Homeland Security leans on Mozilla to take down the Firefox MafiaaFire Add-on

From Harvey Anderson’s blog.

Recently the US Department of Homeland Security contacted Mozilla and requested that we remove the MafiaaFire add-on. The ICE Homeland Security Investigations unit alleged that the add-on circumvented a seizure order DHS had obtained against a number of domain names. Mafiaafire, like several other similar add-ons already available through AMO, redirects the user from one domain name to another similar to a mail forwarding service. In this case, Mafiaafire redirects traffic from seized domains to other domains. Here the seized domain names allegedly were used to stream content protected by copyrights of professional sports franchises and other media concerns.

Our approach is to comply with valid court orders, warrants, and legal mandates, but in this case there was no such court order. Thus, to evaluate Homeland Security’s request, we asked them several questions similar to those below to understand the legal justification:

* Have any courts determined that the Mafiaafire add-on is unlawful or illegal in any way? If so, on what basis? (Please provide any relevant rulings)

* Is Mozilla legally obligated to disable the add-on or is this request based on other reasons? If other reasons, can you please specify.

* Can you please provide a copy of the relevant seizure order upon which your request to Mozilla to take down the Mafiaafire add-on is based?

To date we’ve received no response from Homeland Security nor any court order.

Step 1: Send confidential documents to WSJ. Step 2: Go to gaol.

If you wanted a demonstration of the naiveté of traditional media in relation to networked technology, then you be hard pressed to better the Wall Street Journal’s new ‘whistleblowing’ facility, SafeHouse.

Documents and databases: They’re key to modern journalism. But they’re almost always hidden behind locked doors, especially when they detail wrongdoing such as fraud, abuse, pollution, insider trading, and other harms. That’s why we need your help.

If you have newsworthy contracts, correspondence, emails, financial records or databases from companies, government agencies or non-profits, you can send them to us using the SafeHouse service.

Stirring stuff, eh? But let’s have a look at the Terms and Conditions:

Submission Options

SafeHouse provides three options to submit documents and other information:

1. Standard SafeHouse: The standard online submission form can be used to provide any relevant documents and information along with your contact information. If you choose this option, and provide us with your contact information, Dow Jones retains the right to use the material and any other information you provide about yourself as it sees fit (as described more fully below in the Limitations section), and does not make any representations regarding confidentiality.

2. Anonymous SafeHouse: If you prefer not to include any contact information, and instead remain anonymous, you can still provide information through this form. If you choose this option, Dow Jones retains the right to use the material and any other information you provide as it sees fit (as described more fully below in the Limitations section), and does not make any representations regarding confidentiality. In an effort to attach an added level of security, we have designed this online submission form to minimize the amount of identifying information we or others can access. Despite efforts to minimize the information collected, we cannot ensure complete anonymity. For additional security, you can use certain online tools, such as The Tor Project (https://www.torproject.org), to submit any documents or information. When used correctly, these services and software can block the recipient of information from knowing the source of that information. More information on this topic is available here. You agree that we are not responsible for, and do not control, any such third party services and software that attempt to provide anonymity.

3. Request Confidentiality: If you would like us to consider treating your submission as confidential before providing any materials, please make this request through this online submission form. Please note that until we mutually decide to enter into a confidential relationship, any information you send to us (including contact information) can be used for any purpose, as outlined in point 1 above, and described more fully below in the Limitations section). If we enter into a confidential relationship, Dow Jones will take all available measures to protect your identity while remaining in compliance with all applicable laws.

You understand that regardless of the method of submission, we are unable to ensure the complete confidentiality or anonymity of anything you send to us. As a result, please use discretion in contacting us and providing us with information. You use this service at your own risk.

[…]

Except when we have a separately negotiated confidentiality agreement pursuant to the “Request Confidentiality” Section above, we reserve the right to disclose any information about you to law enforcement authorities or to a requesting third party, without notice, in order to comply with any applicable laws and/or requests under legal process, to operate our systems properly, to protect the property or rights of Dow Jones or any affiliated companies, and to safeguard the interests of others.

(Emphasis added.)

According to the Guardian story dated 6 May, “uploading from Tor did not work on Thursday or Friday when tested by security researchers”.

So, here’s my question: if you were a whistleblower would you feel more comfortable sending stuff to (a) Wikileaks, or (b) the Wall Street Journal?

What this highlights, of course, is the difficulties established media organisations have in dealing with this stuff. The whole point of Wikileaks-type operations is that they have no assets to be seized, no executives to be subpoenaed, no shareholders to be intimidated, no publications to be injuncted, no advertisers to withdraw their support. It’s interesting to see that several traditional outfits (the NYT and Guardian are rumoured to be planning their own “secure” submission channels for leaked material, and Al Jazeera already what it calls its Transparency Unit). What remains to be seen is whether any one of them will be seen as deserving the trust of whistleblowers.

Free Dorothy!

The Syrian authorities have now admitted that they have detained Dorothy Parvaz, a friend and a former Fellow on the Wolfson Press Fellowship Programme of which I am the Director. Dorothy works for Al Jazeera English and is based in Doha, Qatar. She’s a terrific journalist and a lovely person. Last Friday she flew to Damascus on a reporting mission and since then nobody has seen or heard anything from her. Through the MP for Cambridge, Julian Huppert, we have been pressing the British Foreign Office to make inquiries about her whereabouts. Al Jazeera have also been pressing very hard for her release. The Syrian admission is a step in the right direction, but none of us will rest until she is safely back in Qatar.

Her fiancee, Todd Barker, has recorded this video appeal, which is now on the Al Jazeera site.

Al Jazeera are maintaining a regularly-updated page about Dorothy.

There’s an interesting post by Swami Avi on the Free Dorothy Parvaz Facebook page which says:

I interviewed Syria’s chargé d’affaires to Canada today, Bashar Akbik, and he said Dorothy Parvaz was arrested in Syria for probably not registering herself with that country’s Ministry of Information–a requirement for foreign journalists. Interestingly, he noted that Al Jazeera is a tool of the Muslim Brotherhood, and are “working to undermine Syria’s regime.”

Born Digital

Lovely story by Kevin Kelly.

Another friend had a barely-speaking toddler take over his iPad. She could paint and handle complicated tasks on apps with ease and grace almost before she could walk. It is now sort of her iPad. One day he printed out a high resolution image on photo paper and left it on the coffee table. He noticed his toddler come up to up and try to unpinch the photo to make it larger, like you do on an iPad. She tried it a few times, without success, and looked over to him and said “broken.”

Thanks to Quentin for the link.

Quote of the week

“Donald Trump often talks about running as a Republican, which is surprising. I just assumed he was running as a joke.”

Comedian Seth Meyers, at the 2011 White House Correspondents Dinner.

[Source]

Lies, damn lies and corporate ‘explanations’

When Apple eventually deigned to respond to the furore about iPhones logging location data, it issued a PR-mediated statement so slippery that it practically slid off the monitor. But it did contain one apparently unequivocal statement:

“Apple is not tracking the location of your iPhone. Apple has never done so and has no plans to ever do so.”

Oh, yeah? Consider Exhibit A:

It comes from a patent application entitled “Location Histories for Location Aware Devices” which Apple filed in September 2009.

(Thanks to Leander Kahney for the patent link.)

A location aware mobile device can … collect network information (e.g., transmitter IDs) over time. Upon request by a user or application, the network information can be translated to estimated position coordinates … of the location aware device for display on a map view or for other purposes. A user or application can query the location history database with a timestamp or other query to retrieve all or part of the location history for display in a map view.

Here’s how TechDirt tells it:

Apple’s key points are:

Apple (not researchers, or tons of other people who have noted this “bug” for a year or so) “discovered” a bug with location data on the phone:

The reason the iPhone stores so much data is a bug we uncovered and plan to fix shortly

There’s no tracking going on. There’s nothing to see here.

Apple is not tracking the location of your iPhone. Apple has never done so and has no plans to ever do so.

Even though there’s no tracking and nothing to see here, it’s still a bug which will be fixed.
The reason people are concerned about this is because people are confused.

Got that? People are confused and there’s nothing to see here, but Apple has discovered a minor bug which will be fixed.

There’s a staggering level of hypocrisy here which is par for the course for Apple. It’s a bit like the old newspaper mantra in the glory days of print: “Never apologise, and never explain.”

Except that it won’t wash any more. And the strange thing is that we get this crap all the time from companies that are supposed to be, well, 20th-century organisations. Matthew Ingram had a good post about this on GigaOM in which he looked at the way Sony and Amazon as well as Apple have displayed a steam-age sense of responsibility in an online age:

Given its past behavior, it’s possible that Apple is beyond help in this area. The company’s approach seems to be that people will unfailingly line up to buy its products regardless of how it handles such PR gaffes, so it may be a lost cause. But Amazon and Sony arguably have a lot more to lose.

Sony in particular — a former technology leader — has not been doing well on a number of fronts for years now, as Apple has taken over virtually every market segment that the technology company used to own. Not only that, but the company is already infamous in computer security circles for its last major fiasco in 2005, the “Sony rootkit” affair, in which users had a virus-like software program installed on their computers without their knowledge if they played a CD. So you might think that the company would try hard to get out in front of the most recent issue — which venture investor and technology analyst Paul Kedrosky described as “among the worst such debacles in modern financial/technical history” — as quickly as possible. Oh, but it’s really complicated too.

Amazon is not nearly as desperate as Sony, but the company has still pinned a lot of its hopes for the future on the success of its cloud-hosting and cloud-based services business, and seeing hundreds of major companies and websites fail — and lose critical data — is a huge issue. And yet, while Amazon eventually did release something that was much closer to an actual apology than anything Sony or Apple came out with, the company still avoided discussing the issue for what seemed like an eternity in Internet time. One Internet analyst said that Amazon’s “anemic public response” was a major flaw, and that arguably wasn’t the only one.

This isn’t an issue just for Apple, Sony and Amazon — it’s something that companies of all kinds are still struggling to deal with. The reality is that social media such as Twitter and Facebook have increased the ability of customers and users to speak out about such issues, and decreased the amount of time that companies have to deal with them. And that means the old approach of taking days to hold “war room” meetings and come up with elaborate PR plans just doesn’t work any more.

Those things still have to be done, but they have to be done a lot faster.

Yep. Matthew also provides a link to a fascinating diagram summarising the USAF’s “Rules of Engagement for Blogging” from which companies could learn a thing or two.