Showing posts with label ACLU. Show all posts
Showing posts with label ACLU. Show all posts

Sunday, March 25, 2007

The rsync.net warrant canary

You aren't allowed to say if you've received a National Security Letter. But there's no law that says you can't say that you haven't received one.

Thus, rsync.net has a "warrant canary"--they periodically post a cryptographically signed statement that they have not, to date, received any PATRIOT Act warrants or had any searches and seizures. If they stop updating the statement, then you can draw your own conclusions.

The second of these library signs uses the same principle: "The FBI has not been here [watch closely for removal of this sign]."

(Via jwz's blog, where some commenters question whether the recent Washington Post piece by the recipient of a National Security Letter is truthful. Note that the ACLU has a lawsuit going on about this case, which I previously noted back in 2005.)

Tuesday, December 12, 2006

Discovery Institute's latest attack on Dover decision

After a year of careful analysis of Judge Jones' decision in Kitzmiller v. Dover Area School District, the Discovery Institute has determined that the Judge made considerable use of the plaintiff's Proposed Findings of Fact and Conclusions of Law when writing the section on intelligent design as science in his decision for the plaintiff. Somehow, they think that this common practice of using the Proposed Findings of Fact from the winning side in crafting a decision makes Judge Jones a puppet of the ACLU, even though he's a conservative justice appointed by George W. Bush.

The Discovery Institute has issued a press release touting their findings as though it discredits the decision's reasoning. This press release demonstrates that they are still smarting over the loss in Dover, still spending their time doing things that have nothing to do with scientific research, and that they have as much credibility on legal matters as they do on scientific matters.

More by attorney Timothy Sandefur at the Panda's Thumb. This press release by the DI was telegraphed by a talk given by Michael Behe earlier this month in Kansas.

UPDATE (December 13, 2006): Ed Brayton analyzes the DI report in more detail, including responding to its claims that Judge Jones incorporated "errors" from the ACLU into the decision.

UPDATE (December 14, 2006): More responses:

Timothy Sandefur, "Is John West Dishonest or Just Ignorant?" and "Casey Luskin--Not Too Bright" at the Panda's Thumb.

UPDATE (December 20, 2006): Wesley Elsberry has looked at how much of the plaintiff's Proposed Findings of Fact and Conclusions of Law was actually used in Jones' decision (and how much of that section of the decision came directly from the plaintiff's filing). Ed Brayton summarizes at Dispatches from the Culture Wars.

Casey Luskin has attempted to respond with a defense, but as Ed Brayton shows, he just keeps digging a deeper hole.

Friday, November 03, 2006

ACLU incompetence and misinformation on net neutrality

I received an email from the ACLU yesterday, informing me that they've jumped in on the net neutrality debate. Unfortunately, they badly misrepresent the facts:
FREE THE NET: WHY YOU SHOULD CARE ABOUT NET NEUTRALITY

The keys to the Internet have always been safely in public hands - until last year, when the FCC suddenly repealed longstanding Internet principles of "neutrality" and non-discrimination.
The ACLU is going to make the erroneous claim that I've debunked repeatedly on my blog (see the Net Neutrality Index)--that the common carriage requirements on telcos constitute "net neutrality." They will ignore the fact that cable companies--the main providers of consumer broadband Internet access in the U.S.--have never been common carriers and have never been bound by these requirements.
With the blessing of the Supreme Court, a handful of profit-driven telecoms and cable companies now could effectively shut down the 21st Century marketplace of ideas by screening Internet e-mail traffic, blocking what they deem to be undesirable content, or pricing users out of the marketplace.
The ACLU is going to argue that we need to create a new bureaucratic regulatory apparatus, giving sweeping new powers to the FCC to interfere with freedom of Internet providers to enter into voluntary contracts with each other and manage their own networks, and specifically prohibiting differential pricing on tiered levels of service and the ability for providers to enter into arrangements with content providers to subsidize consumer bandwidth.
Historically, Net Neutrality protections filled the free speech gap. Since those protections were removed last year, nothing prevents network providers from discriminating against Internet users and application and service providers in terms of content, quality of access, and choice of equipment.
This is doubly false--the common carriage requirements applied only to the last-mile consumer network connections, not to the ability of ISPs to filter; and it is false that "nothing prevents" ISPs from taking actions which would cause them to lose customers.
If you're like many people using the Internet, you don't think about whether your Internet Service Provider is intentionally slowing down or speeding up your access to Yahoo! versus Google. Without Net Neutrality, your ISP could do just that.

Imagine if your phone company was allowed to own restaurants and then provided good service and clear signals to customers who called Dominos and static and frequent busy signals for those calling Pizza Hut.

It sounds outrageous, but it would be entirely possible if the telephone system wasn't regulated under the "common carrier" framework. The telecoms and cable companies that provide Internet network services, including AT&T, BellSouth, Comcast, Qwest, Sprint, Time-Warner/AOL, and Verizon, have spent over $100 million lobbying Congress and the FCC to eliminate established Net Neutrality protections.
Remember, cable companies have never been common carriers, yet this hasn't been a problem. Why create new regulations and give more power to a government agency that has a history of not only working on behalf of the big incumbents (rather than promoting competition, which is what is needed) but of engaging in actions designed to cause discrimination against certain forms of content through censorship? It makes no sense.
The assault on Internet freedom will only get worse. The FCC imposed Net Neutrality protections in merger agreements for certain network providers such as SBC/AT&T and Verizon/MCI, but those protections expire in 2007. And in July 2006, the FCC declined to include any Net Neutrality protections in Comcast and Time-Warner's acquisition of Adelphia Cable. The pattern of the FCC opposing Net Neutrality is expected to continue, as network providers continue to consolidate into an even smaller pool of Internet gatekeepers.

Without the vigorous non-discrimination principles in place before 2005, a few corporate conglomerates will control everything that you can say or do on the Internet. Net Neutrality is needed, and it is needed now.
The above argument is a mish-mash of fear-mongering about things that haven't been an issue, misrepresentation of what regulations have been in place, wild unsubstantiated claims ("a few corporate conglomerates will control everything that you can say or do on the Internet"?), and a failure to look at the actual substantive issues in the network neutrality debate.

Their website contains further misinformation:

Massive innovation on the Internet since its creation is in part the result of pre-2005 Net Neutrality protections. Starting nearly forty years ago, the Federal Communications Commission (FCC) concluded that under Title II of the Communications Act, telephone companies and network owners were prohibited from interfering with or discriminating against "telecommunications services" offering computer network access. The availability of common carrier telephone networks to independent equipment manufacturers and Internet Service Providers (ISPs) led to the Internet's birth. Entrepreneurs freely developed pioneering services and products resulting in a technological revolution driving our Nation's economic growth in the last decade.

Again, Title II has never applied to cable companies (or to ISPs that aren't telcos).

All of those protections were suddenly lost last year after the Supreme Court's decision in NCTA v. Brand X. Since 2002, the FCC attempted to reverse decades of applying Title II's nondiscrimination principles to net providers by reclassifying cable modem services as unregulated "information services."
ISPs and cable companies have never been Title II common carriers.
Federal courts initially rejected the FCC's efforts to strip long-standing Net Neutrality protections. In mid-2005, the Supreme Court abruptly reversed course in Brand X by concluding that the FCC had that discretion, notwithstanding well-established consumer protections.

Following that ruling, network owners began taking steps to stifle innovation and freedom on the Internet.

No examples are provided. Actual cases of discrimination are very few and far between, and have been quickly resolved.
They have stated their intent to establish tollbooths on the Information Superhighway by restricting fast lanes to those willing and able to pay high premiums.
It has always been the case that you have to pay more for more bandwidth and to put your content closer to your users, and that will not change with network neutrality regulations. This description fails to present the point of tiered services, which are necessary to deploy new kinds of services on the network (such as those dependent on near-real-time packet delivery) without allowing them to be disrupted by services which don't have such dependencies. By prohibiting tiered services, you prohibit the development and innovation that they can bring, and will doom us to VoIP telephony that is inferior to old-fashioned telephone service.
Some network owners, such as Time Warner's AOL and BellSouth, have already blocked user content.
The AOL case was an inadvertent blocking of email from a particular domain that was quickly corrected; I don't know what BellSouth instance is referred to. Probably most, if not all ISPs and content providers have blocked access to some user content at some point, due to that content being illegal (e.g., copyright infringement, child porn).
Internet discrimination will only increase after the 2007 expiration of Net Neutrality restrictions in merger agreements for other network owners such as SBC/AT&T and Verizon/MCI.
Why? Any provider that blocks content that its customers want to access puts itself at a competitive disadvantage.

S. 2917, the Snowe-Dorgan "Internet Freedom Preservation Act," restores longstanding Net Neutrality protections missing from S. 2686.

In its current form, S. 2686, the Communications, Consumer's Choice, and Broadband Deployment Act of 2006, permits Net discrimination to continue unabated. The bill provides no protection for Internet users and entrepreneurs. Instead, it merely includes a toothless requirement that the FCC study the Internet market for five years and file annual reports to Congress on the activities of network owners.

This is not true--it contains the FCC "four freedoms" including nondiscrimination, and provides for fines for providers who discriminate. What it doesn't do that the Snowe-Dorgan bill does is prohibit tiered classes of service.

In sharp contrast, S. 2917, the Internet Freedom Preservation Act offered by Senators Snowe and Dorgan, restores Network Neutrality protections in place before June 2005.

This is inaccurate--it does not reverse Brand X (which would amount to a new requirement--that has never previously been in effect--for cable companies to allow any ISP to sell Internet service through their networks). It creates new restrictions on broadband Internet that have never previously existed, affecting non-telco ISPs as well as cable providers.
It requires that any content, application, or service offered through the Internet be provided on a basis that is "reasonable and non-discriminatory" and equivalent to the access, speed, quality of service, and bandwidth of services offered by network owners. It further prohibits network providers from blocking or degrading lawful Internet content. Finally, it leaves the choice for attaching legal devices to networks squarely in the hands of consumers, where it rightfully belongs.

If it only prohibited providers from blocking or degrading lawful content, I'd have no problem with it--but it goes far beyond that.

It is disappointing to see the ACLU get this issue so wrong.

Friday, October 20, 2006

Jailed terror suspect helped National Association of Evangelicals draft school religion rules

The above headline is justified to the same extent as Stop the ACLU's headline, "Jailed Terror Suspect Helped ACLU Draft School Religion Rules," as the rules in question were drafted jointly and agreed to by 35 organizations which included the National Association of Evangelicals, the ACLU, the Christian Legal Society, the General Conference of Seventh-Day Adventists, and numerous other religious groups.

The "jailed terror suspect" in question was a member of the American Muslim Council, one of the 35 groups involved in creating these rules for the Department of Education under Clinton. This led another conservative blogger to headline this story with the even more deceptively dishonest "Terrorist Wrote Clinton's School Religion Guidelines."

(Via Dispatches from the Culture Wars, where Ed Brayton has been repeatedly responding to this same absurd charge for years.)

A bad argument in support of the Protect Marriage Arizona amendment

Gun rights advocate and "uninvited ombudsman" Alan Korwin has sent out a checklist of his recommendations on the Arizona ballot propositions. I disagree with him on several of the propositions, perhaps most significantly on his recommendation of a yes vote to amend the Arizona Constitution to ban same-sex marriage and any legal arrangements that are "similar to" marriage. Here's his argument for 107:
107 YES Protect marriage amendment. If people want gay unions, polygamy, bestiality or whatever, I say let them, but not under government sanction and funding. I'd like to see us return to "holy matrimony" without any government involvement. Getting married for tax breaks is so wrong.
But this argument presumes the effect of 107 is to get the government out of the marriage business, which it isn't. Rather, 107 has the effect of enshrining existing statutory prohibitions on a form (or multiple forms) of legal contract between consenting adults into the Constitution, and going further to restrict any such arrangement "similar to" marriage. It isn't pro-liberty, it's anti-liberty. It isn't eliminating special privileges, it is adding them to the Arizona Constitution.

It's perfectly reasonable to argue that nobody should have tax breaks or special privileges under the law, but it's not reasonable to say that because such privileges are wrong we should restrict them to a particular set of people. That's not only unfair, it's unconstitutional--a violation of the equal protection clause of the 14th amendment. It's like arguing that the government shouldn't confer support on religion, so we should vote yes on an amendment that limits government support to the Christian religion, and keep it from supporting Islam or other religions. (No doubt there are many Americans who would, quite wrongly, support such a law.)

Now, some advocates of Proposition 107 have argued that there is no violation of the equal protection clause because a gay man has the same right to marry a woman as a heterosexual man does. But this is just like arguing that a prohibition on interracial marriage doesn't violate the equal protection clause because a black man has the same right to marry a black woman as a white man has to marry a white woman--the description of the right is being crafted to exclude the category of person who is being discriminated against.

As Ed Brayton has pointed out on numerous occasions, the arguments for the unconstitutionality of a ban on same-sex marriage are of the same form as the arguments for the unconstitutionality of a ban on miscegenation, just replacing "different race" with "same sex." If you think that the Supreme Court ruled correctly in Loving v. Virginia, you should also think that Arizona's Proposition 107 violates the U.S. Constitution for the same reasons.

See also my previous post on the Protect Marriage Arizona amendment. You may also find David Friedman's economic analysis of marriage arrangements to be of interest.

UPDATE (October 21, 2006): Just to make it clear, THeath has enumerated some specific examples of what opponents of gay marriage are actually endorsing (there are several more if you follow the link)--these aren't hypotheticals, these are real people:
  • There was the friend I wrote about recently who was turned away from from the emergency room, where his partner had been taken after suddenly collapsing at work, and told he could not be given any information because he was not next of kin. He had to leave the hospital and retrieve their legal documents before he could gain admittance to see his partner when a married spouse would have been waved through without question.

  • My friend was luckier than Bill Flanigan. When his partner Robert Daniel was hospitalized in Baltimore, the couple had their legal documents with them, including durable power of attorney and documentation that they were registered as domestic partners in California. But those documents were ignored by hospital staff and Flanigan was kept from seeing his partner until Daniel’s mother and sister arrived and by then Daniel was unconscious, with his eyes taped shut and hooked to a breathing tube; something Daniel had not wanted.

  • Even having a will didn’t help Sam Beaumont when his partner of 23 years, Earl, died. Oklahoma requires a will to have two witnesses, but Earl didn’t know that and his will leaving everything to Sam had only one. So Earl's cousins, who disapproved of his relationship and most of whom never spoke to the couple or even came to Earl’s funeral, successfully sued to take away the home and ranch Sam an Earl had shared for 23 years. A married spouse, even in the event of a will lacking enough witnesses, would’ve had the right to automatically inherit at least some of the estate.


Further Update (October 22, 2006): Ed Brayton takes apart the Alliance Defense Fund's white paper on these marriage amendments here.

Wednesday, September 20, 2006

AzCLU wrong on school choice

Ed Brayton rightly criticizes the Arizona Civil Liberties Union's lawsuit to try to prevent Arizona from giving corporate tax credits for donations to organizations that provide private school tuition for students from low-income families. The AzCLU has previously failed in two lawsuits to eliminate the state income tax credit for individual donations to private school tuition organizations. There is no reason to believe this third lawsuit will be anything but a waste of money.

As Ed points out, this is not a violation of the establishment clause of the Constitution (or the Arizona Constitution's prohibition on state funds being used to promote religion) because no state funds are going directly to any religious organization.

I support the Institute for Justice on this issue, and this is a reason I've never given funds to the AzCLU (though I support the ACLU Foundation).

I am a beneficiary of the individual state tax credit--I annually make the maximum qualifying contribution to the Arizona School Choice Trust, which is the single most efficient charity I donate to (100% of donations are distributed as tuition payments for students from low-income families; salaries for employees and administrative overhead are paid by another private organization).

UPDATE (June 7, 2007): Judge Janet Barton granted the Institute for Justice's motion to dismiss this case, back in March.

UPDATE (March 12, 2009): The Institute for Justice won this case again today in the Arizona Court of Appeals.

Friday, August 18, 2006

Massachusetts State Police arrest man for linking website to arrest video

Paul Pechonis was arrested at his home for allegedly threatening the life of a police officer on his website. This was a police officer who allegedly threatened to hold a gun to the head of his son. That arrest was videotaped with the consent of all parties except the police, by a camera in Pechonis' home. The video was placed online by Mary Jean, who has been threatened with felony charges for posting it. A federal judge issued an injunction supporting Jean, which the Attorney General has appealed. Jean has the support of the ACLU of Massachusetts and the lawfirm of Choate, Hall & Stewart.

Jean is the webmaster of conte2006.com, a website critical of Worcester County district attorney John Conte, which is where the video is hosted.

You can also find the video on YouTube. Although the video has been described by some as showing an "invasive search" without a warrant, the officers say they are just checking the home to see if anyone else is present. They are not shown moving or opening anything on camera, and the search is very brief (just a few minutes)--I don't see any evidence of an "invasive search."

Now prosecutors have threatened Pechonis, issuing a cease and desist order for merely linking to the video of his arrest from his own website.

Good job, prosecutors--you've just ensured that there will be much more attention to this video and Pechonis' case.

(Hat tip to The Agitator.)

Thursday, August 17, 2006

Judge grants injunction against warrantless wiretapping

Although the ACLU's lawsuit against AT&T in Illinois was thrown out, a separate case in Michigan filed on January 17 of this year against the NSA for warrantless wiretapping without approval of the FISA Court has resulted in a ruling by U.S. District Judge Anna Diggs Taylor that the practice is unconstitutional and must stop immediately. This is not the final decision in the case, but the granting of an injunction for the plaintiff.

The Electronic Frontier Foundation's lawsuit against AT&T also continues.

Tuesday, July 25, 2006

Judge throws out ACLU lawsuit against NSA

While the Electronic Frontier Foundation's lawsuit against AT&T continues, U.S. District Judge Matthew F. Kennelly today threw out the ACLU's lawsuit against the National Security Agency for collecting call detail records from AT&T, MCI, and other providers (though not, apparently, from Verizon or BellSouth).

Friday, June 16, 2006

Demonization of adversaries is wrong, Matt Stoller

Ed Brayton's Dispatches from the Culture Wars has an excerpt from an article in Christianity Today by Yale Law School Professor Stephen Carter, a well-known black Christian conservative who authored the book Confessions of an Affirmative Action Baby. In the article, Carter is arguing against the common demonization of the ACLU by Christians, pointing out that while he disagrees with the ACLU on the establishment clause, they are also a big defender of the free exercise clause and have consistently supported Christians in free exercise court cases:
More to the point, the ACLU is often right about the First Amendment's free exercise clause, taking on fights that others refuse. It might surprise some critics that the ACLU defends the free speech and free exercise rights of, well, Christians.
The larger point of the article, however, is to condemn the mode of argument that characterizes those who disagree as irrational, dishonest, or evil simply in virtue of that disagreement:
I am more concerned about a habit of mind that seems to be growing among my fellow Christians, both political liberals and conservatives. That is, we seem to mimic the secular world's conflation of disagreement with wickedness, as if not sharing my worldview places my critic outside the realm of rational discourse...
I've seen similar habits expressed by people on both sides of the net neutrality debate. For example, in Matt Stoller's presentation at the YearlyKos convention, he admits that he doesn't understand the relevant technical issues (and proceeds to demonstrate it by suggesting that "non-neutrality" will cause dropped calls, when in fact it's non-neutral QoS that will prevent them). He asserts that it is fun to beat up on "these bad people" and that it is very important that Mike McCurry be personally vilified. That's explicit endorsement of irrationality, of emotional demogoguery over fact and reason, and should be condemned by everyone in this debate.

Ed Brayton concludes:
But rational people, people who care about truth and accuracy, must fight this tendency. We must try and evaluate every claim using the same criteria. Does the evidence support it? Are the conclusions drawn from the evidence logical? Any claim that fails to meet those criteria should be rejected, regardless of whether it supports our agenda or not. Likewise, any claim that withstands that scrutiny should be accepted as valid, regardless of whether it supports our agenda or not. None of us will ever be Mr. Spock, but we should strive to evaluate all arguments as though we have no stake in the outcome. Some, like the STACLU crowd, make no attempt at all to do so; we should not emulate them.
I agree.

Saturday, May 27, 2006

More on last-mile options in Phoenix

I've posted this as an update on the original post, but it's also worth bringing out as a separate posting. I've made a few minor changes here (e.g., to insert the point about Cable America that is made elsewhere in the original post).

Douglas Ross (directorblue) has called this list "bogus" and claimed that only two of the options (Qwest and Cox) actually count. He rightly dismisses Cable America from the list on the grounds that Cox entered into an agreement to acquire them in January of this year--I grant his point and that reduces the number of broadband providers by one.

He dismisses Covad because it uses Qwest last-mile wires, but goes on to say, inconsistently, that he would count other cable resellers if the Brand X decision had gone the other way and providers like Cox were forced to enter into relationships like Covad has with Qwest. My observation is that if those reseller relationships exist and the reseller provides access to its own Internet network, then that is enough to foster a competitive environment. It doesn't matter whether it's government-mandated, it matters whether it exists.

Doug rejects all the wireless options out of hand on the grounds of Verizon's EVDO terms-of-service. (His section about why WiMax isn't viable doesn't actually discuss WiMax at all, only EVDO terms-of-service.) He misses the point that Sprint Broadband and Sprint EVDO are *two different services*--he doesn't actually give a reason to reject Sprint Broadband.

He says he doesn't understand why I put the City of Tempe's municipal WiFi network in the list--I did so because Tempe is right in the middle of the Phoenix metropolitan area (and noted Chandler's metro WiFi in-development, which is just south of Tempe, for the same reason). These are real options for people moving to the Phoenix area and for anyone who is willing to move to get different broadband service. (And certainly broadband options in an area are an important factor in choosing a place to live.)

Finally, he rejects HughesNet because it is unsuitable for VOIP or P2P. At least he doesn't say that HughesNet should be mandated to change the laws of physics in order to provide those services under net neutrality.

Doug's position on net neutrality appears to be that nothing counts as broadband unless it supports every application he wants to use. But it's important to note that the net neutrality bills in Congress *do* count all these options and place regulations on them--they count anything as broadband that is greater than 200kbps in one direction, whether wired or wireless. I don't see Doug volunteering to exempt things he doesn't count as valid broadband options from broadband net neutrality restrictions.

It appears to me that Doug's position is that whoever builds an infrastructure capable of supporting what he wants has to provide it to him, without recovering the costs of that infrastructure by charging any third parties. But I bet he also is unwilling to pay an unsubsidized rate to use such a service.

(UPDATE: I was just looking at Doug's blogroll, and he's pretty strong evidence that net neutrality positions don't necessarily correlate with political positions. Doug's political blog links include Michelle Malkin, Little Green Footballs, and the dishonest nutcases at "Stop the ACLU.")

Sunday, February 12, 2006

Schneier and Paulos on automated wiretapping

Security and cryptography expert Bruce Schneier gave a talk yesterday to the ACLU Washington's membership conference at which he argued that massive automated wiretapping generates too many false alarms to be useful, as described in the Seattle Times. As a commenter on Schneier's blog notes, mathematician John Allen Paulos (author of Innumeracy and A Mathematician Plays the Stock Market, both of which I highly recommend), writing in a New York Times op-ed titled "Panning for Terrorists," makes the same point.

The problem is essentially the same one that makes it pointless to engage in programs of blanket drug-testing of grade school children or mandatory HIV testing in order to obtain a marriage license--the population being tested contains such a small number of people who meet the criteria being tested for, which means that even a highly accurate test returns vastly more false positives than true positives.

Paulos points out that a 99-percent-accurate sorting mechanism for detecting terrorist conversations, on a population of 300 million Americans that includes one-in-a-million with terrorist ties (300) will identify 297 of them, along with 3 million innocent Americans. That's 297 true positives and 3 million false positives, producing a new sample population that is .009% terrorists and 99.99% innocent Americans who may be wrongly investigated.

Monday, January 23, 2006

Skeptics using Intelligent Design for fundraising

The two major skeptical organizations in the U.S.--Michael Shermer's Skeptics Society and Paul Kurtz's Committee for the Scientific Investigation of Claims of the Paranormal (CSICOP) (or, actually, its parent organization, the Center for Inquiry)--have both decided to use combatting the threat of Intelligent Design as a major platform of their most recent fundraising campaigns.

The Skeptics Society sent out a card-sized folded mailing with a photo of Darwin on the front with the caption "Help us keep religion out of the science classroom!" The inside reported on recent events, such as Cardinal Schonborn's New York Times piece that the Discovery Institute and their PR agency, Creative Response Concepts, helped arrange. It continues with facts about the amount of funding the Discovery Institute receives, quotes from Phillip Johnson, William Dembski, and Jonathan Wells, Harris and Pew poll results showing the general public's ignorance on evolution. So how will collected funds be used to combat Intelligent Design? Apparently Shermer has a new book coming out this year titled Why Darwin Matters: Evolution, Design, and the Battle for Science and Religion (Henry Holt/Times Books), copies of which will be sent "to every Congressman, Senator, and Governor in America, along with the relevant state boards of education, and state legislative bodies contemplating passing pro-creationist legislation." That doesn't strike me as a particularly productive way to combat ID--I suspect most of the recipients will not read the book.

There are other bullet items listed--publication of "a special volume of essays on evolution and Intelligent Design creationism collected from the pages of Skeptic magazine, to be published by the Skeptics Society and widely distributed to science teachers throughout America to give them the intellectual tools they need to deal with ID and creationism." Another is to "distribute free copies to teachers" of the existing booklet How to Debate a Creationist. That sounds much more worthwhile, though I think that it would be more productive to give teachers tools like Eugenie Scott's Evolution vs. Creationism: An Introduction and Mark Isaak's Counter-Creationism Handbook (the online version of which is here--some of the best teacher and student resources are already free and online).

The bonuses for contributors include a free book from a selection of six for $100 "Supporters" (In Darwin's Shadow by Tim Callahan is the only one that appears directly relevant to the topic). $500 "sponsors" get a free 3-year subscription to Skeptic; $1000 "benefactors" get two free tickets to the 2006 Skeptics Society conference on "The Environmental Wars"; and $5000 "patrons" get dinner with Shermer and "a world-renowned scientist (to be announced)" and a private tour of Mt. Wilson's 100-inch telescope and use of the 60-inch telescope, along with the gifts the other levels get.

The Center for Inquiry sent out a more elaborate package, including a DVD presentation promoting the "New Future Fund," a campaign to raise $26.6 million, "the largest sum ever raised in the name of humanism, skepticism, and scientific naturalism." The four major goals for the use of the money are "Legal Activism," "Opposing Creationism/Intelligent Design," "Transnational Development," and "Outreach and Education." The second item, "Opposing Creationism/Intelligent Design," discusses Intelligent Design, and says that "CSICOP is fighting back, mobilizing grassroots outreach and expert scientists when ID proposals threaten. We're especially aggressive online, publishing a stable of online columnists and a dynamic new website, Creation & Intelligent Design Watch." The website has a pretty substantial amount of content, with the November/December Skeptical Inquirer (a special issue on "Evolution and the ID Wars") as the centerpiece (along with other CSICOP-related articles, including many of Chris Mooney's Doubt and About articles), links to items appropriate for classroom use on the left side, and links to current news stories on the right side.

Now, I'm all in favor of a diversity of approaches to promote critical thinking and combat Intelligent Design's political actions, but everyone should keep in mind that the two organizations actually doing the most in this arena are the National Center for Science Education (NCSE), which is the only organization devoted entirely to fighting creationism and promoting accurate teaching about evolution, and the American Civil Liberties Union (ACLU), which has provided the legal support for every major creation/evolution courtroom battle. By all means support the Skeptics Society and Center for Inquiry's programs, but if Intelligent Design is a concern, please be sure to support the NCSE and ACLU.

Tuesday, January 17, 2006

ACLU files lawsuit against warrantless wiretapping

The ACLU has filed a lawsuit against the NSA asking for an injunction against warrantless interception of communications to international destinations. The plaintiffs include James Bamford (author of The Puzzle Palace, Body of Secrets, and A Pretext for War), Christopher Hitchens, Greenpeace, Larry Diamond of the Hoover Institution, the Council on American-Islamic Relations, the National Association of Criminal Defense Lawyers, and others.

Saturday, December 17, 2005

Phony War Against Christmas a Product of Fox News

Jim Romenesko at Poynter Forums posts an incisive article on how the Fox News Channel has been pushing this phony "War on Christmas" idea as a method of division. The article is apparently by Charlie Reina, a former Fox News Channel producer. A couple key paragraphs:
Fox anchors will tell you that no one in management dictates that they bring up religion. But my experience at FNC is that, once management makes its views known, the anchors have a clear blueprint of what’s expected of them. In this case, the point man is network vice president John Moody. A scholar and biographer of Pope John Paul II, John is a devout Catholic who seldom holds back on matters of the church, or in framing his views in “good guy, bad guy” terms. For example, during the 2001 Senate hearings on John Ashcroft’s appointment as Attorney General, Moody’s daily memos to the staff repeatedly touted Ashcroft as “deeply religious” and the victim of Democrats’ intolerance. One memo suggested a question of the day: “Can a man of deep Christian faith be appointed to a federal job, or will his views be equated with racism, intolerance and mean-spiritedness?” He added: “(K)eep pounding at the question: should Ashcroft’s detractors try to be as tolerant as they would have him be?”
Then there’s Fox management’s view on the separation of church and state, and on those who support it. One not-so-subtle hint came in March, 2004, after a Baghdad bombing gave reporters at a hotel in the Iraqi capital a scare. Moody’s memo that day advised FNC staffers to “offer a prayer of thanks for their safety to whatever God you revere (and let the ACLU stick it where the sun don’t shine).”
Not mentioned is that the book The War on Christmas is by Fox News "Big Story" host John Gibson, or the multiple fabrications by Fox's Bill O'Reilly. (Update on the latter: Plano schools are getting some press over their response to O'Reilly's fabricated claim that they banned students from wearing Christmas colors.)

Friday, December 16, 2005

And some good news: the PATRIOT Act reauthorization has failed

The Senate roll call vote is here. Unless a reauthorization passes, various provisions of the USA PATRIOT Act set to expire after three years will expire on December 31, 2005. These provisions include roving wiretaps, the ability to obtain certain kinds of business records without a court order, expansion of wiretap capabilities, certain kinds of sharing between agencies of information obtained via wiretap, etc. The specific details of what was in the Senate bill and the corresponding House bill may be found here (PDF).

Some of the pieces of these bills were beneficial, e.g., placing a sunset provision on the use of National Security Letters, which predated USA PATRIOT and which do not currently have an expiration date. Others extended provisions due to sunset on December 31, 2005 to 2006 or later years. (The ACLU has a lawsuit against the constitutionality of National Security Letters.)

The vote was 52-47; 60 votes were needed to end the filibuster. 2 Democrats and 50 Republicans voted yes, 41 Democrats, 5 Republicans, and one independent voted no.

Arizona: McCain and Kyl both voted yes.

UPDATE (March 25, 2007): The link for the ACLU's lawsuit on National Security Letters is stale, you can now find that information here.

Saturday, November 19, 2005

Freedom Summit: Technological FUD

Sunday morning's first session was by Stuart Krone, billed as a computer security expert working at Intel. Krone, wearing a National Security Agency t-shirt, of a type sold at the National Cryptologic Museum outside Ft. Meade, spoke on the subject "Technology: Why We're Screwed." This was a fear-mongering presentation on technological developments that are infringing on freedom, mostly through invasion of privacy. The talk was a mix of fact, error, and alarmism. While the vast majority of what Krone talked about was real, a significant number of details were distorted or erroneous. In each case of distortion or error, the distortions enhanced the threat to individual privacy or the malice behind it, and attributed unrealistic near-omniscience and near-omnipotence to government agencies. I found his claim that the NSA had gigahertz processors twenty years before they were developed commercially to be unbelievable, for example. He also tended to omit available defenses--for instance, he bemoaned grocery store loyalty programs which track purchases and recommended against using them, while failing to note that most stores don't check the validity of signup information and there are campaigns to trade such cards to protect privacy.

Krone began by giving rather imprecise definitions for three terms: convenience, freedom, and technology. For convenience, he said it is something that is "easy to do," freedom is either "lack of coercion" or "privacy," and technology is "not the same as science" but is "building cool toys using scientific knowledge." While one could quibble about these definitions, I think they're pretty well on track, and that a lack of society intrusion into private affairs is a valuable aspect of freedom.

Krone then said that the thesis of his talk is to discuss ways in which technology is interfering with freedom, while noting that technology is not inherently good or evil, only its uses are.

He began with examples of advancements in audio surveillance, by saying that private corporations have been forced to do government's dirty work to avoid Freedom of Information Act issues, giving as an example CALEA (Communications Assistance for Law Enforcement Act) wiretaps. He stated that CALEA costs are added as a charge on your phone bill, so you're paying to have yourself wiretapped. He said that CALEA now applies to Voice Over IP (VOIP), including Skype and Vonage, and that the government is now tapping all of those, too. Actually, what he's referring to is that the FCC issued a ruling on August 5, 2005 on how CALEA impacts VOIP which requires providers of broadband and VOIP services which connect to the public telephone network to provide law enforcement wiretap capability within 18 months. There is no requirement for VOIP providers which don't connect to the public telephone network, so the peer-to-peer portion of Skype is not covered (but SkypeIn and SkypeOut are). This capability doesn't exist in most VOIP providers' networks, and there is strong argument that the FCC doesn't have statutory authority to make this ruling, which is inconsistent with past court cases--most telecom providers are strongly opposing this rule. The Electronic Frontier Foundation has an excellent site of information about CALEA.

Krone next talked about the ability to conduct audio surveillance on the inside of the home using 30-100 GHz microwaves to measure vibrations inside the home. This is real technology for which there was a recent patent application.

He raised the issue of cell phone tracking, as is being planned to use for monitoring traffic in Kansas City (though he spoke as though this was already in place--this was a common thread in his talk, to speak of planned or possible uses of technology as though they are already in place).
(This is actually currently being used in Baltimore, MD, the first place in the U.S. to use it.)

He spoke very briefly about Bluetooth, which he said was invented by Intel and other companies (it was invented by Ericsson, but Intel is a promoter member of the Bluetooth Special Interest Group along with Agere, Ericsson, IBM, Microsoft, Motorola, Nokia, and Toshiba). He stated that it is completely insecure, that others can turn on your phone and listen to your phone's microphone, get your address book, and put information onto your phone. While he's quite right that Bluetooth in general has major security issues, which specific issues you may have depend on your model of phone and whether you use available methods to secure or disable Bluetooth features. Personally, I won't purchase any Bluetooth product unless and until it is securable--except perhaps a device to scan with.

Next, Krone turned to video surveillance, stating that in addition to cameras being all over the place, there are now cameras that can see through walls via microwave, that can be used by law enforcement without a search warrant, which hasn't been fully decided by the courts yet. I haven't found anything about microwave cameras that can see through walls, but this sounds very much like thermal imaging, which the Supreme Court has addressed. In Kyllo v. U.S. (533 U.S. 27, 2001) it was ruled that the use of a thermal imaging device to "look through walls" constituted a search under the Fourth Amendment and thus requires a search warrant. Scalia, Souter, Thomas, Ginsburg, and Breyer ruled with the majority; Stevens, Rehnquist, O'Connor, and Kennedy dissented.

Krone briefly mentioned the use of "see through your clothes" X-ray scanners, stating that six airports are using them today. This technology exists and is in TSA trials, and was actually tested at a Florida airport back in 2002. A newer, even more impressive technology is the new Tadar system unveiled in Germany in mid-October 2005.

He addressed RFIDs, and specifically RFIDs being added to U.S. passports in 2006, and some of the risks this may create (such as facilitating an electronic "American detector"). This is a real threat that has been partially addressed by adding a radio shielding to the passport to prevent the RFID from being read except when the passport is open. As Bruce Schneier notes, this is not a complete safeguard. Krone also stated that there is a California bill to put RFIDs in cars, with no commercial justification, just to "know where everyone is and what they have with them at all times." I'm not aware of the bill he is referring to, but the use of transponders in cars for billing purposes for toll roads is a possible commercial justification.

He spoke about the laser printer codes that uniquely identify all documents printed by certain laser printers, which have been in place for the last decade and were recently exposed by the Electronic Frontier Foundation and reported in this blog (Krone mistakenly called it the "Electronic Freedom Foundation," a common mistake). He also briefly alluded to steganography, which he wrongly described as "the art of hiding information in a picture." While hiding a message in a picture is one form of steganography, what is characteristic of steganography is that it is hiding a message in such a way as to disguise the fact that a message is even present.

He then went on to talk about Intel's AMT product--"Advanced Management Technology." This is a technology that allows computers to be remotely rebooted, have the console redirected, obtain various information out of NVRAM about what software is installed, and to load software updates remotely, even if the system is so messed up that the operating system won't boot. This is a technology that will be extremely useful for large corporations with a geographically dispersed work force and a small IT staff; there is similar technology from Sun Microsystems in their Sun Fire v20z and v40z servers which allows remote access via SSH to the server independent of the operating system, which allows console port and keyboard access, power cycling of the server, etc. This is technology with perfectly legitimate uses, allowing the owner of the machine to remotely deal with issues that would previously have required either physically going to the box or the expense of additional hardware such as a console server.

Krone described AMT in such a way as to omit all of the legitimate uses, portraying it as a technology that would be present on all new computers sold whether you like it or not, which would allow the government to turn your computer on remotely, bypass all operating system security software including a PC firewall, and take an image of your hard drive without your being able to do anything about it. This is essentially nonsensical fear-mongering--this technology is specifically designed for the owner of the system, not for the government, and there are plenty of mechanisms which could and should be used by anyone deploying such systems to prevent unauthorized parties from accessing their systems via such an out-of-band mechanism, including access control measures built into the mechanisms and hardware firewalls.

He then went on to talk about Digital Rights Management (DRM), a subject which has been in the news lately as a result of Sony BMG's DRM foibles. Krone stated that DRM is being applied to videos, files, etc., and stated that if he were to write a subversive document that the government wanted to suppress, it would be able to use DRM to shut off all access to that file. This has DRM backwards--DRM is used by intellectual property owners to restrict the use of their property in order to maximize the potential paying customer base. The DRM technologies for documents designed to shut off access are intended for functions such as allowing corporations to be able to guarantee electronic document destruction in accordance with their policies. This function is a protection of privacy, not an infringement upon it. Perhaps Krone intended to spell out a possible future like that feared by Autodesk founder John Walker in his paper "The Digital Imprimatur," where he worries that future technology will require documents published online to be certified by some authority that would have the power to revoke it (or revoke one's license to publish). While this is a potential long-term concern, the infrastructure that would allow such restrictions does not exist today. On the contrary, the Internet of today makes it virtually impossible to restrict the publication of undesired content.

Krone spoke about a large number of other topics, including Havenco, Echelon, Carnivore/DCS1000, web bugs and cookies, breathalyzers, fingerprints, DNA evidence, and so on. With regard to web bugs, cookies, and malware, he stated that his defense is not to use Windows, and to rely on open source software, because he can verify that the content and function of the software is legitimate. While I hate to add to the fear-mongering, this was a rare instance where Krone doesn't go far enough in his worrying. The widespread availability of source code doesn't actually guarantee the lack of backdoors in software for two reasons. First, the mere availability of eyeballs doesn't help secure software unless the eyeballs know what to look for. There have been numerous instances of major security holes persisting in actively maintained open source software for many years (wu-ftpd being a prime example). Second, and more significantly, as Ken Thompson showed in his classic paper "Reflections On Trusting Trust" (the possibility of which was first mentioned in Paul Karger and Roger Schell's "Multics Security Evaluation" paper), it is possible to build code into a compiler that will insert a backdoor into code whenever a certain sequence is found in the source. Further, because compilers are typically written in the same language that they compile, one can do this in such a way that it is bootstrapped into the compiler and is not visible in the compiler's source code, yet will always be inserted into any future compilers which are compiled with that compiler or its descendants. Once your compiler has been compromised, you can have backdoors that are inserted into your code without being directly in any source code.

Of the numerous other topics that Krone discussed or made reference to, there are three more instances I'd like to comment on: MRIs used as lie detectors at airport security checkpoints, FinCen's monitoring of financial transactions, and a presentation on Cisco security flaws at the DefCon hacker conference. In each case, Krone said things that were inaccurate.

Regarding MRIs, Krone spoke of the use of MRIs as lie detectors at airport security checkpoints as though they were already in place. The use of fMRI as a lie detection measure is something being studied at Temple University, but is not deployed anywhere--and it's hard to see how it would be practical as an airport security measure. Infoseek founder and Propel CEO Steve Kirsch proposed in 2001 using a brainscan recognition system to identify potential terrorists, but this doesn't seem to have been taken seriously. There is a voice-stress analyzer being tested as an airport security "lie detector" in Israel, but everything I've read about voice stress analysis is that it is even less reliable than polygraphs (which themselves are so unreliable that they are inadmissible as evidence in U.S. courts). (More interesting is a "stomach grumbling" lie detector...) (UPDATE March 27, 2006: Stu Krone says in the comments on this post that he never said that MRIs were being used as lie detectors at airport security checkpoints. I've verified from a recording of his talk that this is my mistake--he spoke only of fMRI as a tool in interrogation.)

Regarding FinCen, the U.S. Financial Crimes Enforcement Network, Krone made the claim that "FinCen monitors all transactions" and "keeps a complete database of all transactions," and that for purchases made with cash, law enforcement can issue a National Security Letter, including purchases of automobiles. This is a little bit confused--National Security Letters have nothing specifically to do with financial transactions per se, but are a controversial USA PATRIOT Act invention designed to give the FBI the ability to subpoena information without court approval. I support the ACLU's fight against National Security Letters, but they don't have anything to do with FinCen. Krone was probably confused by the fact that the USA PATRIOT Act also expanded the requirement that companies whose customers make large cash purchases (more than $10,000 in one transaction or in two or more related transactions) fill out a Form 8300 and file it with the IRS. Form 8300 data goes into FinCen's databases and is available to law enforcement, as I noted in my description of F/Sgt. Charles Cohen's presentation at the Economic Crime Summit I attended. It's simply not the case that FinCen maintains a database of all financial transactions.

Finally, Krone spoke of a presentation at the DefCon hacker conference in Las Vegas about Cisco router security. He said that he heard from a friend that another friend was to give a talk on this subject at DefCon, and that she (the speaker) had to be kept in hiding to avoid arrest from law enforcement in order to successfully give the talk. This is a highly distorted account of Michael Lynn's talk at the Black Hat Briefings which precede DefCon. Lynn, who was an employee of Internet Security Systems, found a remotely exploitable heap overflow vulnerability in the IOS software that runs on Cisco routers as part of his work at ISS. ISS had cold feet about the presentation, and told Lynn that he would be fired if he gave the talk, and Cisco also threatened him with legal action. He quit his job and delivered the talk anyway, and ended up being hired by Juniper Networks, a Cisco competitor. As of late July, Lynn was being investigated by the FBI regarding this issue, but he was not arrested nor in hiding prior to his talk, nor is he female.

I found Krone's talk to be quite a disappointment. Not only was it filled with careless inaccuracies, it presented nothing about how to defend one's privacy. He's right to point out that there are numerous threats to privacy and liberty that are based on technology, but there are also some amazing defensive mechanisms. Strong encryption products can be used to enhance privacy, the EFF's TOR onion routing mechanism is a way of preserving anonymity, the Free Network Project has built mechanisms for preventing censorship (though which are also subject to abuse).

Tuesday, November 01, 2005

William Dembski's Obsessive Complaints of Obsession

Ed Brayton comments on the "Isaac Newton of Intelligent Design"'s crazy accusations of obsession against his critics. Dembski's latest is to accuse mathematician Jeff Shallit of being removed as a witness in the Dover trial because "his obsessiveness against me and ID made him a liability to the ACLU." Actually, Shallit did not testify because he was a rebuttal witness to Dembski, Dembski withdrew from the trial, and the defense did not use Dembski's ideas in their case.

Dembski then dug the hole deeper, stating that this couldn't be the reason. Why not? Because he withdrew before Shallit's deposition was taken. He went on to challenge the ACLU and Shallit to release a transcript of the deposition. Unfortunately for Dembski, it was the defense that took the deposition, to make sure they would be prepared in case Shallit would be used as a witness--and the deposition (at least in the preliminary, uncorrected transcript) is already a public record.

Perhaps Dembski should work on responding to his critics, rather than accusing them of stalking him.

Sunday, September 11, 2005

Rehnquist remembered, Rashomon-style

Clint Bolick and Alan Dershowitz have written two very different--yet only occasionally directly contradictory--rememberances of Chief Justice William Rehnquist. Bolick, in a piece distributed by the Goldwater Institute and published in the Arizona Republic, describes Rehnquist as a conservative, moderating influence on a liberal court, advocating state's rights, school choice, and presiding over a court that has been "usually (though less frequently lately) siding with individual liberty over state power." Dershowitz, on the other hand, in a piece published on the Huffington Post, describes Rehnquist as a bigot who enjoyed racist and anti-Semitic jokes, who defended the "separate but equal" doctrine in Plessy v. Ferguson as a law clerk for Justice Jackson, and who began his legal career as a Republican thug who obstructed African-American and Hispanic voters at Phoenix polling places.

Bolick gives a more nuanced view that actually addresses more of Rehnquist's work on the court (though less than I would have expected), while Dershowitz emphasizes evidence of Rehnquist's personal character which mostly derives from before he was on the Supreme Court. I was surprised that Bolick didn't mention some of the recent cases (such as Raich v. Ashcroft and Kelo v. New London) where Rehnquist voted for liberty (and was unfortunately in the minority).

Yet I have no doubt that there is accuracy in both descriptions. Bolick has in the past seen people as defenders of liberty who have done much to destroy it, such as former Attorney General John Ashcroft. Dershowitz alternatively takes courageous stands in defense of liberty and crazy stands which oppose it.

One area where I was less than impressed with Rehnquist was on religious liberty, specifically for nonbelievers. He (like the majority) went the wrong way on Elk Grove v. Newdow (the Pledge of Allegiance "under God" case) and (unlike the majority) the wrong way on the McCreary County v. ACLU case (Ten Commandments display in a Kentucky courtroom which included a written statement that the display was "in remembrance and honor of Jesus Christ, the Prince of Ethics").