THE NATURE OF THE REVOLUTION: RETHINKING RENO TO REFLECT THE REALITY THAT THE INTERNET IS PART OF THE PHYSICAL WORLD
ABSTRACT
When the government regulates the Internet, it is not regulating speech but rather a transportation system. The United States Supreme Court erred—albeit reasonably and understandably—in the early days of the Internet when it viewed the Internet as if it were solely a medium for speech. A more accurate paradigm for evaluating government regulation of the Internet is that of the interstate highway system and trucks moving payloads. Those are highly regulated activities. With this more technologically-informed understanding of this network of networks, the Court should view the Internet through the lens of affirmative grants of power such as the Commerce Clause or national security powers. Much like trucks on a highway might carry caustic acid or political tracts, the presence of expressions of human thoughts in some packets will rarely outweigh legitimate government interests in public safety and security. Viewed in this way, government regulation of the Internet generally should be upheld.
– William C. Snyder and Ryan D. White
Direct link: http://bc50ed2ddddaed3c0bb8-62ef5432bf9114061c2f55538807a4ef.r87.cf5.rackcdn.com/Snyder_White_Reno.pdf
Snyder_White_Reno
Actual Assange Indictment
It is simple and powerful without any complex or hard-to-prove intents or mental states. It charges unauthorized access resulting in obtaining information, plus the mighty federal conspiracy statute.
assangeind-1
Actual Indictment of Russian GRU Agents for cyber operations to interfere with the 2016 US. presidential election
The Indictment filed July 13, 2018, and signed by Robert Mueller, the Special Counsel:
Professor comments on Carpenter decision – proceeding one step at a time
The Supreme Court’s decision today in Carpenter v. United States will have far-reaching impacts, because it extends Constitutional protections to cell-site location information and not just to the actual content or words and sounds of a cellphone call or text message. That is, the Katz reasonable expectation of privacy test now applies Fourth Amendment protection not only to the contents of your phone call but also to some of its metadata. The government now needs a warrant issued by a judge in order to obtain long-term, detailed records of the location of a cell phone. The ruling also is significant because the Court reasons that Constitutional protections against unreasonable searches and seizures must change as technology advances – surely a sign that more change will come. Also, the Court struck down Congress’s protections for cell-site location information. The FBI had fully complied with the Stored Communications Act and obtained federal court orders requiring Sprint and another carrier to turn over the geolocation information, but the Supreme Court found them to be not good enough. Those orders are less difficult for police to obtain than are search warrants. Now, more stringent search warrants are required.
Nevertheless, the Court affirmed that “a person has no legitimate expectation of privacy in information he voluntarily turns over to third parties … even if the information is revealed on the assumption that it will be used only for a limited purpose.” The so-called “Third Party Records Doctrine” survives; the Court just found that it does not apply to long-term “encyclopedic” geographic information generated by cell phones. Striking down the Third Party Records Doctrine would have had enormous implications for government investigations, both for law enforcement and intelligence agencies. The Court not only did not go that far, but it reaffirmed the basic principle that the Constitution does not protect evidence a person voluntarily provides to someone else.
These matters are complex. The justices wrote 119 pages to explain their reasoning. Also, the decision was 5-4, decided by just one vote.
Today’s decision is, in the words of the Court, “a narrow one.” It is a step toward extending Constitutional protections in the cyber age, but only a step. It points a direction, but the Court is proceeding one step at a time.
– statement by William C. Snyder, Teaching Professor of Law, Syracuse University
Congressional Research Service: Law Enforcement Access to Overseas Data under the CLOUD Act
Below is a primer from the Congressional Research Service on the CLOUD Act. Earlier this week, a post on Lawfare set forth some suggestions for how to implement the legislation.
Cyber Round Up: Congress Challenges FBI on Encryption; CTIIC’s Role in Cyber Security; Orangeworm Attacks Healthcare Sector
- Congress wants answers on FBI’s ‘going dark’ problem in wake of DOJ IG report (CyberScoop): Some members of Congress are challenging the FBI over its handling of the encryption battle with Apple, a recent article says. Several lawmakers wrote a letter to FBI Director Chris Wray stating their concerns over both the San Bernardino incident and the director’s remarks that the FBI could not access 7,800 devices last year. The letter seems to have been sparked by a recent report from the DOJ Inspector General. The full letter can be read below.
letter_to_fbi_dir_wray_re_going_dark
-
CTIIC’s Role in Keeping America Safe in Cyber (Cipher Brief): An article earlier this month examined the role of the Cyber Threat Intelligence Integration Center (CTIIC) in relation to cyber security, focusing particularly on the WannaCry attack last May. The article explains that the main focus of the Center during that time was to integrate and share information with the rest of the U.S. government. The article draws parallels between the NCTC and the CTIIC, but note that one difference is that CTIIC’s success is largely due to information sharing with the private sector. The full article can be found here.
-
New Orangeworm attack group targets the healthcare sector in the U.S., Europe, and Asia (Symantec): A new report from Symantec explains an emerging cyber threat in the global healthcare sector. The group called Orangeworm was first identified in 2015 and has been known to “conduct[] targeted attacks against organizations in related industries as part of a larger supply-chain attack in order to reach their intended victims. Known victims include healthcare providers, pharmaceuticals, IT solution providers for healthcare and equipment manufacturers that serve the healthcare industry . . . ” The article explains that the targets are not random and seem to be carefully chosen. The full report can be found here.
DOJ Inspector General: Special Inquiry Regarding iPhones and Encryption
A Special Inquiry Regarding the Accuracy of FBI Statements Concerning its Capabilities to Exploit an iPhone Seized During the San Bernardino Terror Attack Investigation
Cyber Round Up: DHS to Provide Direct Cyber Services; Promise and Peril of Active Cyber Defense; Cyber Operations Stealing from Drone playbook
-
DHS Might Provide Cyber Services Directly To Industry Under New Strategy (Nextgov): With a new DHS cyber strategy set to be released in the coming weeks, reports suggest that the agency could be taking on a new role in the cyber realm. DHS Secretary Kirstjen Nielsen described the new system as “security as a service” and called it a “natural evolution.” The article says that Nielsen would not elaborate on the details of the new strategy but that it was consistent with ones from the Obama administration. The full article can be read here.
-
The promise and peril of active cyber defense (The Hill): A recent opinion piece on The Hill discusses the shortcomings of current cyber strategy in the U.S. and suggests adopting active cyber defense policies. The article makes clear that the options for this extend well beyond hackbacks that are illegal under U.S. law. The options “can include everything from honeynets and beacons to botnet takedowns and sanctions.” But the article also identifies the shortcomings of active cyber defense, including collateral damage to third parties. The full article and questions posed by the author can be read here.
- How Obama’s drone playbook could influence future cyber operations (Fifth Domain): The Department of Defense is considering utilizing cyber operations in places where the U.S. is not already engaged in conflict, according to a recent article. Admiral Michael Rogers, head of U.S. Cyber Command, testified to Congress that the U.S. needs to adapt to better use its cyber capabilities “outside the designated areas of hostility.” The article explores how this new cyber policy parallels what happened in the Obama administration with drone strikes. It also includes analysis from Bobby Chesney, who notes that cyber operations could inadvertently implicate a third nation’s sovereignty. The full article can be read here.
Advisory: Russian State-Sponsored Cyber Actors Targeting Network Infrastructure Devices
Russian State Sponsored Actor Advisory
Cyber Round Up: Encryption is About Crime, Not Terrorism; Fight over Control of Cyber Command; Pentagon Cloud Contract
-
The Encryption Debate Isn’t About Stopping Terrorists, It’s About Solving Crime (Lawfare): A post last week on Lawfare added to the ongoing debate over encryption but with a different focus. The author said that regardless of any flaws with third party (which means government, according to the author) access, the biggest problem remains traditional crime, not terrorism. Speaking from his experience as a federal prosecutor dealing with not so savvy criminals, the author said that a switch to making encryption the default setting on apps such as Whatsapp will have a devastating impact on “ordinary crime” beyond the typical national security issues we hear about. The full article can be found here.
-
Command and control: A fight for the future of government hacking (CyberScoop): While the nation finally has a fully operational cyber force, new challenges have quietly emerged behind the scenes, according to an article last week. Several federal agencies from law enforcement, military, and defense have all been vying to shape the answer to one big question: “If the U.S. is going to strike back at foreign targets in cyberspace, when should the soldiers or the spies lead the charge?” The article gives a lengthy history of the debate and suggests that the scales have recently titled away from the IC and in favor of the military. The full article can be read here.
- Google is Pursuing the Pentagon’s Giant Cloud Contract Quietly, Fearing An Employee Revolt (Defense One): Last year, Secretary of Defense Mattis took a trip to the West Coast to meet with executives from Amazon and Google, an article last week said. A trip that began with skepticism ended with Mattis “convinced that the U.S. military had to move much of its data to a commercial cloud provider — not just to manage files, email, and paperwork but to push mission-critical information to front-line operators.” Now, the article says, the shift to the cloud is happening in the form of a $10 billion contract. The article lists Microsoft, Amazon, and Google as the front runners and discusses what exactly the winner might be tasked with doing. The full article can be read here.
Recent Posts
- THE NATURE OF THE REVOLUTION: RETHINKING RENO TO REFLECT THE REALITY THAT THE INTERNET IS PART OF THE PHYSICAL WORLD
- Actual Assange Indictment
- Actual Indictment of Russian GRU Agents for cyber operations to interfere with the 2016 US. presidential election
- Professor comments on Carpenter decision – proceeding one step at a time
- Congressional Research Service: Law Enforcement Access to Overseas Data under the CLOUD Act
Categories
Recent Comments
- Cyber Command Strategy Document: Achieve and Maintain Cyberspace Superiority on
- Cyber Command Strategy Document: Achieve and Maintain Cyberspace Superiority on
- Cyber Command Strategy Document: Achieve and Maintain Cyberspace Superiority on
- Cyber Command Strategy Document: Achieve and Maintain Cyberspace Superiority on
- Cyber Command Strategy Document: Achieve and Maintain Cyberspace Superiority on
Tags
Archives
- July 2019
- April 2019
- July 2018
- June 2018
- May 2018
- April 2018
- March 2018
- February 2018
- January 2018
- December 2017
- November 2017
- October 2017
- September 2017
- August 2017
- July 2017
- June 2017
- May 2017
- April 2017
- March 2017
- February 2017
- January 2017
- December 2016
- November 2016
- October 2016
- September 2016
- August 2016
- June 2016
- May 2016
- April 2016
- March 2016
- February 2016
- January 2016
- December 2015
- November 2015
- October 2015
- September 2015
- August 2015
- July 2015
- June 2015
- May 2015
- April 2015
- March 2015
- February 2015
- January 2015
- December 2014
- November 2014
- October 2014
- September 2014
- May 2014
- April 2014
- March 2014
- February 2014
- January 2014
- December 2013
- November 2013
- October 2013
- September 2013
- July 2013
- June 2013
- May 2013
- April 2013
- March 2013
- February 2013
- January 2013
- December 2012
- November 2012
- October 2012
- September 2012
- August 2012
- July 2012
- June 2012
- May 2012
- April 2012
- March 2012
- February 2012
- January 2012
- December 2011
- November 2011
- October 2011
- September 2011
- August 2011
- July 2011
- June 2011
- May 2011
- April 2011
- March 2011
- February 2011
- January 2011
- December 2010
- November 2010
- October 2010
- September 2010
- August 2010
- July 2010
- June 2010
- May 2010