Connect with us

Published

on

Ten years after Edward Snowden sparked a debate over domestic (and international) spying by the U.S. government and its allies, arguments continue and so does the snooping. This year, one key component of the surveillance stateSection 702 of the Foreign Intelligence Surveillance Actis up for congressional reauthorization. Now, the executive branch’s own civil liberties watchdog says that, while Section 702 plays an important role, it’s also dangerous to our freedom and needs reform.

The Rattler is a weekly newsletter from J.D. Tuccille. If you care about government overreach and tangible threats to everyday liberty, this is for you. Email(Required) CommentsThis field is for validation purposes and should be left unchanged. Submit

Δ Surveillance, American-Style

To hear America’s professional spooks, Section 702 is made up of equal servings of mom, apple pie, and a trench coat.

“In 2008, Congress enacted Section 702 of the Foreign Intelligence Surveillance Act (FISA), a critical intelligence collection authority that enables the Intelligence Community (IC) to collect, analyze, and appropriately share foreign intelligence information about national security threats,” insists the Office of the Director of National Intelligence. “Section 702 only permits the targeting of non-United States persons who are reasonably believed to be located outside the United States. United States persons and anyone in the United States may not be targeted under Section 702.”

The Privacy and Civil Liberties Oversight Board (PCLOB), established in 2007 in an effort to limit the excesses of the burgeoning post-9/11domestic intelligence apparatus, sees things a little differently.

“The Board finds that Section 702 poses significant privacy and civil liberties risks, most notably from U.S. person queries and batch queries” in which multiple query terms are run as part of a single action, according to the PCLOB’s Report on the Surveillance Program Operated Pursuant to Section 702 of the Foreign Intelligence Surveillance Act, published September 28 and following up on a 2014 report on the same topic. “Significant privacy and civil liberties risks also include the scope of permissible targeting, NSA’s new approach to upstream collection, a new sensitive collection technique that presented novel and significant legal issues approved by the FISC in 2022, how data is initially ingested into government repositories, incidental collection, and inadvertent collection.”

The report points out that the definition of “foreign intelligence information” is very broad and that 246,073 non-U.S. persons were targeted for surveillance in 2022, up 276 percent from 2013. While Section 702 surveillance isn’t “bulk” surveillance of the sort that hoovers up mass quantities of information, it “lacks individualized and particularized judicial review of targeting decisions” with the result that “targeting can be overbroad or unjustified.” Foreign Intelligence Isn’t Always So Foreign

The result of broad and somewhat indiscriminate data collection is that “the government acquires a substantial amount of U.S. persons’ communications as well.” This interception of Americans’ communications “should not be understood as occurring infrequently or as an inconsequential part of the Section 702 program.” In particular, “FBI’s querying procedures and practices pose the most significant threats to Americans’ privacy.”

Why is the FBI of such particular concern? Because the FBI focuses on domestic law enforcement and “one of the most serious risks to individual civil liberties associated with the incidental collection of U.S. person information is that this classified information collected for intelligence purposes could be used in a criminal prosecution,” notes the board. The government is required to disclose when it uses Section 702 intelligence in criminal cases, but it has done so only nine timeswhich is not the same as saying that it rarely uses such information. “In multiple cases, rather than providing notice to criminal defendants of Section 702-derived information, the government has instead sought to develop evidence through other sources” so prosecutors can avoid admitting they used foreign intelligence tools. The Real Targets Are Often Americans

Often, federal agents seem to explicitly use Section 702 to bypass safeguards. “The large amounts of incidental collection may include communications between attorneys and their clients,” adds the report. It also notes that “the government has identified a significant number of noncompliant queries where government personnel have conducted queries related to instances of civil unrest and protests.”

How often does this happen?

“In the Annual Statistical Transparency Report for calendar year 2021, FBI reported that it ran 3.4 million [later revised downward to 2.97 million] U.S. person queries of Section 702-acquired information in all its systems,” according to a report footnote. The Debate Over Reform

The divided five-member PCLOB recommends multiple reforms, including a specific prohibition on “about” interceptions that are neither to or from targets, but merely mention them, and a requirement for Foreign Intelligence Surveillance Court approval of U.S. person query terms. Even so, the report concludes “the United States is safer with the Section 702 program than without it.” Despite that call for reauthorization, two of the five board members voted against the report for being excessively critical and demanded that it not be attributed to them.

Civil liberties groups quickly noted the report’s contribution to the debate over Section 702.

“Congress has the power to safeguard the constitutional rights of Americans by fundamentally reforming this invasive and unconstitutional mass surveillance program,” Kia Hamadanchy, senior policy counsel at the ACLU, commented in an emailed statement. “As the Board rightly points out, requiring the government to obtain individualized judicial approval is critical to ensuring that Section 702 cannot be used by the FBI, NSA, and CIA to quietly circumvent Americans’ constitutional rights.”

“The PCLOB report is damning, in terms of both the frequency with which government agencies conduct warrantless searches of data collected under Section 702 and the purposes for which those searches are conducted, yet the report’s recommendations don’t go nearly far enough to ensure Americans’ privacy from this overreaching, oft-abused digital dragnet,” agreed Electronic Frontier Foundation Senior Policy Analyst Matthew Guariglia.

Damning it may be, but the White House National Security Council has already rejected part of the report’s call for modest reform as “operationally unworkable.”

Given the current debate over Section 702, it’s easy to forget about other legal authorizations for domestic surveillance. These include other parts of FISA, Executive Order 12333, and national security letters, which often are subject to looser safeguards. But, the PLCOB adds, “Section 702 enables the government to target a broader array of persons,” including those who aren’t suspected of violating American laws or acting against the United States, “which also increases the risks of privacy and civil liberties harms.”

Section 702 expires in December with its fate, and that of proposed reforms, in the hands of Congress.

Continue Reading

Sports

Stars’ Hintz remains game-time call for Game 4

Published

on

By

Stars' Hintz remains game-time call for Game 4

EDMONTON, Alberta — Dallas Stars forward Roope Hintz remains a game-time decision ahead of Game 4 of the Western Conference Final on Tuesday.

The club’s top skater has been sidelined since Game 2 in the series when he took a slash to the left leg from Edmonton Oilers defenseman Darnell Nurse. Hintz took part in warmups before Game 3 on Sunday but exited early and was ruled out. He was back on the ice for Dallas’ optional practice on Monday and told reporters he was “feeling good” and “trying to do everything I can” to get back in for Game 4.

It was early in the third period of Game 2 when Hintz — parked in front of the Oilers’ net — shoved Nurse from behind, and the Oilers’ blueliner responded by swinging his stick at Hintz’s leg. Hintz was down on the ice for several minutes after that before being helped off by Lian Bichsel and Mikael Granlund.

Nurse received a two-minute penalty for the slash on Hintz but no supplementary discipline from the league. The blueliner addressed the incident for the first time Tuesday, explaining it didn’t come with malicious intent.

“I was backing up to net and I got shot in the back. And I think it was just a natural reaction [to respond],” Nurse said. “It’s probably a play that everyone in this room, whether you’re a net-front guy or D man, probably happens a dozen, two dozen times in a year. It’s unfortunate that I must have got [Hintz] in a bad spot. You don’t want to go out there and hurt anyone. But it was just one of those plays that happens so often.”

Having Hintz unavailable hurt the Stars in Game 3, a 6-1 drubbing by the Oilers that put Dallas in a 2-1 hole in the best-of-7 series. Hintz is the Stars’ second-leading scorer in the postseason, with 11 goals and 15 points through 15 games. He was hopeful when taking warmups Sunday that he’d feel good enough to get back in but a quick discussion with the training staff made it clear he wasn’t ready.

Coach Pete DeBoer has since classified Hintz’s status as day-to-day.

“Of course you want to go every night, but sometimes you just can’t,” said Hintz. “I don’t know how close I [was to playing]. But I have played many years [and I] know when it’s good and when it’s not. I should be good to know that [when] it comes to that decision.”

The Oilers will have some lineup changes of their own to sort through in Game 4. Connor Brown is out after he took a hit from Alexander Petrovic in Game 3; he’ll be replaced by the incoming Viktor Arvidsson. Calvin Pickard — injured in Edmonton’s second-round series against Vegas — will return to back up for Stuart Skinner. And Edmonton continues to wait on defenseman Mattias Ekholm, who is getting closer to coming back from a lower-body injury.

Puck drop for Game 4 is 8 p.m. ET on Tuesday.

Continue Reading

Sports

‘That’s wonderful’: Canes finally see ECF skid end

Published

on

By

'That's wonderful': Canes finally see ECF skid end

SUNRISE, Fla. — Carolina Hurricanes defenseman Jaccob Slavin is happy to never get another question about his team’s record-setting NHL playoff losing streak.

“Wonderful. That’s wonderful,” he said after Carolina’s 3-0 win over the Florida Panthers in Game 4 of the Eastern Conference finals on Monday night. “The guys in here worked hard tonight and that’s all you can ask for.”

The Hurricanes avoided a sweep by the Panthers, sending the series back to Raleigh, North Carolina, for Game 5 on Wednesday night. In the process, Carolina snapped a 15-game losing streak in the conference finals — the longest losing streak by a team in a playoff round other than the Stanley Cup Final in NHL history.

The Hurricanes’ last win in the Eastern Conference finals was in Game 7 against the Buffalo Sabres in 2006, a game that saw current Carolina coach Rod Brind’Amour score the winning goal.

“It’s been a story. So, yeah, it’s nice to not have to talk about that [anymore],” Brind’Amour said.

When the streak began in 2009, Carolina captain Jordan Staal was helping the Pittsburgh Penguins to a conference finals sweep of the Hurricanes. He said the win over Florida in Game 4 showed how much pride was in the Canes’ locker room, as they refused to allow the Panthers to end their season.

“There’s a lot of guys that didn’t want to go home,” Staal said. “We know we have a huge hill to climb here. We’ve got a great team on the other side that is going to come back with a better effort. It’s a great challenge.”

Florida coach Paul Maurice, whose team had a chance to advance to a third straight Stanley Cup Final with a victory, gave credit to the Hurricanes for a solid and disruptive game while acknowledging that his team could have gotten to its own game better.

“I haven’t been nearly as down on that hockey team as you fine people have been over the last three games, and I won’t be as down on my team tonight,” he said. “[The Hurricanes] were good. They had good sticks. They had good quickness. You see that happen more often when the possessor of the puck’s feet are not moving.”

Three factors changed the vibe for Carolina in Game 4.

Goalie Frederik Andersen had his second shutout of the postseason after being pulled in Game 2 and benched for Game 3. Andersen was 7-2 with a .937 save percentage and a 1.36 goals-against average in nine playoff games before facing Florida. In two games against the Panthers, he gave up nine goals on 36 shots (.750, 5.54). Andersen had given up just 12 goals in his previous nine postseason games.

In Game 4, he was a great last line of defense, stopping all 20 shots.

After the game, Andersen declined to discuss being benched.

“I don’t really want to talk about my feelings. It’s not about that. It’s about the team and trying to put the best lineup on the ice that they feel like gets the job done. So I’m ready for when I’m called upon and glad to be able to play,” he said.

Andersen played a key role in another factor: the Carolina penalty kill. The Panthers were 4-for-5 on the power play in the first two games of the conference finals. The Hurricanes killed off four power plays in each of the past two games.

“Our goalie was great when he needed to be. The penalty kill was phenomenal,” Brind’Amour said. “We gave ourselves a chance, and that’s all we can ask.”

Perhaps most crucially, the Hurricanes scored the first goal. Carolina is now 6-0 when scoring first and 3-5 when it trails first in these playoffs. In the regular season, the Hurricanes were 30-7-2 when scoring first and 17-23-3 when trailing first.

They scored first and then played the type of close, low-scoring game they excel at. As winger Taylor Hall said before Game 4: “We’re thinking about winning the game 1-0. If it’s close, then we’re in a good spot.”

“It’s been a story. So, yeah, it’s nice to not have to talk about that [anymore].”

Rod Brind’Amour on Carolina snapping 15-game losing streak in conference finals

Forward Logan Stankoven opened the scoring at 10:45 of the second period, giving Carolina its first lead of the series. Rookie defenseman Alexander Nikishin made a terrific backhand pass across the neutral zone to spring Stankoven ahead of the Panthers’ defense, and he beat goalie Sergei Bobrovsky for his fifth goal of the playoffs.

Stankoven said he called for the pass from Nikishin, who was playing in his third postseason game.

“The play happened so fast and it was a great feed by him to make that play off the turnover. It all starts with him,” said Stankoven, who was acquired from the Dallas Stars in the Mikko Rantanen deadline trade.

It remained 1-0 until Sebastian Aho and Staal added empty-net goals in the last 2:11 for the 3-0 win.

Slavin said Game 4 was in the Carolina’s comfort zone.

“A thousand percent. It was 1-0 up until the end there. You can’t get any tighter than that,” he said.

With that, the Hurricanes ended their historic losing streak and turned their attention to making more NHL history. Only four teams in the history of the Stanley Cup playoffs have rallied to win a best-of-seven series after trailing 3-0, although two have done it in the past 15 years (Philadelphia Flyers in 2010 and Los Angeles Kings in 2014).

“You watched the way we played tonight. Everyone put their heart on the line,” Slavin said. “We know we’ve got a good group in here. We know we’ve got all the pieces. We just have to bring it every night.”

Continue Reading

Politics

ZKPs can prove I’m old enough without telling you my age

Published

on

By

<div>ZKPs can prove I'm old enough without telling you my age</div>

<div>ZKPs can prove I'm old enough without telling you my age</div>

Opinion by: Andre Omietanski, General Counsel, and Amal Ibraymi, Legal Counsel at Aztec Labs

What if you could prove you’re over 18, without revealing your birthday, name, or anything else at all? Zero-knowledge proofs (ZKPs) make this hypothetical a reality and solve one of the key challenges online: verifying age without sacrificing privacy. 

The need for better age verification today

We’re witnessing an uptick in laws being proposed restricting minors’ access to social media and the internet, including in Australia, Florida, and China. To protect minors from inappropriate adult content, platform owners and governments often walk a tightrope between inaction and overreach. 

For example, the state of Louisiana in the US recently enacted a law meant to block minors from viewing porn. Sites required users to upload an ID before viewing content. The Free Speech Coalition challenged the law as unconstitutional, making the case that it infringed on First Amendment rights.

The lawsuit was eventually dismissed on procedural grounds. The reaction, however, highlights the dilemma facing policymakers and platforms: how to block minors without violating adults’ rights or creating new privacy risks.

Traditional age verification fails

Current age verification tools are either ineffective or invasive. Self-declaration is meaningless, since users can simply lie about their age. ID-based verification is overly invasive. No one should be required to upload their most sensitive documents, putting themselves at risk of data breaches and identity theft. 

Biometric solutions like fingerprints and face scans are convenient for users but raise important ethical, privacy, and security concerns. Biometric systems are not always accurate and may generate false positives and negatives. The irreversible nature of the data, which can’t be changed like a regular password can, is also less than ideal. 

Other methods, like behavioral tracking and AI-driven verification of browser patterns, are also problematic, using machine learning to analyze user interactions and identify patterns and anomalies, raising concerns of a surveillance culture.

ZKPs as the privacy-preserving solution

Zero-knowledge proofs present a compelling solution. Like a government ID provider, a trusted entity verifies the user’s age and generates a cryptographic proof confirming they are over the required age.

Websites only need to check the proof, not the excess personal data, ensuring privacy while keeping minors at the gates. No centralized data storage is required, alleviating the burden on platforms such as Google, Meta, and WhatsApp and eliminating the risk of data breaches. 

Recent: How zero-knowledge proofs can make AI fairer

Adopting and enforcing ZKPs at scale

ZKPs aren’t a silver bullet. They can be complex to implement. The notion of “don’t trust, verify,” proven by indisputable mathematics, may cause some regulatory skepticism. Policymakers may hesitate to trust cryptographic proofs over visible ID verification. 

There are occasions when companies may need to disclose personal information to authorities, such as during an investigation into financial crimes or government inquiries. This would challenge ZKPs, whose very intention is for platforms not to hold this data in the first place.

ZKPs also struggle with scalability and performance, being somewhat computationally intensive and tricky to program. Efficient implementation techniques are being explored, and breakthroughs, such as the Noir programming language, are making ZKPs more accessible to developers, driving the adoption of secure, privacy-first solutions. 

A safer, smarter future for age verification

Google’s move to adopt ZKPs for age verification is a promising signal that mainstream platforms are beginning to embrace privacy-preserving technologies. But to fully realize the potential of ZKPs, we need more than isolated solutions locked into proprietary ecosystems. 

Crypto-native wallets can go further. Open-source and permissionless blockchain-based systems offer interoperability, composability, and programmable identity. With a single proof, users can access a range of services across the open web — no need to start from scratch every time, or trust a single provider (Google) with their credentials.

ZKPs flip the script on online identity — proving what matters, without exposing anything else. They protect user privacy, help platforms stay compliant, and block minors from restricted content, all without creating new honeypots of sensitive data.

Google’s adoption of ZKPs shows mainstream momentum is building. But to truly transform digital identity, we must embrace crypto-native, decentralized systems that give users control over what they share and who they are online.

In an era defined by surveillance, ZKPs offer a better path forward — one that’s secure, private, and built for the future.

Opinion by: Andre Omietanski, General Counsel, and Amal Ibraymi, Legal Counsel at Aztec Labs.

This article is for general information purposes and is not intended to be and should not be taken as legal or investment advice. The views, thoughts, and opinions expressed here are the author’s alone and do not necessarily reflect or represent the views and opinions of Cointelegraph.

Continue Reading

Trending