Tag Archives: privacy

The EARN IT Act: Too Important to be a Binary Issue

Photo by Pixabay on Pexels.com

by Rick Bretz

The EARN IT Act or its proper name, Eliminating Abusive and Rampant Neglect of Interactive Technologies (or EARN IT) Act, if passed, will hold the IT industry responsible for the online exploitation of children and other criminal activity.  

The bipartisan legislation, sponsored by Senators Lindsey Graham, SC, Richard Blumenthal, CT, Josh Hawley, MO, and Dianne Feinstein, CA, creates incentives in the form of liability protection with their cooperation with the law and due diligence toward fighting exploitation.

As Senator Lindsey Graham said at the introduction, “This bill is a major first step. For the first time, you will have to earn blanket liability protection when it comes to protecting minors. Our goal is to do this in a balanced way that doesn’t overly inhibit innovation, but forcibly deals with child exploitation.”

This legislation is admirable in its desire to eradicate child exploitation and sites that harbor these images on the internet.  It could give lawmakers the green light to many other activities.

Another side of the issue has surfaced and it’s the privacy aspect of the issue. As with all legislation, privacy rights groups fear the law will be exploited for tracking all internet activity.

The Electronic Frontier Foundation’s (EFF) website sees it as a privacy issue as well as government interference with business practices.

An article on the site states, “(The Bill) grants sweeping powers to the Executive Branch. It opens the door for the government to require new measures to screen users’ speech and even backdoors to read your private communications—a stated goal of one of the bill’s authors.”

More than one senator agreed with that “stated goal.”  At a recent hearing, tech company leaders from Apple and Facebook and others were grilled about warrant-proof data encryption.  Congress concluded these companies protect terrorists, organized crime, and child abusers from criminal investigations and the proof needed to prosecute them.

The message sent in cold words at the hearing and forwarded to tech company managers was to “get on with it” and develop warrant- compatible encryption or congress will take up the matter and force them to do it.

As Senator Marsha Blackburn, TN, said at the hearing, “It is troubling to me to hear you say that giving the key to law enforcement would cause a weakness in the device that would be a bad trade-off.”

Blackburn summarized the issue, “Catching criminals is never a bad trade-off.”

The EFF article points out that the new legislation would undermine Section 230 of the 1996 Communications and Decency Act which generally states that you say or post something illegal online, the individual is responsible and not the provider, website or platform.  The new bill would hold companies, providers, and websites responsible for lawsuits, civil damages and state criminal prosecutions.

The new law would require companies to put measures in place to identify, screen user’s posts and speech broadcasted and to also integrate back doors in order to gain access for investigations.

Section 230 also gives email users protection from forwarding messages without being prosecuted.  Section 230 outlines many standard business practices that have been around several years.  Congress is essentially saying it’s for the law to catch up with innovation.

Privacy advocates see this as a direct shell shot into the bow at the free speech protection vessel.  The concern lies in the potential misuse by government officials, especially using the law in the wrong hands or wielded by a vindictive personality. See political axe to grind.

The other side, Senator Feinstein points out, “Technological advances have allowed the online exploitation of children to become much, much worse over recent years.”

Feinstein further explained, “Companies must do more to combat this growing problem on their online platforms. Our bill would allow individuals to sue tech companies that don’t take proper steps to prevent online child exploitation, and it’s an important step to protect the most vulnerable among us.”

As many as 70 groups representing survivors, families and stakeholders such as law enforcement, as well as the National Center for Missing & Exploited Children (NCMEC), Rights4Girls, and the National Center on Sexual Exploitation support the legislation.

Plenty of support exists for both sides of the issue.  One argument is that the legislation, if passed, will break the end to end encryption used for the CIA (Confidentiality, Integrity and Availability) security triad.

An additional criticism from opponents accuses the government of using horrific child exploitation internet and email activity by criminals to pass legislation to digitally spy on the public. The 2020 version of the black helicopter.

If two parties want to solve an important issue, put aside the rhetoric and solve the problem, especially when the solution has bipartisan support.  The EARN IT Act is not a binary issue. It’s not on or off. Right or Wrong. The arguments are not mutually exclusive.  You can speak common language from both sides of the aisle.  The government, tech companies, and advocacy groups must meet and hash out an agreement to both protect children and safeguard privacy for law abiding individuals.

More safeguards and child protections can be accomplished and should be supported by everyone. 

At the same time, the media savvy public should not be wary of sending an email for fear of who is reading it in a big building in the center of Washington, DC, in a dark room with people standing behind the person, looking over both shoulders.

References:

https://www.judiciary.senate.gov/press/rep/releases/graham-blumenthal-hawley-feinstein-introduce-earn-it-act-to-encourage-tech-industry-to-take-online-child-sexual-exploitation-seriously

https://www.lawfareblog.com/earn-it-act-raises-good-questions-about-end-end-encryption

https://www.politico.com/news/2019/12/10/tech-companies-bipartisan-congress-encryption-080704

https://www.eff.org/deeplinks/2020/01/congress-must-stop-graham-blumenthal-anti-security-bill

1984-Thirty Years Later

nsa-operations

by Rick Bretz

George Orwell’s dystopian novel, 1984, published in 1949, has been reestablished as the go-to book for all things wrong with government privacy invasion and society’s ills.   With government-funded security professionals scrutinizing some or all of the internet usage and phone conversations that are happening today, it does reflect the worst themes of 1984. Of course it is more complicated than the government watching over people. September 11, 2001, showed us that proper vigilance can go a long way toward keeping people safe from terrorists who want to prove a point by killing innocent people. Orwell’s novel remains a commentary on communist practices in the Soviet Union and modern relationships between governments, media and citizens throughout the world.

Some of the themes of 1984, nevertheless, seem to be blanketing our society as we live and work carrying our information devices. Smart Phone and internet monitoring are instances of privacy concerns. In spite of this fact, millions of people publicize their every move on Facebook, Twitter and any other social media. This fact makes it difficult to take the side of a person wronged by the invasion of privacy. People want privacy only on their terms. Like the movie star or celebrity who craves success but doesn’t want the paparazzi baggage that comes with it. If you want safety and security and still need your family and friends to know about last night’s pizza party, you have to compromise a little, maybe a lot.

Below is a 1984 to present comparison.

1984 Themes Today
Invasion of Privacy-1984————————2014> Phone Surveillance, internet tracking
Constant Surveillance1984———————2014> GPS Trackers in Vehicles, Cameras on Streets and at traffic lights. Aerial Surveillance
Torture (Room 101)-1984———————–2014> Pick a country
Double Think-1984——————————2014> Advertising, college professors
 

Cult of personality1984————————-2014>

World Leaders, celebrities, musicians, talk show hosts, and televangelist
Tele-screens (two-way Monitors)-1984——2014> Overhead surveillance, street cameras, two-way camera software
Class System (Proles, Outer Party)-1984——-2014> The 1 Percent, Poor, Working Class, Blue Collar, Middle Class, the Power Elite, Educated Elite, Fortune 500 CEOs, Government Officials (Elected and Appointed)
News Speak-1984——————————-2014> Affordable Healthcare Act, (government catchphrases used as titles for legislation)
Ministry of Plenty (Food Supply)-1984———-2014> Rising Oil Prices, Government Regulation, Inflation
Ministry of Peace (War)-1984——————-2014> World Leaders and Defense Ministers
Ministry of Truth (News)-1984——————2014> CEOs and managing editors of news organizations dictate the headlines and stories seen by consumers. Federal Communications Commission. Advertisers
Ministry of Love (Dissidents)-1984————-2014> Whistle blowers usually pay a price
Poverty, Vices-1984—————————–2014> Making vices like alcohol and drugs (marijuana) available control the public and provide needed revenue.
Censorship-1984——————————–2014> If a show or story does not please a power player, they have monetary and power influences to make it disappear.
Controlling the Middle Class-1984—————2014> Taxes, regulations and travel restrictions or religious and government organizations (Republican and Democratic Parties)

 

There are many ways to track a person today. It would be difficult to get lost when the hunter really wants to find you. Let me count the ways: GPS Device, Car Computers, Credit Cards, Smart Phone, Home Phone, Social Security Number, Driver’s License, Aerial Reconnaissance, Drones, and Toll Roads just to name a few.

Cars today have what is called a “Breaking Coach.” It tells you that you have driving skills. Don’t kid yourself. It is a way to determine how safe our driving habits are in case we are in an accident. Insurance companies and law enforcement officials really want to know this.

Your MAC (Media Access Control) address is a unique set of digits that identifies your particular computer or Network Interface Card, and with the IP (Internet Protocol) address, can determine your internet history. It’s a digital signature.

When you drive through a toll booth, a camera records your drive through and your license plate and if you have a toll sticker on your window it identifies that too.

Officials in several states are studying the feasibility of adding hardware to vehicles to track the number of miles a car travels on the highway to determine a road tax.

And the hits just keep on coming.

 

Notable Links:

http://www.history.com/this-day-in-history/george-orwells-nineteen-eighty-four-is-published

http://en.wikipedia.org/wiki/Nineteen_Eighty-Four