We had a similar challenge at FCC, where controversial notices often received many comments with varying coordination. Members differed on how to account for that. My view was that comment volume was a rough public opinion barometer, at most, and we should focus on substantive facts and arguments.
02.11.2023 13:12 โ ๐ 7 ๐ 0 ๐ฌ 0 ๐ 0
I used to work on the Hill. It was common for doors to have confusing signage and sometimes be closed. Thatโs a quite plausible explanation for this mistake. The incident should have a nonpartisan investigation by the Capitol Police and Sergeant at Arms, not political releases of manipulated media.
01.10.2023 13:12 โ ๐ 7 ๐ 0 ๐ฌ 0 ๐ 0
The Jamaal Bowman fire alarm thing is a great example of a cheapfake. Presumably the video shows him struggling to open the door to get to the House floor. But the Administration Committee posted a selective still photo, generating a news cycle about attempting to delay the vote to end the shutdown.
01.10.2023 12:55 โ ๐ 2 ๐ 0 ๐ฌ 1 ๐ 0
Could we not do the FTC Amazon complaint, FCC net neutrality NPRM, and DOJ Google trial testimony on the same day? Some of us are trying to get tech law research done over here.
26.09.2023 18:13 โ ๐ 3 ๐ 1 ๐ฌ 0 ๐ 0
In computer crime law, itโs normal to consider access and fraud to be separate elements from receiving information. CFAA expressly draws that distinction. These are legal concepts based on a logical construct of systems and data within systems. They donโt neatly match underlying technical details.
14.08.2023 21:24 โ ๐ 0 ๐ 0 ๐ฌ 0 ๐ 0
The legislative purpose, it seems to me, is straightforward. Reporters who come into possession of ill-gotten or contraband material, through no doing of their own, have some protection from law enforcement search for that material. Essentially the fact pattern in Bartnicki v. Vopper.
14.08.2023 19:10 โ ๐ 0 ๐ 0 ๐ฌ 0 ๐ 0
I read the text and purpose of that PPA exception-to-the-exception somewhat differently. The term โconsists ofโ is exclusive (the usual meaning), and it precedes specific offense elements. If a computer offense exceeds those elements, which it would (e.g., access or fraud), then police can search.
14.08.2023 19:06 โ ๐ 0 ๐ 0 ๐ฌ 1 ๐ 0
The PPAโs text and history (Senate report, Conference report, and DOJ implementation) all contemplate searches of a suspectโs materials. None address the proper scope of a search like that. The โpossessionโ qualifier helps, but could break down if the news org is a suspect or the newsroom is small.
14.08.2023 04:25 โ ๐ 1 ๐ 0 ๐ฌ 1 ๐ 0
There are further indicia that the newsroom was acting in good faith. After they realized the tip was problematic, they declined to run a story and they reported it to law enforcement. That makes the aggressive raids even more unconscionable.
14.08.2023 03:51 โ ๐ 0 ๐ 0 ๐ฌ 0 ๐ 0
The PPA exception for people suspected of committing criminal offenses is, presumably, grounded in an assumption that thereโll always be a risk of evidence tampering. One of the many unusual aspects of this episode is that the assumption may be wrong. The newsroom has been open about what happened.
14.08.2023 03:45 โ ๐ 0 ๐ 0 ๐ฌ 1 ๐ 0
One wrinkle Iโve been mulling over is โpossessionโ under the PPA. Itโs possible that the searches were lawful with respect to some materials (i.e., devices used by the reporter who accessed the website) and not others. Another wrinkle is the good faith defense, compounded by the search warrant.
14.08.2023 03:28 โ ๐ 0 ๐ 0 ๐ฌ 1 ๐ 0
Could you say more about why you think the Privacy Protection Act would apply? Iโm with you on policy considerations, but under the (current) law, there is a statutory exception when law enforcement is investigating an alleged crime by a person who would otherwise be covered by the law.
14.08.2023 03:25 โ ๐ 0 ๐ 0 ๐ฌ 1 ๐ 0
As I said (several times!), Iโm not condoning what the Marion Police Department did here. This was a terrible mistake. The media consequences will reverberate for years, and the personal toll is tragic.
Policy and law are different. A law enforcement action can be bad policy and permitted by law.
14.08.2023 03:03 โ ๐ 1 ๐ 0 ๐ฌ 0 ๐ 0
In closing, I want to reemphasize that I in no way support what happened. More facts will come out. Even if this was a properly predicated investigation, there may be other problems with the searches. I just want to offer some perspective on the legal dimensions of what happened and might happen.
14.08.2023 02:55 โ ๐ 0 ๐ 0 ๐ฌ 1 ๐ 0
If that's what the Marion Police Department is investigating, that would explain searching (at least some) electronic devices in the newsroom. That would also explain the department's position that the Privacy Protection Act didn't apply, because it was investigating alleged crimes by a reporter.
14.08.2023 02:43 โ ๐ 0 ๐ 0 ๐ฌ 2 ๐ 0
While the DPPAโs exceptions are notoriously broad, it doesn't look like any apply to these circumstances. Pretexting to circumvent the DPPA could plausibly violate Kansas criminal law, such as the identity fraud law (if posing as the driver) or the computer fraud law (access without authorization).
14.08.2023 02:41 โ ๐ 0 ๐ 0 ๐ฌ 1 ๐ 0
The first page on the Kansas website for obtaining driving records, which references the DPPA.
The second page on the Kansas website for obtaining driving records, which requires affirmatively selecting a DPPA exception that allows the state to disclose a personโs record.
Second, hereโs the Kansas state government website for obtaining a driverโs history. Look closely at the user interface design. Thereโs a notice about the DPPA, and then the user has to affirmatively attest to the specific DPPA exception that makes them eligible to obtain a personโs driving records.
14.08.2023 02:38 โ ๐ 0 ๐ 0 ๐ฌ 1 ๐ 0
Hereโs where two critical issues, which I havenโt seen discussed, come into play.
First, there is a federal privacy law that covers driving records held by a state government. The Driverโs Privacy Protection Act prohibits disclosing these records to third parties, subject to various exceptions.
14.08.2023 02:28 โ ๐ 1 ๐ 0 ๐ฌ 1 ๐ 0
These are the (seemingly) undisputed facts: A source provided information about a personโs driverโs license and past driving offenses to the newsroom. A reporter then looked up and confirmed the information on a state government website. Local police are investigating the lookup as a possible crime.
14.08.2023 02:27 โ ๐ 0 ๐ 0 ๐ฌ 1 ๐ 0
Before I get to the law: I do not condone this newsroom search. The Marion Police Department appears to have demonstrated terrible judgment, inconsistent with a commitment to a free press. More bad facts could emerge. I also think this area of law needs a revamp. Ok, back to the legal analysis.
14.08.2023 02:26 โ ๐ 0 ๐ 0 ๐ฌ 1 ๐ 0
What if the Kansas newspaper raid was legal? And what if that entirely depended onโฆ the user interface design of a website?
As a criminal procedure and computer crime person, looking at the undisputed public facts so far, what the police did may have been lawful (but awful). Allow me to explainโฆ
14.08.2023 02:26 โ ๐ 0 ๐ 0 ๐ฌ 2 ๐ 0
NPR/PBS NewsHour/Marist poll on raising the federal debt ceiling.
CNN/SSRS poll on raising the federal debt ceiling.
Hereโs a great example of why survey design is so important. NPR/Marist asked about raising the debt ceiling so the government can โpay its billsโ & โavoid a default.โ 52-42 for a clean increase. CNN/SSRS gave a wordy & budget-ish prompt (โkeep all government programs runningโ). 60-24 the other way!
24.05.2023 12:51 โ ๐ 3 ๐ 1 ๐ฌ 0 ๐ 0
Governance of superintelligence
Now is a good time to start thinking about the governance of superintelligenceโfuture AI systems dramatically more capable than even AGI.
OpenAIโs grand AI policy proposal isโฆ a new international agency focused on long-term risks of AI that exceeds human cognition. Itโs like theyโre straight up trolling the AI fairness, governance, etc. communities, which consistently emphasize the need for near-term actionable solutions to AI harms.
22.05.2023 21:13 โ ๐ 15 ๐ 4 ๐ฌ 0 ๐ 3
The state-of-the-art research methods for spotting AI-generated writing arenโt nearly good enough for a high-stakes & adversarial setting like academic discipline. OpenAIโs in-house model has 26% recall & a 9% false positive rate in their own evaluation! I wouldnโt trust Turnitinโs black box at all.
18.05.2023 20:12 โ ๐ 0 ๐ 0 ๐ฌ 0 ๐ 0
Hah! I would suggest a โgreatest hitsโ list of papers, though that can be dangerous in the information security community. Thereโs definitely some newer work, since we had to stop reading papers at some point. Especially the Google paperโฆ which quietly took a position against private hash matching?!
15.05.2023 15:48 โ ๐ 1 ๐ 0 ๐ฌ 0 ๐ 0
I saw! Just hoping to help save you some time, since we learned the hard way how deep this intellectual rabbit hole goes. We kept surfacing additional research that was relevant, even though not expressly about E2EE messaging. The PETS version has final pagination etc., otherwise arXiv is identical.
15.05.2023 15:39 โ ๐ 1 ๐ 0 ๐ฌ 1 ๐ 0
Table 1: Literature search results for content moderation under E2EE sorted by goal. Some works appear in multiple categories.
Table 2: Details of non-middlebox methods for E2EE content moderation found in our survey. See Table 4 for middleboxes.
We just published a literature review of content moderation methods for end-to-end encrypted communications. There are nearly 400 relevant references! ๐ตโ๐ซ
https://petsymposium.org/popets/2023/popets-2023-0060.pdf
Sarah Scheffler, whoโs an *amazing* fellow at Princeton CITP, deserves all the credit.
15.05.2023 13:29 โ ๐ 22 ๐ 13 ๐ฌ 1 ๐ 0
Under compulsion, Twitter could trivially change a few lines of web app code and send back copies of a specific userโs decrypted messages. This type of risk is precisely why Signal launched on desktop as a web browser extension, rather than as a website, and then quickly migrated to a native app.
12.05.2023 20:21 โ ๐ 2 ๐ 0 ๐ฌ 0 ๐ 0
Leads AEIโs foreign and defense team, author of The State and the Soldier, contributing writer at The Atlantic. 2025-2026 Kissinger Chair at the Library of Congress. Californian. https://www.aei.org/profile/kori-schake/
The future belongs to the connected. Former Chairwoman of the FCC. Always an impatient optimist. Mom, wife, inveterate coffee drinker.
Computer Security, Privacy, and Public Policy. Deputy Head of Computing and Information Systems, University of Melbourne. Former Fellow for Sen. Ron Wyden.
Likes teaching. Likes research. Likes Singing.
https://cohney.info
Professor at Fordham Law. Prisons and criminal justice quant. I'm not contrarian, the data are. Author of Locked In. New stuff at johnfpfaff.com.
Director, Knight First Amendment Institute at Columbia University; Exec Editor, Just Security; former ACLU. knightcolumbia.org.
Professor, Penn State Law & Engineering
Me: andreamm.com
My labs at Penn State: pilotlab.org & manglonalab.org
@andreamm@mastodon.social
Professor at the University of Virginia School of Law; Vice President of the Cyber Civil Rights Initiative; #MacFellow; Author of The Fight for Privacy: Protecting Dignity, Identity, and Love in the Digital Age (2022) and Hate Crimes in Cyberspace (2014) ๐
Public policy (tech/privacy) by day, everything else by night
Co-Director Privacy & Data Program, Center for Democracy & Technology, @cendemtech.bsky.social.
Views expressed here are mine: hastily adopted, uninformed, and deeply held.
He/him!
Privacy, security, AI policy nerd at Venable. I'm a walking book club. This is my opinion only.
Snr Lecturer digital media Swinburne Uni, chicken whisperer, researcher. Smells books. Maybe we can build a new thing here ๐ฑ
The Upside Down: https://twitter.com/manjusrii
Law professor @umnlawschool.bsky.social. Senior editor and research director @lawfaremedia.org. Nonresident senior fellow @brookings.edu. Former DOJ. alanrozenshtein.com
Nearly 20 years in court as a law-talking guy for plaintiffs, now a mix of stuff. Posts too much about politics.
email max@kennerlylaw.com
Gentleman of leisure. I wrote two of the best books you haven't read. Friend of hackers. https://decipher.sc
Washington Post tech reporter
San Francisco
Defense tech and AI
https://www.washingtonpost.com/people/gerrit-de-vynck/
Signal: GerritD.27
Technology Policy at Stanford ๐ฉ๐ผโ๐ป column in FT ๐ช๐บ Member of European Parliament 2009-2019 ๐Author: The Tech Coup
Cryptography Professor at King's College London and Principal Research Scientist at SandboxAQ. ErdลsโBacon Number: 6. He/him or they/them.
https://malb.io
Professor of Law at Chicago-Kent College of Law, Illinois Tech. Design patent scholar. Currently writing about "Schedule A" litigation.
For more on #ScheduleA, see Part II(B) here: https://harvardlawreview.org/print/vol-138/the-counterfeit-sham/
Prof at Georgetown Law. Labor law, political economy, technology, other things. I no longer have a twitter account.
Author, Data & Democracy at Work, The MIT Press. Open Access version at https://tinyurl.com/btv74buj
Security Engineer interested in cryptography, information security, & privacy engineering.