Posts

Why Is DOD Paying Dataminr $13M for Data It Claims to Believe Twitter Won’t Deliver?

Last week I did a post on John McCain’s promise, given in a Senate Armed Services Committee hearing, to “expose” Twitter for refusing to share you Tweets in bulk with intelligence agencies. Later in the hearing, Jeanne Shaheen returned to the issue of Twitter’s refusal to let Dataminr share data in bulk with the Intelligence Community. She asked Under Secretary for Intelligence Marcell Lettre what the committee needs to get more cooperation. Lettre responded by suggesting one-on-one conversations between Executive Branch officials and the private sector tends to work. Shaheen interrupted to ask whether such an approach had worked with Twitter. Lettre responded by stating, “the the best of my knowledge, Twitter’s position hasn’t changed on its level of cooperation with the US intelligence community.”

That’s interesting, because on August 26, 2016, DOD announced its intent to sole-source a $13.1 million one-year contract with Dataminr to provide alerting capability based off Twitter’s Firehose.

The Department of Defense (DoD), Washington Headquarters Services, Acquisition Directorate (WHS/AD), on behalf of the Office of the Under Secretary of Defense for Intelligence (OUSDI) intends to award a sole source contract pursuant to the requirements of 41 U.S.C. 3304(a)(1) Competition in Contracting Act of 1984 (CICA) as implemented by FAR Subpart 6.3, and IAW the requirements of FAR Subpart 6.303-1, Only One Responsible Source and No Other Supplies or Services will Satisfy Agency Requirements.

WHS/AD intends to issue this sole source contract to Dataminr, Inc located at 99 Madison Ave Floor 3, New York, NY 10016 (CAGE 6Q6Z6). The anticipated Period of Performance for 1500 license subscriptions are 12 months from the date of contract award. The estimated value of this procurement is approximately $13.1M.

This contract will address the requirements of OUSDI Technical Collection and Special Programs division. The award will be made for licenses, support, and maintenance which allows DoD to receive indication and warnings, situational awareness, and contextual analysis of social media data in order to provide actionable decision support in response to real-time information.

Salient Characteristics of the Data Analytics Software: The contractor shall deliver an alerting capability that, at a minimum, includes:

  • Alerting: Based on the algorithmic analysis of the complete Twitter Firehose, the Contractor shall deliver near-real time alerts on breaking developments relevant to military security.
  • Content: The Contractor’s platform shall generate data from the Twitter firehose. Alerts shall include from the original data source at least the text, embedded links, and associated metadata, to include the Tweet ID.

Perhaps the Under Secretary of Defense for Intelligence’s Technical Collection and Special Programs division doesn’t count as “intelligence community,” but it sure seems to qualify.

Or perhaps there are a number of loopholes in the policy that purports to keep Twitter customers’ data out of the hands of intelligence agencies.

John McCain Wants to “Expose” Twitter for Refusing to Sell Your Twitter Data in Bulk to CIA

John McCain just had a hearing on cybersecurity. The primary point of the hearing seems to have been to get Admiral Mike Rogers to say the nation would be less safe if we split CYBERCOM Commander from Director of NSA (that is, if we split his job into two). That’s in apparent contradiction to what Rogers said at an industry conference last week.

McCain’s secondary point seems to have been to raise concerns that an unsuccessful attempt by hackers to access Arizona voting data might affect his re-election effort.

His tertiary point seems to have been to attack Apple and Twitter for making efforts to protect their customers. After getting a witness to comment about Twitter’s long-term refusal to let Dataminr to sell Twitter data to the CIA, he suggested perhaps the response should be to “expose” the company.

So let me help Senator McCain in his efforts.

Breaking: Twitter Refuses to Sell Your Data in Bulk to the CIA

That is simply scandalous!

Of course, as I’ve reported in the past and a spox from Twitter reiterated again today, this is actually a (claimed) long-standing policy at Twitter. They will not let Dataminr or anyone else sell your data to any government agency for surveillance purposes.

Dataminr uses public Tweets to sell breaking news alerts to media organizations and government agencies, for non-surveillance purposes. Due to privacy concerns, we have not authorized Dataminr or any third party to sell data to a government or intelligence agency for surveillance purposes. This is a longstanding Twitter policy, not a new development. Twitter responds to valid legal process issued in compliance with applicable law, and our most recent transparency report shows over 5,000 U.S. government information requests in 2015 alone.

Breaking: Twitter Refuses to Sell Your Data to Government for Surveillance Purposes

Wow, this Expose Twitter campaign is getting exciting.

Of course, you might ask why McCain is demanding that our tech companies to make money off of surveillance of you. And why he considers Twitter such an exception.

Tuesday Morning: What’s News, Tiwes?

[Screencap, Newsmap, 0815h EDT]

[Screencap, Newsmap, 0815h EDT]

It’s the day belonging to Tiwes, the Norse god of single combat. What will we engage in battle about today? Looks like sketchy news coverage is a good reason, after taking a peek at Newsmap this morning to check global media coverage of the Panama Papers.

Very thin reporting, according to the results. Canada, come on — Bill Cosby is bigger news than global corruption?

Ditto for India, which covered the HSBC money laundering scandal exhaustively last year. Very little coverage in that country’s English language outlets.

Don’t get all peeved off about the U.S. media, which hasn’t done a particularly good job over the last 24 hours. It’s not just us; the lack of coverage may say something about media ownership around the world.

One possible example on shore here: the acquisition of the Las Vegas-Review Journal last year. Nevada happens to be the eighth most popular tax haven in the world, and Las Vegas is its heart. Was this paper acquired in order to influence reporting in and about this topic?

Mossack Fonseca has a subsidiary in Las Vegas, by the way.

Let’s take a look at science and technology news…

  • No change yet to claims that Panama Papers were obtained by an attack on Mossack Fonseca’s email server (The Register-UK) — Of particular note, this observation by this tech news outlet:

    To date, The Register hasn’t seen a strong presence from the tech sector in the staged release of the documents, perhaps because the “Double Irish Dutch Sandwich” tactic favoured in this business works without hiding companies’ links to their international associates.

    The comments at that link are rather interesting, offering both a perspective from our overseas “cousins” as well as technical assessment about the leak.

  • Are you ready for some Thursday night Twitter streaming? (WaPo) — NFL’s awarded a deal to Twitter for streaming some of its games. This is an interesting development, given how much co-watching TV Twitter users do.
  • I’m afraid I can’t do THAT, Dave: humans aroused by touching robots special places (Phys.org) — Ewww. Don’t ask me to travel through the Uncanny Valley with you on this one.
  • Revolv’s home automation hub now a casualty in the Internet of Things universe (BoingBoing) — Device fell out of the product plans for Google’s home automation subsidiary, Nest. Unfortunately, Revolv was sold with a lifetime subscription which will be defunct in May.
  • “Routine management reshuffle” replaces three senior execs at China’s telecom manufacturer ZTE (Reuters) — coincidentally happens weeks after U.S. authorities revealed attempts by ZTE to circumvent sanctions against Iran.
  • Name a non-Zika disease also transmitted by Aedes aegypti mosquitoes, facing a drastic vaccine shortage (Science) — You win if you said yellow fever, which has no cure and can be deadly.
  • Article 27: Algorithmic Politics (Furtherfield) — Necrocapitalism. Wrap your head around that term. A thought-provoking essay about a world where algorithms are our political system.

That’s enough for your coffee break or lunch hour. Catch you here tomorrow morning!

Monday Morning: Synthesized Brain

When you need a break this hectic Monday morning, take five minutes and watch ANA from Factory Fifteen. I’m intrigued by the props and set — how much is CGI, and how much is actual production line? What company allowed this production company access to their equipment?

Though snappy and visually engaging, the story’s not realistic — yet. But much of the equipment on the production line is very close to that used in manufacturing today. And just as depicted in this short film, the weakest link is the human.

Worth keeping in mind this week as we plow deeper into the conflict at the intersection of humans and devices. Speaking of which…

Apple-heavy week ahead

  • Hearing in California tomorrow in front of Judge Sheri Pym over the San Bernardino’s shooter’s iPhone. Be sure to read Marcy’s take on the hearing and witnesses.
  • WLTX of Columbia SC posted a timeline of #AppleVsFBI events — unfortunately, it starts on February 16 with Judge Pym’s order to Apple.
  • NYT reported last week that Apple employees may quit if Apple is ordered to cooperate and write security-undermining code. But is this a deliverable in itself? The article offered an incredible amount of detail about Apple’s operations; if employees quit, any entities observing the technology company will know even more. Has this shakedown been designed to yield information about Apple’s operations, while risking corporate and personal security?
  • Apple will release information about new products today at a media event. The buzz may be less about the new products than the hearing tomorrow.
  • An iPhone 6 bursting into flames during a flight to Hawaii didn’t help Apple. One might wonder why this particular phone flamed out so spectacularly as it’s a relatively new device.

HEADS UP TECH USERS

  • Kindle users: Amazon is forcing a mandatory update across all its older Kindle reader devices. Deadline: TOMORROW MARCH 22 — after that date, users will have to manually update devices and download books via PC and not over the internet.
  • Tweetdeck users: Owner Twitter will kill the Windows app on April 15th. After that time, Windows-based users will need to use a browser. Can’t blame Twitter–it’s ridiculously expensive to write and service so many apps when the same devices usually have a browser.
  • Android users: 1) Protect your privacy and security by checking these settings; 2) Check this setting, stat, to prevent unauthorized access.
  • Nexus users: Make sure you have the latest patch issued last week. All other Android users should nag their equipment makers for their version of the same patch.

Before the machines complete their occupation of our world…

  • Nice read on law emerging with the rise of robots. Too bad none of them really incorporate Asimov’s Three Laws of Robotics. (The Atlantic)
  • Want to bet the overlords will argue workers should be paid less because they don’t have to work as hard wearing an exoskeleton — like these at Panasonic? (By the way, DARPA, that’s yet another commercially-developed exoskeleton near release; where’s yours/ours?) (Mashable)
  • Artificial intelligence already pitted against humans by those bloody banksters. Watch this video and ask yourself if this guy from Global Capital Acquisitions realizes there are humans at the nodes of the investment network whose lives are affected by his blah-blah-blah-babbling about artificial intelligence. STG he could be a machine himself. (Bloomberg)
  • Myths about AI busted – another solid read. Combined with the preceding Bloomberg bankster video it reinforces AI threat awareness. (Gizmodo)

After watching that video at Bloomberg, I think we’re a lot closer to ANA than we realized. Watch your backs — Monday is certainly gaining on you, if robots aren’t.

Friday Morning: Afro-Cuban Coffee

I should just dedicate Fridays to different genres of jazz. Today feels like a good day for Afro-Cuban jazz.

This chap, Francisco Raúl Gutiérrez Grillo, who performed under the name Machito with his Afro-Cubans, was an incredibly important innovator shaping Afro-Cuban jazz as well as modern American music. He was important to race in the music industry as well, as his Afro-Cubans may have been the first multi-racial band.

I’m brewing some Café Bustelo before I bust out my dancing shoes. ¡Vamonos!

Judge applies ‘Parkinson’s Law’ to VW emissions cheat case
You know the adage, “work expands so as to fill the time available for its completion”? U.S. District Court Judge Charles Breyer gave Volkswagen 30 days to come up with a fix* for all the emissions standards cheating passenger diesel engine cars in the class action lawsuits he oversees in San Francisco. Gotta’ love this:

“It’s an ongoing harm that has to be addressed … I’ve found the process is a function of how much time people have available to fill. The story about lawyers is that that if you give them a year to do something, it will take them a year to do something. If you give them 30 days to do something, they’ll do something in 30 days.”

As time passes, vehicle owners are increasingly damaged as no one wants to buy their cars and their investment is lost. Hence the aggressive time limit.

* Caution: that link to SFGate may autoplay video and ad content. Really, SFGate? That’s such hideously bad form.

Rough road ahead in Saudi Arabia to a post-oil world
This piece in WaPo paints a grim picture of cheap oil’s impact on Saudi Arabia — and there are huge pieces missing. Worth a read while asking yourself how much Saudis are spending on military efforts against Yemen and Syria, and what new industries they’re investing in to replace oil-based employment.

Took long enough: Software and social media firms get Apple’s back
Did their legal departments finally read the case thoroughly and realize they had skin in this game, too? Who knows — but Google as well as Microsoft are planning to file amicus briefs in support of Apple. Microsoft had already indicated they would support Apple in a congressional hearing yesterday morning; Google piped up later. The latest skinny is that Facebook and Twitter both intend to file briefs as well in favor of Apple. Looks like Microsoft’s current management took an 180-degree turn away from progenitor Bill Gates’ initial response, hmm?

Hit and run

That’s a wrap on this week. Keep your eyes peeled for news dumps while folks are still picking apart last night’s GOP-cast reality TV show. And make time to dance.

EDIT — 8:40 AM — Ugh, why didn’t the Detroit News publish this piece *yesterday* instead of a Friday morning? Michigan’s Gov. Snyder’s “inner circle” exchanged emails advising a switchback from Flint River a year before the switchback took place, and only three weeks before Snyder’s re-election. There was enough content in this to go to press without waiting for a quote from one of the former advisers.

Thursday Morning: Snowed In (Get It?)

Yes, it’s a weak information security joke, but it’s all I have after shoveling out.

Michigan’s winter storm expanded and shifted last night; Marcy more than caught up on her share of snow in her neck of the woods after all.

Fortunately nothing momentous in the news except for the weather…

Carmaker Nissan’s LEAF online service w-i-d-e open to hackers
Nissan shut down its Carwings app service, which controls LEAF model’s climate control systems. Carwings allows vehicle owners to check information about their cars on a remote basis. Some LEAF owners conducted a personal audit and hacked themselves, discovering their cars were vulnerable to hacking by nearly anyone else. Hackers need only the VIN as userid and no other authentication to access the vehicle’s Carwings account. You’d think by now all automakers would have instituted two-factor authentication at a minimum on any online service.

Researcher says hardware hack of iPhone may be possible
With “considerable financial resources and acumen,” a hardware-based attack may work against iPhone’s passcode security. The researcher noted such an attempt would be very risky and could destroy any information sought in the phone. Tracing power usage could also offer another opportunity at cracking an iPhone’s passcode, but the know-how is very limited in the industry. This bit from the article is rather interesting:

IOActive’s Zonenberg, meanwhile, told Threatpost that an invasive hardware attack hack is likely also in the National Security Agency’s arsenal; the NSA has been absent from discussions since this story broke last week.

“It’s been known they have a semiconductor [fabrication] since January 2001. They can make chips. They can make software. They can break software. Chances are they can probably break hardware,” he said. “How advanced they were, I cannot begin to guess.”

The NSA has been awfully quiet about the San Bernardino shooter’s phone, haven’t they?

‘Dust Storm’: Years-long cyber attacks focused on intel gathering from Japanese energy industry
“[U]sing dynamic DNS domains and customized backdoors,” a nebulous group has focused for five years on collecting information from energy-related entities in Japan. The attacks were not limited to Japan, but attacks outside Japan by this same group led back in some way to Japanese hydrocarbon and electricity generation and distribution. ‘Dust Storm’ approaches have evolved over time, from zero-day exploits to spearfishing, and Android trojans. There’s something about this collected, focused campaign which sounds familiar — rather like the attackers who hacked Sony Pictures? And backdoors…what is it about backdoors?

ISIS threatens Facebook’s Zuckerberg and Twitter’s Dorsey
Which geniuses in U.S. government both worked on Mark Zuckerberg and Jack Dorsey about cutting off ISIS-related accounts AND encouraged revelation about this effort? Somebody has a poor grasp on opsec, or puts a higher value on propaganda than opsec.

Wonder if the same geniuses were behind this widely-reported meeting last week between Secretary of State John Kerry and Hollywood executives. Brilliant.

Case 98476302, Don’t text while walking
So many people claimed to have bumped their heads on a large statue while texting that the statue was moved. The stupid, it burns…or bumps, in this case.

House Select Intelligence Committee hearing this morning on National Security World Wide Threats.
Usual cast of characters will appear, including CIA Director John Brennan, FBI Director James Comey, National Counterterrorism Center Director Nicholas Rasmussen, NSA Director Admiral Michael Rogers, and Defense Intelligence Agency Director Lieutenant General Vincent Stewart. Catch it on C-SPAN.

Snow’s supposed to end in a couple hours, need to go nap before I break out the snow shovels again. À plus tard!

When Your Lived Reality becomes an Algorithm of the Popular

Yesterday, as people panicked about Twitter’s plan to present tweets to users using algorithmic calculations of what that person might like, I wrote this:

What if humans started to experience time as an algorithm of the popular rather than lived narratively ordered experience?

Especially since I work from home and in flyover country, Twitter is very much a lived conversation for me. And if Twitter alters the way it appears to me — basically choosing who it thinks I want to talk to rather than what the serendipity of the unique collection of people I follow presents in time-ordered fashion — it will be fairly dramatically altering my lived reality.

The thought got even creepier for me as respondents to my tweet (author William Gibson was among those who retweeted it, so I got so really awesome responses) pointed out that associations divorced from lived time is much closer to dreaming than waking reality. Of course, as a shrink friend noted, in dreaming, we consciously and unconsciously select what those associations are, rather than having a computer do it for us.

So thought of as its almost most dystopian, Twitter wants to take the serendipitous global conversation we’ve been having and instead replace it with a living dream world chosen for us algorithmically.

But let me go one step more dystopian. As I noted yesterday, Google recently told the British Parliament that it is testing ways to show “positive” ad words and YouTubes when people look for hateful, potentially terrorist speech. Google’s announcement follows an earlier one from Facebook, stating it would do the same.

In other words, since the early January meeting in Silicon Valley, two of the big tech companies announced plans to rejigger their algorithms selectively for users the algos identify as expressing an interest in terrorism. For those interested in terrorism, Google and Facebook will create a waking dreamworld.

Thus far, Twitter has made no such announcement. Yesterday (that is, the same day this algorithm report came out) it did, however, announce how many perceived terrorists it has kicked off Twitter.

Like most people around the world, we are horrified by the atrocities perpetrated by extremist groups. We condemn the use of Twitter to promote terrorism and the Twitter Rules make it clear that this type of behavior, or any violent threat, is not permitted on our service. As the nature of the terrorist threat has changed, so has our ongoing work in this area. Since the middle of 2015 alone, we’ve suspended over 125,000 accounts for threatening or promoting terrorist acts, primarily related to ISIS.

The blog post making that announcement also addressed algorithms, admitting that they can’t really work, linking to this report from December (which discussed Facebook and Google) on another presentation to the UK Parliament.

As many experts and other companies have noted, there is no “magic algorithm” for identifying terrorist content on the internet, so global online platforms are forced to make challenging judgement calls based on very limited information and guidance. In spite of these challenges, we will continue to aggressively enforce our Rules in this area, and engage with authorities and other relevant organizations to find solutions to this critical issue and promote powerful counter-speech narratives.

All of which might have left the impression that Twitter, unlike its counterparts Google and Facebook, would not be fiddling with its algorithms in response to the request to magnify voices deemed to be positive targeted at those seeking terrorism content.

Except that at almost exactly the same time, came these reports that everyone would get (or would get the option of) the algorithmic treatment.

Now, having studied how, after 1848, the powers that be in Paris found ways to eliminate the growing newspaper public in the belief that it had led to that year’s revolution (that’s partly where the idea of high literature, as embodied in Madame Bovary, arose from), I’m pretty paranoid when I see the ways the elite would current neuter the voices that contributed to the Arab Spring, Black Lives Matter, and yes, terrorism.

But I have to say, I always get buggy when communications companies — like AT&T and Microsoft — don’t have an apparently robust business model, especially when I consider ways they could (and do, in the case of AT&T) profit handsomely off working for the government. Most people assume Twitter is doing this as a way to monetize, which it has thus far failed to do. And that may well be the case.

If so, who is the customer, and what is Twitter delivering?

Update: Jack Dorsey just had this to say on Twitter.

Hello Twitter! Regarding #RIPTwitter: I want you all to know we’re always listening. We never planned to reorder timelines next week.

Twitter is live. Twitter is real-time. Twitter is about who & what you follow. And Twitter is here to stay! By becoming more Twitter-y.

Monday Morning: First, Same as the Last

Hear that sound? Like so many sighs of resignation? Yup, it’s the first Monday of the new year, and with it, a plethora of shiny resolutions slowly breached and broken like WiFi-enabled toys.

One of my 2016 resolutions (which I hope will last more than a week) is a morning update here at emptywheel. Won’t be hot-urgent-newsy, just stuff worth scanning while you have a cup of joe. Let’s see if I can stick it out five days — then I’ll try another benchmark.

Droning on
Did you get or give a drone as a gift this holiday season? Better make sure it’s registered with the Federal Aviation Administration.

Twitter to bring back Politwoops
Among the stupid moves Twitter made last year was the decision to shut out Sunlight Foundation’s Politwoops platform. The tool archived politicians’ embarrassing tweets even if the tweets had been deleted. With the general election season now in full swing, voters need more accountability of candidates and elected officials, not less. Sunlight Foundation and the Open State Foundation negotiated with Twitter to restore the tool. Let’s hope it’s up and running well before the first caucuses — and let’s hope Twitter gets a grip on its business model, pronto.

You’d think by now Twitter would have figured out politicians’ tweeted gaffes are gasoline to their social media platform growth…

Microsoft spreads FUD about…Microsoft?
If you’re an oldster IT person like me, you recall the Halloween memo scandal of 1998, documenting Microsoft’s practice of promulgating fear, uncertainty, and doubt (FUD) about competing operating systems in order to gain and control Windows market share. For more than a decade, Microsoft relied on FUD to ensure near-ubiquity of Windows and Word software products. Now Microsoft is using FUD not to prevent customers from using other products, but to encourage migration from Windows 7 to Windows 10, to reduce possible state-sponsored attacks on Win 7 systems.

Personally, I think Microsoft has already been ridiculously ham-handed in its push for Win 10 upgrades before this latest FUD. If you are a Win 7 or Win 8 user, you’ve already seen attempts to migrate users embedded in recent security patches (read: crapware). I’ve had enough FUD for a lifetime — I’m already running open source operating systems Linux and Android on most of my devices. I would kill for an Android desktop or laptop (yoohoo, hint-hint, Android developers…).

And don’t even start with the “Buy Apple” routine. Given the large number of vulnerabilities, it’s only a matter of time before Mac OS and iOS attract the same level of attention from hackers as Windows. I’ll hold my AAPL stock as long as you insist on “Buy Apple,” however.

Consumer Electronics Show 2016 — now with biometric brassieres
CES 2016 opens this week in Las Vegas, and all I can think is: Are you fucking kidding me with this fresh Internet of Things stupidity? A biometric bra? What idiot dreamed this up?

Why not biometric jockstraps? I can only imagine the first response to biometric jockstraps: “No EMF radiation near my ‘nads!” Yeah, well the same thing applies to breasts. Didn’t anybody get the memo last year that 217 scientists have expressed concerns about EMF’s potential impact on human health, based on +2,000 peer-reviewed articles?

Or are businesses ignoring this science the same way petrochemical businesses have ignored climate change science?

Phew. There it is, the first checkmark of my 2016 resolutions. Happy first Monday to you. Did you make any New Year’s resolutions? Do tell.

The Carnage In Isla Vista, Hashtag Justice and Echidne

Screen Shot 2014-05-26 at 11.41.50 AMI have not been there in a while, but I have been there quite a bit before, and the Isla Vista/Goleta area surrounding UCSB is everything good and bad that surrounds any major university. It is a melting pot teeming with brilliant young minds, eager to expand and ready to experiment and socialize. It is also cliquish and too easy to separate the in from the out crowd and, sometimes, rich from poor. Above all else, at least from my visits there when I was younger, IV was one wild party that could be anywhere along a couple of key streets, if not indeed out in the streets themselves. It was one hell of a good time.

But not this Memorial Day weekend. Something different and jolting happened, leaving seven souls dead, seven more injured and yet another community, and national audience, grieving and reaching for answers.

I don’t know what the answers are, and to a great extent, I do not think the pathology of this incident is yet ripe enough to draw them with any real definition. That has not, of course, stopped the light speed social justice court of Twitter and the internet.

The reaction on Twitter has run the spectrum from sober to hysterical. If you are on Twitter, you have seen it, if you are not, it is not hard to imagine if you are internet savvy enough to be reading the instant post. Speaking only for myself, however, I have been a little disturbed by the alacrity with which valuable social justice movements, and their participants, have glommed on to a tragic spree crime as the defining vehicle for their arguments, whether it be women’s rights, gun control or otherwise.

It strikes me, while certainly all of these things figure into the Rodger situation to some extent, hitching up to a spree murder by a mentally disturbed individual is not exactly a great vehicle for your social justice movement. It is more complex than that, and it is too easy in haste to mistake manifestations for root causes. Post hoc, ergo propter hoc if you will.

And, while I know the intent was good, I have found the “hashtag advocacy” via such tags as #YesAllWomen, and the reflexively responsive #NotAllMen, to not necessarily do all that much to further the well meaning intention of their adopters. While some of those tweets have seemed germane and helpful, a great many seem Read more

Is Twitter EFF’s Second NSL Client?

In the past, I’ve tracked the efforts of a telecom — which WSJ convincingly argued was Credo — to challenge a 2011 National Security Letter. It has the support of EFF on that challenge. I also noted language in Credo’s Transparency Report (which was issued after DOJ permitted providers to give broad bands for NSLs, but before DOJ permitted them to give broad bands for other national security demands) saying it was prohibited from giving more information about NSLs and Section 215 orders.

It is important to note that it may not be possible for CREDO or any telecom carrier to release to the public a full transparency report, as the USA PATRIOT Act and other statutes give law enforcement the ability to prevent companies from disclosing whether or not they have received certain orders, such as National Security Letters (NSLs) and Section 215 orders seeking customer information. [my emphasis]

Today, EFF noted that it has filed what should be its response to the government’s appeal in that case.

Only, it makes it it representing not just the known telecom client, but also an Internet client.

The Electronic Frontier Foundation (EFF) filed two briefs on Friday challenging secret government demands for information known as National Security Letters (NSLs) with the Ninth Circuit Court of Appeals.  The briefs—one filed on behalf of a telecom company and another for an Internet company—remain under seal because the government continues to insist that even identifying the companies involved might endanger national security.

While the facts surrounding the specific companies and the NSLs they are challenging cannot be disclosed, their legal positions are already public: the NSL statute is a violation of the First Amendment as well as the constitutional separation of powers.

Now, one obvious potential Internet client would be Google. It is known to have fought NSLs in Judge Susan Illston’s court and lost.

But I wonder whether it isn’t Twitter.

I say that, first of all, because of the cryptic language in Twitter’s own Updated Transparency Report, which was released after the DOJ settlement which should have permitted it to report NSLs. But instead of doing so, it pointed out that it can’t report its national security orders, if any, with enough particularity. It called out NSLs specifically. And it used a language of prohibition.

Last week, the U.S. Department of Justice and various communications providers reached an agreement allowing disclosure of national security requests in very large ranges. While this agreement is a step in the right direction, these ranges do not provide meaningful or sufficient transparency for the public, especially for entities that do not receive a significant number of – or any – national security requests.

As previously noted, we think it is essential for companies to be able to disclose numbers of national security requests of all kinds – including national security letters and different types of FISA court orders – separately from reporting on all other requests. For the disclosure of national security requests to be meaningful to our users, it must be within a range that provides sufficient precision to be meaningful. Allowing Twitter, or any other similarly situated company, to only disclose national security requests within an overly broad range seriously undermines the objective of transparency. In addition, we also want the freedom to disclose that we do not receive certain types of requests, if, in fact, we have not received any.

Unfortunately, we are currently prohibited from providing this level of transparency. We think the government’s restriction on our speech not only unfairly impacts our users’ privacy, but also violates our First Amendment right to free expression and open discussion of government affairs. We believe there are far less restrictive ways to permit discussion in this area while also respecting national security concerns. Therefore, we have pressed the U.S. Department of Justice to allow greater transparency, and proposed future disclosures concerning national security requests that would be more meaningful to Twitter’s users. We are also considering legal options we may have to seek to defend our First Amendment rights. [my emphasis]

It was a defiant Transparency Report, and it discussed prohibitions in a way that no one else — except Credo — had done.

Moreover, it would make sense that EFF would be permitted to represent Twitter in such a matter, because it already had a role in Twitter’s challenge of the Administrative subpoena for various WikiLeaks’ associates Twitter data.

Finally, EFF notes that this Internet client is fighting just 2 NSLs; Google is fighting 19.

The very same day that the district court issued that order striking down the statute, a second EFF client filed a similar petition asking the same court to declare the NSL statute to be unconstitutional and to set aside the two NSLs that it received.

Notwithstanding the fact that it had already struck down the NSL statute on constitutional grounds in EFF’s first NSL case, but indicating that it would be up to the Ninth Circuit to evaluate whether that evaluation was correct, the district court denied EFF’s client’s petitionand ordered them to comply with the remaing NSL in the interim.

If Twitter is the client, it would present real First Amendment issues. It would suggest that, after Twitter took the rare step of not just challenging but giving notice in an Administrative subpoena, DOJ decided to use NSLs, which are basically Administrative subpoenas with additional gags, in response.

Update: in potentially related news, Verizon just updated its Transparency Report, claiming it can’t provide details on some bulk orders.

We note that while we now are able to provide more information about national security orders that directly relate to our customers, reporting on other matters, such as any orders we may have received related to the bulk collection of non-content information, remains prohibited.