From pli’s Course Handbook Communications Law in the Digital Age 2009


Apple Drops Legal Threat Against Web



Download 445.44 Kb.
Page4/10
Date20.10.2016
Size445.44 Kb.
#6112
1   2   3   4   5   6   7   8   9   10

6. Apple Drops Legal Threat Against Web

Site With iPhone Hacking Tips

Apple dropped its threat of a lawsuit against BluWiki, a Web site that hosted discussions about how to use iPods and iPhones without the company’s iTunes computer software.129 Apple said in a July 8 letter to BluWiki’s attorneys at the Electronic Frontier Foundation (EFF) that it would not pursue a lawsuit because it no longer uses the software code that was mentioned on the Web site, therefore the code “is no longer of any harm or benefit to anyone.”130 Apple had original alleged the BluWiki violated anti-circumvention measures of the Digital Millennium Copyright Act, 17 U.S.C. § 1201.

EFF lawyer Fred von Lohmann believes Apple did not have a credible claim under the statute. “Apple’s threats were clearly designed to censor pure speech – there was no software there, there were no tools, there were no hacking devices – this was just people talking,” he said. “Apple was well beyond the statute when it made these threats, and apparently they think so now too.”131 After Apple dropped its threat, EFF and OdioWorks, the company that runs BluWiki, dropped their lawsuit against Apple that sought a declaratory judgment vindicating the free speech interests of BluWiki and its users.132

III. GOVERNMENT AND PRIVATE SECTOR SURVEILLANCE AND DATA MANAGEMENT
A. Unclassified Report on U.S. Wiretapping
A government review of the Bush administration’s wiretapping program raised questions about its legality and found that its effectiveness in fighting terrorism was unclear. Congress mandated the report last year, which was produced by the inspectors general of five federal agencies and released to the public on July 10, 2009.133

The report does not describe specific intelligence activities other than to refer to the “Terrorist Surveillance Program.” The administration acknowledged in December 2005 that this program included the interception without a court order of some international communications in which there was “a reasonable basis” to believe that at least one party was a member of al-Qaida or its affiliates. The program was implemented following the attacks of Sept. 11, 2001.

The report was the result of about 200 interviews with government and private sector personnel, most of whom were former or current senior government officials. Many key figures in the surveillance program – former Attorney General John Ashcroft, Central Intelligence Agency director George Tenet and deputy assistant attorney general John Yoo – either declined to be interviewed or did not respond to interview requests.

1. Critical of Reauthorization Memos

The report criticized John Yoo, the deputy assistant attorney general who was granted access to the surveillance program and wrote what are known as “scary memos” that justified the administration in reauthorization the program every 45 days. Department of Justice (DOJ) officials doubted the “factual and legal basis” for Yoo’s memos because he incorrectly interpreted the Foreign Intelligence Surveillance Act of 1978 (FISA) as inapplicable to wartime operations, according to the report. DOJ officials pointed out that Yoo failed to analyze a FISA provision134 that allows the interception of electronic communications for 15 days following a congressional declaration of war, meaning it is possible Congress intended FISA to apply to wartime.

Yoo characterized FISA as providing a “safe harbor for electronic surveillance” and that the Fourth Amendment provides the appropriate test for whether the government may carry out warrantless electronic surveillance, the report said. Yoo responded to the unclassified report in a July 16 op-ed in The Wall Street Journal in which he labeled FISA “an obsolete law not written with live war with an international terrorist organization in mind.”135 Yoo accused the five inspectors general of “responding to the media-stoked politics of recrimination, not consulting the long history of American presidents who have lived up to their duty in times of crisis.”

Jay Bybee, Yoo’s boss at the time, told investigators he did not know that Yoo had worked on the surveillance program, the report said. Some senior DOJ officials criticized the unusual practice of having one attorney write a memo for the program when the office traditionally has multiple attorneys review all legal analysis the office issues. The DOJ found that limiting the number of personnel who had direct knowledge of the program created several problems, including preventing the DOJ from “adequately reviewing the program’s legality during the earliest phase of its operation.”




2. Varying Conclusions
The inspectors general reached varying conclusions on the usefulness of the program. The DOJ concluded that while information the program obtained “had value in some counterterrorism investigations, it generally played a limited role in the F.B.I.’s overall counterterrorism efforts.” The CIA considered it “a valuable counterterrorism tool” while the National Security Agency found the program’s value was in “the confidence it provided that someone was looking at the seam between the foreign and domestic intelligence domains.” The inspectors general of the Department of Defense and the Office of the Director of National Intelligence also helped compile the report.
3. Current Surveillance Authority
Congress restructured the federal surveillance law with the FISA Amendments Act of 2008, 50 U.S.C. § 1804. The report said this legislation gave the government “even broader authority to intercept international communications” than did the original program. The report said that the wiretapping program should have transferred to Congressional authority earlier than 2008 “as the program became less a temporary response to the September 11 attacks and more a permanent surveillance program.”
B. Court Challenges to Wiretapping Program
1. Judge Dismisses Suits Against

Telecommunications Companies
In the consolidated case In Re: National Security Agency Telecommunications Records Litigation, MDL No.06-1791 VRW, 2009 U.S. Dist. LEXIS 48283 (N.D. Cal. June 3, 2009), Judge Vaughn R. Walker dismissed lawsuits against telecommunications companies that had accused them of improperly participating in the warrantless wiretapping program launched after the Sept. 11, 2001 terrorist attacks. Walker ruled that § 802(a) of the Foreign Intelligence Surveillance Act (FISA) Amendments Act of 2008, 50 U.S.C. § 1885a, properly granted immunity to the companies, or any individual, that assisted the government in surveillance authorized by a court order or President George W. Bush between Sept. 11, 2001, and Jan. 17, 2007. Former Attorney General Michael Mukasey certified to the court that the claims in the consolidated cases fell within at least one provision of § 802(a).136 Some of the plaintiffs appealed Walker’s order granting the government’s motion to dismiss on behalf of the companies.137

The plaintiffs argued that by amending FISA to grant the companies immunity, the government stripped them of any forum for their dispute to be heard. However, Vaughn found that the plaintiffs can still seek action against “governmental actors and entities who are, after all, the primary actors in the alleged wiretapping activities.”138 Walker’s ruling did not apply to a handful of cases and he scheduled a Sept. 1, 2009, hearing to listen to arguments from the Al-Haramain Islamic Foundation, an Oregon non-profit corporation, about the merits of its suit against the government over the warrantless wiretapping program.139



2. Judge Dismisses ACLU Lawsuit
The American Civil Liberties Union, journalists and human rights groups such as Amnesty International argued in a 2008 lawsuit that the FISA Amendments Act of 2008, 50 U.S.C. § 1881(a), is unconstitutional because it permits “the executive branch sweeping and virtually unregulated authority to monitor the international communications – and in some cases the purely domestic communications – of law-abiding U.S. citizens and residents.”140 The FISA Amendments Act allows the government to seek approval from the Foreign Intelligence Surveillance Court to gather intelligence information from people reasonably believed to be located outside the United States. The government defended the amendments as an “early warning system” against possible terrorist attacks or strikes against U.S. troops and said they “cannot be used to target U.S. persons or any persons inside the United States.”141

On Aug. 20, 2009, Southern District of New York Judge John G. Koeltl dismissed the lawsuit because he determined that the plaintiffs lacked standing to attack the FISA Amendments Act as unconstitutional.142 “The plaintiffs fear that their international communications will be monitored under the [Act]. They make no claim that their communications have yet been monitored, and they make no allegation or showing that the surveillance of their communications has been authorized or that the Government has sought approval for such surveillance,” Koeltl wrote in his order dismissing the lawsuit.143 Koeltl noted that the FISA Amendments Act itself “does not authorize surveillance of the plaintiffs’ communications.”144


C. Emerging Technology to Monitor

Government Snooping

The uncertainty of precisely what information government intelligence agencies and law enforcement are legally allowed to collect continues to bother some privacy advocates. “For example, right now it is perfectly legal, without any question, for the government to collect every telephone call, every e-mail, every communication in the world – as long as it can claim credibly that some part of the communication involves a person outside of the United States,” said Fred Cate, the director of the Center for Applied Cybersecurity Research at Indiana University.145

Palantir Technologies, a Silicon Valley company, claims it has developed technology that tracks the personal information and communications these entities collect so that it eliminates the problem of choosing between fighting terrorism and protecting civil liberties. The system works by tagging certain information “so the only people who can see it are those who are allowed to see it, so it takes care of the problem,” Palantir CEO Alex Karp told National Public Radio.146

As an example of how the technology can safeguard one’s privacy, Palantir executives pointed to an incident in Massachusetts in which law enforcement personnel searched for information on New England Patriots quarterback Tom Brady 968 times, looking for such things as his home address, driver’s license photo and whether he owned a gun.147 Bob McGrew, director of engineering for Palantir, claims law enforcement would not have been able to carry out the search surreptitiously if they were using Palantir’s system because of its privacy control. “When some of these officials were looking at Tom Brady’s data, they would be leaving a trail. It is all captured in a long that you don’t need to be a technical guy to understand,” McGrew told NPR. “A compliance officer or a civil liberties group would be able to see exactly who was looking at what information.”

The Federal Bureau of Investigation, Central Intelligence Agency, Defense Department and New York Police Department have started using Palantir’s technology to analyze their intelligence data, according to the NPR report.
D. Google Street View Seen as Privacy Threat
Google Street View has raised privacy concerns, particularly in Europe where Google has to navigate numerous data protection agencies in countries that view privacy as a fundamental human right. Street View has been criticized because of the danger that the offshoot of the Internet search engine will post unflattering images of passersby or facilitate crime by allowing would-be criminals an advance look at a neighborhood. Introduced in May 2007, Street View is part of Google Maps and permits users to see and navigate within 360-degree street level images of a number of areas throughout the world, primarily in densely populated areas. Google obtained the images by using drivers who traversed the city streets in vehicles equipped with continuously filming digital panoramic cameras.
1. Privacy Safeguards in Place
In order to safeguard privacy, Google blurs faces and license plate numbers captured in the images and includes an option for those who object to the content of an image to have it removed from Street View. Once a user is on the offending image within Street View, users can click on the “Report a problem” link in the lower left portion of the page. That takes users to a screen that asks for the nature of the concern. Under the privacy category, users can request that images of their face (or that of their children) be removed along with pictures of their homes or automobiles. This includes images that have already been blurred. Users can also request that pictures of faces and license plates be blurred. The page includes space to describe the nature of the problem and an image tool to focus on the specific part of the picture that is the source of the complaint.
2. Street View in Europe
Street View has received the most scrutiny in Europe, where Google has been temporarily banned from collecting images in some countries or threatened with sanctions if it did not comply with privacy laws. However, the criticism appears to be subsiding after Google pledged to apply the same privacy protection standards in Europe that it uses with Street View in the United States. In addition, Google has coordinated with the Article 29 Working Party, which represents 27 European data protection authorities, to extend additional privacy safeguards.

Those measures, according to Peter Fleischer, Google’s global privacy counsel, include providing advance public notice about when and where Google will be capturing images and taking steps to avoid holding onto the “unblurred” original images any longer than is needed. Fleischer explained in a blog post that Google is still perfecting its technology to avoid “false positives,” or blurring portions of images that pose no privacy threat, but that the company is committed “to determine the shortest retention period that also allows for legitimate use under EU laws.”148

The Information Commissioner’s Office, the main privacy watchdog in the United Kingdom, concluded that Street View does not violate the UK’s Data Protection Act of 2008 as long as Google blurs faces and license plate numbers. David Evans, senior data protection practice manager for ICO, likened the images used on Street View to those of people walking past reporters on television, images taken “without their consent, but perfectly legally.”149 Evans also said that “it is not in the public interest to turn the digital clock back. In a world where many people tweet, facebook and blog it is important to take a common sense approach towards Street View and the relatively limited privacy intrusion it may cause.”150

Google has had its share of run-ins with collecting Street View images. In May 2009, the Data Protection Authority in Greece blocked Google from capturing images in the country until it provided clarification on its measures to protect privacy, including how long it stores images.151 In Germany, the country’s highest ranking data official threatened sanctions against Google if it did not alter its practices to conform to German privacy laws, which prohibits the dissemination of photos of people or their property without their consent.152 In response, Google agreed to erase the raw images of faces, house numbers and license plates after they have been processed.153


3. Street View in Canada
Google representatives had ongoing discussions with Canada’s privacy commissioner and met with members of the House of Commons ethics committee on June 17, 2009, to prepare for its anticipated launch of Street View in the country.154 Google began collecting images in major Canadian cities in 2007. At the time, Jennifer Stoddart, Canada’s privacy commissioner, expressed concern that the application would violate the Personal Information Protection and Electronic Documents Act, which went into effect in 2004, if the images were clear enough that individuals could be identified.155

In addition to Google’s standard policy of blurring faces, Google also vowed to retain the original, unblurred images no longer than is needed to adjust its software that recognizes and automatically blurs sensitive components of images. Jacob Glick, Google Canada’s privacy counsel, said he is confident that Street View was legally compliant and that it would not launch otherwise. As of June 2009, Google was collecting images in 32 Canadian towns. The company had yet to release a planned release date for Street View in Canada.156


4. Street View and Crime
Some people are concerned that Street View aids criminals, particularly child predators, by making it easy to identify where children live due to the presence of playground equipment or toys outside of a home based on the online images. Others counter that this view is baseless because it would be more efficient for a would-be criminal to drive or travel through a specific neighborhood to find children since the Internet is not needed to find homes, playgrounds or schools where children play. The online images are also outdated the moment they are taken.

Street View has been credited for helping lead police to arrest twin brothers who were robbery suspects in the Netherlands.157 In September 2008, a 14-year-old boy told police that he had been robbed of about $230 and his cell phone after two men dragged him off of his bicycle in Groningen, about 110 miles north of Amsterdam. The boy notified police again in March when he saw an image of himself and two men he believed were his attackers on Street View. Police had to send a formal request to Google for the original photo since the faces on Street View were blurred. When police received the original photo, the robbery squad recognized one of the twins and arrested both brothers.


5. Court Challenge
As of August 2009, one lawsuit had been filed in the United States against Google’s Street View alleging that the publicly available images constituted an invasion of privacy. In Boring v. Google, Inc., 598 F. Supp. 2d 695 (W.D. Pa. 2009), a magistrate judge dismissed claims against Google of invasion of privacy, trespass, negligence and unjust enrichment.

The plaintiffs, Aaron and Christine Boring, lived on a private road north of Pittsburgh and they filed suit when they discovered photos of their residence, outbuildings and swimming pool had been included on Street View. The Borings argued that the road on which they live is unpaved and clearly marked with “Private Road” and “No Trespassing” signs. The couple alleged Google invaded their privacy by taking the photos from their driveway at a point past the signs and then making the photos available to the public.

The court examined the invasion of privacy claim on grounds of intrusion upon seclusion and publicity given to private life. The court found the plaintiffs did not meet the stringent standard under Pennsylvania law of showing that the intrusion was highly offensive and could be expected to cause “mental suffering, shame, or humiliation to a person of ordinary sensibilities.”158 The Borings did not dispute that they failed to use the available option to have the photos of their property removed from “Street View.” The court noted that the couple had done nothing to restrict access to the images, such as filing the lawsuit under seal. Instead, the suit generated publicity that resulted in even wider dissemination of the Borings’ names and location, leading to re-publication of the Street View images. The opinion mentioned that courts are not frequently asked to consider invasion of privacy claims based on virtual mapping.


E. RFIDs Can Be Tracked
Some privacy groups fear that that the growth of government-issued IDs embedded with radio frequency identification, or RFID tags, could allow the movements of people to be tracked without their knowledge. RFID technology uses radio waves to identify people or objects by reading information contained in a wireless device or “tag” from a distance without making any physical contact or requiring a line of sight.

Government officials assert that the tags will help speed border crossings, protect against counterfeiters and keep terrorists out of the country. However, there is a danger that the unique serial number in each tag could be intercepted while being transmitted. In February 2009, Chris Paget, a self-described “ethical hacker,” used a Motorola reader he bought on eBay to scan the unique serial numbers of several people while driving through San Francisco. “It really does facilitate very wide scale and very long range tracking of people,” Paget said of the RFID tags in a video of his tracking activity that appeared on YouTube.159



There is some doubt as to the extent of the privacy threat posed by the RFID tags. The Department of Homeland Security (DHS) says RFID-enabled documents can be accurately read by authorized readers from up to 30 feet away, but there have been reports of a transmission between an e-passport and a legitimate reader being intercepted from up to 160 feet.160 DHS acknowledges the potential risk in using the technology. Neville Pattinson, who serves on DHS’s Data Privacy and Integrity Advisory Committee, said that once a tag number is intercepted, “it is relatively easy to directly associate it with an individual. If this is done, then it is possible to make an entire set of movements posing as somebody else without that person’s knowledge.”161
1. RFID Tags Rise in Use
On June 1, 2009, it became mandatory for all United States citizens entering the country by land or sea from Canada, Mexico, Bermuda and the Caribbean to present documents embedded with RFID tags, although conventional passports remain valid until they expire.162 This requirement is part of the Western Hemisphere Travel Initiative, which Congress passed into law in the Intelligence Reform and Terrorism Prevention Act of 2004 on the recommendation of the 9/11 Commission. DHS has encouraged states to begin using “enhanced” driver’s licenses which are also embedded with RFID tags. These licenses are already being issued in the border states of Michigan, New York, Vermont and Washington.163
2. States Respond to RFID Tags
Some states have passed legislation that outlaws the unauthorized reading of an RFID document. In California, someone caught reading or attempting to read an RFID tag without that person’s knowledge faces up to one year in prison or a $1,500 fine.164 The California law contains exemptions in certain circumstances, such as for health care professionals to identify a patient in an emergency or for law enforcement at the scene of an accident. The law also does not apply to the unintentional reading of an RFID tag unless the identity is later used or disclosed to another party. Nevada and Washington have also passed similar laws.165

Download 445.44 Kb.

Share with your friends:
1   2   3   4   5   6   7   8   9   10




The database is protected by copyright ©ininet.org 2024
send message

    Main page