Sunday, March 27, 2016

MIRLN --- 6-26 March 2016 (v19.05)

MIRLN --- 6-26 March 2016 (v19.05) --- by Vince Polley and KnowConnect PLLC (supplemented by related Tweets: @vpolley #mirln)

permalink

NEWS | RESOURCES | LOOKING BACK | NOTES

Over half of British businesses to suffer cyber attacks by 2018, PwC says (Independent, 25 Feb 2016) - Cybercrime is expected to affect over half of British firms in the next two years, according PriceWaterhouseCoopers. PwC's latest Global Economic Crime Survey 2016 said that cyber attack will become the UK's largest economic crime by 2018. More than half of UK organisations have been the victim of an economic crime, an illegal act committed by an individual or a group to obtain a financial or professional advantage, in the last two years, outstripping countries such as the US and China. A third of UK organisations admitted they have no response plan to protect themselves from an attack. Only 12 per cent of respondents believe that law enforcement authorities have the necessary skills to help. Nearly half of UK respondents say that cybercrime would have no impact on their reputation and almost 60 per cent are not concerned about the potential for theft of intellectual property.

top

How the SEC decides whether to investigate breached entities (Vedder Price, 26 Feb 2016) - In a February 19th speech at the annual SEC Speaks conference, Stephanie Avakian, Deputy Director of the SEC's Division of Enforcement, explained what the SEC expects of entities that experience a cyber intrusion and how the SEC decides whether to investigate such entities. With respect to responding to cyber intrusion, the SEC's stated expectations are high level and axiomatic. Entities are expected to (1) assess the situation, (2) address the problem and (3) minimize the damage. Ms. Avakian emphasized the importance of quickly involving authorities such as the FBI or Department of Homeland Security. Ms. Avakian also expressed awareness of the practical impediments to self-reporting cyber intrusions to the SEC. Specifically, entities may be hesitant to do so for fear of triggering an investigation and enforcement action regarding their policies/procedures and implementation thereof. To assuage this concern, Ms. Avakian noted that the SEC's goals in the cybersecurity area are to prevent hacking, protect customer data and ensure the smooth operation of America's financial system. In other words, the SEC-at least from a priority standpoint-is on the same side as the entities that may fall prey to a cyber intrusion. In the case of registrants, when investigating cyber intrusions the SEC will focus on whether a registrant had policies and procedures reasonably designed to protect customer data and related remediation action plans. In the case of public companies, the SEC is not looking to second-guess good-faith decisions regarding data privacy, and would likely not bring an enforcement action against a cyber intrusion victim absent a "significant" disclosure issue. Ms. Avakian also pointed out that entities who self-disclose cyber intrusions will be rewarded with cooperation credit.

top

- and -

Businesses are still scared of reporting cyberattacks to the police (ZDnet, 3 March 2016) - Under a third of cyberattacks against businesses are reported to the police, suggesting that organisations are underestimating the threat posed by hackers and cybercrime, a new study has warned. According to Cyber Security: Underpinning the Digital Economy , a report by the Institute of Directors and Barclays bank, companies are keeping quiet about being the victim of a cyberattack, even if their operations were badly affected by such an incident -- as figures suggest was the case for half of respondents. The research suggests that only 28 percent of cyberattacks against businesses were reported to the police, despite many police forces now having dedicated cybercrime divisions. Indeed, the report finds that whilst nine in ten business leaders said that cybersecurity was important, only around half had a formal strategy in place to protect themselves and just a fifth held insurance against an attack.

top

- and -

Investors don't reward candor about cyber risk - but the SEC might (Baker & McKenzie, 10 March 2016) - A study by three Creighton University professors concludes that company disclosures relating to cybersecurity risk are associated with significant declines in the company's share price. Reviewing the response to the SEC's 2011 guidance on disclosure regarding cybersecurity and cyber incidents, they find that few companies have chosen to make risk disclosures prior to the occurrence of a cyber breach and that those they do make disclosure suffer a decline in market price. Meanwhile, an SEC staff member has warned that companies that fail to disclose cyber breaches may face enforcement action. In " SEC Cybersecurity Guidelines: Insights into the Utility of Risk Factor Disclosures for Investors ," Edward A. Morse, Vasant Raval, John R. Wingender reviewed how companies have responded to the SEC Division of Corporation Finance's 2011 guidance entitled "Cybersecurity." The 2011 guidance states, in part, that companies "should disclose the risk of cyber incidents if these issues are among the most significant factors that make an investment in the company speculative or risky." The Creighton study (which considers pre-incident risk disclosure) reaches the following conclusions * * *

top

DHS publishes interim regulations for cybersecurity information sharing (Steptoe, 27 Feb 2016) - Last month, the Department of Homeland Security published interim policies, procedures, and guidelines required by the Cybersecurity Act of 2015. Title I of the Act, entitled the Cybersecurity Information Sharing Act of 2015 (CISA), calls for processes and protections for sharing cybersecurity threat information between government and private sector entities. The interim regulations consist of (1) guidance to non-federal entities on how to share information; (2) guidance as to how government agencies share information; (3) guidelines for privacy and civil liberties; and (4) policies and procedures for how the government will receive and use threat data shared under the Act.

top

California courts demand total access to email and social media accounts (The Intercept, 29 Feb 2016) - As the FBI and Apple fight a media war over whether the federal government can force the computer company to hack an iPhone, in California a new privacy law is raising questions over how deeply government should be allowed to peer into a convicted criminal's digital life. That new law, the California Electronic Communications Privacy Act (CalECPA), requires law enforcement to obtain a warrant before searching a person's cellphone, laptop, or any digital storage device. At issue is whether the law covers people on probation, parole, and other forms of supervised release who've agreed to what's known as a "Fourth waiver," a condition that allows law enforcement to search their person and property at any time. CalECPA took effect on January 1, 2016. Three days later, San Diego County prosecutors and Superior Court judges began asking defendants who were eligible for probation to sign a form giving "specific consent" to county probation officers "and/or a law enforcement government entity" to collect information that would be otherwise protected under CalECPA. * * * Issues with digital privacy aside, probation conditions are supposed to be narrowly tailored to address a person's crime and what will "reasonably" prevent future criminal acts, said Jeff Thoma, outgoing president of California Attorneys for Criminal Justice. "The whole idea of probation and sentencing is to individualize something," Thoma said. "When you don't do that and are just trying to put all these restrictions, it becomes, 'Oh we might catch this person doing something.'" In late January, the San Diego County public defender's office filed a petition with a state appeals court, arguing that the consent form hadn't gone through the proper vetting process. Shortly after the appeal was filed, judges who had been using the form stopped requiring probationers to sign it, and the district attorney's office stopped including it in plea deals offering probation.

top

Time to rethink mandatory password changes (FTC, 2 March 2016) - Data security is a process that evolves over time as new threats emerge and new countermeasures are developed. The FTC's longstanding advice to companies has been to conduct risk assessments, taking into account factors such as the sensitivity of information they collect and the availability of low-cost measures to mitigate risks. The FTC has also advised companies to keep abreast of security research and advice affecting their sector, as that advice may change. What was reasonable in 2006 may not be reasonable in 2016. This blog post provides a case study of why keeping up with security advice is important. It explores some age-old security advice that research suggests may not be providing as much protection as people previously thought. When people hear that I conduct research on making passwords more usable and secure , everyone has a story to tell and questions to ask. People complain about having so many passwords to remember and having to change them all so frequently. Often, they tell me their passwords (please, don't!) and ask me how strong they are. But my favorite question about passwords is: "How often should people change their passwords?" My answer usually surprises the audience: "Not as often as you might think." I go on to explain that there is a lot of evidence to suggest that users who are required to change their passwords frequently select weaker passwords to begin with, and then change them in predictable ways that attackers can guess easily. Unless there is reason to believe a password has been compromised or shared, requiring regular password changes may actually do more harm than good in some cases. (And even if a password has been compromised, changing the password may be ineffective, especially if other steps aren't taken to correct security problems.) Mandated password changes are a long-standing security practice designed to periodically lock out unauthorized users who have learned users' passwords. While some experts began questioning this practice at least a decade ago, it was only in the past few years that published research provided evidence that this practice may be less beneficial than previously thought, and sometimes even counterproductive. Let's take a look at two excellent peer-reviewed papers that address this issue. * * *

top

Company tracks Iowa caucusgoers by their cell phones (Schneier, 2 March 2016) - It's not just governments. Companies like Dstillery are too: "We watched each of the caucus locations for each party and we collected mobile device ID's," Dstillery CEO Tom Phillips said. "It's a combination of data from the phone and data from other digital devices." Dstillery found some interesting things about voters. For one, people who loved to grill or work on their lawns overwhelmingly voted for Trump in Iowa, according to Phillips. There was some pretty unexpected characteristics that came up too. "NASCAR was the one outlier, for Trump and Clinton," Phillips said. "In Clinton's counties, NASCAR way over-indexed." What really happened is that Dstillery gets information from people's phones via ad networks. When you open an app or look at a browser page, there's a very fast auction that happens where different advertisers bid to get to show you an ad. Their bid is based on how valuable they think you are, and to decide that, your phone sends them information about you, including, in many cases, an identifying code (that they've built a profile around) and your location information, down to your latitude and longitude. Yes, for the vast majority of people, ad networks are doing far more information collection about them than the NSA­ -- but they don't explicitly link it to their names. So on the night of the Iowa caucus, Dstillery flagged all the auctions that took place on phones in latitudes and longitudes near caucus locations. It wound up spotting 16,000 devices on caucus night, as those people had granted location privileges to the apps or devices that served them ads. It captured those mobile ID's and then looked up the characteristics associated with those IDs in order to make observations about the kind of people that went to Republican caucus locations (young parents) versus Democrat caucus locations. It drilled down farther (e.g., 'people who like NASCAR voted for Trump and Clinton') by looking at which candidate won at a particular caucus location.

top

- and -

FTC issues warning letters to app developers using 'Silverpush' code (FTC, 17 March 2016) - The staff of the Federal Trade Commission has issued warning letters to app developers who have installed a piece of software that can monitor a device's microphone to listen for audio signals that are embedded in television advertisements. Known as Silverpush, the software is designed to monitor consumers' television use through the use of "audio beacons" emitted by TVs, which consumers can't hear but can be detected by the software. The letters note that the software would be capable of producing a detailed log of the television content viewed while a user's mobile device was turned on for the purpose of targeted advertising and analytics. The letters note that Silverpush has stated publicly that its service is not currently in use in the United States, but it encourages app developers to notify consumers that their app could allow third parties to monitor consumers' television viewing habits should the software begin to be used in the United States. "These apps were capable of listening in the background and collecting information about consumers without notifying them," said Jessica Rich, Director of the FTC's Bureau of Consumer Protection. "Companies should tell people what information is collected, how it is collected, and who it's shared with." The warning letters note that app developers ask users for permission to use the device's microphone, despite the apps not appearing to have a need for that functionality. The letters also note that nowhere do the apps in question provide notice that the app could monitor television-viewing habits, even if the app is not in use. The letters warn the app developers that if their statements or user interface state or imply that the apps in question are not collecting and transmitting television viewing data when in fact they do, that the app developers could be in violation of Section 5 of the FTC Act. The FTC provided guidance in a 2013 staff report on best practices for privacy disclosures in mobile apps . The letters were issued to 12 app developers whose apps are available for download in the Google Play store and appear to include the Silverpush code.

top

Sounds emitted by 3D printers could put intellectual property at risk (3Ders.org, 2 March 2016) - A new study from the University of California, Irvine, has revealed the surprising fact that the sounds emitted from a 3D printer could be enough to compromise valuable intellectual property, allowing cyber attackers to reverse-engineer and re-create 3D printed objects based off of nothing more than a smartphone audio recording. The research was led by Mohammad Al Faruque, electrical engineer, computer scientist, and director of UCI's Advanced Integrated Cyber-Physical Systems Lab. He and his team demonstrated that the acoustic signals emitted by a 3D printer carry unique information about the precise movements of the nozzle, and that this information can be reverse-engineered to reveal the object's original source code. The acoustic information is in fact so precise, that Al Faruque and his team were able to recreate a key-shaped object with nearly 90 percent accuracy using only the 3D printer's audio recordings. If used maliciously, the technique could represent a significant security threat.

top

- and -

How White Hat hackers stole crypto keys from an offline laptop in another room (Motherboard, 15 Feb 2016) - In recent years, air-gapped computers, which are disconnected from the internet so hackers can not remotely access their contents, have become a regular target for security researchers . Now, researchers from Tel Aviv University and Technion have gone a step further than past efforts, and found a way to steal data from air-gapped machines while their equipment is in another room. "By measuring the target's electromagnetic emanations, the attack extracts the secret decryption key within seconds, from a target located in an adjacent room across a wall," Daniel Genkin, Lev Pachmanov, Itamar Pipman, and Eran Tromer write in a recently published paper . The research will be presented at the upcoming RSA Conference on March 3. "The attack in its current form uses lab equipment that costs about $3000 and, as shown in the photos, is somewhat unwieldy," Tromer told Motherboard in an email. "However, experience shows that once the physical phenomena are understood in the lab, the attack setup can be miniaturized and simplified." Although similar research on "listening" to steal crypto keys has been carried out before , this is the first time such an approach has been used specifically against elliptic curve cryptography running on a PC, the authors say.

top

Federal Circuit recognizes patent agent privilege (Patently-O, 7 March 2016) - In an interesting and important mandamus ruling, the Federal Circuit has ordered the district court to withdraw its order compelling discovery of communications with non-attorney patent agents. The decision here recognizes "patent agent privilege": [W]e find that the unique roles of patent agents, the congressional recognition of their authority to act, the Supreme Court's characterization of their activities as the practice of law, and the current realities of patent litigation counsel in favor of recognizing an independent patent-agent privilege. The court, however, includes the important limitation that the privilege only extends to the extent that communications fall within the patent agent's scope-of practice as "authorized by Congress."

top

Google's Project Fi mobile network is now open to everyone in the US (The Verge, 7 March 2016) - Project Fi is ditching the invite system. 10 months after Google unveiled its own mobile network, which lets consumers pay only for the amount of data they use each month, the company is opening access to everyone inside the United States. "With Project Fi, we deliver fast wireless service with the flexibility to use it where you want (even internationally) and a monthly bill that's simple and easy to understand," wrote Simon Arscott, Fi's product manager, in a blog post. "Today, we're excited to be exiting our invitation-only mode and opening up Project Fi so that people across the U.S. can now sign up for service without having to wait in-line for an invite." For the next month, Google is discounting the Nexus 5X down to $199 as an inexpensive way to get started with Fi, which only works with Nexus smartphones. Project Fi connects to the cellular networks of both T-Mobile and Sprint, switching between the two to offer customers the best possible coverage. Google is also pushing Wi-Fi and public hotspots in a big way with Fi; over 50 percent of current customers connect to public hotspots using Fi's "Wi-Fi Assistant" on a weekly basis. As for cellular data, Google's Project Fi subscribers are impressively lean in their usage, averaging 1.6GB of data each month.

top

Maryland court suppresses evidence gathered by warrantless Stingray use (TechDirt, 9 March 2016) - The Maryland Special Appeals Court isn't buying government lawyers' arguments that warrantless deployment of Stingray devices has no 4th Amendment implications. The government had argued that " everyone knows " phones generate location data when turned on and this information is "shared with the rest of the world" (but most importantly with law enforcement). The court has yet to release its written opinion, but it did issue a one-page order upholding the lower court's suppression of evidence related to law enforcement's use of a Stingray. This ruling is especially important in Maryland, where Baltimore police have used the devices hundreds of times a year without seeking warrants or notifying judges and defendants about the origins of evidence . As has been noted here, the Baltimore police use pen register orders to deploy Stingrays, allowing it obscure the usage of the devices as well as to avail itself of lower evidentiary demands. This won't be the case going forward.

top

Legal industry was heavily targeted with cyber threats in January (Bloomberg, 9 March 2016) - The legal industry reported more "cyber threats" in January than nearly any other sector, according to one estimate. The estimate is taken from a report by the IT security company TruShield, and was published last week. Only the retail industry, followed by the financial industry were targeted more than the legal industry in January, the report found. It is consistent with other months for the legal industry to be in the top three most targeted, the report said. The majority of the threats in January, which include spamming, phishing, malware and scanning, originated in the U.S., followed by China and then South Korea. The report noted, however, that 60 to 70 percent of the malicious traffic from South Korea actually originates in China. Eran Kahana, a cyber security lawyer at the Maslon Law Firm in Minneapolis, said his own advice to law firms is that they gather their attorneys who deal in litigation, in cybersecurity and in privacy law so and come up with a plan for handling cyber threats. Kahana added that they must remember that the firm is no different from any other business and that it is open to the threat of cyber-attacks. The report called it a surprise that the legal industry did not face any significant incidents, despite the high number of threats. Laura Jehl, co-chair of Sheppard Mullin's data security group in Washington, D.C., who reviewed the report said the lack of significant events, such as a data breach, in the legal industry is likely because law firms are investing in network security. "I don't think they're necessarily safe," said Jehl, about law firms. "I think there's an element of luck, but I would hope there's been good training and preparation." [ Polley : I think it's due to a lack of publicity.]

top

- and -

FBI alert warns of criminals seeking access to law firm networks (Bloomberg, 11 March 2016) - Earlier this month, the FBI's cyber division issued an alert that it has information that hackers are specifically targeting international law firms as part of an insider trading scheme. "In a recent cyber criminal forum post, a criminal actor posted an advertisement to hire a technically proficient hacker for the purposes of gaining sustained access to the networks of multiple international law firms," the alert from March 3rd stated. The FBI alert - 160304-001 - didn't share any other information, such as the name of the forum where it saw this post, or when it exactly it was posted. But it did say that it believed the criminal behind the post is interested in obtaining sensitive information for insider trading purposes. The alert which was sent to some law firms did not appear to be posted online. "This goes well beyond hacking to obtain personal data and credit card numbers, " Michael Overly, a partner at Foley & Lardner who focuses on cyber security issues, wrote in an email, adding the alert highlights the growing sophistication of hackers. "In all honesty, I believe many law firms, particularly small and mid-size firms are behind the curve when it comes to addressing information security," Overly added. "That is certainly changing as clients are now routinely sending security due diligence questionnaires to their counsel to assess the security preparedness of their firms." In March 2015, the New York Times reported on an internal Citigroup report that found "digital security at many law firms, despite improvements, generally remains below the standards for other industries." Overly predicted that firms with poor security will lose clients and those with better security will gain a competitive advantage. Laura Jehl, a Sheppard Mullin Richter & Hampton partner who works on cyber security, said the alert was "disturbing," but "not really surprising." "We've known for a while that law firms are a frequent target of hackers because they hold significant amounts of non-public information," Jehl wrote in an email. "The FBI warning is a clear reminder to firms that they need to protect their networks and be alert to increasingly sophisticated phishing and other schemes."

top

- and -

Help wanted: Insider trader seeks hacker to access law-firm networks (ABA Journal, 14 March 2016) - An FBI alert issued earlier this month warns law firms about an online ad seeking a hacker to access the networks of international law firms. The ad, posted to a cyber criminal forum, listed search terms that could contribute to an insider-trading scheme, Bloomberg Big Law Business reports. The FBI alert was sent to some law firms. Bloomberg Big Law Business spoke with cyber security lawyers for their take on the alert. Michael Overly, a partner at Foley & Lardner, told the publication the alert shows how hackers are growing increasingly sophisticated. "In all honesty, I believe many law firms, particularly small and mid-size firms are behind the curve when it comes to addressing information security," Overly said. "That is certainly changing as clients are now routinely sending security due diligence questionnaires to their counsel to assess the security preparedness of their firms." Pillsbury partner Brian Finch agreed that cyber security is an increasing focus. He said many international law firms have been upgrading their security networks, particularly law firms serving large financial institutions that are demanding better security. "It's also becoming an ethics requirement among the state bars," Finch told Bloomberg Big Law Business. "They're increasingly focused on it and I think that will drive attention to the issue."

top

- and -

Cybersecurity experts offer stern warnings, tips for security in mass-surveillance era (ABA Journal, 19 March 2016) - FaceTime is actually a pretty secure way to communicate. The FBI can access the camera on your laptop without you knowing about it. And lawyers should think twice before storing their confidential files on Dropbox. Those were just some of the tips and warnings given out by a panel consisting of cybersecurity heavyweights during a Friday evening plenary session at ABA Techshow . The panel, entitled "Can They Hear Me Now? Practicing Law in an Age of Mass Surveillance," was moderated by Above the Law's managing editor David Lat and consisted of digital rights attorney Marcia Hofmann , American Civil Liberties Union technologist Chris Soghoian and ACLU attorney Ben Wizner . The plenary session expanded on some of the themes Electronic Frontier Foundation executive director Cindy Cohn talked about during her Friday afternoon keynote address -particularly mass surveillance and the need for greater awareness of cybersecurity. Panelists focused on providing practical tips for attorneys on how best to safeguard their confidential information when everyone seems to be trying to steal it. * * *

top

- and -

Amid hacking threats, law firms turn to cyber insurance (American Lawyer, 21 March 2016) - With news of crippling cyber attacks against big companies making regular headlines, more and more law firms are buying cyber insurance to cover the cost of a data breach. According to insurance brokerage Aon, more than 60 out of the 250 medium and large law firms that it services have purchased cyber insurance within the last two years. Marsh said that close to 40 percent of its roughly 100 large law firm clients have purchased the insurance, up from 20 percent two years ago. The policies that law firms typically carry, such as lawyers' professional liability insurance, general liability insurance and property insurance, do not always provide coverage when employee rather than client data is compromised, or when the firm must hire a forensic team to determine what data was lost and how. They also most likely won't cover the cost of notifying regulators or engaging a public relations firm. Daniel Garrie, co-head of the cybersecurity practice at Zeichner Ellman & Krause, identified another factor that is pushing firms to buy cyber insurance. "Their clients are compelling the action," Garrie said. "They're requiring the law firms to have cyber insurance as a matter of business."

top

Federal Circuit: No new card game patents unless you also invent a new deck (Patently-O, 10 March 2016) - Ray and Amanda Smith's patent applications claims a new method of playing Blackjack. The new approach offers ability to bet on the occurrence of "natural 0" hands as well as other potential side bets. Claim 1 in particular requires a deck of 'physical playing cards" that are shuffled and then dealt according to a defined pattern. Bets are then taken with the potential of more dealing and eventually all wagers are resolved. In reviewing the application, the Examiner Layno (Games art unit 3711) rejected these card games patents as ineligible under Section 101 - noting that the claim is "an attempt to claim a new set of rules for playing a card game [and thus] qualifies as an abstract idea." The Patent Trial & Appeal Board affirmed that ruling - holding that "independent claim 1 is directed to a set of rules for conducting a wagering game which . . . constitutes a patent-ineligible abstract idea." The particular physical steps such as shuffling and dealing are conventional elements of card-gambling and therefore (according to the Board) insufficient to transform the claimed abstract idea into a patent eligible invention. On appeal, the Federal Circuit has affirmed - agreeing that the method of playing cards is an unpatentable abstract idea. The court held that a wagering game is roughly identical to fundamental economic practices that the Supreme Court held to be abstract ideas in Alice and Bilski .

top

Microsoft: We store disk encryption keys, but we've never given them to cops (Motherboard, 11 March 2016) - Microsoft says it has never helped police investigators unlock its customers' encrypted computers-despite the fact that the company often holds the key to get their data. If you store important stuff on your computer, it's great to have the option to lock it up and encrypt your data so that no one can access it if you ever lose your laptop or it gets stolen. But what happens if, one day, you forget your own password to decrypt it? To give customers a way to get their data back in this situation, Microsoft has been automatically uploading a recovery key in the cloud for Windows computers since 2013. In light of the ongoing battle between Apple and the FBI over encryption, surveillance experts and technologists have criticized Microsoft for this feature because it doesn't give users a choice (other than deleting the key afterwards), and it gives the government the option to request that key from Microsoft if it ever needs it to get into a suspect's Windows computer. It's unclear if the US government, or any government, ever asked Microsoft for that, but a company spokesperson told Motherboard that Microsoft has never turned over customers' keys. "We haven't provided a customer encryption key to law enforcement," a Microsoft spokesperson told me in an email. [ Polley : Parse their language carefully - it's not credible that MS hasn't assisted law enforcement, and if they had they'd likely be under disclosure restrictions. I'd bet that the quote means that MS has given plaintext to law enforcement, but not the keys themselves. Turning over enough plaintext, of course, facilitates key discernment; might be equivalent to key delivery.]

top

TP-Link blocks open source router firmware to comply with new FCC rule (Ars Technica, 11 March 2016) - Networking hardware vendor TP-Link says it will prevent the loading of open source firmware on routers it sells in the United States in order to comply with new Federal Communications Commission requirements. The FCC wants to limit interference with other devices by preventing user modifications that cause radios to operate outside their licensed RF (radio frequency) parameters. The FCC says it doesn't intend to ban the use of third-party firmware such as DD-WRT and OpenWRT; in theory, router makers can still allow loading of open source firmware as long as they also deploy controls that prevent devices from operating outside their allowed frequencies, types of modulation, power levels, and so on. But open source users feared that hardware makers would lock third-party firmware out entirely, since that would be the easiest way to comply with the FCC requirements. The decision by TP-Link-described by the company in this FAQ -shows that those fears were justified. TP-Link's FAQ acknowledges that the company is "limiting the functionality of its routers." "The FCC requires all manufacturers to prevent user[s] from having any direct ability to change RF parameters (frequency limits, output power, country codes, etc.)," TP-Link says. TP-Link says that it distributes devices with country-specific firmware and that "devices sold in the United States will have firmware and wireless settings that ensure compliance with local laws and regulations related to transmission power." TP-Link says the change will go into effect for routers produced on and after June 2, 2016, a date set by the FCC in guidance issued in November .

top

Should all research papers be free? (NYT, 12 March 2016) - Drawing comparisons to Edward Snowden , a graduate student from Kazakhstan named Alexandra Elbakyan is believed to be hiding out in Russia after illegally leaking millions of documents. While she didn't reveal state secrets, she took a stand for the public's right to know by providing free online access to just about every scientific paper ever published, on topics ranging from acoustics to zymology. Her protest against scholarly journals' paywalls has earned her rock-star status among advocates for open access, and has shined a light on how scientific findings that could inform personal and public policy decisions on matters as consequential as health care, economics and the environment are often prohibitively expensive to read and impossible to aggregate and datamine. "Realistically only scientists at really big, well-funded universities in the developed world have full access to published research," said Michael Eisen , a professor of genetics, genomics and development at the University of California, Berkeley, and a longtime champion of open access. "The current system slows science by slowing communication of work, slows it by limiting the number of people who can access information and quashes the ability to do the kind of data analysis" that is possible when articles aren't "sitting on various siloed databases." Journal publishers collectively earned $10 billion last year, much of it from research libraries, which pay annual subscription fees ranging from $2,000 to $35,000 per title if they don't buy subscriptions of bundled titles, which cost millions. The largest companies, like Elsevier, Taylor & Francis, Springer and Wiley, typically have profit margins of over 30 percent, which they say is justified because they are curators of research, selecting only the most worthy papers for publication. Moreover, they orchestrate the vetting, editing and archiving of articles. That is the argument Elsevier made, supported by a raft of industry amicus briefs, when it filed suit against Ms. Elbakyan, resulting in an injunction last fall against her file-sharing website, Sci-Hub . But since a federal court order isn't enforceable in Russia (Ms. Elbakyan won't confirm where she is exactly), much less on the Internet, Sci-Hub continues to deliver hundreds of thousands of journal articles per day to a total of 10 million visitors.

top

- and -

Handful of biologists went rogue and published directly to Internet (Amy Harmon in NYT, 15 March 2016) - On Feb. 29, Carol Greider of Johns Hopkins University became the third Nobel Prize laureate biologist in a month to do something long considered taboo among biomedical researchers: She posted a report of her recent discoveries to a publicly accessible website , bioRxiv, before submitting it to a scholarly journal to review for "official" publication. It was a small act of information age defiance, and perhaps also a bit of a throwback, somewhat analogous to Stephen King's 2000 self-publishing an e-book or Radiohead's 2007 release of a download-only record without a label. To commemorate it, she tweeted the website's confirmation under the hashtag #ASAPbio, a newly coined rallying cry of a cadre of biologists who say they want to speed science by making a key change in the way it is published. Such postings are known as "preprints" to signify their early-stage status, and the 2,048 deposited on three-year-old bioRxiv over the last year represent a barely detectable fraction of the million or so research papers published annually in traditional biomedical journals. But after several dozen biologists vowed to rally around preprints at an "ASAPbio" meeting last month, the site has had a small surge, and not just from scientists whose august stature protects them from risk. On Twitter, preprint insurgents are celebrating one another's postings and jockeying for revolutionary credibility. * * *

top

VPN provider's no-logging claims tested in FBI case (Slashdot, 12 March 2016) - An anonymous reader writes from an article published on TorrentFreak: [A] criminal complaint details the FBI's suspicions that 25-year-old Preston McWaters had conveyed " false or misleading information regarding an explosive device ." The FBI started digging and in February 2016 two search warrants against Twitter and Facebook required them to turn over information on several accounts. Both did and the criminal complaint makes it clear that the FBI believes that McWaters was behind the accounts and the threats. With McWaters apparently leaving incriminating evidence all over the place (including CCTV at Walmart where he allegedly purchased a pre-paid Tracfone after arriving in his own car), the FBI turned to IP address evidence available elsewhere. "During the course of the investigation, subpoenas and search warrants have been directed to various companies in an attempt to identify the internet protocol (IP) address from where the email messages are being sent ," the complaint reads. "All the responses from [email provider] 1&1, Facebook, Twitter, and Tracfone have been traced by IP address back to a company named London Trust Media [doing business as] PrivateInternetAccess.com. A subpoena was sent to London Trust Media and the only information they could provide is that the cluster of IP addresses being used was from the east coast of the United States," the FBI's complain reads. "However, London Trust did provide that they accept payment for their services through credit card with a vendor company of Stripe and/or Amazon. They also accept forms of payment online through PayPal, Bitpay, Bit Coin, Cash You, Ripple, Ok Pay, and Pay Garden." [ Polley : This is one of the VPN services I use.]

top

White House requires agencies to share custom code with open-source community (SC Magazine, 14 March 2016) - The White House has released for public comment a draft of its Source Code Policy , which establishes rules for sharing customized software between federal agencies, in the hopes of improving government access to applications and reducing development costs. As part of this policy, the Obama Administration will also launch a pilot program that will require federal agencies to release at least 20 percent of third-party-developed custom coding as open source software, making it fully accessible to external developers within the open-source community. "Through this policy and pilot program, we can save taxpayer dollars by avoiding duplicative customer software purchases and promote innovation and collaboration across federal agencies," said Tony Scott , U.S. CIO, in an online blog post last week.

top

Crowdfunded 'Star Trek' fan film violates Klingon language copyright, says lawsuit by major studios (ABA Journal, 14 March 2016) - Boldly going where no lawsuit has gone before, two movie studios are contending that a crowdfunded Star Trek fan film has violated copyright law by-among many other things-using the Klingon language. But the original complaint by Paramount Pictures Corp. and CBS Studios Inc. wasn't detailed enough, Axanar Productions Inc. contended in a motion to dismiss the federal suit. So on Friday the plaintiffs filed an amended complaint against Axanar and lead producer Alec Peters. Among other allegations, it says the filmmakers infringed on Star Trek copyrights by depicting characters with the "Vulcan appearance," including pointed ears, wearing gold uniform shirts and, most interesting from a legal standpoint, speaking the Klingon language, says the Hollywood Reporter's THR, Esq. blog. Can a language, in fact, be copyrighted? That question has not yet been answered, the article says. As the lawsuit notes, "Klingonese or Klingon, the native language of Qo'NoS, was first spoken in Star Trek-The Motion Picture in 1979. It was used in several works moving forward, including Star Trek III The Search for Spock ." An earlier Geek post provides more details about the case, which was filed in federal district court in the Central District of California.

top

Judge says Chipotle social media rules violated labor law, orders rehiring of worker fired for tweet (ABA Journal, 16 March 2016) - Fired last year for criticizing Chipotle wages in a tweet, a server at one of the chain's suburban Philadelphia restaurants must now be rehired and get back pay, an administrative law judge ruled Monday. Social media rules at Chipotle that banned such critical comments violated the National Labor Relations Act, found the judge, who also is requiring the company to post signs acknowledging their error. The Associated Press and the Philadelphia Inquirer have stories. Plaintiff James Kennedy, who is now working for an airline in a union job at Philadelphia International Airport told the Inquirer he is very happy with his new position, which he got about a month after being fired by Chipotle. He also said he would be happy to accept food vouchers from Chipotle for some of the damages he is due.

top

Are ad blockers needed to stay safe online? (MIT Technology Review, 16 March 2016) - Last weekend some of the world's largest websites exposed millions of people to malicious software that encrypts data and demands money for its safe return. The incident adds weight to an argument made by some security experts that using software to block online ads is necessary to stay safe online. Security company Malwarebytes reports that MSN, the New York Times, BBC, and AOL were among those that served up the ransomware , as such software is known. It happened because those sites, like many, use third-party companies to display advertising. Criminals have a strong incentive to sneak malicious ads into ad networks because their reach is huge. This is far from the first time this has happened-Yahoo, Forbes, and the Economist have all been caught out in the same way in the past. And some research suggests the problem is growing . Because of this, some security experts say that apart from the ethical and business questions of whether it's okay to block online ads that support free content, you should do so just to stay safe . That was the conclusion of a study of the malicious ads problem led by the University of California, Santa Barbara , that singled out a popular ad blocker called Adblock Plus as the most effective defense against bad ads. Edward Snowden, the federal contractor who leaked information about NSA surveillance, also recommends ad blockers for safety reasons . The way some popular ad blockers are trying to make themselves more acceptable to publishers and the ad industry could undermine their protective effect, though. Adblock Plus, for example, will let ads through if they meet certain criteria , such as not showing moving imagery. The company behind the ad blocker even charges companies including Amazon and Google to include their ads in that scheme. Adblock Plus's criteria for "acceptable ads" don't include mention of security, and it and other companies that offer ad blockers are unlikely to have the resources to screen out malicious ads.

top

San Francisco legislators dodging public records requests with self-destructing text messages (Techdirt, 17 March 2016) - Cory Weinberg of The Information reports San Francisco legislators [warning: paywalled link] are using one of those infamous tools o' terrorism -- messaging service Telegram -- to dodge open records requests. [ Link to a non-paywalled story covering the same thing]: In an interview, a San Francisco government staff member said they were encouraged to use the app by colleagues in City Hall who described it as a way to skirt the city's public records laws. "That is exactly what it's being used for," the staff member said. "It's caught on." April Veneracion, a top aide to Supervisor Jane Kim and a Telegram user, said one reason officials use the app is because it "self destructs." She also praised the app's chat room feature that "allows us to be in touch with each other almost instantaneously." Yes, messaging apps are great for instant communications. Self-destructing messages, however, are antithetical to public records laws. Also: possibly illegal.

top

EU Court of Justice advocate general says open WiFi operators shouldn't be liable for infringement (Techdirt, 17 March 2016) - Back in 2010, there was a troubling ruling in Germany, saying that people who ran open WiFi access points needed to secure them , or they could be held liable for people using those connections to download infringing content. This seemed to contradict with the European Ecommerce Directive that gives safe harbors to internet service providers (similar to our DMCA safe harbors in the US). In the fall of 2014, we noted that the EU Court of Justice was taking up that case and now that court's Advocate General has recommended that the court allow open WiFi , in saying that, yes, those who operate WiFi access points can be considered ISPs under the law, and are thus protected from liability. * * *

top

Face-tracking software lets you make anyone say anything in real time (Mashable, 20 March 2016) - You know how they say, "Show me pictures or video, or it didn't happen"? Well, the days when you could trust what you see on video in real time are officially coming to an end thanks to a new kind of face tracking. A team from Stanford, the Max Planck Institute for Informatics and the University of Erlangen-Nuremberg has produced a video demonstrating how its software, called Face2Face , in combination with a common webcam, can make any person on video appear to say anything a source actor wants them to say. In addition to perfectly capturing the real-time talking motions of the actor and placing them seamlessly on the video subject, the software also accounts for real-time facial expressions, including distinct movements such as eyebrow raises. To show off the system, the team used YouTube videos of U.S. President George W. Bush, Russian President Vladimir Putin and Republican presidential candidate Donald Trump . In each case, the facial masking is flawless, effectively turning the video subject into the actor's puppet. It might be fun to mix this up with something like "Say it with Trump," but for now the software is still in the research phase. "Unfortunately, the software is currently not publicly available - it's just a research project," team member Matthias Niessner told Mashable . "However, we are thinking about commercializing it given that we are getting so many requests." We knew this kind of stuff was possible in the special effects editing room, but the ability to do it in real time - without those nagging "uncanny valley" artifacts - could change how we interpret video documentation forever. [ Polley : Watch the demo; unless they cheated, this is game-changing stuff.]

top

Siri and iAd restricted by Apple 'policy czars' to limit customer data collection (MacRumors, 21 March 2016) - Reuters has published a new report outlining how a team of "policy czars" has impacted Apple's data collection policy and restricted Siri and iAd in the process: Unlike Google, Amazon and Facebook, Apple is loathe to use customer data to deliver targeted advertising or personalized recommendations. Indeed, any collection of Apple customer data requires sign-off from a committee of three "privacy czars" and a top executive, according to four former employees who worked on a variety of products that went through privacy vetting. The three "policy czars" are Jane Horvath, a lawyer who served as global policy counsel at Google, Guy Tribble, a member of the original Macintosh team and the vice president of software technology who spends a significant amount of time on privacy, and Erik Neuenschwander, who reviews lines of engineer's code to confirm that they're following policy.

top

Lexmark: Can patent rights overwhelm traditional notions of title? (Patently-O, 22 March 2016) - I see the dispute between Impression and Lexmark as more of a property law issue than one focusing on patent law. Of course, the Federal Circuit sees it differently. In its en banc opinion, the Federal Circuit reaffirmed (1) that a seller can use its patent rights to block both downstream resale and downstream reuse of a product (here used printer ink cartridges) and (2) that sales of a product abroad presumptively do not exhaust the US patent rights associated with that product, even when the US patent holder expressly authorizes those foreign sales. Both of these holdings turn on the fact that the goods in question are covered by patent rights. For unpatented goods, these covenants and restrictions generally do not bind subsequent bona fide purchasers. Impression raises the following questions in its newly filed petition for writ of certiorari: 1. Whether a "conditional sale" that transfers title to the patented item while specifying post-sale restrictions on the article's use or resale avoids application of the patent exhaustion doctrine and therefore permits the enforcement of such post-sale restrictions through the patent law's infringement remedy. 2. Whether, in light of this Court's holding in Kirtsaeng v. John Wiley & Sons, Inc., 133 S. Ct. 1351, 1363 (2013), that the common law doctrine barring restraints on alienation that is the basis of exhaustion doctrine "makes no geographical distinctions," a sale of a patented article-authorized by the U.S. patentee-that takes place outside of the United States exhausts the U.S. patent rights in that article. I see the Federal Circuit's decision as dangerous in the way that it undercuts the notion of ownership and transfer-of-title. Restrictions on use and resale of goods have traditionally been unenforceable against downstream owners as a mechanism for facilitating a robust market economy. Impression Products, Inc. v. Lexmark Int'l, Inc. (Supreme Court 2016)

top

RESOURCES

Electronic Signature Laws Around the World: Download eBook (General Counsel News, 17 March 2016) - Electronic signatures are in use across the globe, reports eSignLive in a new ebook the company has made available for complimentary downloading. The widespread adoption of e-signatures has been supported by electronic signature laws around the world, including the Americas, Europe, Middle East, Africa and Asia-Pacific. Many of these are based on a model law enacted by the United Nations Commission on International Trade Law - Model Law on Electronic Signatures (2001). Today there are more than 75 countries that recognize the legal validity of e-signatures. This eBook provides an introduction to electronic signature laws around the world, including * * *

top

LOOKING BACK - MIRLN TEN YEARS AGO

(note: link-rot has affected about 50% of these original URLs)

New security glitch found in Diebold system (InsideBayArea.com, 10 May 2006) -- Elections officials in several states are scrambling to understand and limit the risk from a "dangerous" security hole found in Diebold Election Systems Inc.'s ATM-like touch-screen voting machines. The hole is considered more worrisome than most security problems discovered on modern voting machines, such as weak encryption, easily pickable locks and use of the same, weak password nationwide. Armed with a little basic knowledge of Diebold voting systems and a standard component available at any computer store, someone with a minute or two of access to a Diebold touch screen could load virtually any software into the machine and disable it, redistribute votes or alter its performance in myriad ways. "This one is worse than any of the others I've seen. It's more fundamental," said Douglas Jones, a University of Iowa computer scientist and veteran voting-system examiner for the state of Iowa. "In the other ones, we've been arguing about the security of the locks on the front door," Jones said. "Now we find that there's no back door. This is the kind of thing where if the states don't get out in front of the hackers, there's a real threat." This newspaper is withholding some details of the vulnerability at the request of several elections officials and scientists, partly because exploiting it is so simple and the tools for doing so are widely available. A Finnish computer expert working with Black Box Voting, a nonprofit organization critical of electronic voting, found the security hole in March after Emery County, Utah, was forced by state officials to accept Diebold touch screens, and a local elections official let the expert examine the machines.

top

- and -

MD House approves paper ballots (Washington Post, 10 March 2006) -- The Maryland House of Delegates unanimously passed legislation yesterday to ditch the state's touch-screen voting machines for the coming election in favor of a system that uses paper ballots. The 137 to 0 vote in the House and the endorsement of the plan this week by Republican Gov. Robert L. Ehrlich Jr. represents a stunning turnaround for a state that was on the leading edge of touch-screen voting in 2001, and it reflects a national shift toward machines that provide a paper record. The touch-screen system, for which Maryland has committed more than $90 million, would be put aside for one year while the state spends at least $13 million to lease optical scan machines. "It's critically important for voters to know their vote was cast and that it will be counted correctly," said Del. Obie Patterson (D-Prince George's). The fate of the plan in the Senate is less certain, and Ehrlich has not set aside money in his budget to lease the new machines. Senate President Thomas V. Mike Miller Jr. (D-Calvert) yesterday defended the record of the state's touch-screen machines and said that changing systems six months before an election would cause headaches for local administrators and lead to long lines and late returns.

top

AND NOW SEE:

Why hasn't Internet voting caught on? This expert has a nefarious theory (WaPo, 24 March 2016)

NOTES

MIRLN (Misc. IT Related Legal News) is a free e-newsletter published every three weeks by Vince Polley at KnowConnect PLLC. You can subscribe to the MIRLN distribution list by sending email to Vince Polley ( mailto:vpolley@knowconnect.com?subject=MIRLN ) with the word "MIRLN" in the subject line. Unsubscribe by sending email to Vince with the words "MIRLN REMOVAL" in the subject line.

Recent MIRLN issues are archived at www.knowconnect.com/mirln . Get supplemental information through Twitter: http://twitter.com/vpolley #mirln.

SOURCES (inter alia):

1. The Filter, a publication of the Berkman Center for Internet & Society at Harvard Law School, http://cyber.law.harvard.edu

2. InsideHigherEd - http://www.insidehighered.com/

3. SANS Newsbites, http://www.sans.org/newsletters/newsbites/

4. NewsScan and Innovation, http://www.newsscan.com

5. Aon's Technology & Professional Risks Newsletter

6. Crypto-Gram, http://www.schneier.com/crypto-gram.html

7. Steptoe & Johnson's E-Commerce Law Week

8. Eric Goldman's Technology and Marketing Law Blog, http://blog.ericgoldman.org/

9. The Benton Foundation's Communications Headlines

10. Readers' submissions, and the editor's discoveries

This work is licensed under the Creative Commons Attribution-Share Alike 3.0 United States License. To view a copy of this license, visit or send a letter to Creative Commons, 543 Howard Street, 5th Floor, San Francisco, California, 94105, USA.

PRIVACY NOTICE: Addresses and other personal information provided during the subscription process will be kept confidential, and will not be used for any other purpose. top

No comments: