Daily Archives: May 20, 2017

Can Michael Flynn Really Defy Congress and Get Away with It? – VICE

Posted: May 20, 2017 at 6:31 am

It feels like a lifetime ago that Michael Flynn resigned as National Security Advisor. In administration where a scandal is now breaking on an almost daily basis, it's hard to recall something that happened as recently as Februaryeven if it might ultimately define Donald Trump's presidency.

But Flynn remains among the most important players in the mushrooming scandal over whether the Trump campaign colluded with Russia during the 2016 election. Late Wednesday brought a deluge of less than flattering news about the former generalincluding his delaying an anti-ISIS operation opposed by Turkey after receiving cash apparently intended to encourage him to help its government. Then, on Thursday, the chair of the Senate Intelligence Committee, North Carolina Republican Richard Burr, said that Flynn would not complying with a subpoena for documents pertaining to the Russia mess.

An hour or two later, the Associated Press reported that Burr had corrected himself, and that actually, Flynn's lawyers just haven't responded yet.

To make sense of what it would mean for Flynn to simply go rogue and not play ball with Congress, I called up a law professor at the University of Baltimore named Charles Tiefer. In a past life, Tiefer worked in the Senate Legal Counsel's office and handled enforcement cases against organized crime figures, which is to say he's pretty familiar with the the procedures at hand. He said that what's happening right now is very unusual, though noncompliance might be the retired general's only move if he wants to avoid time behind bars.

"It signifies that the former high official expects prosecution," he told me of Flynn possibly not cooperating. "So it's as rare as felons in the Oval Office."

Here's a condensed and lightly edited version of what else we talked about.

VICE: So what would Flynn be thinking if he did ultimately refuse the subpoena? Charles Tiefer: Flynn may be invoking his Fifth Amendment privilege. There was an earlier time some weeks ago when he said that he wanted an immunity deal with the Senate committee, and that often signifies fear of self-incrimination.

Can you game out what's next if Flynn does refuse? Does the Senate Intelligence Committee have the ability to issue a contempt citation like a judge would? It's not clear whether a court will enforce a subpoena against someone with a well-founded fear of prosecution. And Flynn seems to be one of the main targets of the special counsel. He may be left alone with his looming prosecution problems rather than face subpoena enforcement from the Senate.

Now the Senate Intelligence Committee has two choices [if Flynn refuses to cooperate]. They can say they've done as much as is possible with a witness under criminal investigation and facing prosecution and turn to other witnesses. Or the Senate can direct the Senate legal counsel to go to court and seek a court order compelling him to provide his documents. But the Senate is unlikely to do that if his Fifth Amendment claim is valid.

If this goes to court, would Flynn also get the opportunity to argue the subpoena is unwarranted? I don't see any defense for him other than the Fifth Amendment. He would make that argument to the committee, and then if the claim is valid, the committee will not pursue him. This subpoena didn't seek his testimony, it sought his documents. And an individual's documents are not cloaked with a Fifth Amendment privilege. But the Supreme Court has said that requiring an individual to produce his own documents does have a Fifth Amendment protection because of what's called the act of production violates his privilege against self-incrimination. So if he shared his documents with someone else, you could subpoena his documents from that person without there being a Fifth Amendment privilege.

OK, so maybe we can get the documents from someone else. But would a refusal to provide docs suggest Flynn won't ever testify himself? Oh, yes. The committee can require him to show up and take the Fifth Amendment, and indeed congressional committees have done that with officials like Lois Lerner of the IRS in recent years. But committees have also accepted lawyers saying their clients would take the Fifth and not even call them in. In any event, you don't get any information from such a witness.

So Flynn refusing to cooperate might actually not be a crazy move for him?There could have always been negotiations with him had he been willing to cooperate. For example, say he's only concerned about criminal investigation about his payments from Turkey. He could have negotiated an arrangement with the Senate Intelligence Committee in which he gave them whatever documents they had like his personal calendar relating to the Russian matter but not the Turkish matter.

It was worth trying to see whether he had any willingness to cooperate at all. The answer [may ultimately be] no, which would also change how the Congress and the public visualize him. He'd look a lot less like someone caught up in an investigation, and more like a criminal defendant.

Follow Allie Conti on Twitter.

More here:
Can Michael Flynn Really Defy Congress and Get Away with It? - VICE

Posted in Fifth Amendment | Comments Off on Can Michael Flynn Really Defy Congress and Get Away with It? – VICE

Attorney says judge violated Murfreesboro dad’s 4th Amendment rights and took kids away – WZTV

Posted: at 6:31 am

Attorney says judge violated Murfreesboro dad's 4th Amendment rights and took kids away. PHOTO: WZTV FOX 17 Nashville

Murfreesboro's Daniel Russell has two kids with his wife Kimberly and three from a previous marriage. Those three kids lived in Wayne county.

Out of the blue one day, he gets a phone call from DCS saying they are taking his kids from his ex-wife and going into state custody. Russell says he was told "if you want them, you have two hours."

I left work and got them, said Russell.

This wasn't easy. His family of four became a family of seven. His 16-year-old daughter was pregnant, and his son has a learning disability.

Nevertheless , Russell never hesitated. He got a bigger apartment and rolled up his sleeves. He and his wife joyfully accepted their new big family.

We keep a tight ship," Russell said. "We keep a calendar on the wall and have dinners planned out for a week. The kids came from a totally different environment, and the DCS workers saw that when they came to my house."

Truth was, Daniel Russell and his wife were loving it and his kids were too.

I got a permanent parenting plan in the mail, and they said they were closing the case, Russell said.

Russell went down to Waynesboro to close the case. Out of the blue, Russell says Juvenile Court Judge James Ross ordered him to take a drug test.

Keep in mind, Russell has no drug history. There is no order anywhere requiring drug screening during the process.

The judge was like 'you ain't gonna take a drug test?' and I said hold stop right there I think I need to consult an attorney, Russell said. "That's not what I said, that's not what is happening."

Russell said he would go to a commercial lab and take a drug test right then and there. The court said not good enough and dismissed the motion the close the case.

Judge Ross then rules there is probable cause that the children are neglected or abused and takes the kids from Daniel.

"All of a sudden, boom, I am under the bus, said Russell.

After that shocking hearing, Russell hired well-known family law attorney Connie Reguli.

Look at this objectively," Reguli said. "He came in and saved the day; took kids who were in a bad situation, got them re-stabilized in his home, in school, his daughter medical care, and he had to change his life with two hours notice, and then he thinks it's over and he goes to court and the next thing you know before the sun sets that day he is turning his kids over to DCS custody."

Daniel says Mikayla, Christopher and Hannah are heartbroken, ripped away from a dad who was showing how much he cared.

Judge Ross gives two kids to Daniel's brother and his daughter to his ex-wife's grandmother. They are not even living in the same county anymore.

Connie Reguli says this is a violation of Fourth Amendment rights, the right against illegal search and seizure without probable cause.

When you have someone walk in and there has never been an allegation , never a positive screen, no referral, no complaint there has never been anything that would even suggest this is a parent who abused drugs, this is a Fourth Amendment violation," Reguli said. "There is no loophole."

This man, who has already spent thousands of dollars to make a real home for his kids, is spending thousands getting them back.

Russell did take that drug test at a private lab, and it was negative. Now five weeks later, he still doesn't even have a court date to get his kids back.

The rest is here:
Attorney says judge violated Murfreesboro dad's 4th Amendment rights and took kids away - WZTV

Posted in Fourth Amendment | Comments Off on Attorney says judge violated Murfreesboro dad’s 4th Amendment rights and took kids away – WZTV

First Amendment: often challenged but consistently enduring – Washington Post

Posted: at 6:30 am

By Roy S. Gutterman By Roy S. Gutterman May 19 at 9:43 AM

Roy S. Gutterman is an associate professor and director of the Tully Center for Free Speech at the S.I. Newhouse School of Public Communications at Syracuse University.

When protesters recently shouted conservative firebrands Ann Coulter and Milo Yiannopoulos off the University of California at Berkeley campus, the irony surrounding these two separate but related incidents was as bright as the fires that the protesters ignited, nearly burning down an academic building. How could the birthplace of the 1960s free speech movement be so hostile to opposing viewpoints?

A university should be a place where discussion and debate flourish. In this case, speakers on one side of the debate had no trouble articulating their viewpoint, while they silenced speakers on the other side of the table. This not only stifles the marketplace of ideas, it also runs counter to the values of the First Amendment.

While conservative opinions were targeted at Berkeley, challenges to free speech come from across the political spectrum. President Trumps declaration that the press is the enemy of the American people was one of his sharpest attacks against journalists and the Fourth Estate. It built on his other promises to crack down on leaks to journalists, as well as his campaign rhetoric naming and personally insulting reporters, and pledging to crack down on opponents and open up libel law to make it easier to recover damages from the press.

[Pray for the First Amendment. Now.]

Yet in the face of the rhetoric, the vitriol and the tweets, citizens and the press are still able to draw on the power and permanence of the First Amendment. Floyd Abrams, perhaps the countrys most prominent First Amendment and media lawyer, makes his latest case defending free speech and press rights in his book The Soul of the First Amendment. Abramss thesis is that speech and press rights are woven into the fabric of America and set the United States apart from the rest of the world. These inherently human rights are akin to freedom of conscience and lead citizens to achieve self-fulfillment through speech, expression, publication and the free flow of information.

A series of six essays, The Soul of the First Amendment is a quick read, and at about 140 pages, considerably thinner than Abramss other books on the topic, particularly his recent books Friend of the Court (2013) and Speaking Freely (2005). These essays are readable and comprehensible to both a specialized audience of lawyers and laypeople just looking to understand a little more about these rights.

The books brevity does not detract from its substance or clarity as Abrams explains the origins and tensions of the First Amendment. He dives into historic and contemporary controversies that test our adherence to these principles, noting, Speech is sometimes ugly, outrageous, even dangerous.

The journey of the First Amendment begins at the Constitutional Convention in 1787 and with the vision of James Madison and the framers who emerged from the Revolution skeptical of governments power over the people, and governments propensity to abuse that power through censorship or aggressive application of laws to punish speech or dissent.

The notion that First Amendment interests are served whenever laws genuinely reflect public opinion also seems to overlook the reality that the public too often seeks to suppress speech it disapproves of, he writes.

The road, however, is littered with the carcasses of dissidents and offensive speakers. Threats to speech are discussed throughout the book, including the Sedition Act of 1798; the Espionage Act of 1917; and the jailing of abolitionist journalists during the Civil War or communists and socialists during the Red Scare, McCarthyism and the Cold War. American history is replete with examples of attacking, punishing, ostracizing or censoring a range unpopular or offensive speakers.

[Our First Amendment test is here. We cant afford to flunk it.]

As the country has evolved, so has our protection of and tolerance for free speech and the marketplace of ideas.

Abrams supports much of his thesis in a lawyerly fashion, pointing to Supreme Court precedents and sprinkling in points from caselaw. It reads like a First Amendments Greatest Hits compilation. He cites such cases as New York Times v. Sullivan (1964), which revolutionized libel law and facilitated robust debate and criticism of public officials and public policy, particularly civil rights. He describes how in New York Times v. United States (1971), the Pentagon Papers case, the Supreme Court stood up to the Nixon administration by refusing to allow the government to block publication or censor the Times and The Washington Post, which were running stories based on leaked top-secret government documents.

The historic and the contemporary are explained and juxtaposed. For example, Abrams draws comparisons between the Pentagon Papers and WikiLeaks and the Edward Snowden stories published by the Guardian. Discussions of public officials and public figures litigating against the press are compared with recent threats by President Trump, as well as the Hulk Hogan invasion-of-privacy verdict against Gawker.

Other recent First Amendment challenges are also part of the discussion, including offensive religious protesters at military funerals, virtual child pornography, videos depicting animal abuse, flag burning and other outrageous speech. This illustrates another theme: It is easy to protect speech that does not rankle people, but the First Amendment protects ugly and offensive speech, too. Abrams also devotes a sizable portion of a chapter to defending the controversial Citizens United case.

Resting nicely on the pedestal Abrams builds, the First Amendment might be akin to Americas crown jewels, setting us apart from dictatorships and even other democracies. He writes that the gulf between the legal protections afforded to free expression in the United States and those afforded in Europe remains oceanic.

The explication begins with an anecdote from a family cruise in 1976, when his son, Dan, got into a tiff with the ships British staff, which barred the youth from a viewing of the PG-rated All the Presidents Men because of profanity. The aggrieved Dan, who grew up to be a lawyer and legal affairs reporter, chortled, Thats why we have the First Amendment.

Of course, the protections of the First Amendment apply only to government action and do not reach beyond our borders. However, this personal story sets the tone that Madison was really onto something unique.

Many other countries have laws protecting and supporting freedom of speech. However, Abrams notes that in many places, these pronouncements are mere lip service to such freedoms, especially in places where journalists and dissidents are censored, harassed, imprisoned or killed for expressing themselves.

With these countries, there is no comparison and never will be. Abrams also distinguishes between American values and European countries, particularly Britain and the European Union, where libel laws are more plaintiff-friendly and the right to be forgotten has forced websites and search engines such as Google to remove hundreds of thousands of articles. International plaintiffs seek and sometimes find hospitable jurisdictions in which to litigate and punish the press through libel tourism.

As much as the First Amendment grants us rights to speak and express ourselves, the amendments construction is a bar on government power and potentially abuse. Congress shall make no law is a declaration to people around the world that the United States reveres our speakers and our government shall not abuse them.

Abrams has spent a lifetime fighting for First Amendment rights in courtrooms and the court of public opinion. It takes lawyers and judges to protect these rights and to write the story of the First Amendment. Abramss tribute to the amendment comes at a time when many believe that freedom of the press and freedom of speech are under attack from the highest levels of government.

Lets hope Abrams is writing an homage to the First Amendment, not its obituary.

The Soul of the First Amendment

By Floyd Abrams

Yale. 145 pp. $26

The rest is here:
First Amendment: often challenged but consistently enduring - Washington Post

Posted in First Amendment | Comments Off on First Amendment: often challenged but consistently enduring – Washington Post

Naked TSA Checkpoint Guy loses First Amendment challenge to $500 fine – Washington Post

Posted: at 6:30 am

From Brennan v. U.S. Dept of Homeland Sec., decided Tuesday by the Ninth Circuit:

When Transportation Security Administration (TSA) officers at Portland International Airport told John Brennan that he needed to undergo additional security screening because he tested positive for explosives, Brennan, in the middle of a TSA checkpoint, stripped naked. When TSA officers told Brennan to get dressed, he refused three times. After TSA officers had to close down the checkpoint and surround Brennans naked body with bins until the police arrived to remove him, the TSA fined Brennan $500 for interfering with screening personnel in the performance of their duties. See 49 C.F.R. 1540.109 (No person may interfere with, assault, threaten, or intimidate screening personnel in the performance of their screening duties under this subchapter.). Brennan petitioned for our review. We have jurisdiction under 49 U.S.C. 46110, and we deny the petition.

Brennans core contention is that stripping naked in the middle of a TSA checkpoint is expressive conduct protected by the First Amendment. But Brennan fails to carry his burden of showing that a viewer would have understood his stripping naked to be communicative. See Clark v. Cmty. for Creative Non-Violence, 468 U.S. 288, 293 n.5 (1984). Therefore, his conduct is not protected by the First Amendment.

Brennan also argues that his conduct did not violate the TSA regulation and that even if it did, the regulation is too vague to survive challenge under the Due Process Clause. Neither argument has merit. The regulation prohibits interfer[ing] with screening personnel in the performance of their screening duties. 49 C.F.R. 1540.109. A regulation is unconstitutionally vague if it fails to provide a person of ordinary intelligence fair notice of what is prohibited, or is so standardless that it authorizes or encourages seriously discriminatory enforcement. In making this judgment, we provide greater tolerance of enactments with civil rather than criminal penalties because the consequences of imprecision are qualitatively less severe.

Brennans conduct falls squarely within the regulations ordinary, contemporary, common meaning. We have long recognized that interfere has such a clear, specific and well-known meaning as not to require more than the use of the word[] in a criminal statute. In other words, the word has a settled legal meaning[]. And courts have often defined and applied it, but never in a way that would lead a person of ordinary intelligence to think that he or she could strip naked at a TSA checkpoint and refuse to get dressed, leading to the closure of the checkpoint.

The petition for review is DENIED.

Note that Brennans Oregon state court prosecution for public nudity ended with an acquittal:

The judge sided with the defense, which cited a 1985 Oregon Court of Appeals ruling stating that nudity laws dont apply in cases of protest.

It is the speech itself that the state is seeking to punish, and that it cannot do, Circuit Judge David Rees said. [Oregonian, Aimee Green.]

But the Ninth Circuit wasnt bound by this conclusion; state acquittals dont preclude federal claims, and in any event criminal acquittals dont preclude civil claims, which rely on a lower standard of proof. (Remember O.J.?)

Go here to read the rest:
Naked TSA Checkpoint Guy loses First Amendment challenge to $500 fine - Washington Post

Posted in First Amendment | Comments Off on Naked TSA Checkpoint Guy loses First Amendment challenge to $500 fine – Washington Post

EDITORIAL: Good First Amendment news – Washington Times – Washington Times

Posted: at 6:30 am

ANALYSIS/OPINION:

Sometimes theres a nugget of something good in the daily ration of bad news. A T-shirt printer in Lexington, Ky., one Blaine Adamson, won a state court ruling early this month that he was within his First Amendment rights to refuse to print an offensive message on T-shirts ordered by the Gay and Lesbian Services Organization for a gay pride parade.

The court overturned a ruling by the Lexington-Fayette Urban County Human Rights Commission that Mr. Adamsons firm, called Hands On Originals Christian Outfitters, violated a city ordinance barring discrimination based on sexual orientation.

Writing for the court majority, Chief Judge Joy Kramer agreed that the ordinance prohibits such discrimination, but discrimination was not at issue. Objecting to being compelled to propagate a message Mr. Adamson finds odious is not the same as refusing to serve the group because of the sexual orientation of its members.

The right of free speech does not guarantee to any person the right to use someone elses property, Judge Kramer wrote. The conduct [that] Hands On Originals chose not to promote was pure speech. Nothing in the fairness ordinance prohibits Hands On Originals, a private business, from engaging in viewpoint or message censorship.

Indeed, Mr. Adamson said hes willing to print LGBT T-shirts as long as the message he is asked to print on them does not promote homosexuality. Hands On Originals prints messages on mugs, pens and other things as well as T-shirts. Mr. Adamson has in the past declined printing jobs for a strip joint and for pens promoting a sexually explicit video.

The Kentucky ruling runs contrary to similar cases in Colorado, Oregon, New Mexico and elsewhere, in which Christian bakers, photographers and florists were penalized for exercising religious beliefs in refusing to participate in same-sex weddings.

The Kentucky ruling should encourage Jack Phillips, owner of the Masterpiece Cakeshop of Lakewood, Colo., who has appealed to the U.S. Supreme Court to reverse a 2013 ruling by the Colorado Civil Rights Commission, upheld by state courts, to punish him for refusing, for religious reasons to bake a cake for a same-sex wedding reception.

The high court has avoided taking the Phillips appeal for months while the court lacked a ninth justice in the wake of the death of Justice Antonin Scalia. With the confirmation of Neil Gorsuch as the ninth justice, the high court is now fully manned and ready for business.

See more here:
EDITORIAL: Good First Amendment news - Washington Times - Washington Times

Posted in First Amendment | Comments Off on EDITORIAL: Good First Amendment news – Washington Times – Washington Times

Vail Daily column: First Amendment and the commentary page – Vail Daily News

Posted: at 6:30 am

After reading a column titled "Setting the record straight," written by Pat Mitchell and published in the Saturday, May 13, edition of the Vail Daily, a concerned community member emailed me, calling into question my decision to allow Mitchell to use the newspaper as a forum to share his thoughts on homosexuality and the church.

As journalists, we live and die by the First Amendment, which protects all manner of expression, with a few notable exceptions. These exceptions have been defined by case law and include such things as obscenity, child pornography and inciting others to lawlessness.

When it comes to determining whether a submission makes it onto the commentary pages of the Vail Daily, the above-mentioned exceptions to free speech rarely, if ever, come into play. The three categories we are much more likely to come across are defamation, or in our case, since it's written, libel; what's called a "true threat," which is a verbal assault that threatens physical harm to a specific person; and fighting words.

Fighting words are "those which by their very utterance inflict injury or tend to incite an immediate breach of the peace," wrote Justice Frank Murphy in the 1942 U.S. Supreme Court decision for Chaplinsky vs. New Hampshire, a case that helped define those unprotected elements of speech.

Mitchell concluded his column by saying, "The Bible accepts homosexuals, both men and women, to the faith. They don't, however, condone their sexual behavior. Churches welcome them willingly as they would adulterers, thieves and others seeking forgiveness."

By describing homosexuals in the same breath as adulterers and thieves, was Mitchell using fighting words, inciting immediate action from those who read his remarks and thereby wandering into the narrow realm of speech not protected by the First Amendment? I don't believe so.

Whether or not I agree with Mitchell's conclusion did not factor into my decision to print his column. If I censored every opinion that ran contrary to my own, then I would not be a very good steward of this newspaper. Instead, I weighed his words against established tenets of free speech and, after careful consideration, published his column.

I believe it's critical that submissions to the commentary pages of the Vail Daily remain as free from my or anyone else's intrusion as is possible under the law, in order to cultivate a robust community dialogue. As a newspaper, we cannot demand the protections provided us by the First Amendment if we don't also uphold them within these pages.

Krista Driscoll is the editor of the Vail Daily. You can reach her at kdriscoll@vaildaily.com.

Read more:
Vail Daily column: First Amendment and the commentary page - Vail Daily News

Posted in First Amendment | Comments Off on Vail Daily column: First Amendment and the commentary page – Vail Daily News

Northwestern Students Shut Down Speech as President Says First Amendment ‘Not Absolute’ – Heat Street

Posted: at 6:30 am

On the same day the president of Northwestern University told the Wall Street Journal it was sometimes appropriate to restrict speech on campus, disruptive students prevented an in-class speech by an official from U.S. Immigration and Customs Enforcement.

An ICE spokeswoman was scheduled to talk to a Northwestern sociology class on Tuesdayone half of a two-part lesson, now cancelled, that would have also included a speech by an undocumented immigrant.

Protestors initially stood outside the classroom chanting F**k ICE. They were then admitted to the classroom, where they interrupted the talk and aggressively confronted both the ICE representative and the professor who had invited her, the student newspaper reported. The ICE officer left without completing her speech.

That same day, the Wall Street Journal published an interview with Northwesterns president, Morton Schapiro, where he defended safe spaces and said that offensive speech targeting specific individuals or groups might, in some circumstances, be considered assault, not free speech.

You want to protect the First Amendment, obviously, but it isnt absolute, Schapiro said. People reduce it to slogans or free speech at all costs.

Schapiro also said: I will just say that if you shut down freedom of speech, you better have a really good reason. I think if you shut down anything, you better be really sure that you have a moral and legal justification to do it. Thats my view.

The protestors came from MEChA, a campus Chicano group; Black Lives Matter, the Immigrant Justice Project, the Asian American Pacific Coalition and various LGBT campus groups, the Daily Northwestern reported.

On Facebook, MEChA defended shutting down the ICE officials talk:

Dialogue with any ICE official legitimizes their position as state actors of violence.The presence of an ICE PR agent whose sole purpose is to make ICE look good and recruit students implies university complicity and encouragement of the actions of this organization. We do not engage in conversations with ICE in any way, shape or form regardless of their position.

Citing security and privacy concerns, Beth Redbird, the professor who invited the ICE official to speak, said she had cancelled a scheduled talk by an undocumented immigrant. Her class focuses on inequality in American society with an emphasis on race, class and gender.

In a discussion with students, Redbird defended her decision to invite the ICE representative, the Daily Northwestern reported. All they did was come here today to answer questions so you know whats going on, so that you are informed and so you can make decisions. If you want to make change in a community, you need to know whats going on, she said.

In a jointstatement, Schapiro and Northwesterns provost said they were deeply disappointed in students disrespectful, inappropriate behavior Tuesday.

While we understand the point of view expressed by the students protesting the guest lecturers invited to speak here, the resulting disturbance not only limited the academic inquiry central to our campus, it also forced invited speakers to leave and violated the rights of other enrolled students who were present to learn. Free expression must be protected and should be countered with more debate, close examination and critical thinkingnot censorship, their statement said.

The university also said it was reviewing the facts around the protests so it could take appropriate action.

Earlier this week, the Northwestern chapter of Students for Justice in Palestine hosted Rasmea Odeh, a woman convicted for a terrorist attack; her group, the PopularFront for the Liberation of Palestine had planted a bomb in a box of candy, which killed two college studentswhen it detonated agrocery storein Jerusalem.Pro-Israel groups on campuscondemned the event as an affront to the sanctity of life, saying it crosses a moral line.

In a statement, Northwestern Hillel announced it would hold a silent vigil for Odehs victims outside of the venue. This will be a silent, non-confrontational vigil, the group said. We will not attempt to disrupt the event in any way.Our goal is not to protest free speech, but instead to mourn the victims ofthe convicted terrorist who is speaking on our campus.

Schapiro joined about 150 students, professors and staffers who attended the vigil.

Jillian Kay Melchior writes for Heat Street and is a fellow for the Steamboat Institute and the Independent Womens Forum.

More here:
Northwestern Students Shut Down Speech as President Says First Amendment 'Not Absolute' - Heat Street

Posted in First Amendment | Comments Off on Northwestern Students Shut Down Speech as President Says First Amendment ‘Not Absolute’ – Heat Street

This Spy App Can See If You’ve Visited Whistleblowing Sites on the Dark Web – Motherboard

Posted: at 6:29 am

To stay off the radar when leaking information to the press, whistleblowers often turn to the dark web to mask their identity. But that's no match for a new malicious app that spies on your computer hardware, and can tell when you've visited whistleblower sites through the Tor Browser.

Thankfully, this revelation doesn't come from hackers. Instead, the app was developed by computer scientists at the Worcester Polytechnic Institute (WPI), and they uploaded a paper outlining their work to the arXiv preprint server last week. Their app makes use of a well-known attack in academic circles: if you carefully track and analyze the patterns of use on a computer's processor, you can piece together what the user is actually doing.

Now, the researchers have shown that it can be done with a malicious app running in the background on someone's machine, and a bit of AI.

"You might protect your browsing habits by going into incognito mode or using the Tor Browserthe traffic there is hidden from, say, your IT admin," said Berk Sunar, one of the study's co-authors, over the phone. "What we're showing here is that in that unprotected corporate environment, even using tools like Tor, your browsing history can be leaked in part to a monitoring authority."

Read More: Tor Project and Mozilla Making It Harder for Malware to Unmask Users

The researchers used Linux, which allowed them to access the data they needed (a rooted Windows or Mac system could allow similar access, Sunar said). They first tracked processor usage with the app while browsing different sites in Chrome in incognito mode, and in Tor, the browser that lets you access the dark web. An AI algorithm then parsed all of this data to come up with a baseline to predict which sites a user visited.

After training, the algorithm could look at new hardware use patterns via the app and predict whether a user had visited Netflix or Amazon with surprising accuracy: 86.3 percent for Chrome in Incognito mode.

In Tor, the system was less accurate, but only slightly. Just by looking at hardware use and analyzing it with an algorithm, the researchers could infer which websites were being accessed via Tor with 71 percent accuracy. When it came to whistleblower sites like Wikileaks and GlobalLeaks, the system's accuracy jumped to 84 percent.

The results for Tor were generally worse because the malicious tracking app caught the browser start-up and all the random jitters due to connection delays, creating a noisy dataset. The accuracy was better for whistleblowing sites, Sunar said, simply because it's a much smaller pool of sites to choose from.

So, if you're a whistleblower, how worried should you be about the government, or anyone else, using this tool to find you? "In the short term, I'd say not very worried, because there are so many other vulnerabilities out there that are easier to pull off," Sunar said. (The research was government-funded, via the US National Science Foundation, an agency that funds a wide array of research into science and engineering). And remember, these are researchers working in a tightly controlled experimental environment, trying to prove that they can do something nobody's done beforenot spooks or hackers trying to make a buck.

"You could tie it into a simple gaming application"

There's also the fact that the work took place in Linux, which is an extremely unpopular operating system. Taking this mobile, and on a more popular platform like iOS, would take some work. The iPhone's operating system doesn't allow access to the same fine-grain detail Linux allows, but there are other hardware performance indicators that could be folded into the system to work on iOS. "You could tie it into a simple gaming application," Sunar said. "Like Tetris, for example."

The attack also requires the user to download a malicious app, and although scammy apps have made it onto major app stores before, there's no guarantee that this one would. You'd also have to be in the crosshairs for someone really, really determined, in which case you might have bigger problems.

Still, the research is a good reminder that no privacy tool is perfect, and perhaps most importantly, if you let somebody own your computer, well, you're boned. The lesson remains: don't click any phishy links out there, and be careful what apps you put on your machine.

Subscribe to Science Solved It , Motherboard's new show about the greatest mysteries that were solved by science.

More:
This Spy App Can See If You've Visited Whistleblowing Sites on the Dark Web - Motherboard

Posted in Tor Browser | Comments Off on This Spy App Can See If You’ve Visited Whistleblowing Sites on the Dark Web – Motherboard

A hack has put data of 17 million Zomato users at risk: Should India be worried? – DailyO

Posted: at 6:29 am

Its sad, but someone, somewhere on the Dark Web will now be privy to all your eating habits, or at least the one that Zomato knows about.

For the uninitiated, Zomato is an Indian food start-up that started in 2008. The search engine for food, restaurant and online delivery portal, thats now has an app as well, has almost 12 million customers every month. Zomato is not only a popular guide to eateries across India, but in 22 other countries as well. For millennials, Zomato is almost as essential as the Yellow pages were back in the day.

But, coming back to the topic, Zomato has now been hacked and the data of close to 17 million users have been stolen, and put out on sale on the Dark Web. First reported by HackRead late on Wednesday night (May 17), the report suggested that an online handle nclay claimed to have hacked Zomato and was selling the stolen data (of 17 million registered users) on a Dark Web marketplace.

Wait. What is the Dark Web?

The Surface Web is anything that a search engine can find, while the Deep Web is anything that a search engine cant find. The Dark Web is a small portion of the Deep Web that has been intentionally hidden and is inaccessible through standard web browsers.

The most famous content that resides on the Dark Web is found in the TOR (The Onion Router) network. The TOR network is an anonymous network that can only be accessed with a special web browser, called the TOR browser. This is the portion of the Internet most widely known for illicit activities because of the anonymity associated with the TOR network.

Back to Zomato

The database includes emails and "hashed" password of registered Zomato users, and is being sold for 0.5587 Bitcoin (almost Rs 65,000). The vendor nclay also provided a sample of the data to prove his claim.

On May 18, Zomatos CTO Gunjan Patidar published a blog post acknowledging the hack. Trying to avoid panic and setting facts straight, Patidar says, The hashed password cannot be converted back to plain text so the sanctity of your password is intact in case you use the same password for other services.

Photo: DailyO

But he also cautioned users to change their passwords in any case and to change the passwords for other services, just in case they happen to be the same. This is so because, while they are difficult to crack, it is never prudent to assume complete faith in the abilities of hackers.

This is kind of why everyone should have different (and complex) passwords for different accounts and everyone should use a password manager to keep track of stuff. Seriously, its not that difficult a thing to do.

More importantly, and to the relief of millions of customers, Zomato has assured that payment related information on the site which is stored separately in a highly secure PCI Data Security Standard (DSS) compliant vault has not been leaked. So, your bank details and credit card details on Zomato are safe. Whew!

Continuing with the assurances, Patidar said, Over the next couple of days and weeks, well be actively working to plug any more security gaps that we find in our systems. Well be further enhancing security measures for all user information stored within our database, [and] a layer of authorisation will be added for internal teams having access to this data to avoid the possibility of any human breach.

Of course, despite the assurances from the company, it is a little difficult to maintain calm. In a company thats as huge as Zomato, a hack of this size is pretty worrisome. In fact, this is not the first time something like this has happened to the food start-up. In 2015, an ethical hacker, Anand Prakash who has also helped discover security bugs on Facebook and Uber managed to breach Zomato'sdatabase and managed to highlight a critical flaw in its data recall system. The white hat hacker later reported the details of the security flaws to Zomato.

We should be concerned

Hacks and cyber attacks, in an age when we are becoming increasingly more dependent on the internet, is a big problem. While it is, without a doubt, a companys responsibility to safeguard user data, the users themselves cannot simply wash their hands off any responsibility. The fact is, your data is only as safe as you choose for it to be.

In an increasingly more data-vulnerable world, it is always prudent to keep your passwords different, complex and keep changing them periodically. It is also up to you, as a consumer to choose security over convenience. Yes, it is easy to save information related to your banking/debit card or credit card details on vendor websites/apps. It saves you the pain of having to input it every time you use the given service. But isnt security a bigger worry than having to type in a 16-digit number?

The Zomato breach may not have been a harmful one or so it seems as of now but this is neither the first major hack we have witnessed in this country in the last few months, nor is this going to be the last. Both companies and users really need to get their security priorities in place.

Also read -India highly unsafe from global ransomware cyber attack: Here's what you need to do

Continue reading here:
A hack has put data of 17 million Zomato users at risk: Should India be worried? - DailyO

Posted in Tor Browser | Comments Off on A hack has put data of 17 million Zomato users at risk: Should India be worried? – DailyO

Why Nigerian CIOs should care about the dark web – ITWeb Africa

Posted: at 6:29 am

Published on 19 May 2017 By Wale Ogunyemi

The dark web is an increasingly lawless place where cybercriminals trade hacks, passwords, and stolen corporate data. While international regulation was sought to stamp out such practices, the online environment that allowed the Internet to spread so widely and so quickly has also allowed the dark web to stretch even further, and carve out new places to hide and operate from.

As the Nigerian economy expands, and more multinational businesses move into the region, the country's ever-increasing cybercrime statistics are a key concern. The Cyber Security Experts Association of Nigeria (CSEAN) has gone as far as to state that the Nigerian government is ill prepared to face cybercrime in 2017 and beyond.

The so-called dark web, buried in the deep web, utilises a different protocol and is not indexed by mainstream search engines. Users go about their business anonymously, their locations protected by encryption and a host of privacy features baked into the free and readily available Tor browser, which is the most common way of accessing it. This makes it a paradise for cybercriminals.

Dark web threats loom in today's complex, ever-changing environment, for companies all over the world. To shore up their own cyber defences, CIOs need to take a more proactive approach to monitoring threats in its hidden depths.

Exposing these illicit transactions is almost impossible as many take place in invitation-only forums and are authenticated to stop anyone tracking them. However, it seems that even the dark web is not invincible when it comes to vulnerabilities. The hack of Freedom Hosting II, the largest host of dark websites, shows that there are holes in the deepest abyss of the Internet.

According to a Palo Alto Networks report (2016), the Nigeria 419 cybercrime gangs specialise in using advanced malware tools common with sophisticated criminals and espionage groups. To illustrate the threat that cybercrime poses to Nigerian individuals and businesses, the Leadership.ng (2016) reported that Nigeria loses nearly half-a-billion dollars to cybercrime annually.

The publication also predicted that in 2017, five categories of cybercrime would dominate the country: the CEO email scam, ransomware, assisted online kidnapping, cyber bullying, and impersonation.

In addition, Alphabay, reputably the biggest dark web marketplace, recently issued a statement on Pastebin confirming that it had rewarded a hacker after they had found bugs that had enabled them to steal 218,000 unencrypted messages between buyers and sellers. This hack highlights the scale of business being done on the dark web and underlines why CIOs need to understand its dangers and minimise their organisations' exposure.

It could be argued that these vulnerabilities in the dark web makes it easier for ethical hackers to get a better view of what data sits where, while making the dark web a more dangerous place for cybercriminals to operate. In this case stolen data, which included names and addresses, were handed over to law enforcement agencies, but only a minute percentage of stolen data is handled responsibly.

Take Yahoo, for example. Data from a breach involving one billion Yahoo accounts back in 2013, which the company only went public about last year, is still being openly sold on the dark web. The stolen data for sale includes personal data including names and birth dates.

Scanning for threats

CIOs are beginning to understand that a more proactive approach must be taken to protecting their organisations from cyber crime, which includes scanning the dark web for threats.

However, due to the make-up of dealings and the trust required between buyers and sellers on the dark web, human intelligence is essential in monitoring the dark web - automated tools alone are not enough.

Granted, monitoring the dark web is an enormous task. It requires a global team of cyber experts to analyse massive volumes of data and linguists who can impersonate cybercriminals to gain their trust.

Threat monitoring the dark web gives CIOs intelligence that can act as an early warning system. It can uncover, for example, if cybercriminals are planning an attack, so the organisation can pre-empt a breach and take immediate action to protect their digital identities and servers.

One of the biggest threats of the dark web is that dissatisfied employees can use it to sell their services to cybercriminals, according to Avivah Litan, VP distinguished analyst at Gartner. A report by RedOwl and InSights claims that the active recruitment of insiders in the dark web is growing fast, with insider outreach going up nearly 50 percent from 2015 to 2016.

The report maintains that the dark web has created an active market for employees to easily monetise insider access. It says that sophisticated cybercriminals are using the dark web to find and engage insiders to help them get malware over organisation's perimeter security and trigger it.

Gartner's Litan says that its clients blame the ease in which discontented employees can download the Tor browser and log into the dark web. Litan accepts that insider threats are a sensitive issue and that companies do not want pry and encroach on employee privacy, but at the same time must protect their business assets. "Organisations must be the judge of how high their risks are and how far they need to go fighting it," she says.

The RedOwl and Insights report recommends that enterprises "create, train and enforce consistent security policies while protecting employee privacy". This includes making sure employees and contractors understand penalties involved in insider action on the dark web.

The dark web provides a rich source of cyber threat intelligence for any CIO looking to bolster their cyber defences. By monitoring its inner workings, organisations can find out what data or IP may has been stolen, or leaked by insiders to use against them.

Tor, however, has made no secret of the fact it is doing more to safeguard its users this year, making the dark web even more difficult to penetrate. This will include sandboxing Tor at the application level and investigating the use of quantum computing.

There isn't an organisation out there who can claim it will never be compromised. Threat detection is paramount.

If CIOs know what they are up against, they can take the appropriate steps to protect their organisations.

Having an ear to what is being discussed in the chambers of the dark web is invaluable in the war against cybercrime.

By Wale Ogunyemi, Senior Solution Architect for Orange Business Services.

ALSO ON ITWEB AFRICA

GE executive speaks on energy resource management on the continent.

Bruce van Wyk director at PaySpace writes that accountancy practices have a lot to gain from mobile, cloud-based technologies.

ISPA says attempts to eradicate hateful/harmful content from social networks are often hindered by the global nature of these networks.

Wale Ogunyemi, Senior Solution Architect for Orange Business Services, says threat monitoring the murky world of the dark web empowers CIOs to act.

See the article here:
Why Nigerian CIOs should care about the dark web - ITWeb Africa

Posted in Tor Browser | Comments Off on Why Nigerian CIOs should care about the dark web – ITWeb Africa