NSA case, focusing on the government’s admitted seizure and search of communications from the Internet backbone, also called “upstream.” We’ve asked the judge to rule that there are two ways in which this is unconstitutional under the Fourth Amendment: The admitted seizure of communications from theContinue Reading

UK Independent – NSA reportedly tracking any internet users who research privacy software online

James Vincent - “Any internet users who use or even read about privacy services online will be targeted for surveillance by the NSA, according to a new report from German broadcaster ARD. According to leaked source-code of the US spy agency’s ‘XKeyscore’ software, individuals who search for information about anonymising services such as Tor have their IPContinue Reading