Sorry

This feed does not validate.

In addition, interoperability with the widest range of feed readers could be improved by implementing the following recommendations.

Source: https://www.eff.org/rss/updates.xml

  1. <?xml version="1.0" encoding="utf-8" ?><rss version="2.0" xml:base="https://www.eff.org/rss/updates.xml" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom">
  2.  <channel>
  3.    <title>Deeplinks</title>
  4.    <link>https://www.eff.org/rss/updates.xml</link>
  5.    <description>EFF&#039;s Deeplinks Blog: Noteworthy news from around the internet</description>
  6.    <language>en</language>
  7.     <atom:link href="https://www.eff.org/rss/updates.xml" rel="self" type="application/rss+xml" />
  8.      <item>
  9.    <title>Despite Supreme Court Setback, EFF Fights On Against Online Age Mandates</title>
  10.    <link>https://www.eff.org/deeplinks/2025/07/despite-supreme-court-setback-eff-fights-against-online-age-mandates</link>
  11.    <description>&lt;div class=&quot;field field--name-body field--type-text-with-summary field--label-hidden&quot;&gt;&lt;div class=&quot;field__items&quot;&gt;&lt;div class=&quot;field__item even&quot;&gt;&lt;p&gt;The Supreme Court’s &lt;a href=&quot;https://www.eff.org/deeplinks/2025/06/todays-supreme-court-decision-age-verification-tramples-free-speech-and-undermines&quot;&gt;recent decision&lt;/a&gt; in &lt;em&gt;Free Speech Coalition v. Paxton&lt;/em&gt; did not end the legal debate over age-verification mandates for websites. Instead, it’s a limited decision: the court’s legal reasoning only applies to age restrictions on sexual materials that minors do not have a legal right to access. Although the ruling reverses decades of First Amendment protections for adults to access lawful speech online, the decision does not allow states or the federal government to impose broader age-verification mandates on social media, general audience websites, or app stores.&lt;/p&gt;
  12. &lt;p&gt;At EFF, &lt;a href=&quot;https://www.eff.org/deeplinks/2024/12/effs-2024-battle-against-online-age-verification-defending-youth-privacy-and-free&quot;&gt;we&lt;/a&gt; &lt;a href=&quot;https://www.eff.org/deeplinks/2024/06/mississippi-cant-wall-everyones-social-media-access-protect-children&quot;&gt;continue&lt;/a&gt; &lt;a href=&quot;https://www.eff.org/deeplinks/2024/10/eff-new-york-age-verification-threatens-everyones-speech-and-privacy&quot;&gt;to&lt;/a&gt; &lt;a href=&quot;https://www.eff.org/deeplinks/2024/10/eff-fifth-circuit-age-verification-laws-will-hurt-more-they-help&quot;&gt;fight&lt;/a&gt; age-verification &lt;a href=&quot;https://www.eff.org/deeplinks/2024/02/eff-court-strike-down-age-estimation-california-not-consumer-privacy&quot;&gt;mandates&lt;/a&gt; in the many other &lt;a href=&quot;https://www.eff.org/deeplinks/2025/03/first-porn-now-skin-cream-age-verification-bills-are-out-control&quot;&gt;contexts&lt;/a&gt; in which we see them &lt;a href=&quot;https://www.eff.org/deeplinks/2025/06/eff-court-young-people-have-first-amendment-rights&quot;&gt;throughout the country&lt;/a&gt; &lt;a href=&quot;https://www.eff.org/deeplinks/2023/09/uk-online-safety-bill-will-mandate-dangerous-age-verification-much-web&quot;&gt;and&lt;/a&gt; &lt;a href=&quot;https://www.eff.org/deeplinks/2024/09/canadas-leaders-must-reject-overbroad-age-verification-bill&quot;&gt;the&lt;/a&gt; &lt;a href=&quot;https://www.eff.org/deeplinks/2025/04/digital-identities-and-future-age-verification-europe&quot;&gt;world&lt;/a&gt;. These “age gates” remain a threat to the free speech &lt;a href=&quot;https://www.eff.org/deeplinks/2024/06/hack-age-verification-company-shows-privacy-danger-social-media-laws&quot;&gt;and&lt;/a&gt; &lt;a href=&quot;https://www.eff.org/deeplinks/2023/03/age-verification-mandates-would-undermine-anonymity-online&quot;&gt;privacy&lt;/a&gt; &lt;a href=&quot;https://www.eff.org/deeplinks/2025/01/face-scans-estimate-our-age-creepy-af-and-harmful&quot;&gt;rights&lt;/a&gt; of both adults and minors.&lt;/p&gt;
  13. &lt;p&gt;Importantly, the Supreme Court’s decision does not approve of age gates when they are imposed on speech that is legal for minors and adults.&lt;/p&gt;
  14. &lt;p&gt;The court’s legal reasoning in &lt;em&gt;Free Speech Coalition v. Paxton&lt;/em&gt; depends in all relevant parts on the Texas law only blocking minors’ access to speech to which they had no First Amendment right to access in the first place—what has been known since 1968 as “harmful to minors” sexual material. Although laws that limit access to certain subject matters are typically required to survive “strict scrutiny,” the Texas law was subject instead to the less demanding “intermediate scrutiny” only because the law was denying minors access to this speech that was unprotected for them. The Court acknowledged that having to prove age would create an obstacle for adults to access speech that is protected for them. But this obstacle was merely “incidental” to the lawful restriction on minors’ access. And “incidental” restrictions on protected speech need only survive intermediate scrutiny.&lt;/p&gt;
  15. &lt;p&gt;To be clear, we do not agree with this result, and vigorously &lt;a href=&quot;https://www.eff.org/document/fsc-v-paxton-eff-amicus-brief&quot;&gt;fought&lt;/a&gt; &lt;a href=&quot;https://www.eff.org/deeplinks/2024/05/eff-urges-supreme-court-reject-texas-speech-chilling-age-verification-law&quot;&gt;against&lt;/a&gt; it. The Court &lt;a href=&quot;https://www.eff.org/document/age-verification-harms-users-all-ages&quot;&gt;wrongly&lt;/a&gt; downplayed the &lt;a href=&quot;https://www.eff.org/deeplinks/2025/01/face-scans-estimate-our-age-creepy-af-and-harmful&quot;&gt;very real and significant burdens&lt;/a&gt; that age verification places on &lt;a href=&quot;https://www.eff.org/deeplinks/2025/01/impact-age-verification-measures-goes-beyond-porn-sites&quot;&gt;adults&lt;/a&gt;. And we disagree with numerous other doctrinal aspects of the Court’s decision. The court had previously recognized that age-verification schemes significantly burden adult’s First Amendment rights and had protected adults’ constitutional rights. So &lt;em&gt;Paxton&lt;/em&gt; is a significant loss of internet users’ free speech rights and a marked retreat from the court’s protections for online speech.&lt;/p&gt;
  16. &lt;p class=&quot;pull-quote&quot;&gt;&lt;span&gt;The decision does not allow states or the federal government to impose broader age-verification mandates&lt;/span&gt;&lt;/p&gt;
  17. &lt;p&gt;But the decision is limited to the specific context in which the law seeks to restrict access to sexual materials. The Texas law avoided strict scrutiny only because it directly targeted speech that is unprotected as to minors. You can see this throughout the opinion:&lt;/p&gt;
  18. &lt;ul&gt;
  19. &lt;li&gt;The foundation of the Court’s decision was the history, tradition, and precedent that allows states to “prevent children from accessing speech that is obscene to children, rather than a more generalized concern for child welfare.&lt;/li&gt;
  20. &lt;li&gt;The Court’s entire ruling rested on its finding that “no person – adult or child –has a First Amendment right to access speech that is obscene to minors without first submitting proof of age.”&lt;/li&gt;
  21. &lt;li&gt;The Court explained that “because the First Amendment permits States to prohibit minors from accessing speech that is obscene to them, it likewise permits States to employ the ordinary and appropriate means of enforcing such a prohibition.” The permissibility of the age verification requirement was thus dependent on the unprotected nature of the speech.&lt;/li&gt;
  22. &lt;li&gt;The only reason the law could be justified without reference to protected speech, a requirement for a content-neutral law subject to only intermediate scrutiny, is that it did not “regulate the content of protected speech” either “‘on its face’ or in its justification.” As the Court explained, “where the speech in question is unprotected, States may impose “restrictions” based on “content” without triggering strict scrutiny.”&lt;/li&gt;
  23. &lt;li&gt;Intermediate scrutiny was applied only because “[a]ny burden experienced by adults is therefore only incidental to the statute&#039;s regulation of activity that is not protected by the First Amendment.”&lt;/li&gt;
  24. &lt;li&gt;But strict scrutiny remains “the standard for reviewing the direct targeting of fully protected speech.”&lt;/li&gt;
  25. &lt;/ul&gt;
  26. &lt;p&gt;There is only sentence in &lt;em&gt;Free Speech Coalition v. Paxton&lt;/em&gt; addressing the restriction of First Amendment rights that is not cabined by the language of unprotected harmful to minors speech. The Court wrote: “And, the statute does not ban adults from accessing this material; it simply requires them to verify their age before accessing it on a covered website.” But that sentence was entirely surrounded by and necessarily referred to the limited situation of a law burdening only access to harmful to minors sexual speech.&lt;/p&gt;
  27. &lt;p&gt;We and the others fighting online age restrictions still have our work cut out for us. The momentum to widely adopt and normalize online age restrictions is strong. But &lt;em&gt;Free Speech Coalition v. Paxton&lt;/em&gt; did not approve of age gates when they are imposed on speech that adults and minors have a legal right to access. And EFF will continue to fight for all internet users’ rights to speak and receive information online.&lt;/p&gt;
  28.  
  29. &lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
  30.     <pubDate>Tue, 15 Jul 2025 18:07:34 +0000</pubDate>
  31. <guid isPermaLink="false">110891 at https://www.eff.org</guid>
  32. <category domain="https://www.eff.org/issues/free-speech">Free Speech</category>
  33. <category domain="https://www.eff.org/issues/anonymity">Anonymity</category>
  34. <category domain="https://www.eff.org/issues/social-networks">Social Networks</category>
  35. <dc:creator>David Greene</dc:creator>
  36. <enclosure url="https://www.eff.org/files/banner_library/supreme-court-3.jpg" alt="" type="image/jpeg" length="180051" />
  37.  </item>
  38.  <item>
  39.    <title>EFF Tells Virginia Court That Constitutional Privacy Protections Forbid Cops from Finding out Everyone Who Searched for a Keyword</title>
  40.    <link>https://www.eff.org/deeplinks/2025/07/eff-tells-virginia-court-constitutional-privacy-protections-forbid-cops-finding</link>
  41.    <description>&lt;div class=&quot;field field--name-body field--type-text-with-summary field--label-hidden&quot;&gt;&lt;div class=&quot;field__items&quot;&gt;&lt;div class=&quot;field__item even&quot;&gt;&lt;p&gt;&lt;strong&gt;&lt;em&gt;This post was co-authored by EFF legal intern Noam Shemtov.&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;
  42. &lt;p&gt;We are in a constant dialogue with Internet search engines, ranging from the mundane to the confessional. We ask search engines everything: &lt;em&gt;What movies are playing (and which are worth seeing)? Where’s the nearest clinic (and how do I get there)? Who’s running in the sheriff’s race (and what are their views)? &lt;/em&gt;These online queries can give insight into our private details and innermost thoughts, but police increasingly access them without adhering to longstanding limits on government investigative power.&lt;/p&gt;
  43. &lt;p&gt;A Virginia appeals court is poised to review such a request in a case called &lt;em&gt;Commonwealth v. Clements&lt;/em&gt;. In &lt;em&gt;Clements&lt;/em&gt;, police sought evidence under a “reverse-keyword warrant,” a novel court order that compels search engines like Google to hand over information about every person who has looked up a word or phrase online. While the trial judge correctly recognized the privacy interest in our Internet queries, he overlooked the other wide-ranging harms that keyword warrants enable and upheld the search.&lt;/p&gt;
  44. &lt;p&gt;But as EFF and the ACLU explained in our &lt;a href=&quot;https://www.eff.org/document/commonwealth-v-clements-eff-aclu-amicus&quot;&gt;amicus brief&lt;/a&gt; on appeal, reverse keyword warrants simply cannot be conducted in a lawful way. They invert privacy protections, threaten free speech and inquiry, and fundamentally conflict with the principles underlying the Fourth Amendment and &lt;a href=&quot;https://law.lis.virginia.gov/constitution/article1/section10/&quot;&gt;its analog in the Virginia Constitution&lt;/a&gt;. The court of appeals now has a chance to say so and protect the rights of Internet users well beyond state lines.&lt;/p&gt;
  45. &lt;p&gt;To comply with a keyword warrant, a search engine has to trawl through its entire database of user queries to pinpoint the accounts or devices that made a responsive search. For a dominant service like Google, &lt;a href=&quot;https://www.eff.org/files/2022/07/06/2022-07-05_13-22-16_attachment_-_declaration_of_nikki_adeli19.pdf#page=2&quot;&gt;that means billions of records&lt;/a&gt;. Such a wide dragnet will predictably pull in people with no plausible connection to a crime under investigation if their searches happened to include keywords police are interested in.&lt;/p&gt;
  46. &lt;p&gt;Critically, investigators seldom have a suspect in mind when they seek a reverse-keyword warrant. That isn’t surprising. True to their name, these searches “&lt;a href=&quot;https://cases.justia.com/federal/appellate-courts/ca5/23-60321/23-60321-2024-08-09.pdf?ts=1723246217#page=6&quot;&gt;work in reverse&lt;/a&gt;” from the traditional investigative process. What makes them so useful is precisely their ability to identify Internet users on the sole basis of what they searched online. But what makes a search technique convenient to the government does not always make it constitutional. Quite the opposite: the constitution is anathema to inherently suspicionless dragnets.&lt;/p&gt;
  47. &lt;p&gt;&lt;a href=&quot;https://tile.loc.gov/storage-services/service/ll/usrep/usrep427/usrep427463/usrep427463.pdf&quot;&gt;The Fourth Amendment forbids “exploratory rummaging”&lt;/a&gt;—in fact, it was drafted in direct response to British colonial soldiers’ practice of indiscriminately searching people’s homes and papers for evidence of their opposition to the Crown. To secure a lawful warrant, police must have a specific basis to believe evidence will be found in a given location. They must also describe that location in some detail and say what evidence they expect to find there. It’s hard to think of a less specific description than “all the Internet searches in the world” or a weaker hunch than “whoever committed the crime probably looked up &lt;strong&gt;search term&lt;em&gt; x&lt;/em&gt;&lt;/strong&gt;.” Because those airy assertions are all law enforcement can martial in support of keyword warrants, they are “&lt;a href=&quot;https://www.courts.state.co.us/userfiles/file/Court_Probation/Supreme_Court/Opinions/2023/23SA12.pdf#page=47&quot;&gt;tantamount to high-tech versions of the reviled ‘general warrants’ that first gave rise to the . . . Fourth Amendment&lt;/a&gt;” and Virginia’s even stronger search-and-seizure provision.&lt;/p&gt;
  48. &lt;p&gt;What’s more, since keyword warrants compel search engine companies to hand over records about anyone anywhere who looked up a particular search term within a given timeframe, they effectively make a suspect out of every person whose online activity falls within the warrant’s sweep. As one court &lt;a href=&quot;https://www.nacdl.org/getattachment/dc48746c-32f2-44d7-91c1-a32e3d153811/us-v-chatrieruling.pdf&quot;&gt;has said&lt;/a&gt; about related geofences, this approach “invert[s] probable cause” and “cannot stand.”&lt;/p&gt;
  49. &lt;p&gt;Keyword warrants’ fatal flaws are even more drastic considering that privacy rights &lt;a href=&quot;https://tile.loc.gov/storage-services/service/ll/usrep/usrep436/usrep436547/usrep436547.pdf&quot;&gt;apply with special force&lt;/a&gt; to searches of items—like diaries, &lt;a href=&quot;https://supreme.justia.com/cases/federal/us/379/476/&quot;&gt;booklists&lt;/a&gt;, and Internet search queries—that reflect a person’s free thought and expression. As both law and lived experience affirm, the Internet is “&lt;a href=&quot;https://www.supremecourt.gov/opinions/16pdf/15-1194_08l1.pdf&quot;&gt;the most important place[] . . . for the exchange of views&lt;/a&gt;.” Using it—and using keyword searches to navigate the practical infinity of its contents—is “&lt;a href=&quot;https://www.supremecourt.gov/opinions/17pdf/16-402_h315.pdf#page=21&quot;&gt;indispensable to participation in modern society&lt;/a&gt;.” We shouldn’t have to engage in that core endeavor with the fear that our searches will incriminate us, subject to police officers’ discretion about what keywords are worthy of suspicion. That outcome would predictably chill people from accessing information about sensitive and important topics like reproductive health, public safety, or events in the news that could be relevant to a criminal investigation.&lt;/p&gt;
  50. &lt;p&gt;The Virginia Court of Appeals now has the opportunity in &lt;em&gt;Clements &lt;/em&gt;to protect privacy and speech rights by affirming that keyword warrants can’t be reconciled with constitutional protections guaranteed at the federal or state level. We hope it does so.&lt;/p&gt;
  51.  
  52. &lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
  53.     <pubDate>Thu, 10 Jul 2025 20:17:05 +0000</pubDate>
  54. <guid isPermaLink="false">110886 at https://www.eff.org</guid>
  55. <category domain="https://www.eff.org/issues/privacy">Privacy</category>
  56. <category domain="https://www.eff.org/issues/search-engines">Search Engines</category>
  57. <dc:creator>Andrew Crocker</dc:creator>
  58. <enclosure url="https://www.eff.org/files/banner_library/icon-2019-privacy.png" alt="" type="image/png" length="16605" />
  59.  </item>
  60.  <item>
  61.    <title>   No Face, No Case: California’s S.B. 627 Demands Cops Show Their Faces </title>
  62.    <link>https://www.eff.org/deeplinks/2025/07/no-face-no-case-californias-sb-627-demands-cops-show-their-faces</link>
  63.    <description>&lt;div class=&quot;field field--name-body field--type-text-with-summary field--label-hidden&quot;&gt;&lt;div class=&quot;field__items&quot;&gt;&lt;div class=&quot;field__item even&quot;&gt;&lt;p&gt;&lt;span data-contrast=&quot;auto&quot;&gt;Across the country, people are collecting and sharing &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/deeplinks/2025/02/yes-you-have-right-film-ice&quot;&gt;&lt;span&gt;footage&lt;/span&gt;&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;span data-contrast=&quot;auto&quot;&gt;of &lt;/span&gt;&lt;a href=&quot;https://www.npr.org/2025/07/09/nx-s1-5440311/ice-raids-masked-agents&quot;&gt;&lt;span data-contrast=&quot;none&quot;&gt;masked law enforcement officers&lt;/span&gt;&lt;/a&gt; from both &lt;span data-contrast=&quot;auto&quot;&gt;federal and local agencies deputized to do so-called immigration enforcement: arresting civilians, in some &lt;/span&gt;&lt;a href=&quot;https://theintercept.com/2025/07/07/ice-raids-la-violence-video-bystanders/&quot;&gt;&lt;span data-contrast=&quot;none&quot;&gt;cases&lt;/span&gt;&lt;/a&gt; &lt;a href=&quot;https://www.youtube.com/watch?v=7Yhox15fvDw&quot;&gt;&lt;span data-contrast=&quot;none&quot;&gt;violently&lt;/span&gt;&lt;/a&gt;&lt;span data-contrast=&quot;auto&quot;&gt; and/or &lt;/span&gt;&lt;a href=&quot;https://www.snopes.com/news/2025/06/21/ice-arrest-people-warrants/&quot;&gt;&lt;span data-contrast=&quot;none&quot;&gt;warrantlessly&lt;/span&gt;&lt;/a&gt;&lt;span data-contrast=&quot;auto&quot;&gt;. That footage is part of a long tradition of &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/issues/right-record&quot;&gt;&lt;span data-contrast=&quot;none&quot;&gt;recording law enforcement&lt;/span&gt;&lt;/a&gt;&lt;span data-contrast=&quot;auto&quot;&gt; during their operations to ensure some level of accountability if people observe misconduct and/or unconstitutional practices. However, as essential as recording police can be in proving allegations of misconduct, the footage is rendered far less useful when officers conceal their badges and/or faces. Further, lawyers, journalists, and activists cannot then identify officers in public records requests for body-worn camera footage to view the interaction from the officers’ point of view.&lt;/span&gt;&lt;span data-ccp-props=&quot;{}&quot;&gt; &lt;/span&gt;&lt;/p&gt;
  64. &lt;p&gt;&lt;span data-contrast=&quot;auto&quot;&gt;In response to these growing concerns, California has introduced &lt;/span&gt;&lt;a href=&quot;https://leginfo.legislature.ca.gov/faces/billTextClient.xhtml?bill_id=202520260SB627&quot;&gt;&lt;span&gt;S.B. 627&lt;/span&gt;&lt;/a&gt;&lt;span data-contrast=&quot;auto&quot;&gt; to prohibit law enforcement from covering their faces during these kinds of public encounters. This builds on legislation (in California and some other states and municipalities) that requires police, for example, “&lt;/span&gt;&lt;a href=&quot;https://california.public.law/codes/penal_code_section_830.10&quot;&gt;&lt;span data-contrast=&quot;none&quot;&gt;to wear a badge, nameplate, or other device which bears clearly on its face the identification number or name of the officer&lt;/span&gt;&lt;/a&gt;&lt;span data-contrast=&quot;auto&quot;&gt;.” Similarly, &lt;/span&gt;&lt;a href=&quot;https://california.public.law/codes/penal_code_section_832.7&quot;&gt;&lt;span data-contrast=&quot;none&quot;&gt;police reform legislation passed in 2018&lt;/span&gt;&lt;/a&gt;&lt;span data-contrast=&quot;auto&quot;&gt; requires greater transparency by opening individual personnel files of law enforcement to public scrutiny when there are use of force cases or allegations of violent misconduct. &lt;/span&gt;&lt;/p&gt;
  65. &lt;p&gt;&lt;span data-contrast=&quot;auto&quot;&gt;But in the case of ICE detentions in 2025, federal and federally deputized officers are not only covering up their badges—they&#039;re covering their faces as well. This bill would offer an important tool to prevent this practice, and to ensure that civilians who record the police can actually determine the identity of the officers they’re recording, in case further investigation is warranted. The legislation explicitly &lt;/span&gt;&lt;a href=&quot;https://leginfo.legislature.ca.gov/faces/billTextClient.xhtml?bill_id=202520260SB627&quot;&gt;&lt;span data-contrast=&quot;none&quot;&gt;includes&lt;/span&gt;&lt;/a&gt;&lt;span data-contrast=&quot;auto&quot;&gt; “any officer or anyone acting on behalf of a local, state, or federal law enforcement agency.”&lt;/span&gt;&lt;span data-ccp-props=&quot;{}&quot;&gt; &lt;/span&gt;&lt;/p&gt;
  66. &lt;p&gt;&lt;span data-contrast=&quot;auto&quot;&gt;This is a necessary move. The right to record police, and to hold government actors accountable for their actions, requires that we know who the government actors are in the first place. The new legislation seeks to cover federal officers in addition to state and local officials, protecting Californians from otherwise unaccountable law enforcement activity.&lt;/span&gt;&lt;span data-ccp-props=&quot;{}&quot;&gt; &lt;/span&gt;&lt;/p&gt;
  67. &lt;p&gt;&lt;span data-contrast=&quot;auto&quot;&gt;As EFF has stood up for the right to record police, we also stand up for the right to be able to identify officers in those recordings. We have &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/document/eff-letter-support-ca-sb-627&quot;&gt;&lt;span data-contrast=&quot;none&quot;&gt;submitted a letter&lt;/span&gt;&lt;/a&gt;&lt;span data-contrast=&quot;auto&quot;&gt; to the state legislature to that effect. California should pass S.B. 627, and more states should follow suit to ensure that the right to record remains intact.&lt;/span&gt;&lt;span data-ccp-props=&quot;{}&quot;&gt; &lt;/span&gt;&lt;/p&gt;
  68.  
  69. &lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
  70.     <pubDate>Thu, 10 Jul 2025 19:23:51 +0000</pubDate>
  71. <guid isPermaLink="false">110889 at https://www.eff.org</guid>
  72. <category domain="https://www.eff.org/issues/right-record">Right to Record</category>
  73. <category domain="https://www.eff.org/issues/free-speech">Free Speech</category>
  74. <dc:creator>José Martinez</dc:creator>
  75. <enclosure url="https://www.eff.org/files/banner_library/OG-PoliceRecording.png" alt="Police car being recorded by phone video" type="image/png" length="19071" />
  76.  </item>
  77.  <item>
  78.    <title>Axon’s Draft One is Designed to Defy Transparency </title>
  79.    <link>https://www.eff.org/deeplinks/2025/07/axons-draft-one-designed-defy-transparency</link>
  80.    <description>&lt;div class=&quot;field field--name-body field--type-text-with-summary field--label-hidden&quot;&gt;&lt;div class=&quot;field__items&quot;&gt;&lt;div class=&quot;field__item even&quot;&gt;&lt;p&gt;&lt;span&gt;Axon Enterprise’s Draft One — a generative artificial intelligence product that writes police reports based on audio from officers’ body-worn cameras — seems deliberately designed to avoid audits that could provide any accountability to the public, an EFF investigation has found.&lt;/span&gt;&lt;/p&gt;
  81. &lt;p&gt;&lt;span&gt;Our review of public records from police agencies already using the technology — including police reports, emails, procurement documents, department policies, software settings, and more — as well as Axon’s own user manuals and marketing materials revealed that it’s often impossible to tell which parts of a police report were generated by AI and which parts were written by an officer.&lt;/span&gt;&lt;/p&gt;
  82. &lt;p&gt;&lt;em&gt;You can read our full report, which details what we found in those documents, how we filed those public records requests, and how you can file your own, &lt;a href=&quot;https://www.eff.org/deeplinks/2025/07/effs-guide-getting-records-about-axons-ai-generated-police-reports&quot;&gt;here&lt;/a&gt;. &lt;/em&gt;&lt;/p&gt;
  83. &lt;p&gt;&lt;span&gt;Everyone should have access to answers, evidence, and data regarding the effectiveness and dangers of this technology. Axon and its customers claim this technology will revolutionize policing, but it remains to be seen how it will change the criminal justice system, and who this technology benefits most.&lt;/span&gt;&lt;/p&gt;
  84. &lt;p&gt;&lt;span&gt;For months, &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/deeplinks/2024/05/what-can-go-wrong-when-police-use-ai-write-reports&quot;&gt;&lt;span&gt;EFF&lt;/span&gt;&lt;/a&gt;&lt;span&gt; and other &lt;/span&gt;&lt;a href=&quot;https://www.aclu.org/documents/aclu-on-police-departments-use-of-ai-to-draft-police-reports&quot;&gt;&lt;span&gt;organizations&lt;/span&gt;&lt;/a&gt;&lt;span&gt; have warned about the threats this technology poses to accountability and transparency in an already flawed criminal justice system.  Now we&#039;ve concluded the situation is even worse than we thought: &lt;/span&gt;&lt;b&gt;There is no meaningful way to audit Draft One usage, whether you&#039;re a police chief or an independent researcher, because Axon designed it that way. &lt;/b&gt;&lt;/p&gt;
  85. &lt;p&gt;&lt;span&gt;Draft One uses a ChatGPT variant to process body-worn camera audio of public encounters and create police reports based only on the captured verbal dialogue; it does not process the video. The Draft One-generated text is sprinkled with bracketed placeholders that officers are encouraged to add additional observations or information—or can be quickly deleted. Officers are supposed to edit Draft One&#039;s report and correct anything the Gen AI misunderstood due to a lack of context, troubled translations, or just plain-old mistakes. When they&#039;re done, the officer is prompted to sign an acknowledgement that &lt;/span&gt;&lt;a href=&quot;https://vimeo.com/936340459&quot;&gt;&lt;span&gt;the report was generated using Draft One and that they have reviewed the report and made necessary edits to ensure it is consistent with the officer’s recollection&lt;/span&gt;&lt;/a&gt;&lt;span&gt;. Then they can copy and paste the text into their report. When they close the window, the draft disappears.&lt;/span&gt;&lt;/p&gt;
  86. &lt;p&gt;&lt;span&gt;Any new, untested, and problematic technology needs a robust process to evaluate its use by officers. In this case, one would expect police agencies to retain data that ensures officers are actually editing the AI-generated reports as required, or that officers can accurately answer if a judge demands to know whether, or which part of, reports used by the prosecution were written by AI. &lt;/span&gt;&lt;/p&gt;
  87. &lt;p class=&quot;pull-quote&quot;&gt;&lt;span&gt;&quot;We love having new toys until the public gets wind of them.&quot;&lt;/span&gt;&lt;/p&gt;
  88. &lt;p&gt;&lt;span&gt;One would expect audit systems to be readily available to police supervisors, researchers, and the public, so that anyone can make their own independent conclusions. And one would expect&lt;/span&gt; &lt;span&gt;that Draft One would make it easy to discern its AI product from human product – after all, even your basic, free word processing software can track changes and save a document history.&lt;/span&gt;&lt;/p&gt;
  89. &lt;p&gt;&lt;span&gt;But Draft One defies all these expectations, offering meager oversight features that deliberately conceal how it is used. &lt;/span&gt;&lt;/p&gt;
  90. &lt;p&gt;&lt;span&gt;So when a police report includes biased language, inaccuracies, misinterpretations, or even outright lies, the record won&#039;t indicate whether the officer or the AI is to blame. That makes it extremely difficult, if not impossible, to assess how the system affects justice outcomes, because there is little non-anecdotal data from which to determine whether the technology is junk. &lt;/span&gt;&lt;/p&gt;
  91. &lt;p&gt;&lt;span&gt;The disregard for transparency is perhaps best encapsulated by a short email that an administrator in the Frederick Police Department in Colorado, one of Axon&#039;s first Draft One customers, sent to a company representative after receiving a public records request related to AI-generated reports. &lt;/span&gt;&lt;/p&gt;
  92. &lt;p&gt;&lt;span&gt;&quot;We love having new toys until the public gets wind of them,&quot; the administrator &lt;/span&gt;&lt;a href=&quot;https://www.documentcloud.org/documents/25979149-frederick-police-department-re-tss-5058-reports-utilizing-draft-one/&quot;&gt;&lt;span&gt;wrote&lt;/span&gt;&lt;/a&gt;&lt;span&gt;.&lt;/span&gt;&lt;/p&gt;
  93. &lt;h2&gt;&lt;strong&gt;No Record of Who Wrote What&lt;/strong&gt;&lt;/h2&gt;
  94. &lt;p&gt;&lt;span&gt;The first question anyone should have about a police report written using Draft One is which parts were written by AI and which were added by the officer. Once you know this, you can start to answer more questions, like: &lt;/span&gt;&lt;/p&gt;
  95. &lt;ul&gt;
  96. &lt;li&gt;&lt;span&gt;Are officers meaningfully editing and adding to the AI draft? Or are they reflexively rubber-stamping the drafts to move on as quickly as possible? &lt;/span&gt;&lt;/li&gt;
  97. &lt;li&gt;&lt;span&gt;How often are officers finding and correcting errors made by the AI, and are there patterns to these errors? &lt;/span&gt;&lt;/li&gt;
  98. &lt;li&gt;&lt;span&gt;If there is inappropriate language or a fabrication in the final report, was it introduced by the AI or the officer? &lt;/span&gt;&lt;/li&gt;
  99. &lt;li&gt;&lt;span&gt;Is the AI overstepping in its interpretation of the audio? If a report says, &quot;the subject made a threatening gesture,&quot; was that added by the officer, or did the AI make a factual assumption based on the audio? If a suspect uses metaphorical slang, does the AI document literally? If a subject says &quot;yeah&quot; through a conversation as a verbal acknowledgement that they&#039;re listening to what the officer says, is that interpreted as an agreement or a confession?&lt;/span&gt;&lt;/li&gt;
  100. &lt;/ul&gt;
  101. &lt;p class=&quot;pull-quote&quot;&gt;&quot;So we don’t store the original draft and that’s by design...&quot;&lt;/p&gt;
  102. &lt;p&gt;&lt;span&gt;Ironically, Draft One does not save the first draft it generates. Nor does the system store any subsequent versions. Instead, the officer copies and pastes the text into the police report, and the previous draft, originally created by Draft One, disappears as soon as the window closes. There is no log or record indicating which portions of a report were written by the computer and which portions were written by the officer, except for the officer&#039;s own recollection. If an officer generates a Draft One report multiple, there&#039;s no way to tell whether the AI interprets the audio differently each time.&lt;/span&gt;&lt;/p&gt;
  103. &lt;p&gt;&lt;span&gt;Axon is open about not maintaining these records, at least when it markets directly to law enforcement.&lt;/span&gt;&lt;/p&gt;
  104. &lt;p&gt;&lt;span&gt;In this video of a &lt;/span&gt;&lt;a href=&quot;https://vimeo.com/941650612&quot;&gt;&lt;span&gt;roundtable discussion about the Draft One product&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, Axon’s senior principal product manager for generative AI is asked (at the 49:47 mark) whether or not it’s possible to see after-the-fact which parts of the report were suggested by the AI and which were edited by the officer. His response (bold and definition of RMS added): &lt;/span&gt;&lt;/p&gt;
  105. &lt;p&gt;&lt;span&gt;“&lt;/span&gt;&lt;b&gt;So we don’t store the original draft and that’s by design and that’s really because the last thing we want to do is create more disclosure headaches for our customers and our attorney’s offices&lt;/b&gt;&lt;span&gt;—so basically the officer generates that draft, they make their edits, if they submit it into our Axon records system then that’s the only place we store it, if they copy and paste it into their third-party RMS [records management system] system as soon as they’re done with that and close their browser tab, it’s gone. It’s actually never stored in the cloud at all so you don’t have to worry about extra copies floating around.”&lt;/span&gt;&lt;/p&gt;
  106. &lt;p&gt;&lt;span&gt;To reiterate: Axon deliberately does not store the original draft written by the Gen AI, because &quot;the last thing&quot; they want is for cops to have to provide that data to anyone (say, a judge, defense attorney or civil liberties non-profit). &lt;/span&gt;&lt;/p&gt;
  107. &lt;p&gt;&lt;span&gt;Following up on the same question, Axon&#039;s Director of Strategic Relationships at Axon Justice suggests this is fine, since a police officer using a word processor wouldn&#039;t be required to save every draft of a police report as they&#039;re re-writing it. This is, of course, misdirection and not remotely comparable. An officer with a word processor is one thought process and a record created by one party; Draft One is two processes from two parties–Axon and the officer. Ultimately, it could and should be considered two records: the version sent to the officer from Axon and the version edited by the officer.&lt;/span&gt;&lt;/p&gt;
  108. &lt;p&gt;&lt;span&gt;The days of there being unexpected consequences of police departments writing reports in word processors may be over, but Draft One is still unproven. After all, every AI-evangelist, including Axon, claims this technology is a game-changer. So, why wouldn&#039;t an agency want to maintain a record that can establish the technology’s accuracy? &lt;/span&gt;&lt;/p&gt;
  109. &lt;p&gt;&lt;span&gt;It also appears that Draft One isn&#039;t simply hewing to &lt;/span&gt;&lt;a href=&quot;https://post.ca.gov/portals/0/post_docs/basic_course_resources/workbooks/LD_18_V-3.5.pdf&quot;&gt;&lt;span&gt;long&lt;/span&gt;&lt;/a&gt;&lt;span&gt;-&lt;/span&gt;&lt;a href=&quot;https://www.lewisu.edu/writingcenter/pdf/police-report-resource-revised.pdf&quot;&gt;&lt;span&gt;established&lt;/span&gt;&lt;/a&gt; &lt;a href=&quot;https://www.csus.edu/campus-safety/police-department/_internal/_documents/rwm.pdf&quot;&gt;&lt;span&gt;norms&lt;/span&gt;&lt;/a&gt;&lt;span&gt; of police report-writing; it may fundamentally change them. In &lt;/span&gt;&lt;a href=&quot;https://www.documentcloud.org/documents/25977598-campbell-pd-please-read-axon-draft-one-ai-generated-r/&quot;&gt;&lt;span&gt;one email&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, the Campbell Police Department&#039;s Police Records Supervisor tells staff, “You may notice a significant difference with the narrative format…if the DA’s office has comments regarding our report narratives, please let me know.” It&#039;s more than a little shocking that a police department would implement such a change without fully soliciting and addressing the input of prosecutors. In this case, the Santa Clara County District Attorney had already suggested police include a disclosure when Axon Draft One is used in each report, but Axon&#039;s engineers had yet to finalize the feature at the time it was rolled out. &lt;/span&gt;&lt;/p&gt;
  110. &lt;p&gt;&lt;span&gt;One of the main concerns, of course, is that this system effectively creates a smokescreen over truth-telling in police reports. If an officer lies or uses inappropriate language in a police report, who is to say that the officer wrote it or the AI? An officer can be punished severely for official dishonesty, but the consequences may be more lenient for a cop who blames it on the AI. There has already been an occasion when engineers discovered a bug that allowed officers on at least three occasions to circumvent the &quot;guardrails&quot; that supposedly deter officers from submitting AI-generated reports without reading them first, as Axon &lt;/span&gt;&lt;a href=&quot;https://www.documentcloud.org/documents/25979172-frederick-police-department-re-draft-one-guardrails-issue/?mode=document#document/p2&quot;&gt;&lt;span&gt;disclosed&lt;/span&gt;&lt;/a&gt;&lt;span&gt; to the Frederick Police Department.&lt;/span&gt;&lt;/p&gt;
  111. &lt;p&gt;&lt;span&gt;To serve and protect the public interest, the AI output must be continually and aggressively evaluated whenever and wherever it&#039;s used. But Axon has intentionally made this difficult. &lt;/span&gt;&lt;/p&gt;
  112. &lt;h2&gt;&lt;strong&gt;What the Audit Trail Actually Looks Like &lt;/strong&gt;&lt;/h2&gt;
  113. &lt;p&gt;&lt;span&gt;You may have seen &lt;/span&gt;&lt;a href=&quot;https://my.axon.com/s/article/View-the-audit-trail-in-Axon-Evidence-Draft-One?language=en_US&quot;&gt;&lt;span&gt;news stories or other public statements &lt;/span&gt;&lt;/a&gt;&lt;span&gt;asserting that Draft One does, indeed, have auditing features. So, we dug through the user manuals to figure out what that exactly means. &lt;/span&gt;&lt;/p&gt;
  114. &lt;p&gt;&lt;span&gt;The first thing to note is that, based on our review of the documentation, there appears to be  no feature in Axon software that allows departments to export a list of all police officers who have used Draft One. Nor is it possible to export a list of all reports created by Draft One, unless the department has customized its process (we&#039;ll get to that in a minute). &lt;/span&gt;&lt;/p&gt;
  115. &lt;p&gt;&lt;span&gt;This is disappointing because, without this information, it&#039;s near impossible to do even the most basic statistical analysis: how many officers are using the technology and how often. &lt;/span&gt;&lt;/p&gt;
  116. &lt;p&gt;&lt;span&gt;Based on the documentation, you can only export two types of very basic logs, with the process differing depending on whether an agency uses &lt;/span&gt;&lt;a href=&quot;https://my.axon.com/s/article/View-the-audit-trail-in-Axon-Evidence-Draft-One?language=en_US&quot;&gt;&lt;span&gt;Evidence&lt;/span&gt;&lt;/a&gt;&lt;span&gt; or Records/Standards products. These are:&lt;/span&gt;&lt;/p&gt;
  117. &lt;ol&gt;
  118. &lt;li&gt;&lt;b&gt;A log of basic actions taken on a particular report.&lt;/b&gt;&lt;span&gt; If the officer requested a Draft One report or signed the Draft One liability disclosure related to the police report, it will show here. But nothing more than that.&lt;/span&gt;&lt;/li&gt;
  119. &lt;li&gt;&lt;span&gt; &lt;/span&gt;&lt;b&gt;A log of an individual officer/user&#039;s basic activity in the Axon Evidence/Records system&lt;/b&gt;&lt;span&gt;. This audit log shows things such as when an officer logs into the system, uploads videos, or accesses a piece of evidence. The only Draft One-related activities this tracks are whether the officer ran a Draft One request, signed the Draft One liability disclosure, or changed the Draft One settings. &lt;/span&gt;&lt;/li&gt;
  120. &lt;/ol&gt;
  121. &lt;p&gt;&lt;span&gt;This means that, to do a comprehensive review, an evaluator may need to go through the record management system and look up each officer individually to identify whether that officer used Draft One and when. That could mean combing through dozens, hundreds, or in some cases, thousands of individual user logs. &lt;/span&gt;&lt;/p&gt;
  122. &lt;p&gt;&lt;/p&gt;&lt;div class=&quot;caption caption-center&quot;&gt;&lt;div class=&quot;caption-width-container&quot;&gt;&lt;div class=&quot;caption-inner&quot;&gt;&lt;img src=&quot;/files/2025/07/08/screenshot_2025-07-08_at_8.35.40_am.png&quot; width=&quot;1212&quot; height=&quot;482&quot; alt=&quot;An audit log on Axon&#039;s Draft one which shows only when an officer as generated a report and when they have signed the liability disclosure.&quot; title=&quot;An audit log on Axon&#039;s Draft one which shows only when an officer as generated a report and when they have signed the liability disclosure.&quot; /&gt;&lt;p class=&quot;caption-text&quot;&gt;An example of Draft One usage in an audit log. &lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;
  123.  
  124. &lt;p&gt;&lt;span&gt;An auditor could also go report-by-report as well to see which ones involved Draft One, but the sheer number of reports generated by an agency means this method would require a massive amount of time. &lt;/span&gt;&lt;/p&gt;
  125. &lt;p&gt;&lt;span&gt;But can agencies even create a list of police reports that were co-written with AI? It depends on whether the agency has included a disclosure in the body of the text, such as &quot;I acknowledge this report was generated from a digital recording using Draft One by Axon.&quot; If so, then an administrator can use &quot;Draft One&quot; as a keyword search to find relevant reports.&lt;/span&gt;&lt;/p&gt;
  126. &lt;p&gt;&lt;span&gt;Agencies that do not require that language told us they could not identify which reports were written with Draft One. For example, one of those agencies and one of Axon&#039;s most promoted clients, the Lafayette Police Department in Indiana, told us: &lt;/span&gt;&lt;/p&gt;
  127. &lt;p&gt;&lt;span&gt;&quot;Regarding the attached request, we do not have the ability to create a list of reports created through Draft One. They are not searchable. This request is now closed.&quot;&lt;/span&gt;&lt;/p&gt;
  128. &lt;p&gt;&lt;span&gt;Meanwhile, in response to a similar public records request, the Palm Beach County Sheriff&#039;s Office, which does require a disclosure at the bottom of each report that it had been written by AI, was able to isolate more than 3,000 Draft One reports generated between December 2024 and March 2025.&lt;/span&gt;&lt;/p&gt;
  129. &lt;p&gt;&lt;span&gt;They told us: &quot;We are able to do a keyword and a timeframe search. I used the words draft one and the system generated all the draft one reports for that timeframe.&quot;&lt;/span&gt;&lt;/p&gt;
  130. &lt;p&gt;We have requested further clarification from Axon, but they have yet to respond. &lt;/p&gt;
  131. &lt;p&gt;&lt;span&gt;However, as we learned from email exchanges between the Frederick Police Department in Colorado and Axon, Axon is tracking police use of the technology at a level that isn&#039;t available to the police department itself. &lt;/span&gt;&lt;/p&gt;
  132. &lt;p&gt;&lt;span&gt;In response to a request from Politico&#039;s Alfred Ng in August 2024 for Draft One-generated police reports, the police department was struggling to isolate those reports. &lt;/span&gt;&lt;/p&gt;
  133. &lt;p&gt;&lt;span&gt;An Axon representative &lt;/span&gt;&lt;a href=&quot;https://www.documentcloud.org/documents/25979141-frederick-police-deparmtent-email-re-media-request/?mode=document#document/p4&quot;&gt;&lt;span&gt;responded&lt;/span&gt;&lt;/a&gt;&lt;span&gt;: &quot;Unfortunately, there’s no filter for DraftOne reports so you’d have to pull a User’s audit trail and look for Draft One entries. To set expectations, it’s not going to be graceful, but this wasn’t a scenario we anticipated needing to make easy.&quot;&lt;/span&gt;&lt;/p&gt;
  134. &lt;p&gt;&lt;span&gt;But then, Axon followed up: &quot;We track which reports use Draft One internally so I exported the data.&quot; Then, a few days later, Axon provided Frederick with some custom JSON code to extract the data in the future. &lt;/span&gt;&lt;/p&gt;
  135. &lt;h2&gt;&lt;br /&gt;What is Being Done About Draft One&lt;/h2&gt;
  136. &lt;p&gt;The California Assembly is currently considering &lt;a href=&quot;https://leginfo.legislature.ca.gov/faces/billTextClient.xhtml?bill_id=202520260SB524&quot;&gt;SB 524&lt;/a&gt;, a bill that addresses transparency measures for AI-written police reports. The legislation would require disclosure whenever police use artificial intelligence to partially or fully write official reports, as well as “require the first draft created to be retained for as long as the final report is retained.” Because Draft One is designed not to retain the first or any previous drafts of a report, it cannot comply with this common-sense and first-step bill,  and any law enforcement usage would be unlawful.&lt;/p&gt;
  137. &lt;p&gt;&lt;span&gt;Axon markets Draft One as a solution to a problem police have been complaining about for at least a century: that they do too much paperwork. Or, at least, they spend too much time doing paperwork. The current research on whether Draft One remedies this issue shows mixed &lt;/span&gt;&lt;a href=&quot;https://www.crimrxiv.com/pub/nxbmzp2j&quot;&gt;&lt;span&gt;results&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, from some agencies claiming it has &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/deeplinks/2025/03/anchorage-police-department-ai-generated-police-reports-dont-save-time&quot;&gt;&lt;span&gt;no real-time savings&lt;/span&gt;&lt;/a&gt;, &lt;span&gt;with others agencies extolling its virtues (although their data also shows that &lt;/span&gt;&lt;a href=&quot;https://www.documentcloud.org/documents/25973591-lake-havasu-police-department-draft-one-report-redacted-2/?mode=document#document/p17&quot;&gt;&lt;span&gt;results&lt;/span&gt;&lt;/a&gt;&lt;span&gt; vary even within the department).&lt;/span&gt;&lt;/p&gt;
  138. &lt;p&gt;&lt;span&gt;In the justice system, police must prioritize accuracy over speed. Public safety and a trustworthy legal system demand quality over corner-cutting. Time saved should not be the only metric, or even the most important one. It&#039;s like evaluating a drive-through restaurant based only on how fast the food comes out, while deliberately concealing the ingredients and nutritional information and failing to inspect whether the kitchen is up to health and safety standards. &lt;/span&gt;&lt;/p&gt;
  139. &lt;p&gt;&lt;span&gt;Given how untested this technology is and how much the company is in a &lt;/span&gt;&lt;a href=&quot;https://www.investors.com/news/axon-stock-earnings-q2-draft-one-ai/&quot;&gt;&lt;span&gt;hurry to sell&lt;/span&gt;&lt;/a&gt;&lt;span&gt; Draft One, many local lawmakers and prosecutors have taken it upon themselves to try to regulate the product’s use. Utah is currently considering &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/deeplinks/2025/02/utah-bill-aims-make-officers-disclose-ai-written-police-reports&quot;&gt;&lt;span&gt;a bill that would mandate disclosure &lt;/span&gt;&lt;/a&gt;&lt;span&gt;for any police reports generated by AI, thus sidestepping one of the current major transparency issues: it’s nearly impossible to tell which finished reports started as an AI draft. &lt;/span&gt;&lt;/p&gt;
  140. &lt;p&gt;&lt;span&gt;In King County, Washington, which includes Seattle, the district attorney’s office has been clear in their instructions: &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/deeplinks/2024/10/prosecutors-washington-state-warn-police-dont-use-gen-ai-write-reports&quot;&gt;&lt;span&gt;police should not use AI to write police reports&lt;/span&gt;&lt;/a&gt;&lt;span&gt;. Their&lt;/span&gt;&lt;a href=&quot;https://komonews.com/amp/news/local/king-county-prosecutor-tells-police-not-to-use-ai-artificial-intelligence-for-official-reports-for-now-errors-concerns-law-enforcement-perjury-criminal-justice&quot;&gt;&lt;span&gt; memo says&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;
  141. &lt;blockquote&gt;&lt;p&gt;&lt;span&gt;We do not fear advances in technology – but we do have legitimate concerns about some of the products on the market now... AI continues to develop and we are hopeful that we will reach a point in the near future where these reports can be relied on. For now, our office has made the decision not to accept any police narratives that were produced with the assistance of AI.&lt;/span&gt;&lt;/p&gt;
  142. &lt;/blockquote&gt;
  143. &lt;p&gt;&lt;span&gt;We urge other prosecutors to follow suit and demand that police in their jurisdiction not unleash this new, unaccountable, and intentionally opaque AI product. &lt;/span&gt;&lt;/p&gt;
  144. &lt;h2&gt;&lt;strong&gt;Conclusion&lt;/strong&gt;&lt;/h2&gt;
  145. &lt;p&gt;&lt;span&gt;Police should not be using AI to write police reports. There are just too many unanswered questions about how AI would translate the audio of situations and whether police will actually edit those drafts, while simultaneously, there is no way for the public to reliably discern what was written by a person and what was written by a computer. This is before we even get to the question of how these reports might compound and exacerbate existing problems or create new ones in an already unfair and untransparent criminal justice system. &lt;/span&gt;&lt;/p&gt;
  146. &lt;p&gt;&lt;span&gt;EFF will continue to research and advocate against the use of this technology but for now, the lesson is clear: Anyone with control or influence over police departments, be they lawmakers or people in the criminal justice system, has a duty to be informed about the potential harms and challenges posed by AI-written police reports.  &lt;/span&gt;&lt;/p&gt;
  147.  
  148. &lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
  149.     <pubDate>Thu, 10 Jul 2025 16:00:31 +0000</pubDate>
  150. <guid isPermaLink="false">110875 at https://www.eff.org</guid>
  151. <dc:creator>Matthew Guariglia</dc:creator>
  152. <dc:creator>Dave Maass</dc:creator>
  153. <enclosure url="https://www.eff.org/files/banner_library/robot-robot-2a.png" alt="a sinister police robot types a report" type="image/png" length="43805" />
  154.  </item>
  155.  <item>
  156.    <title>EFF&#039;s Guide to Getting Records About Axon&#039;s Draft One AI-Generated Police Reports </title>
  157.    <link>https://www.eff.org/deeplinks/2025/07/effs-guide-getting-records-about-axons-ai-generated-police-reports</link>
  158.    <description>&lt;div class=&quot;field field--name-body field--type-text-with-summary field--label-hidden&quot;&gt;&lt;div class=&quot;field__items&quot;&gt;&lt;div class=&quot;field__item even&quot;&gt;&lt;p&gt;&lt;span&gt;The moment Axon Enterprise announced a new product, Draft One, that would allow law enforcement officers to use artificial intelligence to automatically generate incident report narratives based on body-worn camera audio, everyone in the police accountability community immediately started asking the same &lt;a href=&quot;https://www.eff.org/deeplinks/2024/05/what-can-go-wrong-when-police-use-ai-write-reports&quot;&gt;questions&lt;/a&gt;. &lt;/span&gt;&lt;/p&gt;
  159. &lt;p&gt;&lt;span&gt;What do AI-generated police reports look like? What kind of paper trail does this system leave? How do we get a hold of documentation using public records laws? &lt;/span&gt;&lt;/p&gt;
  160. &lt;p&gt;&lt;span&gt;Unfortunately, obtaining these records isn&#039;t easy. In many cases, it&#039;s straight-up impossible. &lt;/span&gt;&lt;/p&gt;
  161. &lt;p&gt;&lt;strong&gt;Read our full report on how Axon&#039;s Draft One defies transparency expectations by design &lt;a href=&quot;https://www.eff.org/deeplinks/2025/07/axons-draft-one-designed-defy-transparency&quot;&gt;here&lt;/a&gt;. &lt;/strong&gt;&lt;/p&gt;
  162. &lt;p&gt;&lt;span&gt;In some jurisdictions, the documents are walled off behind government-created barriers. For example, California fully exempts police narrative reports from public disclosure, while other states charge fees to access individual reports that become astronomical if you want to analyze the output in bulk. Then there are technical barriers: Axon&#039;s product itself does not allow agencies to isolate reports that contain an AI-generated narrative, although an agency can voluntarily institute measures to make them searchable by a keyword.  &lt;/span&gt;&lt;/p&gt;
  163. &lt;p&gt;&lt;span&gt;This spring, EFF tested out different public records request templates and sent them to dozens of law enforcement agencies we believed are using Draft One. &lt;/span&gt;&lt;/p&gt;
  164. &lt;p&gt;&lt;span&gt;We asked each agency for the Draft One-generated police reports themselves, knowing that in most cases this would be a long shot. We also dug into Axon&#039;s user manuals to figure out what kind of logs are generated and how to carefully phrase our public records request to get them. We asked for the current system settings for Draft One, since there are a lot of levers police administrators can pull that drastically change how and when officers can use the software. We also requested the standard records that we usually ask for when researching new technologies: procurement documents, agreements, training manuals, policies, and emails with vendors. &lt;/span&gt;&lt;/p&gt;
  165. &lt;p&gt;&lt;span&gt;Like all mass public records campaigns, the results were… mixed. Some agencies were refreshingly open with their records. Others assessed us records fees well outside the usual range for a non-profit organization. &lt;/span&gt;&lt;/p&gt;
  166. &lt;p&gt;&lt;span&gt;What we learned about the process is worth sharing. Axon has thousands of clients nationwide that use its Tasers, &lt;/span&gt;&lt;a href=&quot;https://atlasofsurveillance.org/search?locale=am&amp;amp;vendor=Axon&quot;&gt;&lt;span&gt;body-worn cameras&lt;/span&gt;&lt;/a&gt;&lt;span&gt; and &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/deeplinks/2025/04/beware-bundle-companies-are-banking-becoming-your-police-departments-favorite&quot;&gt;&lt;span&gt;bundles of surveillance equipment&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, and the company is using those existing relationships to heavily promote Draft One.  We expect many more cities to deploy the technology over the next few years. Watchdogging police use of AI will require a nationwide effort by journalists, advocacy organizations and community volunteers.&lt;/span&gt;&lt;/p&gt;
  167. &lt;p&gt;&lt;span&gt;Below we’re sharing some sample language you can use in your own public records requests about Draft One — but be warned. It’s likely that the more you include, the longer it might take and the higher the fees will get. The template language and our suggestions for filing public records requests are not legal advice. If you have specific questions about a public records request you filed, consult a lawyer. &lt;/span&gt;&lt;/p&gt;
  168. &lt;h3&gt;&lt;span&gt;1. Police Reports&lt;/span&gt;&lt;/h3&gt;
  169. &lt;table border=&quot;0&quot; width=&quot;1351&quot;&gt;
  170.  
  171. &lt;tr&gt;
  172. &lt;td&gt;
  173. &lt;p&gt;&lt;strong&gt;Language to try in your public records request:&lt;/strong&gt;&lt;/p&gt;
  174. &lt;ul&gt;
  175. &lt;li&gt;
  176. All police report narratives, supplemental report narratives, warrant affidavits, statements, and other narratives generated using Axon Draft One to document law enforcement-related incidents for the period between [DATE IN THE LAST FEW WEEKS] and the date this request is received. If your agency requires a Draft One disclosure in the text of the message, you can use &quot;Draft One&quot; as a keyword search term.
  177. &lt;/li&gt;
  178. &lt;/ul&gt;
  179. &lt;p&gt;&lt;strong&gt;Or&lt;/strong&gt;&lt;/p&gt;
  180. &lt;ul&gt;
  181. &lt;li&gt;
  182. The [NUMBER] most recent police report narratives that were generated using Axon Draft One between [DATE IN THE LAST FEW WEEKS] and the date this request is received.
  183. &lt;/li&gt;
  184. &lt;/ul&gt;
  185. &lt;p&gt;&lt;strong&gt;If you are curious about a particular officer&#039;s Draft One usage, you can also ask for their reports specifically. However it may be helpful to obtain their usage log first (see section 2).&lt;/strong&gt;&lt;/p&gt;
  186. &lt;ul&gt;
  187. &lt;li&gt;
  188. All police report narratives, supplemental report narratives, warrant affidavits, statements, and other narratives generated by [OFFICER NAME] using Axon Draft One to document law enforcement-related incidents for the period between [DATE IN THE LAST FEW WEEKS] and the date this request is received.
  189. &lt;/li&gt;
  190. &lt;/ul&gt;
  191. &lt;p&gt;&lt;strong&gt;We suggest using weeks, not months, because the sheer number of reports can get costly very quickly.&lt;/strong&gt;&lt;/p&gt;
  192. &lt;/td&gt;
  193. &lt;/tr&gt;
  194.  
  195. &lt;/table&gt;
  196. &lt;p&gt;&lt;span&gt;As an add-on to Axon&#039;s evidence and records management platforms, Draft One uses ChatGPT to convert audio taken from Axon body-worn cameras into the so-called first draft of the narrative portion of a police report. &lt;/span&gt;&lt;/p&gt;
  197. &lt;p&gt;&lt;span&gt;When &lt;/span&gt;&lt;a href=&quot;https://www.politico.com/newsletters/digital-future-daily/2024/09/04/axon-ai-police-reports-00177331&quot;&gt;&lt;span&gt;Politico surveyed seven agencies&lt;/span&gt;&lt;/a&gt;&lt;span&gt; in September 2024, reporter Alfred Ng found that police administrators did not have the technical ability to identify which reports contained AI-generated language. As Ng reported. &lt;/span&gt;&lt;b&gt;“&lt;/b&gt;&lt;span&gt;There is no way for us to search for these on our end,” a Lafayette, IN police captain told Ng. Six months later, EFF received the same no-can-do response from the Lafayette Police Department. &lt;/span&gt;&lt;/p&gt;
  198. &lt;p class=&quot;center-image&quot;&gt;&lt;span&gt;&lt;img src=&quot;/files/2025/07/07/image10.png&quot; width=&quot;814&quot; height=&quot;323&quot; alt=&quot; Regarding the attached request, we do not have the ability to create a list of reports created through Draft One. They are not searchable. This request is now closed.&quot; title=&quot; Regarding the attached request, we do not have the ability to create a list of reports created through Draft One. They are not searchable. This request is now closed.&quot; /&gt;&lt;/span&gt;&lt;/p&gt;
  199. &lt;p&gt;&lt;span&gt;Although Lafayette Police could not create a list on their own, it turns out that Axon&#039;s engineers can generate these reports for police if asked. When the Frederick Police Department in Colorado received a similar request from Ng, the agency contacted Axon for help. The company does internally track reports written with Draft One and was able to provide a spreadsheet of Draft One reports (.&lt;/span&gt;&lt;a href=&quot;https://www.eff.org/files/2025/06/18/frederick_police_deparment_-_draft_one_generated_reports_2024-02-22_to_2024-08-20.csv&quot;&gt;&lt;span&gt;csv&lt;/span&gt;&lt;/a&gt;&lt;span&gt;) and even provided Frederick Police with computer code to allow the agency to create similar lists in the future. Axon told them they would look at making this a feature in the future, but that appears not to have happened yet. &lt;/span&gt;&lt;/p&gt;
  200. &lt;p&gt;&lt;span&gt;But we also struck gold with two agencies: the Palm Beach County Sheriff&#039;s Office (PBCSO) in Florida and the Lake Havasu City Police Department in Arizona. In both cases, the agencies require officers to include a disclosure that they used Draft One at the end of the police narrative. Here&#039;s a slide from the &lt;a href=&quot;https://www.documentcloud.org/documents/25972394-palm-beach-county-sheriffs-pffice-axon-draft-one-training-material/&quot;&gt;Palm Beach County Sheriff&#039;s Draft One training:&lt;/a&gt; &lt;/span&gt;&lt;/p&gt;
  201. &lt;p class=&quot;center-image&quot;&gt;&lt;span&gt;&lt;img src=&quot;/files/2025/07/07/image2.png&quot; width=&quot;1183&quot; height=&quot;659&quot; alt=&quot;A slide titled &amp;quot;Narrative Footer&amp;quot; that tells officers they must include a disclosure at the bottom of their report.&quot; title=&quot;A slide titled &amp;quot;Narrative Footer&amp;quot; that tells officers they must include a disclosure at the bottom of their report.&quot; /&gt;&lt;/span&gt;&lt;/p&gt;
  202. &lt;p&gt;&lt;span&gt;And here&#039;s the boilerplate disclosure: &lt;/span&gt;&lt;/p&gt;
  203. &lt;blockquote&gt;&lt;p&gt;I acknowledge this report was generated from a digital recording using Draft One by Axon. I further acknowledge that I have I reviewed the report, made any necessary edits, and believe it to be an accurate representation of my recollection of the reported events. I am willing to testify to the accuracy of this report.&lt;/p&gt;
  204. &lt;/blockquote&gt;
  205. &lt;p&gt;&lt;span&gt;As small a gesture as it may seem, that disclosure makes all the difference when it comes to responding to a public records request. Lafayette Police could not isolate the reports because its &lt;/span&gt;&lt;a href=&quot;https://www.lafayette.in.gov/DocumentCenter/View/18516/2025-Policy-Manualpdf#page=186&amp;amp;zoom=auto,-129,760&quot;&gt;&lt;span&gt;policy&lt;/span&gt;&lt;/a&gt;&lt;span&gt; does not require the disclosure. A Frederick Police Department sergeant noted in an &lt;/span&gt;&lt;a href=&quot;https://www.documentcloud.org/documents/25979141-frederick-police-deparmtent-email-re-media-request/?mode=document#document/p5&quot;&gt;&lt;span&gt;email&lt;/span&gt;&lt;/a&gt;&lt;span&gt; to Axon that they could isolate reports when the auto-disclosure was turned on, but not after they decided to turn it off. This year, Utah legislators &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/about/staff/dr-matthew-guariglia-0&quot;&gt;&lt;span&gt;introduced a bill&lt;/span&gt;&lt;/a&gt;&lt;span&gt; to require this kind of disclosure on AI-generated reports.&lt;/span&gt;&lt;/p&gt;
  206. &lt;p&gt;&lt;span&gt;As the PBCSO records manager told us: &quot;We are able to do a keyword and a timeframe search. I used the words ‘Draft One’ and the system generated all the Draft One reports for that timeframe.&quot; In fact, in Palm Beach County and Lake Havasu, records administrators dug up huge numbers of records. But, once we saw the estimated price tag, we ultimately narrowed our request to just 10 reports.&lt;/span&gt;&lt;/p&gt;
  207. &lt;p&gt;&lt;span&gt;Here is an example of a report from PBCSO, which only allows Draft One to be used in incidents that don&#039;t involve a criminal charge. As a result, many of the reports were related to mental health or domestic dispute responses.  &lt;/span&gt;&lt;/p&gt;
  208. &lt;p class=&quot;center-image&quot;&gt;&lt;span&gt;&lt;img src=&quot;/files/2025/07/07/image3.png&quot; width=&quot;1090&quot; height=&quot;980&quot; alt=&quot;A police report peppered with redactions. &quot; title=&quot;A police report peppered with redactions. &quot; /&gt;&lt;/span&gt;&lt;/p&gt;
  209. &lt;p class=&quot;center-image&quot;&gt;&lt;i&gt;&lt;span&gt;A machine readable text version of this report is available &lt;/span&gt;&lt;/i&gt;&lt;a href=&quot;https://www.documentcloud.org/documents/25976449-25-052609-nrn/?mode=text&quot;&gt;&lt;i&gt;&lt;span&gt;here&lt;/span&gt;&lt;/i&gt;&lt;/a&gt;&lt;i&gt;&lt;span&gt;. Full version &lt;a href=&quot;https://www.documentcloud.org/documents/25976449-25-052609-nrn/?mode=document&quot;&gt;here&lt;/a&gt;.&lt;/span&gt;&lt;/i&gt;&lt;/p&gt;
  210. &lt;p&gt;&lt;span&gt;And here is an example from the Lake Havasu City Police Department, whose clerk was kind enough to provide us with a diverse sample of requests. &lt;/span&gt;&lt;/p&gt;
  211. &lt;p class=&quot;center-image&quot;&gt;&lt;span&gt;&lt;img src=&quot;/files/2025/07/07/image4.png&quot; width=&quot;663&quot; height=&quot;633&quot; alt=&quot;A police report peppered with redactions. &quot; title=&quot;A police report peppered with redactions. &quot; /&gt;&lt;/span&gt;&lt;/p&gt;
  212. &lt;p class=&quot;center-image&quot;&gt;&lt;span&gt;&lt;i&gt;A machine readable text version of this report is available &lt;/i&gt;&lt;a href=&quot;https://www.documentcloud.org/documents/25975605-dr-25-01306-redacted/?mode=text&quot;&gt;&lt;i&gt;here.&lt;/i&gt;&lt;/a&gt;&lt;i&gt; Full version &lt;a href=&quot;https://www.documentcloud.org/documents/25975605-dr-25-01306-redacted/?mode=document&quot;&gt;here&lt;/a&gt;.&lt;/i&gt;&lt;/span&gt;&lt;/p&gt;
  213. &lt;p&gt;&lt;span&gt;EFF redacted some of these records to protect the identity of members of the public who were captured on body-worn cameras. Black-bar redactions were made by the agencies, while bars with X&#039;s were made by us. You can view all the examples we received below: &lt;/span&gt;&lt;/p&gt;
  214. &lt;ul&gt;
  215. &lt;li&gt;&lt;a href=&quot;https://www.documentcloud.org/projects/221796-palm-beach-county-sheriffs-office-draft-one-reports-redacted/&quot;&gt;10 Axon Draft One-assisted reports from the Palm Beach County Sheriff&#039;s Office&lt;/a&gt;&lt;/li&gt;
  216. &lt;li&gt;&lt;a href=&quot;https://www.documentcloud.org/projects/221797-lake-havasu-city-police-department-draft-one-report-redacted/&quot;&gt;10 Axon Draft One-assisted reports from the Lake Havasu Police Department&lt;/a&gt;&lt;/li&gt;
  217. &lt;/ul&gt;
  218. &lt;p&gt;&lt;span&gt;We also received police reports (perhaps unintentionally) from two other agencies that were contained as email attachments in response to another part of our request (see section 7).&lt;/span&gt;&lt;/p&gt;
  219. &lt;ul&gt;
  220. &lt;li&gt;&lt;a href=&quot;https://www.documentcloud.org/documents/25979138-frederick-police-departent-24fe000605-redacted/&quot;&gt;Frederick Police Department, Colorado&lt;/a&gt;&lt;/li&gt;
  221. &lt;li&gt;&lt;a href=&quot;https://www.documentcloud.org/documents/25979137-lone-tree-police-department-report-24-3778-redacted/&quot;&gt;Lone Tree Police Department, Colorado&lt;/a&gt;&lt;/li&gt;
  222. &lt;/ul&gt;
  223. &lt;h3&gt;2. Audit Logs&lt;/h3&gt;
  224. &lt;table&gt;
  225.  
  226. &lt;tr&gt;
  227. &lt;td&gt;
  228. &lt;p&gt;&lt;strong&gt;Language to try in your public records request:&lt;/strong&gt;&lt;/p&gt;
  229. &lt;p&gt;Note: You can save time by determining in advance whether the agency uses Axon Evidence or Axon Records and Standards, then choose the applicable option below. If you don&#039;t know, you can always request both.&lt;/p&gt;
  230. &lt;p&gt;&lt;strong&gt;Audit logs from Axon Evidence&lt;/strong&gt;&lt;/p&gt;
  231. &lt;ul&gt;
  232. &lt;li&gt;Audit logs for the period December 1, 2024 through the date this request is received, for the 10 most recently active users. &lt;br /&gt;According to Axon&#039;s online user manual, through Axon Evidence agencies are able to view audit logs of individual officers to ascertain whether they have requested the use of Draft One, signed a Draft One liability disclosure or changed Draft One settings (&lt;a href=&quot;https://my.axon.com/s/article/View-the-audit-trail-in-Axon-Evidence-Draft-One?language=en_US&quot;&gt;https://my.axon.com/s/article/View-the-audit-trail-in-Axon-Evidence-Draft-One?language=en_US&lt;/a&gt;). In order to obtain these audit logs, you may follow the instructions on this Axon page: &lt;a href=&quot;https://my.axon.com/s/article/View-the-audit-trail-in-Axon-Evidence-Draft-One?language=en_US&quot;&gt;https://my.axon.com/s/article/Viewing-a-user-audit-trail?language=en_US&lt;/a&gt;.&lt;br /&gt;In order to produce a list of the 10 most recent active users, you may click the arrow next to &quot;Last Active&quot; then select the most 10 recent. The [...] menu item allows you to export the audit log. We would prefer these audits as .csv files if possible. &lt;br /&gt;Alternatively, if you know the names of specific officers, you can name them rather than selecting the most recent.&lt;/li&gt;
  233. &lt;/ul&gt;
  234. &lt;p&gt;Or&lt;/p&gt;
  235. &lt;p&gt;&lt;strong&gt;Audit logs from Axon Records and Axon Standards&lt;/strong&gt;&lt;/p&gt;
  236. &lt;ul&gt;
  237. &lt;li&gt;According to Axon&#039;s online user manual, through Axon Records and Standards, agencies are able to view audit logs of individual officers to ascertain whether they have requested a Draft One draft or signed a Draft One liability disclosure. https://my.axon.com/s/article/View-the-audit-log-in-Axon-Records-and-Standards-Draft-One?language=en_US&lt;br /&gt;To obtain these logs using the Axon Records Audit Tool, follow these instructions: https://my.axon.com/s/article/Audit-Log-Tool-Axon-Records?language=en_US&lt;br /&gt;a. Audit logs for the period December 1, 2024 through the date this request is received for the first user who comes up when you enter the letter &quot;M&quot; into the audit tool. If no user comes up with M, please try &quot;Mi.&quot; &lt;br /&gt;b. Audit logs for the period December 1, 2024 through the date this request is received for the first user who comes up when you enter the letter &quot;J&quot; into the audit tool. If no user comes up with J, please try &quot;Jo.&quot; &lt;br /&gt;c. Audit logs for the period December 1, 2024 through the date this request is received for the first user who comes up when you enter the letter &quot;S&quot; into the audit tool. If no user comes up with S, please try &quot;Sa.&quot;&lt;/li&gt;
  238. &lt;/ul&gt;
  239. &lt;p&gt;You could also tell the agency you are only interested in Draft One related items, which may save the agency time in reviewing and redacting the documents.&lt;/p&gt;
  240. &lt;/td&gt;
  241. &lt;/tr&gt;
  242.  
  243. &lt;/table&gt;
  244. &lt;p&gt;&lt;span&gt;Generally, many of the basic actions a police officer takes using Axon technology — whether it&#039;s signing in, changing a password, accessing evidence or uploading BWC footage — is logged in the system. &lt;/span&gt;&lt;/p&gt;
  245. &lt;p&gt;&lt;span&gt;This also includes some actions when an officer uses Draft One. However, the system only logs three types of activities: requesting that Draft One generate a report, signing a Draft One liability disclosure, or changing Draft One&#039;s settings. And these reports are one of the only ways to identify which reports were written with AI and how widely the technology is used. &lt;/span&gt;&lt;/p&gt;
  246. &lt;p&gt;&lt;span&gt;Unfortunately, Axon appears to have &lt;/span&gt;&lt;a href=&quot;https://www.documentcloud.org/documents/25979141-frederick-police-deparmtent-email-re-media-request/?mode=document#document/p4&quot;&gt;&lt;span&gt;designed its system&lt;/span&gt;&lt;/a&gt;&lt;span&gt; so that administrators cannot create a list of all Draft One activities taken by the entire police force. Instead, all they can do is view an individual officer&#039;s audit log to see when they used Draft One or look at the log for a particular piece of evidence to see if Draft One was used. These can be exported as a spreadsheet or a PDF. (When the Frederick Police Department asked Axon how to create a list of Draft One reports, the Axon rep &lt;/span&gt;&lt;a href=&quot;https://www.documentcloud.org/documents/25979141-frederick-police-deparmtent-email-re-media-request/?mode=document#document/p4&quot;&gt;&lt;span&gt;told&lt;/span&gt;&lt;/a&gt;&lt;span&gt; them that feature wasn&#039;t available and they would have to follow the above method. &quot;To set expectations, it’s not going to be graceful, but this wasn’t a scenario we anticipated needing to make easy,&quot; Axon wrote in August 2024, then suggested it might come up with a long-term solution. We emailed Axon back in March to see if this was still the case, but they did not provide a response.) &lt;/span&gt;&lt;/p&gt;
  247. &lt;p&gt;&lt;span&gt;Here&#039;s an excerpt from a PDF version from the &lt;/span&gt;&lt;a href=&quot;https://www.documentcloud.org/projects/221792-bishop-police-department-axon-draft-one-records/&quot;&gt;&lt;span&gt;Bishop Police Department&lt;/span&gt;&lt;/a&gt;&lt;span&gt; in California:&lt;/span&gt;&lt;/p&gt;
  248. &lt;p class=&quot;center-image&quot;&gt;&lt;span&gt;&lt;img src=&quot;/files/2025/07/07/image7.png&quot; width=&quot;629&quot; height=&quot;693&quot; alt=&quot;A document titled &amp;quot;Audit Trail&amp;quot; for user Brian Honenstein that has entries on February 6, 2025 for &amp;quot;Draft One Request Received&amp;quot; and &amp;quot;Signed for a Draft One Liability Disclosure&amp;quot;&quot; title=&quot;A document titled &amp;quot;Audit Trail&amp;quot; for user Brian Honenstein that has entries on February 6, 2025 for &amp;quot;Draft One Request Received&amp;quot; and &amp;quot;Signed for a Draft One Liability Disclosure&amp;quot;&quot; /&gt;&lt;/span&gt;&lt;/p&gt;
  249. &lt;p&gt;&lt;span&gt;Here are some additional audit log examples: &lt;/span&gt;&lt;/p&gt;
  250. &lt;ul&gt;
  251. &lt;li&gt;&lt;a href=&quot;https://www.muckrock.com/foi/campbell-3137/axon-draft-one-reports-audit-logs-and-settings-campbell-police-department-183078/#files&quot;&gt;Campbell Police Department, California&lt;/a&gt; (XLSX)&lt;/li&gt;
  252. &lt;li&gt;&lt;a href=&quot;https://www.muckrock.com/foi/lafayette-12781/axon-draft-one-reports-audit-logs-and-settings-lafayette-police-department-183103/#files&quot;&gt;Lafayette Police Department, Indiana&lt;/a&gt; (XLSX)&lt;/li&gt;
  253. &lt;li&gt;&lt;a href=&quot;https://www.documentcloud.org/projects/221986-bishop-police-department-axon-draft-one-audit-logs/&quot;&gt;Bishop Police Department, California&lt;/a&gt; (PDF)&lt;/li&gt;
  254. &lt;li&gt;&lt;a href=&quot;https://www.muckrock.com/foi/pasco-8475/axon-draft-one-reports-audit-logs-and-settings-pasco-police-department-183107/#files&quot;&gt;Pasco Police Department, Washington&lt;/a&gt; (CSV)&lt;/li&gt;
  255. &lt;/ul&gt;
  256. &lt;p&gt;&lt;span&gt;If you know the name of an individual officer, you can try to request their audit logs to see if they used Draft One. Since we didn&#039;t have a particular officer in mind, we had to get creative. &lt;/span&gt;&lt;/p&gt;
  257. &lt;p&gt;&lt;span&gt;An agency may manage their documents with one of a few different Axon offerings: Axon Evidence, Axon Records, or Axon Standards. The process for requesting records is slightly different depending on which one is used. We dug through the user manuals and came up with a few ways to export a random(ish) example. We also linked the manuals and gave clear instructions for the records officers.&lt;/span&gt;&lt;/p&gt;
  258. &lt;p&gt;&lt;span&gt;With Axon Evidence, an administrator can simply sort the system to show the 10 most recent users then export their usage logs. With Axon Records/Standard, the administrator has to start typing in a name and then it auto-populates with suggestions. So, we ask them to export the audit logs for the first few users who came up when they typed the letters M, J, and S into the search (since those letters are common at the beginning of names). &lt;/span&gt;&lt;/p&gt;
  259. &lt;p&gt;&lt;span&gt;&lt;span&gt;Unfortunately, this method is a little bit of a gamble. Many officers still aren&#039;t using Draft One, so you may end up with hundreds of pages of logs that don&#039;t mention Draft One at all (as was the case with the &lt;/span&gt;&lt;a href=&quot;https://www.documentcloud.org/documents/25976993-25-0888redacted-redacted/&quot;&gt;&lt;span&gt;records&lt;/span&gt;&lt;/a&gt;&lt;span&gt; we received from Monroe County, NY). &lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
  260. &lt;h3&gt;&lt;span&gt;&lt;span&gt;3. Settings&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;
  261. &lt;table&gt;
  262.  
  263. &lt;tr&gt;
  264. &lt;td&gt;
  265. &lt;p&gt;&lt;span&gt;&lt;strong&gt;Language to try in your public records request: &lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;
  266. &lt;ul&gt;
  267. &lt;li&gt;A copy of all settings and configurations made by this agency in its use of the Axon Draft One platform, including all opt-in features that the department has elected to use and the incident types for which the software can be used. A screen capture of these settings will suffice.&lt;/li&gt;
  268. &lt;/ul&gt;
  269. &lt;/td&gt;
  270. &lt;/tr&gt;
  271.  
  272. &lt;/table&gt;
  273. &lt;p&gt;&lt;span&gt;We knew the Draft One system offers department managers the option to customize how it can be used, including the categories of crime for which reports can be generated and whether or not there is a disclaimer automatically added to the bottom of the report disclosing the use of AI in its generation. So we asked for a copy of these settings and configurations. In some cases, agencies claimed this was exempted from their public records laws, while other agencies did provide the information. &lt;/span&gt;&lt;a href=&quot;https://www.documentcloud.org/documents/25979291-campbell-pd-draft-one-settings/&quot;&gt;&lt;span&gt;Here&lt;/span&gt;&lt;/a&gt;&lt;span&gt; is an example from the Campbell Police Department in California: &lt;/span&gt;&lt;/p&gt;
  274. &lt;p class=&quot;center-image&quot;&gt;&lt;span&gt;&lt;img src=&quot;/files/2025/07/07/image11.png&quot; width=&quot;780&quot; height=&quot;815&quot; alt=&quot;A screengrab of the settings menu within Draft One, with &amp;quot;Default acknowledgement,&amp;quot; &amp;quot;Narration as input for Draft One, and &amp;quot;Default Footer&amp;quot; selected.&quot; title=&quot;A screengrab of the settings menu within Draft One, with &amp;quot;Default acknowledgement,&amp;quot; &amp;quot;Narration as input for Draft One, and &amp;quot;Default Footer&amp;quot; selected.&quot; /&gt;&lt;/span&gt;&lt;/p&gt;
  275. &lt;p&gt;&lt;span&gt;(It&#039;s worth noting that while Campbell does require each police report to contain a disclosure that Draft One was used, the California Public Records Act exempts police reports from being released.)&lt;/span&gt;&lt;/p&gt;
  276. &lt;p&gt;&lt;span&gt;Examples of settings: &lt;/span&gt;&lt;/p&gt;
  277. &lt;ul&gt;
  278. &lt;li&gt;&lt;a href=&quot;https://www.documentcloud.org/documents/25984492-bishop-draft-one-settings-png/&quot;&gt;&lt;span&gt;Bishop Police Department, California&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
  279. &lt;li&gt;&lt;a href=&quot;https://www.documentcloud.org/documents/25979291-campbell-pd-draft-one-settings/&quot;&gt;&lt;span&gt;Campbell Police Department, California &lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
  280. &lt;li&gt;&lt;a href=&quot;https://www.documentcloud.org/documents/25984484-pasco-police-draft-one-settings/&quot;&gt;&lt;span&gt;Pasco Police Department, Washington&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
  281. &lt;/ul&gt;
  282. &lt;h3&gt;4. Procurement-related Documents and Agreements&lt;/h3&gt;
  283. &lt;table&gt;
  284.  
  285. &lt;tr&gt;
  286. &lt;td&gt;
  287. &lt;p&gt;&lt;strong&gt;Language to try in your public records request:&lt;/strong&gt;&lt;/p&gt;
  288. &lt;ul&gt;
  289. &lt;li&gt;All contracts, memorandums of understanding, and any other written agreements between this agency and Axon related to the use of Draft One, Narrative Assistant, or any other AI-assisted report generation tool provided by Axon. Responsive records include all associated amendments, exhibits, and supplemental and supporting documentation, as well as all relevant terms of use, licensing agreements, and any other guiding materials. If access to Draft One or similar tools is being provided via an existing contract or through an informal agreement, please provide the relevant contract or the relevant communication or agreement that facilitated the access. This includes all agreements, both formal and informal, including all trial access, even if that access does not or did not involve financial obligations.&lt;/li&gt;
  290. &lt;/ul&gt;
  291. &lt;/td&gt;
  292. &lt;/tr&gt;
  293.  
  294. &lt;/table&gt;
  295. &lt;p&gt;&lt;span&gt;It can be helpful to know how much Draft One costs, how many user licenses the agency paid for, and what the terms of the agreement are. That information is often contained in records related to the contracting process. Agencies will often provide these records with minimal pushback or redactions. Many of these records may already be online, so a requester can save time and effort by looking around first. These are often found in city council agenda packets. Also, law enforcement agencies often will bump these requests to the city or county clerk instead. &lt;/span&gt;&lt;/p&gt;
  296. &lt;p&gt;&lt;span&gt;Here&#039;s an excerpt from the&lt;a href=&quot;https://www.documentcloud.org/documents/25976635-25-0949-packet/&quot;&gt; Monroe County Sheriff&#039;s Office&lt;/a&gt; in New York:&lt;/span&gt;&lt;/p&gt;
  297. &lt;p class=&quot;center-image&quot;&gt;&lt;span&gt;&lt;img src=&quot;/files/2025/07/07/image9.png&quot; width=&quot;701&quot; height=&quot;777&quot; alt=&quot;An Axon purchasing agreement indicating the agency is adding Draft One to its existing suite of services. &quot; title=&quot;An Axon purchasing agreement indicating the agency is adding Draft One to its existing suite of services. &quot; /&gt;&lt;/span&gt;&lt;/p&gt;
  298. &lt;p&gt;&lt;span&gt;These kinds of procurement records describe the nature and cost of the relationship between the police department and the company. They can be very helpful for understanding how much a continuing service subscription will cost and what else was bundled in as part of the purchase. Draft One, so far, is often accessed as an additional feature along with other Axon products.  &lt;/span&gt;&lt;/p&gt;
  299. &lt;p&gt;We received too many documents to list them all, but &lt;a href=&quot;https://www.documentcloud.org/documents/25976599-111224-bwc-contract-dacono-signed-cora/&quot;&gt;here&lt;/a&gt; is a representative example of some of the other documents you might receive, courtesy of the Dacono Police Department in Colorado.&lt;/p&gt;
  300. &lt;h3&gt;&lt;span&gt;5. Training, Manuals and Policies&lt;/span&gt;&lt;/h3&gt;
  301. &lt;table&gt;
  302.  
  303. &lt;tr&gt;
  304. &lt;td&gt;
  305. &lt;p&gt;All training materials relevant to Draft One or Axon Narrative Assistant generated by this agency, including but not limited to:&lt;/p&gt;
  306. &lt;ul&gt;
  307. &lt;li&gt;All training material provided by Axon to this agency regarding its use of Draft One;&lt;/li&gt;
  308. &lt;li&gt;All internal training materials regarding the use of Draft One;&lt;/li&gt;
  309. &lt;li&gt;All user manuals, other guidance materials, help documents, or related materials;&lt;/li&gt;
  310. &lt;li&gt;Guides, safety tests, and other supplementary material that mention Draft One provided by Axon from January 1, 2024 and the date this request is received;&lt;/li&gt;
  311. &lt;li&gt;Any and all policies and general orders related to the use of Draft One, the Narrative Assistant, or any other AI-assisted report generation offerings provided by Axon (An example of one such policy can be found here: &lt;a href=&quot;https://cdn.muckrock.com/foia_files/2024/11/26/608_Computer_Software_and_Transcription-Assisted_Report_Generation.pdf&quot;&gt;https://cdn.muckrock.com/foia_files/2024/11/26/608_Computer_Software_and_Transcription-Assisted_Report_Generation.pdf&lt;/a&gt;).&lt;/li&gt;
  312. &lt;/ul&gt;
  313. &lt;/td&gt;
  314. &lt;/tr&gt;
  315.  
  316. &lt;/table&gt;
  317. &lt;p&gt;&lt;span&gt;In addition to seeing when Draft One was used and how it was acquired, it can be helpful to know what rules officers must follow, what directions they&#039;re given for using it, and what features are available to users. That&#039;s where manuals, policies and training materials come in handy. &lt;/span&gt;&lt;/p&gt;
  318. &lt;p&gt;&lt;span&gt;User manuals are typically going to come from Axon itself. In general, if you can get your hands on one, this will help you to better understand the mechanisms of the system, and it will help you align the way you craft your request with the way the system actually works. Luckily, Axon has published many of the materials &lt;/span&gt;&lt;a href=&quot;https://my.axon.com/s/draft-one?language=en_US&quot;&gt;&lt;span&gt;online&lt;/span&gt;&lt;/a&gt;&lt;span&gt; and we&#039;ve already obtained the user manual from multiple agencies. However, Axon does update the manual from time to time, so it can be helpful to know which version the agency is working from. &lt;/span&gt;&lt;/p&gt;
  319. &lt;p&gt;&lt;span&gt;Here&#039;s one from December 2024:&lt;/span&gt;&lt;/p&gt;
  320. &lt;ul&gt;
  321. &lt;li&gt;
  322. &lt;p&gt;&lt;a href=&quot;https://www.documentcloud.org/documents/25973560-dacono-police-department-axon-draft-one-user-guide/&quot;&gt;Dacono Police Department - Axon Draft One User Guide&lt;/a&gt;&lt;/p&gt;
  323. &lt;/li&gt;
  324. &lt;/ul&gt;
  325. &lt;p&gt;&lt;span&gt;Policies are internal police department guidance for using Draft One. Not all agencies have developed a policy, but the ones they do have may reveal useful information, such as other records you might be able to request. Here are some examples: &lt;/span&gt;&lt;/p&gt;
  326. &lt;ul&gt;
  327. &lt;li&gt;&lt;a href=&quot;https://www.documentcloud.org/documents/25972395-palm-beach-county-sheriffs-office-axon-draft-one-general-order/&quot;&gt;Palm Beach County Sheriff&#039;s Office General Order 563 - Axon Draft One&lt;/a&gt;&lt;/li&gt;
  328. &lt;li&gt;&lt;a href=&quot;https://www.documentcloud.org/documents/25972391-colorado-springs-police-department-general-order-1904-use-of-specialized-axon-system/&quot;&gt;Colorado Springs Police Department General Order 1904 - Use of Specialized Axon System&lt;/a&gt;&lt;/li&gt;
  329. &lt;li&gt;&lt;a href=&quot;https://www.documentcloud.org/documents/25972390-lake-havasu-police-department-report-preparation/&quot;&gt;Lake Havasu Police Department Policy 342 - Report Preparation&lt;/a&gt;&lt;/li&gt;
  330. &lt;li&gt;&lt;a href=&quot;https://www.documentcloud.org/documents/25972389-campbell-police-department-report-preparation/&quot;&gt;Campbell Police Department Policy 344 - Report Preparation&lt;/a&gt;&lt;/li&gt;
  331. &lt;li&gt;&lt;a href=&quot;https://www.lafayette.in.gov/DocumentCenter/View/18516/2025-Policy-Manualpdf#page=186&amp;amp;zoom=auto,-129,760&quot;&gt;Lafayette Police Department Policy 608 - Computer Software and Transcription-Assisted Report Generation&lt;/a&gt;&lt;/li&gt;
  332. &lt;/ul&gt;
  333. &lt;p&gt;&lt;span&gt;Training and user manuals also might reveal crucial information about how the technology is used. In some cases these documents are provided by Axon to the customer. These records may illuminate the specific direction that departments are emphasizing about using the product. &lt;/span&gt;&lt;/p&gt;
  334. &lt;p class=&quot;center-image&quot;&gt;&lt;span&gt;&lt;img src=&quot;/files/2025/07/07/image5.png&quot; width=&quot;1476&quot; height=&quot;826&quot; alt=&quot; &amp;quot;A Dummies Guide to AI in Police Report Writing&amp;quot; from the Pasco Police Department&quot; title=&quot; &amp;quot;A Dummies Guide to AI in Police Report Writing&amp;quot; from the Pasco Police Department&quot; /&gt;&lt;/span&gt;&lt;/p&gt;
  335. &lt;p&gt;&lt;span&gt;Here are a few examples of training presentations:&lt;/span&gt;&lt;/p&gt;
  336. &lt;ul&gt;
  337. &lt;li&gt;&lt;a href=&quot;https://www.documentcloud.org/documents/25972388-colorado-springs-police-department-2025-q1-draft-one-training/&quot;&gt;Colorado Springs Police Department 2025-Q1-Draft-One-Training&lt;/a&gt;&lt;/li&gt;
  338. &lt;li&gt;&lt;a href=&quot;https://www.documentcloud.org/documents/25972394-palm-beach-county-sheriffs-pffice-axon-draft-one-training-material/&quot;&gt;Palm Beach County Sheriff&#039;s Office - Axon Draft One Training Material&lt;/a&gt;&lt;/li&gt;
  339. &lt;li&gt;&lt;a href=&quot;https://www.documentcloud.org/documents/25976921-pasco-police-department-2024-axon-draft-one-presentation/&quot;&gt;Pasco Police Department - Axon Draft One Presentation&lt;/a&gt;&lt;/li&gt;
  340. &lt;/ul&gt;
  341. &lt;h3&gt;&lt;span&gt; 6. Evaluations&lt;/span&gt;&lt;/h3&gt;
  342. &lt;table&gt;
  343.  
  344. &lt;tr&gt;
  345. &lt;td&gt;
  346. &lt;p&gt;&lt;span&gt;&lt;strong&gt;Language to try in your public records request:&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;
  347. &lt;ul&gt;
  348. &lt;li&gt;All final reports, evaluations, reports, or other documentation concluding or summarizing a trial or evaluation period or pilot project&lt;/li&gt;
  349. &lt;/ul&gt;
  350. &lt;/td&gt;
  351. &lt;/tr&gt;
  352.  
  353. &lt;/table&gt;
  354. &lt;p&gt;&lt;span&gt;Many departments are getting access to Draft One as part of a trial or pilot program. The outcome of those experiments with the product can be eye-opening or eyebrow-raising. There might also be additional data or a formal report that reviews what the department was hoping to get from the experience, how they structured any evaluation of its time-saving value for the department, and other details about how officers did or did not use Draft One. &lt;/span&gt;&lt;/p&gt;
  355. &lt;p&gt;&lt;span&gt;Here are some examples we received: &lt;/span&gt;&lt;/p&gt;
  356. &lt;ul&gt;
  357. &lt;li&gt;&lt;a href=&quot;https://www.documentcloud.org/documents/25973591-lake-havasu-police-department-draft-one-report-redacted-2/&quot;&gt;The Effect of Artificial Intelligence has on Time Spent Writing Reports: An analysis of data from the Lake Havasu City Police Department&lt;/a&gt;&lt;/li&gt;
  358. &lt;li&gt;&lt;a href=&quot;https://www.eff.org/files/2025/06/16/colorado_springs_police_department_-_axon_draft_one_user_data.zip&quot;&gt;Colorado Springs Police Department: Spreadsheets measuring amount of time officers spent writing reports versus using Draft One&lt;/a&gt; (zip) &lt;/li&gt;
  359. &lt;/ul&gt;
  360. &lt;h3&gt;7. Communications&lt;/h3&gt;
  361. &lt;table&gt;
  362.  
  363. &lt;tr&gt;
  364. &lt;td&gt;
  365. &lt;p&gt;&lt;span&gt;&lt;strong&gt;Language to try in your public records request:&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;
  366. &lt;p&gt;• All communications sent or received by any representative of this agency with individuals representing Axon referencing the following term, including emails and attachments:&lt;/p&gt;
  367. &lt;ul&gt;
  368. &lt;li&gt;Draft One&lt;/li&gt;
  369. &lt;li&gt;Narrative Assistant&lt;/li&gt;
  370. &lt;li&gt;AI-generated report&lt;/li&gt;
  371. &lt;/ul&gt;
  372. &lt;p&gt;• All communications sent to or received by any representative of this agency with each of the following email addresses, including attachments:&lt;/p&gt;
  373. &lt;ul&gt;
  374. &lt;li&gt;[INSERT EMAIL ADDRESSES]&lt;/li&gt;
  375. &lt;/ul&gt;
  376. &lt;p&gt;Note: We are not including the specific email addresses here that we used, since they are subject to change when employees are hired, promoted, or find new gigs. However, you can find the emails we used in our &lt;a href=&quot;https://www.muckrock.com/foi/pasco-8475/axon-draft-one-records-pasco-police-department-182898/#comms&quot;&gt;requests&lt;/a&gt; on MuckRock.&lt;/p&gt;
  377. &lt;/td&gt;
  378. &lt;/tr&gt;
  379.  
  380. &lt;/table&gt;
  381. &lt;p&gt;&lt;span&gt;The communications we wanted were primarily the emails between Axon and the law enforcement agency. As you can imagine, these emails could reveal the back-and-forth between the company and its potential customers, and these conversations could include the marketing pitch made to the department, the questions and problems police may have had with it, and more. &lt;/span&gt;&lt;/p&gt;
  382. &lt;p&gt;&lt;span&gt;In some cases, these emails reveal cozy relationships between salespeople and law enforcement officials. Take, for example, this &lt;/span&gt;&lt;a href=&quot;http://www.documentcloud.org/documents/25976460-dickinson-police-department-emails-with-axon/&quot;&gt;&lt;span&gt;email exchange&lt;/span&gt;&lt;/a&gt;&lt;span&gt; between the Dickinson Police Department and an Axon rep: &lt;/span&gt;&lt;/p&gt;
  383. &lt;p class=&quot;center-image&quot;&gt;&lt;span&gt;&lt;img src=&quot;/files/2025/07/07/image6.png&quot; width=&quot;820&quot; height=&quot;1016&quot; alt=&quot;An email exchange in which a Dickinson Police officer invites an Axon rep to a golf tournament, and the Axon rep calls him &amp;quot;brother.&amp;quot;&quot; title=&quot;An email exchange in which a Dickinson Police officer invites an Axon rep to a golf tournament, and the Axon rep calls him &amp;quot;brother.&amp;quot;&quot; /&gt;&lt;/span&gt;&lt;/p&gt;
  384. &lt;p&gt;&lt;span&gt;&lt;span&gt;Or this &lt;/span&gt;&lt;a href=&quot;https://www.documentcloud.org/documents/25979172-frederick-police-department-re-draft-one-guardrails-issue/&quot;&gt;&lt;span&gt;email&lt;/span&gt;&lt;/a&gt;&lt;span&gt; between a Frederick Police Department sergeant and an Axon representative, in which a sergeant describes himself as &quot;doing sales&quot; for Axon by providing demos to other agencies. &lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
  385. &lt;p class=&quot;center-image&quot;&gt;&lt;span&gt;&lt;span&gt;&lt;img src=&quot;/files/2025/07/07/image8.png&quot; width=&quot;1098&quot; height=&quot;496&quot; alt=&quot;An email from a Frederick Police Officer to an Axon rep. &quot; title=&quot;An email from a Frederick Police Officer to an Axon rep. &quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
  386. &lt;p class=&quot;center-image&quot;&gt;&lt;i&gt;&lt;span&gt;A machine readable text version of this email is available &lt;a href=&quot;https://www.documentcloud.org/documents/25979172-frederick-police-department-re-draft-one-guardrails-issue/?mode=text&quot;&gt;here&lt;/a&gt;.&lt;/span&gt;&lt;/i&gt;&lt;/p&gt;
  387. &lt;p&gt;&lt;span&gt;Emails like this also show what other agencies are considering using Draft One in the future. For example, in this &lt;/span&gt;&lt;a href=&quot;https://www.documentcloud.org/documents/25976571-campbell-police-department-email-axon-draft-one-materials-sfpd-r-1/&quot;&gt;&lt;span&gt;email&lt;/span&gt;&lt;/a&gt;&lt;span&gt; we received from the Campbell Police Department shows that the San Francisco Police Department was testing Draft One as early as October 2024 (the usage was confirmed in June 2025 by the &lt;/span&gt;&lt;a href=&quot;https://sfstandard.com/2025/06/10/sfpd-using-ai-police-reports/&quot;&gt;&lt;i&gt;&lt;span&gt;San Francisco Standard&lt;/span&gt;&lt;/i&gt;&lt;/a&gt;&lt;i&gt;&lt;span&gt;)&lt;/span&gt;&lt;/i&gt;&lt;span&gt;.&lt;/span&gt;&lt;/p&gt;
  388. &lt;p class=&quot;center-image&quot;&gt;&lt;span&gt; &lt;img src=&quot;/files/2025/07/07/image1.png&quot; width=&quot;761&quot; height=&quot;721&quot; alt=&quot;An SFPD email asking for advice on using Draft One.&quot; title=&quot;An SFPD email asking for advice on using Draft One.&quot; /&gt;&lt;/span&gt;&lt;/p&gt;
  389. &lt;p class=&quot;center-image&quot;&gt;&lt;i&gt;&lt;i&gt;&lt;span&gt;A machine readable text version of this email is available &lt;/span&gt;&lt;/i&gt;&lt;a href=&quot;https://www.documentcloud.org/documents/25976571-campbell-police-department-email-axon-draft-one-materials-sfpd-r-1/?mode=text&quot;&gt;&lt;i&gt;&lt;span&gt;here&lt;/span&gt;&lt;/i&gt;&lt;/a&gt;&lt;i&gt;&lt;span&gt;.&lt;/span&gt;&lt;/i&gt;&lt;/i&gt;&lt;/p&gt;
  390. &lt;p&gt;Your mileage will certainly vary for these email requests, in part because the ability for agencies to search their communications can vary. Some agencies can search by a keyword like &quot;Draft One” or &quot;Axon&quot; and while other agencies can only search by the specific email address. &lt;/p&gt;
  391. &lt;p&gt;Communications can be one of the more expensive parts of the request. We&#039;ve found that adding a date range and key terms or email addresses has helped limit these costs and made our requests a bit clearer for the agency. Axon sends a lot of automated emails to its subscribers, so the agency may quote a large fee for hundreds or thousands of emails that aren&#039;t particularly interesting. Many agencies respond positively if a requester reaches out to say they&#039;re open to narrowing or focusing their request. &lt;/p&gt;
  392. &lt;h3&gt;Asking for Body-Worn Camera Footage &lt;/h3&gt;
  393. &lt;p&gt;One of the big questions is how do the Draft One-generated reports compare to the BWC audio the narrative is based on? Are the reports accurate? Are they twisting people&#039;s words? Does Draft One hallucinate?&lt;/p&gt;
  394. &lt;p&gt;Finding these answers requires both obtaining the police report and the footage of the incident that was fed into the system. The laws and process for obtaining BWC footage vary dramatically state to state, and even department to department. Depending on where you live, it can also get expensive very quickly, since some states allow agencies to charge you not only for the footage but the time it takes to redact the footage. So before requesting footage, read up on your state’s public access laws or consult a lawyer.&lt;/p&gt;
  395. &lt;p&gt;However, once you have a copy of a Draft One report, you should have enough information to file a follow-up request for the BWC footage. &lt;/p&gt;
  396. &lt;p&gt;So far, EFF has not requested BWC footage. In addition to the aforementioned financial and legal hurdles, the footage can implicate both individual privacy and transparency regarding police activity. As an organization that advocates for both, we want to make sure we get this balance right. Afterall, BWCs are a surveillance technology that collects intelligence on suspects, victims, witnesses, and random passersby. When the Palm Beach County Sheriff&#039;s Office gave us an AI-generated account of a teenager being hospitalized for suicidal ideations, we of course felt that the minor&#039;s privacy outweighed our interest in evaluating the AI. But do we feel the same way about a Draft One-generated narrative about a spring break brawl in Lake Havasu? &lt;/p&gt;
  397. &lt;p&gt;Ultimately, we may try to obtain a limited amount of BWC footage, but we also recognize that we shouldn&#039;t make the public wait while we work it out for ourselves. Accountability requires different methods, different expertise, and different interests, and with this guide we hope to not only shine light on Draft One, but to provide the schematics for others–including academics, journalists, and local advocates–to build their own spotlights to expose police use of this problematic technology.&lt;/p&gt;
  398. &lt;h3&gt;Where to Find More Docs &lt;/h3&gt;
  399. &lt;p&gt;Despite the variation in how agencies responded, we did have some requests that proved fruitful. You can find these requests and the documents we got via the linked police department names below.&lt;/p&gt;
  400. &lt;p&gt;Please note that we filed two different types of requests, so not all the elements above may be represented in each link.&lt;/p&gt;
  401. &lt;p&gt;&lt;b&gt;Via Document Cloud (PDFs)&lt;/b&gt;&lt;/p&gt;
  402. &lt;ul&gt;
  403. &lt;li&gt;&lt;a href=&quot;https://www.documentcloud.org/projects/221787-dacono-police-department-axon-draft-one-records/&quot;&gt;Dacono Police Department, Colorado&lt;/a&gt;&lt;/li&gt;
  404. &lt;li&gt;&lt;a href=&quot;https://www.documentcloud.org/projects/221788-mount-vernon-police-department-axon-draft-one-records/&quot;&gt;Mount Vernon Police Department, Illinois&lt;/a&gt;&lt;/li&gt;
  405. &lt;li&gt;&lt;a href=&quot;https://www.documentcloud.org/projects/221789-monroe-county-sheriff-draft-one-records/&quot;&gt;Monroe County Sheriff&#039;s Office, New York&lt;/a&gt;&lt;/li&gt;
  406. &lt;li&gt;&lt;a href=&quot;https://www.documentcloud.org/projects/221790-joliet-police-department-axon-draft-one-records/&quot;&gt;Joliet Police Department, Illinois&lt;/a&gt;&lt;/li&gt;
  407. &lt;li&gt;&lt;a href=&quot;https://www.documentcloud.org/projects/221791-elgin-police-department-axon-draft-one-records/&quot;&gt;Elgin Police Department, Illinois&lt;/a&gt;&lt;/li&gt;
  408. &lt;li&gt;&lt;a href=&quot;https://www.documentcloud.org/projects/221792-bishop-police-department-axon-draft-one-records/&quot;&gt;Bishop Police Department, California&lt;/a&gt;&lt;/li&gt;
  409. &lt;li&gt;&lt;a href=&quot;https://www.documentcloud.org/projects/221784-palm-beach-county-sheriffs-office-draft-one-reports-redacted/&quot;&gt;Palm Beach County Sheriff&#039;s Office&lt;/a&gt;&lt;/li&gt;
  410. &lt;li&gt;&lt;a href=&quot;https://www.documentcloud.org/projects/221775-lake-havasu-city-police-department-draft-one-report-redacted/&quot;&gt;Lake Havasu City Police Department, Arizona&lt;/a&gt;&lt;/li&gt;
  411. &lt;li&gt;&lt;a href=&quot;https://www.documentcloud.org/documents/25976460-dickinson-police-department-emails-with-axon/&quot;&gt;Dickinson Police Department, ND&lt;/a&gt; &lt;/li&gt;
  412. &lt;li&gt;&lt;a href=&quot;https://www.documentcloud.org/projects/221800-firestone-police-department-axon-draft-one-records/&quot;&gt;Firestone Police Department, Colo.&lt;/a&gt;&lt;/li&gt;
  413. &lt;li&gt;Frederick Police Department (&lt;a href=&quot;https://www.documentcloud.org/projects/221983-frederick-pd-draft-one-emails/&quot;&gt;DocumentCloud&lt;/a&gt; and &lt;a href=&quot;https://drive.google.com/drive/folders/1dkjyEDanznxVV8Q0Ihq1oNgx-WPUwVQE?usp=sharing&quot;&gt;Google Drive&lt;/a&gt;. Frederick provided us a large number of emails in a difficult-to-manage PST format. We unpacked that PST into individual EML files. Because the agency did a keyword search, you may find that some of the emails are not relevant to the issue, but do include the term &quot;draft one.&quot;  To reduce the noise, we removed emails that were generated prior to the existence of Draft One. We also removed emails that contained police reports with PII. We redacted those reports and &lt;a href=&quot;https://www.documentcloud.org/documents/25979138-frederick-police-departent-24fe000605-redacted/&quot;&gt;uploaded&lt;/a&gt; &lt;a href=&quot;https://www.documentcloud.org/documents/25979137-lone-tree-police-department-report-24-3778-redacted/&quot;&gt;them&lt;/a&gt; independently. While Document Cloud allowed us to convert EML files to PDF files, it did not allow us to keep the relationship between the emails and attachments. You can find those records with the relationships somewhat maintained in Google Drive.)&lt;/li&gt;
  414. &lt;/ul&gt;
  415. &lt;p&gt;&lt;b&gt;Via MuckRock (Assorted filetypes)&lt;/b&gt;&lt;/p&gt;
  416. &lt;ul&gt;
  417. &lt;li&gt;Pasco Police Department, Washington (&lt;a href=&quot;https://www.muckrock.com/foi/pasco-8475/axon-draft-one-records-pasco-police-department-182898/#files&quot;&gt;Part 1&lt;/a&gt;,&lt;a href=&quot;https://www.muckrock.com/foi/pasco-8475/axon-draft-one-reports-audit-logs-and-settings-pasco-police-department-183107/#&quot;&gt; Part 2&lt;/a&gt;)&lt;/li&gt;
  418. &lt;li&gt;&lt;a href=&quot;https://www.muckrock.com/foi/colorado-springs-5791/axon-draft-one-records-colorado-springs-police-department-182890/#files&quot;&gt;Colorado Springs Police Department, Colorado&lt;/a&gt;&lt;/li&gt;
  419. &lt;li&gt;&lt;a href=&quot;https://www.muckrock.com/foi/fort-collins-5829/axon-draft-one-records-city-of-fort-collins-police-department-182897/#comms&quot;&gt;Fort Collins Police Department, Colorado&lt;/a&gt;&lt;/li&gt;
  420. &lt;li&gt;Campbell Police Department, California (&lt;a href=&quot;https://www.muckrock.com/foi/campbell-3137/axon-draft-one-records-campbell-police-department-182886/&quot;&gt;Part 1&lt;/a&gt;, &lt;a href=&quot;https://www.muckrock.com/foi/campbell-3137/axon-draft-one-reports-audit-logs-and-settings-campbell-police-department-183078/&quot;&gt;Part 2&lt;/a&gt;)&lt;/li&gt;
  421. &lt;li&gt;&lt;a href=&quot;https://www.muckrock.com/foi/lafayette-12781/axon-draft-one-reports-audit-logs-and-settings-lafayette-police-department-183103/&quot;&gt;Lafayette Police Department, Indiana&lt;/a&gt;&lt;/li&gt;
  422. &lt;li&gt;&lt;a href=&quot;https://www.muckrock.com/foi/east-palo-alto-3194/axon-draft-one-records-east-palo-alto-police-department-182883/#comms&quot;&gt;East Palo Alto Police Department, California&lt;/a&gt;&lt;/li&gt;
  423. &lt;/ul&gt;
  424. &lt;p&gt;Special credit goes to EFF Research Assistant Jesse Cabrera for public records request coordination. &lt;/p&gt;
  425.  
  426. &lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
  427.     <pubDate>Thu, 10 Jul 2025 16:00:24 +0000</pubDate>
  428. <guid isPermaLink="false">110870 at https://www.eff.org</guid>
  429. <dc:creator>Dave Maass</dc:creator>
  430. <dc:creator>Beryl Lipton</dc:creator>
  431. <enclosure url="https://www.eff.org/files/banner_library/robot-robot-1.png" alt="a robot writing a police report " type="image/png" length="46848" />
  432.  </item>
  433.  <item>
  434.    <title>It&#039;s EFF&#039;s 35th Anniversary (And We&#039;re Just Getting Started)</title>
  435.    <link>https://www.eff.org/deeplinks/2025/07/its-effs-35th-anniversary-and-were-just-getting-started</link>
  436.    <description>&lt;div class=&quot;field field--name-body field--type-text-with-summary field--label-hidden&quot;&gt;&lt;div class=&quot;field__items&quot;&gt;&lt;div class=&quot;field__item even&quot;&gt;&lt;p&gt;&lt;a href=&quot;https://www.eff.org/35&quot;&gt;Today we celebrate 35 years of EFF&lt;/a&gt; bearing the torch for digital rights against the darkness of the world, and I couldn’t be prouder. EFF was founded at a time when governments were hostile toward technology and clueless about how it would shape your life. While threats from state and commercial forces grew alongside the internet, so too did EFF’s expertise. Our mission has become even larger than pushing back on government ignorance and increasingly dangerous corporate power. In this moment, we&#039;re doing our part to preserve the necessities of democracy: privacy, free expression, and due process. It&#039;s about guarding the security of our society, along with our loved ones and the vulnerable communities around us.&lt;/p&gt;
  437. &lt;p&gt;&lt;a href=&quot;https://eff.org/r.l8mw&quot;&gt;With the support of EFF’s members&lt;/a&gt;, we use law, technology, and activism to create the conditions for human rights and civil liberties to flourish, and for repression to fail.&lt;/p&gt;
  438. &lt;p class=&quot;pull-quote&quot;&gt;In this moment, we&#039;re doing our part to preserve the necessities of democracy: privacy, free expression, and due process.&lt;/p&gt;
  439. &lt;p&gt;EFF believes in commonsense freedom and fairness. We’re working toward an environment where your technology works the way you want it to; you can move through the world without the threat of surveillance; and you can have private conversations with the people you care about and support the causes you believe in. We’ve won many fights for encryption, free expression, innovation, and your personal data throughout the years. The opposition is tough, but—with a powerful vision for a better future and &lt;a href=&quot;https://eff.org/r.l8mw&quot;&gt;you on our side&lt;/a&gt;—EFF is formidable.&lt;/p&gt;
  440. &lt;p&gt;Throughout EFF’s year-long 35th Anniversary celebration, our dedicated activists, investigators, technologists, and attorneys will share the lessons from EFF’s long and rich history so that we can help overcome the obstacles ahead. Thanks to you, EFF is here to stay.&lt;/p&gt;
  441. &lt;h2&gt;Together for the Digital Future&lt;/h2&gt;
  442. &lt;p&gt;&lt;a href=&quot;https://eff.org/r.l8mw&quot;&gt;As a member-supported nonprofit&lt;/a&gt;, everything EFF does depends on you. Donate to help fuel the fight for privacy, free expression, and a future where we protect digital freedom for everyone.&lt;/p&gt;
  443. &lt;p class=&quot;take-action&quot;&gt;&lt;a href=&quot;https://eff.org/r.l8mw&quot;&gt;JOIN EFF&lt;/a&gt;&lt;/p&gt;
  444. &lt;p&gt;Powerful forces may try to chip away at your rights—but when we stand together, we win.&lt;/p&gt;
  445. &lt;p&gt;&lt;/p&gt;&lt;center&gt;&lt;a href=&quot;https://eff.org/r.l8mw&quot;&gt;&lt;img src=&quot;https://www.eff.org/files/2025/06/05/shirts-both-necklines-wider-square-750px.jpg&quot; title=&quot;Get 35th Anniversary Member Swag and More When You Join&quot; /&gt;&lt;/a&gt;&lt;/center&gt;&lt;br /&gt;
  446. &lt;h2&gt;Watch Today: EFFecting Change Live&lt;/h2&gt;
  447. &lt;p&gt;Just hours from now, join me for the &lt;a href=&quot;https://www.eff.org/event/effecting-change-eff-turns-35&quot;&gt;35th Anniversary edition of our EFFecting Change livestream&lt;/a&gt;. I’m leading this Q&amp;amp;A with EFF Director for International Freedom of Expression Jillian York, EFF Legislative Director Lee Tien, and Professor and EFF Board Member Yoshi Kohno. Together, we’ve seen it all and today we hope you&#039;ll join us for what’s next.&lt;/p&gt;
  448. &lt;p class=&quot;take-action&quot;&gt;&lt;strong&gt;&lt;a href=&quot;https://livestream.eff.org&quot;&gt;WATCH LIVE&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  449. &lt;p class=&quot;take-explainer&quot;&gt;&lt;strong&gt;11:00 AM Pacific (&lt;em&gt;&lt;a href=&quot;https://dateful.com/eventlink/1636667650&quot;&gt;check local time&lt;/a&gt;&lt;/em&gt;)&lt;/strong&gt;&lt;/p&gt;
  450. &lt;p&gt;EFF supporters around the world sustain our mission to defend technology creators and users. Thank you for being a part of this community and helping it thrive.&lt;/p&gt;
  451.  
  452. &lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
  453.     <pubDate>Thu, 10 Jul 2025 07:03:16 +0000</pubDate>
  454. <guid isPermaLink="false">110884 at https://www.eff.org</guid>
  455. <dc:creator>Cindy Cohn</dc:creator>
  456. <enclosure url="https://www.eff.org/files/banner_library/circuit-city-og-static.png" alt="Green EFF 35th Anniversary digital cityscape on a black background." type="image/png" length="189965" />
  457.  </item>
  458.  <item>
  459.    <title>Data Brokers are Selling Your Flight Information to CBP and ICE </title>
  460.    <link>https://www.eff.org/deeplinks/2025/07/data-brokers-are-selling-your-flight-information-cbp-and-ice</link>
  461.    <description>&lt;div class=&quot;field field--name-body field--type-text-with-summary field--label-hidden&quot;&gt;&lt;div class=&quot;field__items&quot;&gt;&lt;div class=&quot;field__item even&quot;&gt;&lt;p&gt;&lt;span&gt;For many years, &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/deeplinks/2025/06/why-are-hundreds-data-brokers-not-registering-states&quot;&gt;&lt;span&gt;data brokers&lt;/span&gt;&lt;/a&gt;&lt;span&gt; have existed in the shadows, exploiting gaps in privacy laws to harvest our information—all for their own profit. They sell our &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/deeplinks/2022/06/what-fog-data-science-why-surveillance-company-so-dangerous&quot;&gt;&lt;span&gt;precise movements&lt;/span&gt;&lt;/a&gt;&lt;span&gt; without our knowledge or meaningful consent to a variety of private and state actors, including law enforcement agencies. And they show no sign of stopping.&lt;/span&gt;&lt;/p&gt;
  462. &lt;p&gt;&lt;span&gt;This incentivizes other bad actors. If companies collect any kind of personal data and want to make a quick buck, there’s a data broker willing to buy it and sell it to the highest bidder–often law enforcement and intelligence agencies.&lt;/span&gt;&lt;/p&gt;
  463. &lt;p&gt;&lt;span&gt;One &lt;/span&gt;&lt;a href=&quot;https://www.404media.co/airlines-dont-want-you-to-know-they-sold-your-flight-data-to-dhs/&quot;&gt;&lt;span&gt;recent investigation by 404 Media&lt;/span&gt;&lt;/a&gt;&lt;span&gt; revealed that the Airlines Reporting Corporation (ARC), a data broker &lt;/span&gt;&lt;a href=&quot;https://www.documentcloud.org/documents/25964404-ice-documents-on-arc/&quot;&gt;&lt;span&gt;owned and operated&lt;/span&gt;&lt;/a&gt;&lt;span&gt; by at least eight major U.S. airlines, including United Airlines and American Airlines, collected travelers’ domestic flight records and &lt;/span&gt;&lt;a href=&quot;https://www.wired.com/story/airlines-dont-want-you-to-know-they-sold-your-flight-data-to-dhs/&quot;&gt;&lt;span&gt;secretly sold access&lt;/span&gt;&lt;/a&gt;&lt;span&gt; to U.S. Customs and Border Protection (CBP). Despite selling passengers’ names, full flight itineraries, and financial details, the data broker prevented U.S. border forces from revealing it as the origin of the &lt;/span&gt;&lt;a href=&quot;http://information.so&quot;&gt;&lt;span&gt;information.&lt;/span&gt;&lt;/a&gt;&lt;span&gt; So, not only is the government doing &lt;/span&gt;&lt;a href=&quot;https://www.brennancenter.org/our-work/research-reports/closing-data-broker-loophole&quot;&gt;&lt;span&gt;an end run&lt;/span&gt;&lt;/a&gt;&lt;span&gt; around the Fourth Amendment to get information where they would otherwise need a warrant&lt;span&gt;—&lt;/span&gt;they’ve also been trying to hide how they know these things about us. &lt;/span&gt;&lt;/p&gt;
  464. &lt;p&gt;&lt;span&gt;ARC’s &lt;/span&gt;&lt;a href=&quot;https://govtribe.com/opportunity/federal-contract-opportunity/travel-intelligence-program-70cmsd25p00000033&quot;&gt;&lt;span&gt;Travel Intelligence Program (TIP)&lt;/span&gt;&lt;/a&gt; &lt;a href=&quot;https://www.documentcloud.org/documents/25965376-raven-pia-update/&quot;&gt;&lt;span&gt;aggregates&lt;/span&gt;&lt;/a&gt;&lt;span&gt; passenger data and contains more than one billion records spanning 39 months of past and future travel by both U.S. and non-U.S. citizens. CBP, which sits within the U.S. Department of Homeland Security (DHS), claims it needs this data to support local and state police keeping track of &lt;/span&gt;&lt;a href=&quot;https://www.documentcloud.org/documents/25965393-cbp-statement-of-work-for-arc/&quot;&gt;&lt;span&gt;people of interest&lt;/span&gt;&lt;/a&gt;&lt;span&gt;. But at a time of &lt;/span&gt;&lt;a href=&quot;https://www.nbcnews.com/news/world/trump-immigration-detained-visitors-border-search-device-visa-passport-rcna197736&quot;&gt;&lt;span&gt;growing concerns&lt;/span&gt;&lt;/a&gt;&lt;span&gt; about increased immigration enforcement at U.S. ports of entry, including unjustified searches, law enforcement officials will use this additional surveillance tool to expand the web of suspicion to even larger numbers of innocent travelers. &lt;/span&gt;&lt;/p&gt;
  465. &lt;p&gt;&lt;span&gt;More than &lt;/span&gt;&lt;a href=&quot;https://redact.dev/blog/meet-the-airline-owned-data-broker-selling-over-50-of-flight-data-to-ice&quot;&gt;&lt;span&gt;200 airlines&lt;/span&gt;&lt;/a&gt;&lt;span&gt; settle tickets through ARC, with information on more than 54% of flights taken globally. ARC’s &lt;/span&gt;&lt;a href=&quot;https://www2.arccorp.com/about-us/leadership-governance?utm_source=Global_Navigation#board-of-directors&quot;&gt;&lt;span&gt;board of directors&lt;/span&gt;&lt;/a&gt;&lt;span&gt; includes representatives from U.S. airlines like JetBlue and Delta, as well as international airlines like Lufthansa, Air France, and Air Canada. &lt;/span&gt;&lt;/p&gt;
  466. &lt;p&gt;&lt;span&gt;In selling law enforcement agencies bulk access to such sensitive information, these airlines—through their data broker—are putting their own profits over travelers&#039; privacy. U.S. Immigration and Customs Enforcement (ICE) recently &lt;/span&gt;&lt;a href=&quot;https://www.levernews.com/airlines-are-collecting-your-data-and-selling-it-to-ice/&quot;&gt;&lt;span&gt;detailed its own&lt;/span&gt;&lt;/a&gt;&lt;span&gt; purchase of personal data from ARC. In the current climate, this can have a detrimental impact on people’s lives. &lt;/span&gt;&lt;/p&gt;
  467. &lt;p&gt;&lt;span&gt;Movement unrestricted by governments is a hallmark of a free society. In our current moment, when the federal government is threatening legal consequences based on people’s &lt;/span&gt;&lt;a href=&quot;https://www.cfr.org/article/guide-countries-trumps-2025-travel-ban-list&quot;&gt;&lt;span&gt;national&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, &lt;/span&gt;&lt;a href=&quot;https://www.aclu-wa.org/pages/timeline-muslim-ban&quot;&gt;&lt;span&gt;religious&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, and &lt;/span&gt;&lt;a href=&quot;https://www.theguardian.com/us-news/2025/jul/01/trump-zohran-mamdani-citizenship&quot;&gt;&lt;span&gt;political&lt;/span&gt;&lt;/a&gt;&lt;span&gt; affiliations, having air travel in and out of the United States tracked by any ARC customer is a recipe for state retribution. &lt;/span&gt;&lt;/p&gt;
  468. &lt;p&gt;&lt;span&gt;Sadly, data brokers are doing even broader harm to our privacy. &lt;/span&gt;&lt;a href=&quot;https://www.404media.co/location-data-firm-offers-to-help-cops-track-targets-via-doctor-visits/&quot;&gt;&lt;span&gt;Sensitive location data&lt;/span&gt;&lt;/a&gt;&lt;span&gt; is harvested from smartphones and sold to cops, &lt;/span&gt;&lt;a href=&quot;https://www.404media.co/us-counterintel-buys-netflow-data-team-cymru-track-vpns/&quot;&gt;&lt;span&gt;internet backbone data&lt;/span&gt;&lt;/a&gt;&lt;span&gt; is sold to federal counterintelligence agencies, and &lt;/span&gt;&lt;a href=&quot;https://www.washingtonpost.com/technology/2021/02/26/ice-private-utility-data/&quot;&gt;&lt;span&gt;utility databases&lt;/span&gt;&lt;/a&gt;&lt;span&gt; containing phone, water, and electricity records are shared with ICE officers. &lt;/span&gt;&lt;/p&gt;
  469. &lt;p&gt;&lt;span&gt;At a time when immigration authorities are eroding fundamental freedoms through increased—and arbitrary—actions at the U.S. border, this news further exacerbates concerns that creeping authoritarianism can be fueled by the extraction of our most personal data—all without our knowledge or consent.&lt;/span&gt;&lt;/p&gt;
  470. &lt;p&gt;&lt;span&gt;The new revelations about ARC’s data sales to CBP and ICE is a fresh reminder of the need for “&lt;/span&gt;&lt;a href=&quot;https://www.eff.org/wp/privacy-first-better-way-address-online-harms&quot;&gt;&lt;span&gt;privacy first&lt;/span&gt;&lt;/a&gt;&lt;span&gt;” legislation that imposes consent and minimization limits on corporate processing of our data. We also need to pass the “&lt;/span&gt;&lt;a href=&quot;https://www.eff.org/deeplinks/2024/04/fourth-amendment-not-sale-act-passed-house-now-it-should-pass-senate&quot;&gt;&lt;span&gt;Fourth Amendment is not for sale&lt;/span&gt;&lt;/a&gt;&lt;span&gt;” act to stop police from bypassing judicial review of their data seizures by means of purchasing data from brokers. And let’s enforce &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/deeplinks/2025/06/why-are-hundreds-data-brokers-not-registering-states&quot;&gt;&lt;span&gt;data broker registration&lt;/span&gt;&lt;/a&gt;&lt;span&gt; laws. &lt;/span&gt;&lt;/p&gt;
  471.  
  472. &lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
  473.     <pubDate>Wed, 09 Jul 2025 23:06:47 +0000</pubDate>
  474. <guid isPermaLink="false">110881 at https://www.eff.org</guid>
  475. <category domain="https://www.eff.org/issues/privacy">Privacy</category>
  476. <dc:creator>Paige Collings</dc:creator>
  477. <dc:creator>Matthew Guariglia</dc:creator>
  478. <enclosure url="https://www.eff.org/files/banner_library/locationdata_v2.mov1_.gif" alt="An animated image showing location pins dropping onto a street map from above, tracing several paths" type="image/gif" length="2071190" />
  479.  </item>
  480.  <item>
  481.    <title>Electronic Frontier Foundation to Present Annual EFF Awards to Just Futures Law, Erie Meyer, and Software Freedom Law Center, India</title>
  482.    <link>https://www.eff.org/press/releases/electronic-frontier-foundation-present-annual-eff-awards-just-futures-law-erie-meyer</link>
  483.    <description>&lt;div class=&quot;field field--name-field-pr-subhead field--type-text field--label-hidden&quot;&gt;&lt;div class=&quot;field__items&quot;&gt;&lt;div class=&quot;field__item even&quot;&gt;2025 Awards Will Be Presented in a Live Ceremony Wednesday, Sept. 10 in San Francisco &lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field--name-body field--type-text-with-summary field--label-hidden&quot;&gt;&lt;div class=&quot;field__items&quot;&gt;&lt;div class=&quot;field__item even&quot;&gt;&lt;p&gt;&lt;span data-contrast=&quot;auto&quot;&gt;SAN FRANCISCO—The Electronic Frontier Foundation (EFF) is honored to announce that Just Futures Law, Erie Meyer, and Software Freedom Law Center, India will receive the 2025 EFF Awards for their vital work in ensuring that technology supports privacy, freedom, justice, and innovation for all people. &lt;/span&gt;&lt;span data-ccp-props=&quot;{}&quot;&gt; &lt;/span&gt;&lt;/p&gt;
  484. &lt;p&gt;&lt;span data-contrast=&quot;auto&quot;&gt;The EFF Awards recognize specific and substantial technical, social, economic, or cultural contributions in diverse fields including journalism, art, digital access, legislation, tech development, and law. &lt;/span&gt;&lt;span data-ccp-props=&quot;{}&quot;&gt; &lt;/span&gt;&lt;/p&gt;
  485. &lt;p&gt;&lt;span data-contrast=&quot;auto&quot;&gt; The EFF Awards ceremony will start at 6 p.m. PT on Wednesday, Sept. 10, 2025 at the San Francisco Design Center Galleria, 101 Henry Adams St. in San Francisco. Guests can register at &lt;/span&gt;&lt;a href=&quot;http://www.eff.org/effawards&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;&lt;span data-contrast=&quot;none&quot;&gt;http://www.eff.org/effawards&lt;/span&gt;&lt;/a&gt;&lt;span data-contrast=&quot;auto&quot;&gt;. &lt;/span&gt;&lt;span data-contrast=&quot;auto&quot;&gt;The ceremony will&lt;/span&gt;&lt;span data-contrast=&quot;auto&quot;&gt; be recorded and shared online on Sept. 12.&lt;/span&gt;&lt;span data-ccp-props=&quot;279}&quot;&gt; &lt;/span&gt;&lt;/p&gt;
  486. &lt;p&gt;&lt;span data-contrast=&quot;auto&quot;&gt;For the past 30 years, the EFF Awards—previously known as the Pioneer Awards—have recognized and honored key leaders in the fight for freedom and innovation online. Started when the internet was new, the Awards now reflect the fact that the online world has become both a necessity in modern life and a continually evolving set of tools for communication, organizing, creativity, and increasing human potential.&lt;/span&gt;&lt;span data-ccp-props=&quot;279}&quot;&gt; &lt;/span&gt;&lt;/p&gt;
  487. &lt;p&gt;&lt;span data-contrast=&quot;auto&quot;&gt;“Whether fighting the technological abuses that abet criminalization, detention, and deportation of immigrants and people of color, or working and speaking out fearlessly to protect Americans’ data privacy, or standing up for digital rights in the world’s most populous country, all of our 2025 Awards winners contribute to creating a brighter tech future for humankind,”  EFF Executive Director Cindy Cohn said. “We hope that this recognition will bring even more support for each of these vital efforts.”&lt;/span&gt;&lt;span data-ccp-props=&quot;{}&quot;&gt; &lt;/span&gt;&lt;/p&gt;
  488. &lt;h3&gt;&lt;b&gt;&lt;span data-contrast=&quot;auto&quot;&gt;Just Futures Law: Leading Immigration and Surveillance Litigation&lt;/span&gt;&lt;/b&gt;&lt;span data-ccp-props=&quot;{}&quot;&gt; &lt;/span&gt;&lt;/h3&gt;
  489. &lt;p&gt;&lt;a href=&quot;https://www.justfutureslaw.org/&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;&lt;span data-contrast=&quot;none&quot;&gt;&lt;div class=&quot;media media-element-container media-wysiwyg_medium media-wysiwyg-align-right&quot;&gt;&lt;div id=&quot;file-57850&quot; class=&quot;file file-image file-image-png&quot; class=&quot;file file-image file-image-png&quot;&gt;
  490.  
  491.        &lt;h2 class=&quot;element-invisible&quot;&gt;&lt;a href=&quot;/file/jfliconmediumpng-0&quot;&gt;jfl_icon_medium.png&lt;/a&gt;&lt;/h2&gt;
  492.    
  493.  
  494.  &lt;div class=&quot;content&quot;&gt;
  495.    &lt;img alt=&quot;Just Futures Law logo&quot; title=&quot;Just Futures Law logo&quot; class=&quot;media-element file-wysiwyg-medium&quot; data-delta=&quot;4&quot; src=&quot;https://www.eff.org/files/styles/kittens_types_wysiwyg_medium/public/jfl_icon_medium_0.png?itok=G5-_C2Hy&quot; width=&quot;250&quot; height=&quot;250&quot; /&gt;  &lt;/div&gt;
  496.  
  497.  
  498. &lt;/div&gt;
  499. &lt;/div&gt;Just Futures Law&lt;/span&gt;&lt;/a&gt;&lt;span data-contrast=&quot;auto&quot;&gt; is a women-of-color-led law project that recognizes how surveillance disproportionately impacts immigrants and people of color in the United States.  It uses litigation to fight back as part of defending and building the power of immigrant rights and criminal justice activists, organizers, and community groups to prevent criminalization, detention, and deportation of immigrants and people of color. Just Futures was founded in 2019 using a movement lawyering and racial justice framework and seeks to transform how litigation and legal support serves communities and builds movement power. &lt;/span&gt;&lt;span data-ccp-props=&quot;240}&quot;&gt; &lt;/span&gt;&lt;/p&gt;
  500. &lt;p&gt;&lt;span data-contrast=&quot;auto&quot;&gt;In the past year, Just Futures &lt;/span&gt;&lt;a href=&quot;https://www.justfutureslaw.org/legal-filings/dhsaifoia&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;&lt;span data-contrast=&quot;none&quot;&gt;sued the Department of Homeland Security&lt;/span&gt;&lt;/a&gt;&lt;span data-contrast=&quot;auto&quot;&gt; and its subagencies seeking a court order to compel the agencies to release records on their use of AI and other algorithms, and &lt;/span&gt;&lt;a href=&quot;https://www.justfutureslaw.org/legal-filings/tpshaiti&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;&lt;span data-contrast=&quot;none&quot;&gt;sued the Trump Administration&lt;/span&gt;&lt;/a&gt;&lt;span data-contrast=&quot;auto&quot;&gt; for prematurely halting Haiti’s Temporary Protected Status, a humanitarian program that allows hundreds of thousands of Haitians to temporarily remain and work in the United States due to Haiti’s current conditions of extraordinary crises. It has represented activists in their fight against tech giants like &lt;a href=&quot;https://www.justfutureslaw.org/legal-filings/clearview&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;Clearview AI&lt;/a&gt;, it has worked with &lt;/span&gt;&lt;a href=&quot;https://mijente.net/&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;&lt;span data-contrast=&quot;none&quot;&gt;Mijente&lt;/span&gt;&lt;/a&gt;&lt;span data-contrast=&quot;auto&quot;&gt; to launch the TakeBackTech fellowship to train new advocates on grassroots-directed research, and it has worked with &lt;/span&gt;&lt;a href=&quot;https://www.grassrootsleadership.org/&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;&lt;span data-contrast=&quot;none&quot;&gt;Grassroots Leadership&lt;/span&gt;&lt;/a&gt;&lt;span data-contrast=&quot;auto&quot;&gt; to fight for the release of detained individuals under &lt;/span&gt;&lt;a href=&quot;https://en.wikipedia.org/wiki/Operation_Lone_Star&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;&lt;span data-contrast=&quot;none&quot;&gt;Operation Lone Star&lt;/span&gt;&lt;/a&gt;&lt;span data-contrast=&quot;auto&quot;&gt;.&lt;/span&gt;&lt;span data-ccp-props=&quot;240}&quot;&gt; &lt;/span&gt;&lt;/p&gt;
  501. &lt;h3&gt;&lt;b&gt;&lt;span data-contrast=&quot;auto&quot;&gt;Erie Meyer: Protecting Americans&#039; Privacy&lt;/span&gt;&lt;/b&gt;&lt;span data-ccp-props=&quot;240}&quot;&gt; &lt;/span&gt;&lt;/h3&gt;
  502. &lt;p&gt;&lt;span data-contrast=&quot;auto&quot;&gt;&lt;div class=&quot;media media-element-container media-wysiwyg_medium media-wysiwyg-align-right&quot;&gt;&lt;div id=&quot;file-57851&quot; class=&quot;file file-image file-image-png&quot; class=&quot;file file-image file-image-png&quot;&gt;
  503.  
  504.        &lt;h2 class=&quot;element-invisible&quot;&gt;&lt;a href=&quot;/file/eriemeyerpng&quot;&gt;eriemeyer.png&lt;/a&gt;&lt;/h2&gt;
  505.    
  506.  
  507.  &lt;div class=&quot;content&quot;&gt;
  508.    &lt;img alt=&quot;Erie Meyer&quot; title=&quot;Erie Meyer&quot; class=&quot;media-element file-wysiwyg-medium&quot; data-delta=&quot;5&quot; src=&quot;https://www.eff.org/files/styles/kittens_types_wysiwyg_medium/public/eriemeyer.png?itok=rNIWzvWO&quot; width=&quot;250&quot; height=&quot;250&quot; /&gt;  &lt;/div&gt;
  509.  
  510.  
  511. &lt;/div&gt;
  512. &lt;/div&gt;Erie Meyer is a Senior Fellow at the &lt;/span&gt;&lt;a href=&quot;https://www.vanderbilt.edu/vanderbilt-policy-accelerator/&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;&lt;span data-contrast=&quot;none&quot;&gt;Vanderbilt Policy Accelerator&lt;/span&gt;&lt;/a&gt;&lt;span data-contrast=&quot;auto&quot;&gt; where she focuses on the intersection of technology, artificial intelligence, and regulation, and a Senior Fellow at the &lt;/span&gt;&lt;a href=&quot;https://www.law.georgetown.edu/tech-institute/&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;&lt;span data-contrast=&quot;none&quot;&gt;Georgetown Law Institute for Technology Law &amp;amp; Policy&lt;/span&gt;&lt;/a&gt;&lt;span data-contrast=&quot;auto&quot;&gt;. She is former Chief Technologist at both the &lt;/span&gt;&lt;a href=&quot;https://www.consumerfinance.gov/complaint/&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;&lt;span data-contrast=&quot;none&quot;&gt;Consumer Financial Protection Bureau&lt;/span&gt;&lt;/a&gt;&lt;span data-contrast=&quot;auto&quot;&gt; (CFPB) and the &lt;/span&gt;&lt;a href=&quot;https://www.ftc.gov/&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;&lt;span data-contrast=&quot;none&quot;&gt;Federal Trade Commission&lt;/span&gt;&lt;/a&gt;&lt;span data-contrast=&quot;auto&quot;&gt;. Earlier, she was senior advisor to the U.S. Chief Technology Officer at the White House, where she co-founded the &lt;/span&gt;&lt;a href=&quot;https://www.usds.gov/&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;&lt;span data-contrast=&quot;none&quot;&gt;United States Digital Service&lt;/span&gt;&lt;/a&gt;&lt;span data-contrast=&quot;auto&quot;&gt;, a team of technologists and designers working to improve digital services for the public. Meyer also worked as senior director at &lt;/span&gt;&lt;a href=&quot;https://codeforamerica.org/&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;&lt;span data-contrast=&quot;none&quot;&gt;Code for America&lt;/span&gt;&lt;/a&gt;&lt;span data-contrast=&quot;auto&quot;&gt;, a nonprofit that promotes civic hacking to modernize government services, and in the Ohio Attorney General&#039;s office at the height of the financial crisis.&lt;/span&gt;&lt;span data-ccp-props=&quot;279}&quot;&gt; &lt;/span&gt;&lt;/p&gt;
  513. &lt;p&gt;&lt;span data-contrast=&quot;auto&quot;&gt;Since January 20, Meyer has helped organize former government technologists to stand up for the privacy and integrity of governmental systems that hold Americans’ data. In addition to organizing others, she &lt;/span&gt;&lt;a href=&quot;https://storage.courtlistener.com/recap/gov.uscourts.dcd.277287/gov.uscourts.dcd.277287.18.0_1.pdf&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;&lt;span data-contrast=&quot;none&quot;&gt;filed a declaration in federal court&lt;/span&gt;&lt;/a&gt;&lt;span data-contrast=&quot;auto&quot;&gt; in February warning that 12 years of critical records could be irretrievably lost in the CFPB’s purge by the Trump Administration’s Department of Government Efficiency. In April, she filed &lt;/span&gt;&lt;a href=&quot;https://storage.courtlistener.com/recap/gov.uscourts.mdd.577321/gov.uscourts.mdd.577321.111.9.pdf&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;&lt;span data-contrast=&quot;none&quot;&gt;a declaration in another case&lt;/span&gt;&lt;/a&gt;&lt;span data-contrast=&quot;auto&quot;&gt; warning about using private-sector AI on government information. That same month, she &lt;/span&gt;&lt;a href=&quot;https://oversight.house.gov/wp-content/uploads/2025/04/Testimony-of-Erie-Meyer-2.pdf&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;&lt;span data-contrast=&quot;none&quot;&gt;testified to the House Oversight Subcommittee on Cybersecurity, Information Technology, and Government Innovation&lt;/span&gt;&lt;/a&gt;&lt;span data-contrast=&quot;auto&quot;&gt; that DOGE is centralizing access to some of the most sensitive data the government holds—Social Security records, disability claims, even data tied to national security—without a clear plan or proper oversight, warning that “DOGE is burning the house down and calling it a renovation.”&lt;/span&gt;&lt;span data-ccp-props=&quot;279}&quot;&gt; &lt;/span&gt;&lt;/p&gt;
  514. &lt;h3&gt;&lt;b&gt;&lt;span data-contrast=&quot;auto&quot;&gt;Software Freedom Law Center, India: Defending Digital Freedoms&lt;/span&gt;&lt;/b&gt;&lt;span data-ccp-props=&quot;{}&quot;&gt; &lt;/span&gt;&lt;/h3&gt;
  515. &lt;p&gt;&lt;a href=&quot;https://sflc.in/&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;&lt;span data-contrast=&quot;none&quot;&gt;&lt;div class=&quot;media media-element-container media-wysiwyg_medium media-wysiwyg-align-right&quot;&gt;&lt;div id=&quot;file-57852&quot; class=&quot;file file-image file-image-png&quot; class=&quot;file file-image file-image-png&quot;&gt;
  516.  
  517.        &lt;h2 class=&quot;element-invisible&quot;&gt;&lt;a href=&quot;/file/sflclogopng&quot;&gt;sflc_logo.png&lt;/a&gt;&lt;/h2&gt;
  518.    
  519.  
  520.  &lt;div class=&quot;content&quot;&gt;
  521.    &lt;img alt=&quot;Software Freedom Law Center, India logo&quot; title=&quot;Software Freedom Law Center, India logo&quot; class=&quot;media-element file-wysiwyg-medium&quot; data-delta=&quot;6&quot; src=&quot;https://www.eff.org/files/styles/kittens_types_wysiwyg_medium/public/sflc_logo.png?itok=XeqAf0IN&quot; width=&quot;250&quot; height=&quot;250&quot; /&gt;  &lt;/div&gt;
  522.  
  523.  
  524. &lt;/div&gt;
  525. &lt;/div&gt;Software Freedom Law Center, India&lt;/span&gt;&lt;/a&gt;&lt;span data-contrast=&quot;auto&quot;&gt; is a donor-supported legal services organization based in India that brings together lawyers, policy analysts, students, and technologists to protect freedom in the digital world. It promotes innovation and open access to knowledge by helping developers make great free and open-source software, protects privacy and civil liberties for Indians by educating and providing free legal advice, and helps policymakers make informed and just decisions about use of technology.&lt;/span&gt;&lt;span data-ccp-props=&quot;{}&quot;&gt; &lt;/span&gt;&lt;/p&gt;
  526. &lt;p&gt;&lt;span data-contrast=&quot;auto&quot;&gt;Founded in 2010 by technology lawyer and online civil liberties activist &lt;/span&gt;&lt;a href=&quot;https://mishichoudhary.com/&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;&lt;span data-contrast=&quot;none&quot;&gt;Mishi Choudhary&lt;/span&gt;&lt;/a&gt;&lt;span data-contrast=&quot;auto&quot;&gt;, SFLC.IN tracks and participates in litigation, AI regulations, and free speech issues that are defining Indian technology. It also tracks &lt;/span&gt;&lt;a href=&quot;https://internetshutdowns.in/&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;&lt;span data-contrast=&quot;none&quot;&gt;internet shutdowns&lt;/span&gt;&lt;/a&gt;&lt;span data-contrast=&quot;auto&quot;&gt; and &lt;/span&gt;&lt;a href=&quot;https://freespeech.sflc.in/&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;&lt;span data-contrast=&quot;none&quot;&gt;censorship incidents&lt;/span&gt;&lt;/a&gt;&lt;span data-contrast=&quot;auto&quot;&gt; across India, provides &lt;/span&gt;&lt;a href=&quot;https://security.sflc.in/&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;&lt;span data-contrast=&quot;none&quot;&gt;digital security training&lt;/span&gt;&lt;/a&gt;&lt;span data-contrast=&quot;auto&quot;&gt;, and has launched the &lt;/span&gt;&lt;a href=&quot;https://ddn.sflc.in/&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;&lt;span data-contrast=&quot;none&quot;&gt;Digital Defenders Network&lt;/span&gt;&lt;/a&gt;&lt;span data-contrast=&quot;auto&quot;&gt;, a pan-Indian network of lawyers committed to protecting digital rights. It has conducted landmark litigation cases, petitioned the government of India on freedom of expression and internet issues, and campaigned for WhatsApp and Facebook to fix a feature of their platform that has been used to harass women in India.&lt;/span&gt;&lt;span data-ccp-props=&quot;{}&quot;&gt; &lt;/span&gt;&lt;/p&gt;
  527. &lt;p&gt;&lt;b&gt;&lt;span data-contrast=&quot;auto&quot;&gt;To register for this event:&lt;/span&gt;&lt;/b&gt;&lt;span data-contrast=&quot;auto&quot;&gt;  &lt;/span&gt;&lt;a href=&quot;http://www.eff.org/effawards&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;&lt;span data-contrast=&quot;none&quot;&gt;http://www.eff.org/effawards&lt;/span&gt;&lt;/a&gt;&lt;span data-ccp-props=&quot;{}&quot;&gt; &lt;/span&gt;&lt;/p&gt;
  528. &lt;p&gt;&lt;b&gt;&lt;span data-contrast=&quot;auto&quot;&gt;For past honorees: &lt;/span&gt;&lt;/b&gt;&lt;a href=&quot;https://www.eff.org/awards/past-winners&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;&lt;span data-contrast=&quot;none&quot;&gt;https://www.eff.org/awards/past-winners&lt;/span&gt;&lt;/a&gt;&lt;span data-ccp-props=&quot;{}&quot;&gt; &lt;/span&gt;&lt;/p&gt;
  529.  
  530. &lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
  531.     <pubDate>Wed, 09 Jul 2025 21:00:26 +0000</pubDate>
  532. <guid isPermaLink="false">110871 at https://www.eff.org</guid>
  533. <dc:creator>Josh Richman</dc:creator>
  534. <enclosure url="https://www.eff.org/files/banner_library/eff-awards-2023.png" alt="EFF Awards text on circuitboard texture" type="image/png" length="139073" />
  535.  </item>
  536.  <item>
  537.    <title>EFF to US Court of Appeals: Protect Taxpayer Privacy</title>
  538.    <link>https://www.eff.org/deeplinks/2025/07/eff-us-court-appeals-protect-taxpayer-privacy</link>
  539.    <description>&lt;div class=&quot;field field--name-body field--type-text-with-summary field--label-hidden&quot;&gt;&lt;div class=&quot;field__items&quot;&gt;&lt;div class=&quot;field__item even&quot;&gt;&lt;p&gt;&lt;span&gt;EFF has filed an amicus brief in &lt;/span&gt;&lt;i&gt;&lt;span&gt;Trabajadores v. Bessent&lt;/span&gt;&lt;/i&gt;&lt;span&gt;, a case concerning the Internal Revenue Service (IRS) sharing protected personal tax information with the Department of Homeland Security for the purposes of immigration enforcement. Our expertise in  privacy and &lt;/span&gt;&lt;span&gt;data sharing&lt;/span&gt;&lt;span&gt; makes us the ideal organization to step in and inform the judge: government actions like this have real-world consequences. The IRS’s sharing, and especially bulk sharing, of data is improper and  makes taxpayers vulnerable to inevitable mistakes. As a practical matter, the sharing of data that IRS had previously claimed was protected undermines the trust important civil institutions require in order to be effective. &lt;/span&gt;&lt;/p&gt;
  540. &lt;p&gt;&lt;span&gt;You can read the entire brief &lt;a href=&quot;https://www.eff.org/document/trabajadores-v-bessent-amicus-brief&quot;&gt;here&lt;/a&gt;. &lt;/span&gt;&lt;/p&gt;
  541. &lt;p&gt;&lt;span&gt;The brief makes two particular arguments. The first is that if the Tax Reform Act, the statute under which the IRS found the authority to share the data, is considered to be ambiguous, and that the statute should be interpreted in light of the legislative intent and historical background, which disfavors disclosure. The brief reads, &lt;/span&gt;&lt;/p&gt;
  542. &lt;blockquote&gt;&lt;p&gt;&lt;em&gt;Given the historical context, and decades of subsequent agency promises to protect taxpayer confidentiality and taxpayer reliance on those promises, the Administration’s abrupt decision to re-interpret §6103 to allow sharing with ICE whenever a potential “criminal proceeding” can be posited, is a textbook example of an arbitrary and capricious action even if the statute can be read to be ambiguous.&lt;/em&gt;&lt;/p&gt;
  543. &lt;/blockquote&gt;
  544. &lt;p&gt;&lt;span&gt;The other argument we make to the court is that data scientists agree: when you try to corroborate information between two databases in which information is only partially identifiable, mistakes happen. We argue:&lt;/span&gt;&lt;/p&gt;
  545. &lt;blockquote&gt;&lt;p&gt;&lt;em&gt;Those errors result from such mundane issues as outdated information, data entry errors, and taxpayers or tax preparer submission of incorrect names or addresses. If public reports are correct, and officials intend to share information regarding 700,000 or even 7 million taxpayers, the errors will multiply, leading to the mistaken targeting, detention, deportation, and potentially even physical harm to regular taxpayers.&lt;/em&gt;&lt;/p&gt;
  546. &lt;/blockquote&gt;
  547. &lt;p&gt;&lt;span&gt;Information silos in the government exist for a reason. Here, it was designed to protect individual privacy and prevent executive abuse that can come with unfettered access to properly-collected information.  The concern motivating Congress to pass the Tax Reform Act was the same as that behind &lt;/span&gt;&lt;a href=&quot;https://www.justice.gov/opcl/privacy-act-1974&quot;&gt;&lt;span&gt;Privacy Act of 1974 &lt;/span&gt;&lt;/a&gt;&lt;span&gt;and the &lt;/span&gt;&lt;a href=&quot;https://www.fdic.gov/resources/supervision-and-examinations/consumer-compliance-examination-manual/documents/8/viii-3-1.pdf&quot;&gt;&lt;span&gt;1978 Right to Financial Privacy Act&lt;/span&gt;&lt;/a&gt;&lt;span&gt;. These laws were part of a wave of reforms Congress considered necessary to address the &lt;/span&gt;&lt;a href=&quot;https://thereader.mitpress.mit.edu/60-years-ago-congress-warned-us-about-the-surveillance-state-what-happened/&quot;&gt;&lt;span&gt;misuse of tax data to spy&lt;/span&gt;&lt;/a&gt;&lt;span&gt; on and harass political opponents, dissidents, civil rights activists, and anti-war protestors in the 1960s and early 1970s. Congress saw the need to ensure that data collected for one purpose should only be used for that purpose, with very narrow exceptions, or else it is prone to abuse. Yet the IRS is currently sharing information to allow ICE to enforce immigration law.&lt;/span&gt;&lt;/p&gt;
  548. &lt;p&gt;&lt;span&gt;Taxation in the United States operates through a very simple agreement: the government requires taxes from people working inside the United States in order to function. In order to get people to pay their taxes, including undocumented immigrants living and working in the United States, the IRS has previously promised that the data they collect will not be used against a person for punitive reasons. This increases people to pay taxes and alleviates concerns of people people may have to avoid interacting with the government. But the IRS’s reversal has greatly harmed that trust and has potential to have far reaching and negative ramifications, including decreasing future tax revenue.&lt;/span&gt;&lt;/p&gt;
  549. &lt;p&gt;&lt;a href=&quot;https://www.eff.org/deeplinks/2025/06/dangers-consolidating-all-government-information&quot;&gt;&lt;span&gt;Consolidating government information&lt;/span&gt;&lt;/a&gt;&lt;span&gt; so that the agencies responsible for healthcare, taxes, or financial support are linked to agencies that police, surveil, and fine people is a recipe for disaster. For that reason, EFF is proud to submit this amicus brief in &lt;i&gt;Trabajadores v. Bessent&lt;/i&gt; in support of taxpayer privacy. &lt;/span&gt;&lt;/p&gt;
  550.  
  551.  
  552. &lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field--name-field-related-cases field--type-node-reference field--label-above&quot;&gt;&lt;div class=&quot;field__label&quot;&gt;Related Cases:&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;field__items&quot;&gt;&lt;div class=&quot;field__item even&quot;&gt;&lt;a href=&quot;/cases/american-federation-government-employees-v-us-office-personnel-management&quot;&gt;American Federation of Government Employees v. U.S. Office of Personnel Management&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
  553.     <pubDate>Tue, 08 Jul 2025 19:10:27 +0000</pubDate>
  554. <guid isPermaLink="false">110877 at https://www.eff.org</guid>
  555. <category domain="https://www.eff.org/issues/privacy">Privacy</category>
  556. <dc:creator>Matthew Guariglia</dc:creator>
  557. <dc:creator>Hannah Zhao</dc:creator>
  558. <enclosure url="https://www.eff.org/files/banner_library/capitol-2.jpg" alt="" type="image/jpeg" length="19833" />
  559.  </item>
  560.  <item>
  561.    <title>How to Build on Washington’s “My Health, My Data” Act</title>
  562.    <link>https://www.eff.org/deeplinks/2025/06/how-build-washingtons-my-health-my-data-act</link>
  563.    <description>&lt;div class=&quot;field field--name-body field--type-text-with-summary field--label-hidden&quot;&gt;&lt;div class=&quot;field__items&quot;&gt;&lt;div class=&quot;field__item even&quot;&gt;&lt;p&gt;In 2023, the State of Washington enacted one of the strongest consumer data privacy laws in recent years: the “&lt;a href=&quot;https://app.leg.wa.gov/RCW/default.aspx?cite=19.373&amp;amp;full=true&amp;amp;pdf=true&quot;&gt;my health my data&lt;/a&gt;” act (&lt;a href=&quot;https://lawfilesext.leg.wa.gov/biennium/2023-24/Pdf/Bills/House%20Passed%20Legislature/1155-S.PL.pdf?q=20250610130508&quot;&gt;HB 1155&lt;/a&gt;). EFF commends the civil rights, data privacy, and reproductive justice &lt;a href=&quot;https://lawfilesext.leg.wa.gov/biennium/2023-24/Pdf/Bill%20Reports/House/1155-S.E%20HBR%20PL%2023.pdf?q=20250610130508&quot;&gt;advocates&lt;/a&gt; who worked to pass this law.&lt;/p&gt;
  564. &lt;p&gt;This post suggests ways for legislators and advocates in other states to build on the Washington law and draft one with even stronger protections. This post will separately address the law’s scope (such as who is protected); its safeguards (such as consent and minimization); and its enforcement (such as a private right of action). While the law only applies to one category of personal data – our health information – its structure could be used to protect all manner of data.&lt;/p&gt;
  565. &lt;h4&gt;&lt;strong&gt;Scope of Protection&lt;/strong&gt;&lt;/h4&gt;
  566. &lt;p&gt;Authors of every consumer data privacy law must make three decisions about scope: What kind of data is protected? Whose data is protected? And who is regulated?&lt;/p&gt;
  567. &lt;p&gt;The Washington law protects “consumer health data,” &lt;a href=&quot;https://app.leg.wa.gov/RCW/default.aspx?cite=19.373.010&quot;&gt;defined&lt;/a&gt; as information linkable to a consumer that identifies their “physical or mental health status.” This includes all manner of conditions and treatments, such as gender-affirming and reproductive care. While EFF’s ultimate goal is protection of all types of personal information, bills that protect at least &lt;a href=&quot;https://www.eff.org/deeplinks/2023/05/eff-supports-my-body-my-data&quot;&gt;some&lt;/a&gt; &lt;a href=&quot;https://www.eff.org/deeplinks/2020/08/sen-merkley-leads-biometric-privacy&quot;&gt;types&lt;/a&gt; can be a great start.&lt;/p&gt;
  568. &lt;p&gt;The Washington law protects “consumers,” &lt;a href=&quot;https://app.leg.wa.gov/RCW/default.aspx?cite=19.373.010&quot;&gt;defined&lt;/a&gt; as all natural persons who reside in the state or had their health data collected there. It is best, as here, to protect all people. If a data privacy law protects just some people, that can incentivize a regulated entity to collect even more data, in order to distinguish protected from unprotected people. Notably, Washington’s definition of “consumers” applies only in “an individual or household context,” but not “an employment context”; thus, Washingtonians will need a different health privacy law to protect them from &lt;a href=&quot;https://www.eff.org/deeplinks/2021/03/dystopia-prime-amazon-subjects-its-drivers-biometric-surveillance&quot;&gt;their&lt;/a&gt; &lt;a href=&quot;https://www.eff.org/deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers&quot;&gt;snooping&lt;/a&gt; &lt;a href=&quot;https://www.eff.org/deeplinks/2022/12/privacy-doesnt-stop-when-you-clock-2022-review&quot;&gt;bosses&lt;/a&gt;.&lt;/p&gt;
  569. &lt;p&gt;The Washington law &lt;a href=&quot;https://app.leg.wa.gov/RCW/default.aspx?cite=19.373.010&quot;&gt;defines&lt;/a&gt; a “regulated entity” as “any legal entity” that both: “conducts business” in the state or targets residents for products or services; and “determines the purpose and means” of processing consumer health data. This appears to include many non-profit groups, which is good, because such groups can harmfully process a lot of personal data.&lt;/p&gt;
  570. &lt;p&gt;The law excludes government from regulation, which is not unusual for data privacy bills focused on non-governmental actors. State and local government will likely need to be regulated by another data privacy law.&lt;/p&gt;
  571. &lt;p&gt;Unfortunately, the Washington law also excludes “contracted service providers when processing data on behalf of government.” A data broker or other surveillance-oriented business should not be free from regulation just because it is working for the police.&lt;/p&gt;
  572. &lt;h4&gt;&lt;strong&gt;Consent or Minimization to Collect or Share Health Data&lt;/strong&gt;&lt;/h4&gt;
  573. &lt;p&gt;The most important part of Washington’s law requires either &lt;a href=&quot;https://app.leg.wa.gov/RCW/default.aspx?cite=19.373.030&quot;&gt;consent or minimization&lt;/a&gt; for a regulated entity to collect or share a consumer’s health data.&lt;/p&gt;
  574. &lt;p&gt;The law has a strong &lt;a href=&quot;https://app.leg.wa.gov/RCW/default.aspx?cite=19.373.010&quot;&gt;definition&lt;/a&gt; of “consent.” It must be “a clear affirmative act that signifies a consumer’s freely given, specific, informed, opt-in, voluntary, and unambiguous agreement.” Consent cannot be obtained with “broad terms of use” or “deceptive design.”&lt;/p&gt;
  575. &lt;p&gt;Absent consent, a regulated entity cannot collect or share a consumer’s health data except as &lt;a href=&quot;https://app.leg.wa.gov/RCW/default.aspx?cite=19.373.030&quot;&gt;necessary&lt;/a&gt; to provide a good or service that the consumer requested. Such rules are often called “&lt;a href=&quot;https://en.wikipedia.org/wiki/Data_minimization&quot;&gt;data minimization&lt;/a&gt;.” Their virtue is that a consumer does not need to do anything to enjoy their statutory privacy rights; the burden is on the regulated entity to process less data.&lt;/p&gt;
  576. &lt;p&gt;As to data “&lt;a href=&quot;https://app.leg.wa.gov/RCW/default.aspx?cite=19.373.070&quot;&gt;sale&lt;/a&gt;,” the Washington law requires enhanced consent (which the law calls “valid authorization”). Sale is the most dangerous form of sharing, because it incentivizes businesses to collect the most possible data in hopes of later selling it. For this reason, some laws flatly ban sale of sensitive data, like the Illinois biometric information privacy act (&lt;a href=&quot;https://www.ilga.gov/legislation/ilcs/ilcs3.asp?ActID=3004&quot;&gt;BIPA&lt;/a&gt;).&lt;/p&gt;
  577. &lt;p&gt;For context, there are four ways for a bill or law to configure consent and/or minimization. Some require just consent, like BIPA’s provisions on data collection. Others require just minimization, like the federal “&lt;a href=&quot;https://www.congress.gov/bill/118th-congress/house-bill/3420/text?s=2&amp;amp;r=1&amp;amp;q=%7B%22search%22%3A%5B%22%22%5D%7D&quot;&gt;my body my data” bill&lt;/a&gt;. Still others require both, like the Massachusetts &lt;a href=&quot;https://malegislature.gov/Bills/194/S197&quot;&gt;location data privacy bill&lt;/a&gt;. And some require either one or the other. In various times and places, EFF has supported all four configurations. “Either/or” is weakest, because it allows regulated entities to choose whether to minimize or to seek consent – a choice they will make based on their profit and not our privacy.&lt;/p&gt;
  578. &lt;h4&gt;&lt;strong&gt;Two Protections of Location Data Privacy&lt;/strong&gt;&lt;/h4&gt;
  579. &lt;p&gt;Data brokers &lt;a href=&quot;https://www.eff.org/issues/location-data-brokers&quot;&gt;harvest our location information&lt;/a&gt; and sell it to anyone who will pay, including advertisers, police, and other adversaries. Legislators are &lt;a href=&quot;https://www.eff.org/deeplinks/2025/04/privacy-map-how-states-are-fighting-location-surveillance&quot;&gt;stepping forward&lt;/a&gt; to address this threat.&lt;/p&gt;
  580. &lt;p&gt;The Washington law does so in two ways. First, the “consumer health data” protected by the consent-or-minimization rule is &lt;a href=&quot;https://app.leg.wa.gov/RCW/default.aspx?cite=19.373.010&quot;&gt;defined&lt;/a&gt; to include “precise location information that could reasonably indicate a consumer’s attempt to acquire or receive health services or supplies.” In turn, “precise location” is &lt;a href=&quot;https://app.leg.wa.gov/RCW/default.aspx?cite=19.373.010&quot;&gt;defined&lt;/a&gt; as within 1,750’ of a person.&lt;/p&gt;
  581. &lt;p&gt;Second, the Washington law bans a “&lt;a href=&quot;https://app.leg.wa.gov/RCW/default.aspx?cite=19.373.080&quot;&gt;geofence&lt;/a&gt;” around an “in-person health care service,” if “used” for one of three forbidden purposes (to track consumers, to collect their data, or to send them messages or ads). A “geofence” is &lt;a href=&quot;https://app.leg.wa.gov/RCW/default.aspx?cite=19.373.010&quot;&gt;defined&lt;/a&gt; as technology that uses GPS or the like “to establish a virtual boundary” of 2,000’ around the perimeter of a physical location.&lt;/p&gt;
  582. &lt;p&gt;This is a good start. It is also much better than weaker rules that only apply to the immediate vicinity of sensitive locations. Such rules allow adversaries to use location data to track us as we move towards sensitive locations, observe us enter the small no-data bubble around those locations, and infer what we may have done there. On the other hand, Washington’s rules apply to sizeable areas. Also, its consent-or-minimization rule applies to &lt;em&gt;all&lt;/em&gt; locations that could indicate pursuit of health care (not just health facilities). And its geofence rule forbids use of location data to track people.&lt;/p&gt;
  583. &lt;p&gt;Still, the better approach, as in &lt;a href=&quot;https://www.eff.org/deeplinks/2025/04/privacy-map-how-states-are-fighting-location-surveillance&quot;&gt;several recent bills&lt;/a&gt;, is to simply protect all location data. Protecting just one kind of sensitive location, like houses of worship, will leave out others, like courthouses. More fundamentally, all locations are sensitive, given the risk that others will use our location data to determine where – and with whom – we live, work, and socialize.&lt;/p&gt;
  584. &lt;h4&gt;&lt;strong&gt;More Data Privacy Protections&lt;/strong&gt;&lt;/h4&gt;
  585. &lt;p&gt;Other safeguards in the Washington law deserve attention from legislators in other states:&lt;/p&gt;
  586. &lt;ul&gt;
  587. &lt;li&gt;Regulated entities must publish a &lt;a href=&quot;https://app.leg.wa.gov/RCW/default.aspx?cite=19.373.020&quot;&gt;privacy policy&lt;/a&gt; that discloses, for example, the categories of data collected and shared, and the purposes of collection. Regulated entities must not collect, use, or share additional categories of data, or process them for additional purposes, without consent.&lt;/li&gt;
  588. &lt;li&gt;Regulated entities must provide consumers the rights to &lt;a href=&quot;https://app.leg.wa.gov/RCW/default.aspx?cite=19.373.040&quot;&gt;access and delete&lt;/a&gt; their data.&lt;/li&gt;
  589. &lt;li&gt;Regulated entities must restrict data access to just those employees who need it, and maintain industry-standard &lt;a href=&quot;https://app.leg.wa.gov/RCW/default.aspx?cite=19.373.050&quot;&gt;data security&lt;/a&gt;&lt;/li&gt;
  590. &lt;/ul&gt;
  591. &lt;h4&gt;&lt;strong&gt;Enforcement&lt;/strong&gt;&lt;/h4&gt;
  592. &lt;p&gt;A law is only as strong as its teeth. The best way to ensure enforcement is to empower people to sue regulated entities that violate their privacy; this is often called a “&lt;a href=&quot;https://www.eff.org/deeplinks/2019/01/you-should-have-right-sue-companies-violate-your-privacy&quot;&gt;private right of action&lt;/a&gt;.”&lt;/p&gt;
  593. &lt;p&gt;The Washington law &lt;a href=&quot;https://app.leg.wa.gov/RCW/default.aspx?cite=19.373.090&quot;&gt;provides&lt;/a&gt; that its violation is “an unfair or deceptive act” under the state’s separate &lt;a href=&quot;https://app.leg.wa.gov/RCW/default.aspx?cite=19.86&quot;&gt;consumer protection act&lt;/a&gt;. That law, in turn, &lt;a href=&quot;https://app.leg.wa.gov/RCW/default.aspx?cite=19.86.020&quot;&gt;bans&lt;/a&gt; unfair or deceptive acts in the conduct of trade or commerce. Upon a violation of the ban, that law provides a &lt;a href=&quot;https://app.leg.wa.gov/RCW/default.aspx?cite=19.86.090&quot;&gt;civil action&lt;/a&gt; to “any person who is injured in [their] business or property,” with the remedies of injunction, actual damages, treble damages up to $25,000, and legal fees and costs. It remains to be seen how Washington’s courts will apply this old civil action to the new “my health my data” act.&lt;/p&gt;
  594. &lt;p&gt;Washington legislators are demonstrating that privacy is important to public policy, but a more explicit claim would be cleaner: invasion of the fundamental human right to data privacy. Sadly, there is a &lt;a href=&quot;https://www.eff.org/deeplinks/2022/11/let-data-breach-victims-sue-marriott&quot;&gt;nationwide debate&lt;/a&gt; about whether injury to data privacy, by itself, should be enough to go to court, without also proving a more tangible injury like identity theft. The &lt;a href=&quot;https://www.eff.org/deeplinks/2025/04/privacy-map-how-states-are-fighting-location-surveillance&quot;&gt;best legislative models&lt;/a&gt; ensure full access to the courts in two ways. First, they provide: “A violation of this law regarding an individual’s data constitutes an injury to that individual, and any individual alleging a violation of this law may bring a civil action.” Second, they provide a baseline amount of damages (often called “liquidated” or “statutory” damages), because it is often difficult to prove actual damages arising from a data privacy injury.&lt;/p&gt;
  595. &lt;p&gt;Finally, data privacy laws must protect people from “&lt;a href=&quot;https://www.eff.org/deeplinks/2020/10/why-getting-paid-your-data-bad-deal&quot;&gt;pay for privacy&lt;/a&gt;” schemes, where a business charges a higher price or delivers an inferior product if a consumer exercises their statutory data privacy rights. Such schemes will lead to a society of privacy “haves” and “have nots.”&lt;/p&gt;
  596. &lt;p&gt;The Washington law has two helpful provisions. First, a regulated entity “may not unlawfully &lt;a href=&quot;https://app.leg.wa.gov/RCW/default.aspx?cite=19.373.030&quot;&gt;discriminate&lt;/a&gt; against a consumer for exercising any rights included in this chapter.” Second, there can be no data sale without a “statement” from the regulated entity to the consumer that “the provision of goods or services may not be &lt;a href=&quot;https://app.leg.wa.gov/RCW/default.aspx?cite=19.373.070&quot;&gt;conditioned&lt;/a&gt; on the consumer signing the valid authorization.”&lt;/p&gt;
  597. &lt;p&gt;&lt;a href=&quot;https://www.eff.org/deeplinks/2025/04/privacy-map-how-states-are-fighting-location-surveillance&quot;&gt;Some privacy bills&lt;/a&gt; contain more-specific language, for example along these lines: “a regulated entity cannot take an adverse action against a consumer (such as refusal to provide a good or service, charging a higher price, or providing a lower quality) because the consumer exercised their data privacy rights, unless the data at issue is essential to the good or service they requested and then only to the extent the data is essential.”&lt;/p&gt;
  598. &lt;h4&gt;&lt;strong&gt;What About Congress?&lt;/strong&gt;&lt;/h4&gt;
  599. &lt;p&gt;We still desperately need comprehensive federal consumer data privacy law built on “&lt;a href=&quot;https://www.eff.org/wp/privacy-first-better-way-address-online-harms&quot;&gt;privacy first&lt;/a&gt;” principles. In the meantime, states are taking the lead. The &lt;a href=&quot;https://www.eff.org/deeplinks/2025/05/stopping-states-passing-ai-laws-next-decade-terrible-idea&quot;&gt;very&lt;/a&gt; &lt;a href=&quot;https://www.eff.org/deeplinks/2024/06/eff-opposes-american-privacy-rights-act&quot;&gt;worst&lt;/a&gt; &lt;a href=&quot;https://www.eff.org/deeplinks/2024/10/preemption-playbook-big-techs-blueprint-comes-straight-big-tobacco&quot;&gt;thing&lt;/a&gt; Congress could do now is preempt states from protecting their residents’ data privacy. Advocates and legislators from across the country, seeking to take up this mantle, would benefit from looking at – and building on – Washington’s “my health my data” law.&lt;/p&gt;
  600.  
  601. &lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
  602.     <pubDate>Sun, 06 Jul 2025 22:49:16 +0000</pubDate>
  603. <guid isPermaLink="false">110832 at https://www.eff.org</guid>
  604. <category domain="https://www.eff.org/issues/privacy">Privacy</category>
  605. <dc:creator>Adam Schwartz</dc:creator>
  606. <enclosure url="https://www.eff.org/files/banner_library/medical-privacy_1.png" alt="Four medical symbols with keys" type="image/png" length="26686" />
  607.  </item>
  608.  <item>
  609.    <title>🤫 Meta&#039;s Secret Spying Scheme | EFFector 37.7</title>
  610.    <link>https://www.eff.org/deeplinks/2025/06/metas-secret-spying-scheme-effector-377</link>
  611.    <description>&lt;div class=&quot;field field--name-body field--type-text-with-summary field--label-hidden&quot;&gt;&lt;div class=&quot;field__items&quot;&gt;&lt;div class=&quot;field__item even&quot;&gt;&lt;p&gt;Keeping up on the latest digital rights news has never been easier. With a new look, &lt;a href=&quot;https://eff.org/effector/37/7&quot;&gt;EFF&#039;s EFFector newsletter&lt;/a&gt; covers the latest details on our work defending your rights to privacy and free expression online.&lt;/p&gt;
  612. &lt;p&gt;&lt;a href=&quot;https://eff.org/effector/37/7&quot;&gt;EFFector 37.7&lt;/a&gt; covers some of the very sneaky tactics that Meta has been using &lt;a href=&quot;https://www.eff.org/deeplinks/2025/06/protect-yourself-metas-latest-attack-privacy&quot;&gt;to track you online&lt;/a&gt;, and how you can mitigate some of this tracking. In this issue, we&#039;re also explaining the legal processes &lt;a href=&quot;https://www.eff.org/deeplinks/2025/06/how-cops-can-get-your-private-online-data&quot;&gt;police use to obtain your private online data&lt;/a&gt;, and providing an update on the &lt;a href=&quot;https://www.eff.org/deeplinks/2025/06/no-fakes-act-has-changed-and-its-so-much-worse&quot;&gt;NO FAKES Act&lt;/a&gt;—a U.S. Senate bill that takes a flawed approach to concerns about AI-generated &quot;replicas.&quot; &lt;/p&gt;
  613. &lt;p&gt;And, in case you missed it in the previous newsletter, we&#039;re debuting a &lt;a href=&quot;https://youtu.be/AVdo2IYxUEg&quot;&gt;new audio companion&lt;/a&gt; to EFFector as well! This time, Lena Cohen breaks down the ways that Meta tracks you online and what you—and lawmakers—can do to prevent that tracking. You can listen now on &lt;a href=&quot;https://youtu.be/AVdo2IYxUEg&quot;&gt;YouTube&lt;/a&gt; or the &lt;a href=&quot;https://archive.org/details/37.7_20250702&quot;&gt;Internet Archive&lt;/a&gt;.&lt;/p&gt;
  614. &lt;p class=&quot;take-action&quot;&gt;&lt;a href=&quot;https://youtu.be/AVdo2IYxUEg&quot;&gt;Listen TO EFFECTOR&lt;/a&gt;&lt;/p&gt;
  615. &lt;p class=&quot;take-action take-explainer&quot;&gt;&lt;span&gt;EFFECTOR 37.7 - META&#039;S SECRET SPYING SCHEME&lt;/span&gt;&lt;/p&gt;
  616. &lt;p&gt;&lt;span&gt;Since 1990 EFF has published EFFector to help keep readers on the bleeding edge of their digital rights. We know that the intersection of technology, civil liberties, human rights, and the law can be complicated, so EFFector is a great way to stay on top of things. The newsletter is chock full of links to updates, announcements, blog posts, and other stories to help keep readers—and listeners—up to date on the movement to protect online privacy and free expression. &lt;/span&gt;&lt;/p&gt;
  617. &lt;p&gt;&lt;span&gt;Thank you to the supporters around the world who make our work possible! If you&#039;re not a member yet, &lt;a href=&quot;https://eff.org/effect&quot;&gt;join EFF today&lt;/a&gt; to help us fight for a brighter digital future.&lt;/span&gt;&lt;/p&gt;
  618.  
  619. &lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
  620.     <pubDate>Wed, 02 Jul 2025 17:15:55 +0000</pubDate>
  621. <guid isPermaLink="false">110862 at https://www.eff.org</guid>
  622. <dc:creator>Christian Romero</dc:creator>
  623. <enclosure url="https://www.eff.org/files/banner_library/effector_banner_5.jpeg" alt="" type="image/jpeg" length="130379" />
  624.  </item>
  625.  <item>
  626.    <title>Podcast Episode: Cryptography Makes a Post-Quantum Leap </title>
  627.    <link>https://www.eff.org/deeplinks/2025/06/podcast-episode-cryptography-makes-post-quantum-leap</link>
  628.    <description>&lt;div class=&quot;field field--name-body field--type-text-with-summary field--label-hidden&quot;&gt;&lt;div class=&quot;field__items&quot;&gt;&lt;div class=&quot;field__item even&quot;&gt;&lt;p&gt;&lt;span data-contrast=&quot;auto&quot;&gt;The cryptography that protects our privacy and security online relies on the fact that even the strongest computers will take essentially forever to do certain tasks, like factoring prime numbers and finding discrete logarithms which are important for &lt;/span&gt;&lt;a href=&quot;https://en.wikipedia.org/wiki/RSA_cryptosystem&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;&lt;span data-contrast=&quot;none&quot;&gt;RSA encryption&lt;/span&gt;&lt;/a&gt;&lt;span data-contrast=&quot;auto&quot;&gt;, &lt;/span&gt;&lt;a href=&quot;https://en.wikipedia.org/wiki/Diffie%E2%80%93Hellman_key_exchange&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;&lt;span data-contrast=&quot;none&quot;&gt;Diffie-Hellman key exchanges&lt;/span&gt;&lt;/a&gt;&lt;span data-contrast=&quot;auto&quot;&gt;, and &lt;/span&gt;&lt;a href=&quot;https://en.wikipedia.org/wiki/Elliptic-curve_cryptography&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;&lt;span data-contrast=&quot;none&quot;&gt;elliptic curve&lt;/span&gt;&lt;/a&gt;&lt;span data-contrast=&quot;auto&quot;&gt; encryption. But what happens when those problems – and the cryptography they underpin – are no longer infeasible for computers to solve? Will our online defenses collapse? &lt;/span&gt;&lt;/p&gt;
  629. &lt;p&gt;&lt;div class=&quot;mytube&quot; style=&quot;width: 100%px;&quot;&gt;
  630.  &lt;div class=&quot;mytubetrigger&quot; tabindex=&quot;0&quot;&gt;
  631.  
  632.    &lt;img src=&quot;https://www.eff.org/sites/all/modules/custom/mytube/play.png&quot; class=&quot;mytubeplay&quot; alt=&quot;play&quot; style=&quot;top: -4px; left: 20px;&quot; /&gt;
  633.    &lt;div hidden class=&quot;mytubeembedcode&quot;&gt;%3Ciframe%20height%3D%2252px%22%20width%3D%22100%25%22%20frameborder%3D%22no%22%20scrolling%3D%22no%22%20seamless%3D%22%22%20src%3D%22https%3A%2F%2Fplayer.simplecast.com%2Fcf786418-1f0e-452e-8026-ef1a38c77f4e%3Fdark%3Dtrue%26amp%3Bcolor%3D000000%22%20allow%3D%22autoplay%22%3E%3C%2Fiframe%3E&lt;/div&gt;
  634.  &lt;/div&gt;
  635.  &lt;div class=&quot;mytubetext&quot;&gt;
  636.    &lt;span&gt;&lt;a href=&quot;https://www.eff.org/deeplinks/2008/02/embedded-video-and-your-privacy&quot; rel=&quot;noreferrer&quot; target=&quot;_blank&quot;&gt;Privacy info.&lt;/a&gt;&lt;/span&gt;
  637.    &lt;span&gt;This embed will serve content from &lt;em&gt;&lt;a rel=&quot;nofollow&quot; href=&quot;https://player.simplecast.com/cf786418-1f0e-452e-8026-ef1a38c77f4e?dark=true&amp;amp;color=000000&quot;&gt;simplecast.com&lt;/a&gt;&lt;/em&gt;&lt;br /&gt;&lt;/span&gt;
  638.  &lt;/div&gt;
  639. &lt;/div&gt;
  640. &lt;/p&gt;
  641. &lt;p&gt;&lt;span data-contrast=&quot;auto&quot;&gt;&lt;/span&gt;&lt;span data-contrast=&quot;auto&quot;&gt;&lt;i&gt;&lt;a href=&quot;https://open.spotify.com/show/4UAplFpPDqE4hWlwsjplgt&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;&lt;img src=&quot;https://www.eff.org/files/2021/11/01/spotify-podcast-badge-blk-wht-330x80.png&quot; alt=&quot;Listen on Spotify Podcasts Badge&quot; width=&quot;198&quot; height=&quot;48&quot; /&gt;&lt;/a&gt; &lt;a href=&quot;https://podcasts.apple.com/us/podcast/effs-how-to-fix-the-internet/id1539719568&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;&lt;img src=&quot;https://www.eff.org/files/2021/11/01/applebadge2.png&quot; alt=&quot;Listen on Apple Podcasts Badge&quot; width=&quot;195&quot; height=&quot;47&quot; /&gt;&lt;/a&gt; &lt;a href=&quot;https://music.amazon.ca/podcasts/bf81f00f-11e1-431f-918d-374ab6ad07cc/how-to-fix-the-internet?ref=dmm_art_us_HTFTI&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;&lt;img height=&quot;47&quot; width=&quot;195&quot; src=&quot;https://www.eff.org/files/styles/kittens_types_wysiwyg_small/public/2024/02/15/us_listenon_amazonmusic_button_charcoal.png?itok=YFXPE4Ii&quot; /&gt;&lt;/a&gt; &lt;a href=&quot;https://feeds.eff.org/howtofixtheinternet&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;&lt;img src=&quot;https://www.eff.org/files/2021/11/01/subscriberss.png&quot; alt=&quot;Subscribe via RSS badge&quot; width=&quot;194&quot; height=&quot;50&quot; /&gt;&lt;/a&gt;&lt;/i&gt;&lt;/span&gt;&lt;/p&gt;
  642. &lt;p&gt;&lt;span data-contrast=&quot;auto&quot;&gt;(You can also find this episode on the &lt;a href=&quot;https://archive.org/details/htfti-s6e5-deirdre-connolly-vfinal&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;Internet Archive&lt;/a&gt; and on &lt;a href=&quot;https://youtu.be/aAofveEC5kg?si=Kn8w1BuuRz-gGhaa&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;YouTube&lt;/a&gt;.)&lt;/span&gt;&lt;span data-ccp-props=&quot;279}&quot;&gt; &lt;/span&gt;&lt;/p&gt;
  643. &lt;p&gt;&lt;span data-contrast=&quot;auto&quot;&gt;Not if Deirdre Connolly can help it. As a cutting-edge thinker in post-quantum cryptography, Connolly is making sure that the next giant leap forward in computing – &lt;/span&gt;&lt;a href=&quot;https://en.wikipedia.org/wiki/Quantum_computing&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;&lt;span data-contrast=&quot;none&quot;&gt;quantum machines&lt;/span&gt;&lt;/a&gt;&lt;span data-contrast=&quot;auto&quot;&gt; that use principles of subatomic mechanics to ignore some constraints of classical mathematics and solve complex problems much faster – don’t reduce our digital walls to rubble. Connolly joins EFF’s Cindy Cohn and Jason Kelley to discuss not only how post-quantum cryptography can shore up those existing walls but also help us find entirely new methods of protecting our information.&lt;/span&gt;&lt;span data-ccp-props=&quot;279}&quot;&gt; &lt;/span&gt;&lt;/p&gt;
  644. &lt;p&gt;&lt;span data-contrast=&quot;auto&quot;&gt;In this episode you’ll learn about:&lt;/span&gt;&lt;span data-ccp-props=&quot;240}&quot;&gt; &lt;/span&gt;&lt;/p&gt;
  645. &lt;ul&gt;
  646. &lt;li data-leveltext=&quot;&quot; data-font=&quot;Symbol&quot; data-listid=&quot;1&quot; data-list-defn-props=&quot;&amp;quot;hybridMultilevel&amp;quot;}&quot; data-aria-posinset=&quot;1&quot; data-aria-level=&quot;1&quot;&gt;&lt;span data-contrast=&quot;auto&quot;&gt;Why we’re not yet sure exactly what quantum computing can do yet, and that’s exactly why we need to think about post-quantum cryptography now&lt;/span&gt;&lt;span data-ccp-props=&quot;240}&quot;&gt; &lt;/span&gt;&lt;/li&gt;
  647. &lt;li data-leveltext=&quot;&quot; data-font=&quot;Symbol&quot; data-listid=&quot;1&quot; data-list-defn-props=&quot;&amp;quot;hybridMultilevel&amp;quot;}&quot; data-aria-posinset=&quot;1&quot; data-aria-level=&quot;1&quot;&gt;&lt;span data-contrast=&quot;auto&quot;&gt;What a “Harvest Now, Decrypt Later” attack is, and what’s happening today to defend against it&lt;/span&gt;&lt;/li&gt;
  648. &lt;li data-leveltext=&quot;&quot; data-font=&quot;Symbol&quot; data-listid=&quot;1&quot; data-list-defn-props=&quot;&amp;quot;hybridMultilevel&amp;quot;}&quot; data-aria-posinset=&quot;1&quot; data-aria-level=&quot;1&quot;&gt;&lt;span data-contrast=&quot;auto&quot;&gt;How cryptographic collaboration, competition, and community are key to exploring a variety of paths to post-quantum resilience&lt;/span&gt;&lt;/li&gt;
  649. &lt;li data-leveltext=&quot;&quot; data-font=&quot;Symbol&quot; data-listid=&quot;1&quot; data-list-defn-props=&quot;&amp;quot;hybridMultilevel&amp;quot;}&quot; data-aria-posinset=&quot;1&quot; data-aria-level=&quot;1&quot;&gt;&lt;span data-contrast=&quot;auto&quot;&gt;Why preparing for post-quantum cryptography is and isn’t like fixing the Y2K bug&lt;/span&gt;&lt;/li&gt;
  650. &lt;li data-leveltext=&quot;&quot; data-font=&quot;Symbol&quot; data-listid=&quot;1&quot; data-list-defn-props=&quot;&amp;quot;hybridMultilevel&amp;quot;}&quot; data-aria-posinset=&quot;1&quot; data-aria-level=&quot;1&quot;&gt;&lt;span data-contrast=&quot;auto&quot;&gt;H&lt;/span&gt;&lt;span data-contrast=&quot;auto&quot;&gt;ow the best impact that end users can hope for from post-quantum cryptography is no visible impact at all&lt;/span&gt;&lt;/li&gt;
  651. &lt;li data-leveltext=&quot;&quot; data-font=&quot;Symbol&quot; data-listid=&quot;1&quot; data-list-defn-props=&quot;&amp;quot;hybridMultilevel&amp;quot;}&quot; data-aria-posinset=&quot;1&quot; data-aria-level=&quot;1&quot;&gt;&lt;span data-contrast=&quot;auto&quot;&gt;Don’t worry—you won’t have to know, or learn, any math for this episode! &lt;/span&gt;&lt;span data-ccp-props=&quot;240}&quot;&gt; &lt;/span&gt;&lt;/li&gt;
  652. &lt;/ul&gt;
  653. &lt;p&gt;&lt;a href=&quot;https://durumcrustulum.com/&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;&lt;span data-contrast=&quot;none&quot;&gt;Deirdre Connolly&lt;/span&gt;&lt;/a&gt;&lt;span data-contrast=&quot;auto&quot;&gt; is a research and applied cryptographer at &lt;/span&gt;&lt;a href=&quot;https://www.sandboxaq.com/&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;&lt;span data-contrast=&quot;none&quot;&gt;Sandbox AQ&lt;/span&gt;&lt;/a&gt;&lt;span data-contrast=&quot;auto&quot;&gt; with particular expertise in post-quantum encryption. She also co-hosts the “&lt;/span&gt;&lt;a href=&quot;https://securitycryptographywhatever.com/&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;&lt;span data-contrast=&quot;none&quot;&gt;Security Cryptography Whatever&lt;/span&gt;&lt;/a&gt;&lt;span data-contrast=&quot;auto&quot;&gt;” podcast about modern computer security and cryptography, with a focus on engineering and real-world experiences. Earlier, she was an engineer at the &lt;/span&gt;&lt;a href=&quot;https://zfnd.org/&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;&lt;span data-contrast=&quot;none&quot;&gt;Zcash Foundation&lt;/span&gt;&lt;/a&gt;&lt;span data-contrast=&quot;auto&quot;&gt; – a nonprofit that builds financial privacy infrastructure for the public good – as well as at &lt;/span&gt;&lt;a href=&quot;https://www.brightcove.com/&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;&lt;span data-contrast=&quot;none&quot;&gt;Brightcove&lt;/span&gt;&lt;/a&gt;&lt;span data-contrast=&quot;auto&quot;&gt;, &lt;/span&gt;&lt;a href=&quot;https://www.akamai.com/&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;&lt;span data-contrast=&quot;none&quot;&gt;Akamai&lt;/span&gt;&lt;/a&gt;&lt;span data-contrast=&quot;auto&quot;&gt;, and &lt;/span&gt;&lt;a href=&quot;https://www.hubspot.com/&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;&lt;span data-contrast=&quot;none&quot;&gt;HubSpot&lt;/span&gt;&lt;/a&gt;&lt;span data-contrast=&quot;auto&quot;&gt;.&lt;/span&gt;&lt;span data-ccp-props=&quot;{}&quot;&gt; &lt;/span&gt;&lt;/p&gt;
  654. &lt;p&gt;&lt;span data-contrast=&quot;auto&quot;&gt;Resources:&lt;/span&gt;&lt;span data-ccp-props=&quot;{}&quot;&gt; &lt;/span&gt;&lt;/p&gt;
  655. &lt;ul&gt;
  656. &lt;li data-leveltext=&quot;&quot; data-font=&quot;Symbol&quot; data-listid=&quot;2&quot; data-list-defn-props=&quot;&amp;quot;hybridMultilevel&amp;quot;}&quot; data-aria-posinset=&quot;1&quot; data-aria-level=&quot;1&quot;&gt;&lt;span data-contrast=&quot;auto&quot;&gt;A Few Thoughts on Cryptographic Engineering: “&lt;/span&gt;&lt;a href=&quot;https://blog.cryptographyengineering.com/2019/09/24/looking-back-at-the-snowden-revelations/&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;&lt;span data-contrast=&quot;none&quot;&gt;Looking back at the Snowden revelations&lt;/span&gt;&lt;/a&gt;&lt;span data-contrast=&quot;auto&quot;&gt;” by Matthew Green (Sept. 24, 2019)&lt;/span&gt;&lt;/li&gt;
  657. &lt;li data-leveltext=&quot;&quot; data-font=&quot;Symbol&quot; data-listid=&quot;2&quot; data-list-defn-props=&quot;&amp;quot;hybridMultilevel&amp;quot;}&quot; data-aria-posinset=&quot;1&quot; data-aria-level=&quot;1&quot;&gt;&lt;span data-contrast=&quot;auto&quot;&gt;The National Security Agency’s &lt;/span&gt;&lt;a href=&quot;https://en.wikipedia.org/wiki/PRISM&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;&lt;span data-contrast=&quot;none&quot;&gt;PRISM&lt;/span&gt;&lt;/a&gt;&lt;span data-contrast=&quot;auto&quot;&gt; program&lt;/span&gt;&lt;/li&gt;
  658. &lt;li data-leveltext=&quot;&quot; data-font=&quot;Symbol&quot; data-listid=&quot;2&quot; data-list-defn-props=&quot;&amp;quot;hybridMultilevel&amp;quot;}&quot; data-aria-posinset=&quot;1&quot; data-aria-level=&quot;1&quot;&gt;&lt;span data-contrast=&quot;auto&quot;&gt;National Institute of Standards and Technology (NIST) Information Technology Laboratory Computer Security Resource Center’s &lt;/span&gt;&lt;a href=&quot;https://csrc.nist.gov/projects/post-quantum-cryptography&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;&lt;span data-contrast=&quot;none&quot;&gt;Post-Quantum Cryptography Project&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
  659. &lt;li data-leveltext=&quot;&quot; data-font=&quot;Symbol&quot; data-listid=&quot;2&quot; data-list-defn-props=&quot;&amp;quot;hybridMultilevel&amp;quot;}&quot; data-aria-posinset=&quot;1&quot; data-aria-level=&quot;1&quot;&gt;&lt;span data-contrast=&quot;auto&quot;&gt;NIST Information Technology Laboratory Computer Security Research Center &lt;/span&gt;&lt;a href=&quot;https://csrc.nist.gov/glossary&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;&lt;span data-contrast=&quot;none&quot;&gt;Glossary&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
  660. &lt;li data-leveltext=&quot;&quot; data-font=&quot;Symbol&quot; data-listid=&quot;2&quot; data-list-defn-props=&quot;&amp;quot;hybridMultilevel&amp;quot;}&quot; data-aria-posinset=&quot;1&quot; data-aria-level=&quot;1&quot;&gt;&lt;span data-contrast=&quot;auto&quot;&gt;Deirdre Connolly’s &lt;/span&gt;&lt;a href=&quot;https://www.youtube.com/@durumcrustulum&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;&lt;span data-contrast=&quot;none&quot;&gt;YouTube channel&lt;/span&gt;&lt;/a&gt;&lt;span data-ccp-props=&quot;240}&quot;&gt; &lt;/span&gt;&lt;/li&gt;
  661. &lt;/ul&gt;
  662. &lt;p&gt;&lt;span data-contrast=&quot;auto&quot;&gt;What do you think of “How to Fix the Internet?” &lt;/span&gt;&lt;a href=&quot;https://forms.office.com/pages/responsepage.aspx?id=qalRy_Njp0iTdV3Gz61yuZZXWhXf9ZdMjzPzrVjvr6VUNUlHSUtLM1lLMUNLWE42QzBWWDhXU1ZEQy4u&amp;amp;web=1&amp;amp;wdLOR=c90ABD667-F98F-9748-BAA4-CA50122F0423&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;&lt;span data-contrast=&quot;none&quot;&gt;Share your feedback here&lt;/span&gt;&lt;/a&gt;&lt;span data-contrast=&quot;auto&quot;&gt;.&lt;/span&gt;&lt;/p&gt;
  663. &lt;h3&gt;&lt;span data-ccp-props=&quot;259}&quot;&gt;Transcript&lt;/span&gt;&lt;/h3&gt;
  664. &lt;p&gt;&lt;strong&gt;DEIRDRE CONNOLLY:&lt;/strong&gt; I only got into cryptography and especially post quantum quickly after that. further into my professional life. I was a software engineer for a whil,e and the Snowden leaks happened, and phone records get leaked. All of Verizon&#039;s phone records get leaked. and then Prism and more leaks and more leaks. And as an engineer first, I felt like everything that I was building and we were building and telling people to use was vulnerable. &lt;br /&gt;I wanted to learn more about how to do things securely. I went further and further and further down the rabbit hole of cryptography. And then, I think I saw a talk which was basically like, oh, elliptic curves are vulnerable to a quantum attack. And I was like, well, I, I really like these things. They&#039;re very elegant mathematical objects, it&#039;s very beautiful. I was sad that they were fundamentally broken, and, I think it was, Dan Bernstein who was like, well, there&#039;s this new thing that uses elliptic curves, but is supposed to be post quantum secure. &lt;br /&gt;But the math is very difficult and no one understands it. I was like, well, I want to understand it if it preserves my beautiful elliptic curves. That&#039;s how I just went, just running, screaming downhill into post quantum cryptography.&lt;/p&gt;
  665. &lt;p&gt;&lt;strong&gt;CINDY COHN:&lt;/strong&gt; That&#039;s Deirdre Connolly talking about how her love of beautiful math and her anger at the Snowden revelations about how the government was undermining security, led her to the world of post-quantum cryptography.&lt;br /&gt;I&#039;m Cindy Cohn, the executive director of the Electronic Frontier Foundation.&lt;/p&gt;
  666. &lt;p&gt;&lt;strong&gt;JASON KELLEY:&lt;/strong&gt; And I&#039;m Jason Kelley, EFF&#039;s activism director. You&#039;re listening to How to Fix the Internet.&lt;/p&gt;
  667. &lt;p&gt;&lt;strong&gt;CINDY COHN:&lt;/strong&gt; On this show we talk to tech leaders, policy-makers, thinkers, artists and engineers about what the future could look like if we get things right online.&lt;/p&gt;
  668. &lt;p&gt;&lt;strong&gt;JASON KELLEY:&lt;/strong&gt; Our guest today is at the forefront of the future of digital security. And just a heads up that this is one of the more technical episodes that we&#039;ve recorded -- you&#039;ll hear quite a bit of cryptography jargon, so we&#039;ve written up some of the terms that come up in the show notes, so take a look there if you hear a term you don&#039;t recognize.&lt;/p&gt;
  669. &lt;p&gt;&lt;strong&gt;CINDY COHN:&lt;/strong&gt; Deidre Connolly is a research engineer and applied cryptographer at Sandbox AQ, with a particular expertise in post-quantum encryption. She also co-hosts the Security, Cryptography, Whatever podcast, so she&#039;s something of a cryptography influencer too. When we asked our tech team here at EFF who we should be speaking with on this episode about quantum cryptography and quantum computers more generally, everyone agreed that Deirdre was the person. So we&#039;re very glad to have you here. Welcome, Deirdre.&lt;/p&gt;
  670. &lt;p&gt;&lt;strong&gt;DEIRDRE CONNOLLY:&lt;/strong&gt; Thank you very much for having me. Hi.&lt;/p&gt;
  671. &lt;p&gt;&lt;strong&gt;CINDY COHN:&lt;/strong&gt; Now we obviously work with a lot of technologists here and, and certainly personally cryptography is near and dear to my heart, but we are not technologists, neither Jason nor I. So can you just give us a baseline of what post-quantum cryptography is and why people are talking about it?&lt;/p&gt;
  672. &lt;p&gt;&lt;strong&gt;DEIRDRE CONNOLLY:&lt;/strong&gt; Sure. So a lot of the cryptography that we have deployed in the real world relies on a lot of math and security assumptions on that math based on things like abstract groups, Diffie-Hellman, elliptic curves, finite fields, and factoring prime numbers such as, uh, systems like RSA. &lt;br /&gt;All of these, constructions and problems, mathematical problems, have served us very well in the last 40-ish years of cryptography. They&#039;ve let us build very useful, efficient, small cryptography that we&#039;ve deployed in the real world. It turns out that they are all also vulnerable in the same way to advanced cryptographic attacks that are only possible and only efficient when run on a quantum computer, and this is a class of computation, a whole new class of computation versus digital computers, which is the main computing paradigm that we&#039;ve been used to for the last 75 years plus. &lt;br /&gt;Quantum computers allow these new classes of attacks, especially, variants of Shore&#039;s algorithm – named Dr. Peter Shore – that basically when run on a sufficiently large, cryptographically relevant quantum computer, makes all of the asymmetric cryptography based on these problems that we&#039;ve deployed very, very vulnerable. &lt;br /&gt;So post-quantum cryptography is trying to take that class of attack into consideration and building cryptography to both replace what we&#039;ve already deployed and make it resilient to this kind of attack, and trying to see what else we can do with these fundamentally different mathematical and cryptographic assumptions when building cryptography.&lt;/p&gt;
  673. &lt;p&gt;&lt;strong&gt;CINDY COHN:&lt;/strong&gt; So we&#039;ve kind of, we&#039;ve secured our stuff behind a whole lot of walls, and we&#039;re slowly building a bulldozer. This is a particular piece of the world where the speed at which computers can do things has been part of our protection, and so we have to rethink that.&lt;/p&gt;
  674. &lt;p&gt;&lt;strong&gt;DEIRDRE CONNOLLY:&lt;/strong&gt; Yeah, quantum computing is a fundamentally new paradigm of how we process data that promises to have very interesting, uh, and like, applications beyond what we can envision right now. Like things like protein folding, chemical analysis, nuclear simulation, and cryptanalysts, or very strong attacks against cryptography.&lt;br /&gt;But it is a field where it&#039;s such a fundamentally new computational paradigm that we don&#039;t even know what its applications fully would be yet, because like we didn&#039;t fully know what we were doing with digital computers in the forties and fifties. Like they were big calculators at one time.&lt;/p&gt;
  675. &lt;p&gt;&lt;strong&gt;JASON KELLEY:&lt;/strong&gt; When it was suggested that we talk to you about this. I admit that I have not heard much about this field, and I realized quickly when looking into it that there&#039;s sort of a ton of hype around quantum computing and post-quantum cryptography and that kind of hype can make it hard to know whether or not something is like actually going to be a big thing or, whether this is something that&#039;s becoming like an investment cycle, like a lot of things do. And one of the things that quickly came up as an actual, like real danger is what&#039;s called sort of “save now decrypt later.”&lt;/p&gt;
  676. &lt;p&gt;&lt;strong&gt;DEIRDRE CONNOLLY:&lt;/strong&gt; Oh yeah.&lt;/p&gt;
  677. &lt;p&gt;&lt;strong&gt;JASON KELLEY:&lt;/strong&gt; Right? We have all these messages, for example, that have been encrypted with current encryption methods. And if someone holds onto those, they can decrypt them using quantum computers in the future. How serious is that danger?&lt;/p&gt;
  678. &lt;p&gt;&lt;strong&gt;DEIRDRE CONNOLLY:&lt;/strong&gt; It’s definitely a concern and it&#039;s the number one driver I would say to post-quantum crypto adoption in broad industry right now is mitigating the threat of a Store Now/Decrypt Later attack, also known as Harvest Now/Decrypt Later, a bunch of names that all mean the same thing.&lt;br /&gt;And fundamentally, it&#039;s, uh, especially if you&#039;re doing any kind of key agreement over a public channel, and doing key agreement over a public channel is part of the whole purpose of like, you want to be able to talk to someone who you&#039;ve never really, touched base with before, and you all kind of know, some public parameters that even your adversary knows and based on just the fact that you can send messages to each other and some public parameters, and some secret values that only you know, and only the other party knows you can establish a shared secret, and then you can start encrypting traffic between you to communicate. And this is what you do in your web browser when you have an HTTPS connection, that&#039;s over TLS.&lt;br /&gt;This is what you do with Signal or WhatsApp or any, or, you know, Facebook Messenger with the encrypted communications. They&#039;re using Diffie-Helman as part of the protocol to set up a shared secret, and then you use that to encrypt their message bodies that you&#039;re sending back and forth between you.&lt;br /&gt;But if you can just store all those communications over that public channel, and the adversary knows the public parameters &#039;cause they&#039;re freely published, that&#039;s part of Kerckhoff’s Principle about good cryptography - the only thing that the adversary shouldn&#039;t know about your crypto system is the secret key values that you&#039;re actually using. It should be secure against an adversary that knows everything that you know, except the secret key material. &lt;br /&gt;And you can just record all those public messages and all the public key exchange messages, and you just store them in a big database somewhere. And then when you have your large cryptographically relevant quantum computer, you can rifle through your files and say, hmm, let&#039;s point it at this.&lt;br /&gt;And that&#039;s the threat that&#039;s live now to the stuff that we have already deployed and the stuff that we&#039;re continuing to do communications on now that is protected by elliptic curve Diffie Hellman, or Finite Field Diffie Hellman, or RSA. They can just record that and just theoretically point an attack at it at a later date when that attack comes online. &lt;br /&gt;So like in TLS, there&#039;s a lot of browsers and servers and infrastructure providers that have updated to post-quantum resilient solutions for TLS. So they&#039;re using a combination of the classic elliptic curve, Diffie Hellman and a post-quantum KEM, uh, called ML Kem that was standardized by the United States based on a public design that&#039;s been, you know, a multi international collaboration to help do this design. &lt;br /&gt;I think that&#039;s been deployed in Chrome, and I think it&#039;s deployed by CloudFlare and it&#039;s getting deployed – I think it&#039;s now become the default option in the latest version of Open SSL. And a lot of other open source projects, so that&#039;s TLS similar, approaches are being adopted in open SSH, the most popular SSH implementation in the world. Signal, the service has updated their key exchange to also include a post quantum KEM and their updated key establishments. So when you start a new conversation with someone or reset a conversation with someone that is the latest version of Signal is now protected against that sort of attack. &lt;br /&gt;That is definitely happening and it&#039;s happening the most rapidly because of that Store now/Decrypt later attack, which is considered live. Everything that we&#039;re doing now can just be recorded and then later when the attack comes online, they can attack us retroactively. So that&#039;s definitely a big driver of things changing in the wild right now.&lt;/p&gt;
  679. &lt;p&gt;&lt;strong&gt;JASON KELLEY:&lt;/strong&gt; Okay. I&#039;m going to throw out two parallels for my very limited knowledge to make sure I understand. This reminds me a little bit of sort of the work that had to be done before Y2K in, in the sense of like, now people think nothing went wrong and nothing was ever gonna go wrong, but all of us working anywhere near the field know actually it took a ton of work to make sure that nothing blew up or stopped working. &lt;br /&gt;And the other is that in, I think it was 1998, EFF was involved in something we called Deep Crack, where we made, that&#039;s a, I&#039;m realizing now that&#039;s a terrible name. But anyway, the DES cracker, um, we basically wanted to show that DES was capable of being cracked, right? And that this was a - correct me if I&#039;m wrong - it was some sort of cryptographic standard that the government was using and people wanted to show that it wasn&#039;t sufficient.&lt;/p&gt;
  680. &lt;p&gt;&lt;strong&gt;DEIRDRE CONNOLLY:&lt;/strong&gt; Yes - I think it was the first digital encryption standard. And then after its vulnerability was shown, they, they tripled it up to, to make it useful. And that&#039;s why Triple DES is still used in a lot of places and is actually considered okay. And then later came the advanced encryption standard, AES, which we prefer today.&lt;/p&gt;
  681. &lt;p&gt;&lt;strong&gt;JASON KELLEY:&lt;/strong&gt; Okay, so we&#039;ve learned the lesson, or we are learning the lesson, it sounds like.&lt;/p&gt;
  682. &lt;p&gt;&lt;strong&gt;DEIRDRE CONNOLLY:&lt;/strong&gt; Uh huh.&lt;/p&gt;
  683. &lt;p&gt;&lt;strong&gt;CINDY COHN:&lt;/strong&gt; Yeah, I think that that&#039;s, that&#039;s right. I mean, EFF built the DES cracker because in the nineties the government was insisting that something that everybody knew was really, really insecure and was going to only get worse as computers got stronger and, and strong computers got in more people&#039;s hands, um, to basically show that the emperor had no clothes, um, that this wasn&#039;t very good. &lt;br /&gt;And I think with the NIST standards and what&#039;s happening with post-quantum is really, you know, the hopeful version is we learned that lesson and we&#039;re not seeing government trying to pretend like there isn&#039;t a risk in order to preserve old standards, but instead leading the way with new ones. Is that fair?&lt;/p&gt;
  684. &lt;p&gt;&lt;strong&gt;DEIRDRE CONNOLLY:&lt;/strong&gt; That is very fair. NIST ran this post-quantum competition almost over 10 years, and it had over 80 submissions in the first round from all over the world, from industry, academia, and a mix of everything in between, and then it narrowed it down to. the three that are, they&#039;re not all out yet, but there&#039;s the key agreement, one called ML Kem, and three signatures. And there&#039;s a mix of cryptographic problems that they&#039;re based on, but there were multiple rounds, lots of feedback, lots of things got broken. &lt;br /&gt;This competition has absolutely led the way for the world of getting ready for post-quantum cryptography. There are some competitions that have happened in Korea, and I think there&#039;s some work happening in China for their, you know, for their area.&lt;br /&gt;There are other open standards and there are standards happening in other standards bodies, but the NIST competition has led the way, and it, because it&#039;s all open and all these standards are open and all of the work and the cryptanalysis that has gone in for the whole stretch. It&#039;s all been public and all these standards and drafts and analysis and attacks have been public. It&#039;s able to benefit everyone in the world.&lt;/p&gt;
  685. &lt;p&gt;&lt;strong&gt;CINDY COHN:&lt;/strong&gt; I got started in the crypto wars in the nineties where the government was kind of the problem and they still are. And I do wanna ask you about whether you&#039;re seeing any role of the kinda national social security, FBI infrastructure, which has traditionally tried to put a thumb on the scales and make things less secure so that they could have access, if you&#039;re seeing any of that there. &lt;br /&gt;But on the NIST side, I think this provides a nice counter example of how government can help facilitate building a better world sometimes, as opposed to being the thing we have to drag kicking and screaming into it.&lt;br /&gt;But let me circle around to the question I embedded in that, which is, you know, one of the problems that that, that we know happened in the nineties around DES, and then of course some of the Snowden revelations indicated some mucking about in security as well behind the scenes by the NSA. Are you seeing anything like that and, and what should we be on the lookout for?&lt;/p&gt;
  686. &lt;p&gt;&lt;strong&gt;DEIRDRE CONNOLLY:&lt;/strong&gt; Not in the PQC stuff. Uh, there, like there have been a lot of people that were paying very close attention to what these independent teams were proposing and then what was getting turned into a standard or a proposed standard and every little change, because I, I was closely following the key establishment stuff.&lt;br /&gt;Um, every little change people were trying to be like, did you tweak? Why did you tweak that? Did, like, is there a good reason? And like, running down basically all of those things. And like including trying to get into the nitty gritty of like. Okay. We think this is approximately these many bits of security using these parameter and like talking about, I dunno, 123 versus 128 bits and like really paying attention to all of that stuff.&lt;br /&gt;And I don&#039;t think there was any evidence of anything like that. And, and for, for plus or minus, because there were. I don&#039;t remember which crypto scheme it was, but it, there was definitely an improvement from, I think some of the folks at NSA very quietly back in the day to, I think it was the S boxes, and I don&#039;t remember if it was DES or AES or whatever it was.&lt;br /&gt;But people didn&#039;t understand at the time because it was related to advanced, uh, I think it was a differential crypto analysis attacks that folks inside there knew about, and people in outside academia didn&#039;t quite know about yet. And then after the fact they were like, oh, they&#039;ve made this better. Um, we&#039;re not, we&#039;re not even seeing any evidence of anything of that character either.&lt;br /&gt;It&#039;s just sort of like, it&#039;s very open letting, like if everything&#039;s proceeding well and the products are going well of these post-quantum standards, like, you know, leave it alone. And so everything looks good. And like, especially for NSA, uh, national Security Systems in the, in the United States, they have updated their own targets to migrate to post-quantum, and they are relying fully on the highest security level of these new standards.&lt;br /&gt;So like they are eating their own dog food. They&#039;re protecting the highest classified systems and saying these need to be fully migrated to fully post quantum key agreement. Uh, and I think signatures at different times, but there has to be by like 2035. So if they were doing anything to kind of twiddle with those standards, they&#039;d be, you know, hurting themselves and shooting themselves in the foot.&lt;/p&gt;
  687. &lt;p&gt;&lt;strong&gt;CINDY COHN:&lt;/strong&gt; Well fingers crossed.&lt;/p&gt;
  688. &lt;p&gt;&lt;strong&gt;DEIRDRE CONNOLLY:&lt;/strong&gt; Yes.&lt;/p&gt;
  689. &lt;p&gt;&lt;strong&gt;CINDY COHN:&lt;/strong&gt; Because I wanna build a better internet and a better. Internet means that they aren&#039;t secretly messing around with our security. And so this is, you know, cautiously good news.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;JASON KELLEY:&lt;/strong&gt; Let&#039;s take a quick moment to thank our sponsor.&lt;br /&gt;“How to Fix the Internet” is supported by The Alfred P. Sloan Foundation’s Program in Public Understanding of Science and Technology. Enriching people’s lives through a keener appreciation of our increasingly technological world and portraying the complex humanity of scientists, engineers, and mathematicians.&lt;br /&gt;We also want to thank EFF members and donors. EFF has been fighting for digital rights for 35 years, and that fight is bigger than ever, so please, if you like what we do, go to eff.org/pod to donate. Also, we’d love for you to join us at this year’s EFF awards, where we celebrate the people working towards the better digital future that we all care so much about. Those are coming up on September 12th in San Francisco. You can find more information about that at eff.org/awards.&lt;br /&gt;We also wanted to share that our friend Cory Doctorow has a new podcast. Listen to this.  [Who Broke the Internet trailer]&lt;/p&gt;
  690. &lt;p&gt;&lt;strong&gt;JASON KELLEY:&lt;/strong&gt; And now, back to our conversation with Deirdre Connolly.&lt;/p&gt;
  691. &lt;p&gt;&lt;strong&gt;CINDY COHN:&lt;/strong&gt; I think the thing that&#039;s fascinating about this is kind of seeing this cat and mouse game about the ability to break codes, and the ability to build codes and systems that are resistant to the breaking, kind of playing out here in the context of building better computers for everyone.&lt;br /&gt;And I think it&#039;s really fascinating and I think it also for people I. You know, this is a pretty technical conversation, um, even, you know, uh, for our audience. But this is the stuff that goes on under the hood of how we keep journalists safe, how we keep activists safe, how we keep us all safe, whether it&#039;s our bank accounts or our, you know, people are talking about mobile IDs now and other, you know, all sorts of sensitive documents that are going to not be in physical form anymore, but are gonna be in digital form. &lt;br /&gt;And unless we get this lock part right, we&#039;re really creating problems for people. And you know, what I really appreciate about you and the other people kind of in the midst of this fight is it&#039;s very unsung, right? It&#039;s kind of under the radar for the rest of us, but yet it&#039;s the, it&#039;s the ground that we need to stand on to, to be safe moving forward.&lt;/p&gt;
  692. &lt;p&gt;&lt;strong&gt;DEIRDRE CONNOLLY:&lt;/strong&gt; Yeah, and there&#039;s a lot of assumptions, uh, that even the low level theoretical cryptographers and the people implementing their, their stuff into software and the stuff, the people trying to deploy, that there&#039;s a, a lot of assumptions that have been baked into what we&#039;ve built that to a degree don&#039;t quite fit in some of the, the things we&#039;ve been able to build in a post-quantum secure way, or the way we think it&#039;s a post-quantum secure way.&lt;br /&gt;Um, we&#039;re gonna need to change some stuff and we think we know how to change some stuff to make it work. but we are hoping that we don&#039;t accidentally introduce any vulnerabilities or gaps. &lt;br /&gt;We&#039;re trying, but also we&#039;re not a hundred percent sure that we&#039;re not missing something, &#039;cause these things are new. And so we&#039;re trying, and we&#039;re also trying to make sure we don&#039;t break things as we change them because we&#039;re trying to change them to be post quantum resilient. But you know, once you change something, if there&#039;s a possibility, you, you just didn&#039;t understand it completely. And you don&#039;t wanna break something that was working well in one direction because you wanna improve it in another direction.&lt;/p&gt;
  693. &lt;p&gt;&lt;strong&gt;CINDY COHN:&lt;/strong&gt; And that&#039;s why I think it&#039;s important to continue to have a robust community of people who are the breakers, right? Who are, are hackers, who are, who are attacking. And that is a, you know, that&#039;s a mindset, right? That&#039;s a way of thinking about stuff that is important to protect and nurture, um, because, you know, there&#039;s an old quote from Bruce Schneider: Anyone can build a crypto system that they themselves cannot break. Right? It takes a community of people trying to really pound away at something to figure out where the holes are. &lt;br /&gt;And you know, a lot of the work that EFF does around coders rights and other kinds of things is to make sure that there&#039;s space for that. and I think it&#039;s gonna be as needed in a quantum world as it was in a kind of classical computer world.&lt;/p&gt;
  694. &lt;p&gt;&lt;strong&gt;DEIRDRE CONNOLLY:&lt;/strong&gt; Absolutely. I&#039;m confident that we will learn a lot more from the breakers about this new cryptography because, like, we&#039;ve tried to be robust through this, you know, NIST competition, and a lot of those, the things that we learn apply to other constructions as they come out. but like there&#039;s a whole area of people who are going to be encountering this kind of newish cryptography for the first time, and they kind of look at it and they&#039;re like. Oh, uh, I, I think I might be able to do something interesting with this, and we&#039;re, we&#039;ll all learn more and we&#039;ll try to patch and update as quickly as possible&lt;/p&gt;
  695. &lt;p&gt;&lt;strong&gt;JASON KELLEY:&lt;/strong&gt; And this is why we have competitions to figure out what the best options are and why some people might favor one algorithm over another for different, different processes and things like that.&lt;/p&gt;
  696. &lt;p&gt;&lt;strong&gt;DEIDRE CONNOLLY:&lt;/strong&gt; And that&#039;s why we&#039;re probably gonna have a lot of different flavors of post-quantum cryptography getting deployed in the world because it&#039;s not just, ah, you know, I don&#039;t love NIST. I&#039;m gonna do my own thing in my own country over here. Or, or have different requirements. There is that at play, but also you&#039;re trying to not put all your eggs in one basket as well.&lt;/p&gt;
  697. &lt;p&gt;&lt;strong&gt;CINDY COHN:&lt;/strong&gt; Yeah, so we want a menu of things so that people can really pick, from, you know, vetted, but different strategies. So I wanna ask the kind of core question for the podcast, which is, um, what does it look like if we get this right, if we get quantum computing and, you know, post-quantum crypto, right?&lt;br /&gt;How does the world look different? Or does it just look the same? How, what, what does it look like if we do this well?&lt;/p&gt;
  698. &lt;p&gt;&lt;strong&gt;DEIRDRE CONNOLLY:&lt;/strong&gt; Hopefully to a person just using their phone or using their computer to talk to somebody on the other side of the world, hopefully they don&#039;t notice. Hopefully to them, if they&#039;re, you know, deploying a website and they&#039;re like, ah, I need to get a Let’s Encrypt certificate or whatever.&lt;br /&gt;Hopefully Let&#039;s Encrypt just, you know, insert bot just kind of does everything right by default and they don&#039;t have to worry about it. &lt;br /&gt;Um, for the builders, it should be, we have a good recommended menu of cryptography that you can use when you&#039;re deploying TLS, when you&#039;re deploying SSH, uh, when you&#039;re building cryptographic applications, especially. &lt;br /&gt;So like if you are building something in Go or Java or you know, whatever it might be, the crypto library in your language will have the updated recommended signature algorithm or key agreement algorithm and be, like, this is how we, you know, they have code snippets to say like, this is how you should use it, and they will deprecate the older stuff. &lt;br /&gt;And, like, unfortunately there&#039;s gonna be a long time where there&#039;s gonna be a mix of the new post-quantum stuff that we know how to use and know how to deploy and protect. The most important, you know, stuff like to mitigate Store now/Decrypt later and, you know, get those signatures with the most important, uh, protected stuff.&lt;br /&gt;Uh, get those done. But there&#039;s a lot of stuff that we&#039;re not really clear about. How we wanna do it yet, and kind of going back to one of the things you mentioned earlier, uh, comparing this to Y2K, there was a lot of work that went into mitigating Y2K before, during, immediately after.&lt;br /&gt;Unfortunately, the comparison to the post quantum migration kind of falls down because after Y2K, if you hadn&#039;t fixed something, it would break. And you would notice in usually an obvious way, and then you could go find it. You, you fix the most important stuff that, you know, if it broke, like you would lose billions of dollars or, you know, whatever. You&#039;d have an outage. &lt;br /&gt;For cryptography, especially the stuff that&#039;s a little bit fancier. Um, you might not know it&#039;s broken because the adversary is not gonna, it&#039;s not gonna blow up.&lt;br /&gt;And you have to, you know, reboot a server or patch something and then, you know, redeploy. If it&#039;s gonna fail, it&#039;s gonna fail quietly. And so we&#039;re trying to kind of find these things, or at least make the kind of longer tail of stuff, uh, find fixes for that upfront, you know, so that at least the option is available. &lt;br /&gt;But for a regular person, hopefully they shouldn&#039;t notice. So everyone&#039;s trying really hard to make it so that the best security, in terms of the cryptography is deployed with, without downgrading your experience. We&#039;re gonna keep trying to do that.&lt;br /&gt;I don&#039;t wanna build crap and say “Go use it.” I want you to be able to just go about your life and use a tool that&#039;s supposed to be useful and helpful. And it&#039;s not accidentally leaking all your data to some third party service or just leaving a hole on your network for any, any actor who notices to walk through and you know, all that sort of stuff.&lt;br /&gt;So whether it&#039;s like implementing things securely in software, or it&#039;s cryptography or you know, post-quantum weirdness, like for me, I just wanna build good stuff for people, that&#039;s not crap.&lt;/p&gt;
  699. &lt;p&gt;&lt;strong&gt;JASON KELLEY:&lt;/strong&gt; Everyone listening to this agrees with you. We don&#039;t want to build crap. We want to build some beautiful things. Let&#039;s go out there and do it.&lt;/p&gt;
  700. &lt;p&gt;&lt;strong&gt;DEIRDRE CONNOLLY:&lt;/strong&gt; Cool.&lt;/p&gt;
  701. &lt;p&gt;&lt;strong&gt;JASON KELLEY:&lt;/strong&gt; Thank you so much, Deirdre.&lt;/p&gt;
  702. &lt;p&gt;&lt;strong&gt;DEIRDRE CONNOLLY:&lt;/strong&gt; Thank you!&lt;/p&gt;
  703. &lt;p&gt;&lt;strong&gt;CINDY COHN:&lt;/strong&gt; Thank you Deirdre. We really appreciate you coming and explaining all of this to, you know, uh, the lawyer and activist at EFF.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;JASON KELLEY:&lt;/strong&gt; Well, I think that was probably the most technical conversation we&#039;ve had, but I followed along pretty well and I feel like at first I was very nervous based on the, save and decrypt concerns. But after we talked to Deirdre, I feel like the people working on this. Just like for Y2K are pretty much gonna keep us out of hot water. And I learned a lot more than I did know before we started the conversation. What about you, Cindy?&lt;/p&gt;
  704. &lt;p&gt;&lt;strong&gt;CINDY COHN:&lt;/strong&gt; I learned a lot as well. I mean, cryptography and, attacks on security is always, you know, it&#039;s a process, and it&#039;s a process by which we do the best we can, and then, then we also do the best we can to rip it apart and find all the holes, and then we, we iterate forward. And it&#039;s nice to hear that that model is still the model, even as we get into something like quantum computers, which, um, frankly are still hard to conceptualize. &lt;br /&gt;But I agree. I think that what the good news outta this interview is I feel like there&#039;s a lot of pieces in place to try to do this right, to have this tremendous shift in computing that we don&#039;t know when it&#039;s coming, but I think that the research indicates that it SI coming, be something that we can handle, um, rather than something that overwhelms us.&lt;br /&gt;And I think that&#039;s really,it&#039;s good to hear that good people are trying to do the right thing here since it&#039;s not inevitable.&lt;/p&gt;
  705. &lt;p&gt;&lt;strong&gt;JASON KELLEY:&lt;/strong&gt; Yeah, and it is nice when someone&#039;s sort of best vision for what the future looks like is hopefully your life. You will have no impacts from this because everything will be taken care of. That&#039;s always good. &lt;br /&gt;I mean, it sounds like, you know, the main thing for EFF is, as you said, we have to make sure that security engineers, hackers have the resources that they need to protect us from these kinds of threats and, and other kinds of threats obviously.&lt;br /&gt;But, you know, that&#039;s part of EFF&#039;s job, like you mentioned. Our job is to make sure that there are people able to do this work and be protected while doing it so that when the. Solutions do come about. You know, they work and they&#039;re implemented and the average person doesn&#039;t have to know anything and isn&#039;t vulnerable.&lt;/p&gt;
  706. &lt;p&gt;&lt;strong&gt;CINDY COHN:&lt;/strong&gt; Yeah, I also think that, um, I appreciated her vision that this is a, you know, the future&#039;s gonna be not just one. Size fits all solution, but a menu of things that take into account, you know, both what works better in terms of, you know, bandwidth and compute time, but also what you know, what people actually need.&lt;br /&gt;And I think that&#039;s a piece that&#039;s kind of built into the way that this is happening that&#039;s also really hopeful. In the past and, and I was around when EFF built the DES cracker, um, you know, we had a government that was saying, you know, you know, everything&#039;s fine, everything&#039;s fine when everybody knew that things weren&#039;t fine. &lt;br /&gt;So it&#039;s also really hopeful that that&#039;s not the position that NIST is taking now, and that&#039;s not the position that people who may not even pick the NIST standards but pick other standards are really thinking through.&lt;/p&gt;
  707. &lt;p&gt;&lt;strong&gt;JASON KELLEY:&lt;/strong&gt; Yeah, it&#039;s very helpful and positive and nice to hear when something has improved for the better. Right? And that&#039;s what happened here. We had this, this different attitude from, you know, government at large in the past and it&#039;s changed and that&#039;s partly thanks to EFF, which is amazing.&lt;/p&gt;
  708. &lt;p&gt;&lt;strong&gt;CINDY COHN:&lt;/strong&gt; Yeah, I think that&#039;s right. And, um, you know, we&#039;ll see going forward, you know, the governments change and they go through different things, but this is, this is a hopeful moment and we&#039;re gonna push on through to this future. &lt;br /&gt;I think there&#039;s a lot of, you know, there&#039;s a lot of worry about quantum computers and what they&#039;re gonna do in the world, and it&#039;s nice to have a little vision of, not only can we get it right, but there are forces in place that are getting it right. And of course it does my heart so, so good that, you know, someone like Deirdre was inspired by Snowden and dove deep and figured out how to be one of the people who was building the better world. We&#039;ve talked to so many people like that, and this is a particular, you know, little geeky corner of the world. But, you know, those are our people and that makes me really happy.&lt;/p&gt;
  709. &lt;p&gt;&lt;strong&gt;JASON KELLEY:&lt;/strong&gt; Thanks for joining us for this episode of How to Fix the Internet.&lt;br /&gt;If you have feedback or suggestions, we&#039;d love to hear from you. Visit EFF dot org slash podcast and click on listener feedback. While you&#039;re there, you can become a member, donate, maybe even pick up some merch and just see what&#039;s happening in digital rights this week and every week.&lt;br /&gt;Our theme music is by Nat Keefe of BeatMower with Reed Mathis&lt;br /&gt;How to Fix the Internet is supported by the Alfred P. Sloan Foundation&#039;s program in public understanding of science and technology.&lt;br /&gt;We’ll see you next time.&lt;br /&gt;I’m Jason Kelley…&lt;/p&gt;
  710. &lt;p&gt;&lt;strong&gt;CINDY COHN:&lt;/strong&gt; And I’m Cindy Cohn.&lt;/p&gt;
  711. &lt;p&gt;&lt;em&gt;&lt;strong&gt;MUSIC CREDITS:&lt;/strong&gt; This podcast is licensed creative commons attribution 4.0 international, and includes the following music licensed creative commons attribution 3.0 unported by its creators: Drops of H2O, The Filtered Water Treatment by Jay Lang. Sound design, additional music and theme remixes by Gaetan Harris.&lt;/em&gt;&lt;/p&gt;
  712.  
  713. &lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
  714.     <pubDate>Wed, 02 Jul 2025 07:05:17 +0000</pubDate>
  715. <guid isPermaLink="false">110848 at https://www.eff.org</guid>
  716. <category domain="https://www.eff.org/how-to-fix-the-internet-podcast">How to Fix the Internet: Podcast</category>
  717. <category domain="https://www.eff.org/issues/security">Security</category>
  718. <dc:creator>Josh Richman</dc:creator>
  719. <enclosure url="https://www.eff.org/files/banner_library/2025-htfi-deirdre-blog.png" alt="How to Fix the Internet - Deirdre Connolly - Cryptography Makes a Post-Quantum Leap " type="image/png" length="524894" />
  720.  </item>
  721.  <item>
  722.    <title>EFFecting Change: EFF Turns 35!</title>
  723.    <link>https://www.eff.org/deeplinks/2025/06/effecting-change-eff-turns-35</link>
  724.    <description>&lt;div class=&quot;field field--name-body field--type-text-with-summary field--label-hidden&quot;&gt;&lt;div class=&quot;field__items&quot;&gt;&lt;div class=&quot;field__item even&quot;&gt;&lt;p&gt;&lt;a href=&quot;https://www.eff.org/35&quot;&gt;We&#039;re wishing EFF a happy birthday on July 10!&lt;/a&gt; Since 1990, EFF&#039;s lawyers, activists, analysts, and technologists have used everything in their toolkit to ensure that technology supports freedom, justice, and innovation for all people of the world. They&#039;ve seen it all and in this special edition of our EFFecting Change livestream series, leading experts at EFF will explore what&#039;s next for technology users.&lt;/p&gt;
  725. &lt;p&gt;&lt;/p&gt;&lt;center&gt;&lt;strong&gt;&lt;em&gt;EFFecting Change Livestream Series:&lt;br /&gt;EFF Turns 35!&lt;br /&gt;Thursday, July 10th&lt;br /&gt;11:00 AM - 12:00 PM Pacific - &lt;a href=&quot;https://dateful.com/eventlink/1636667650&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;Check Local Time&lt;/a&gt;&lt;br /&gt;This event is LIVE and FREE!&lt;/em&gt;&lt;strong&gt;&lt;em&gt;&lt;br /&gt;&lt;/em&gt;&lt;/strong&gt;&lt;/strong&gt;&lt;br /&gt;
  726. &lt;p class=&quot;subhead&quot;&gt;&lt;strong&gt;&lt;em&gt;&lt;a href=&quot;https://www.eff.org/event/effecting-change-eff-turns-35&quot;&gt;&lt;img alt=&quot;RSVP Today&quot; height=&quot;51&quot; src=&quot;https://www.eff.org/files/2024/03/20/rsvptoday_0.png&quot; width=&quot;193&quot; /&gt;&lt;/a&gt;&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;
  727. &lt;p&gt;&lt;/p&gt;&lt;/center&gt;
  728. &lt;p&gt;Join EFF &lt;a href=&quot;https://www.eff.org/event/effecting-change-eff-turns-35#Cindy&quot;&gt;Executive Director Cindy Cohn&lt;/a&gt;, EFF &lt;a href=&quot;https://www.eff.org/event/effecting-change-eff-turns-35#Lee&quot;&gt;Legislative Director Lee Tien&lt;/a&gt;, &lt;span&gt;EFF &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/event/effecting-change-eff-turns-35#Jillian&quot;&gt;Director for International Freedom of Expression Jillian C. York&lt;/a&gt;&lt;span&gt;, &lt;/span&gt;and &lt;a href=&quot;https://www.eff.org/event/effecting-change-eff-turns-35#Yoshi&quot;&gt;Professor / EFF Board Member Yoshi Kohno&lt;/a&gt; for this live Q&amp;amp;A. Learn what they have seen and how we can fuel the fight for privacy, free expression, and a future where digital freedoms are protected for everyone. &lt;/p&gt;
  729. &lt;p&gt;&lt;a href=&quot;https://www.eff.org/event/effecting-change-eff-turns-35&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;We hope you and your friends can join us live&lt;/a&gt;! Be sure to spread the word, and share our past livestreams.&lt;span&gt; &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/EFFectingChangeRecordings&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;Please note that all events will be recorded for later viewing on our YouTube page&lt;/a&gt;.&lt;/p&gt;
  730. &lt;p&gt;Want to make sure you don’t miss our next livestream? Here’s a link to sign up for updates about this series:&lt;a href=&quot;https://www.eff.org/ECUpdates&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;eff.org/ECUpdates&lt;/a&gt;.&lt;/p&gt;
  731.  
  732. &lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
  733.     <pubDate>Tue, 01 Jul 2025 22:09:36 +0000</pubDate>
  734. <guid isPermaLink="false">110864 at https://www.eff.org</guid>
  735. <dc:creator>Aaron Jue</dc:creator>
  736. <dc:creator>Melissa Srago</dc:creator>
  737. <enclosure url="https://www.eff.org/files/banner_library/effectingeffturns35_banner_updated_0.png" alt="Words &amp;quot;EFFecting Change&amp;quot; on a black with red, white, and grey ribbons with photos of the panelists" type="image/png" length="255393" />
  738.  </item>
  739.  <item>
  740.    <title>Flock Safety’s Feature Updates Cannot Make Automated License Plate Readers Safe</title>
  741.    <link>https://www.eff.org/deeplinks/2025/06/flock-safetys-feature-updates-cannot-make-automated-license-plate-readers-safe</link>
  742.    <description>&lt;div class=&quot;field field--name-body field--type-text-with-summary field--label-hidden&quot;&gt;&lt;div class=&quot;field__items&quot;&gt;&lt;div class=&quot;field__item even&quot;&gt;&lt;p&gt;&lt;span&gt;Two recent statements from the surveillance company—one &lt;/span&gt;&lt;a href=&quot;https://www.flocksafety.com/articles/flock-safetys-response-to-illinois-lpr-data-use-and-out-of-state-sharing-concerns&quot;&gt;&lt;span&gt;addressing Illinois privacy violations&lt;/span&gt;&lt;/a&gt;&lt;span&gt; and another &lt;/span&gt;&lt;a href=&quot;https://www.flocksafety.com/articles/statement-network-sharing-use-cases-federal-cooperation&quot;&gt;&lt;span&gt;defending the company&#039;s national surveillance network&lt;/span&gt;&lt;/a&gt;&lt;span&gt;—reveal a troubling pattern: when confronted by evidence of widespread abuse, Flock Safety has blamed users, downplayed harms, and doubled down on the very systems that enabled the violations in the first place.&lt;/span&gt;&lt;/p&gt;
  743. &lt;p&gt;&lt;span&gt;Flock&#039;s aggressive public relations campaign to salvage its reputation comes as no surprise. Last month, we &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/deeplinks/2025/05/she-got-abortion-so-texas-cop-used-83000-cameras-track-her-down&quot;&gt;&lt;span&gt;described&lt;/span&gt;&lt;/a&gt;&lt;span&gt; how investigative reporting from 404 Media revealed that a sheriff&#039;s office in Texas searched data from more than 83,000 automated license plate reader (ALPR) cameras to track down a woman suspected of self-managing an abortion. (A scenario that may have been avoided, it&#039;s worth noting, had Flock taken action when they were first warned about this &lt;/span&gt;&lt;a href=&quot;https://www.theguardian.com/world/2022/oct/06/how-expanding-web-of-license-plate-readers-could-be-weaponized-against-abortion&quot;&gt;&lt;span&gt;threat three years ago&lt;/span&gt;&lt;/a&gt;&lt;span&gt;).&lt;/span&gt;&lt;/p&gt;
  744. &lt;p&gt;&lt;span&gt;Flock calls the reporting on the Texas sheriff&#039;s office &quot;&lt;/span&gt;&lt;a href=&quot;https://www.flocksafety.com/articles/statement-network-sharing-use-cases-federal-cooperation&quot;&gt;&lt;span&gt;purposefully misleading&lt;/span&gt;&lt;/a&gt;&lt;span&gt;,&quot; claiming the woman was searched for as a missing person at her family&#039;s request rather than for her abortion. But that ignores the core issue: this officer used a nationwide surveillance dragnet (again: over 83,000 cameras) to track someone down, and used her suspected healthcare decisions as a reason to do so. Framing this as concern for her safety plays directly into &lt;/span&gt;&lt;a href=&quot;https://www.motherjones.com/politics/2024/03/abortion-mifepristone-supreme-court-domestic-violence-abuse/&quot;&gt;&lt;span&gt;anti-abortion narratives&lt;/span&gt;&lt;/a&gt;&lt;span&gt; that depict abortion as dangerous and traumatic in order to justify increased policing, criminalization, control—and, ultimately, surveillance.&lt;/span&gt;&lt;/p&gt;
  745. &lt;p class=&quot;pull-quote&quot;&gt;&lt;span&gt;Flock Safety has blamed users, downplayed harms, and doubled down on the very systems that enabled the violations in the first place.&lt;/span&gt;&lt;/p&gt;
  746. &lt;p&gt;&lt;span&gt;As if that weren&#039;t enough, the company has also come under fire for how its ALPR network data is being actively used to assist in mass deportation. Despite U.S. Immigration and Customs Enforcement (ICE) having no formal agreement with Flock Safety, public records revealed &quot;more than 4,000 nation and statewide lookups by local and state police done either at the behest of the federal government or as an &#039;informal&#039; favor to federal law enforcement, or with a potential immigration focus.&quot; The network audit data &lt;/span&gt;&lt;a href=&quot;https://www.404media.co/ice-taps-into-nationwide-ai-enabled-camera-network-data-shows/&quot;&gt;&lt;span&gt;analyzed by 404&lt;/span&gt;&lt;/a&gt;&lt;span&gt; exposed an &lt;/span&gt;&lt;a href=&quot;https://www.404media.co/emails-reveal-the-casual-surveillance-alliance-between-ice-and-local-police/&quot;&gt;&lt;span&gt;informal data-sharing environment&lt;/span&gt;&lt;/a&gt;&lt;span&gt; that creates an end-run around oversight and accountability measures: federal agencies can access the surveillance network through local partnerships without the transparency and legal constraints that would apply to direct federal contracts.&lt;/span&gt;&lt;/p&gt;
  747. &lt;p&gt;&lt;span&gt;Flock Safety is adamant this is &quot;not Flock&#039;s decision,&quot; and by implication, not their fault. Instead, the responsibility lies with each individual local law enforcement agency. In the same breath, they insist that data sharing is essential, loudly claiming credit when the technology is &lt;/span&gt;&lt;a href=&quot;https://www.flocksafety.com/articles/solving-cross-jurisdictional-crime-in-real-time-how-flock-safetys-unified-platform-makes-it-possible&quot;&gt;&lt;span&gt;involved in cross-jurisdictional investigations&lt;/span&gt;&lt;/a&gt;&lt;span&gt;—but failing to show the same attitude when that data-sharing ecosystem is used to terrorize abortion seekers or immigrants. &lt;/span&gt;&lt;/p&gt;
  748. &lt;h3&gt;&lt;span&gt;Flock Safety: The Surveillance Social Network&lt;/span&gt;&lt;/h3&gt;
  749. &lt;p&gt;&lt;span&gt;In growing from a 2017 startup to a $7.5 billion company &quot;&lt;/span&gt;&lt;a href=&quot;https://www.flocksafety.com/&quot;&gt;&lt;span&gt;serving over 5,000 communities&lt;/span&gt;&lt;/a&gt;&lt;span&gt;,&quot; Flock allowed individual agencies wide berth to set and regulate their own policies. In effect, this approach offered cheap surveillance technology with minimal restrictions, leaving major decisions and actions in the hands of law enforcement while the company scaled rapidly.&lt;/span&gt;&lt;/p&gt;
  750. &lt;p&gt;&lt;span&gt;And they have no intention of slowing down. Just this week, Flock launched its Business Network, facilitating unregulated data sharing amongst its private sector security clients. &quot;For years, our law enforcement customers have used the power of a shared network to identify threats, connect cases, and reduce crime. Now, we&#039;re extending that same network effect to the private sector,&quot; Flock Safety&#039;s CEO &lt;/span&gt;&lt;a href=&quot;https://www.flocksafety.com/articles/flock-launches-first-ever-business-network-strengthen-private-sector-security-collaboration&quot;&gt;&lt;span&gt;announced&lt;/span&gt;&lt;/a&gt;&lt;span&gt;. &lt;/span&gt;&lt;/p&gt;
  751. &lt;p&gt;&lt;span&gt;&lt;div class=&quot;caption caption-center&quot;&gt;&lt;div class=&quot;caption-width-container&quot;&gt;&lt;div class=&quot;caption-inner&quot;&gt;&lt;img src=&quot;/files/2025/06/27/flock_safety_at_iacp_2023.jpg&quot; width=&quot;1600&quot; height=&quot;1067&quot; alt=&quot;A crowd around the Flock Safety set-up at a police conference.&quot; title=&quot;A crowd around the Flock Safety set-up at a police conference.&quot; /&gt;&lt;p class=&quot;caption-text&quot;&gt;Flock Safety wooing law enforcement officers at the 2023 International Chiefs of Police Conference.&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/span&gt;&lt;/p&gt;
  752. &lt;p&gt;&lt;span&gt;The company is building out a new mass surveillance network using the exact template that ended with the company having to retrain thousands of officers in Illinois on how not to break state law—the same template that made it easy for officers to do so in the first place. Flock&#039;s continued integration of disparate surveillance networks across the public and private spheres—despite the harms that have already occurred—is owed in part to the one thing that it&#039;s gotten really good at over the past couple of years: facilitating a surveillance social network. &lt;/span&gt;&lt;/p&gt;
  753. &lt;p&gt;&lt;span&gt;Employing marketing phrases like &quot;collaboration&quot; and &quot;force multiplier,&quot; Flock encourages as much sharing as possible, &lt;/span&gt;&lt;a href=&quot;https://www.flocksafety.com/resources/how-many-crimes-do-automated-license-plate-readers-alprs-solve-anyway&quot;&gt;&lt;span&gt;going as far as to claim&lt;/span&gt;&lt;/a&gt;&lt;span&gt; that network effects can significantly improve case closure rates. They cultivate a sense of shared community and purpose among users so they opt into good faith sharing relationships with other law enforcement agencies across the country. But it&#039;s precisely that social layer that creates uncontrollable risk.&lt;/span&gt;&lt;/p&gt;
  754. &lt;p&gt;&lt;span&gt;The possibility of human workarounds at every level undermines any technical safeguards Flock may claim. Search term blocking relies on officers accurately labeling search intent—a system easily defeated by entering vague reasons like &quot;investigation&quot; or incorrect justifications, made either intentionally or not. And, of course, words like &quot;investigation&quot; or &quot;missing person&quot; can mean virtually anything, offering no value to meaningful oversight of how and for what the system is being used. Moving forward, sheriff&#039;s offices looking to avoid negative press can surveil abortion seekers or immigrants with ease, so long as they use vague and unsuspecting reasons. &lt;/span&gt;&lt;/p&gt;
  755. &lt;p&gt;&lt;span&gt;The same can be said for case number requirements, which depend on manual entry. This can easily be circumvented by reusing legitimate case numbers for unauthorized searches. Audit logs only track inputs, not contextual legitimacy. Flock&#039;s proposed AI-driven audit alerts, something that may be able to flag suspicious activity after searches (and harm) have already occurred, relies on local agencies to self-monitor misuse—despite their &lt;/span&gt;&lt;a href=&quot;https://www.mountprospect.org/Home/Components/News/News/10311/1042&quot;&gt;&lt;span&gt;demonstrated inability&lt;/span&gt;&lt;/a&gt;&lt;span&gt; to do so.&lt;/span&gt;&lt;/p&gt;
  756. &lt;p class=&quot;pull-quote&quot;&gt;&lt;span&gt;Flock operates as a single point of failure that can compromise—and has compromised—the privacy of millions of Americans simultaneously.&lt;/span&gt;&lt;/p&gt;
  757. &lt;p&gt;&lt;span&gt;And, of course, even the most restrictive department policy may not be enough. Austin, Texas, &lt;em&gt;had&lt;/em&gt; implemented one of the most restrictive ALPR programs in the country, and the program &lt;/span&gt;&lt;a href=&quot;https://cbsaustin.com/news/local/flock-ceo-responds-to-austin-backlash-as-city-contract-nears-expiration&quot;&gt;&lt;span&gt;still failed&lt;/span&gt;&lt;/a&gt;&lt;span&gt;: the city&#039;s own audit revealed systematic compliance failures that rendered its guardrails meaningless. The company&#039;s continued appeal to &quot;local policies&quot; means nothing when Flock&#039;s data-sharing network does not account for how law enforcement policies, regulations, and accountability vary by jurisdiction. You may have a good relationship with your local police, who solicit your input on what their policy looks like; you don&#039;t have that same relationship with hundreds or thousands of other agencies with whom they share their data. So if an officer on the other side of the country violates your privacy, it’d be difficult to hold them accountable. &lt;/span&gt;&lt;/p&gt;
  758. &lt;p&gt;&lt;span&gt;ALPR surveillance systems are inherently vulnerable to both technical exploitation and human manipulation. These &lt;/span&gt;&lt;a href=&quot;https://joplin.virington.com/shares/c7oMWtTnGw15wUJiKW2EYd&quot;&gt;&lt;span&gt;vulnerabilities&lt;/span&gt;&lt;/a&gt;&lt;span&gt; are not theoretical—they represent &lt;/span&gt;&lt;a href=&quot;https://www.aclu.org/news/privacy-technology/bostons-license-plate-reader-database-was-online-plain&quot;&gt;&lt;span&gt;real pathways&lt;/span&gt;&lt;/a&gt;&lt;span&gt; for bad actors to access vast databases containing millions of Americans&#039; location data. When surveillance databases are &lt;/span&gt;&lt;a href=&quot;https://www.cnn.com/2019/06/17/politics/customs-and-border-protection-data-breach-license-plates-leaked&quot;&gt;&lt;span&gt;breached&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, the consequences extend far beyond typical data theft—this information can be used to harass, &lt;/span&gt;&lt;a href=&quot;https://www.kwch.com/2022/10/31/kechi-police-lieutenant-arrested-using-police-technology-stalk-wife/&quot;&gt;&lt;span&gt;stalk&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, or even extort. The intimate details of people&#039;s daily routines, their associations, and their political activities may become available to anyone with malicious intent. Flock operates as a single point of failure that can compromise—and has compromised—the privacy of millions of Americans simultaneously.&lt;/span&gt;&lt;/p&gt;
  759. &lt;h3&gt;&lt;span&gt;Don&#039;t Stop de-Flocking&lt;/span&gt;&lt;/h3&gt;
  760. &lt;p&gt;&lt;span&gt;Rather than addressing legitimate concerns about privacy, security, and constitutional rights, Flock has only &lt;/span&gt;&lt;a href=&quot;https://www.flocksafety.com/articles/flock-safetys-response-to-illinois-lpr-data-use-and-out-of-state-sharing-concerns&quot;&gt;&lt;span&gt;promised updates&lt;/span&gt;&lt;/a&gt;&lt;span&gt; that fall short of meaningful reforms. These software tweaks and feature rollouts cannot assuage the fear engendered by the massive surveillance system it has built and continues to expand.&lt;/span&gt;&lt;/p&gt;
  761. &lt;p&gt;&lt;span&gt;&lt;div class=&quot;caption caption-center&quot;&gt;&lt;div class=&quot;caption-width-container&quot;&gt;&lt;div class=&quot;caption-inner&quot;&gt;&lt;img src=&quot;/files/2025/06/27/flock_camera_close_up.jpg&quot; width=&quot;1600&quot; height=&quot;1067&quot; alt=&quot;A close-up of a Flock Safety camera on a pole &quot; title=&quot;A close-up of a Flock Safety camera on a pole &quot; /&gt;&lt;p class=&quot;caption-text&quot;&gt;A typical specimen of Flock Safety&#039;s automated license plate readers.&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/span&gt;&lt;/p&gt;
  762. &lt;p&gt;&lt;span&gt;Flock&#039;s insistence that what&#039;s happening with abortion criminalization and immigration enforcement has nothing to do with them—that these are just red-state problems or the fault of rogue officers—is concerning. Flock designed the network that is being used, and the public should hold them accountable for failing to build in protections from abuse that cannot be easily circumvented.&lt;/span&gt;&lt;/p&gt;
  763. &lt;p&gt;&lt;span&gt;Thankfully, that&#039;s exactly what&#039;s happening: cities like &lt;/span&gt;&lt;a href=&quot;https://www.handsoffcentraltx.org/alpr&quot;&gt;&lt;span&gt;Austin&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, &lt;/span&gt;&lt;a href=&quot;https://cbsaustin.com/news/local/san-marcos-city-council-votes-to-deny-flock-camera-expansion-after-hours-of-heated-debate&quot;&gt;&lt;span&gt;San Marcos&lt;/span&gt;&lt;/a&gt;&lt;span&gt;,  &lt;/span&gt;&lt;a href=&quot;https://denverite.com/2025/05/05/denver-rejects-flock-camera-license-plate-readers/&quot;&gt;&lt;span&gt;Denver&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, &lt;/span&gt;&lt;a href=&quot;https://ij.org/press-release/federal-court-rejects-flock-safetys-late-bid-to-join-and-block-ijs-lawsuit-challenging-norfolks-mass-surveillance-cameras/&quot;&gt;&lt;span&gt;Norfolk&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, and &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/deeplinks/2025/06/san-diegans-push-back-flock-alpr-surveillance&quot;&gt;&lt;span&gt;San Diego&lt;/span&gt;&lt;/a&gt;&lt;span&gt; are pushing back. And it&#039;s not nearly as hard a choice as Flock would have you believe: &lt;/span&gt;&lt;a href=&quot;https://www.kvue.com/article/news/local/austin-license-plate-readers-ends-privacy-concerns/269-4dc64690-c6c0-4ace-a009-fd8a13f69113&quot;&gt;&lt;span&gt;Austinites&lt;/span&gt;&lt;/a&gt;&lt;span&gt; are weighing the benefits of a surveillance system that generates a hit &lt;/span&gt;&lt;a href=&quot;https://www.austintexas.gov/sites/default/files/files/Auditor/Audit_Reports/APD_License_Plate_Reader_May2025.pdf&quot;&gt;&lt;span&gt;less than 0.02% of the time&lt;/span&gt;&lt;/a&gt;&lt;span&gt; against the possibility that scanning 75 million license plates will result in an abortion seeker being tracked down by police, or an immigrant being flagged by ICE in a so-called &quot;sanctuary city.&quot; These are not hypothetical risks. It is already happening.&lt;/span&gt;&lt;/p&gt;
  764. &lt;p&gt;&lt;span&gt;Given how pervasive, sprawling, and ungovernable ALPR sharing networks have become, the only feature update we can truly rely on to protect people&#039;s rights and safety is no network at all. And we applaud the communities taking decisive action to dismantle its surveillance infrastructure.&lt;/span&gt;&lt;/p&gt;
  765. &lt;p&gt;&lt;span&gt;Follow their lead: don&#039;t stop &lt;/span&gt;&lt;a href=&quot;https://deflock.me/&quot;&gt;&lt;span&gt;de-flocking&lt;/span&gt;&lt;/a&gt;&lt;span&gt;.&lt;/span&gt;&lt;/p&gt;
  766.  
  767. &lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
  768.     <pubDate>Sat, 28 Jun 2025 00:36:58 +0000</pubDate>
  769. <guid isPermaLink="false">110866 at https://www.eff.org</guid>
  770. <category domain="https://www.eff.org/issues/street-level-surveillance">Street-Level Surveillance</category>
  771. <dc:creator>Sarah Hamid</dc:creator>
  772. <dc:creator>Rindala Alajaji</dc:creator>
  773. <enclosure url="https://www.eff.org/files/banner_library/truck_passing_flock.jpg" alt="A red truck carrying a lawnmower passes two Flock Safety automated license plate readers attached to poles." type="image/jpeg" length="156412" />
  774.  </item>
  775.  <item>
  776.    <title>Today&#039;s Supreme Court Decision on Age Verification Tramples Free Speech and Undermines Privacy</title>
  777.    <link>https://www.eff.org/deeplinks/2025/06/todays-supreme-court-decision-age-verification-tramples-free-speech-and-undermines</link>
  778.    <description>&lt;div class=&quot;field field--name-body field--type-text-with-summary field--label-hidden&quot;&gt;&lt;div class=&quot;field__items&quot;&gt;&lt;div class=&quot;field__item even&quot;&gt;&lt;p&gt;&lt;span data-contrast=&quot;auto&quot;&gt;Today’s decision in &lt;/span&gt;&lt;i&gt;&lt;span data-contrast=&quot;auto&quot;&gt;Free Speech Coalition v. Paxton &lt;/span&gt;&lt;/i&gt;&lt;span data-contrast=&quot;auto&quot;&gt;is a direct blow to the free speech rights of adults. The Court ruled that “no person—adult or child—has a First Amendment right to access speech that is obscene to minors without first submitting proof of age.” This ruling allows states to enact onerous age-verification rules that will block adults from accessing lawful speech, curtail their ability to be anonymous, and jeopardize their data security and privacy. These are real and immense burdens on adults, and the Court was wrong to ignore them in upholding Texas’ law.&lt;/span&gt; &lt;span data-ccp-props=&quot;{}&quot;&gt; &lt;/span&gt;&lt;/p&gt;
  779. &lt;p&gt;&lt;span data-contrast=&quot;none&quot;&gt;Importantly, the Court&#039;s reasoning applies only to age-verification rules for certain &lt;/span&gt;&lt;span data-contrast=&quot;none&quot;&gt;sexual material, and not to age limits in general. We will continue to fight against age restrictions on online access more broadly, such as on social media and specific online features.&lt;/span&gt;&lt;span data-contrast=&quot;auto&quot;&gt; &lt;/span&gt;&lt;span data-ccp-props=&quot;{}&quot;&gt; &lt;/span&gt;&lt;/p&gt;
  780. &lt;p&gt;&lt;span data-contrast=&quot;auto&quot;&gt;Still, the decision has immense consequences for internet users in Texas and in other states that have enacted similar laws. The Texas law forces adults to submit personal information over the internet to access entire websites that hold some amount of sexual material, not just pages or portions of sites that contain specific sexual materials. Many sites that cannot reasonably implement age verification measures for reasons such as cost or technical requirements will likely block users living in Texas and other states with similar laws wholesale. &lt;/span&gt;&lt;span data-ccp-props=&quot;240}&quot;&gt; &lt;/span&gt;&lt;/p&gt;
  781. &lt;p class=&quot;pull-quote&quot;&gt;&lt;span data-ccp-props=&quot;240}&quot;&gt;Importantly, the Court&#039;s reasoning applies only to age-verification rules for certain sexual material, and not to age limits in general. &lt;/span&gt;&lt;/p&gt;
  782. &lt;p&gt;&lt;span data-contrast=&quot;auto&quot;&gt;Many users will not be comfortable sharing private information to access sites that do implement age verification, for reasons of privacy or concern for data breaches. Many others do not have a driver’s license or photo ID to complete the age verification process. This decision will, ultimately, deter adult users from speaking and accessing lawful content, and will endanger the privacy of those who choose to go forward with verification.&lt;/span&gt;&lt;span data-ccp-props=&quot;240}&quot;&gt; &lt;/span&gt;&lt;/p&gt;
  783. &lt;h3&gt;&lt;b&gt;&lt;span data-contrast=&quot;auto&quot;&gt;What the Court Said Today&lt;/span&gt;&lt;/b&gt;&lt;span data-ccp-props=&quot;0}&quot;&gt; &lt;/span&gt;&lt;/h3&gt;
  784. &lt;p&gt;&lt;span data-contrast=&quot;auto&quot;&gt;In the 6-3 decision, the Court ruled that Texas’ &lt;/span&gt;&lt;a href=&quot;https://capitol.texas.gov/tlodocs/88R/billtext/html/HB01181H.htm&quot;&gt;&lt;span data-contrast=&quot;none&quot;&gt;HB 1181&lt;/span&gt;&lt;/a&gt;&lt;span data-contrast=&quot;auto&quot;&gt; is constitutional. This law requires websites that Texas decides are composed of “one-third” or more of “sexual material harmful to minors” to confirm the age of users by collecting age-verifying personal information from all visitors—even to access the other two-thirds of material that is not adult content. &lt;/span&gt;&lt;span data-ccp-props=&quot;0}&quot;&gt; &lt;/span&gt;&lt;span data-ccp-props=&quot;0}&quot;&gt; &lt;/span&gt;&lt;/p&gt;
  785. &lt;p&gt;&lt;span data-contrast=&quot;auto&quot;&gt;In 1997, the Supreme Court struck down a federal online age-verification law in Reno v. American Civil Liberties Union. In that case the court ruled that many elements of the Communications Decency Act &lt;/span&gt;&lt;a href=&quot;https://www.aclu.org/cases/reno-v-aclu-challenge-censorship-provisions-communications-decency-act&quot;&gt;&lt;span data-contrast=&quot;none&quot;&gt;violated the First Amendment&lt;/span&gt;&lt;/a&gt;&lt;span data-contrast=&quot;auto&quot;&gt;, including part of the law making it a crime for anyone to engage in online speech that is &quot;indecent&quot; or &quot;patently offensive&quot; if the speech could be viewed by a minor. Like HB 1181, that law &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/effector/8/10&quot;&gt;&lt;span data-contrast=&quot;none&quot;&gt;would have resulted&lt;/span&gt;&lt;/a&gt;&lt;span data-contrast=&quot;auto&quot;&gt; in many users being unable to view constitutionally protected speech, as many websites would have had to implement age verification, while others would have been forced to shut down. &lt;/span&gt;&lt;span data-ccp-props=&quot;0}&quot;&gt; &lt;/span&gt;&lt;/p&gt;
  786. &lt;p&gt;&lt;span data-contrast=&quot;auto&quot;&gt;In Reno and in subsequent cases, the Supreme Court ruled that laws that burden adults’ access to lawful speech are subjected to the highest level of review under the First Amendment, known as strict scrutiny. This level of scrutiny requires a law to be very narrowly tailored or the least speech-restrictive means available to the government. &lt;/span&gt;&lt;span data-ccp-props=&quot;0}&quot;&gt; &lt;/span&gt;&lt;/p&gt;
  787. &lt;p&gt;&lt;span data-contrast=&quot;auto&quot;&gt;That all changed with the Supreme Court’s decision today&lt;/span&gt;&lt;span data-contrast=&quot;auto&quot;&gt;. &lt;/span&gt;&lt;span data-ccp-props=&quot;0}&quot;&gt; &lt;/span&gt;&lt;/p&gt;
  788. &lt;p&gt;&lt;span data-contrast=&quot;auto&quot;&gt;The Court now says that laws that burden adults&lt;/span&gt;&lt;span&gt;’&lt;/span&gt;&lt;span data-contrast=&quot;auto&quot;&gt; access to sexual materials that are obscene to minors are subject to less-searching First Amendment review, known as intermediate scrutiny. And under that lower standard, the Texas law does not violate the First Amendment.&lt;/span&gt; &lt;span data-contrast=&quot;auto&quot;&gt;The Court did not have to respond to arguments that there are less speech-restrictive ways of reaching the same goal—for example, encouraging parents to install content-filtering software on their children’s devices. &lt;br /&gt;&lt;/span&gt;&lt;/p&gt;
  789. &lt;p&gt;&lt;span data-contrast=&quot;auto&quot;&gt;The court reached this decision by incorrectly assuming that online age verification is functionally equivalent to flashing an ID at a brick-and-mortar store. As we explained in our amicus brief, this ignores the many ways in which verifying age online is significantly more burdensome and invasive than doing so in person. As we and many others have &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/deeplinks/2023/03/age-verification-mandates-would-undermine-anonymity-online&quot;&gt;&lt;span data-contrast=&quot;none&quot;&gt;previously&lt;/span&gt;&lt;/a&gt; &lt;a href=&quot;https://www.eff.org/deeplinks/2025/01/face-scans-estimate-our-age-creepy-af-and-harmful&quot;&gt;&lt;span data-contrast=&quot;none&quot;&gt;explained&lt;/span&gt;&lt;/a&gt;&lt;span data-contrast=&quot;auto&quot;&gt;, unlike with in-person age-checks, the only viable way for a website to comply with an age verification requirement is to require all users to upload and submit—not just momentarily display—a data-rich government-issued ID or other document with personal identifying information. &lt;/span&gt;&lt;span data-ccp-props=&quot;{}&quot;&gt; &lt;/span&gt;&lt;/p&gt;
  790. &lt;p&gt;&lt;span data-contrast=&quot;auto&quot;&gt;This leads to a host of serious anonymity, privacy, and security concerns—all of which the majority failed to address. A person who submits identifying information online can never be sure if websites will keep that information or how that information might be used or disclosed. This leaves users highly vulnerable to data breaches and other security harms. Age verification also undermines anonymous internet browsing, even though courts have consistently ruled that anonymity is an aspect of the freedom of speech protected by the First Amendment.   &lt;/span&gt;&lt;span data-ccp-props=&quot;{}&quot;&gt; &lt;/span&gt;&lt;/p&gt;
  791. &lt;p class=&quot;pull-quote&quot;&gt;&lt;span data-ccp-props=&quot;{}&quot;&gt;This Supreme Court broke a fundamental agreement between internet users and the state that has existed since its inception&lt;/span&gt;&lt;/p&gt;
  792. &lt;p&gt;&lt;span data-contrast=&quot;auto&quot;&gt;The Court side&lt;/span&gt;&lt;span data-contrast=&quot;auto&quot;&gt;stepped its previous online age verification decisions by claiming &lt;/span&gt;&lt;span&gt;t&lt;/span&gt;&lt;span data-contrast=&quot;auto&quot;&gt;he internet has changed too much to follow the precedent from &lt;/span&gt;&lt;i&gt;&lt;span data-contrast=&quot;auto&quot;&gt;Reno &lt;/span&gt;&lt;/i&gt;&lt;span data-contrast=&quot;auto&quot;&gt;that requires these laws to survive strict scrutiny. Writing for the minority, Justice Kagan disagreed with the premise that the internet has changed: “the majority’s claim—again mistaken—that the internet has changed too much to follow our precedents’ lead.” &lt;/span&gt;&lt;span data-ccp-props=&quot;0}&quot;&gt; &lt;/span&gt;&lt;span data-ccp-props=&quot;0}&quot;&gt; &lt;/span&gt;&lt;/p&gt;
  793. &lt;p&gt;&lt;span data-contrast=&quot;auto&quot;&gt;But the majority argues that past precedent does not account for the dramatic expansion of the internet since the 1990s, which has led to easier and greater internet access and larger amounts of content available to teens online.&lt;/span&gt; &lt;span data-contrast=&quot;auto&quot;&gt;The majority’s opinion entirely fails to address the obvious corollary: the internet’s expansion also has benefited adults. Age verification requirements now affect exponentially more adults than they did in the 1990s and burden vastly more constitutionally protected online speech. The majority&#039;s argument actually demonstrates that the burdens on adult speech have grown dramatically &lt;/span&gt;&lt;i&gt;&lt;span data-contrast=&quot;auto&quot;&gt;larger&lt;/span&gt;&lt;/i&gt;&lt;span data-contrast=&quot;auto&quot;&gt; because of technological changes, yet the Court bizarrely interprets this expansion as justification for weaker constitutional protection.&lt;/span&gt;&lt;span data-ccp-props=&quot;0}&quot;&gt; &lt;/span&gt;&lt;/p&gt;
  794. &lt;h3&gt;&lt;b&gt;&lt;span data-contrast=&quot;auto&quot;&gt;What It Means Going Forward&lt;/span&gt;&lt;/b&gt;&lt;span data-ccp-props=&quot;0}&quot;&gt; &lt;/span&gt;&lt;/h3&gt;
  795. &lt;p&gt;&lt;span data-contrast=&quot;auto&quot;&gt;This Supreme Court broke a fundamental agreement between internet users and the state that has existed since its inception: the government will not stand in the way of people accessing First Amendment-protected material. There is no question that multiple states will now introduce similar laws to Texas. Two dozen already have, though they are not all in effect. At least three of those states have no limit on the percentage of material required before the law applies—a sweeping restriction on every site that contains &lt;/span&gt;&lt;i&gt;&lt;span data-contrast=&quot;auto&quot;&gt;any&lt;/span&gt;&lt;/i&gt;&lt;span data-contrast=&quot;auto&quot;&gt; material that the state believes the law includes. These laws will force U.S.-based adult websites to implement age-verification or block users in those states, as many have in the past when similar laws were in effect. &lt;/span&gt;&lt;span data-ccp-props=&quot;240}&quot;&gt; &lt;/span&gt;&lt;/p&gt;
  796. &lt;p&gt;&lt;span data-contrast=&quot;auto&quot;&gt;Rather than submit to verification, &lt;/span&gt;&lt;a href=&quot;https://reason.com/2025/03/12/study-age-verification-laws-dont-work/&quot;&gt;&lt;span data-contrast=&quot;none&quot;&gt;research&lt;/span&gt;&lt;/a&gt;&lt;span data-contrast=&quot;auto&quot;&gt; has found that people will choose a variety of other paths: &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/deeplinks/2025/01/vpns-are-not-solution-age-verification-laws&quot;&gt;&lt;span data-contrast=&quot;none&quot;&gt;using VPNs&lt;/span&gt;&lt;/a&gt;&lt;span data-contrast=&quot;auto&quot;&gt; to indicate that they are outside of the state, accessing similar sites that don’t comply with the law, often because the site is operating in a different country. While many users will simply not access the content as a result, others may accept the risk, at &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/deeplinks/2024/06/hack-age-verification-company-shows-privacy-danger-social-media-laws&quot;&gt;&lt;span data-contrast=&quot;none&quot;&gt;their peril&lt;/span&gt;&lt;/a&gt;&lt;span data-contrast=&quot;auto&quot;&gt;.  &lt;/span&gt;&lt;span data-ccp-props=&quot;240}&quot;&gt; &lt;/span&gt;&lt;/p&gt;
  797. &lt;p&gt;&lt;span data-contrast=&quot;auto&quot;&gt;We expect some states to push the envelope in terms of what content they consider “harmful to minors,” and to expand the type of websites that are covered by these laws, either through updated language or threats of litigation. Even if these attacks are struck down, operators of sites that involve sexual content of any type may be under threat, especially if that information is politically divisive. We worry that the point of some of these laws will be to deter queer folks and others from accessing lawful speech and finding community online by requiring them to identify themselves. We will continue to fight to protect against the disclosure of this critical information and for people to maintain their anonymity.&lt;/span&gt;&lt;span data-ccp-props=&quot;240}&quot;&gt; &lt;/span&gt;&lt;/p&gt;
  798. &lt;h3&gt;&lt;b&gt;&lt;span data-contrast=&quot;auto&quot;&gt;EFF Will Continue to Fight for All Users’ Free Expression and Privacy&lt;/span&gt;&lt;/b&gt;&lt;span data-ccp-props=&quot;0}&quot;&gt; &lt;/span&gt;&lt;/h3&gt;
  799. &lt;p&gt;&lt;span data-contrast=&quot;auto&quot;&gt;That said, the ruling does not give states or Congress the green light to impose age-verification regulations on the broader internet. The majority’s decision rests on the fact that minors do not have a First Amendment right to access sexual material that would be obscene. In short, adults have a First Amendment right to access those sexual materials, while minors do not. Although it was wrong, the majority’s opinion ruled that because Texas is blocking minors from speech they have no constitutional right to access, the age-verification requirement only incidentally burdens adult’s First Amendment rights. &lt;/span&gt;&lt;span data-ccp-props=&quot;240}&quot;&gt; &lt;/span&gt;&lt;/p&gt;
  800. &lt;p&gt;&lt;span data-contrast=&quot;auto&quot;&gt;But the same rationale does not apply to general-audience sites and services, including social media. Minors and adults have coextensive rights to both speak and access the speech of other users on these sites because the vast majority of the speech is not sexual materials that would be obscene to minors. Lawmakers should be careful not to interpret this ruling to mean that broader restrictions on minors’ First Amendment rights, like those included in the &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/deeplinks/2025/05/kids-online-safety-act-will-make-internet-worse-everyone&quot;&gt;&lt;span data-contrast=&quot;none&quot;&gt;Kids Online Safety Act&lt;/span&gt;&lt;/a&gt;&lt;span data-contrast=&quot;auto&quot;&gt;, would be deemed constitutional. &lt;/span&gt;&lt;span data-ccp-props=&quot;240}&quot;&gt; &lt;/span&gt;&lt;/p&gt;
  801. &lt;p&gt;&lt;i&gt;&lt;span data-contrast=&quot;auto&quot;&gt;Free Speech Coalition v. Paxton&lt;/span&gt;&lt;/i&gt;&lt;span data-contrast=&quot;auto&quot;&gt; will have an effect on nearly every U.S. adult internet user for the foreseeable future. It marks a worrying shift in the ways that governments can restrict access to speech online. But that only means we must work harder than ever to protect privacy, security, and free speech as central tenets of the internet. &lt;/span&gt;&lt;span data-ccp-props=&quot;240}&quot;&gt; &lt;/span&gt;&lt;/p&gt;
  802.  
  803. &lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
  804.     <pubDate>Fri, 27 Jun 2025 20:16:03 +0000</pubDate>
  805. <guid isPermaLink="false">110863 at https://www.eff.org</guid>
  806. <dc:creator>Aaron Mackey</dc:creator>
  807. <dc:creator>Lisa Femia</dc:creator>
  808. <dc:creator>Jason Kelley</dc:creator>
  809. <enclosure url="https://www.eff.org/files/banner_library/supreme-court-3b.jpg" alt="Supreme Court" type="image/jpeg" length="206874" />
  810.  </item>
  811.  <item>
  812.    <title>Georgia Court Rules for Transparency over Private Police Foundation</title>
  813.    <link>https://www.eff.org/deeplinks/2025/06/georgia-court-rules-transparency-over-private-police-foundation</link>
  814.    <description>&lt;div class=&quot;field field--name-body field--type-text-with-summary field--label-hidden&quot;&gt;&lt;div class=&quot;field__items&quot;&gt;&lt;div class=&quot;field__item even&quot;&gt;&lt;p&gt;&lt;span data-contrast=&quot;auto&quot;&gt;A &lt;/span&gt;&lt;a href=&quot;https://atlpresscollective.com/2025/06/02/acpc-lpl-open-records-apf/&quot;&gt;&lt;span data-contrast=&quot;none&quot;&gt;Georgia court has decided&lt;/span&gt;&lt;/a&gt;&lt;span data-contrast=&quot;auto&quot;&gt; that private non-profit &lt;/span&gt;&lt;a href=&quot;https://atlpresscollective.com/tag/atlanta-police-foundation/&quot;&gt;&lt;span data-contrast=&quot;none&quot;&gt;Atlanta Police Foundation&lt;/span&gt;&lt;/a&gt;&lt;span data-contrast=&quot;auto&quot;&gt; (APF) must comply with public records requests under the Georgia Open Records Act for some of its functions on behalf of the Atlanta Police Department. This is a major win for transparency in the state.&lt;/span&gt;&lt;span data-ccp-props=&quot;279}&quot;&gt; &lt;/span&gt;&lt;/p&gt;
  815. &lt;p&gt;&lt;span data-contrast=&quot;auto&quot;&gt; The &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/deeplinks/2024/03/lucy-parsons-labs-takes-police-foundation-court-open-records-requests&quot;&gt;&lt;span data-contrast=&quot;none&quot;&gt;lawsuit was brought last year&lt;/span&gt;&lt;/a&gt;&lt;span data-contrast=&quot;auto&quot;&gt; by the Atlanta Community Press Collective (ACPC) and &lt;/span&gt;&lt;a href=&quot;https://efa.eff.org&quot;&gt;&lt;span data-contrast=&quot;none&quot;&gt;Electronic Frontier Alliance&lt;/span&gt;&lt;/a&gt;&lt;span data-contrast=&quot;auto&quot;&gt; member Lucy Parsons Labs (LPL). It concerns the APF’s refusal to disclose records about its role as the leaser and manager of the site of so-called Cop City, the Atlanta Public Safety Training Center at the heart of a years-long battle that pitted local social and environmental movements against the APF. We’ve previously written about how APF and &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/deeplinks/2020/09/how-police-fund-surveillance-technology-part-problem&quot;&gt;&lt;span&gt;similar groups fund&lt;/span&gt;&lt;/a&gt;&lt;span data-contrast=&quot;auto&quot;&gt; police surveillance technology, and how the Atlanta Police Department &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/deeplinks/2024/08/atlanta-police-must-stop-high-tech-spying-political-movements&quot;&gt;&lt;span&gt;spied on the social media&lt;/span&gt;&lt;/a&gt;&lt;span data-contrast=&quot;auto&quot;&gt; of activists opposed to Cop City. &lt;/span&gt;&lt;span data-ccp-props=&quot;279}&quot;&gt; &lt;/span&gt;&lt;/p&gt;
  816. &lt;p&gt;&lt;span data-contrast=&quot;auto&quot;&gt;This is a big win for transparency and for local communities who want to maintain their right to know what public agencies are doing.&lt;/span&gt;&lt;span data-ccp-props=&quot;279}&quot;&gt; &lt;/span&gt;&lt;/p&gt;
  817. &lt;p&gt;&lt;span data-contrast=&quot;auto&quot;&gt;Police Foundations often provide resources to police departments that help them avoid public oversight, and the Atlanta Police Foundation leads the way with its maintenance of the Loudermilk Video Inte&lt;/span&gt;&lt;span data-contrast=&quot;auto&quot;&gt;gration Center and its role in Cop City, which will be used by public agencies including the Atlanta and other police departments.&lt;/span&gt;&lt;span data-ccp-props=&quot;279}&quot;&gt; &lt;/span&gt;&lt;/p&gt;
  818. &lt;p&gt;&lt;span data-contrast=&quot;auto&quot;&gt;ACPC and LPL were represented by attorneys Joy Ramsingh, Luke Andrews, and Samantha Hamilton who had won the release of some materials this past December. The plaintiffs had earlier been represented by the University of Georgia School of Law First Amendment Clinic. &lt;/span&gt;&lt;span data-ccp-props=&quot;279}&quot;&gt; &lt;/span&gt;&lt;/p&gt;
  819. &lt;p&gt;&lt;span data-contrast=&quot;auto&quot;&gt;The win comes at just the right time. Last Summer, the Georgia Supreme Court &lt;/span&gt;&lt;a href=&quot;https://georgiarecorder.com/briefs/state-supreme-court-rules-open-records-act-applies-to-private-contractors-working-for-governments/&quot;&gt;&lt;span data-contrast=&quot;none&quot;&gt;ruled&lt;/span&gt;&lt;/a&gt;&lt;span data-contrast=&quot;auto&quot;&gt; that private contractors working for public entities are subject to open records laws. The Georgia state legislature then &lt;/span&gt;&lt;a href=&quot;https://georgiarecorder.com/2025/06/04/atlanta-police-foundation-ordered-to-comply-with-open-records-requests-over-cop-city-documents/&quot;&gt;&lt;span data-contrast=&quot;none&quot;&gt;passed a bill&lt;/span&gt;&lt;/a&gt;&lt;span data-contrast=&quot;auto&quot;&gt; to make it harder to file public records requests against private entities. &lt;/span&gt;&lt;span data-contrast=&quot;auto&quot;&gt;With this month’s ruling, there is still time for the Atlanta Police Foundation to appeal the decision, but failing that, they will have to begin to comply with public records requests by the beginning of July. &lt;/span&gt;&lt;span data-ccp-props=&quot;279}&quot;&gt; &lt;/span&gt;&lt;/p&gt;
  820. &lt;p&gt;&lt;span data-contrast=&quot;auto&quot;&gt;We hope that this will help ensure transparency and accountability when government agencies farm out public functions to private entities, so that local activists and journalists will be able to uncover materials that should be available to the general public.&lt;/span&gt;&lt;span data-ccp-props=&quot;279}&quot;&gt; &lt;/span&gt;&lt;/p&gt;
  821.  
  822. &lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
  823.     <pubDate>Fri, 27 Jun 2025 15:51:03 +0000</pubDate>
  824. <guid isPermaLink="false">110861 at https://www.eff.org</guid>
  825. <category domain="https://www.eff.org/issues/community-control-police-surveillance-ccops">Community Control of Police Surveillance (CCOPS)</category>
  826. <category domain="https://www.eff.org/issues/street-level-surveillance">Street-Level Surveillance</category>
  827. <category domain="https://www.eff.org/fight">Electronic Frontier Alliance</category>
  828. <dc:creator>José Martinez</dc:creator>
  829. <enclosure url="https://www.eff.org/files/banner_library/efa-logo-banner.png" alt="Logo for the Electronic Frontier Alliance" type="image/png" length="11034" />
  830.  </item>
  831.  <item>
  832.    <title>Two Courts Rule On Generative AI and Fair Use — One Gets It Right</title>
  833.    <link>https://www.eff.org/deeplinks/2025/06/two-courts-rule-generative-ai-and-fair-use-one-gets-it-right</link>
  834.    <description>&lt;div class=&quot;field field--name-body field--type-text-with-summary field--label-hidden&quot;&gt;&lt;div class=&quot;field__items&quot;&gt;&lt;div class=&quot;field__item even&quot;&gt;&lt;p&gt;Things are speeding up in generative AI legal cases, with two judicial opinions just out on an issue that will &lt;a href=&quot;https://www.eff.org/deeplinks/2025/02/copyright-and-ai-cases-and-consequences&quot;&gt;shape the future&lt;/a&gt; of generative AI: whether training gen-AI models on copyrighted works is fair use. One gets it spot on; the other, not so much, but fortunately in a way that future courts can and should discount.&lt;/p&gt;
  835. &lt;p&gt;The core question in both cases was whether using copyrighted works to train Large Language Models (LLMs) used in AI chatbots is a lawful fair use. Under the US Copyright Act, answering that question requires courts to consider:&lt;/p&gt;
  836. &lt;ol&gt;
  837. &lt;li&gt;whether the use was transformative;&lt;/li&gt;
  838. &lt;li&gt;the nature of the works (Are they more creative than factual? Long since published?)&lt;/li&gt;
  839. &lt;li&gt;how much of the original was used; and&lt;/li&gt;
  840. &lt;li&gt;the harm to the market for the original work.&lt;/li&gt;
  841. &lt;/ol&gt;
  842. &lt;p&gt;In both cases, the judges focused on factors (1) and (4).&lt;/p&gt;
  843. &lt;h3&gt;The right approach&lt;/h3&gt;
  844. &lt;p&gt;In &lt;a href=&quot;https://www.courtlistener.com/docket/69058235/231/bartz-v-anthropic-pbc/&quot;&gt;&lt;em&gt;Bartz v. Anthropic&lt;/em&gt;&lt;/a&gt;, three authors sued Anthropic for using their books to train its Claude chatbot. In his order deciding parts of the case, Judge William Alsup confirmed what EFF has &lt;a href=&quot;https://www.eff.org/deeplinks/2023/04/how-we-think-about-copyright-and-ai-art-0&quot;&gt;said for years:&lt;/a&gt; fair use protects the use of copyrighted works for training because, among other things, training gen-AI is “transformative—spectacularly so” and any alleged harm to the market for the original is pure speculation. Just as copying books or images to create search engines is fair, the court held, copying books to create a new, “transformative” LLM and related technologies is also protected:&lt;/p&gt;
  845. &lt;blockquote&gt;&lt;p&gt;[U]sing copyrighted works to train LLMs to generate new text was quintessentially transformative. Like any reader aspiring to be a writer, Anthropic’s LLMs trained upon works not to race ahead and replicate or supplant them—but to turn a hard corner and create something different. If this training process reasonably required making copies within the LLM or otherwise, those copies were engaged in a transformative use.&lt;/p&gt;
  846. &lt;/blockquote&gt;
  847. &lt;p&gt;Importantly, &lt;em&gt;Bartz &lt;/em&gt;rejected the copyright holders’ attempts to claim that any model capable of generating new written material that might compete with existing works by emulating their “sweeping themes, “substantive points,” or “grammar, composition, and style” was an infringement machine. As the court rightly recognized, building gen-AI models that create new works is beyond “anything that any copyright owner rightly could expect to control.” &lt;/p&gt;
  848. &lt;p&gt;There’s a lot more to like about the &lt;em&gt;Bartz&lt;/em&gt; ruling, but just as we were digesting it &lt;a href=&quot;https://www.eff.org/deeplinks/2025/04/eff-urges-court-avoid-fair-use-shortcuts-kadrey-v-meta-platforms&quot;&gt;&lt;em&gt;Kadrey v. Meta Platforms&lt;/em&gt;&lt;/a&gt; came out. Sadly, this decision bungles the fair use analysis.&lt;/p&gt;
  849. &lt;h3&gt;A fumble on fair use&lt;/h3&gt;
  850. &lt;p&gt;&lt;em&gt;Kadrey&lt;/em&gt; is another suit by authors against the developer of an AI model, in this case Meta’s ‘Llama’ chatbot. The authors in Kadrey asked the court to rule that fair use did not apply.&lt;/p&gt;
  851. &lt;p&gt;Much of the &lt;em&gt;Kadrey&lt;/em&gt; ruling by Judge Vince Chhabria is&lt;em&gt; dicta—&lt;/em&gt;meaning, the opinion spends many paragraphs on what it thinks&lt;em&gt; could&lt;/em&gt; justify ruling in favor of the author plaintiffs, if only they had managed to present different facts (rather than pure speculation). The court then rules in Meta’s favor because the plaintiffs only offered speculation. &lt;/p&gt;
  852. &lt;p&gt;But it makes a number of errors along the way to the right outcome. At the top, the ruling broadly proclaims that training AI without buying a license to use each and every piece of copyrighted training material will be “illegal” in “most cases.” The court asserted that fair use usually won’t apply to AI training uses even though training is a “highly transformative” process, because of hypothetical “market dilution” scenarios where competition from AI-generated works could reduce the value of the books used to train the AI model..&lt;/p&gt;
  853. &lt;p&gt;That theory, in turn, depends on three mistaken premises. First, that the most important factor for determining fair use is whether the use might cause market harm. That’s not correct. Since its seminal 1994 opinion in &lt;em&gt;&lt;a href=&quot;https://www.oyez.org/cases/1993/92-1292&quot;&gt;Cambell v Acuff-Rose&lt;/a&gt;&lt;/em&gt;, the Supreme Court has been very clear that no single factor controls the fair use analysis.&lt;/p&gt;
  854. &lt;p&gt;Second, that an AI developer would typically seek to train a model entirely on a certain type of work, and then use that model to generate new works in the exact same genre, which would then compete with the works on which it was trained, such that the market for the original works is harmed. As the &lt;em&gt;Kadrey&lt;/em&gt; ruling notes, there was no evidence that Llama was intended to to, or does, anything like that, nor will most LLMs for the exact reasons discussed in &lt;em&gt;Bartz&lt;/em&gt;.&lt;/p&gt;
  855. &lt;p&gt;Third, as a matter of law, copyright doesn&#039;t prevent “market dilution” unless the new works are otherwise infringing. In fact, the whole purpose of copyright is to be an engine for new expression. If that new expression competes with existing works, that’s a feature, not a bug.&lt;/p&gt;
  856. &lt;p&gt;Gen-AI is spurring the kind of &lt;a href=&quot;https://xkcd.com/1227/&quot;&gt;tech panics&lt;/a&gt; we’ve seen &lt;a href=&quot;https://www.forbes.com/sites/joshbarro/2012/01/18/thirty-years-before-sopa-mpaa-feared-the-vcr/&quot;&gt;before&lt;/a&gt;; then, as now, thoughtful &lt;a href=&quot;https://www.eff.org/deeplinks/2024/01/what-home-videotaping-can-tell-us-about-generative-ai&quot;&gt;fair use opinions&lt;/a&gt; helped ensure that copyright law served innovation and creativity. Gen-AI does raise a host of other serious concerns about fair labor practices and misinformation, but copyright wasn’t designed to address those problems. Trying to force copyright law to play those roles only hurts important and legal uses of this technology.&lt;/p&gt;
  857. &lt;p&gt;In keeping with that tradition, courts deciding fair use in other AI copyright cases should look to &lt;em&gt;Bartz, &lt;/em&gt;not &lt;em&gt;Kadrey.&lt;/em&gt;&lt;/p&gt;
  858.  
  859. &lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
  860.     <pubDate>Thu, 26 Jun 2025 19:22:26 +0000</pubDate>
  861. <guid isPermaLink="false">110856 at https://www.eff.org</guid>
  862. <category domain="https://www.eff.org/issues/intellectual-property">Fair Use</category>
  863. <dc:creator>Tori Noble</dc:creator>
  864. <enclosure url="https://www.eff.org/files/banner_library/robotai.png" alt="A robot painting a self-portrait" type="image/png" length="177967" />
  865.  </item>
  866.  <item>
  867.    <title>Ahead of Budapest Pride, EFF and 46 Organizations Call on European Commission to Defend Fundamental Rights in Hungary</title>
  868.    <link>https://www.eff.org/deeplinks/2025/06/ahead-budapest-pride-eff-and-46-organizations-call-european-commission-defend</link>
  869.    <description>&lt;div class=&quot;field field--name-body field--type-text-with-summary field--label-hidden&quot;&gt;&lt;div class=&quot;field__items&quot;&gt;&lt;div class=&quot;field__item even&quot;&gt;&lt;p&gt;This week, EFF joined EDRi and nearly 50 civil society organizations &lt;a href=&quot;https://edri.org/our-work/open-letter-the-european-commission-must-act-now-to-defend-fundamental-rights-in-hungary/&quot;&gt;urging&lt;/a&gt; the European Commission’s President Ursula von der Leyen, Executive Vice President Henna Virkunnen, and Commissioners Michael McGrath and Hadja Lahbib to take immediate action and defend human rights in Hungary.&lt;/p&gt;
  870. &lt;p class=&quot;pull-quote&quot;&gt;The European Commission has a responsibility to protect EU fundamental rights, including the rights of LGBTQ+ individuals in Hungary and across the Union&lt;/p&gt;
  871. &lt;p&gt;With Budapest Pride just two days away, Hungary has criminalized Pride marches and is planning to deploy real-time facial recognition technology to identify those participating in the event. This is a flagrant violation of fundamental rights, particularly the rights to free expression and assembly.&lt;/p&gt;
  872. &lt;p&gt;On April 15, a new amendment package went into effect in Hungary which authorizes the use of real-time facial recognition to identify protesters at ‘banned protests’ like LGBTQ+ events, and includes harsh penalties like excessive fines and imprisonment. This is &lt;a href=&quot;https://edri.org/our-work/hungarys-new-biometric-surveillance-laws-violate-the-ai-act/&quot;&gt;prohibited&lt;/a&gt; by the EU Artificial Intelligence (AI) Act, which does not permit the use of real-time face recognition for these purposes.&lt;/p&gt;
  873. &lt;p&gt;This came on the back of members of Hungary’s Parliament rushing through &lt;a href=&quot;https://ecnl.org/news/hungarys-new-biometric-surveillance-laws-violate-ai-act&quot;&gt;three amendments&lt;/a&gt; in March to ban and criminalize Pride marches and their organizers, and permit the use of real-time facial recognition technologies for the identification of protestors. These amendments were passed without public consultation and are in express violation of the EU AI Act and Charter of Fundamental Rights. In response, civil society organizations &lt;a href=&quot;https://edri.org/our-work/civil-society-to-european-commission-act-now-to-defend-fundamental-rights-from-hungarys-pride-ban-and-the-use-of-facial-recognition-against-protesters/&quot;&gt;urged&lt;/a&gt; the European Commission to put interim measures in place to rectify the violation of fundamental rights and values. The Commission is yet to respond—a real cause of concern.&lt;/p&gt;
  874. &lt;p&gt;This is an attack on LGBTQ+ individuals, as well as an attack on the rights of all people in Hungary. The letter urges the European Commission to take the following actions:&lt;/p&gt;
  875. &lt;ul&gt;
  876. &lt;li&gt;Open an infringement procedure against any new violations of EU law, in particular the violation of Article 5 of the AI Act&lt;/li&gt;
  877. &lt;li&gt;Adopt interim measures on ongoing infringement against Hungary’s 2021 anti LGBT law which is used as a legal basis for the ban on LGBTQIA+ related public assemblies, including Budapest Pride.&lt;/li&gt;
  878. &lt;/ul&gt;
  879. &lt;p&gt;There&#039;s no question that, when EU law is at stake, the European Commission has a responsibility to protect EU fundamental rights, including the rights of LGBTQ+ individuals in Hungary and across the Union. This includes ensuring that those organizing and marching at Pride in Budapest are safe and able to peacefully assemble and protest. If the EU Commission does not urgently act to ensure these rights, it risks hollowing out the values that the EU is built from.&lt;/p&gt;
  880. &lt;p&gt;Read our full letter to the Commission &lt;a href=&quot;https://edri.org/our-work/open-letter-the-european-commission-must-act-now-to-defend-fundamental-rights-in-hungary/&quot;&gt;here&lt;/a&gt;.&lt;/p&gt;
  881.  
  882. &lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
  883.     <pubDate>Thu, 26 Jun 2025 16:10:29 +0000</pubDate>
  884. <guid isPermaLink="false">110855 at https://www.eff.org</guid>
  885. <dc:creator>Paige Collings</dc:creator>
  886. <enclosure url="https://www.eff.org/files/banner_library/eu-flag-11.png" alt="EU-flag-circuits" type="image/png" length="48177" />
  887.  </item>
  888.  <item>
  889.    <title>How Cops Can Get Your Private Online Data</title>
  890.    <link>https://www.eff.org/deeplinks/2025/06/how-cops-can-get-your-private-online-data</link>
  891.    <description>&lt;div class=&quot;field field--name-body field--type-text-with-summary field--label-hidden&quot;&gt;&lt;div class=&quot;field__items&quot;&gt;&lt;div class=&quot;field__item even&quot;&gt;&lt;p&gt;Can the cops get your online data? In short, yes. There are a variety of US federal and state laws which give law enforcement powers to obtain information that you provided to online services. But, there are steps you as a user and/or as a service provider can take to improve online privacy.&lt;/p&gt;&lt;p&gt;Law enforcement demanding access to your private online data goes back to the beginning of the internet. In fact, one of  EFF’s first cases, &lt;a href=&quot;https://www.eff.org/cases/steve-jackson-games-v-secret-service-case-archive&quot;&gt;Steve Jackson Games v. Secret Service&lt;/a&gt;, exemplified the now all-too-familiar story where unfounded claims about illegal behavior resulted in overbroad seizures of user messages. But it’s not the ’90s anymore, the internet has become an integral part of everyone’s life. Everyone now relies on organizations big and small to steward our data, from huge service providers &lt;a href=&quot;https://www.eff.org/deeplinks/2024/08/federal-appeals-court-finds-geofence-warrants-are-categorically-unconstitutional&quot;&gt;like Google&lt;/a&gt;, Meta, or your ISP, to hobbyists hosting a blog or &lt;a href=&quot;https://www.eff.org/deeplinks/2023/07/fbi-seizure-mastodon-server-wakeup-call-fediverse-users-and-hosts-protect-their&quot;&gt;Mastodon server&lt;/a&gt;. &lt;/p&gt;&lt;p&gt;There is no “cloud,” just someone else&#039;s computer—and when the cops come knocking on their door, these hosts need to be willing to stand up for privacy, and know how to do so to the fullest extent under the law. These legal limits are also important for users to know, not only to mitigate risks in their &lt;a href=&quot;https://ssd.eff.org/module/your-security-plan&quot;&gt;security plan&lt;/a&gt; when choosing where to share data, but to understand whether these hosts are going to bat for them. Taking action together, service hosts and users can curb law enforcement getting more data than they’re allowed, protecting not just themselves but &lt;a href=&quot;https://www.eff.org/deeplinks/2022/05/what-companies-can-do-now-protect-digital-rights-post-roe-world&quot;&gt;targeted populations&lt;/a&gt;, present and future.&lt;/p&gt;&lt;p&gt;This is distinct from law enforcement’s methods of collecting &lt;em&gt;public&lt;/em&gt; data, such as the information now &lt;a href=&quot;https://www.npr.org/2025/06/19/g-s1-73572/us-resumes-visas-foreign-students-access-social-media&quot;&gt;being collected on student visa applicants&lt;/a&gt;. Cops may use &lt;a href=&quot;https://www.eff.org/deeplinks/2024/11/eff-lawsuit-discloses-documents-detailing-governments-social-media-surveillance&quot;&gt;social media monitoring tools&lt;/a&gt; and &lt;a href=&quot;https://www.eff.org/deeplinks/2019/04/facebook-must-take-these-four-steps-counter-police-sock-puppets&quot;&gt;sock puppet accounts&lt;/a&gt; to collect what you share publicly, or even within “private” communities. Police may also obtain the contents of communication in other ways that do not require court authorization, such as monitoring network traffic passively to catch metadata and possibly using advanced tools to partially reveal encrypted information. They can even outright buy information from &lt;a href=&quot;https://www.eff.org/deeplinks/2022/08/inside-fog-data-science-secretive-company-selling-mass-surveillance-local-police&quot;&gt;online data brokers&lt;/a&gt;. Unfortunately there are few restrictions or oversight for these practices—something EFF is fighting to change.&lt;/p&gt;&lt;p&gt;Below however is a general breakdown of the legal processes used by US law enforcement for accessing &lt;em&gt;private&lt;/em&gt; data, and what categories of private data these processes can disclose. Because this is a generalized summary, it is neither exhaustive nor should be considered legal advice. Please &lt;a href=&quot;https://www.eff.org/pages/legal-assistance&quot;&gt;seek legal help&lt;/a&gt; if you have specific data privacy and security needs.&lt;/p&gt;&lt;table&gt;&lt;thead&gt;&lt;tr style=&quot;color: white; font-size: 1.1rem;&quot;&gt;&lt;th style=&quot;background-color: #432a46; border: 0; font-weight: 600;&quot;&gt;&lt;p&gt;Type of data&lt;/p&gt;&lt;/th&gt;&lt;th style=&quot;background-color: #432a46; border: 0; font-weight: 600;&quot;&gt;&lt;p&gt;Process used&lt;/p&gt;&lt;/th&gt;&lt;th style=&quot;background-color: #432a46; border: 0; font-weight: 600;&quot;&gt;&lt;p&gt;Challenge prior to disclosure?&lt;/p&gt;&lt;/th&gt;&lt;th style=&quot;background-color: #432a46; border: 0; font-weight: 600;&quot;&gt;&lt;p&gt;Proof needed&lt;/p&gt;&lt;/th&gt;&lt;/tr&gt;&lt;/thead&gt;&lt;tbody style=&quot;font-size: 1rem;&quot;&gt;&lt;tr&gt;&lt;td style=&quot;border: 0;&quot;&gt;&lt;p&gt;Subscriber information&lt;/p&gt;&lt;/td&gt;&lt;td style=&quot;border: 0;&quot;&gt;&lt;p&gt;Subpoena&lt;/p&gt;&lt;/td&gt;&lt;td style=&quot;border: 0;&quot;&gt;&lt;p&gt;Yes&lt;/p&gt;&lt;/td&gt;&lt;td style=&quot;border: 0;&quot;&gt;&lt;p&gt;&lt;strong&gt;Relevant&lt;/strong&gt; to an investigation&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr style=&quot;background-color: #f6bdb9;&quot;&gt;&lt;td style=&quot;border: 0;&quot;&gt;&lt;p&gt;Non-content information, &lt;strong&gt;metadata&lt;/strong&gt;&lt;/p&gt;&lt;/td&gt;&lt;td style=&quot;border: 0;&quot;&gt;&lt;p&gt;Court order; sometimes subpoena&lt;/p&gt;&lt;/td&gt;&lt;td style=&quot;border: 0;&quot;&gt;&lt;p&gt;Yes&lt;/p&gt;&lt;/td&gt;&lt;td style=&quot;border: 0;&quot;&gt;&lt;p&gt;&lt;strong&gt;Specific and articulable facts&lt;/strong&gt; that info is relevant to an investigation&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td style=&quot;border: 0;&quot;&gt;&lt;p&gt;Stored content&lt;/p&gt;&lt;/td&gt;&lt;td style=&quot;border: 0;&quot;&gt;&lt;p&gt;Search warrant&lt;/p&gt;&lt;/td&gt;&lt;td style=&quot;border: 0;&quot;&gt;&lt;p&gt;No&lt;/p&gt;&lt;/td&gt;&lt;td style=&quot;border: 0;&quot;&gt;&lt;p&gt;&lt;strong&gt;Probable cause&lt;/strong&gt; that info will provide evidence of a crime&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr style=&quot;background-color: #f6bdb9; border: 0;&quot;&gt;&lt;td style=&quot;border: 0;&quot;&gt;&lt;p&gt;&lt;strong&gt;Content&lt;/strong&gt; &lt;strong&gt;in transit&lt;/strong&gt;&lt;/p&gt;&lt;/td&gt;&lt;td style=&quot;border: 0;&quot;&gt;&lt;p&gt;Super warrant&lt;/p&gt;&lt;/td&gt;&lt;td style=&quot;border: 0;&quot;&gt;&lt;p&gt;No&lt;/p&gt;&lt;/td&gt;&lt;td style=&quot;border: 0;&quot;&gt;&lt;p&gt;Probable cause &lt;em&gt;plus&lt;/em&gt; &lt;strong&gt;exhaustion&lt;/strong&gt; and &lt;strong&gt;minimization&lt;/strong&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;h2&gt;Types of Data that Can be Collected&lt;/h2&gt;&lt;p&gt;The laws protecting private data online generally follow a pattern: the more sensitive the personal data is, the greater factual and legal burden police have to meet before they can obtain it. Although this is not exhaustive, here are a few categories of data you may be sharing with services, and why police might want to obtain it.&lt;/p&gt;&lt;ul&gt;&lt;ul&gt;&lt;li&gt;&lt;strong&gt;Subscriber Data:&lt;/strong&gt; Information you provide in order to use the service. Think about ID or payment information, IP address location, email, phone number, and other information you provided when signing up. &lt;ul&gt;&lt;li&gt;&lt;em&gt;Law enforcement can learn who controls an anonymous account, and find other service providers to gather information from.&lt;/em&gt;&lt;/li&gt;&lt;/ul&gt;&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Non-content data, or &quot;metadata&quot;:&lt;/strong&gt; This is saved information about your interactions on the service; like when you used the service, for how long, and with whom. Analogous to what a postal worker can infer from a sealed letter with addressing information.&lt;/li&gt;&lt;ul&gt;&lt;li&gt;&lt;em&gt;Law enforcement can use this information to infer a social graph, login history, and other information about a suspect’s behavior.&lt;/em&gt;&lt;/li&gt;&lt;/ul&gt;&lt;/ul&gt;&lt;/ul&gt;&lt;ul&gt;&lt;ul&gt;&lt;ul&gt;&lt;/ul&gt;&lt;li&gt;&lt;strong&gt;Stored content:&lt;/strong&gt; This is the actual content you are sending and receiving, like your direct message history or saved drafts. This can cover any private information your service provider can access. &lt;/li&gt;&lt;ul&gt;&lt;li&gt;&lt;em&gt;This most sensitive data is collected to reveal criminal evidence. Overly broad requests also allow for retroactive searches, information on other users, and can take information out of its original context. &lt;/em&gt;&lt;/li&gt;&lt;/ul&gt;&lt;li&gt;&lt;strong&gt;Content in transit:&lt;/strong&gt; This is the content of your communications as it is being communicated. This real-time access may also collect info which isn’t typically stored by a provider, like your voice during a phone call.&lt;ul&gt;&lt;li&gt;&lt;em&gt;Law enforcement can compel providers to wiretap their own services for a particular user—which may also implicate the privacy of users they interact with.&lt;/em&gt;&lt;/li&gt;&lt;/ul&gt;&lt;/li&gt;&lt;/ul&gt;&lt;/ul&gt;&lt;h2&gt;Legal Processes Used to Get Your Data&lt;/h2&gt;&lt;p&gt;When US law enforcement has identified a service that likely has this data, they have a few tools to legally compel that service to hand it over and prevent users from knowing information is being collected.&lt;/p&gt;&lt;h4&gt;&lt;span style=&quot;background-color: #f6bdb9;&quot;&gt;&lt;strong&gt;Subpoena&lt;/strong&gt;&lt;/span&gt;&lt;/h4&gt;&lt;p&gt;Subpoenas are demands from a prosecutor, law enforcement, or a grand jury which do not require approval of a judge before being sent to a service. The only restriction is this demand be relevant to an investigation. Often the only time a court reviews a subpoena is when a service or user challenges it in court.&lt;/p&gt;&lt;p&gt;Due to the lack of direct court oversight in most cases, subpoenas are &lt;a href=&quot;https://www.eff.org/deeplinks/2009/11/effs-secret-files-anatomy-bogus-subpoena&quot;&gt;prone to abuse&lt;/a&gt; and overreach. Providers should scrutinize such requests carefully with a lawyer and push back before disclosure, particularly when law enforcement tries to use subpoenas to obtain more private data, such as the contents of communications.&lt;/p&gt;&lt;h4&gt;&lt;span style=&quot;background-color: #f6bdb9;&quot;&gt;&lt;strong&gt;Court Order&lt;/strong&gt;&lt;/span&gt;&lt;/h4&gt;&lt;p&gt;This is a similar demand to subpoenas, but usually pertains to a specific statute which requires a court to authorize the demand. Under the Stored Communications Act, for example, a court can issue an order for non-content information if police provide specific facts that the information being sought is relevant to an investigation. &lt;/p&gt;&lt;p&gt;Like subpoenas, providers can usually challenge court orders before disclosure and inform the user(s) of the request, subject to law enforcement obtaining a gag order (more on this below). &lt;/p&gt;&lt;h4&gt;&lt;span style=&quot;background-color: #f6bdb9;&quot;&gt;&lt;strong&gt;Search Warrant&lt;/strong&gt;&lt;/span&gt;&lt;/h4&gt;&lt;p&gt;A warrant is a demand issued by a judge to permit police to search specific places or persons. To obtain a warrant, police must submit an affidavit (a written statement made under oath) establishing that there is a fair probability (or “probable cause”) that evidence of a crime will be found at a particular place or on a particular person. &lt;/p&gt;&lt;p&gt;Typically services cannot challenge a warrant before disclosure, as these requests are already approved by a magistrate. Sometimes police request that judges also enter gag orders against the target of the warrant that prevent hosts from informing the public or the user that the warrant exists.&lt;/p&gt;&lt;h4&gt;&lt;span style=&quot;background-color: #f6bdb9;&quot;&gt;&lt;strong&gt;Super Warrant&lt;/strong&gt;&lt;/span&gt;&lt;/h4&gt;&lt;p&gt;Police seeking to intercept communications as they occur generally face the highest legal burden. Usually the affidavit needs to not only establish probable cause, but also make clear that other investigation methods are not viable (exhaustion) and that the collection avoids capturing irrelevant data (minimization). &lt;/p&gt;&lt;p&gt;Some laws also require high-level approval within law enforcement, such as leadership, to approve the request. Some laws also limit the types of crimes that law enforcement may use wiretaps in while they are investigating. The laws may also require law enforcement to periodically report back to the court about the wiretap, including whether they are minimizing collection of non-relevant communications. &lt;/p&gt;&lt;p&gt;Generally these demands cannot be challenged while wiretapping is occurring, and providers are prohibited from telling the targets about the wiretap. But some laws require disclosure to targets and those who were communicating with them after the wiretap has ended. &lt;/p&gt;&lt;h4&gt;&lt;span style=&quot;background-color: #f6bdb9;&quot;&gt;&lt;strong&gt;Gag orders&lt;/strong&gt;&lt;/span&gt;&lt;/h4&gt;&lt;p&gt;Many of the legal authorities described above also permit law enforcement to simultaneously prohibit the service from telling the target of the legal process or the general public that the surveillance is occurring. These non-disclosure orders are prone to abuse and EFF has repeatedly &lt;a href=&quot;https://www.eff.org/issues/national-security-letters&quot;&gt;fought them&lt;/a&gt; because they violate the First Amendment and prohibit public understanding about the breadth of law enforcement surveillance.&lt;/p&gt;&lt;h2&gt;How Services Can (and Should) Protect You&lt;/h2&gt;&lt;p&gt;This process isn&#039;t always clean-cut, and service providers must ultimately comply with lawful demands for user’s data, even when they challenge them and courts uphold the government’s demands. &lt;/p&gt;&lt;p&gt;Service providers outside the US also aren’t totally in the clear, as they must often comply with US law enforcement demands. This is usually because they either have a legal presence in the US or because they can be compelled through mutual legal assistance treaties and other international legal mechanisms. &lt;/p&gt;&lt;p&gt;However, services can do a lot by following a few &lt;a href=&quot;https://www.eff.org/files/eff-ospbp-whitepaper.pdf&quot;&gt;best practices&lt;/a&gt; to &lt;a href=&quot;https://www.eff.org/deeplinks/2022/05/what-companies-can-do-now-protect-digital-rights-post-roe-world&quot;&gt;defend user privacy&lt;/a&gt;, thus limiting the impact of these requests and in some cases make their service a less appealing door for the cops to knock on.&lt;/p&gt;&lt;h4&gt;&lt;span style=&quot;background-color: #f6bdb9;&quot;&gt;&lt;strong&gt;Put Cops through the Process&lt;/strong&gt;&lt;/span&gt;&lt;/h4&gt;&lt;p&gt;Paramount is the service provider&#039;s willingness to stand up for their users. Carving out exceptions or volunteering information outside of the legal framework erodes everyone&#039;s right to privacy. Even in extenuating and urgent circumstances, the responsibility is not on you to decide what to share, but on the legal process. &lt;/p&gt;&lt;p&gt;Smaller hosts, like those of &lt;a href=&quot;https://www.eff.org/deeplinks/2022/12/user-generated-content-and-fediverse-legal-primer&quot;&gt;decentralized services&lt;/a&gt;, might be intimidated by these requests, but consulting legal counsel will ensure requests are challenged when necessary. Organizations like EFF can sometimes provide legal help directly or connect service providers with alternative counsel.&lt;/p&gt;&lt;h4&gt;&lt;span style=&quot;background-color: #f6bdb9;&quot;&gt;&lt;strong&gt;Challenge Bad Requests&lt;/strong&gt;&lt;/span&gt;&lt;/h4&gt;&lt;p&gt;It’s not uncommon for law enforcement to overreach or make burdensome requests. Before offering information, services can push back on an improper demand informally, and then continue to do so in court. If the demand is overly broad, violates a user&#039;s First or Fourth Amendment rights, or has other legal defects, a court may rule that it is invalid and prevent disclosure of the user’s information.&lt;/p&gt;&lt;p&gt;Even if a court doesn’t invalidate the legal demand entirely, pushing back informally or in court can limit how much personal information is disclosed and mitigate privacy impacts.&lt;/p&gt;&lt;h4&gt;&lt;span style=&quot;background-color: #f6bdb9;&quot;&gt;&lt;strong&gt;Provide Notice &lt;/strong&gt;&lt;/span&gt;&lt;/h4&gt;&lt;p&gt;Unless otherwise restricted, service providers should give notice about requests and disclosures as soon as they can. This notice is vital for users to seek legal support and prepare a defense.&lt;/p&gt;&lt;h4&gt;&lt;span style=&quot;background-color: #f6bdb9;&quot;&gt;&lt;strong&gt;Be Clear With Users &lt;/strong&gt;&lt;/span&gt;&lt;/h4&gt;&lt;p&gt;It is important for users to understand if a host is committed to pushing back on data requests to the full extent permitted by law. Privacy policies with fuzzy thresholds like &quot;when deemed appropriate&quot; or “when requested” make it ambiguous if a user’s right to privacy will be respected. The &lt;a href=&quot;https://www.eff.org/who-has-your-back-2017?language=el&quot;&gt;best practices&lt;/a&gt; for providers not only require clarity and a willingness to push back on law enforcement demands, but also a commitment to be transparent with the public about law enforcement’s demands. For example, with regular transparency reports breaking down the countries and states making these data requests.&lt;/p&gt;&lt;p&gt;Social media services should also consider clear guidelines for finding and removing &lt;a href=&quot;https://www.eff.org/deeplinks/2019/04/facebook-must-take-these-four-steps-counter-police-sock-puppets&quot;&gt;sock puppet accounts operated by law enforcement&lt;/a&gt; on the platform, as these serve as a backdoor to government surveillance.&lt;/p&gt;&lt;h4&gt;&lt;span style=&quot;background-color: #f6bdb9;&quot;&gt;&lt;strong&gt;Minimize Data Collection &lt;/strong&gt;&lt;/span&gt;&lt;/h4&gt;&lt;p&gt;&lt;strong&gt;You can&#039;t be compelled to disclose data you don’t have.&lt;/strong&gt; If you collect lots of user data, law enforcement will eventually come demanding it. Operating a service typically requires some collection of user data, even if it’s just login information. But the problem is when information starts to be collected beyond what is strictly necessary. &lt;/p&gt;&lt;p&gt;This excess collection can be seen as convenient or useful for running the service, or often as potentially valuable like &lt;a href=&quot;https://www.eff.org/deeplinks/2025/06/protect-yourself-metas-latest-attack-privacy&quot;&gt;behavioral tracking&lt;/a&gt; used for advertising. However, the more that’s collected, the more the service becomes a target for both legal demands and illegal data breaches. &lt;/p&gt;&lt;p&gt;For data that enables desirable features for the user, &lt;a href=&quot;https://www.eff.org/deeplinks/2019/02/designing-welcome-mats-invite-user-privacy-0&quot;&gt;design choices&lt;/a&gt; can make privacy the default and give users additional (preferably opt-in) sharing choices. &lt;/p&gt;&lt;h4&gt;&lt;span style=&quot;background-color: #f6bdb9;&quot;&gt;&lt;strong&gt;Shorter Retention&lt;/strong&gt;&lt;/span&gt;&lt;/h4&gt;&lt;p&gt;As another minimization strategy, hosts should regularly and automatically delete information when it is no longer necessary. For example, deleting logs of user activity can limit the scope of law enforcement’s retrospective surveillance—maybe limiting a court order to the last 30 days instead of the lifetime of the account. &lt;/p&gt;&lt;p&gt;Again design choices, like giving users the ability to send disappearing messages and deleting them from the server once they’re downloaded, can also further limit the impact of future data requests. Furthermore, these design choices should have privacy-preserving default&lt;/p&gt;&lt;h4&gt;&lt;span style=&quot;background-color: #f6bdb9;&quot;&gt;&lt;strong&gt;Avoid Data Sharing &lt;/strong&gt;&lt;/span&gt;&lt;/h4&gt;&lt;p&gt;Depending on the service being hosted there may be some need to rely on &lt;em&gt;another&lt;/em&gt; service to make everything work for users. Third-party login or ad services are common examples with some amount of tracking built in. Information shared with these third-parties should also be minimized and avoided, as they may not have a strict commitment to user privacy. Most notoriously, data brokers who sell advertisement data can provide another legal work-around for law enforcement by letting them &lt;a href=&quot;https://www.eff.org/deeplinks/2022/08/fog-revealed-guided-tour-how-cops-can-browse-your-location-data&quot;&gt;simply buy collected data across many apps&lt;/a&gt;. This extends to decisions about what information is made public by default, thus accessible to many third parties, and if that is clear to users.&lt;em&gt;&lt;br /&gt;&lt;/em&gt;&lt;/p&gt;&lt;h4&gt;&lt;span style=&quot;background-color: #f6bdb9;&quot;&gt;&lt;strong&gt;(True) End-to-End Encryption&lt;/strong&gt;&lt;/span&gt;&lt;/h4&gt;&lt;p&gt;Now that &lt;a href=&quot;https://www.eff.org/deeplinks/2021/09/https-actually-everywhere&quot;&gt;HTTPS is actually everywhere&lt;/a&gt;, most traffic between a service and a user can be easily secured—&lt;a href=&quot;https://certbot.eff.org/&quot;&gt;for free&lt;/a&gt;. This limits what onlookers can collect on users of the service, since messages between the two are in a secure “envelope.” However, this doesn’t change the fact the service is opening this envelope before passing it along to other users, or returning it to the same user. With each opened message, this is more information to defend.&lt;/p&gt;&lt;p&gt;Better, is end-to-end encryption (e2ee), which just means providing users with secure envelopes that even the service provider cannot open. This is how a featureful messaging app &lt;a href=&quot;https://ssd.eff.org/module/how-to-use-signal&quot;&gt;like Signal&lt;/a&gt; can &lt;a href=&quot;https://tech.hindustantimes.com/mobile/news/recent-court-filing-reveals-exactly-how-much-data-signal-collects-about-you-71619595504148.html&quot;&gt;respond to requests&lt;/a&gt; with only three pieces of information: the account identifier (phone number), the date of creation, and the last date of access. Many services should follow suit and limit access through encryption.&lt;/p&gt;&lt;p&gt;Note that while e2ee has become a popular marketing term, it is simply inaccurate for describing any encryption use designed to be broken or circumvented. Implementing “&lt;a href=&quot;https://www.eff.org/deeplinks/2025/02/uks-demands-apple-break-encryption-emergency-us-all&quot;&gt;encryption backdoors&lt;/a&gt;” to break encryption when desired, or simply collecting information before or after the envelope is sealed on a user’s device (“&lt;a href=&quot;https://www.eff.org/deeplinks/2019/11/why-adding-client-side-scanning-breaks-end-end-encryption&quot;&gt;client-side scanning&lt;/a&gt;”) is antithetical to encryption. Finally, note that e2ee does not protect against law enforcement obtaining the contents of communications should they gain access to any device used in the conversation, or if message history is stored on the server unencrypted.&lt;/p&gt;&lt;h2&gt;Protecting Yourself and Your Community&lt;/h2&gt;&lt;p&gt;As outlined, often the security of your personal data depends on the service providers you choose to use. But as a user you do still have some options. EFF’s &lt;a href=&quot;https://ssd.eff.org/&quot;&gt;Surveillance Self-Defense&lt;/a&gt; is a maintained resource with many detailed steps you can take. In short, you need to assess your risks, limit the services you use to those you can trust (as much as you can), improve settings, and when all else fails, accessorize with tools that prevent data sharing in the first place—like EFF’s &lt;a href=&quot;https://privacybadger.org/&quot;&gt;Privacy Badger&lt;/a&gt; browser extension.&lt;/p&gt;&lt;p&gt;Remember that privacy is a team sport. It’s not enough to make these changes as an individual, it’s just as important to share and educate others, as well as fighting for better digital privacy policy on all levels of governance. Learn, &lt;a href=&quot;https://efa.eff.org/&quot;&gt;get organized&lt;/a&gt;, and &lt;a href=&quot;https://act.eff.org/&quot;&gt;take action&lt;/a&gt;.&lt;/p&gt;&lt;p&gt; &lt;/p&gt;
  892.  
  893. &lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
  894.     <pubDate>Thu, 26 Jun 2025 15:13:40 +0000</pubDate>
  895. <guid isPermaLink="false">110845 at https://www.eff.org</guid>
  896. <category domain="https://www.eff.org/issues/privacy">Privacy</category>
  897. <category domain="https://www.eff.org/issues/end-end-encryption">End-to-End Encryption</category>
  898. <category domain="https://www.eff.org/issues/security">Security</category>
  899. <dc:creator>Rory Mir</dc:creator>
  900. <dc:creator>Aaron Mackey</dc:creator>
  901. <enclosure url="https://www.eff.org/files/banner_library/police-surveillance-hat.jpg" alt="A silhouette of a police officer, with spying eye on his hat" type="image/jpeg" length="124291" />
  902.  </item>
  903.  <item>
  904.    <title>California’s Corporate Cover-Up Act Is a Privacy Nightmare</title>
  905.    <link>https://www.eff.org/deeplinks/2025/06/californias-corporate-cover-act-privacy-nightmare</link>
  906.    <description>&lt;div class=&quot;field field--name-body field--type-text-with-summary field--label-hidden&quot;&gt;&lt;div class=&quot;field__items&quot;&gt;&lt;div class=&quot;field__item even&quot;&gt;&lt;p&gt;&lt;span&gt;California lawmakers are pushing one of the &lt;a href=&quot;https://www.eff.org/deeplinks/2025/06/statement-california-state-senate-advancing-dangerous-surveillance-bill&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;most dangerous privacy rollbacks&lt;/a&gt; we’ve seen in years. &lt;a href=&quot;https://leginfo.legislature.ca.gov/faces/billNavClient.xhtml?bill_id=202520260SB690&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;S.B. 690&lt;/a&gt;, what we’re calling the &lt;em&gt;Corporate Cover-Up Act&lt;/em&gt;, is a brazen attempt to let corporations spy on us in secret, gutting long-standing protections without a shred of accountability.&lt;/span&gt;&lt;/p&gt;
  907. &lt;p&gt;&lt;em&gt;&lt;span&gt;The Corporate Cover-Up Act &lt;/span&gt;&lt;/em&gt;&lt;span&gt;is a massive carve-out that would gut &lt;a href=&quot;https://leginfo.legislature.ca.gov/faces/codes_displayText.xhtml?lawCode=PEN&amp;amp;part=1.&amp;amp;title=15.&amp;amp;chapter=1.5&quot;&gt;California’s Invasion of Privacy Act &lt;/a&gt;(CIPA) and give Big Tech and data brokers a green light to spy on us without consent for just about any reason. If passed, S.B. 690 would let companies secretly record your clicks, calls, and behavior online—then share or sell that data with whomever they’d like, all under the banner of a “commercial business purpose.” &lt;/span&gt;&lt;/p&gt;
  908. &lt;p&gt;&lt;span&gt;Simply put, &lt;em&gt;The Corporate Cover-Up Act &lt;/em&gt;(S.B. 690) is a blatant attack on digital privacy, and is written to eviscerate long-standing privacy laws and legal safeguards Californians rely on. If passed, it would:&lt;/span&gt;&lt;/p&gt;
  909. &lt;ul&gt;
  910. &lt;li&gt;&lt;span&gt; &lt;/span&gt;&lt;span&gt;Gut California’s Invasion of Privacy Act (CIPA)—a law that protects us from being secretly recorded or monitored&lt;/span&gt;&lt;/li&gt;
  911. &lt;li&gt;&lt;span&gt; &lt;/span&gt;&lt;span&gt;Legalize corporate wiretaps, allowing companies to intercept real-time clicks, calls, and communications&lt;/span&gt;&lt;/li&gt;
  912. &lt;li&gt;&lt;span&gt; &lt;/span&gt;&lt;span&gt;Authorize pen registers and trap-and-trace tools, which track who you talk to, when, and how—without consent&lt;/span&gt;&lt;/li&gt;
  913. &lt;li&gt;&lt;span&gt; &lt;/span&gt;&lt;span&gt;Let companies use all of this surveillance data for “commercial business purposes”—with zero notice and no legal consequences&lt;/span&gt;&lt;/li&gt;
  914. &lt;/ul&gt;
  915. &lt;p&gt;&lt;span&gt;This isn’t a small fix. It’s a sweeping rollback of hard-won privacy protections—the kind that helped expose serious abuses by companies like &lt;a href=&quot;https://law.justia.com/cases/federal/district-courts/california/candce/5:2012md02314/251223/87/&quot;&gt;Facebook&lt;/a&gt;, &lt;a href=&quot;https://law.justia.com/cases/federal/district-courts/california/candce/5:2020cv03664/360374/330/&quot;&gt;Google&lt;/a&gt;, and &lt;a href=&quot;https://law.justia.com/cases/federal/district-courts/california/candce/3:2022cv04792/399500/180/&quot;&gt;Oracle&lt;/a&gt;. &lt;/span&gt;&lt;/p&gt;
  916. &lt;p class=&quot;take-action&quot;&gt;&lt;a href=&quot;https://act.eff.org/action/ca-stop-the-corporate-cover-up-act-s-b-690&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;&lt;strong&gt;TAKE ACTION&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;
  917. &lt;h2&gt;&lt;strong&gt;&lt;span&gt;You Can&#039;t Opt Out of Surveillance You Don&#039;t Know Is Happening&lt;/span&gt;&lt;/strong&gt;&lt;/h2&gt;
  918. &lt;p&gt;&lt;span&gt;Proponents of &lt;em&gt;The Corporate Cover-Up Act &lt;/em&gt; claim it’s just a “clarification” to align CIPA with the California Consumer Privacy Act (CCPA). That’s misleading. The truth is, CIPA and CCPA don’t conflict. CIPA stops secret surveillance. The CCPA governs how data is used &lt;em&gt;after&lt;/em&gt; it’s collected, such as through the right to opt out of your data being shared. &lt;/span&gt;&lt;/p&gt;
  919. &lt;p&gt;&lt;span&gt;You can&#039;t opt out of being spied on if you’re never told it’s happening in the first place. Once companies collect your data under S.B. 690, they can:&lt;/span&gt;&lt;/p&gt;
  920. &lt;ul&gt;
  921. &lt;li&gt;&lt;span&gt; &lt;/span&gt;&lt;span&gt;Sell it to data brokers&lt;/span&gt;&lt;/li&gt;
  922. &lt;li&gt;&lt;span&gt; &lt;/span&gt;&lt;span&gt;Share it with immigration enforcement or other government agencies&lt;/span&gt;&lt;/li&gt;
  923. &lt;li&gt;&lt;span&gt; &lt;/span&gt;&lt;span&gt;Use it to against abortion seekers, LGBTQ+ people, workers, and protesters, and&lt;/span&gt;&lt;/li&gt;
  924. &lt;li&gt;&lt;span&gt; &lt;/span&gt;&lt;span&gt;Retain it indefinitely for profiling&lt;/span&gt;&lt;/li&gt;
  925. &lt;/ul&gt;
  926. &lt;p&gt;&lt;span&gt;…with no consent; no transparency; and no recourse.&lt;/span&gt;&lt;/p&gt;
  927. &lt;h2&gt;&lt;strong&gt;The Communities Most at Risk&lt;/strong&gt;&lt;/h2&gt;
  928. &lt;p&gt;&lt;span&gt;This bill isn’t just a tech policy misstep. It’s a civil rights disaster. If passed, S.B. 690 will put the most vulnerable people in California directly in harm’s way:&lt;/span&gt;&lt;/p&gt;
  929. &lt;ul&gt;
  930. &lt;li&gt;&lt;span&gt; &lt;/span&gt;&lt;span&gt;Immigrants, who may be tracked and targeted by ICE&lt;/span&gt;&lt;/li&gt;
  931. &lt;li&gt;&lt;span&gt; &lt;/span&gt;&lt;span&gt;LGBTQ+ individuals, who could be outed or monitored without their knowledge&lt;/span&gt;&lt;/li&gt;
  932. &lt;li&gt;&lt;span&gt; &lt;/span&gt;&lt;span&gt;Abortion seekers, who could have location or communications data used against them&lt;/span&gt;&lt;/li&gt;
  933. &lt;li&gt;&lt;span&gt; &lt;/span&gt;&lt;span&gt;Protesters and workers, who rely on private conversations to organize safely&lt;/span&gt;&lt;/li&gt;
  934. &lt;/ul&gt;
  935. &lt;p&gt;&lt;span&gt;The message this bill sends is clear: corporate profits come before your privacy.&lt;/span&gt;&lt;/p&gt;
  936. &lt;h2&gt;&lt;strong&gt;&lt;span&gt;We Must Act Now&lt;/span&gt;&lt;/strong&gt;&lt;/h2&gt;
  937. &lt;p&gt;&lt;span&gt;S.B. 690 isn’t just a bad tech bill—it’s a dangerous precedent. It tells every corporation: Go ahead and spy on your consumers—we’ve got your back. &lt;/span&gt;&lt;/p&gt;
  938. &lt;p&gt;&lt;span&gt;Californians deserve better.&lt;/span&gt;&lt;/p&gt;
  939. &lt;p&gt;&lt;span&gt;If you live in California, now is the time to call your lawmakers and demand they vote NO on the Corporate Cover-Up Act.&lt;/span&gt;&lt;/p&gt;
  940. &lt;p class=&quot;take-action&quot;&gt;&lt;a href=&quot;https://act.eff.org/action/ca-stop-the-corporate-cover-up-act-s-b-690&quot;&gt;&lt;strong&gt;TAKE ACTION&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;
  941. &lt;p&gt;&lt;span&gt;Spread the word, amplify the message, and help stop this attack on privacy before it becomes law.&lt;/span&gt;&lt;/p&gt;
  942.  
  943. &lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
  944.     <pubDate>Wed, 25 Jun 2025 17:21:46 +0000</pubDate>
  945. <guid isPermaLink="false">110846 at https://www.eff.org</guid>
  946. <category domain="https://www.eff.org/issues/privacy">Privacy</category>
  947. <category domain="https://www.eff.org/issues/big-tech">Big Tech</category>
  948. <dc:creator>Rindala Alajaji</dc:creator>
  949. <enclosure url="https://www.eff.org/files/banner_library/california-sunshine_0.png" alt="California Sunshine" type="image/png" length="34671" />
  950.  </item>
  951.  <item>
  952.    <title>FBI Warning on IoT Devices: How to Tell If You Are Impacted</title>
  953.    <link>https://www.eff.org/deeplinks/2025/06/fbi-warning-iot-devices-how-tell-if-you-are-impacted</link>
  954.    <description>&lt;div class=&quot;field field--name-body field--type-text-with-summary field--label-hidden&quot;&gt;&lt;div class=&quot;field__items&quot;&gt;&lt;div class=&quot;field__item even&quot;&gt;&lt;p&gt;&lt;span&gt;On June 5th, the FBI &lt;/span&gt;&lt;a href=&quot;https://www.ic3.gov/PSA/2025/PSA250605&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;&lt;span&gt;released a PSA&lt;/span&gt;&lt;/a&gt;&lt;span&gt; titled “Home Internet Connected Devices Facilitate Criminal Activity.” This PSA largely references devices impacted by the latest generation of &lt;/span&gt;&lt;a href=&quot;https://www.humansecurity.com/learn/blog/satori-threat-intelligence-disruption-badbox-2-0/&quot;&gt;&lt;span&gt;BADBOX&lt;/span&gt;&lt;/a&gt;&lt;span&gt; malware (as named by HUMAN’s Satori Threat Intelligence and Research team) that EFF researchers &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/deeplinks/2023/05/android-tv-boxes-sold-amazon-come-pre-loaded-malware&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;&lt;span&gt;also encountered&lt;/span&gt;&lt;/a&gt;&lt;span&gt; primarily on Android TV set-top boxes. However, the malware has impacted tablets, digital projectors, aftermarket vehicle infotainment units, picture frames, and other types of IoT devices. &lt;/span&gt;&lt;/p&gt;
  955. &lt;p&gt;&lt;span&gt;One goal of this malware is to create a network proxy on the devices of unsuspecting buyers, potentially making them hubs for various potential criminal activities, putting the owners of these devices at risk from authorities. This malware is particularly insidious, coming pre-installed out of the box from major online retailers such as Amazon and AliExpress. If you search “Android TV Box” on Amazon right now, many of the same models that have been impacted are still up being sold by sellers of opaque origins. Facilitating the sale of these devices even led us to &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/press/releases/eff-urges-ftc-address-american-resellers-malware-android-tv-set-top-boxes&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;&lt;span&gt;write an open letter&lt;/span&gt;&lt;/a&gt;&lt;span&gt; to the FTC, urging them to take action on resellers.&lt;/span&gt;&lt;/p&gt;
  956. &lt;p&gt;&lt;span&gt;The FBI listed some indicators of compromise (IoCs) in the PSA for consumers to tell if they were impacted. But the average person isn’t running network detection infrastructure in their homes, and cannot hope to understand what IoCs can be used to determine if their devices generate “unexplained or suspicious Internet traffic.” Here, we will attempt to help give more comprehensive background information about these IoCs. If you find any of these on devices you own, then we encourage you to follow through by contacting the FBI&#039;s Internet Crime Complaint Center (IC3) at&lt;/span&gt;&lt;a href=&quot;https://www.ic3.gov/&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt; &lt;span&gt;www.ic3.gov&lt;/span&gt;&lt;/a&gt;&lt;span&gt;.&lt;/span&gt;&lt;/p&gt;
  957. &lt;p&gt;&lt;span&gt;The FBI lists these IoC:&lt;/span&gt;&lt;/p&gt;
  958. &lt;ul&gt;
  959. &lt;li&gt;&lt;span&gt;The presence of suspicious marketplaces where apps are downloaded.&lt;/span&gt;&lt;/li&gt;
  960. &lt;li&gt;&lt;span&gt;Requiring Google Play Protect settings to be disabled.&lt;/span&gt;&lt;/li&gt;
  961. &lt;li&gt;&lt;span&gt;Generic TV streaming devices advertised as unlocked or capable of accessing free content.&lt;/span&gt;&lt;/li&gt;
  962. &lt;li&gt;&lt;span&gt;IoT devices advertised from unrecognizable brands.&lt;/span&gt;&lt;/li&gt;
  963. &lt;li&gt;&lt;span&gt;Android devices that are not Play Protect certified.&lt;/span&gt;&lt;/li&gt;
  964. &lt;li&gt;&lt;span&gt;Unexplained or suspicious Internet traffic.&lt;/span&gt;&lt;/li&gt;
  965. &lt;/ul&gt;
  966. &lt;p&gt;&lt;span&gt;The following adds context to above, as well as some added IoCs we have seen from our research.&lt;/span&gt;&lt;/p&gt;
  967. &lt;p&gt;&lt;b&gt;Play Protect Certified&lt;/b&gt;&lt;/p&gt;
  968. &lt;p&gt;&lt;span&gt;“Android devices that are not Play Protect certified” refers to any device brand or partner not listed here: &lt;/span&gt;&lt;a href=&quot;https://www.android.com/certified/partners/&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;&lt;span&gt;https://www.android.com/certified/partners/&lt;/span&gt;&lt;/a&gt;&lt;span&gt;. Google subjects devices to compatibility and security tests in their criteria for inclusion in the Play Protect program, though the mentioned list’s criteria are not made completely transparent outside of Google. But this list does change, as we saw with the tablet brand we researched &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/deeplinks/2024/11/one-down-many-go-pre-installed-malware-android&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;&lt;span&gt;being de-listed&lt;/span&gt;&lt;/a&gt;&lt;span&gt;. This encompasses “devices advertised from unrecognizable brands.” The list includes international brands and partners as well.&lt;/span&gt;&lt;/p&gt;
  969. &lt;p&gt;&lt;b&gt;Outdated Operating Systems&lt;/b&gt;&lt;/p&gt;
  970. &lt;p&gt;&lt;span&gt;Other issues we saw were really outdated Android versions. For posterity, &lt;/span&gt;&lt;a href=&quot;https://www.msn.com/en-us/news/technology/android-16-is-here-but-its-big-redesign-isn-t-ready/ar-AA1GsNfP&quot;&gt;&lt;span&gt;Android 16&lt;/span&gt;&lt;/a&gt;&lt;span&gt; just started rolling out. Android 9-12 appeared to be the most common versions routinely used. This could be a result of “copied homework” from previous legitimate Android builds, and often come with their own update software that can present a problem on its own and deliver second-stage payloads for device infection in addition to what it is downloading and updating on the device.&lt;/span&gt;&lt;/p&gt;
  971. &lt;p&gt;&lt;span&gt;You can check which version of Android you have by going to Settings and searching “Android version”.&lt;/span&gt;&lt;/p&gt;
  972. &lt;p&gt;&lt;b&gt;Android App Marketplaces&lt;/b&gt;&lt;/p&gt;
  973. &lt;p&gt;&lt;span&gt;We’ve &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/document/brief-amicus-curiae-eff-support-plaintiff&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;&lt;span&gt;previously argued&lt;/span&gt;&lt;/a&gt;&lt;span&gt; how the availability of different app marketplaces leads to greater consumer choice, where users can choose alternatives even more secure than the Google Play Store. While this is true, the FBI’s warning about suspicious marketplaces is also prudent. Avoiding “downloading apps from unofficial marketplaces advertising free streaming content” is sound (if somewhat vague) advice for set-top boxes, yet this recommendation comes without further guidelines on how to identify which marketplaces might be suspicious for other Android IoT platforms. Best practice is to investigate any app stores used on Android devices separately, but to be aware that if a suspicious Android device is purchased, it can contain preloaded app stores that mimic the functionality of legitimate ones but also contain unwanted or malicious code.&lt;/span&gt;&lt;/p&gt;
  974. &lt;p&gt;&lt;b&gt;Models Listed from the Badbox Report&lt;/b&gt;&lt;/p&gt;
  975. &lt;p&gt;&lt;span&gt;We also recommend looking up device names and models that were listed in the &lt;/span&gt;&lt;a href=&quot;https://www.humansecurity.com/learn/blog/satori-threat-intelligence-disruption-badbox-2-0/&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;&lt;span&gt;BADBOX 2.0&lt;/span&gt;&lt;/a&gt;&lt;span&gt; report. We investigated the T95 models along with other &lt;/span&gt;&lt;a href=&quot;https://github.com/DesktopECHO/T95-H616-Malware&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;&lt;span&gt;independent researchers&lt;/span&gt;&lt;/a&gt;&lt;span&gt; that initially found this malware present. A lot of model names could be grouped in families with the same letters but different numbers. These operations are iterating fast, but the naming conventions are often lazy in this respect. If you&#039;re not sure what model you own, you can usually find it listed on a sticker somewhere on the device. If that fails, you may be able to find it by pulling up the original receipt or looking through your order history.&lt;/span&gt;&lt;/p&gt;
  976. &lt;p&gt;&lt;b&gt;A Note from Satori Researchers:&lt;/b&gt;&lt;/p&gt;
  977. &lt;p&gt;&lt;i&gt;&lt;span&gt;“Below is a list of device models known to be targeted by the threat actors. Not all devices of a given model are necessarily infected, but Satori researchers are confident that infections are present on some devices of the below device models:”&lt;/span&gt;&lt;/i&gt;&lt;/p&gt;
  978. &lt;p&gt;&lt;i&gt;&lt;span&gt;&lt;div class=&quot;caption caption-center&quot;&gt;&lt;div class=&quot;caption-width-container&quot;&gt;&lt;div class=&quot;caption-inner&quot;&gt;&lt;img src=&quot;/files/2025/06/24/screenshot_2025-06-18_at_09-36-33_satori_threat_intelligence_disruption_badbox_2.0_targets_consumer_devices_with_multiple_fraud_schemes_-_human_security.png&quot; width=&quot;800&quot; height=&quot;821&quot; alt=&quot;List of Impacted Models&quot; title=&quot;List of Impacted Models&quot; /&gt;&lt;p class=&quot;caption-text&quot;&gt;List of Potentially Impacted Models&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/span&gt;&lt;/i&gt;&lt;/p&gt;
  979. &lt;p&gt;&lt;b&gt;Broader Picture: The Digital Divide&lt;/b&gt;&lt;/p&gt;
  980. &lt;p&gt;&lt;span&gt;Unfortunately, the only way to be sure that an Android device from an unknown brand is safe is not to buy it in the first place. Though initiatives like the &lt;/span&gt;&lt;a href=&quot;https://www.fcc.gov/CyberTrustMark&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;&lt;span&gt;U.S. Cyber Trust Mark&lt;/span&gt;&lt;/a&gt;&lt;span&gt; are welcome developments intended to encourage demand-side trust in vetted products, recent shake ups in federal regulatory bodies means the future of this assurance mark is unknown. This means those who face budget constraints and have trouble affording top-tier digital products for streaming content or other connected purposes may rely on cheaper imitation products that are rife with not only vulnerabilities, but even come out-of-the-box preloaded with malware. This puts these people disproportionately at legal risk when these devices are used to provide the buyers’ home internet connection as a proxy for nefarious or illegal purposes.&lt;/span&gt;&lt;/p&gt;
  981. &lt;p&gt;&lt;span&gt;Cybersecurity and trust that the products we buy won’t be used against us is essential: not just for those that can afford name-brand digital devices, but for everyone. While we welcome the IoCs that the FBI has listed in its PSA, more must be done to protect consumers from a myriad of dangers that their devices expose them to.&lt;/span&gt;&lt;/p&gt;
  982.  
  983. &lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
  984.     <pubDate>Wed, 25 Jun 2025 04:03:14 +0000</pubDate>
  985. <guid isPermaLink="false">110847 at https://www.eff.org</guid>
  986. <category domain="https://www.eff.org/issues/security">Security</category>
  987. <dc:creator>Alexis Hancock</dc:creator>
  988. <dc:creator>Bill Budington</dc:creator>
  989. <enclosure url="https://www.eff.org/files/banner_library/2019-security.png" alt="crossed keys security icon banner" type="image/png" length="17853" />
  990.  </item>
  991.  <item>
  992.    <title>Why Are Hundreds of Data Brokers Not Registering with States?</title>
  993.    <link>https://www.eff.org/deeplinks/2025/06/why-are-hundreds-data-brokers-not-registering-states</link>
  994.    <description>&lt;div class=&quot;field field--name-body field--type-text-with-summary field--label-hidden&quot;&gt;&lt;div class=&quot;field__items&quot;&gt;&lt;div class=&quot;field__item even&quot;&gt;&lt;p&gt;&lt;em&gt;Written in collaboration with Privacy Rights Clearinghouse&lt;/em&gt;&lt;/p&gt;
  995. &lt;p&gt;Hundreds of data brokers have not registered with state consumer protection agencies. These findings come as more states are passing data broker transparency laws that require brokers to provide information about their business and, in some cases, give consumers an easy way to opt out.&lt;/p&gt;
  996. &lt;p&gt;In recent years, &lt;a href=&quot;https://leginfo.legislature.ca.gov/faces/billTextClient.xhtml?bill_id=202320240SB362&quot;&gt;California&lt;/a&gt;, &lt;a href=&quot;https://statutes.capitol.texas.gov/Docs/BC/htm/BC.509.htm&quot;&gt;Texas&lt;/a&gt;, &lt;a href=&quot;https://olis.oregonlegislature.gov/liz/2023R1/Downloads/MeasureDocument/HB2052/Enrolled&quot;&gt;Oregon&lt;/a&gt;, and &lt;a href=&quot;https://legislature.vermont.gov/statutes/section/09/062/02446&quot;&gt;Vermont&lt;/a&gt; have passed data broker registration laws that require brokers to identify themselves to state regulators and the public. A new analysis by &lt;a href=&quot;https://privacyrights.org/&quot;&gt;Privacy Rights Clearinghouse&lt;/a&gt; (PRC) and the Electronic Frontier Foundation (EFF) reveals that many data brokers registered in one state aren’t registered in others.&lt;/p&gt;
  997. &lt;p&gt;Companies that registered in one state but did not register in another include: 291 companies that did not register in California, 524 in Texas, 475 in Oregon, and 309 in Vermont. These numbers come from data analyzed from early April 2025.&lt;/p&gt;
  998. &lt;p&gt;PRC and EFF sent letters to state enforcement agencies urging them to investigate these findings. More investigation by states is needed to determine whether these registration discrepancies reflect widespread noncompliance, gaps and definitional differences in the various state laws, or some other explanation.&lt;/p&gt;
  999. &lt;p&gt;New data broker transparency laws are an essential first step to reining in the data broker industry. This is an ecosystem in which your personal data taken from apps and other web services can be bought and sold largely without your knowledge. The data can be highly sensitive like location information, and can be used to &lt;a href=&quot;https://www.eff.org/deeplinks/2022/03/ban-online-behavioral-advertising&quot;&gt;target you with ads&lt;/a&gt;, &lt;a href=&quot;https://www.eff.org/deeplinks/2023/04/digital-privacy-legislation-civil-rights-legislation&quot;&gt;discriminate against you&lt;/a&gt;, and even &lt;a href=&quot;https://www.eff.org/deeplinks/2022/08/inside-fog-data-science-secretive-company-selling-mass-surveillance-local-police&quot;&gt;enhance government surveillance&lt;/a&gt;. The widespread sharing of this data also makes it more susceptible to data breaches. And its easy availability allows personal data to be obtained by bad actors for phishing, harassment, or stalking.&lt;/p&gt;
  1000. &lt;p&gt;Consumers need robust deletion mechanisms to remove their data stored and sold by these companies. But the potential registration gaps we identified threaten to undermine such tools. California’s &lt;a href=&quot;https://www.eff.org/deeplinks/2023/08/californias-delete-act-protects-us-data-brokers&quot;&gt;Delete Act&lt;/a&gt; will soon provide consumers with an easy tool to delete their data held by brokers—but it can only work if brokers register. California has already brought a handful of &lt;a href=&quot;https://cppa.ca.gov/announcements/2025/20250508.html&quot;&gt;enforcement actions&lt;/a&gt; against brokers who failed to register under that law, and such compliance efforts are becoming even more critical as deletion mechanisms come online.&lt;/p&gt;
  1001. &lt;p&gt;It is important to understand the scope of our analysis.&lt;/p&gt;
  1002. &lt;p&gt;This analysis only includes companies that registered in at least one state. It does not capture data brokers that completely disregard state laws by failing to register in any state. A total of 750 data brokers have registered in at least one state. While harder to find, shady data brokers who have failed to register anywhere should remain a primary enforcement target.&lt;/p&gt;
  1003. &lt;p&gt;This analysis also does not claim or prove that any of the data brokers we found broke the law. While the definition of “data broker” is similar across states, there are variations that could require a company to register in one state and not another. To take one example, a data broker registered in Texas that only brokers the data of Texas residents would not be legally required to register in California. To take another, a data broker that registered with Vermont in 2020 that then changed its business model and is no longer a broker, would not be required to register in 2025. More detail on variations in data broker laws is outlined in our letters to regulators.&lt;/p&gt;
  1004. &lt;p&gt;States should investigate compliance with data broker registration requirements, enforce their laws, and plug any loopholes. Ultimately, consumers deserve protections regardless of where they reside, and Congress should also work to pass baseline federal data broker legislation that minimizes collection and includes strict use and disclosure limits, transparency obligations, and consumer rights.&lt;/p&gt;
  1005. &lt;p&gt;&lt;strong&gt;Read more here:&lt;/strong&gt;&lt;/p&gt;
  1006. &lt;p&gt;&lt;a href=&quot;https://www.eff.org/document/california-data-broker-registration-letter&quot;&gt;California letter&lt;/a&gt;&lt;/p&gt;
  1007. &lt;p&gt;&lt;a href=&quot;https://www.eff.org/document/texas-data-broker-registration-letter&quot;&gt;Texas Letter&lt;/a&gt;&lt;/p&gt;
  1008. &lt;p&gt;&lt;a href=&quot;https://www.eff.org/document/oregon-data-broker-registration-letter&quot;&gt;Oregon Letter&lt;/a&gt;&lt;/p&gt;
  1009. &lt;p&gt;&lt;a href=&quot;https://www.eff.org/document/vermont-data-broker-registration-letter&quot;&gt;Vermont Letter&lt;/a&gt;&lt;/p&gt;
  1010. &lt;p&gt;&lt;a href=&quot;https://www.eff.org/document/appendix-b-databrokerfullregistry2025&quot;&gt;Spreadsheet of data brokers&lt;/a&gt;&lt;/p&gt;
  1011.  
  1012. &lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
  1013.     <pubDate>Tue, 24 Jun 2025 17:58:01 +0000</pubDate>
  1014. <guid isPermaLink="false">110843 at https://www.eff.org</guid>
  1015. <category domain="https://www.eff.org/issues/privacy">Privacy</category>
  1016. <category domain="https://www.eff.org/issues/location-data-brokers">Location Data Brokers</category>
  1017. <dc:creator>Mario Trujillo</dc:creator>
  1018. <dc:creator>Hayley Tsukayama</dc:creator>
  1019. <enclosure url="https://www.eff.org/files/banner_library/icon-2019-privacy.png" alt="" type="image/png" length="16605" />
  1020.  </item>
  1021.  <item>
  1022.    <title>Major Setback for Intermediary Liability in Brazil: Risks and Blind Spots </title>
  1023.    <link>https://www.eff.org/deeplinks/2025/06/major-setback-intermediary-liability-brazil-risks-and-blind-spots</link>
  1024.    <description>&lt;div class=&quot;field field--name-body field--type-text-with-summary field--label-hidden&quot;&gt;&lt;div class=&quot;field__items&quot;&gt;&lt;div class=&quot;field__item even&quot;&gt;&lt;p&gt;&lt;i&gt;&lt;span data-contrast=&quot;none&quot;&gt;This is the third post of a series about internet intermediary liability in Brazil. Our &lt;/span&gt;&lt;/i&gt;&lt;a href=&quot;https://www.eff.org/deeplinks/2024/10/brazils-internet-intermediary-liability-rules-under-trial-what-are-risks&quot;&gt;&lt;i&gt;&lt;span data-contrast=&quot;none&quot;&gt;first post&lt;/span&gt;&lt;/i&gt;&lt;/a&gt;&lt;i&gt;&lt;span data-contrast=&quot;none&quot;&gt; gives an overview of Brazil&#039;s current internet intermediary liability regime, set out in a law known as &lt;/span&gt;&lt;/i&gt;&lt;a href=&quot;https://www.planalto.gov.br/ccivil_03/_ato2011-2014/2014/lei/l12965.htm&quot;&gt;&lt;i&gt;&lt;span data-contrast=&quot;none&quot;&gt;&quot;Marco Civil da Internet,&quot;&lt;/span&gt;&lt;/i&gt;&lt;/a&gt;&lt;i&gt;&lt;span data-contrast=&quot;none&quot;&gt; the context of its approval in 2014, and the beginning of the Supreme Court&#039;s judgment of such regime in November 2024. Our &lt;a href=&quot;https://www.eff.org/deeplinks/2025/06/major-setback-intermediary-liability-brazil-how-did-we-get-here &quot;&gt;second post&lt;/a&gt; &lt;/span&gt;&lt;/i&gt;&lt;i&gt;&lt;span data-contrast=&quot;none&quot;&gt;provides a bigger picture of the Brazilian context underlying the court&#039;s analysis and its most likely final decision.&lt;/span&gt;&lt;/i&gt;&lt;span data-ccp-props=&quot;0}&quot;&gt; &lt;/span&gt;&lt;/p&gt;
  1025. &lt;p&gt;&lt;em&gt;Update: Brazil’s Supreme Court analysis of the country’s intermediary liability regime concluded on June 26, 2025. With three dissenting votes in favor of Article 19’s constitutionality, the majority of the court deemed it partially unconstitutional. Much of the perils we pointed out have unfortunately come true. The ruling does include some (though not all) of the minimum safeguards we had recommended. The full content of the final thesis approved is available here. Some highlights: importantly, the court preserved Article 19’s regime for crimes against honor (such as defamation). However, the notice-and-takedown regime set in Article 21 became the general rule for platforms’ liability for user content. Platforms are liable regardless of notification for paid content they distribute (including ads) and for posts shared through “artificial distribution networks” (i.e., networks of bots). The court established a duty of care regarding the distribution of specific serious unlawful content. This monitoring duty approach is &lt;a href=&quot;https://www.eff.org/deeplinks/2023/07/repel-rules-and-interpretations-can-lead-general-content-monitoring-and-filtering&quot;&gt;quite controversial&lt;/a&gt;, especially considering the varied nature and size of platforms. Fortunately, the ruling emphasizes that platforms can only be held liable for these specific contents without a previous notice if they fail to tackle them in a systemic way (rather than for individual posts). Article 19’s liability regime remains the general rule for applications like email services, virtual conference platforms, and messaging apps (regarding inter-personal messages). The entirety of the ruling, including the full content of Justice’s votes, will be published in the coming weeks. &lt;/em&gt;&lt;/p&gt;
  1026. &lt;p&gt;&lt;span data-contrast=&quot;none&quot;&gt;The court’s examination of Marco Civil’s Article 19 began with Justice Dias Toffoli in November last year. We explained &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/deeplinks/2024/10/brazils-internet-intermediary-liability-rules-under-trial-what-are-risks&quot;&gt;&lt;span data-contrast=&quot;none&quot;&gt;here&lt;/span&gt;&lt;/a&gt;&lt;span data-contrast=&quot;none&quot;&gt; about the cases under trial, the reach of the Supreme Court’s decision, and Article 19’s background related to Marco Civil’s approval in 2014. We also highlighted some aspects and risks of Justice Dias Toffoli’s vote, who considered the intermediary liability regime established in Article 19 unconstitutional. &lt;/span&gt;&lt;span data-ccp-props=&quot;0}&quot;&gt; &lt;/span&gt;&lt;/p&gt;
  1027. &lt;p&gt;&lt;span data-contrast=&quot;none&quot;&gt;Most of the justices have agreed to find this regime at least partially unconstitutional, but differ on the specifics. Relevant elements of their votes include:&lt;/span&gt;&lt;span data-ccp-props=&quot;0}&quot;&gt; &lt;/span&gt;&lt;/p&gt;
  1028. &lt;ul&gt;
  1029. &lt;li&gt;
  1030. &lt;p&gt;&lt;span lang=&quot;en-GB&quot; xml:lang=&quot;en-GB&quot;&gt;&lt;em&gt;Notice-and-takedown is likely to become the general rule for platforms&#039; liability for third-party content (based on Article 21 of Marco Civil)&lt;/em&gt;. Justices still have to settle whether this applies to internet applications in general or if some distinctions are relevant, for example, applying only to those that curate or recommend content. Another open question refers to the type of content subject to liability under this rule: votes pointed to &lt;em&gt;unlawful&lt;/em&gt;&lt;/span&gt; &lt;span lang=&quot;en-GB&quot; xml:lang=&quot;en-GB&quot;&gt;content/acts, &lt;em&gt;manifestly criminal&lt;/em&gt;&lt;/span&gt; &lt;span lang=&quot;en-GB&quot; xml:lang=&quot;en-GB&quot;&gt;or &lt;em&gt;clearly unlawful&lt;/em&gt; content, or opted to focus on &lt;em&gt;crimes&lt;/em&gt;. Some justices didn’t explicitly qualify the nature of the restricted content under this rule.  &lt;/span&gt; &lt;/p&gt;
  1031. &lt;/li&gt;
  1032. &lt;li&gt;
  1033. &lt;p&gt;&lt;span lang=&quot;en-US&quot; xml:lang=&quot;en-US&quot;&gt;&lt;em&gt;If partially valid, the need for a previous judicial order to hold intermediaries liable for user posts (Article 19 of Marco Civil) remains in force for certain types of content (or certain types of internet applications)&lt;/em&gt;.&lt;/span&gt; &lt;span lang=&quot;en-US&quot; xml:lang=&quot;en-US&quot;&gt;For some justices, Article 19 should be the liability regime in the case of crimes against honor, such as defamation. Justice Luís Roberto Barroso also considered this rule should apply for any unlawful acts under civil law. Justice Cristiano Zanin has a different approach. For him, Article 19 should prevail for internet applications that don’t curate, recommend or boost content (what he called “neutral” applications) or when there’s reasonable doubt about whether the content is unlawful. &lt;br /&gt;&lt;/span&gt;&lt;/p&gt;
  1034. &lt;/li&gt;
  1035. &lt;/ul&gt;
  1036. &lt;ul&gt;
  1037. &lt;li&gt;
  1038. &lt;p&gt;&lt;span lang=&quot;en-GB&quot; xml:lang=&quot;en-GB&quot;&gt;&lt;em&gt;Platforms are considered liable for ads and boosted content that they deliver to users&lt;/em&gt;. This was the position held by most of the votes so far. Justices did so either by presuming platforms&lt;/span&gt;’ &lt;span lang=&quot;en-GB&quot; xml:lang=&quot;en-GB&quot;&gt;knowledge of the paid content they distribute, holding them strictly liable for paid posts, or by considering the delivery of paid content as platforms&lt;/span&gt;’ &lt;span lang=&quot;en-GB&quot; xml:lang=&quot;en-GB&quot;&gt;own act (rather than “third-party” conduct).&lt;/span&gt; &lt;span lang=&quot;en-GB&quot; xml:lang=&quot;en-GB&quot;&gt;Justice Dias Toffoli went further, including also non-paid recommended content. Some justices extended this regime to content posted by inauthentic or fake accounts, or when the non-identification of accounts hinders holding the content authors liable for their posts.  &lt;/span&gt; &lt;/p&gt;
  1039. &lt;/li&gt;
  1040. &lt;/ul&gt;
  1041. &lt;ul&gt;
  1042. &lt;li&gt;
  1043. &lt;p&gt;&lt;span lang=&quot;en-US&quot; xml:lang=&quot;en-US&quot;&gt;&lt;em&gt;Monitoring duty of specific types of harmful and/or criminal content&lt;/em&gt;.&lt;/span&gt; &lt;span lang=&quot;en-US&quot; xml:lang=&quot;en-US&quot;&gt;Most concerning is that different votes establish some kind of active monitoring and likely automated restriction duty for a list of contents, subject to internet applications&#039; liability. Justices have either recognized a “monitoring duty” or considered platforms liable for these types of content regardless of a previous notification. Justices Luís Roberto Barroso, Cristiano Zanin, and Flávio Dino adopt a less problematic &lt;em&gt;systemic flaw&lt;/em&gt;&lt;/span&gt; &lt;span lang=&quot;en-US&quot; xml:lang=&quot;en-US&quot;&gt;approach, by which applications’ liability would not derive from each piece of content individually, but from an analysis of whether platforms employ the proper means to tackle these types of content. The list of contents also varies. In most of the cases they are restricted to criminal offenses, such as crimes against the democratic state, racism, and crimes against children and adolescents; yet they may also include vaguer terms, like “any violence against women,” as in Justice Dias Toffoli’s vote.&lt;/span&gt; &lt;/p&gt;
  1044. &lt;/li&gt;
  1045. &lt;/ul&gt;
  1046. &lt;ul&gt;
  1047. &lt;li&gt;
  1048. &lt;p&gt;&lt;span lang=&quot;en-US&quot; xml:lang=&quot;en-US&quot;&gt;&lt;em&gt;Complementary or procedural duties&lt;/em&gt;.&lt;/span&gt; &lt;span lang=&quot;en-US&quot; xml:lang=&quot;en-US&quot;&gt;Justices have also voted to establish complementary or procedural duties. These include providing a notification system that is easily accessible to users, a due process mechanism where users can appeal against content restrictions, and the release of periodic transparency reports. Justice Alexandre de Moraes also specifically mentioned algorithmic transparency measures.&lt;/span&gt; &lt;/p&gt;
  1049. &lt;/li&gt;
  1050. &lt;/ul&gt;
  1051. &lt;ul&gt;
  1052. &lt;li&gt;
  1053. &lt;p&gt;&lt;span lang=&quot;en-US&quot; xml:lang=&quot;en-US&quot;&gt;&lt;em&gt;Oversight&lt;/em&gt;.&lt;/span&gt; &lt;span lang=&quot;en-US&quot; xml:lang=&quot;en-US&quot;&gt;Justices also discussed which entity or oversight model should be used to monitor compliance while Congress doesn’t approve a specific regulation. They raised different possibilities, including the National Council of Justice, the General Attorney’s Office, the National Data Protection Authority, a self-regulatory body, or a multistakeholder entity with government, companies, and civil society participation.&lt;/span&gt; &lt;/p&gt;
  1054. &lt;/li&gt;
  1055. &lt;/ul&gt;
  1056. &lt;p&gt;&lt;span data-contrast=&quot;none&quot;&gt;Three other justices have yet to present their votes to complete the judgment. As we &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/deeplinks/2024/10/brazils-internet-intermediary-liability-rules-under-trial-what-are-risks&quot;&gt;&lt;span data-contrast=&quot;none&quot;&gt;pointed out&lt;/span&gt;&lt;/a&gt;&lt;span data-contrast=&quot;none&quot;&gt;, the ruling will both decide the individual cases that entered the Supreme Court through appeals and the “general repercussion” issues underlying these individual cases. For addressing such general repercussion issues, the Supreme Court approves a thesis that orients lower court decisions in similar cases. The final thesis will reflect the majority of the court&#039;s agreements around the topics we outlined above.&lt;/span&gt;&lt;span data-ccp-props=&quot;0}&quot;&gt; &lt;/span&gt;&lt;/p&gt;
  1057. &lt;p&gt;&lt;span data-contrast=&quot;none&quot;&gt;Justice Alexandre de Moraes argued that the final thesis should equate the liability regime of social media and private messaging applications to the one applied to traditional media outlets. This disregards important differences between both: even if social media platforms curate content, it involves a massive volume of third-party posts, mainly organized through algorithms. Although such curation reflects business choices, it does not equate to media outlets that directly create or individually purchase specific content from approved independent producers. This is even more complicated with messaging applications, seriously endangering privacy and end-to-end encryption.&lt;/span&gt;&lt;span data-ccp-props=&quot;0}&quot;&gt; &lt;/span&gt;&lt;/p&gt;
  1058. &lt;p&gt;&lt;span data-contrast=&quot;none&quot;&gt;Justice André Mendonça was the only one so far to preserve the full application of Article 19. His proposed thesis highlighted the necessity of safeguarding privacy, data protection, and the secrecy of communications in messaging applications, among other aspects. It also indicated that judicial takedown orders must provide specific reasoning and be made available to platforms, even if issued within a sealed proceeding. The platform must also have the ability to appeal the takedown order. These are all important points the final ruling should endorse.&lt;/span&gt;&lt;span data-ccp-props=&quot;0}&quot;&gt; &lt;/span&gt;&lt;/p&gt;
  1059. &lt;h3&gt;&lt;b&gt;&lt;span data-contrast=&quot;none&quot;&gt;Risks and Blind Spots&lt;/span&gt;&lt;/b&gt;&lt;span data-ccp-props=&quot;0}&quot;&gt; &lt;/span&gt;&lt;/h3&gt;
  1060. &lt;p&gt;&lt;span data-contrast=&quot;none&quot;&gt;We have stressed the &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/deeplinks/2024/10/brazils-internet-intermediary-liability-rules-under-trial-what-are-risks&quot;&gt;&lt;span data-contrast=&quot;none&quot;&gt;many problems&lt;/span&gt;&lt;/a&gt;&lt;span data-contrast=&quot;none&quot;&gt; entangled with broad notice-and-takedown mandates and expanded content monitoring obligations. Extensively relying on AI-based content moderation and tying it to intermediary liability for user content will likely &lt;/span&gt;&lt;a href=&quot;https://sur.conectas.org/en/artificial-intelligence-and-online-hate-speech-moderation/&quot;&gt;&lt;span data-contrast=&quot;none&quot;&gt;exacerbate&lt;/span&gt;&lt;/a&gt;&lt;span data-contrast=&quot;none&quot;&gt; the &lt;/span&gt;&lt;a href=&quot;https://7amleh.org/post/report-on-palestinian-digital-rights-in-the-context-of-genocide-and-big-tech-accountability-one-year-after-the-war-on-gaza-en&quot;&gt;&lt;span data-contrast=&quot;none&quot;&gt;detrimental effects&lt;/span&gt;&lt;/a&gt;&lt;span data-contrast=&quot;none&quot;&gt; of these systems’ &lt;/span&gt;&lt;a href=&quot;https://cdt.org/insights/lost-in-translation-large-language-models-in-non-english-content-analysis/&quot;&gt;&lt;span data-contrast=&quot;none&quot;&gt;limitations&lt;/span&gt;&lt;/a&gt;&lt;span data-contrast=&quot;none&quot;&gt; and &lt;/span&gt;&lt;a href=&quot;https://www.nature.com/articles/s43588-024-00695-4&quot;&gt;&lt;span data-contrast=&quot;none&quot;&gt;flaws&lt;/span&gt;&lt;/a&gt;&lt;span data-contrast=&quot;none&quot;&gt;. The perils and concerns that grounded Article 19&#039;s approval remain valid and should have led to a position of the court preserving its regime. &lt;/span&gt;&lt;span data-ccp-props=&quot;0}&quot;&gt; &lt;/span&gt;&lt;/p&gt;
  1061. &lt;p&gt;&lt;span data-contrast=&quot;none&quot;&gt;However, given the judgement’s current stage, there are still some minimum safeguards that justices should consider or reinforce to reduce harm. &lt;/span&gt;&lt;span data-ccp-props=&quot;0}&quot;&gt; &lt;/span&gt;&lt;/p&gt;
  1062. &lt;p&gt;&lt;span data-contrast=&quot;none&quot;&gt;It’s crucial to put in place guardrails against the abuse and weaponization of notification mechanisms. At a minimum, platforms shouldn’t be liable following an extrajudicial notification when there’s reasonable doubt concerning the content’s lawfulness. In addition, notification procedures should make sure that notices are sufficiently precise and properly substantiated indicating the content’s specific location (e.g. URL) and why the notifier considers it to be illegal. Internet applications must also provide reasoned justification and adequate appeal mechanisms for those who face content restrictions.&lt;/span&gt;&lt;span data-ccp-props=&quot;0}&quot;&gt; &lt;/span&gt;&lt;span data-ccp-props=&quot;0}&quot;&gt; &lt;/span&gt;&lt;/p&gt;
  1063. &lt;p&gt;&lt;span data-contrast=&quot;none&quot;&gt;On the other hand, holding intermediaries liable for individual pieces of user content regardless of notification, by massively relying on AI-based content flagging, is a recipe for over censorship. Adopting a systemic flaw approach could minimally mitigate this problem. Moreover, justices should clearly set apart private messaging applications, as mandated content-based restrictions would erode secure and end-to-end encrypted implementations.&lt;/span&gt;&lt;span data-ccp-props=&quot;0}&quot;&gt; &lt;/span&gt;&lt;/p&gt;
  1064. &lt;p&gt;&lt;span data-contrast=&quot;none&quot;&gt;Finally, we should note that justices generally didn’t distinguish large internet applications from other providers when detailing liability regimes and duties in their votes. This is one major blind spot, as it could significantly impact the feasibility of &lt;/span&gt;&lt;a href=&quot;https://internetlab.org.br/pt/noticias/uma-solucao-unica-para-%20toda-a-internet-internetlab-lanca-documento-sobre-plataformas-de-conhecimento/&quot;&gt;&lt;span data-contrast=&quot;none&quot;&gt;alternate&lt;/span&gt;&lt;/a&gt;&lt;span data-contrast=&quot;none&quot;&gt; and &lt;/span&gt;&lt;a href=&quot;https://fediverse.party/&quot;&gt;&lt;span data-contrast=&quot;none&quot;&gt;decentralized&lt;/span&gt;&lt;/a&gt;&lt;span data-contrast=&quot;none&quot;&gt; alternatives to Big Tech’s business models, entrenching platform concentration. Similarly, despite criticism of platforms’ business interests in monetizing and capturing user attention, court debates mainly failed to address the pervasive surveillance infrastructure lying underneath Big Tech’s power and abuses.  &lt;/span&gt;&lt;span data-ccp-props=&quot;0}&quot;&gt; &lt;/span&gt;&lt;/p&gt;
  1065. &lt;p&gt;&lt;span data-contrast=&quot;none&quot;&gt;Indeed, while justices have called out Big Tech’ enormous power over the online flow of information – over what’s heard and seen, and by whom – the consequences of this decision can actually deepen this powerful position.&lt;/span&gt;&lt;span data-ccp-props=&quot;0}&quot;&gt; &lt;/span&gt;&lt;/p&gt;
  1066. &lt;p&gt;&lt;span data-contrast=&quot;none&quot;&gt;It’s worth recalling a line of Aaron Schwarz in the film &lt;/span&gt;&lt;a href=&quot;https://youtu.be/9vz06QO3UkQ?t=1261&quot;&gt;&lt;span data-contrast=&quot;none&quot;&gt;“The Internet’s Own Boy”&lt;/span&gt;&lt;/a&gt;&lt;span data-contrast=&quot;none&quot;&gt; when comparing broadcasting and the internet. He said: “[…] what you see now is not a question of who gets access to the airwaves, it’s a question of who gets control over the ways you find people.” As he puts it, today’s challenge is less about who gets to speak, but rather about who gets to be heard. &lt;/span&gt;&lt;span data-ccp-props=&quot;0}&quot;&gt; &lt;/span&gt;&lt;/p&gt;
  1067. &lt;p&gt;&lt;span data-contrast=&quot;none&quot;&gt;There’s an undeniable source of power in operating the inner rules and structures by which the information flows within a platform with global reach and millions of users. The crucial interventions must aim at this source of power, putting a stop to &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/pt-br/deeplinks/2022/03/ban-online-behavioral-advertising&quot;&gt;&lt;span data-contrast=&quot;none&quot;&gt;behavioral surveillance ads&lt;/span&gt;&lt;/a&gt;&lt;span data-contrast=&quot;none&quot;&gt;, breaking &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/wp/interoperability-and-privacy&quot;&gt;&lt;span data-contrast=&quot;none&quot;&gt;Big Tech’s gatekeeper&lt;/span&gt;&lt;/a&gt;&lt;span data-contrast=&quot;none&quot;&gt; dominance, and &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/deeplinks/2022/11/leaving-twitters-walled-garden&quot;&gt;&lt;span data-contrast=&quot;none&quot;&gt;redistributing&lt;/span&gt;&lt;/a&gt;&lt;span data-contrast=&quot;none&quot;&gt; the information flow. &lt;/span&gt;&lt;span data-ccp-props=&quot;0}&quot;&gt; &lt;/span&gt;&lt;/p&gt;
  1068. &lt;p&gt;&lt;span data-contrast=&quot;none&quot;&gt;That’s not to say that we shouldn’t care about how each platform organizes its online environment. We should, &lt;/span&gt;&lt;a href=&quot;https://santaclaraprinciples.org/&quot;&gt;&lt;span data-contrast=&quot;none&quot;&gt;and we do&lt;/span&gt;&lt;/a&gt;&lt;span data-contrast=&quot;none&quot;&gt;. The EU &lt;/span&gt;&lt;i&gt;&lt;span data-contrast=&quot;none&quot;&gt;Digital Services Act&lt;/span&gt;&lt;/i&gt;&lt;span data-contrast=&quot;none&quot;&gt;, for example, established rules in this sense&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span data-contrast=&quot;none&quot;&gt; leaving the traditional liability regime largely intact. Rather than leveraging platforms as users’ speech watchdogs by potentially holding intermediaries liable for each piece of user content, platform accountability efforts should broadly look at &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/deeplinks/2022/05/platform-liability-trends-around-globe-conclusions-and-recommendations-moving&quot;&gt;&lt;span data-contrast=&quot;none&quot;&gt;platforms’ processes&lt;/span&gt;&lt;/a&gt;&lt;span data-contrast=&quot;none&quot;&gt; and business choices. Otherwise, we will end up focusing on monitoring users instead of targeting platforms’ abuses.&lt;/span&gt;&lt;span data-ccp-props=&quot;0}&quot;&gt; &lt;/span&gt;&lt;/p&gt;
  1069.  
  1070. &lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
  1071.     <pubDate>Tue, 24 Jun 2025 15:33:19 +0000</pubDate>
  1072. <guid isPermaLink="false">110835 at https://www.eff.org</guid>
  1073. <category domain="https://www.eff.org/issues/international">International</category>
  1074. <category domain="https://www.eff.org/issues/free-speech">Free Speech</category>
  1075. <category domain="https://www.eff.org/issues/privacy">Privacy</category>
  1076. <dc:creator>Veridiana Alimonti</dc:creator>
  1077. <enclosure url="https://www.eff.org/files/banner_library/intermediary-4.jpg" alt="A person holding a megaphone that another person speaks through" type="image/jpeg" length="90260" />
  1078.  </item>
  1079.  <item>
  1080.    <title>Major Setback for Intermediary Liability in Brazil: How Did We Get Here?</title>
  1081.    <link>https://www.eff.org/deeplinks/2025/06/major-setback-intermediary-liability-brazil-how-did-we-get-here</link>
  1082.    <description>&lt;div class=&quot;field field--name-body field--type-text-with-summary field--label-hidden&quot;&gt;&lt;div class=&quot;field__items&quot;&gt;&lt;div class=&quot;field__item even&quot;&gt;&lt;p&gt;&lt;em&gt;This is the second post of a series about intermediary liability in Brazil. Our &lt;a href=&quot;https://www.eff.org/deeplinks/2024/10/brazils-internet-intermediary-liability-rules-under-trial-what-are-risks&quot;&gt;first post&lt;/a&gt; gives an overview of Brazil&#039;s current intermediary liability regime, the context of its approval in 2014, and the beginning of the Supreme Court&#039;s analysis of such regime in November 2024. Our &lt;a href=&quot;https://www.eff.org/deeplinks/2025/06/major-setback-intermediary-liability-brazil-risks-and-blind-spots&quot;&gt;third post&lt;/a&gt; provides an outlook on justices&#039; votes up until June 23, underscoring risks, mitigation measures, and blind spots of their potential decision.&lt;/em&gt;&lt;/p&gt;
  1083. &lt;p&gt;&lt;em&gt;Update: Brazil’s Supreme Court analysis of the country’s intermediary liability regime concluded on June 26, 2025. With three dissenting votes in favor of Article 19’s constitutionality, the majority of the court deemed it partially unconstitutional. Much of the perils we &lt;a href=&quot;https://www.eff.org/deeplinks/2025/06/major-setback-intermediary-liability-brazil-risks-and-blind-spots&quot;&gt;pointed out&lt;/a&gt; have unfortunately come true. The ruling does include some (though not all) of the minimum safeguards we had recommended. The full content of the final thesis approved is available here. Some highlights: importantly, the court preserved Article 19’s regime for crimes against honor (such as defamation). However, the notice-and-takedown regime set in Article 21 became the general rule for platforms’ liability for user content. Platforms are liable regardless of notification for paid content they distribute (including ads) and for posts shared through “artificial distribution networks” (i.e., networks of bots). The court established a duty of care regarding the distribution of specific serious unlawful content. This monitoring duty approach is &lt;a href=&quot;https://www.eff.org/deeplinks/2023/07/repel-rules-and-interpretations-can-lead-general-content-monitoring-and-filtering&quot;&gt;quite controversial&lt;/a&gt;, especially considering the varied nature and size of platforms. Fortunately, the ruling emphasizes that platforms can only be held liable for these specific contents without a previous notice if they fail to tackle them in a systemic way (rather than for individual posts). Article 19’s liability regime remains the general rule for applications like email services, virtual conference platforms, and messaging apps (regarding inter-personal messages). The entirety of the ruling, including the full content of Justice’s votes, will be published in the coming weeks. &lt;/em&gt;&lt;/p&gt;
  1084. &lt;p&gt;&lt;span data-contrast=&quot;none&quot;&gt;The Brazilian Supreme Court has formed a majority to overturn the country’s current online intermediary liability regime. With eight out of eleven justices having presented their opinions, the court has reached enough votes to mostly remove the need for a previous judicial order demanding content takedown to hold digital platforms liable for user posts, which is currently the general rule. &lt;/span&gt;&lt;span data-ccp-props=&quot;0}&quot;&gt; &lt;/span&gt;&lt;/p&gt;
  1085. &lt;p&gt;&lt;span data-contrast=&quot;none&quot;&gt;The judgment relates to Article 19 of Brazil’s &lt;/span&gt;&lt;a href=&quot;https://www.planalto.gov.br/ccivil_03/_ato2011-2014/2014/lei/l12965.htm&quot;&gt;&lt;span data-contrast=&quot;none&quot;&gt;Civil Rights Framework for the Internet&lt;/span&gt;&lt;/a&gt;&lt;span data-contrast=&quot;none&quot;&gt; (“Marco Civil da Internet,” &lt;/span&gt;&lt;a href=&quot;https://www.cgi.br/pagina/marco-civil-law-of-the-internet-in-brazil/180&quot;&gt;&lt;span data-contrast=&quot;none&quot;&gt;Law n. 12.965/2014&lt;/span&gt;&lt;/a&gt;&lt;span data-contrast=&quot;none&quot;&gt;), wherein internet applications can only be held liable for third-party content if they fail to comply with a judicial decision ordering its removal. Article 19 aligns with the &lt;/span&gt;&lt;a href=&quot;https://manilaprinciples.org/&quot;&gt;&lt;span data-contrast=&quot;none&quot;&gt;Manila Principles&lt;/span&gt;&lt;/a&gt;&lt;span data-contrast=&quot;none&quot;&gt; and &lt;/span&gt;&lt;a href=&quot;https://www.oas.org/en/iachr/expression/topics/internet.asp&quot;&gt;&lt;span data-contrast=&quot;none&quot;&gt;reflects&lt;/span&gt;&lt;/a&gt;&lt;span data-contrast=&quot;none&quot;&gt; the &lt;/span&gt;&lt;a href=&quot;https://unesdoc.unesco.org/ark:/48223/pf0000231162&quot;&gt;&lt;span data-contrast=&quot;none&quot;&gt;important&lt;/span&gt;&lt;/a&gt; &lt;a href=&quot;https://www.oas.org/en/iachr/expression/reports/Digital_inclusion_eng.pdf&quot;&gt;&lt;span data-contrast=&quot;none&quot;&gt;understanding&lt;/span&gt;&lt;/a&gt;&lt;span data-contrast=&quot;none&quot;&gt; that holding platforms liable for user content without a judicial analysis creates strong incentives for &lt;/span&gt;&lt;a href=&quot;https://www.cigionline.org/static/documents/no.276_jOG5wer.pdf&quot;&gt;&lt;span data-contrast=&quot;none&quot;&gt;enforcement overreach&lt;/span&gt;&lt;/a&gt;&lt;span data-contrast=&quot;none&quot;&gt; and &lt;/span&gt;&lt;a href=&quot;https://cyberlaw.stanford.edu/blog/2021/02/empirical-evidence-over-removal-internet-companies-under-intermediary-liability-laws/&quot;&gt;&lt;span data-contrast=&quot;none&quot;&gt;over censorship&lt;/span&gt;&lt;/a&gt;&lt;span data-contrast=&quot;none&quot;&gt; of protected speech. &lt;/span&gt;&lt;span data-ccp-props=&quot;0}&quot;&gt; &lt;/span&gt;&lt;/p&gt;
  1086. &lt;p&gt;&lt;span data-contrast=&quot;none&quot;&gt;Nonetheless, while Justice André Mendonça voted to preserve Article 19’s application, four other justices stated it should prevail only in specific cases, mainly for crimes against honor (such as defamation). The remaining three justices considered that Article 19 offers insufficient protection to constitutional guarantees, such as the integral protection of children and teenagers. &lt;/span&gt;&lt;span data-ccp-props=&quot;0}&quot;&gt; &lt;/span&gt;&lt;/p&gt;
  1087. &lt;p&gt;&lt;span data-contrast=&quot;none&quot;&gt;The judgment will resume on June 25th, with the three final justices completing the analysis by the plenary of the court. Whereas Article 19’s partial unconstitutionality (or its interpretation “in accordance with” the Constitution) seems to be the position the majority of the court will take, the details of each vote vary, indicating important agreements still to sew up and critical tweaks to make.  &lt;/span&gt;&lt;span data-ccp-props=&quot;0}&quot;&gt; &lt;/span&gt;&lt;/p&gt;
  1088. &lt;p&gt;&lt;span data-contrast=&quot;none&quot;&gt;As &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/deeplinks/2024/10/brazils-internet-intermediary-liability-rules-under-trial-what-are-risks&quot;&gt;&lt;span data-contrast=&quot;none&quot;&gt;we previously noted&lt;/span&gt;&lt;/a&gt;&lt;span data-contrast=&quot;none&quot;&gt;, the outcome of this ruling can seriously undermine free expression and privacy safeguards if they lead to general content monitoring obligations or broadly expand notice-and-takedown mandates. This trend could negatively shape developments globally in other courts, parliaments, or with respect to executive powers. Sadly, the votes so far have aggravated these concerns. &lt;/span&gt;&lt;span data-ccp-props=&quot;0}&quot;&gt; &lt;/span&gt;&lt;/p&gt;
  1089. &lt;p&gt;&lt;span data-contrast=&quot;auto&quot;&gt;But before we get &lt;a href=&quot;https://www.eff.org/deeplinks/2025/06/major-setback-intermediary-liability-brazil-risks-and-blind-spots&quot;&gt;to them&lt;/a&gt;&lt;/span&gt;&lt;span data-contrast=&quot;auto&quot;&gt;, let&#039;s look at some circumstances underlying the Supreme Court&#039;s analysis.&lt;/span&gt;&lt;span data-ccp-props=&quot;0}&quot;&gt; &lt;/span&gt;&lt;/p&gt;
  1090. &lt;h3&gt;&lt;b&gt;&lt;span data-contrast=&quot;none&quot;&gt;2014 vs. 2025: The Brazilian Techlash After Marco Civil&#039;s Approval&lt;/span&gt;&lt;/b&gt;&lt;span data-ccp-props=&quot;0}&quot;&gt; &lt;/span&gt;&lt;/h3&gt;
  1091. &lt;p&gt;&lt;span data-contrast=&quot;none&quot;&gt;How did Article 19 end up (mostly) overturned a decade after Marco Civil’s much-celebrated approval in Brazil back in 2014?  &lt;/span&gt;&lt;span data-ccp-props=&quot;0}&quot;&gt; &lt;/span&gt;&lt;/p&gt;
  1092. &lt;p&gt;&lt;span data-contrast=&quot;none&quot;&gt;In addition to the broader techlash following the impacts of an increasing concentration of power in the digital realm, developments in Brazil have leveraged a harsher approach towards internet intermediaries. Marco Civil became a scapegoat, especially Article 19, within regulatory approaches that largely diminished the importance of the free expression concerns that informed its approval. Rather than viewing the provision as a milestone to be complemented with new legislation, this context has reinforced the view that Article 19 should be left behind.&lt;/span&gt;&lt;span data-ccp-props=&quot;0}&quot;&gt; &lt;/span&gt;&lt;/p&gt;
  1093. &lt;p&gt;&lt;span data-ccp-props=&quot;0}&quot;&gt; The tougher approach to internet intermediaries gained steam after former President Jair Bolsonaro’s election in 2018 and throughout the legislative debates around &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/deeplinks/2023/07/settled-human-rights-standards-building-blocks-platform-accountability-and&quot;&gt;&lt;span data-contrast=&quot;none&quot;&gt;draft bill 2630&lt;/span&gt;&lt;/a&gt;&lt;span data-contrast=&quot;none&quot;&gt;, also known as the “Fake News bill.” &lt;/span&gt;&lt;span data-ccp-props=&quot;279}&quot;&gt; &lt;/span&gt;&lt;/p&gt;
  1094. &lt;p&gt;&lt;span data-contrast=&quot;none&quot;&gt;Specifically, though not exhaustive, concerns around the spread of disinformation, online-fueled discrimination&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;span data-contrast=&quot;none&quot;&gt; and political violence, as well as threats to election integrity, constitute an important piece of this scenario. This includes the use of social media by the far right within the escalation of acts seeking to undermine the integrity of elections and ultimately overthrow the legitimately elected President Luis Inácio da Silva in January 2023. Investigations later unveiled that related plans included killing the new president, the vice-president, and Justice Alexandre de Moraes. &lt;/span&gt;&lt;span data-ccp-props=&quot;279}&quot;&gt; &lt;/span&gt;&lt;/p&gt;
  1095. &lt;p&gt;&lt;span data-contrast=&quot;none&quot;&gt;Concerns over child and adolescents’ rights and safety are another part of the underlying context. Among others, a wave of violent threats and actual attacks in schools in early 2023 was bolstered by online content. Social media challenges also led to injuries and deaths of young people. &lt;/span&gt;&lt;span data-ccp-props=&quot;0}&quot;&gt; &lt;/span&gt;&lt;/p&gt;
  1096. &lt;p&gt;&lt;span data-contrast=&quot;none&quot;&gt;Finally, the political reactions to Big Tech’s alignment with far-right politicians and &lt;/span&gt;&lt;a href=&quot;https://www.context.news/big-tech/opinion/x-ban-in-brazil-disdainful-defiance-meets-tough-enforcement&quot;&gt;&lt;span data-contrast=&quot;none&quot;&gt;feuds&lt;/span&gt;&lt;/a&gt;&lt;span data-contrast=&quot;none&quot;&gt; with &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/deeplinks/2024/10/x-corp-shutdown-brazil-what-we-can-learn&quot;&gt;&lt;span data-contrast=&quot;none&quot;&gt;Brazilian authorities&lt;/span&gt;&lt;/a&gt;&lt;span data-contrast=&quot;none&quot;&gt; complete this puzzle. It includes reactions to &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/deeplinks/2025/01/metas-new-content-policy-will-harm-vulnerable-users-if-it-really-valued-free&quot;&gt;&lt;span data-contrast=&quot;none&quot;&gt;Meta’s policy changes&lt;/span&gt;&lt;/a&gt;&lt;span data-contrast=&quot;none&quot;&gt; in January 2025 and the Trump’s administration’s decision to &lt;/span&gt;&lt;a href=&quot;https://br.usembassy.gov/announcement-of-a-visa-restriction-policy-targeting-foreign-nationals-who-censor-americans/&quot;&gt;&lt;span data-contrast=&quot;none&quot;&gt;restrict visas&lt;/span&gt;&lt;/a&gt;&lt;span data-contrast=&quot;none&quot;&gt; to foreign officials based on grounds of limiting free speech online. This decision is viewed as &lt;/span&gt;&lt;a href=&quot;https://apublica.org/2025/05/eduardo-bolsonaro-e-influencers-articulam-contra-stf-nos-eua/&quot;&gt;&lt;span data-contrast=&quot;none&quot;&gt;an offensive&lt;/span&gt;&lt;/a&gt;&lt;span data-contrast=&quot;none&quot;&gt; against Brazil&#039;s Supreme Court from U.S. authorities in alliance with &lt;/span&gt;&lt;span data-contrast=&quot;auto&quot;&gt;Bolsonaro’s supporters&lt;/span&gt;&lt;span data-contrast=&quot;none&quot;&gt;, &lt;/span&gt;&lt;a href=&quot;https://www.metropoles.com/mundo/muito-satisfeito-diz-eduardo-bolsonaro-sobre-veto-de-vistos-dos-eua&quot;&gt;&lt;span data-contrast=&quot;none&quot;&gt;including his son now living in the U.S&lt;/span&gt;&lt;/a&gt;&lt;span data-contrast=&quot;none&quot;&gt;.&lt;/span&gt;&lt;span data-ccp-props=&quot;0}&quot;&gt; &lt;/span&gt;&lt;/p&gt;
  1097. &lt;p&gt;&lt;span data-contrast=&quot;none&quot;&gt;Changes in the tech landscape, including concerns about the attention-driven information flow, alongside geopolitical tensions, landed in Article 19 examination by the Brazilian Supreme Court. Hurdles in the legislative debate of draft bill 2630 turned attention to the internet intermediary liability cases pending in the Supreme Court as the main vehicles for providing “some” response. Yet, the &lt;/span&gt;&lt;span data-contrast=&quot;auto&quot;&gt;scope of such cases (&lt;/span&gt;&lt;a href=&quot;https://www.eff.org/deeplinks/2024/10/brazils-internet-intermediary-liability-rules-under-trial-what-are-risks&quot;&gt;&lt;span data-contrast=&quot;none&quot;&gt;explained here&lt;/span&gt;&lt;/a&gt;&lt;span data-contrast=&quot;auto&quot;&gt;) determined the &lt;/span&gt;&lt;span data-contrast=&quot;none&quot;&gt;most likely outcome. As they focus on assessing platform liability for user content and whether it involves a duty to monitor, these issues became the main vectors for analysis and potential change. Alternative approaches, such as improving transparency, ensuring due process, and fostering platform accountability through different measures, like risk assessments, were mainly sidelined. &lt;/span&gt;&lt;span data-ccp-props=&quot;0}&quot;&gt; &lt;/span&gt;&lt;/p&gt;
  1098. &lt;p&gt;&lt;i&gt;&lt;span data-contrast=&quot;auto&quot;&gt;Read our &lt;a href=&quot;https://www.eff.org/deeplinks/2025/06/major-setback-intermediary-liability-brazil-risks-and-blind-spots&quot;&gt;third post&lt;/a&gt; &lt;/span&gt;&lt;/i&gt;&lt;i&gt;&lt;span data-contrast=&quot;auto&quot;&gt;in this series to learn more about the analysis of the Supreme Court so far and its risks and blind spots.&lt;/span&gt;&lt;/i&gt;&lt;span data-ccp-props=&quot;0}&quot;&gt; &lt;/span&gt;&lt;/p&gt;
  1099.  
  1100. &lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
  1101.     <pubDate>Tue, 24 Jun 2025 15:13:58 +0000</pubDate>
  1102. <guid isPermaLink="false">110834 at https://www.eff.org</guid>
  1103. <category domain="https://www.eff.org/issues/international">International</category>
  1104. <category domain="https://www.eff.org/issues/free-speech">Free Speech</category>
  1105. <category domain="https://www.eff.org/issues/privacy">Privacy</category>
  1106. <dc:creator>Veridiana Alimonti</dc:creator>
  1107. <enclosure url="https://www.eff.org/files/banner_library/intermediary-4.jpg" alt="A person holding a megaphone that another person speaks through" type="image/jpeg" length="90260" />
  1108.  </item>
  1109.  <item>
  1110.    <title>Copyright Cases Should Not Threaten Chatbot Users’ Privacy</title>
  1111.    <link>https://www.eff.org/deeplinks/2025/06/copyright-cases-should-not-threaten-chatbot-users-privacy</link>
  1112.    <description>&lt;div class=&quot;field field--name-body field--type-text-with-summary field--label-hidden&quot;&gt;&lt;div class=&quot;field__items&quot;&gt;&lt;div class=&quot;field__item even&quot;&gt;&lt;p&gt;Like users of all technologies, ChatGPT users deserve the right to delete their personal data. Nineteen U.S. States, the European Union, and a host of other countries already protect users’ right to delete. For years, OpenAI gave users the option to delete their conversations with ChatGPT, rather than let their personal queries linger on corporate servers. &lt;a href=&quot;https://openai.com/index/response-to-nyt-data-demands/&quot;&gt;Now, they can’t&lt;/a&gt;. A badly misguided &lt;a href=&quot;https://www.courtlistener.com/docket/69879510/33/in-re-openai-inc-copyright-infringement-litigation/&quot;&gt;court order&lt;/a&gt; in a copyright lawsuit requires OpenAI to store all consumer ChatGPT conversations &lt;a href=&quot;https://arstechnica.com/tech-policy/2025/06/openai-confronts-user-panic-over-court-ordered-retention-of-chatgpt-logs/&quot;&gt;indefinitely&lt;/a&gt;—even if a user &lt;a href=&quot;https://www.theverge.com/news/681280/openai-storing-deleted-chats-nyt-lawsuit&quot;&gt;tries to delete them&lt;/a&gt;. This sweeping order far outstrips the needs of the case and sets a dangerous precedent by disregarding millions of users’ privacy rights.&lt;/p&gt;
  1113. &lt;p&gt;The privacy harms here are significant. ChatGPT’s 300+ million users submit over &lt;a href=&quot;https://www.theverge.com/2024/12/4/24313097/chatgpt-300-million-weekly-users&quot;&gt;1 billion&lt;/a&gt; messages to its chatbots &lt;em&gt;per day&lt;/em&gt;, &lt;a href=&quot;https://imaginingthedigitalfuture.org/reports-and-publications/close-encounters-of-the-ai-kind/close-encounters-of-the-ai-kind-main-report/&quot;&gt;often for personal purposes&lt;/a&gt;. Virtually any personal use of a chatbot—anything from planning family vacations and daily habits to creating social media posts and fantasy worlds for Dungeons and Dragons games—reveal personal details that, in aggregate, create a comprehensive portrait of a person’s entire life. Other uses risk revealing people’s most sensitive information. For example, tens of millions of Americans use ChatGPT to obtain &lt;a href=&quot;https://www.nytimes.com/2024/09/11/health/chatbots-health-diagnosis-treatments.html#:~:text=About%20one%20in%20six%20adults%20%E2%80%94%20and%20about%20a%20quarter%20of,nonprofit%20health%20policy%20research%20organization&quot;&gt;medical&lt;/a&gt; and &lt;a href=&quot;https://www.cnbc.com/2024/11/04/how-to-use-artificial-intelligence-for-personal-finance.html&quot;&gt;financial&lt;/a&gt; information. Notwithstanding &lt;a href=&quot;https://pmc.ncbi.nlm.nih.gov/articles/PMC10277170/&quot;&gt;other risks&lt;/a&gt; of these uses, people still deserve privacy rights like the right to delete their data. Eliminating protections for user-deleted data risks chilling beneficial uses by individuals who want to protect their privacy.&lt;/p&gt;
  1114. &lt;p&gt;This isn’t a new concept. Putting users in control of their data is a &lt;a href=&quot;https://www.eff.org/wp/privacy-first-better-way-address-online-harms&quot;&gt;fundamental piece of privacy protection&lt;/a&gt;. Nineteen states, the European Union, and numerous other countries already protect the right to delete under their privacy laws. These rules exist for good reasons: retained data can be sold or given away, breached by hackers, disclosed to law enforcement, or even used to manipulate a user’s choices through &lt;a href=&quot;https://www.eff.org/deeplinks/2022/03/ban-online-behavioral-advertising&quot;&gt;online behavioral advertising&lt;/a&gt;.&lt;/p&gt;
  1115. &lt;p&gt;While appropriately tailored orders to preserve evidence are common in litigation, that’s not what happened here. The court disregarded the privacy rights of millions of ChatGPT users without any reasonable basis to believe it would yield evidence. The court granted the order based on unsupported assertions that users who delete their data are probably copyright infringers looking to “cover their tracks.” This is simply false, and it sets a dangerous precedent for cases against generative AI developers and other companies that have vast stores of user information. Unless courts limit orders to information that is actually relevant and useful, they will needlessly violate the privacy rights of millions of users.&lt;/p&gt;
  1116. &lt;p&gt;OpenAI is challenging this order. EFF urges the court to lift the order and correct its mistakes.  &lt;/p&gt;
  1117.  
  1118. &lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
  1119.     <pubDate>Tue, 24 Jun 2025 02:07:34 +0000</pubDate>
  1120. <guid isPermaLink="false">110833 at https://www.eff.org</guid>
  1121. <category domain="https://www.eff.org/issues/innovation">Creativity &amp; Innovation</category>
  1122. <category domain="https://www.eff.org/issues/privacy">Privacy</category>
  1123. <category domain="https://www.eff.org/issues/ai">Artificial Intelligence &amp; Machine Learning</category>
  1124. <dc:creator>Tori Noble</dc:creator>
  1125. <enclosure url="https://www.eff.org/files/banner_library/icon-2019-privacy.png" alt="" type="image/png" length="16605" />
  1126.  </item>
  1127.  <item>
  1128.    <title>The NO FAKES Act Has Changed – and It’s So Much Worse</title>
  1129.    <link>https://www.eff.org/deeplinks/2025/06/no-fakes-act-has-changed-and-its-so-much-worse</link>
  1130.    <description>&lt;div class=&quot;field field--name-body field--type-text-with-summary field--label-hidden&quot;&gt;&lt;div class=&quot;field__items&quot;&gt;&lt;div class=&quot;field__item even&quot;&gt;&lt;p&gt;A bill purporting to target the issue of misinformation and defamation caused by generative AI has mutated into something that could change the internet forever, harming speech and innovation from here on out.&lt;/p&gt;
  1131. &lt;p&gt;The Nurture Originals, Foster Art and Keep Entertainment Safe (NO FAKES) Act aims to address understandable concerns about generative AI-created “replicas” by creating a broad new intellectual property right. That approach was &lt;a href=&quot;https://www.eff.org/deeplinks/2024/04/congress-should-just-say-no-no-fakes&quot;&gt;the first mistake&lt;/a&gt;: rather than giving people targeted tools to protect against harmful misrepresentations&lt;span data-huuid=&quot;17382269887519388031&quot;&gt;—&lt;/span&gt;balanced against the need to protect legitimate speech such as parodies and satires&lt;span data-huuid=&quot;17382269887519388031&quot;&gt;—&lt;/span&gt;the original NO FAKES just federalized an image-licensing system.&lt;/p&gt;
  1132. &lt;p class=&quot;take-action&quot;&gt;&lt;a href=&quot;https://act.eff.org/action/tell-congress-throw-out-the-no-fakes-act-and-start-over&quot;&gt;Take Action&lt;/a&gt;&lt;/p&gt;
  1133. &lt;p class=&quot;take-explainer&quot;&gt;&lt;a href=&quot;https://act.eff.org/action/tell-congress-throw-out-the-no-fakes-act-and-start-over&quot;&gt;Tell Congress to Say No to NO FAKES&lt;/a&gt;&lt;/p&gt;
  1134. &lt;p&gt;The updated bill doubles down on that initial mistaken approach by mandating a whole new censorship infrastructure for that system, encompassing not just images but the products and services used to create them, with few safeguards against abuse.&lt;/p&gt;
  1135. &lt;p&gt;The new version of NO FAKES requires almost every internet gatekeeper to create a system that will a) take down speech upon receipt of a notice; b) keep down any recurring instance&lt;span data-huuid=&quot;17382269887519388031&quot;&gt;—&lt;/span&gt;meaning, adopt inevitably overbroad replica filters on top of the already deeply flawed copyright filters;  c) take down and filter tools that might have been used to make the image; and d) unmask the user who uploaded the material based on nothing more than the say so of person who was allegedly “replicated.”&lt;/p&gt;
  1136. &lt;p&gt;This bill would be a disaster for internet speech and innovation.&lt;/p&gt;
  1137. &lt;h4&gt;&lt;strong&gt;Targeting Tools&lt;/strong&gt;&lt;/h4&gt;
  1138. &lt;p&gt;The first version of NO FAKES focused on digital replicas. The new version goes further, targeting tools that can be used to produce images that aren’t authorized by the individual, anyone who owns the rights in that individual’s image, or the law. Anyone who makes, markets, or hosts such tools is on the hook. There are some limits&lt;span data-huuid=&quot;17382269887519388031&quot;&gt;—&lt;/span&gt;the tools must be primarily designed for, or have only limited commercial uses other than making unauthorized images&lt;span data-huuid=&quot;17382269887519388031&quot;&gt;—&lt;/span&gt;but those limits will offer cold comfort to developers given that they can be targeted based on nothing more than a bare allegation. These provisions effectively give rights-holders the veto power on innovation they’ve long sought in the copyright wars, based on the same tech panics. &lt;/p&gt;
  1139. &lt;h4&gt;&lt;strong&gt;Takedown Notices and Filter Mandate&lt;/strong&gt;&lt;/h4&gt;
  1140. &lt;p&gt;The first version of NO FAKES set up a notice and takedown system patterned on the DMCA, with even fewer safeguards. NO FAKES expands it to cover more service providers and require those providers to not only take down targeted materials (or tools) but keep them from being uploaded in the future.  In other words, adopt broad filters or lose the safe harbor.&lt;/p&gt;
  1141. &lt;p&gt;Filters are already a huge problem &lt;a href=&quot;https://www.eff.org/wp/unfiltered-how-youtubes-content-id-discourages-fair-use-and-dictates-what-we-see-online&quot;&gt;when it comes to copyright&lt;/a&gt;, and at least in that instance all it &lt;em&gt;should &lt;/em&gt;be doing is flagging for human review if an upload appears to be a whole copy of a work. The reality is that these systems often flag things that are &lt;em&gt;similar &lt;/em&gt;but not the same (like two different people playing the same piece of &lt;a href=&quot;https://www.eff.org/takedowns/sony-finally-admits-it-doesnt-own-bach-and-it-only-took-public-pressure&quot;&gt;public domain music&lt;/a&gt;). They also flag things for infringement based on &lt;a href=&quot;https://www.eff.org/takedowns/mistake-so-bad-even-youtube-says-its-copyright-bot-really-blew-it&quot;&gt;mere seconds of a match&lt;/a&gt;, and they frequently do not take into account &lt;a href=&quot;https://www.eff.org/takedowns&quot;&gt;context that would make the use authorized by law&lt;/a&gt;.&lt;/p&gt;
  1142. &lt;p&gt;But copyright filters are not yet required by law. NO FAKES would create a legal mandate that will inevitably lead to hecklers’ vetoes and other forms of over-censorship.&lt;/p&gt;
  1143. &lt;p&gt;The bill does contain carve outs for parody, satire, and commentary, but those will also be cold comfort for those who cannot afford to litigate the question.&lt;/p&gt;
  1144. &lt;h4&gt;&lt;strong&gt;Threats to Anonymous Speech&lt;/strong&gt;&lt;/h4&gt;
  1145. &lt;p&gt;As currently written, NO FAKES also allows anyone to get a subpoena from a court clerk—not a judge, and without any form of proof—forcing a service to hand over identifying information about a user.&lt;/p&gt;
  1146. &lt;p&gt;We&#039;ve already seen abuse of a similar system in action. In copyright cases, those unhappy with the criticisms being made against them get such subpoenas to silence critics. Often that the criticism includes the complainant&#039;s own words as proof of the criticism, an ur-example of fair use. But the subpoena is issued anyway and, unless the service is incredibly on the ball, the user can be unmasked.&lt;/p&gt;
  1147. &lt;p&gt;Not only does this chill further speech, the unmasking itself can cause harm to users. Either reputationally or in their personal life.&lt;/p&gt;
  1148. &lt;h4&gt;&lt;strong&gt;Threats to Innovation&lt;/strong&gt;&lt;/h4&gt;
  1149. &lt;p&gt;Most of us are very unhappy with the state of Big Tech. It seems like not only are we increasingly forced to use the tech giants, but that the quality of their services is actively degrading. By increasing the sheer amount of infrastructure a new service would need to comply with the law, NO FAKES makes it harder for any new service to challenge Big Tech. It is probably not a coincidence that some of these very giants are okay with this new version of NO FAKES.&lt;/p&gt;
  1150. &lt;p&gt;Requiring removal of tools, apps, and services could likewise stymie innovation. For one, it would harm people using such services for otherwise lawful creativity.  For another, it would discourage innovators from developing new tools. Who wants to invest in a tool or service that can be forced offline by nothing more than an allegation?&lt;/p&gt;
  1151. &lt;p&gt;This bill is a solution in search of a problem. Just a few months ago, Congress passed Take It Down, which targeted images involving intimate or sexual content. That deeply flawed bill pressures platforms to actively monitor online speech, including speech that is presently encrypted. But if Congress is really worried about privacy harms, it should at least wait to see the effects of the last piece of internet regulation before going further into a new one. Its failure to do so makes clear that this is not about protecting victims of harmful digital replicas.&lt;/p&gt;
  1152. &lt;p&gt;NO FAKES is designed to consolidate control over the commercial exploitation of digital images, not prevent it. Along the way, it will cause collateral damage to all of us.&lt;/p&gt;
  1153. &lt;p class=&quot;take-action&quot;&gt;&lt;a href=&quot;https://act.eff.org/action/tell-congress-throw-out-the-no-fakes-act-and-start-over&quot;&gt;Take Action&lt;/a&gt;&lt;/p&gt;
  1154. &lt;p class=&quot;take-explainer&quot;&gt;&lt;a href=&quot;https://act.eff.org/action/tell-congress-throw-out-the-no-fakes-act-and-start-over&quot;&gt;Tell Congress to Say No to NO FAKES&lt;/a&gt;&lt;/p&gt;
  1155.  
  1156. &lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
  1157.     <pubDate>Mon, 23 Jun 2025 19:39:42 +0000</pubDate>
  1158. <guid isPermaLink="false">110831 at https://www.eff.org</guid>
  1159. <category domain="https://www.eff.org/issues/innovation">Creativity &amp; Innovation</category>
  1160. <category domain="https://www.eff.org/issues/intellectual-property">Fair Use</category>
  1161. <dc:creator>Katharine Trendacosta</dc:creator>
  1162. <dc:creator>Corynne McSherry</dc:creator>
  1163. <enclosure url="https://www.eff.org/files/banner_library/icon-2019-innovation.png" alt="Innovation" type="image/png" length="16801" />
  1164.  </item>
  1165.  <item>
  1166.    <title>New Journalism Curriculum Module Teaches Digital Security for Border Journalists </title>
  1167.    <link>https://www.eff.org/press/releases/new-journalism-curriculum-module-teaches-digital-security-border-journalists</link>
  1168.    <description>&lt;div class=&quot;field field--name-field-pr-subhead field--type-text field--label-hidden&quot;&gt;&lt;div class=&quot;field__items&quot;&gt;&lt;div class=&quot;field__item even&quot;&gt;Module Developed by EFF, Freedom of the Press Foundation, and University of Texas, El Paso Guides Students Through Threat Modeling and Preparation &lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field--name-body field--type-text-with-summary field--label-hidden&quot;&gt;&lt;div class=&quot;field__items&quot;&gt;&lt;div class=&quot;field__item even&quot;&gt;&lt;p&gt;&lt;span data-contrast=&quot;auto&quot;&gt;SAN FRANCISCO – A new college journalism curriculum module teaches students how to protect themselves and their digital devices when working near and across the U.S.-Mexico border.&lt;/span&gt;&lt;span data-ccp-props=&quot;{}&quot;&gt; &lt;/span&gt;&lt;/p&gt;
  1169. &lt;p&gt;&lt;span data-contrast=&quot;auto&quot;&gt;“Digital Security 101: Crossing the US-Mexico Border” was developed by Electronic Frontier Foundation (EFF) Director of Investigations Dave Maass and Dr. Martin Shelton, deputy director of digital security at &lt;/span&gt;&lt;a href=&quot;https://freedom.press/&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;&lt;span data-contrast=&quot;none&quot;&gt;Freedom of the Press Foundation&lt;/span&gt;&lt;/a&gt;&lt;span data-contrast=&quot;auto&quot;&gt; (FPF), in collaboration with the University of Texas at El Paso (UTEP) &lt;/span&gt;&lt;a href=&quot;https://www.utep.edu/liberalarts/communication/academic-programs/undergraduate/ba-multimedia-journalism.html&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;&lt;span data-contrast=&quot;none&quot;&gt;Multimedia Journalism Program&lt;/span&gt;&lt;/a&gt;&lt;span data-contrast=&quot;auto&quot;&gt; and &lt;/span&gt;&lt;a href=&quot;https://borderzine.com/&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;&lt;span data-contrast=&quot;none&quot;&gt;Borderzine&lt;/span&gt;&lt;/a&gt;&lt;span data-contrast=&quot;auto&quot;&gt;.&lt;/span&gt;&lt;span data-ccp-props=&quot;{}&quot;&gt; &lt;/span&gt;&lt;/p&gt;
  1170. &lt;p&gt;&lt;span data-contrast=&quot;auto&quot;&gt;The module offers a step-by-step process for improving the digital security of journalists passing through U.S. Land Ports of Entry, focusing on threat modeling: thinking through what you want to protect, and what actions you can take to secure it.&lt;/span&gt;&lt;span data-ccp-props=&quot;{}&quot;&gt; &lt;/span&gt;&lt;/p&gt;
  1171. &lt;p&gt;&lt;span data-contrast=&quot;auto&quot;&gt;This involves assessing risk according to the kind of work the journalist is doing, the journalist’s own immigration status, potential adversaries, and much more, as well as planning in advance for protecting oneself and one’s devices should the journalist face delay, detention, search, or device seizure. Such planning might include use of encrypted communications, disabling or enabling certain device settings, minimizing the data on devices, and mentally preparing oneself to interact with border authorities. &lt;/span&gt;&lt;span data-ccp-props=&quot;{}&quot;&gt; &lt;/span&gt;&lt;/p&gt;
  1172. &lt;p&gt;&lt;span data-contrast=&quot;auto&quot;&gt;The module, in development since early 2023, is particularly timely given increasingly invasive questioning and searches at U.S. borders under the Trump Administration and the documented history of border authorities targeting journalists covering migrant caravans during the first Trump presidency.&lt;/span&gt;&lt;span data-ccp-props=&quot;{}&quot;&gt; &lt;/span&gt;&lt;/p&gt;
  1173. &lt;p&gt;&lt;span data-contrast=&quot;auto&quot;&gt;&quot;Today&#039;s journalism students are leaving school only to face complicated, new digital threats to press freedom that did not exist for previous generations. This is especially true for young reporters serving border communities,&quot; Shelton said. &quot;&lt;/span&gt;&lt;a href=&quot;https://freedom.press/digisec/guides/jschool-curriculum-us/&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;&lt;span data-contrast=&quot;none&quot;&gt;Our curriculum&lt;/span&gt;&lt;/a&gt;&lt;span data-contrast=&quot;auto&quot;&gt; is designed to equip emerging journalists with the skills to protect themselves and sources, while this new module is specifically tailored to empower students who must regularly traverse ports of entry at the U.S.-Mexico border while carrying their phones, laptops, and multimedia equipment.&quot;&lt;/span&gt;&lt;span data-ccp-props=&quot;{}&quot;&gt; &lt;/span&gt;&lt;/p&gt;
  1174. &lt;p&gt;&lt;span data-contrast=&quot;auto&quot;&gt;The guidance was developed through field visits to six ports of entry across three border states, interviews with scores of journalists and students from on both sides of the border, and a comprehensive review of CBP policies, while also drawing from EFF and FPF’s combined decades of experience researching constitutional rights and security techniques when it comes to our devices. &lt;/span&gt;&lt;span data-ccp-props=&quot;{}&quot;&gt; &lt;/span&gt;&lt;/p&gt;
  1175. &lt;p&gt;&lt;span data-contrast=&quot;auto&quot;&gt;“While this training should be helpful to investigative journalists from anywhere in the country who are visiting the borderlands, we put journalism students based in and serving border communities at the center of our work,” Maass said. “Whether you’re reviewing the food scene in San Diego and Tijuana, covering El Paso and Ciudad Juarez’s soccer teams, reporting on family separation in the Rio Grande Valley, or uncovering cross-border corruption, you will need the tools to protect your work and sources.&quot;&lt;/span&gt;&lt;span data-ccp-props=&quot;279}&quot;&gt; &lt;/span&gt;&lt;/p&gt;
  1176. &lt;p&gt;&lt;span data-contrast=&quot;auto&quot;&gt;The module includes a comprehensive slide deck that journalism lecturers can use and remix for their classes, as well as an interactive worksheet. With undergraduate students in mind, the module includes activities such as roleplaying a primary inspection interview and analyzing pop singer Olivia Rodrigo’s harrowing experience of mistaken identity while reentering the country. The module has already been delivered successfully in trainings with journalism students at UTEP and San Diego State University.&lt;/span&gt;&lt;span data-ccp-props=&quot;{}&quot;&gt; &lt;/span&gt;&lt;/p&gt;
  1177. &lt;p&gt;&lt;span data-contrast=&quot;auto&quot;&gt;“UTEP’s Multimedia Journalism program is well-situated to help develop this digital security training module,” said UTEP Communication Department Chair Dr. Richard Pineda. “Our proximity to the U.S.-Mexico border has influenced our teaching models, and our student population – often daily border crossers – give us a unique perspective from which to train journalists on issues related to reporting safely on both sides of the border.”&lt;/span&gt;&lt;span data-ccp-props=&quot;{}&quot;&gt; &lt;/span&gt;&lt;/p&gt;
  1178. &lt;p&gt;&lt;b&gt;&lt;span data-contrast=&quot;auto&quot;&gt;For the “Digital security 101: Crossing the US-Mexico border” module: &lt;/span&gt;&lt;/b&gt;&lt;a href=&quot;https://freedom.press/digisec/blog/border-security-module/&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;&lt;span data-contrast=&quot;none&quot;&gt;https://freedom.press/digisec/blog/border-security-module/&lt;/span&gt;&lt;/a&gt;&lt;span data-ccp-props=&quot;{}&quot;&gt; &lt;/span&gt;&lt;/p&gt;
  1179. &lt;p&gt;&lt;b&gt;&lt;span data-contrast=&quot;auto&quot;&gt;For more about the module:&lt;/span&gt;&lt;/b&gt;&lt;span data-ccp-props=&quot;{}&quot;&gt; &lt;a href=&quot;https://www.eff.org/deeplinks/2025/06/journalist-security-checklist-preparing-devices-travel-through-us-border&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;https://www.eff.org/deeplinks/2025/06/journalist-security-checklist-preparing-devices-travel-through-us-border&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;
  1180. &lt;p&gt;&lt;b&gt;&lt;span data-contrast=&quot;auto&quot;&gt;For EFF’s guide to digital security at the U.S. border: &lt;/span&gt;&lt;/b&gt;&lt;a href=&quot;https://www.eff.org/press/releases/digital-privacy-us-border-new-how-guide-eff&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;&lt;span data-contrast=&quot;none&quot;&gt;https://www.eff.org/press/releases/digital-privacy-us-border-new-how-guide-eff&lt;/span&gt;&lt;/a&gt;&lt;span data-ccp-props=&quot;{}&quot;&gt; &lt;/span&gt;&lt;/p&gt;
  1181. &lt;p&gt;&lt;b&gt;&lt;span data-contrast=&quot;auto&quot;&gt;For EFF’s student journalist Surveillance Self Defense guide:&lt;/span&gt;&lt;/b&gt; &lt;a href=&quot;https://ssd.eff.org/playlist/journalism-student&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;&lt;span data-contrast=&quot;none&quot;&gt;https://ssd.eff.org/playlist/journalism-student&lt;/span&gt;&lt;/a&gt;&lt;span data-ccp-props=&quot;{}&quot;&gt; &lt;/span&gt;&lt;/p&gt;
  1182.  
  1183. &lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field--name-field-contact field--type-node-reference field--label-above&quot;&gt;&lt;div class=&quot;field__label&quot;&gt;Contact:&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;field__items&quot;&gt;&lt;div class=&quot;field__item even&quot;&gt;&lt;div  class=&quot;ds-1col node node--profile view-mode-node_embed node--node-embed node--profile--node-embed clearfix&quot;&gt;
  1184.  
  1185.  
  1186.  &lt;div class=&quot;&quot;&gt;
  1187.    &lt;div class=&quot;field field--name-field-profile-first-name field--type-text field--label-hidden&quot;&gt;&lt;div class=&quot;field__items&quot;&gt;&lt;div class=&quot;field__item even&quot;&gt;Dave&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field--name-field-profile-last-name field--type-text field--label-hidden&quot;&gt;&lt;div class=&quot;field__items&quot;&gt;&lt;div class=&quot;field__item even&quot;&gt;Maass&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field--name-field-profile-title field--type-text field--label-hidden&quot;&gt;&lt;div class=&quot;field__items&quot;&gt;&lt;div class=&quot;field__item even&quot;&gt;Director of Investigations&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field--name-field-profile-email field--type-email field--label-hidden&quot;&gt;&lt;div class=&quot;field__items&quot;&gt;&lt;div class=&quot;field__item even&quot;&gt;&lt;a href=&quot;mailto:dm@eff.org&quot;&gt;dm@eff.org&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;  &lt;/div&gt;
  1188.  
  1189. &lt;/div&gt;
  1190.  
  1191. &lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
  1192.     <pubDate>Mon, 23 Jun 2025 16:00:12 +0000</pubDate>
  1193. <guid isPermaLink="false">110811 at https://www.eff.org</guid>
  1194. <dc:creator>Josh Richman</dc:creator>
  1195. <enclosure url="https://www.eff.org/files/banner_library/border-act-3.jpg" alt="icon of a border agent examining digital devices" type="image/jpeg" length="642988" />
  1196.  </item>
  1197.  <item>
  1198.    <title>A Journalist Security Checklist: Preparing Devices for Travel Through a US Border</title>
  1199.    <link>https://www.eff.org/deeplinks/2025/06/journalist-security-checklist-preparing-devices-travel-through-us-border</link>
  1200.    <description>&lt;div class=&quot;field field--name-body field--type-text-with-summary field--label-hidden&quot;&gt;&lt;div class=&quot;field__items&quot;&gt;&lt;div class=&quot;field__item even&quot;&gt;&lt;p&gt;&lt;em&gt;This post was originally published by the &lt;a href=&quot;https://freedom.press/digisec/blog/border-security/&quot;&gt;Freedom of the Press Foundation&lt;/a&gt; (FPF). This checklist complements the &lt;a href=&quot;https://freedom.press/digisec/blog/border-security-module/&quot;&gt;recent training module for journalism students in border communities&lt;/a&gt; that EFF and FPF developed in partnership with the University of Texas at El Paso Multimedia Journalism Program and &lt;a href=&quot;https://borderzine.com/&quot;&gt;Borderzine&lt;/a&gt;. We are cross-posting it under FPF&#039;s &lt;a href=&quot;https://creativecommons.org/licenses/by/4.0/&quot;&gt;Creative Commons Attribution 4.0 International license&lt;/a&gt;. It has been slightly edited for style and consistency.&lt;/em&gt;&lt;/p&gt;
  1201. &lt;p&gt;&lt;b&gt;Before diving in:&lt;/b&gt; This space is changing quickly! Check &lt;a href=&quot;https://freedom.press/digisec/blog/border-security/&quot;&gt;FPF&#039;s website for updates&lt;/a&gt; and &lt;a href=&quot;https://freedom.press/contact/&quot;&gt;contact them&lt;/a&gt; with questions or suggestions. This is a joint project of Freedom of the Press Foundation (FPF) and the &lt;a href=&quot;https://eff.org/&quot;&gt;Electronic Frontier Foundation&lt;/a&gt;.&lt;/p&gt;
  1202. &lt;p data-block-key=&quot;93a0s&quot;&gt;Those within the U.S. have Fourth Amendment protections against unreasonable searches and seizures — but there is an exception at the border. Customs and Border Protection (CBP) asserts broad authority to search travelers’ devices when crossing U.S. borders, whether traveling by land, sea, or air. And unfortunately, except for a &lt;a href=&quot;https://www.cbp.gov/newsroom/national-media-release/cbp-releases-march-2025-monthly-update&quot;&gt;dip at the start of the COVID-19 pandemic&lt;/a&gt; when international travel substantially decreased, CBP has generally searched more devices year over year since the George W. Bush administration. While the percentage of travelers affected by device searches &lt;a href=&quot;https://www.cbp.gov/sites/default/files/2024-11/Border%20Search%20of%20Electronics%20at%20Ports%20of%20Entry%20FY%2024%20Statistics%20%28508%29.pdf&quot;&gt;remains small&lt;/a&gt;, in recent months we’ve heard &lt;a href=&quot;https://www.nbcnews.com/news/world/trump-immigration-detained-visitors-border-search-device-visa-passport-rcna197736&quot;&gt;growing concerns&lt;/a&gt; about apparent increased immigration scrutiny and enforcement at U.S. ports of entry, including seemingly unjustified device searches.&lt;/p&gt;
  1203. &lt;p data-block-key=&quot;6reru&quot;&gt;Regardless, it’s hard to say with certainty the likelihood that &lt;i&gt;you&lt;/i&gt; will experience a search of your items, including your digital devices. But there’s a lot you can do to lower your risk in case you are detained in transit, or if your devices are searched. We wrote this checklist to help journalists prepare for transit through a U.S. port of entry while preserving the confidentiality of your most sensitive information, such as unpublished reporting materials or source contact information. It’s important to think about your strategy in advance, and begin planning which options in this checklist make sense for you.&lt;/p&gt;
  1204. &lt;h2&gt;First thing’s first: What might CBP do?&lt;/h2&gt;
  1205. &lt;p data-block-key=&quot;77q3b&quot;&gt;&lt;a href=&quot;https://www.documentcloud.org/documents/24767453-cbp-directive-3340-049a-border-search-of-electronic-media-compliant/&quot;&gt;U.S. CBP’s policy&lt;/a&gt; is that they may conduct a “basic” search (manually looking through information on a device) for any reason or no reason at all. If they feel they have reasonable suspicion “of activity in violation of the laws enforced or administered by CBP” or if there is a “national security concern,” they may conduct what they call an “advanced” search, which may include connecting external equipment to your device, such as a &lt;a href=&quot;https://www.upturn.org/work/mass-extraction/&quot;&gt;forensic analysis tool&lt;/a&gt; designed to make a copy of your data.&lt;/p&gt;
  1206. &lt;p data-block-key=&quot;aq8r4&quot;&gt;Your citizenship status matters as to whether you can refuse to comply with a request to unlock your device or provide the passcode. If you are a U.S. citizen entering the U.S., you have the most legal leverage to refuse to comply because U.S. citizens cannot be denied entry — they must be let back into the country. But note that if you are a U.S. citizen, you may be subject to escalated harassment and further delay at the port of entry, and your device may be seized for days, weeks, or months.&lt;/p&gt;
  1207. &lt;p data-block-key=&quot;cb7la&quot;&gt;If CBP officers seek to search your locked device using forensic tools, there is a chance that some (if not all of the) information on the device will be compromised. But this probability depends on what tools are available to government agents at the port of entry, if they are motivated to seize your device and send it elsewhere for analysis, and what type of device, operating system, and security features your device has. Thus, it is also possible that strong encryption may substantially slow down or even thwart a government device search.&lt;/p&gt;
  1208. &lt;p data-block-key=&quot;djlqr&quot;&gt;Lawful permanent residents (green-card holders) must generally also be let back into the country. However, the current administration seems more willing to question LPR status, so refusing to comply with a request to unlock a device or provide a passcode may be risky for LPRs. Finally, CBP has broad discretion to deny entry to foreign nationals arriving on a visa or via the visa waiver program.&lt;/p&gt;
  1209. &lt;p data-block-key=&quot;76uhe&quot;&gt;At present, traveling domestically within the United States, particularly if you are a U.S. citizen, is lower risk than travelling internationally. Our luggage and the &lt;i&gt;physical aspects&lt;/i&gt; of digital devices may be searched — e.g., manual inspection or x-rays to ensure a device is not a bomb. CBP is often present at airports, but for domestic travel within the U.S. you should only be interacting with the Transportation Security Administration. &lt;a href=&quot;https://www.aclunc.org/our-work/legal-docket/aclu-foundation-northern-california-v-tsa-electronic-searches&quot;&gt;TSA does not assert authority&lt;/a&gt; to search the &lt;i&gt;data&lt;/i&gt; on your device — this is CBP’s role.&lt;/p&gt;
  1210. &lt;p data-block-key=&quot;fffv8&quot;&gt;At an international airport or other port of entry, you have to decide whether you will comply with a request to access your device, but this might not feel like much of a choice if you are a non-U.S. citizen entering the country! Plan accordingly.&lt;/p&gt;
  1211. &lt;h2 data-block-key=&quot;ann01&quot; id=&quot;your-border-digital-security-checklist&quot; class=&quot;heading&quot;&gt;Your border digital security checklist&lt;/h2&gt;
  1212. &lt;h3 data-block-key=&quot;7d4t2&quot; id=&quot;preparing-for-travel&quot; class=&quot;heading&quot;&gt;Preparing for travel&lt;/h3&gt;
  1213. &lt;p data-block-key=&quot;9n24j&quot;&gt;☐ &lt;a href=&quot;https://freedom.press/digisec/blog/your-smartphone-and-you-handbook-modern-mobile-maintenance/#extra-assurance-backing-up-your-device&quot;&gt;Make a backup of each of your devices&lt;/a&gt; before traveling.&lt;br /&gt;☐ &lt;a href=&quot;https://freedom.press/digisec/blog/your-smartphone-and-you-handbook-modern-mobile-maintenance/#make-sure-you-have-a-good-password&quot;&gt;Use long, unpredictable, alphanumeric passcodes&lt;/a&gt; for your devices and commit those passwords to memory.&lt;br /&gt; ☐ If bringing a laptop, ensure it is encrypted using &lt;a href=&quot;https://support.microsoft.com/en-us/windows/device-encryption-in-windows-cf7e2b6f-3e70-4882-9532-18633605b7df&quot;&gt;BitLocker for Windows&lt;/a&gt;, or &lt;a href=&quot;https://support.apple.com/guide/mac-help/protect-data-on-your-mac-with-filevault-mh11785/mac&quot;&gt;FileVault for macOS&lt;/a&gt;. Chromebooks are &lt;a href=&quot;https://static.googleusercontent.com/media/www.google.com/en//intl/en/chrome/assets/business/chromebook/downloads/chromebook-security-built-in.pdf&quot;&gt;encrypted by default&lt;/a&gt;. A password-protected laptop screen lock is usually insufficient. When going through security, devices should be turned all the way off.&lt;br /&gt;☐ Fully update your device and apps.&lt;br /&gt;☐ Optional: &lt;a href=&quot;https://freedom.press/digisec/blog/choosing-a-password-manager/&quot;&gt;Use a password manager&lt;/a&gt; to help create and store randomized passcodes. 1Password users can create &lt;a href=&quot;https://support.1password.com/travel-mode/&quot;&gt;temporary travel vaults&lt;/a&gt;.&lt;br /&gt;☐ Bring as few sensitive devices as possible — only what you need.&lt;br /&gt;☐ Regardless which country you are visiting, think carefully about what you are willing to post publicly on social media about that country to avoid scrutiny.&lt;br /&gt;☐ For land ports of entry in the U.S., &lt;a href=&quot;https://bwt.cbp.gov/&quot;&gt;check CBP’s border wait times&lt;/a&gt; and plan accordingly.&lt;br /&gt;☐ If possible, print out any travel documents in advance to avoid the necessity to unlock your phone during boarding, including boarding passes for your departure and return, rental car information, and any information about your itinerary that you would like to have on hand if questioned (e.g., hotel bookings, visa paperwork, employment information if applicable, conference information). Use a printer you trust at home or at the office, just in case.&lt;br /&gt;☐ Avoid bringing sensitive physical documents you wouldn’t want searched. If you need them, consider digitizing them (e.g., by taking a photo) and storing them remotely on a cloud service or backup device.&lt;/p&gt;
  1214. &lt;p data-block-key=&quot;7vjch&quot;&gt;Decide in advance whether you will unlock your device or provide the passcode for a search. Your overall likelihood of experiencing a device search is low (e.g., &lt;a href=&quot;https://www.cbp.gov/travel/cbp-search-authority/border-search-electronic-devices&quot;&gt;less than .01%&lt;/a&gt; of international travelers are selected), but depending on what information you carry, the impact of a search may be quite high. If you plan to unlock your device for a search or provide the passcode, ensure your devices are prepared:&lt;/p&gt;
  1215. &lt;p data-block-key=&quot;f29d6&quot;&gt;☐ Upload any information you would like to keep in cloud providers in advance (e.g., using iCloud) that you would like stored remotely, instead of locally on your device.&lt;br /&gt;☐ Remove any apps, files, &lt;a href=&quot;https://support.signal.org/hc/en-us/articles/360007320491-Delete-messages-alerts-or-chats&quot;&gt;chat histories&lt;/a&gt;, browsing histories, and sensitive contacts you would not want exposed during a search.&lt;br /&gt;☐ If you delete photos or files, delete them a second time in the “Recently Deleted” or “Trash” sections of your Files and Photos apps.&lt;br /&gt;☐ Remove messages from the device that you believe would draw unwanted scrutiny. Remove yourself — even if temporarily — from chat groups on platforms like Signal.&lt;br /&gt;☐ If you use Signal and plan to keep it on your device, &lt;a href=&quot;https://freedom.press/digisec/blog/locking-down-signal/#why-you-want-disappearing-messages&quot;&gt;use disappearing messages&lt;/a&gt; to minimize how much information you keep within the app.&lt;br /&gt;☐ Optional: Bring a travel device instead of your usual device. Ensure it is populated with the apps you need while traveling, as well as login credentials (e.g., stored in a password manager), and necessary files. If you do this, ensure your trusted contacts know how to reach you on this device.&lt;br /&gt;☐ Optional: Rather than manually removing all sensitive files from your computer, if you are primarily accessing web services during your travels, a Chromebook may be an affordable alternative to your regular computer.&lt;br /&gt;☐ Optional: After backing up your devices for every day use, factory reset it and add only the information you need back onto the device.&lt;br /&gt;☐ Optional: If you intend to work during your travel, plan in advance with a colleague who can remotely assist you in accessing and/or rotating necessary credentials.&lt;br /&gt;☐ If you &lt;i&gt;don’t&lt;/i&gt; plan to work, consider discussing with your IT department whether temporarily suspending your work accounts could mitigate risks at border crossings.&lt;/p&gt;
  1216. &lt;h3 data-block-key=&quot;aor90&quot; id=&quot;on-the-day-of-travel&quot; class=&quot;heading&quot;&gt;On the day of travel&lt;/h3&gt;
  1217. &lt;p data-block-key=&quot;23ip2&quot;&gt;☐ Log out of accounts you do not want accessible to border officials. Note that border officers do not have authority to access live cloud content — they must put devices in airplane mode or otherwise disconnect them from the internet.&lt;br /&gt; ☐ Power down your phone and laptop entirely before going through security. This will enable disk encryption, and make it harder for someone to analyze your device.&lt;br /&gt;☐ Immediately before travel, if you have a practicing attorney who has expertise in immigration and border issues, particularly related to members of the media, make sure you have their contact information written down before visiting.&lt;br /&gt;☐ Immediately before travel, ensure that a friend, relative, or colleague is aware of your whereabouts when passing through a port of entry, and provide them with an update as soon as possible afterward.&lt;/p&gt;
  1218. &lt;h3 data-block-key=&quot;9pde7&quot; id=&quot;if-you-are-pulled-into-secondary-screening&quot; class=&quot;heading&quot;&gt;If you are pulled into secondary screening&lt;/h3&gt;
  1219. &lt;p data-block-key=&quot;df6vi&quot;&gt;☐ Be polite and try not to emotionally escalate the situation.&lt;br /&gt;☐ Do not lie to border officials, but don’t offer any information they do not explicitly request.&lt;br /&gt;☐ Politely request officers’ names and badge numbers.&lt;br /&gt;☐ If you choose to unlock your device, rather than telling border officials your passcode, ask to type it in yourself.&lt;br /&gt;☐ Ask to be present for a search of your device. But note officers are likely to take your device out of your line of sight.&lt;br /&gt;☐ You may decline the request to search your device, but this may result in your device being seized and held for days, weeks, or months. If you are not a U.S. citizen, refusal to comply with a search request may lead to denial of entry, or scrutiny of lawful permanent resident status.&lt;br /&gt; ☐ If your device is seized, ask for a custody receipt (Form 6051D). This should also list the name and contact information for a supervising officer.&lt;br /&gt;☐ If an officer has plugged your unlocked phone or computer into another electronic device, they may have obtained a forensic copy of your device. You will want to remember anything you can about this event if it happens.&lt;br /&gt;☐ Immediately afterward, write down as many details as you can about the encounter: e.g., names, badge numbers, descriptions of equipment that may have been used to analyze the device, changes to the device or corrupted data, etc.&lt;/p&gt;
  1220. &lt;p data-block-key=&quot;2gg1i&quot;&gt;Reporting is not a crime. Be confident knowing you haven’t done anything wrong.&lt;/p&gt;
  1221. &lt;h2 data-block-key=&quot;1e69q&quot; id=&quot;more-resources&quot; class=&quot;heading&quot;&gt;More resources&lt;/h2&gt;
  1222. &lt;ul&gt;
  1223. &lt;li data-block-key=&quot;erdsv&quot;&gt;&lt;a href=&quot;https://hselaw.com/news-and-information/legalcurrents/preparing-for-electronic-device-searches-at-united-states-borders/&quot;&gt;https://hselaw.com/news-and-information/legalcurrents/preparing-for-electronic-device-searches-at-united-states-borders/&lt;/a&gt;&lt;/li&gt;
  1224. &lt;li data-block-key=&quot;a4mqc&quot;&gt;&lt;a href=&quot;https://www.eff.org/wp/digital-privacy-us-border-2017#main-content&quot;&gt;https://www.eff.org/wp/digital-privacy-us-border-2017#main-content&lt;/a&gt;&lt;/li&gt;
  1225. &lt;li data-block-key=&quot;8kbtj&quot;&gt;&lt;a href=&quot;https://www.aclu.org/news/privacy-technology/can-border-agents-search-your-electronic&quot;&gt;https://www.aclu.org/news/privacy-technology/can-border-agents-search-your-electronic&lt;/a&gt;&lt;/li&gt;
  1226. &lt;li data-block-key=&quot;6npi6&quot;&gt;&lt;a href=&quot;https://www.theverge.com/policy/634264/customs-border-protection-search-phone-airport-rights&quot;&gt;https://www.theverge.com/policy/634264/customs-border-protection-search-phone-airport-rights&lt;/a&gt;&lt;/li&gt;
  1227. &lt;li data-block-key=&quot;535ar&quot;&gt;&lt;a href=&quot;https://www.wired.com/2017/02/guide-getting-past-customs-digital-privacy-intact/&quot;&gt;https://www.wired.com/2017/02/guide-getting-past-customs-digital-privacy-intact/&lt;/a&gt;&lt;/li&gt;
  1228. &lt;li data-block-key=&quot;3rd9a&quot;&gt;&lt;a href=&quot;https://www.washingtonpost.com/technology/2025/03/27/cbp-cell-phones-devices-traveling-us/&quot;&gt;https://www.washingtonpost.com/technology/2025/03/27/cbp-cell-phones-devices-traveling-us/&lt;/a&gt;&lt;/li&gt;
  1229. &lt;/ul&gt;
  1230.  
  1231. &lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
  1232.     <pubDate>Mon, 23 Jun 2025 15:31:31 +0000</pubDate>
  1233. <guid isPermaLink="false">110809 at https://www.eff.org</guid>
  1234. <category domain="https://www.eff.org/issues/border-searches">Border Searches</category>
  1235. <dc:creator>Guest Author</dc:creator>
  1236. <dc:creator>Dave Maass</dc:creator>
  1237. <dc:creator>Sophia Cope</dc:creator>
  1238. <enclosure url="https://www.eff.org/files/banner_library/border-act-3.jpg" alt="icon of a border agent examining digital devices" type="image/jpeg" length="642988" />
  1239.  </item>
  1240.  <item>
  1241.    <title>EFF to European Commission: Don’t Resurrect Illegal Data Retention Mandates</title>
  1242.    <link>https://www.eff.org/deeplinks/2025/06/eff-european-commission-dont-resurrect-illegal-data-retention-mandates</link>
  1243.    <description>&lt;div class=&quot;field field--name-body field--type-text-with-summary field--label-hidden&quot;&gt;&lt;div class=&quot;field__items&quot;&gt;&lt;div class=&quot;field__item even&quot;&gt;&lt;p&gt;&lt;span&gt;The mandatory retention of &lt;/span&gt;&lt;a href=&quot;https://ssd.eff.org/module/why-metadata-matters&quot;&gt;&lt;span&gt;metadata&lt;/span&gt;&lt;/a&gt;&lt;span&gt; is an evergreen of European digital policy. Despite a number of rulings by Europe’s highest court, &lt;/span&gt;&lt;a href=&quot;https://eur-lex.europa.eu/legal-content/en/TXT/?uri=CELEX:62012CJ0293&quot;&gt;&lt;span&gt;confirming&lt;/span&gt;&lt;/a&gt; &lt;a href=&quot;https://eur-lex.europa.eu/legal-content/en/TXT/?uri=CELEX:62015CA0203&quot;&gt;&lt;span&gt;again&lt;/span&gt;&lt;/a&gt; &lt;a href=&quot;https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX:62018CJ0511&quot;&gt;&lt;span&gt;and&lt;/span&gt;&lt;/a&gt; &lt;a href=&quot;https://eur-lex.europa.eu/legal-content/en/TXT/?uri=CELEX:62020CJ0140&quot;&gt;&lt;span&gt;again&lt;/span&gt;&lt;/a&gt; &lt;a href=&quot;https://eur-lex.europa.eu/legal-content/en/TXT/?uri=CELEX:62019CA0793&quot;&gt;&lt;span&gt;the incompatibility&lt;/span&gt;&lt;/a&gt;&lt;span&gt; of general and indiscriminate data retention mandates with European fundamental rights, the European Commission is taking major steps towards the re-introduction of EU-wide data retention mandates. Recently, the Commission launched a Call for Evidence on data retention for criminal investigations—the first formal step towards a legislative proposal.&lt;/span&gt;&lt;/p&gt;
  1244. &lt;p&gt;&lt;span&gt;The European Commission and EU Member States have been attempting to revive data retention for years. For this purpose, a secretive “&lt;/span&gt;&lt;a href=&quot;https://home-affairs.ec.europa.eu/networks/high-level-group-hlg-access-data-effective-law-enforcement_en&quot;&gt;&lt;span&gt;High Level Group on Access to Data for Effective Law Enforcement&lt;/span&gt;&lt;/a&gt;&lt;span&gt;” has been formed, usually referred to as High level Group (HLG) “Going dark”. Going dark refers to the false narrative that law enforcement authorities are left “in the dark” due to a lack of accessible data, despite the ever increasing collection and accessing of data through &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/deeplinks/2025/01/online-behavioral-ads-fuel-surveillance-industry-heres-how&quot;&gt;&lt;span&gt;companies&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/issues/location-data-brokers&quot;&gt;&lt;span&gt;data brokers&lt;/span&gt;&lt;/a&gt;&lt;span&gt; and &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/nsa-spying&quot;&gt;&lt;span&gt;governments&lt;/span&gt;&lt;/a&gt;&lt;span&gt;. Going dark also describes the &lt;/span&gt;&lt;a href=&quot;https://edri.org/our-work/european-commission-discusses-going-dark-behind-closed-doors/&quot;&gt;&lt;span&gt;intransparent ways of working of the HLG&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, behind closed doors and without input from civil society. &lt;br /&gt;&lt;/span&gt;&lt;/p&gt;
  1245. &lt;p&gt;&lt;span&gt;The Groups’ &lt;/span&gt;&lt;a href=&quot;https://home-affairs.ec.europa.eu/document/download/1105a0ef-535c-44a7-a6d4-a8478fce1d29_en?filename=Recommendations%20of%20the%20HLG%20on%20Access%20to%20Data%20for%20Effective%20Law%20Enforcement_en.pdf&quot;&gt;&lt;span&gt;recommendations&lt;/span&gt;&lt;/a&gt;&lt;span&gt; to the European Commission, published in 2024, read like a wishlist of government surveillance.They include suggestions to backdoors in various technologies (reframed as “lawful access by design”), obligations on service providers to collect and retain more user data than they need for providing their services, and intercepting and providing decrypted data to law enforcement in real time, all the while avoiding to compromise the security of their systems. And of course, the HLG calls for a harmonized data retention regime, including not only the retention of but also the access to data, and extending data retention to any service provider that could provide access to data. &lt;br /&gt;&lt;/span&gt;&lt;/p&gt;
  1246. &lt;p&gt;&lt;a href=&quot;https://edri.org/wp-content/uploads/2024/12/Open-Letter-on-HLG-Access-to-Data-for-Effective-Law-Enforcement-Recommendations.pdf&quot;&gt;&lt;span&gt;EFF joined other civil society organizations&lt;/span&gt;&lt;/a&gt;&lt;span&gt; in addressing the dangerous proposals of the HLG, calling on the European Commission to safeguard fundamental rights and ensuring the security and confidentiality of communication. &lt;br /&gt;&lt;/span&gt;&lt;/p&gt;
  1247. &lt;p&gt;&lt;span&gt;In our response to the Commission&#039;s Call for Evidence, we reiterated the same principles. &lt;/span&gt;&lt;/p&gt;
  1248. &lt;ul&gt;
  1249. &lt;li&gt;&lt;span&gt;Any future legislative measures must prioritize the protection of fundamental rights and must be aligned with the extensive jurisprudence of the Court of Justice of the European Union. &lt;/span&gt;&lt;/li&gt;
  1250. &lt;li&gt;&lt;span&gt;General and indiscriminate data retention mandates undermine anonymity and privacy, which are essential for democratic societies, and pose significant cybersecurity risks by creating centralized troves of sensitive metadata that are attractive targets for malicious actors. &lt;/span&gt;&lt;/li&gt;
  1251. &lt;li&gt;&lt;span&gt;We highlight the lack of empirical evidence to justify blanket data retention and warn against extending retention duties to number-independent interpersonal communication services as it would violate EU Court of Justice doctrine, conflict with European data protection law, and compromise security.&lt;/span&gt;&lt;/li&gt;
  1252. &lt;/ul&gt;
  1253. &lt;p&gt;&lt;span&gt;The European Commission must once and for all abandon the ghost of data retention that’s been haunting EU policy discussions for decades, and shift its focus to rights respecting alternatives. &lt;/span&gt;&lt;/p&gt;
  1254. &lt;p&gt;&lt;span&gt;&lt;a href=&quot;https://www.eff.org/document/eff-submission-call-evidence-data-retention&quot;&gt;Read EFF’s full submission here.&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;
  1255.  
  1256. &lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
  1257.     <pubDate>Mon, 23 Jun 2025 15:26:58 +0000</pubDate>
  1258. <guid isPermaLink="false">110830 at https://www.eff.org</guid>
  1259. <category domain="https://www.eff.org/issues/privacy">Privacy</category>
  1260. <category domain="https://www.eff.org/issues/mandatory-data-retention">Mandatory Data Retention</category>
  1261. <category domain="https://www.eff.org/issues/eu-policy">EU Policy</category>
  1262. <category domain="https://www.eff.org/issues/end-end-encryption">End-to-End Encryption</category>
  1263. <dc:creator>Svea Windwehr</dc:creator>
  1264. <enclosure url="https://www.eff.org/files/banner_library/database-1.png" alt="" type="image/png" length="9166" />
  1265.  </item>
  1266.  <item>
  1267.    <title>Protect Yourself From Meta’s Latest Attack on Privacy</title>
  1268.    <link>https://www.eff.org/deeplinks/2025/06/protect-yourself-metas-latest-attack-privacy</link>
  1269.    <description>&lt;div class=&quot;field field--name-body field--type-text-with-summary field--label-hidden&quot;&gt;&lt;div class=&quot;field__items&quot;&gt;&lt;div class=&quot;field__item even&quot;&gt;&lt;p&gt;&lt;span&gt;Researchers recently caught Meta using an egregious new tracking technique to spy on you. Exploiting a technical loophole, the company was able to have their apps snoop on users’ web browsing. This tracking technique stands out for its flagrant disregard of core security protections built into phones and browsers. The episode is yet another reason to distrust Meta, block web tracking, and end surveillance advertising. &lt;/span&gt;&lt;/p&gt;
  1270. &lt;p&gt;&lt;span&gt;Fortunately, there are steps that you, your browser, and your government can take to fight online tracking. &lt;/span&gt;&lt;/p&gt;
  1271. &lt;h3&gt;&lt;span&gt;What Makes Meta’s New Tracking Technique So Problematic?&lt;/span&gt;&lt;/h3&gt;
  1272. &lt;p&gt;&lt;span&gt;More than 10 years ago, Meta introduced a snippet of code called the “Meta pixel,” which has since been embedded on &lt;/span&gt;&lt;a href=&quot;https://dl.acm.org/doi/fullHtml/10.1145/3543507.3583311&quot;&gt;&lt;span&gt;about 20%&lt;/span&gt;&lt;/a&gt;&lt;span&gt; of the most trafficked websites. This pixel exists to spy on you, recording how visitors use a website and respond to ads, and siphoning potentially sensitive info like &lt;/span&gt;&lt;a href=&quot;https://themarkup.org/pixel-hunt/2022/11/22/tax-filing-websites-have-been-sending-users-financial-information-to-facebook&quot;&gt;&lt;span&gt;financial information from tax filing websites&lt;/span&gt;&lt;/a&gt;&lt;span&gt; and &lt;/span&gt;&lt;a href=&quot;https://themarkup.org/pixel-hunt/2022/06/16/facebook-is-receiving-sensitive-medical-information-from-hospital-websites&quot;&gt;&lt;span&gt;medical information from hospital websites&lt;/span&gt;&lt;/a&gt;&lt;span&gt;,&lt;/span&gt;&lt;span&gt; all in service of the company’s creepy system of surveillance-based advertising. &lt;/span&gt;&lt;/p&gt;
  1273. &lt;p&gt;&lt;span&gt;While these pixels are well-known, and can be blocked by tools like &lt;/span&gt;&lt;a href=&quot;https://privacybadger.org/&quot;&gt;&lt;span&gt;EFF’s Privacy Badger&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, researchers discovered another way these pixels were being used to track you. &lt;/span&gt;&lt;/p&gt;
  1274. &lt;p class=&quot;pull-quote&quot;&gt;&lt;span&gt;Even users who blocked or cleared cookies, hid their IP address with a VPN, or browsed in incognito mode could be identified&lt;/span&gt;&lt;/p&gt;
  1275. &lt;p&gt;&lt;span&gt;Meta’s tracking pixel was secretly communicating with Meta’s apps on Android devices. This violates a fundamental security feature (“sandboxing”) of mobile operating systems that prevents apps from communicating with each other. Meta got around this restriction by exploiting &lt;/span&gt;&lt;i&gt;&lt;span&gt;localhost&lt;/span&gt;&lt;/i&gt;&lt;span&gt;, a feature meant for developer testing. This allowed Meta to create a hidden channel between mobile browser apps and its own apps. You can read more about the technical details &lt;/span&gt;&lt;a href=&quot;https://localmess.github.io/#description&quot;&gt;&lt;span&gt;here&lt;/span&gt;&lt;/a&gt;&lt;span&gt;.&lt;/span&gt;&lt;/p&gt;
  1276. &lt;p&gt;&lt;span&gt;This workaround helped Meta bypass user privacy protections and attempts at anonymity. Typically, &lt;/span&gt;&lt;a href=&quot;https://themarkup.org/pixel-hunt/2022/06/16/facebook-is-receiving-sensitive-medical-information-from-hospital-websites&quot;&gt;&lt;span&gt;Meta tries to link data&lt;/span&gt;&lt;/a&gt;&lt;span&gt; from “anonymous” website visitors to individual Meta accounts using signals like IP addresses and cookies. But Meta made re-identification trivial with this new tracking technique by sending information directly from its pixel to Meta&#039;s apps, where users are already logged in. Even users who blocked or cleared cookies, hid their IP address with a VPN, or browsed in incognito mode could be identified with this tracking technique.  &lt;/span&gt;&lt;/p&gt;
  1277. &lt;p&gt;&lt;span&gt;Meta didn’t just hide this tracking technique from users. Developers who embedded Meta’s tracking pixels on their websites were &lt;/span&gt;&lt;a href=&quot;https://localmess.github.io/#faq&quot;&gt;&lt;span&gt;also kept in the dark&lt;/span&gt;&lt;/a&gt;&lt;span&gt;. Some developers noticed the pixel contacting localhost from their websites, but got no explanation when they &lt;/span&gt;&lt;a href=&quot;https://web.archive.org/web/20250531105747/https://developers.facebook.com/community/threads/317050484803752/&quot;&gt;&lt;span&gt;raised&lt;/span&gt;&lt;/a&gt; &lt;a href=&quot;https://web.archive.org/web/20250531105711/https://developers.facebook.com/community/threads/937149104821259/&quot;&gt;&lt;span&gt;concerns&lt;/span&gt;&lt;/a&gt;&lt;span&gt; to Meta. Once publicly exposed, Meta immediately paused this tracking technique. They &lt;/span&gt;&lt;a href=&quot;https://arstechnica.com/security/2025/06/meta-and-yandex-are-de-anonymizing-android-users-web-browsing-identifiers/&quot;&gt;&lt;span&gt;claimed&lt;/span&gt;&lt;/a&gt;&lt;span&gt; they were in discussions with Google about “a potential miscommunication regarding the application of their policies.”&lt;/span&gt;&lt;/p&gt;
  1278. &lt;p&gt;&lt;span&gt;While the researchers only observed the practice on Android devices, similar exploits &lt;/span&gt;&lt;a href=&quot;https://localmess.github.io/#faq&quot;&gt;&lt;span&gt;may be possible&lt;/span&gt;&lt;/a&gt;&lt;span&gt; on iPhones as well.&lt;/span&gt;&lt;/p&gt;
  1279. &lt;p&gt;&lt;span&gt;This exploit underscores the unique privacy risks we face when Big Tech can leverage &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/deeplinks/2025/03/online-tracking-out-control-privacy-badger-can-help-you-fight-back&quot;&gt;&lt;span&gt;out of control online tracking&lt;/span&gt;&lt;/a&gt;&lt;span&gt; to profit from our personal data.&lt;/span&gt;&lt;/p&gt;
  1280. &lt;h3&gt;&lt;span&gt;How Can You Protect Yourself?&lt;/span&gt;&lt;/h3&gt;
  1281. &lt;p&gt;&lt;span&gt;Meta seems to have stopped using this technique for now, but that doesn’t mean they’re done inventing new ways to track you. Here are a few steps you can take to protect yourself:&lt;/span&gt;&lt;/p&gt;
  1282. &lt;p&gt;&lt;b&gt;Use a Privacy-Focused Browser&lt;/b&gt;&lt;/p&gt;
  1283. &lt;p&gt;&lt;span&gt;Choose a browser with better default privacy protections than Chrome. For example, Brave and DuckDuckGo protected users from this tracking technique because they block Meta’s tracking pixel by default. Firefox only partially blocked the new tracking technique with its default settings, but fully blocked it for users with “Enhanced Tracking Protection” set to “Strict.” &lt;/span&gt;&lt;/p&gt;
  1284. &lt;p&gt;&lt;span&gt;It’s also a good idea to &lt;/span&gt;&lt;a href=&quot;https://www.zdnet.com/article/in-app-browsers-can-be-trouble-heres-why-and-how-to-avoid-them/&quot;&gt;&lt;span&gt;avoid using in-app browsers&lt;/span&gt;&lt;/a&gt;&lt;span&gt;. When you open links inside the Facebook or Instagram apps, &lt;/span&gt;&lt;a href=&quot;https://krausefx.com/blog/ios-privacy-instagram-and-facebook-can-track-anything-you-do-on-any-website-in-their-in-app-browser&quot;&gt;&lt;span&gt;Meta can track you more easily&lt;/span&gt;&lt;/a&gt;&lt;span&gt; than if you opened the same links in an external browser.&lt;/span&gt;&lt;/p&gt;
  1285. &lt;p&gt;&lt;b&gt;Delete Unnecessary Apps&lt;/b&gt;&lt;/p&gt;
  1286. &lt;p&gt;&lt;span&gt;Reduce the number of ways your information can leak by deleting apps you don’t trust or don’t regularly use. Try opting for websites over apps when possible. In this case, &lt;/span&gt;&lt;a href=&quot;https://www.zdnet.com/article/facebook-was-tracking-your-text-message-and-phone-call-data-now-what/&quot;&gt;&lt;span&gt;and many similar cases&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, using the Facebook and Instagram website instead of the apps would have limited data collection. Even though both can contain tracking code, apps can access information that websites generally can’t, like a persistent “advertising ID” that companies use to track you (follow &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/deeplinks/2022/05/how-disable-ad-id-tracking-ios-and-android-and-why-you-should-do-it-now&quot;&gt;&lt;span&gt;EFF’s instructions to turn it off&lt;/span&gt;&lt;/a&gt;&lt;span&gt; if you haven’t already). &lt;/span&gt;&lt;/p&gt;
  1287. &lt;p&gt;&lt;b&gt;Install Privacy Badger&lt;/b&gt;&lt;/p&gt;
  1288. &lt;p&gt;&lt;span&gt;EFF’s &lt;/span&gt;&lt;a href=&quot;https://privacybadger.org&quot;&gt;&lt;span&gt;free browser extension&lt;/span&gt;&lt;/a&gt;&lt;span&gt; blocks trackers to stop companies from spying on you online. Although Privacy Badger would’ve stopped Meta’s latest tracking technique by blocking their pixel, Firefox for Android is the only mobile browser it currently supports. You can &lt;/span&gt;&lt;a href=&quot;https://privacybadger.org&quot;&gt;&lt;span&gt;install Privacy Badger&lt;/span&gt;&lt;/a&gt;&lt;span&gt; on Chrome, Firefox, and Edge on your desktop computer. &lt;/span&gt;&lt;/p&gt;
  1289. &lt;p&gt;&lt;b&gt;Limit Meta’s Use of Your Data&lt;/b&gt;&lt;/p&gt;
  1290. &lt;p&gt;&lt;span&gt;Meta’s business model creates an incentive to collect as much information as possible about people to sell targeted ads. Short of deleting your accounts, you have &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/deeplinks/2025/01/mad-meta-dont-let-them-collect-and-monetize-your-personal-data&quot;&gt;&lt;span&gt;a number of options&lt;/span&gt;&lt;/a&gt;&lt;span&gt; to limit tracking and how the company uses your data.&lt;/span&gt;&lt;/p&gt;
  1291. &lt;h3&gt;&lt;span&gt;How Should Google Chrome Respond?&lt;/span&gt;&lt;/h3&gt;
  1292. &lt;p&gt;&lt;span&gt;After learning about Meta’s latest tracking technique, Chrome and Firefox released fixes for the technical loopholes that Meta exploited. That’s an important step, but Meta’s deliberate attempt to bypass browsers’ privacy protections shows why browsers should do more to protect users from online trackers. &lt;/span&gt;&lt;/p&gt;
  1293. &lt;p&gt;&lt;span&gt;Unfortunately, the most popular browser, Google Chrome, is also the worst for your privacy. Privacy Badger can help by blocking trackers on desktop Chrome, but Chrome for Android doesn’t support browser extensions. That seems to be Google’s choice, rather than a technical limitation. Given the lack of privacy protections they offer, &lt;/span&gt;&lt;b&gt;Chrome should support extensions on Android&lt;/b&gt;&lt;span&gt; to let users protect themselves. &lt;/span&gt;&lt;/p&gt;
  1294. &lt;p&gt;&lt;span&gt;Although Chrome addressed the latest Meta exploit after it was exposed, their refusal to block third-party cookies or known trackers leaves the door wide open for Meta’s other creepy tracking techniques. Even when browsers block third-party cookies, allowing trackers to load at all gives them other ways to harvest and de-anonymize users’ data. &lt;/span&gt;&lt;b&gt;Chrome should protect its users by blocking known trackers&lt;/b&gt;&lt;span&gt; (&lt;/span&gt;&lt;a href=&quot;https://www.ghostery.com/whotracksme&quot;&gt;&lt;span&gt;including Google’s&lt;/span&gt;&lt;/a&gt;&lt;span&gt;). Tracker-blocking features in &lt;/span&gt;&lt;a href=&quot;https://support.apple.com/en-us/105030&quot;&gt;&lt;span&gt;Safari&lt;/span&gt;&lt;/a&gt;&lt;span&gt; and &lt;/span&gt;&lt;a href=&quot;https://support.mozilla.org/en-US/kb/enhanced-tracking-protection-firefox-desktop&quot;&gt;&lt;span&gt;Firefox&lt;/span&gt;&lt;/a&gt;&lt;span&gt; show that similar protections are possible and long overdue in Chrome. It has yet to be approved to ship in Chrome, but &lt;/span&gt;&lt;a href=&quot;https://github.com/explainers-by-googlers/script-blocking&quot;&gt;&lt;span&gt;a Google proposal&lt;/span&gt;&lt;/a&gt;&lt;span&gt; to block fingerprinting scripts in Incognito Mode is a promising start. &lt;/span&gt;&lt;/p&gt;
  1295. &lt;h3&gt;&lt;span&gt;Yet Another Reason to Ban Online Behavioral Advertising&lt;/span&gt;&lt;/h3&gt;
  1296. &lt;p&gt;&lt;span&gt;Meta’s &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/deeplinks/2021/11/after-facebook-leaks-here-what-should-come-next&quot;&gt;&lt;span&gt;business model&lt;/span&gt;&lt;/a&gt;&lt;span&gt; relies on collecting as much information as possible about people in order to sell highly-targeted ads. Even if this method has been paused, as long as they have the incentive to do so Meta will keep finding ways to bypass your privacy protections. &lt;/span&gt;&lt;/p&gt;
  1297. &lt;p&gt;&lt;br /&gt;&lt;span&gt;The best way to stop this cycle of invasive tracking techniques and patchwork fixes is to &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/deeplinks/2022/03/ban-online-behavioral-advertising&quot;&gt;&lt;span&gt;ban online behavioral advertising&lt;/span&gt;&lt;/a&gt;&lt;span&gt;. This would end the practice of targeting ads based on your online activity, removing the primary incentive for companies to track and share your personal data. We need strong federal privacy laws to ensure that you, not Meta, control what information you share online.&lt;/span&gt;&lt;/p&gt;
  1298.  
  1299. &lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
  1300.     <pubDate>Fri, 20 Jun 2025 15:01:28 +0000</pubDate>
  1301. <guid isPermaLink="false">110826 at https://www.eff.org</guid>
  1302. <category domain="https://www.eff.org/issues/privacy">Privacy</category>
  1303. <category domain="https://www.eff.org/issues/online-behavioral-tracking">Online Behavioral Tracking</category>
  1304. <dc:creator>Lena Cohen</dc:creator>
  1305. <dc:creator>Rory Mir</dc:creator>
  1306. <enclosure url="https://www.eff.org/files/banner_library/third_party_tracking_banner.png" alt="A woman being watched behind a one-way mirror" type="image/png" length="178751" />
  1307.  </item>
  1308.  <item>
  1309.    <title>A Token of Appreciation for Sustaining Donors 💞</title>
  1310.    <link>https://www.eff.org/deeplinks/2025/06/eff35-sustaining-donors</link>
  1311.    <description>&lt;div class=&quot;field field--name-body field--type-text-with-summary field--label-hidden&quot;&gt;&lt;div class=&quot;field__items&quot;&gt;&lt;div class=&quot;field__item even&quot;&gt;&lt;p&gt;You&#039;ll get a custom &lt;a href=&quot;https://eff.org/coin&quot;&gt;EFF35 Challenge Coin&lt;/a&gt; when you become a &lt;a href=&quot;https://eff.org/r.d98c&quot;&gt;monthly&lt;/a&gt; or &lt;a href=&quot;https://eff.org/r.13hk&quot;&gt;annual&lt;/a&gt; Sustaining Donor by July 10. It’s that simple.&lt;/p&gt;
  1312. &lt;p class=&quot;take-action&quot;&gt;&lt;a href=&quot;https://eff.org/r.d98c&quot;&gt;Give Once a Month&lt;/a&gt;&lt;/p&gt;
  1313. &lt;p class=&quot;take-action&quot;&gt;&lt;a href=&quot;https://eff.org/r.13hk&quot;&gt;Give Once a YEar&lt;/a&gt;&lt;/p&gt;
  1314. &lt;p class=&quot;take-explainer&quot;&gt;Start a Convenient recurring donation Today!&lt;/p&gt;
  1315. &lt;p&gt;But here&#039;s a little more background for all of you detail-oriented digital rights fans. &lt;a href=&quot;https://www.eff.org/35&quot;&gt;EFF&#039;s 35th Anniversary&lt;/a&gt; celebration has begun and we&#039;re commemorating three and a half decades for fighting for your privacy, security, and free expression rights online. These values are hallmarks of freedom and necessities for true democracy, and you can help protect them. It&#039;s only possible with the kindness and steadfast support from EFF members, and over 30% of them are &lt;em&gt;Sustaining Donors&lt;/em&gt;: people who spread out their support with a monthly or annual automatic recurring donation.&lt;/p&gt;
  1316. &lt;p&gt;We&#039;re saying thanks to new and upgrading Sustaining Donors by offering brand new EFF35 Challenge Coins as a literal token of thanks. Challenge coins follow a long tradition of offering a symbol of kinship and respect for great achievements—and we owe our strength to tech creators and users like you. EFF challenge coins are individually numbered for each supporter and &lt;a href=&quot;https://eff.org/r.d98c&quot;&gt;only available while supplies last&lt;/a&gt;.&lt;/p&gt;
  1317. &lt;p class=&quot;take-explainer&quot;&gt;&lt;a href=&quot;https://eff.org/r.d98c&quot;&gt;&lt;img src=&quot;https://www.eff.org/files/2025/06/02/coin_cat_1200px.jpg&quot; width=&quot;500&quot; height=&quot;375&quot; alt=&quot;Orange cat inspecting EFF 35th Anniversary Challenge Coin&quot; title=&quot;EFF35 Challenge Coin for monthly &amp;amp; annual donors (kitty not included).&quot; /&gt;&lt;/a&gt;&lt;/p&gt;
  1318. &lt;h2&gt;&lt;strong&gt;Become a Sustaining Donor&lt;/strong&gt;&lt;/h2&gt;
  1319. &lt;p&gt;Just start an automated recurring donation of at least &lt;a href=&quot;https://eff.org/r.aa8c&quot;&gt;$5 per month (Copper Level)&lt;/a&gt; or &lt;a href=&quot;https://eff.org/r.64dt&quot;&gt;$25 per year (Silicon Level)&lt;/a&gt; by &lt;del&gt;July 10, 2025&lt;/del&gt; &lt;strong&gt;August 11, 2025&lt;/strong&gt;. We&#039;ll automatically send a special-edition EFF challenge coin to the shipping address you provide during your transaction.&lt;/p&gt;
  1320. &lt;h2&gt;&lt;strong&gt;Already a Monthly or Annual Sustaining Donor?&lt;/strong&gt;&lt;/h2&gt;
  1321. &lt;p&gt;First of all—THANKS! Second, you can get an EFF35 Challenge Coin when you upgrade your donation. Just increase your monthly or annual gift by any amount and let us know by emailing &lt;a href=&quot;mailto:upgrade@eff.org?subject=Sustaining%20Donor%20Upgrade&amp;amp;amp;body=Item%20(size%20%26%20style%20if%20applicable)%3A%20%0A%0AShipping%20Address%3A%20&quot;&gt;upgrade@eff.org&lt;/a&gt;.&lt;/p&gt;
  1322. &lt;p&gt;Get started with your upgrade at &lt;a class=&quot;theme markdown__link&quot; href=&quot;https://eff.org/recurring&quot; rel=&quot;noopener noreferrer&quot; target=&quot;_blank&quot;&gt;&lt;span&gt;eff.org/recurring&lt;/span&gt;&lt;/a&gt;. If you used PayPal, just &lt;a class=&quot;theme markdown__link&quot; href=&quot;https://www.paypal.com/myaccount/autopay&quot; rel=&quot;noopener noreferrer&quot; target=&quot;_blank&quot;&gt;&lt;span&gt;cancel your current recurring donation&lt;/span&gt;&lt;/a&gt; and then go to eff.org to &lt;a class=&quot;theme markdown__link&quot; href=&quot;https://eff.org/r.d98c&quot; rel=&quot;noopener noreferrer&quot; target=&quot;_blank&quot;&gt;&lt;span&gt;start a new upgraded recurring donation&lt;/span&gt;&lt;/a&gt;.&lt;/p&gt;
  1323. &lt;h2&gt;&lt;strong&gt;Digital Rights Every Day&lt;/strong&gt;&lt;/h2&gt;
  1324. &lt;p&gt;EFF&#039;s mission is sustained by thousands of people from every imaginable background giving modest donations when they can. &lt;em&gt;Every cent counts&lt;/em&gt;. We like to show our gratitude and give you something to start conversations about civil liberties and human rights, whether you&#039;re &lt;a href=&quot;https://eff.org/r.76bz&quot;&gt;a one time donor&lt;/a&gt; or recurring &lt;a href=&quot;https://eff.org/r.d98c&quot;&gt;Sustaining Donor&lt;/a&gt;.&lt;/p&gt;
  1325. &lt;p&gt;&lt;/p&gt;&lt;center&gt;&lt;a href=&quot;https://eff.org/r.d98c&quot;&gt;&lt;img src=&quot;/files/2025/06/18/hoodie-front-back-alt-square-750px.jpg&quot; width=&quot;750&quot; height=&quot;750&quot; alt=&quot;Person wearing a green hoodie with a gold motherboard figure and orange poppies on the back, next to a person wearing an EFF35 Cityscape member t-shirt.&quot; title=&quot;Get great EFF swag when you become a monthly Sustaining Donor.&quot; /&gt;&lt;/a&gt;&lt;/center&gt;
  1326. &lt;p&gt;Check out freshly-baked member gifts made for EFF&#039;s anniversary year including the new &lt;a href=&quot;https://supporters.eff.org/donate/images/premium/55/shirt-v-neck-square2.jpg&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;EFF35 Cityscape T-Shirt&lt;/a&gt;, &lt;a href=&quot;https://supporters.eff.org/donate/images/premium/59/hoodie-front-back-alt-square.jpg&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;Motherboard Hooded Sweatshirt&lt;/a&gt;, and &lt;a href=&quot;https://supporters.eff.org/donate/images/premium/60/Anime_Girl_Multisticker_900px.png&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;new stickers&lt;/a&gt;. With your help, EFF is here to stay.&lt;/p&gt;
  1327.  
  1328. &lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
  1329.     <pubDate>Thu, 19 Jun 2025 17:04:37 +0000</pubDate>
  1330. <guid isPermaLink="false">110808 at https://www.eff.org</guid>
  1331. <dc:creator>Aaron Jue</dc:creator>
  1332. <enclosure url="https://www.eff.org/files/banner_library/challenge-coin-2025-preview-v2.jpg" alt="Front and back of silver EFF 35th anniversary challenge coin on a black background" type="image/jpeg" length="231720" />
  1333.  </item>
  1334.  <item>
  1335.    <title>Strategies for Resisting Tech-Enabled Violence Facing Transgender People</title>
  1336.    <link>https://www.eff.org/deeplinks/2025/06/strategies-resisting-tech-enabled-violence-facing-transgender-people</link>
  1337.    <description>&lt;div class=&quot;field field--name-body field--type-text-with-summary field--label-hidden&quot;&gt;&lt;div class=&quot;field__items&quot;&gt;&lt;div class=&quot;field__item even&quot;&gt;&lt;p&gt;&lt;span&gt;Today&#039;s Supreme Court’s ruling in &lt;/span&gt;&lt;i&gt;&lt;span&gt;U.S. v. Skrmetti&lt;/span&gt;&lt;/i&gt;&lt;span&gt; upholding bans on gender-affirming care for youth makes it clear: trans people are under attack. Threats to trans rights and healthcare are coming from legislatures, anti-trans bigots (both organized and not), apathetic bystanders, and more. Living under the most sophisticated surveillance apparatus in human history only makes things worse. While the dangers are very much tangible and immediate, the risks posed by technology can amplify them in insidious ways. Here is a non-exhaustive overview of concerns, a broad-sweeping threat model, and some recommended strategies that you can take to keep yourself and your loved ones safe.&lt;/span&gt;&lt;/p&gt;
  1338. &lt;h3&gt;&lt;span&gt;Dangers for Trans Youth&lt;/span&gt;&lt;/h3&gt;
  1339. &lt;p&gt;&lt;span&gt;Trans kids experience an inhumane amount of cruelty and assault. Much of today’s anti-trans legislation is aimed specifically at making life harder for transgender youth, across all aspects of life. For this reason, we have highlighted several of the unique threats facing transgender youth.&lt;/span&gt;&lt;/p&gt;
  1340. &lt;h4&gt;&lt;span&gt;School Monitoring Software&lt;/span&gt;&lt;/h4&gt;
  1341. &lt;p&gt;&lt;span&gt;Most school-issued devices are root-kitted with surveillance spyware known as student-monitoring software. The purveyors of these technologies &lt;/span&gt;&lt;a href=&quot;https://www.markey.senate.gov/news/press-releases/senators-markey-warren-investigation-finds-that-edtech-student-surveillance-platforms-need-urgent-federal-action-to-protect-students&quot;&gt;&lt;span&gt;have been widely criticized&lt;/span&gt;&lt;/a&gt;&lt;span&gt; for posing significant risks to marginalized children, particularly LGBTQ+ students. We ran our own investigation on the dangers posed by these technologies with a project called &lt;/span&gt;&lt;a href=&quot;https://redflagmachine.org/&quot;&gt;&lt;span&gt;Red Flag Machine&lt;/span&gt;&lt;/a&gt;&lt;span&gt;. Our findings showed that a significant portion of the times students’ online behavior was flagged as “inappropriate” was when they were researching LGBTQ+ topics such as queer history, sexual education, psychology, and medicine. When a device with this software flags such activity it often leads to students being placed in direct contact with school administrators or &lt;/span&gt;&lt;a href=&quot;https://www.warren.senate.gov/oversight/reports/warren-markey-investigation-finds-that-edtech-student-surveillance-platforms-need-urgent-federal-action-to-protect-students&quot;&gt;&lt;span&gt;even law enforcement&lt;/span&gt;&lt;/a&gt;&lt;span&gt;. &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/deeplinks/2022/06/mandatory-student-spyware-creating-perfect-storm-human-rights-abuses&quot;&gt;&lt;span&gt;As I wrote 3 years ago&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, this creates a persistent and uniquely dangerous situation for students living in areas with regressive laws around LGBTQ+ life or unsafe home environments.&lt;/span&gt;&lt;/p&gt;
  1342. &lt;p class=&quot;pull-quote&quot;&gt;&lt;span&gt;The risks posed by technology can amplify threats in insidious ways&lt;/span&gt;&lt;/p&gt;
  1343. &lt;p&gt;&lt;span&gt;Unfortunately, because of the invasive nature of these school-issued devices, we can’t recommend a safe way to research LGBTQ+ topics on them without risking school administrators finding out. If possible, consider compartmentalizing those searches to different devices, ones owned by you or a trusted friend, or devices found in an environment you trust, such as a public library.&lt;/span&gt;&lt;/p&gt;
  1344. &lt;h4&gt;&lt;span&gt;Family Owned Devices&lt;/span&gt;&lt;/h4&gt;
  1345. &lt;p&gt;&lt;span&gt;If you don’t own your phone, laptop, or other devices—such as if your parents or guardians are in control of them (e.g. they have access to unlock them or they exert control over the app stores you can access with them)— it’s safest to treat those devices as you would a school-issued device. This means you should not trust those devices for the most sensitive activities or searches that you want to keep especially private. While steps like deleting browser history and using &lt;/span&gt;&lt;a href=&quot;https://support.apple.com/guide/personal-safety/lock-or-hide-apps-on-your-iphone-ipsd0be4c185/web&quot;&gt;&lt;span&gt;hidden folders&lt;/span&gt;&lt;/a&gt;&lt;span&gt; or &lt;/span&gt;&lt;a href=&quot;https://support.apple.com/en-us/104987&quot;&gt;&lt;span&gt;photo albums&lt;/span&gt;&lt;/a&gt;&lt;span&gt; can offer some safety, they aren’t sure-fire protections to prevent the adults in your life from accessing your sensitive information. When possible, try using a public library computer (outside of school) or borrow a trusted friend’s device with fewer restrictions. &lt;/span&gt;&lt;/p&gt;
  1346. &lt;h3&gt;&lt;span&gt;Dangers for Protestors&lt;/span&gt;&lt;/h3&gt;
  1347. &lt;p&gt;&lt;span&gt;Pride demonstrations are once again returning to their roots as political protests. It’s important to treat them as such by locking down your devices and coming up with some safety plans in advance. We recommend reading our entire &lt;/span&gt;&lt;a href=&quot;https://ssd.eff.org/module/attending-protest&quot;&gt;&lt;span&gt;Surveillance Self-Defense guide on attending a protest&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, taking special care to implement strategies like disabling biometric unlock on your phone and documenting the protest without putting others at risk. If you’re attending the demonstration with others–which is strongly encouraged–consider setting up a Signal group chat and using strategies laid out in this &lt;/span&gt;&lt;a href=&quot;https://micahflee.com/using-signal-groups-for-activism/&quot;&gt;&lt;span&gt;blog post by Micah Lee&lt;/span&gt;&lt;/a&gt;&lt;span&gt;.&lt;/span&gt;&lt;/p&gt;
  1348. &lt;h4&gt;&lt;span&gt;Counter-protestors&lt;/span&gt;&lt;/h4&gt;
  1349. &lt;p&gt;&lt;span&gt;There is a significant push from anti-trans bigots to make Pride month more dangerous for our community. An independent source has been &lt;/span&gt;&lt;a href=&quot;https://www.google.com/maps/d/viewer?mid=1kd_jQ6rRJrgaQp4J0Km7NWwKsuyDCtQ&amp;amp;ll=41.25881813524541%2C-96.69431800000001&amp;amp;z=5&quot;&gt;&lt;span&gt;tracking and mapping anti-trans organized groups&lt;/span&gt;&lt;/a&gt;&lt;span&gt; who are specifically targeting Pride events. While the list is non-exhaustive, it does provide some insight into who these groups are and where they are active. If one of these groups is organizing in your area, it will be important to take extra precautions to keep yourself safe.&lt;/span&gt;&lt;/p&gt;
  1350. &lt;h3&gt;&lt;span&gt;Data Brokers &amp;amp; Open-Source Intelligence&lt;/span&gt;&lt;/h3&gt;
  1351. &lt;p&gt;&lt;span&gt;Data brokers pose a &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/deeplinks/2025/01/online-behavioral-ads-fuel-surveillance-industry-heres-how&quot;&gt;&lt;span&gt;significant threat to everyone&lt;/span&gt;&lt;/a&gt;&lt;span&gt;–and frankly, the entire industry deserves to be deleted out of existence. The dangers are even more pressing for people doing the vital work advocating for human rights of transgender people. If you’re a doctor, an activist, or a supportive family member of a transgender person, you are at risk of your own personal information being weaponized against you. Anti-trans bigots and their supporters online will routinely access open-source intelligence and data broker records to cause harm.&lt;/span&gt;&lt;/p&gt;
  1352. &lt;p&gt;&lt;span&gt;You can reduce some of these risks by opting out from data brokers. It’s not a cure-all (the entire dissolution of the data broker industry is the only solution), but it’s a meaningful step. The &lt;/span&gt;&lt;a href=&quot;https://innovation.consumerreports.org/new-report-data-defense-evaluating-people-search-site-removal-services/&quot;&gt;&lt;span&gt;DIY method has been found most effective&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, though there are services to automate the process if you would rather save yourself the time and energy. For the DIY approach, we recommend using &lt;/span&gt;&lt;a href=&quot;https://github.com/yaelwrites/Big-Ass-Data-Broker-Opt-Out-List&quot;&gt;&lt;span&gt;Yael Grauer’s Big Ass Data-Broker Opt Out List&lt;/span&gt;&lt;/a&gt;&lt;span&gt;.&lt;/span&gt;&lt;/p&gt;
  1353. &lt;p class=&quot;pull-quote&quot;&gt;&lt;span&gt;Legality is likely to continue to shift&lt;/span&gt;&lt;/p&gt;
  1354. &lt;p&gt;&lt;span&gt;It’s also important to look into other publicly accessible information that may be out there, including voter registration records, medical licensing information, property sales records, and more. Some of these can be obfuscated through mechanisms like “address confidentiality programs.” These protections vary state-by-state, so we recommend checking your local laws and protections.&lt;/span&gt;&lt;/p&gt;
  1355. &lt;h3&gt;&lt;span&gt;Medical Data&lt;/span&gt;&lt;/h3&gt;
  1356. &lt;p&gt;&lt;span&gt;In recent years, legislatures across the country have moved to restrict access to and ban transgender healthcare. Legality is likely to continue to shift, especially after the Supreme Court’s green light today in &lt;/span&gt;&lt;i&gt;&lt;span&gt;Skrmetti&lt;/span&gt;&lt;/i&gt;&lt;span&gt;. Many of the concerns around criminalization of transgender healthcare overlap with those surrounding abortion access –issues that are deeply connected and not mutually exclusive. The &lt;/span&gt;&lt;a href=&quot;https://ssd.eff.org/playlist/reproductive-healthcare-service-provider-seeker-or-advocate&quot;&gt;&lt;span&gt;Surveillance Self-Defense playlist for the abortion access movement&lt;/span&gt;&lt;/a&gt;&lt;span&gt; is a great place to start when thinking through these risks, particularly the guides on &lt;/span&gt;&lt;a href=&quot;https://ssd.eff.org/module/mobile-phones-location-tracking&quot;&gt;&lt;span&gt;mobile phone location tracking&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, making a &lt;/span&gt;&lt;a href=&quot;https://ssd.eff.org/module/your-security-plan&quot;&gt;&lt;span&gt;security plan&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, and &lt;/span&gt;&lt;a href=&quot;https://ssd.eff.org/module/communicating-others&quot;&gt;&lt;span&gt;communicating with others&lt;/span&gt;&lt;/a&gt;&lt;span&gt;. While some of this overlaps with the previously linked protest safety guides, that redundancy only underscores the importance.&lt;/span&gt;&lt;/p&gt;
  1357. &lt;p&gt;&lt;span&gt;Unfortunately, much of the data about your medical history and care is out of your hands. While some medical practitioners may have &lt;/span&gt;&lt;i&gt;&lt;span&gt;some&lt;/span&gt;&lt;/i&gt;&lt;span&gt; flexibility over how your records reflect your trans identity, certain aspects like diagnostic codes and pharmaceutical data for hormone therapy or surgery are often more rigid and difficult to obscure. As a patient, it’s important to consult with your medical provider about this information. Consider opening up a dialogue with them about what information &lt;/span&gt;&lt;i&gt;&lt;span&gt;needs&lt;/span&gt;&lt;/i&gt;&lt;span&gt; to be documented, versus what could be obfuscated, and how you can plan ahead in the event that this type of care is further outlawed or deemed criminal.&lt;/span&gt;&lt;/p&gt;
  1358. &lt;h3&gt;&lt;span&gt;Account Safety&lt;/span&gt;&lt;/h3&gt;
  1359. &lt;h4&gt;&lt;span&gt;Locking Down Social Media Accounts&lt;/span&gt;&lt;/h4&gt;
  1360. &lt;p&gt;&lt;span&gt;It’s a good idea for everyone to review the privacy and security settings on their social media accounts. But given the extreme amount of anti-trans hate online (&lt;/span&gt;&lt;a href=&quot;https://glaad.org/releases/meta-oversight-board-allows-anti-trans-hate-from-others-but-tells-meta-to-remove-its-own/&quot;&gt;&lt;span&gt;sometimes emboldened by the very platforms themselves&lt;/span&gt;&lt;/a&gt;&lt;span&gt;), this is a necessary step for trans people online. To start, check out the &lt;/span&gt;&lt;a href=&quot;https://ssd.eff.org/module/protecting-yourself-social-networks&quot;&gt;&lt;span&gt;Surveillance Self-Defense guide on social media account safety&lt;/span&gt;&lt;/a&gt;&lt;span&gt;. &lt;/span&gt;&lt;/p&gt;
  1361. &lt;p class=&quot;pull-quote&quot;&gt;&lt;span&gt;We can’t let the threats posed by technology diminish our humanity and our liberation.&lt;/span&gt;&lt;/p&gt;
  1362. &lt;p&gt;&lt;span&gt;In addition to reviewing your account settings, you may want to think carefully about what information you choose to share online. While visibility of queerness and humanity is a powerful tool for destigmatizing our existence, only you can decide if the risk involved with sharing your face, your name, and your life outweigh the benefit of showing others that no matter what happens, trans people exist. There’s no single right answer—only what’s right for you.&lt;/span&gt;&lt;/p&gt;
  1363. &lt;p&gt;&lt;span&gt;Keep in mind also that &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/deeplinks/2024/06/global-suppression-online-lgbtq-speech-continues&quot;&gt;&lt;span&gt;LGBTQ expression is at significantly greater risk of censorship by these platforms&lt;/span&gt;&lt;/a&gt;&lt;span&gt;. There is little individuals can do to fully evade or protect against this, underscoring the importance of advocacy and platform accountability.&lt;/span&gt;&lt;/p&gt;
  1364. &lt;h4&gt;&lt;span&gt;Dating Apps&lt;/span&gt;&lt;/h4&gt;
  1365. &lt;p&gt;&lt;span&gt;Dating apps also pose a unique set of risks for transgender people. &lt;/span&gt;&lt;a href=&quot;https://www.hrc.org/resources/understanding-intimate-partner-violence-in-the-lgbtq-community&quot;&gt;&lt;span&gt;Intimate partner violence for transgender people is at a staggeringly high rate&lt;/span&gt;&lt;/a&gt;&lt;span&gt; compared to cisgender people–meaning we must take special care to protect ourselves. &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/deeplinks/2021/06/security-tips-online-lgbtq-dating&quot;&gt;&lt;span&gt;This guide on LGBTQ dating app safety&lt;/span&gt;&lt;/a&gt;&lt;span&gt; is worth reading, but here’s the TLDR: always designate a friend as your safety contact before and after meeting anyone new, meet in public first, and be mindful of how you share photos with others on dating apps.&lt;/span&gt;&lt;/p&gt;
  1366. &lt;h3&gt;&lt;span&gt;Safety and Liberation Are Collective Efforts&lt;/span&gt;&lt;/h3&gt;
  1367. &lt;p&gt;&lt;span&gt;While bodily autonomy is under attack from multiple fronts, it’s crucial that we band together to share strategies of resistance. Digital privacy and security must be considered when it comes to holistic security and safety. Don’t let technology become the tool that enables violence or restricts the self-determination we all deserve.&lt;/span&gt;&lt;/p&gt;
  1368. &lt;p&gt;&lt;span&gt;Trans people have always existed. Trans people will continue to exist despite the state’s efforts to eradicate us. Digital privacy and security are just one aspect of our collective safety. We can’t let the threats posed by technology diminish our humanity and our liberation. Stay informed. Fight back. We keep each other safe.&lt;/span&gt;&lt;/p&gt;
  1369.  
  1370. &lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
  1371.     <pubDate>Wed, 18 Jun 2025 22:49:37 +0000</pubDate>
  1372. <guid isPermaLink="false">110824 at https://www.eff.org</guid>
  1373. <category domain="https://www.eff.org/issues/lgbtq">LGBTQ+</category>
  1374. <dc:creator>Daly Barnett</dc:creator>
  1375. <enclosure url="https://www.eff.org/files/banner_library/icon-2019-freespeech.png" alt="A multi-colored bullhorn icon surrounded by grey-blue hexagons" type="image/png" length="14323" />
  1376.  </item>
  1377.  <item>
  1378.    <title>Apple to Australians: You’re Too Stupid to Choose Your Own Apps</title>
  1379.    <link>https://www.eff.org/deeplinks/2025/06/apple-australians-youre-too-stupid-choose-your-own-apps</link>
  1380.    <description>&lt;div class=&quot;field field--name-body field--type-text-with-summary field--label-hidden&quot;&gt;&lt;div class=&quot;field__items&quot;&gt;&lt;div class=&quot;field__item even&quot;&gt;&lt;p&gt;&lt;span&gt;Apple&lt;/span&gt;&lt;a href=&quot;https://www.neowin.net/news/apple-warns-australia-against-joining-eu-in-mandating-iphone-app-sideloading/&quot;&gt; &lt;span&gt;has released a scaremongering, self-serving warning aimed at the Australian government&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, claiming that Australians will be overrun by a parade of digital horribles if Australia follows the European Union’s lead and regulates Apple’s “walled garden.” &lt;/span&gt;&lt;/p&gt;
  1381. &lt;p&gt;&lt;span&gt;The &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/pages/adoption-dsadma-notre-analyse&quot;&gt;&lt;span&gt;EU’s Digital Markets Act&lt;/span&gt;&lt;/a&gt;&lt;span&gt; is a big, complex, ambitious law that takes aim squarely at the source of Big Tech’s power: lock-in. For users, the DMA offers&lt;/span&gt;&lt;a href=&quot;https://www.eff.org/deeplinks/2022/04/eu-digital-markets-acts-interoperability-rule-addresses-important-need-raises&quot;&gt; &lt;span&gt;interoperability rules&lt;/span&gt;&lt;/a&gt;&lt;span&gt; that let Europeans escape US tech giants’ walled gardens&lt;/span&gt;&lt;a href=&quot;https://www.eff.org/interoperablefacebook&quot;&gt; &lt;span&gt;without giving up their relationships&lt;/span&gt;&lt;/a&gt;&lt;span&gt; and&lt;/span&gt;&lt;a href=&quot;https://www.eff.org/deeplinks/2021/08/facebooks-secret-war-switching-costs&quot;&gt; &lt;span&gt;digital memories&lt;/span&gt;&lt;/a&gt;&lt;span&gt;.  &lt;/span&gt;&lt;/p&gt;
  1382. &lt;p&gt;&lt;span&gt;For small businesses, the DMA offers something just as valuable: the right to process their own payments. That may sound boring, but here’s the thing: Apple takes &lt;/span&gt;&lt;i&gt;&lt;span&gt;30 percent &lt;/span&gt;&lt;/i&gt;&lt;span&gt;commission on most payments made through iPhone and iPad apps, and they ban app makers from including alternative payment methods or even &lt;/span&gt;&lt;i&gt;&lt;span&gt;mentioning&lt;/span&gt;&lt;/i&gt;&lt;span&gt; that Apple customers can make their payments on the web. &lt;/span&gt;&lt;/p&gt;
  1383. &lt;p&gt;&lt;span&gt;All this means that&lt;/span&gt;&lt;a href=&quot;https://www.theverge.com/2024/8/12/24218629/patreon-membership-ios-30-percent-apple-tax&quot;&gt; &lt;span&gt;every euro a European Patreon user sends to a performer or artist&lt;/span&gt;&lt;/a&gt;&lt;span&gt; takes a round-trip through Cupertino, California, and comes back 30 cents lighter. Same goes for other money sent to major newspapers, big games, or large service providers. Meanwhile, the actual cost of processing a payment in the EU is &lt;/span&gt;&lt;i&gt;&lt;span&gt;less than one percent&lt;/span&gt;&lt;/i&gt;&lt;span&gt;, meaning that Apple is taking in a 3,000 percent margin on its EU payments. &lt;/span&gt;&lt;/p&gt;
  1384. &lt;p&gt;&lt;span&gt;To make things worse, Apple uses “digital rights management” to lock iPhones and iPads to its official App Store. That means that Europeans can’t escape Apple’s 30 percent “app tax” by installing apps from a store with fairer payment policies.  &lt;/span&gt;&lt;/p&gt;
  1385. &lt;p&gt;&lt;span&gt;Here, too, the DMA offers relief, with a rule that requires Apple to permit “sideloading” of apps (that is, installing apps without using an app store). The same rule requires Apple to allow its customers to choose to use independent app stores. &lt;/span&gt;&lt;/p&gt;
  1386. &lt;p&gt;&lt;span&gt;With the DMA, the EU is leading the world in smart, administrable tech policies that strike at the &lt;/span&gt;&lt;i&gt;&lt;span&gt;power&lt;/span&gt;&lt;/i&gt;&lt;span&gt; of tech companies. This is a welcome break from the dominant approach to tech policy over the first two decades of this century, in which regulators focused on demanding that tech companies use their power wisely – by surveilling and controlling their users to prevent bad behavior – rather than taking that power away. &lt;/span&gt;&lt;/p&gt;
  1387. &lt;p&gt;&lt;span&gt;Which is why Australia is so interested.&lt;/span&gt;&lt;a href=&quot;https://treasury.gov.au/sites/default/files/2024-12/c2024-547447-pp.pdf&quot;&gt; &lt;span&gt;A late 2024 report from the Australian Treasury&lt;/span&gt;&lt;/a&gt;&lt;span&gt; took a serious look at transposing DMA-style rules to Australia. It’s a sound policy, as the European experience has shown. &lt;/span&gt;&lt;/p&gt;
  1388. &lt;p&gt;&lt;span&gt;But you wouldn’t know it by listening to Apple. According to Apple, Australians aren’t competent to have the final say over which apps they use and how they pay for them, and only Apple can make those determinations safely. It’s true that Apple sometimes takes&lt;/span&gt;&lt;a href=&quot;https://www.cnbc.com/2022/02/02/facebook-says-apple-ios-privacy-change-will-cost-10-billion-this-year.html&quot;&gt; &lt;span&gt;bold, admirable steps to protect its customers’ privacy&lt;/span&gt;&lt;/a&gt;&lt;span&gt; – but it’s also true that&lt;/span&gt;&lt;a href=&quot;https://gizmodo.com/apple-iphone-analytics-tracking-even-when-off-app-store-1849757558&quot;&gt; &lt;span&gt;sometimes &lt;/span&gt;&lt;i&gt;&lt;span&gt;Apple&lt;/span&gt;&lt;/i&gt;&lt;span&gt; invades its customers’ privacy (and lies about it)&lt;/span&gt;&lt;/a&gt;&lt;span&gt;. It’s true that sometimes&lt;/span&gt;&lt;a href=&quot;https://www.eff.org/deeplinks/2016/02/eff-support-apple-encryption-battle&quot;&gt; &lt;span&gt;Apple defends its customers from government spying&lt;/span&gt;&lt;/a&gt;&lt;span&gt; – but it’s also true that sometimes Apple&lt;/span&gt;&lt;a href=&quot;https://www.macworld.com/article/230330/apple-in-china-why-the-company-withdrew-vpn-apps-from-its-app-store.html&quot;&gt; &lt;span&gt;serves its customers up on a platter to government spies&lt;/span&gt;&lt;/a&gt;&lt;span&gt;,&lt;/span&gt;&lt;a href=&quot;https://www.nytimes.com/2021/05/17/technology/apple-china-censorship-data.html&quot;&gt; &lt;span&gt;delivering population-scale surveillance for autocratic regimes&lt;/span&gt;&lt;/a&gt;&lt;span&gt; (and&lt;/span&gt;&lt;a href=&quot;https://www.vice.com/en/article/apple-airdrop-china-ios/&quot;&gt; &lt;span&gt;Apple has even been known to change its apps to help autocrats cling to power&lt;/span&gt;&lt;/a&gt;&lt;span&gt;). &lt;/span&gt;&lt;/p&gt;
  1389. &lt;p&gt;&lt;span&gt;Apple sometimes has its customers’ backs, but often, it sides with its shareholders (or repressive governments) over those customers. There’s no such thing as a benevolent dictator:&lt;/span&gt;&lt;a href=&quot;https://www.eff.org/document/letter-bruce-schneier-senate-judiciary-regarding-app-store-security&quot;&gt; &lt;span&gt;letting Apple veto your decisions about how you use your devices will not make you safer&lt;/span&gt;&lt;/a&gt;&lt;span&gt;. &lt;/span&gt;&lt;/p&gt;
  1390. &lt;p&gt;&lt;span&gt;Apple’s claims about the chaos and dangers that Europeans face thanks to the DMA are even more (grimly) funny when you consider that Apple has flouted EU law with&lt;/span&gt;&lt;a href=&quot;https://www.eff.org/deeplinks/2024/05/big-tech-eu-drop-dead&quot;&gt; &lt;span&gt;breathtaking acts&lt;/span&gt;&lt;/a&gt;&lt;span&gt; of&lt;/span&gt;&lt;a href=&quot;https://developer.apple.com/support/ios-interoperability/#overview&quot;&gt; &lt;span&gt;malicious compliance&lt;/span&gt;&lt;/a&gt;&lt;span&gt;. Apparently, the European iPhone carnage has been triggered by the words on the European law books, without Apple even having to follow those laws! &lt;/span&gt;&lt;/p&gt;
  1391. &lt;p&gt;&lt;span&gt;The world is in the midst of a global anti-monopoly wave that keeps on growing. This decade has seen big, muscular antitrust action in the US, the UK, the EU, Canada, South Korea, Japan, Germany, Spain, France, and even China.  &lt;/span&gt;&lt;/p&gt;
  1392. &lt;p&gt;&lt;span&gt;It’s been a century since the last wave of trustbusting swept the globe, and while today’s monopolists are orders of magnitude larger than their early 20th-century forbears, they also have a unique vulnerability.  &lt;/span&gt;&lt;/p&gt;
  1393. &lt;p&gt;&lt;span&gt;Broadly speaking, today’s tech giants cheat in the same way &lt;/span&gt;&lt;i&gt;&lt;span&gt;everywhere&lt;/span&gt;&lt;/i&gt;&lt;span&gt;. They do the same spying, the same price-gouging, and employ the same lock-in tactics in every country where they operate, which is practically every country. That means that when a large bloc like the EU makes a good tech regulation, it has the power to ripple out across the planet, benefiting all of us – like when the EU forced Apple to switch to standard USB-C cables to charge their devices, and&lt;/span&gt;&lt;a href=&quot;https://www.theguardian.com/technology/2022/oct/26/iphone-usb-c-lightning-connectors-apple-eu-rules&quot;&gt; &lt;span&gt;we all got iPhones with USB-C ports&lt;/span&gt;&lt;/a&gt;&lt;span&gt;. &lt;/span&gt;&lt;/p&gt;
  1394. &lt;p&gt;&lt;span&gt;It makes perfect sense for Australia to import the DMA – after all, Apple and other American tech companies run the same scams on Australians as they do on Europeans. &lt;/span&gt;&lt;/p&gt;
  1395. &lt;p&gt;&lt;span&gt;Around the world, antitrust enforcers have figured out that they can copy one another’s homework, to the benefit of the people they defend. For example, in 2022,&lt;/span&gt;&lt;a href=&quot;https://assets.publishing.service.gov.uk/media/63f61bc0d3bf7f62e8c34a02/Mobile_Ecosystems_Final_Report_amended_2.pdf&quot;&gt; &lt;span&gt;the UK’s Digital Markets Unit published a landmark study on the abuses of the mobile duopoly&lt;/span&gt;&lt;/a&gt;&lt;span&gt;. The EU Commission relied on the UK report when it crafted the DMA, as did&lt;/span&gt;&lt;a href=&quot;https://www.congress.gov/bill/117th-congress/senate-bill/2710&quot;&gt; &lt;span&gt;an American Congressman who introduced a similar law that year&lt;/span&gt;&lt;/a&gt;&lt;span&gt;. The same report’s findings became the basis for new enforcement efforts in&lt;/span&gt;&lt;a href=&quot;https://asia.nikkei.com/Business/Technology/Japan-to-crack-down-on-Apple-and-Google-app-store-monopolies&quot;&gt; &lt;span&gt;Japan&lt;/span&gt;&lt;/a&gt;&lt;span&gt; and&lt;/span&gt;&lt;a href=&quot;https://www.reuters.com/technology/skorea-considers-505-mln-fine-against-google-apple-over-app-market-practices-2023-10-06/&quot;&gt; &lt;span&gt;South Korea&lt;/span&gt;&lt;/a&gt;&lt;span&gt;. &lt;/span&gt;&lt;/p&gt;
  1396. &lt;p&gt;&lt;span&gt;As Benjamin Franklin wrote, “He who receives an idea from me, receives instruction himself without lessening mine; as he who lights his taper at mine, receives light without darkening mine.” It’s wonderful to see Australian regulators picking up best practices from the EU, and we look forward to seeing what ideas Australia has for the rest of the world to copy. &lt;/span&gt;&lt;/p&gt;
  1397.  
  1398. &lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
  1399.     <pubDate>Wed, 18 Jun 2025 21:35:30 +0000</pubDate>
  1400. <guid isPermaLink="false">110823 at https://www.eff.org</guid>
  1401. <category domain="https://www.eff.org/issues/competition">Competition</category>
  1402. <category domain="https://www.eff.org/issues/dmca">DMCA</category>
  1403. <category domain="https://www.eff.org/issues/drm">DRM</category>
  1404. <category domain="https://www.eff.org/issues/trade-agreements">Trade Agreements and Digital Rights</category>
  1405. <dc:creator>Cory Doctorow</dc:creator>
  1406. <enclosure url="https://www.eff.org/files/banner_library/apple-worm.png" alt="the standard apple logo in silver, with a cartoonish green worm poking through it on each side" type="image/png" length="9851" />
  1407.  </item>
  1408.  <item>
  1409.    <title>LGBT Q&amp;A: Your Online Speech and Privacy Questions, Answered</title>
  1410.    <link>https://www.eff.org/deeplinks/2025/06/lgbt-qa-your-online-speech-and-privacy-questions-answered</link>
  1411.    <description>&lt;div class=&quot;field field--name-body field--type-text-with-summary field--label-hidden&quot;&gt;&lt;div class=&quot;field__items&quot;&gt;&lt;div class=&quot;field__item even&quot;&gt;&lt;p&gt;&lt;span&gt;This year, like almost all years before, LGBTQ+ Pride month is taking place at a time of burgeoning &lt;/span&gt;&lt;a href=&quot;https://www.adl.org/resources/press-release/adl-and-glaad-report-more-350-anti-lgbtq-hate-and-extremism-incidents&quot;&gt;&lt;span&gt;anti-LGBTQ+&lt;/span&gt;&lt;/a&gt;&lt;span&gt; violence, harassment, and criticism. Lawmakers and regulators are passing &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/deeplinks/2024/02/ghanas-president-must-refuse-sign-anti-lgbtq-bill&quot;&gt;&lt;span&gt;legislation&lt;/span&gt;&lt;/a&gt;&lt;span&gt; restricting freedom of expression and privacy for LGBTQ+ individuals and fueling offline intolerance. Online platforms are also complicit in this pervasive ecosystem by &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/deeplinks/2025/01/metas-new-content-policy-will-harm-vulnerable-users-if-it-really-valued-free&quot;&gt;&lt;span&gt;censoring pro-LGBTQ+ speech&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, forcing LGBTQ+ individuals to &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/deeplinks/2025/01/vpns-are-not-solution-age-verification-laws&quot;&gt;&lt;span&gt;self-censor or turn to VPNs&lt;/span&gt;&lt;/a&gt;&lt;span&gt; to avoid being profiled, harassed, doxxed, or criminally prosecuted. Unfortunately, &lt;/span&gt;&lt;a href=&quot;https://newrepublic.com/article/182865/pride-attacks-proud-boys-lgbtq-violence&quot;&gt;&lt;span&gt;these risks&lt;/span&gt;&lt;/a&gt;&lt;span&gt; look likely to continue, threatening LGBTQ+ individuals and the fight for queer liberation. &lt;/span&gt;&lt;/p&gt;
  1412. &lt;p class=&quot;pull-quote&quot;&gt;&lt;span&gt;This Pride, we’re here to help build an online space where &lt;i&gt;you&lt;/i&gt; get to decide what aspects of yourself you share with others, how you present to the world, and what things you keep private.&lt;/span&gt;&lt;/p&gt;
  1413. &lt;p&gt;&lt;span&gt;We know that it feels overwhelming thinking about how to protect yourself online in the face of these issues—whether that&#039;s best practices for using gay dating apps like Grindr and Her, how to download a VPN to see and interact with banned LGBTQ+ content, methods for posting pictures from events and protests without outing your friends, or how to argue over your favorite queer musicians’ most recent problematic takes without being doxxed. &lt;/span&gt;&lt;/p&gt;
  1414. &lt;p&gt;&lt;span&gt;That&#039;s why this LGBTQ+ Pride month, we’re launching an LGBT Q&amp;amp;A. Throughout Pride, we’ll be answering your most pressing digital rights questions on EFF’s &lt;/span&gt;&lt;span&gt;Instagram&lt;/span&gt;&lt;span&gt; and &lt;/span&gt;&lt;span&gt;TikTok&lt;/span&gt;&lt;span&gt; accounts. Comment your questions under &lt;/span&gt;these posts &lt;span&gt;on &lt;a href=&quot;https://www.instagram.com/reel/DLDMyAYyvxt/&quot;&gt;Instagram&lt;/a&gt; and &lt;a href=&quot;https://www.tiktok.com/@efforg/video/7517337079924215095&quot;&gt;TikTok&lt;/a&gt;, and we’ll reply directly. Want to stay anonymous? Submit your questions via a secure link on our &lt;/span&gt;&lt;a href=&quot;https://supporters.eff.org/2025-eff-lgbtqa&quot;&gt;&lt;span&gt;website&lt;/span&gt;&lt;/a&gt;&lt;span&gt; and we’ll answer these in separate posts. &lt;/span&gt;&lt;/p&gt;
  1415. &lt;p&gt;&lt;span&gt;Everyone needs guidance and protection from prying eyes. This is especially true for those of us who face consequences when intimate details around gender or sexual identities are revealed without consent. This Pride, we’re here to help build an online space where &lt;/span&gt;&lt;i&gt;&lt;span&gt;you&lt;/span&gt;&lt;/i&gt;&lt;span&gt; get to decide what aspects of yourself you share with others, how you present to the world, and what things you keep private.&lt;/span&gt;&lt;/p&gt;
  1416. &lt;p&gt;&lt;span&gt;No question is too big or too small! But comments that discriminate against marginalized groups, including the LGBTQ+ community, will not be engaged with. &lt;/span&gt;&lt;/p&gt;
  1417. &lt;p&gt;The fight for the safety and rights of LGBTQ+ people is not just a fight for visibility online (and offline)—it’s a fight for survival. Now more than ever, it&#039;s essential to collectivize information sharing to not only make the digital world safer for LGBTQ+ individuals, but to make it a space where people can have fun, share memes, date, and build communities without facing repression and harm. Join us to make the internet private, safe, and full of gay pride.&lt;/p&gt;
  1418.  
  1419. &lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
  1420.     <pubDate>Wed, 18 Jun 2025 17:21:18 +0000</pubDate>
  1421. <guid isPermaLink="false">110819 at https://www.eff.org</guid>
  1422. <category domain="https://www.eff.org/issues/free-speech">Free Speech</category>
  1423. <category domain="https://www.eff.org/issues/privacy">Privacy</category>
  1424. <dc:creator>Paige Collings</dc:creator>
  1425. <enclosure url="https://www.eff.org/files/banner_library/09_pride.png" alt="An orange tabby cat with yellow lightning markings in a blue spacesuit, wearing a jetpack, flying through pink and purple space. There are planets in the sky with colors representing a variety of pride flags." type="image/png" length="1051271" />
  1426.  </item>
  1427.  <item>
  1428.    <title>Big Brother&#039;s Little Problem | EFFector 37.6</title>
  1429.    <link>https://www.eff.org/deeplinks/2025/06/big-brothers-little-problem-effector-376</link>
  1430.    <description>&lt;div class=&quot;field field--name-body field--type-text-with-summary field--label-hidden&quot;&gt;&lt;div class=&quot;field__items&quot;&gt;&lt;div class=&quot;field__item even&quot;&gt;&lt;p&gt;Just in time for summer, &lt;a href=&quot;https://www.eff.org/effector/37/6&quot;&gt;EFFector is back&lt;/a&gt;—with a brand new look! If you&#039;re not signed up, now&#039;s a perfect time to subscribe and get the latest details on EFF&#039;s work defending your rights to privacy and free expression online.&lt;/p&gt;
  1431. &lt;p&gt;&lt;a href=&quot;https://www.eff.org/effector/37/6&quot;&gt;EFFector 37.6 highlights an important role&lt;/a&gt; that EFF has to protecting you online: &lt;em&gt;watching the watchers&lt;/em&gt;. In this issue, we&#039;re pushing back on invasive car-tracking technologies, and we share an update on our case challenging the illegal disclosure of government records to DOGE. You&#039;ll also find updates on issues like masking at protests, defending encryption in Europe, and the latest developments in the right to repair movement.&lt;/p&gt;
  1432. &lt;p&gt;Speaking of right to repair: &lt;strong&gt;we&#039;re debuting a new audio companion to EFFector&lt;/strong&gt; as well! This time, Hayley Tsukayama breaks down how Washington&#039;s new right to repair law fits into broader legislative trends. You can listen now on &lt;a href=&quot;https://www.youtube.com/watch?v=LEeH2Z-kqgY&quot;&gt;YouTube&lt;/a&gt; or the &lt;a href=&quot;https://archive.org/details/37.6_20250618&quot;&gt;Internet Archive&lt;/a&gt;.&lt;/p&gt;
  1433. &lt;p class=&quot;take-action&quot;&gt;&lt;a href=&quot;https://youtu.be/SCdMGDiyIIs&quot;&gt;SUBSCRIBE TO EFFECTOR&lt;/a&gt;&lt;/p&gt;
  1434. &lt;p class=&quot;take-action take-explainer&quot;&gt;&lt;span&gt;EFFECTOR 37.6 - BIG BROTHER&#039;S LITTLE PROBLEM&lt;/span&gt;&lt;/p&gt;
  1435. &lt;p&gt;&lt;span&gt;Since 1990 EFF has published EFFector to help keep readers on the bleeding edge of their digital rights. We know that the intersection of technology, civil liberties, human rights, and the law can be complicated, so EFFector is a great way to stay on top of things. The newsletter is chock full of links to updates, announcements, blog posts, and other stories to help keep readers—and listeners—up to date on the movement to protect online privacy and free expression. &lt;/span&gt;&lt;/p&gt;
  1436. &lt;p&gt;&lt;span&gt;Thank you to the supporters around the world who make our work possible! If you&#039;re not a member yet, &lt;a href=&quot;https://eff.org/effect&quot;&gt;join EFF today&lt;/a&gt; to help us fight for a brighter digital future.&lt;/span&gt;&lt;/p&gt;
  1437.  
  1438. &lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
  1439.     <pubDate>Wed, 18 Jun 2025 17:10:56 +0000</pubDate>
  1440. <guid isPermaLink="false">110820 at https://www.eff.org</guid>
  1441. <dc:creator>Christian Romero</dc:creator>
  1442. <enclosure url="https://www.eff.org/files/banner_library/effector_banner_5.jpeg" alt="" type="image/jpeg" length="130379" />
  1443.  </item>
  1444.  <item>
  1445.    <title>Podcast Episode: Securing Journalism on the ‘Data-Greedy’ Internet</title>
  1446.    <link>https://www.eff.org/deeplinks/2025/06/podcast-episode-securing-journalism-data-greedy-internet</link>
  1447.    <description>&lt;div class=&quot;field field--name-body field--type-text-with-summary field--label-hidden&quot;&gt;&lt;div class=&quot;field__items&quot;&gt;&lt;div class=&quot;field__item even&quot;&gt;&lt;p&gt;&lt;span data-contrast=&quot;auto&quot;&gt;Public-interest journalism speaks truth to power, so protecting press freedom is part of protecting democracy. But what does it take to digitally secure journalists’ work in an environment where critics, hackers, oppressive regimes, and others seem to have the free press in their crosshairs?&lt;/span&gt;&lt;/p&gt;
  1448. &lt;p&gt;&lt;div class=&quot;mytube&quot; style=&quot;width: 100%px;&quot;&gt;
  1449.  &lt;div class=&quot;mytubetrigger&quot; tabindex=&quot;0&quot;&gt;
  1450.  
  1451.    &lt;img src=&quot;https://www.eff.org/sites/all/modules/custom/mytube/play.png&quot; class=&quot;mytubeplay&quot; alt=&quot;play&quot; style=&quot;top: -4px; left: 20px;&quot; /&gt;
  1452.    &lt;div hidden class=&quot;mytubeembedcode&quot;&gt;%3Ciframe%20height%3D%2252px%22%20width%3D%22100%25%22%20frameborder%3D%22no%22%20scrolling%3D%22no%22%20seamless%3D%22%22%20src%3D%22https%3A%2F%2Fplayer.simplecast.com%2F3a9d54ab-0f04-453e-8101-fe44607d3800%3Fdark%3Dtrue%26amp%3Bcolor%3D000000%22%20allow%3D%22autoplay%22%3E%3C%2Fiframe%3E&lt;/div&gt;
  1453.  &lt;/div&gt;
  1454.  &lt;div class=&quot;mytubetext&quot;&gt;
  1455.    &lt;span&gt;&lt;a href=&quot;https://www.eff.org/deeplinks/2008/02/embedded-video-and-your-privacy&quot; rel=&quot;noreferrer&quot; target=&quot;_blank&quot;&gt;Privacy info.&lt;/a&gt;&lt;/span&gt;
  1456.    &lt;span&gt;This embed will serve content from &lt;em&gt;&lt;a rel=&quot;nofollow&quot; href=&quot;https://player.simplecast.com/3a9d54ab-0f04-453e-8101-fe44607d3800?dark=true&amp;amp;color=000000&quot;&gt;simplecast.com&lt;/a&gt;&lt;/em&gt;&lt;br /&gt;&lt;/span&gt;
  1457.  &lt;/div&gt;
  1458. &lt;/div&gt;
  1459. &lt;/p&gt;
  1460. &lt;p&gt;&lt;span data-contrast=&quot;auto&quot;&gt;&lt;/span&gt;&lt;span data-ccp-props=&quot;{}&quot;&gt; &lt;i&gt;&lt;a href=&quot;https://open.spotify.com/show/4UAplFpPDqE4hWlwsjplgt&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;&lt;img src=&quot;https://www.eff.org/files/2021/11/01/spotify-podcast-badge-blk-wht-330x80.png&quot; alt=&quot;Listen on Spotify Podcasts Badge&quot; width=&quot;198&quot; height=&quot;48&quot; /&gt;&lt;/a&gt; &lt;a href=&quot;https://podcasts.apple.com/us/podcast/effs-how-to-fix-the-internet/id1539719568&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;&lt;img src=&quot;https://www.eff.org/files/2021/11/01/applebadge2.png&quot; alt=&quot;Listen on Apple Podcasts Badge&quot; width=&quot;195&quot; height=&quot;47&quot; /&gt;&lt;/a&gt; &lt;a href=&quot;https://music.amazon.ca/podcasts/bf81f00f-11e1-431f-918d-374ab6ad07cc/how-to-fix-the-internet?ref=dmm_art_us_HTFTI&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;&lt;img height=&quot;47&quot; width=&quot;195&quot; src=&quot;https://www.eff.org/files/styles/kittens_types_wysiwyg_small/public/2024/02/15/us_listenon_amazonmusic_button_charcoal.png?itok=YFXPE4Ii&quot; /&gt;&lt;/a&gt; &lt;a href=&quot;https://feeds.eff.org/howtofixtheinternet&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;&lt;img src=&quot;https://www.eff.org/files/2021/11/01/subscriberss.png&quot; alt=&quot;Subscribe via RSS badge&quot; width=&quot;194&quot; height=&quot;50&quot; /&gt;&lt;/a&gt;&lt;/i&gt;&lt;/span&gt;&lt;/p&gt;
  1461. &lt;p&gt;(You can also find this episode on the &lt;a href=&quot;https://archive.org/details/htfti-s6e4-harlo-holmes-vfinal&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;Internet Archive&lt;/a&gt; and on &lt;a href=&quot;https://youtu.be/9kk6PxPeYAo?si=nUc7AeG8GMpHqoA4&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;YouTube&lt;/a&gt;.)&lt;/p&gt;
  1462. &lt;p&gt;&lt;span data-contrast=&quot;auto&quot;&gt;That’s what Harlo Holmes focuses on as Freedom of the Press Foundation’s digital security director. Her team provides training, consulting, security audits, and other support to newsrooms, independent journalists, freelancers, documentary filmmakers – anyone who is making independent journalism in the public interest – so that they can do their jobs more safely and securely. Holmes joins EFF’s Cindy Cohn and Jason Kelley to discuss the tools and techniques that help journalists protect themselves and their sources while keeping the world informed. &lt;/span&gt;&lt;span data-ccp-props=&quot;{}&quot;&gt; &lt;/span&gt;&lt;/p&gt;
  1463. &lt;p&gt;&lt;span data-contrast=&quot;auto&quot;&gt;In this episode you’ll learn about:&lt;/span&gt;&lt;/p&gt;
  1464. &lt;ul&gt;
  1465. &lt;li&gt;&lt;span data-ccp-props=&quot;{}&quot;&gt;The importance of protecting online anonymity on an ever-increasingly “data-greedy” internet&lt;/span&gt;&lt;/li&gt;
  1466. &lt;li&gt;&lt;span data-ccp-props=&quot;{}&quot;&gt;How digital security nihilism in the United States compares with regions of the world where oppressive and repressive governance are more common&lt;/span&gt;&lt;/li&gt;
  1467. &lt;li&gt;&lt;span data-ccp-props=&quot;{}&quot;&gt;Why compartmentalization can be a simple, easy approach to digital security&lt;/span&gt;&lt;/li&gt;
  1468. &lt;li&gt;&lt;span data-ccp-props=&quot;{}&quot;&gt;The need for middleware to provide encryption and other protections that shield sources’ anonymity and journalists’ work product when using corporate data platforms&lt;/span&gt;&lt;/li&gt;
  1469. &lt;li&gt;&lt;span data-ccp-props=&quot;{}&quot;&gt;How podcasters, YouTubers, and TikTokers fit into the broad sweep of media history, and need digital protections as well&lt;/span&gt;&lt;span data-ccp-props=&quot;{}&quot;&gt; &lt;/span&gt;&lt;/li&gt;
  1470. &lt;/ul&gt;
  1471. &lt;p&gt;&lt;span data-contrast=&quot;auto&quot;&gt;Harlo Holmes is the chief information security officer and director of digital security at &lt;/span&gt;&lt;a href=&quot;https://freedom.press/&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;&lt;span data-contrast=&quot;none&quot;&gt;Freedom of the Press Foundation&lt;/span&gt;&lt;/a&gt;&lt;span data-contrast=&quot;auto&quot;&gt;. She strives to help individual journalists in various media organizations become confident and effective in securing their communications within their newsrooms, with their sources, and with the public at large. She is a media scholar, software programmer, and activist. Holmes was a regular contributor to the open-source mobile security collective &lt;/span&gt;&lt;a href=&quot;https://guardianproject.info/&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;&lt;span data-contrast=&quot;none&quot;&gt;Guardian Project&lt;/span&gt;&lt;/a&gt;&lt;span data-contrast=&quot;auto&quot;&gt;, where she spearheaded the media metadata verification initiative currently empowering &lt;/span&gt;&lt;a href=&quot;https://proofmode.org/&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;&lt;span data-contrast=&quot;none&quot;&gt;ProofMode&lt;/span&gt;&lt;/a&gt;&lt;span data-contrast=&quot;auto&quot;&gt;, &lt;/span&gt;&lt;a href=&quot;https://www.open-archive.org/save&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;&lt;span data-contrast=&quot;none&quot;&gt;Save by OpenArchive&lt;/span&gt;&lt;/a&gt;&lt;span data-contrast=&quot;auto&quot;&gt;, &lt;/span&gt;&lt;a href=&quot;https://www.eyewitness.global/&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;&lt;span data-contrast=&quot;none&quot;&gt;eyeWitness to Atrocities&lt;/span&gt;&lt;/a&gt;&lt;span data-contrast=&quot;auto&quot;&gt;, and others.&lt;/span&gt;&lt;span data-ccp-props=&quot;{}&quot;&gt; &lt;/span&gt;&lt;/p&gt;
  1472. &lt;p&gt;&lt;span data-contrast=&quot;auto&quot;&gt;Resources:&lt;/span&gt;&lt;span data-ccp-props=&quot;{}&quot;&gt; &lt;/span&gt;&lt;/p&gt;
  1473. &lt;ul&gt;
  1474. &lt;li&gt;&lt;a href=&quot;https://securedrop.org/ &quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;SecureDrop&lt;/a&gt;&lt;/li&gt;
  1475. &lt;li&gt;&lt;a href=&quot;https://www.torproject.org/ &quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;The Tor Project&lt;/a&gt;&lt;/li&gt;
  1476. &lt;li&gt;&lt;span data-contrast=&quot;auto&quot;&gt;EFF: “&lt;/span&gt;&lt;a href=&quot;https://www.eff.org/deeplinks/2024/02/privacy-isnt-dead-far-it&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;&lt;span data-contrast=&quot;none&quot;&gt;Privacy Isn&#039;t Dead. Far From It.&lt;/span&gt;&lt;/a&gt;&lt;span data-contrast=&quot;auto&quot;&gt;&quot;&lt;/span&gt;&lt;span data-ccp-props=&quot;{}&quot;&gt; (Feb. 13, 2024)&lt;/span&gt;&lt;/li&gt;
  1477. &lt;li&gt;&lt;span data-contrast=&quot;auto&quot;&gt;Digital Dada Podcast: “&lt;/span&gt;&lt;a href=&quot;https://youtu.be/w0K6rqQdr44?si=JJyM1yxTHI7vVlTg&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;&lt;span data-contrast=&quot;none&quot;&gt;Combatting Digital Security Nihilism featuring Harlo Holmes&lt;/span&gt;&lt;/a&gt;&lt;span data-contrast=&quot;auto&quot;&gt;” (Dec. 20, 2023)&lt;/span&gt;&lt;span data-ccp-props=&quot;{}&quot;&gt; &lt;/span&gt;&lt;/li&gt;
  1478. &lt;li&gt;&lt;span data-contrast=&quot;auto&quot;&gt;Reuters: “&lt;/span&gt;&lt;a href=&quot;https://www.reuters.com/investigates/special-report/usa-spying-raven/&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;&lt;span data-contrast=&quot;none&quot;&gt;Inside the UAE’s secret hacking team of American mercenaries&lt;/span&gt;&lt;/a&gt;&lt;span data-contrast=&quot;auto&quot;&gt;” (Jan. 30, 2019)&lt;/span&gt;&lt;span data-ccp-props=&quot;{}&quot;&gt; &lt;/span&gt;&lt;/li&gt;
  1479. &lt;/ul&gt;
  1480. &lt;p&gt;&lt;span data-contrast=&quot;auto&quot;&gt;What do you think of “How to Fix the Internet?” &lt;/span&gt;&lt;a href=&quot;https://forms.office.com/pages/responsepage.aspx?id=qalRy_Njp0iTdV3Gz61yuZZXWhXf9ZdMjzPzrVjvr6VUNUlHSUtLM1lLMUNLWE42QzBWWDhXU1ZEQy4u&amp;amp;web=1&amp;amp;wdLOR=c90ABD667-F98F-9748-BAA4-CA50122F0423&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;&lt;span data-contrast=&quot;none&quot;&gt;Share your feedback here&lt;/span&gt;&lt;/a&gt;&lt;span data-contrast=&quot;auto&quot;&gt;.&lt;/span&gt;&lt;/p&gt;
  1481. &lt;h3&gt;&lt;span data-ccp-props=&quot;259}&quot;&gt;Transcript&lt;/span&gt;&lt;/h3&gt;
  1482. &lt;p&gt;&lt;span data-ccp-props=&quot;{}&quot;&gt;&lt;strong&gt;HARLO HOLMES:&lt;/strong&gt; within the sphere of public interest journalism. The reason why it exists is because it holds truth to power and it doesn&#039;t have to be adversarial, although, that&#039;s our right as citizens on this planet, but it doesn&#039;t have to be adversarial. And over the tenure that I&#039;ve had, I&#039;ve seen so many amazing examples where affecting change through public interest journalism done right, with the most detail paid to the operational and digital security of an investigation, literally ended up with laws being changed and legislation being written in order to make sure the problem that the journalist pointed out does not happen again.&lt;br /&gt;One of my favorites is with Reuters. They wrote a story about how members of the intelligence community in Washington DC, after they had left Washington DC, were being actively poached by intelligence services in the UAE.&lt;br /&gt;So it would take, like, leaving members of the people working in Washington DC, place them in cushy intelligence jobs at the UAE in order to, like, work on programs that we know are like, surveillance heavy, antithetical to all of our interests, public interest as well as the interest of the United States government.&lt;br /&gt;And when that reporting came out, literally like, uh, Congress approved a bill saying that you have to wait three years before you can go through that revolving door rotation. &lt;br /&gt;And that&#039;s the trajectory that makes me the most proud to work where I do.&lt;/span&gt;&lt;/p&gt;
  1483. &lt;p&gt;&lt;span data-ccp-props=&quot;{}&quot;&gt;&lt;strong&gt;CINDY COHN:&lt;/strong&gt; That&#039;s Harlo Holmes talking about some of the critically important journalism that she is able to help facilitate in her role with the Freedom of the Press Foundation.&lt;br /&gt;I&#039;m Cindy Cohn, the executive director of the Electronic Frontier Foundation.&lt;/span&gt;&lt;/p&gt;
  1484. &lt;p&gt;&lt;span data-ccp-props=&quot;{}&quot;&gt;&lt;strong&gt;JASON KELLEY:&lt;/strong&gt; And I&#039;m Jason Kelley, EFF&#039;s activism director. This is our podcast, How to Fix the Internet.&lt;/span&gt;&lt;/p&gt;
  1485. &lt;p&gt;&lt;span data-ccp-props=&quot;{}&quot;&gt;&lt;strong&gt;CINDY COHN:&lt;/strong&gt; On this show, we flip the script from the dystopian doom and gloom thinking we all get mired in when thinking about the future of tech -- we&#039;re here challenge ourselves, our guests and our listeners to imagine the better future that we could be working towards. What can we look forward to if we dare to dream about getting things right?&lt;/span&gt;&lt;/p&gt;
  1486. &lt;p&gt;&lt;span data-ccp-props=&quot;{}&quot;&gt;&lt;strong&gt;JASON KELLEY:&lt;/strong&gt; Our guest today, Harlo Holmes, is the chief information security officer and the director of digital security at the Freedom of the Press Foundation where she teaches journalists how to keep themselves – and their sources – safe online.&lt;/span&gt;&lt;/p&gt;
  1487. &lt;p&gt;&lt;span data-ccp-props=&quot;{}&quot;&gt;&lt;strong&gt;CINDY COHN:&lt;/strong&gt; We started off by getting Harlo to explain exactly how the Freedom of the Press Foundation operates.&lt;/span&gt;&lt;/p&gt;
  1488. &lt;p&gt;&lt;span data-ccp-props=&quot;{}&quot;&gt;&lt;strong&gt;HARLO HOLMES:&lt;/strong&gt; What we do, I like to say, is a three-pillared approach to protecting press freedom in the 21st century. The first, absolutely most important is our advocacy team. So not only do we have a staff of lawyers and legal scholars that weigh in on First Amendment issues and protect them within the United States, we also have a fantastic advocacy team at our own little newsroom, the US Press Freedom Tracker, where we have reporters who, anytime members of the press have their right to perform their rightful function challenged, minimized, persecuted, et cetera, we have reporters who are there who report on it, and we stay with those cases for as long as it takes. &lt;br /&gt;And that&#039;s something that we&#039;re incredibly proud of. That&#039;s just one pillar. The other pillars that we have, is our engineering wing. So perhaps you have heard of a tool called SecureDrop. In certain newsrooms all over the planet, it&#039;s actually installed in order to technologically enable, as much anonymity as, uh, technically possible. Between reporters at those newsrooms and members of the press at large who might want to be whistleblowers or just to, you know, like, uh, say hey to, a news outlet that they admire in a way that ensures their anonymity.&lt;br /&gt;And then there is my small team. We are the digital security team. Uh, we do a lot of training, consulting, security audits, and other supports that we can provide to newsrooms, independent journalists, freelancers, documentary filmmakers, anyone who is making independent journalism in the public interest in order to do their job more safely and securely.&lt;/span&gt;&lt;/p&gt;
  1489. &lt;p&gt;&lt;span data-ccp-props=&quot;{}&quot;&gt;&lt;strong&gt;CINDY COHN:&lt;/strong&gt; Yeah. I think this is a really important thing that the Freedom of the Press Foundation does. Specifically your piece of it, this kind of connective tissue between the people who are really busy doing the reporting and finding things out and the people who wanna give them information and making sure that this whole thing is protected in a secure way. And I appreciate that you put it third, but to me it&#039;s really central to how this whole thing works. So I think that&#039;s really important.&lt;br /&gt;And of course, SecureDrop for, you know, old time EFF and digital rights people – we know that this piece of technology was developed by our friend Aaron Schwartz, before he passed away. And the Freedom Press Foundation has picked it up and really turned it from a good but small idea into something that is vital and in newsrooms all around the world.&lt;/span&gt;&lt;/p&gt;
  1490. &lt;p&gt;&lt;span data-ccp-props=&quot;{}&quot;&gt;&lt;strong&gt;HARLO HOLMES:&lt;/strong&gt; Yes. And thank you very, very much, for recognizing those particular achievements. SecureDrop has grown over the past, what, 12 years? I would say, into not only a tool that enables, the groundbreaking amount of journalism that has pretty much changed the trajectory of current events over the years that it&#039;s been developed, but also, represents increasing advances in technology around security that everyone on the planet benefits from. So for example, SecureDrop would not be anywhere were it not for its deep collaboration with the Tor Project, right? &lt;br /&gt;And for all of us who pay attention to, digital security cryptography and, the intersection with human rights, you know, that the Tor Network is a groundbreaking piece of technology that not only provides, you know, anonymity on the internet in an increasingly, like, data-greedy environment, but also, like, represents, the ways that people can access parts of the internet in so many different innovative ways. And investigative journalism use in Secure drop is just one example of the benefits of like having Tor around and having it supported.&lt;br /&gt;And so, that&#039;s one example. Another example is that, as people&#039;s interactions with computers change, uh, the way that we interface with browsers change the. Interplay between, you know, like using a regular computer and accessing stuff on mobile, that&#039;s changed, right?&lt;br /&gt;And so our team has, like, such commendable intellectual curiosity in talking about these nuances and finding ways to make people&#039;s safety using all of these interfaces better. And so even though, we build Secure Drop in service of promoting public interest journalism, the way that it reverberates in technology is something that we&#039;re incredibly proud of. And it&#039;s all done in open source, right? Which means that anyone can access it. Anyone can iterate upon it, anyone can benefit from it.&lt;/span&gt;&lt;/p&gt;
  1491. &lt;p&gt;&lt;span data-ccp-props=&quot;{}&quot;&gt;&lt;strong&gt;CINDY COHN:&lt;/strong&gt; Yeah, and it, and everyone can trust it. &#039;cause you know, you might not be able to read the code, but many people can. And so developing this trust and security, you know, they go hand in hand.&lt;/span&gt;&lt;/p&gt;
  1492. &lt;p&gt;&lt;span data-ccp-props=&quot;{}&quot;&gt;&lt;strong&gt;HARLO HOLMES:&lt;/strong&gt; Yes,&lt;/span&gt;&lt;/p&gt;
  1493. &lt;p&gt;&lt;span data-ccp-props=&quot;{}&quot;&gt;&lt;strong&gt;JASON KELLEY:&lt;/strong&gt; You use this term &quot;data-greedy,&quot; which I really love. I&#039;ve never heard that before.&lt;/span&gt;&lt;/p&gt;
  1494. &lt;p&gt;&lt;span data-ccp-props=&quot;{}&quot;&gt;&lt;strong&gt;CINDY COHN:&lt;/strong&gt; It&#039;s so good!&lt;/span&gt;&lt;/p&gt;
  1495. &lt;p&gt;&lt;span data-ccp-props=&quot;{}&quot;&gt;&lt;strong&gt;JASON KELLEY:&lt;/strong&gt; So you just created this incredible term &quot;data-greedy&quot; that I&#039;ve never heard anyone use and I love and it&#039;s a good descriptor, I think of sort of like why journalists, but also everyone needs to be aware of like the tracks that they&#039;re leaving, the digital security practices that they use because it&#039;s not even necessarily the case that that data collection is intended to be harmful, but we just live in this environment where data is collected, where it&#039;s, you know, used sometimes intentionally to track people, but often just for other reasons. &lt;br /&gt;Let&#039;s talk a little bit about that third pillar. What is it that journalists specifically need to think about in terms of security? I think a lot of people probably who have never done journalism, don&#039;t really think about the dangers of collecting information, of talking to sources of, you know, protecting that, how, how should they be thinking about it and what are the kinds of things that you talk to people about?&lt;/span&gt;&lt;/p&gt;
  1496. &lt;p&gt;&lt;span data-ccp-props=&quot;{}&quot;&gt;&lt;strong&gt;HARLO HOLMES:&lt;/strong&gt; Great question. First and foremost, I feel that our team at Freedom of the Press Foundation, leads every training with the assumption that a journalist&#039;s job is to tell the story in the most compelling and effective way. Their job is not to concern themselves with what data stewardship means.&lt;br /&gt;What protection of digital assets means. That&#039;s our job. And so, we really, really lean into meeting people where they are and just giving them exactly what it is that they need to know in order to do this job better without putting undue pressure on them. And also without scaring the bejesus out of anyone. &lt;br /&gt;Because when you do take stock of like how data greedy all of our devices are, it can be a little bit scary to the point of making people feel disempowered. And so we always want to avoid that.&lt;/span&gt;&lt;/p&gt;
  1497. &lt;p&gt;&lt;span data-ccp-props=&quot;{}&quot;&gt;&lt;strong&gt;CINDY COHN:&lt;/strong&gt; What are some techniques you use to try to avoid that? &#039;Cause I think that&#039;s really central to a lot of work that we&#039;re trying to do to try to get people, beyond what I think my colleague, Eva Galperin called “privacy nihilism. I&#039;m not sure if she started it. She&#039;s the one who I heard it from.&lt;/span&gt;&lt;/p&gt;
  1498. &lt;p&gt;&lt;span data-ccp-props=&quot;{}&quot;&gt;&lt;strong&gt;HARLO HOLMES:&lt;/strong&gt; I probably have heard that from her as well. I love, Eva and, uh, she has been so instrumental in the way that I think through these issues over the past like decade so yeah, digital security nihilism is 100% a thing.&lt;br /&gt;And, perhaps maybe later we can get into like the regional contours of that because people in the United States have or exhibit a certain amount of nihilism. And then if you talk to people in like Central and Eastern Europe, it&#039;s a different way. If you talk to people in Latin America and South America, it&#039;s a different way.&lt;br /&gt;So having that perspective actually like really helps the contours around how you approach people in digital security education and training..&lt;/span&gt;&lt;/p&gt;
  1499. &lt;p&gt;&lt;span data-ccp-props=&quot;{}&quot;&gt;&lt;strong&gt;CINDY COHN:&lt;/strong&gt; Oh please, tell us more. I&#039;m fascinated by this.&lt;/span&gt;&lt;/p&gt;
  1500. &lt;p&gt;&lt;span data-ccp-props=&quot;{}&quot;&gt;&lt;strong&gt;HARLO HOLMES:&lt;/strong&gt; OK, so, I do want to come back to your original question, but, that said, I can definitely do a detour into the historicity of, um, digital security nihilism and how it interplays with where you are on the planet. &lt;br /&gt;It&#039;s all political and in the United States we have, well, even though we&#039;re currently like in a bit of a, or in a bit of a, in a crisis mode, where we are absolutely looking at, you know, like our rights to privacy, the concessions that we make, our prominence in building these technologies and thus having a little bit of, like, insider knowledge of what the contours are.&lt;br /&gt;Uh, if you compare that to the digital security protections of people who are in, let&#039;s say, you know, like Central or Eastern Europe, where, historically, they have never had or not for, you know, like decades, um, if not even like, you know, a hundred years. Um, that access to transparency about what&#039;s being done to their data and also transparency into how that data has been taken away from them because they didn&#039;t have a seat at the table.&lt;br /&gt;if you look at places in, Latin America, Central America, South America, there are plenty of places where loss of digital security also comes hand in hand with loss of physical security, right? Like speaking to someone over the phone can often, especially where journalists are considered, will often come with a threat of physical violence, often to the most extreme. Right. So, yeah, exactly. Which is, you know, according to, um, so many, you know, like academics and scholars who focus on press freedom, know that, that that is one of the most dangerous places on the planet to be a journalist because failures in digital security can often come with literally, you know, like being summarily executed, right? So, every region on this planet has their own contours. It is constantly a fascinating challenge and one that I&#039;m willing to meet in order to understand these contexts and to appropriately apply the right digital security solutions to the audiences that we find ourselves in front of.&lt;/span&gt;&lt;/p&gt;
  1501. &lt;p&gt;&lt;span data-ccp-props=&quot;{}&quot;&gt;&lt;strong&gt;CINDY COHN:&lt;/strong&gt; Yeah. Okay. Back to my original question, sorry.&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;
  1502. &lt;p&gt;&lt;span data-ccp-props=&quot;{}&quot;&gt;&lt;strong&gt;HARLO HOLMES:&lt;/strong&gt; Go for it.&lt;/span&gt;&lt;/p&gt;
  1503. &lt;p&gt;&lt;span data-ccp-props=&quot;{}&quot;&gt;&lt;strong&gt;JASON KELLEY:&lt;/strong&gt; Well, what, what is, I mean, did we get to the point? I don&#039;t think we really covered yet, really the basics of, like, what journalists need to think about in terms of their security. I mean, that&#039;s, you know, I, I, I love talking about privacy nihilism and how we can fight it, but, um, we would talk for three hours if we did that.&lt;/span&gt;&lt;/p&gt;
  1504. &lt;p&gt;&lt;span data-ccp-props=&quot;{}&quot;&gt;&lt;strong&gt;HARLO HOLMES:&lt;/strong&gt; Yeah. Um, so quite frankly, one of the things that we&#039;re leaning most heavily on, and this is pretty much across the board, right, has to do with compartmentalization. I feel that, uh, recently within the United States, it&#039;s become really like technicolor to people. So they understand exactly why that&#039;s important, but it&#039;s always been important and it&#039;s always like something that you can apply everywhere.&lt;br /&gt;There&#039;s always historically been attention as, uh, since the very moment the first iPhone stepped onto the market, this temptation to go the easy route. Everything is on the same device. You&#039;re calling your mom. You&#039;re, you know, like researching a flight on Expedia. You&#039;re, you know, Googling something. And then you&#039;re also talking to a source about a sensitive story, or you&#039;re also like, you know, gonna like, go through the comments in the Google Doc on the report that you&#039;re writing regarding a national security issue. &lt;br /&gt;People definitely do need to be encouraged to like decouple the ways that they treat devices because these devices are not our friends. And the companies that like, create the experiences on these devices, they are definitely not our friends. They never have been. &lt;br /&gt;But I hear you on that and, uh, reminding people, despite their digital security nihilism, despite their temptation to do the easiest of things, just reminding people to apply appropriate compartmentalization. &lt;br /&gt;We take things very slowly. We take things as easily as we possibly can because there are ways that people can get started in order to, actually be effective at this until they get to the point where it actually means something either to their livelihoods or the story that they&#039;re working on and that of the sources that they, interact with. But yeah, that&#039;s pretty much where it starts. &lt;br /&gt;Also, credential security is like the bread and butter. And I&#039;ve been at this for, almost exactly 10 years at FPF and, you know, within this industry for about 15. &lt;br /&gt;And it never changes that people really, really do need to maintain as much rigor regarding how people access their accounts. So like, you gotta have a unique, complex password. You have to be using a password manager. You have to be using multifactor authentication. And the ways that you can get it have changed over the years and they get better and better and better.&lt;br /&gt;You have to be vigilant against phishing, but the ways that people try to phish you are like, you know, increasingly, like, sneakier. You know, we deal with it as it comes, but ultimately that has never changed. It really hasn&#039;t.&lt;/span&gt;&lt;/p&gt;
  1505. &lt;p&gt;&lt;span data-ccp-props=&quot;{}&quot;&gt;&lt;strong&gt;CINDY COHN:&lt;/strong&gt; So we&#039;ve, we&#039;ve talked a little bit about kind of the nihilism and the kind of, thicket of things that you have to kind of make your way through in order to, help, journalists and their sources feel more secure. So let&#039;s flip it a bit. What does it look like if it&#039;s better? What are the kinds of places where you see, you know, if we could get this right, it would start to get better?&lt;/span&gt;&lt;/p&gt;
  1506. &lt;p&gt;&lt;span data-ccp-props=&quot;{}&quot;&gt;&lt;strong&gt;HARLO HOLMES:&lt;/strong&gt; I love this question because I do feel that I&#039;ve been able to look at it from multiple sides. Similarly, as I was describing how Secure Drop not only enables impactful public interest journalism, it represents a herculean feat of cryptography and techno activism. This is one example, Signal is another example.&lt;br /&gt;So, one of the things I thought was so poignant when, as Joe Biden was exiting the White House, one of his, like, parting shots was to say like, everyone should use Signal. Like, and the reason why he says this is because, Signal not only represents like a cool app or like, you know, a thing that, like, hackers love and you know, like we can be proud of &#039;cause we got in on the first floor.&lt;br /&gt;It represents the evolution of technologies that we should have. Our phone conversations had not been encrypted. Now they are. Get with it. You know, like that&#039;s the point. So from a technical perspective, that&#039;s what is so important and that&#039;s something that we always want to position ourselves to champion.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;JASON KELLEY:&lt;/strong&gt; Let&#039;s take a quick moment to say thank you to our sponsor. How to Fix The Internet is supported by the &lt;a href=&quot;https://sloan.org/programs/public-understanding/&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;Alfred P. Sloan Foundation&#039;s program in Public Understanding of Science and Technology&lt;/a&gt;, enriching people&#039;s lives through a keener appreciation of our increasingly technological world and portraying the complex humanity of scientists, engineers, and mathematicians.&lt;br /&gt;We also wanna thank EFF members and donors. You can become a member for just $25 and for a little more, you can get some good, very stylish gear. Your support is the reason we can keep our digital security guides for journalists, and everyone else, up to date to deal with the latest threats. So please, if you like what we do, go to eff.org/pod to donate. &lt;br /&gt;We also wanted to share that our friend Cory Doctorow has a new podcast. Listen to this. &lt;br /&gt;[&lt;a href=&quot;https://podcasts.apple.com/ca/podcast/understood-who-broke-the-internet/id1673817105&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;Who Broke the Internet&lt;/a&gt; trailer]&lt;/span&gt;&lt;/p&gt;
  1507. &lt;p&gt;&lt;span data-ccp-props=&quot;{}&quot;&gt;&lt;strong&gt;JASON KELLEY:&lt;/strong&gt; And now back to our conversation with Harlo Holmes.&lt;br /&gt;Are there tools that are missing that, in a better world you&#039;re like, oh, this would be great to have, you know, or things that maybe couldn&#039;t exist without changes to technology or to the way that people, work or to policy that you just absolutely hear, you know, oh, it would be nice if we could do this, but for whatever reason, that&#039;s not a place we&#039;re at yet.&lt;/span&gt;&lt;/p&gt;
  1508. &lt;p&gt;&lt;span data-ccp-props=&quot;{}&quot;&gt;&lt;strong&gt;HARLO HOLMES:&lt;/strong&gt; Yeah. Actually I have started to have a couple of conversations about that. Um, before I answer, I will say that I don&#039;t have, like, the bandwidth or time to be a technologist. Um, it&#039;s like my code writing days are probably over, but I have so many opinions.&lt;/span&gt;&lt;/p&gt;
  1509. &lt;p&gt;&lt;span data-ccp-props=&quot;{}&quot;&gt;&lt;strong&gt;JASON KELLEY:&lt;/strong&gt; Of course. So many ideas.&lt;/span&gt;&lt;/p&gt;
  1510. &lt;p&gt;&lt;span data-ccp-props=&quot;{}&quot;&gt;&lt;strong&gt;HARLO HOLMES:&lt;/strong&gt; Yeah. Um - &lt;/span&gt;&lt;/p&gt;
  1511. &lt;p&gt;&lt;span data-ccp-props=&quot;{}&quot;&gt;&lt;strong&gt;CINDY COHN:&lt;/strong&gt; Well, we&#039;re your audience, right? I mean, you know, the EFF audience are people who, you know, uh, not overwhelmingly, um, but a lot of people with technical skills who are trying to figure out, okay, how do I, how do I apply them to do good? And, and, and I think, you know, over the years we&#039;ve seen a lot of really well-meaning efforts by technologists to try to do something to support other communities that weren&#039;t grounded enough in those communities, and so didn&#039;t really work. &lt;br /&gt;And I think your work at Freedom of the Press Foundation, again, has kind of bridged that gap, especially for journalists. But there&#039;s, there&#039;s broader things. so where else could you see places where technologists could really dig in and have this work in a way that sometimes it does, but often it doesn&#039;t.&lt;/span&gt;&lt;/p&gt;
  1512. &lt;p&gt;&lt;span data-ccp-props=&quot;{}&quot;&gt;&lt;strong&gt;HARLO HOLMES:&lt;/strong&gt; I love that question because that is exactly the point, right? Bridging the gap. And I feel that like at FPF, given, you know how I introduce it with like the three pillars or whatever, we are uniquely poised in order to perform, like, you know, user research within a community, right? And then have that directly inform technology mandates, have that directly inform advocacy, uh, like, you know, charge to action.&lt;br /&gt;So I think anyone who finds themselves at those cross sections, that&#039;s exactly what you have to kind of, like, strategize around in order to be as effective as possible. In terms of, like, actual technologies, one thing and I already kind of started having these conversations with people, is let&#039;s take our relationship within a typical newsroom to cloud services like Google when you are drafting, right? I mean it&#039;s anecdotal and like the plural anecdote is not data, right. But that said, we do know that given that, you know, Google&#039;s Drive has so much machine learning and AI enabled power, drafting a story that&#039;s like the next Watergate, right? Like that&#039;s actually going to get you put in jail before you get to publish, right?&lt;br /&gt;Because we know about their capabilities. And, not gonna, like, talk about specific anecdotes, but like that is a thing, right? But one of the things, or like the big contention is that actually, like, in terms of collaboration, how effective you can be writing a story, how like, you know, you rely on the comments section with your editor, right, as you&#039;re, you know, massaging a story. You rely on those features as much. &lt;br /&gt;What are 0pen source, like, you know, hacker ethos alternatives. We have, you know, we have &lt;a href=&quot;https://nextcloud.com/&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;Nextcloud&lt;/a&gt;, we have uh, &lt;a href=&quot;https://cryptpad.fr/&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;CryptPad&lt;/a&gt;, we have &lt;a href=&quot;https://etherpad.org/&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;Etherpad&lt;/a&gt;. But all of those things are insufficient not only, like, in terms of their feature set in what needs to be accommodated in order for a journalist to work, right, but also, can be insufficient in terms of their sustainability models, the fact that we can rely upon them in the future. And as much as we love all of those people at those developer initiatives, no one is supporting them to make sure that they can be in a place to be a viable alternative, right? &lt;br /&gt;So, what&#039;s the next frontier, right? If I don&#039;t want to live in a world where a Nextcloud doesn&#039;t exist, where a CryptPad doesn&#039;t exist, or an Etherpad, like that&#039;s not what I&#039;m saying, &#039;cause they&#039;re fantastic and they&#039;re really great to use in creative scenarios. &lt;br /&gt;However, if you&#039;re thinking about the meat and potatoes day to day in a typical newsroom, and you have to contend with a tech giant like Google that has become increasingly, like, ideologically unreliable. Guess what? They actually do have a really cool tool called client side encryption, right? So now you&#039;re actually, like, removing the people who decide at Google what is ideologically acceptable use of their tools, right? You&#039;re removing them from the position where they can make any decision or scrutinize further and client side encryption.&lt;br /&gt;Or like anything that provides end-to-end encryption, that is like the ultimate goal. That&#039;s what we should protect. Whether it is in Secure Drop, whether it is in Nextcloud or CryptPad, or if it&#039;s in Google itself. And so actually, I would recommend, like, anybody who has these spare cycles to contribute to a developer effort to tackle this type of middleware that allows us to still have as much autonomy as possible within the ecosystems that we have to kind of work within.&lt;/span&gt;&lt;/p&gt;
  1513. &lt;p&gt;&lt;span data-ccp-props=&quot;{}&quot;&gt;&lt;strong&gt;CINDY COHN:&lt;/strong&gt; I love that. I mean, it’s a story about interoperability, right? This, you know, what you&#039;re talking about, middleware in this area is like, we should be able to make a choice. Either use things that are not hosted corporately or use things that are hosted corporately, but be able to have our cake and eat it too.&lt;br /&gt;Have a tool that helps us interoperate with that system without the bad parts of the deal, right. And in this instance, the bad parts of the deal are a piece of it, it’s the business model, but a piece of it is just compliance with, with government in a way that the, the company, is increasing, you know, used to fight. They still fight some.&lt;/span&gt;&lt;/p&gt;
  1514. &lt;p&gt;&lt;span data-ccp-props=&quot;{}&quot;&gt;&lt;strong&gt;HARLO HOLMES:&lt;/strong&gt; They still fight, yes.&lt;/span&gt;&lt;/p&gt;
  1515. &lt;p&gt;&lt;span data-ccp-props=&quot;{}&quot;&gt;&lt;strong&gt;CINDY COHN:&lt;/strong&gt; They might fight, yes, but they also don&#039;t have the ability to fight that much. We might wanna go to something that&#039;s a little, that, that gives them the ability to say, look, we don&#039;t have access to that information. Just like Apple doesn&#039;t have access to the information that&#039;s stored on your iPhone. They made a policy decision to protect you. &lt;/span&gt;&lt;/p&gt;
  1516. &lt;p&gt;&lt;span data-ccp-props=&quot;{}&quot;&gt;&lt;strong&gt;HARLO HOLMES:&lt;/strong&gt; But now we&#039;re looking at what happened in the UK, and we’re like, hm.&lt;/span&gt;&lt;/p&gt;
  1517. &lt;p&gt;&lt;span data-ccp-props=&quot;{}&quot;&gt;&lt;strong&gt;CINDY COHN:&lt;/strong&gt; Exactly, but then the government has to act, you know, so it&#039;s always a fight on the technical level, and on the policy level, sadly. I wish that encryption we could, you know, fix with just technology. But we need other forms of protection. but I love this idea of having so many options, you know, some that are decentralized, some that are hosted, you know, in the nonprofit world, some that might be publicly supported, and then some that are the corporate side, but with the protections that we need. &lt;br /&gt;And I just feel like we need all of the above. Anybody who asks you to choose between these strategies is kind of getting you caught in a side fight when the main fight is how do we get people the privacy that they need to do their work?&lt;/span&gt;&lt;/p&gt;
  1518. &lt;p&gt;&lt;span data-ccp-props=&quot;{}&quot;&gt;&lt;strong&gt;HARLO HOLMES:&lt;/strong&gt; Yeah. Yeah. And one of the things that gives me the most hope is, continuing to fight in a space where we are all about the options. &lt;br /&gt;We&#039;re all about giving people options and being as creative as possible and building options for everyone.&lt;/span&gt;&lt;/p&gt;
  1519. &lt;p&gt;&lt;span data-ccp-props=&quot;{}&quot;&gt;&lt;strong&gt;JASON KELLEY:&lt;/strong&gt; What else gives you hope? Because you&#039;ve been at Freedom of the Press for a while now, and we&#039;re at a difficult time in a lot of ways, but I assume there are other things that you&#039;ve, you know, seen change over the years in a positive way, right? Because it feels too easy to say, look, things are getting dire, because in many ways they are. But, but what else gives you hope, given how long you&#039;ve been working on this issue?&lt;/span&gt;&lt;/p&gt;
  1520. &lt;p&gt;&lt;span data-ccp-props=&quot;{}&quot;&gt;&lt;strong&gt;HARLO HOLMES:&lt;/strong&gt; I actually, I love really thinking through the new challenges of other types of media that is represented. So much of my career had been, pretty much centered around traditional print and/or digital. However, I am so enthusiastic about being alongside, like, podcasters and YouTube creators as they navigate these new challenges and also understand, like, the long history of media theory, where we&#039;ve gone as an industry in order to understand how it applies to them.&lt;br /&gt;So one thing that I thought was pretty cool was having a conversation, recently, with a somewhat influential, TikTok person about class consciousness in regards to whether or not people who are influencers should actually start considering themselves as journalists legitimately.&lt;br /&gt;And one of the things that I mentioned had to do with the fact that, you know, like in the 2010s, bloggers were not considered quote unquote journalists, and yet blogging has become one of the most influential, even like from a financial perspective, like, drivers within this market. So influencers should not consider themselves anything other than journalists, because their fights are – especially like when, you know, platforms get involved and like what their economic model looks like and their, you know, integrity and ethos within journalism – like, that&#039;s the media history that we are building right now. So that excites me.&lt;/span&gt;&lt;/p&gt;
  1521. &lt;p&gt;&lt;span data-ccp-props=&quot;{}&quot;&gt;&lt;strong&gt;CINDY COHN:&lt;/strong&gt; Oh, that&#039;s great. You know, EFF was involved in some of the early cases about whether bloggers could be protected by journalism shield laws, we had a case called &lt;a href=&quot;https://www.eff.org/cases/apple-v-does&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;&lt;em&gt;Apple v. Does&lt;/em&gt;&lt;/a&gt; a long time ago that, uh, that helped establish that in the state of California. But I, I really love helping, kind of, new media think of itself as media. &lt;br /&gt;And also, I mean, the way that I always think about it is, it&#039;s not whether you&#039;re a journalist, it&#039;s whether you&#039;re doing journalism, right? It&#039;s the verb part. and that, different framing than I think helps break people out of the mold of, well, I do some stuff that&#039;s just kind of silly, and that might not be journalism, but if you&#039;re bringing news to the public, if you&#039;re bringing information to the public that the public wants, even if it&#039;s in a fashion context, like, that&#039;s journalism and it should have, uh, you should think of yourself that way because there is this rich history of how we protect that and how important that is to society, not just about the kind of hard political issues, but actually, you know, in creating and shaping and managing our culture as well.&lt;/span&gt;&lt;/p&gt;
  1522. &lt;p&gt;&lt;span data-ccp-props=&quot;{}&quot;&gt;&lt;strong&gt;HARLO HOLMES:&lt;/strong&gt; Mm-hmm. I agree 100%.&lt;/span&gt;&lt;/p&gt;
  1523. &lt;p&gt;&lt;span data-ccp-props=&quot;{}&quot;&gt;&lt;strong&gt;JASON KELLEY:&lt;/strong&gt; How did you end up doing this kind of digital security work specifically for journalists? Did you make an intentional choice at some point that you wanted to help journalists, or have you sort of found yourself here and it&#039;s just incredible, important work?&lt;/span&gt;&lt;/p&gt;
  1524. &lt;p&gt;&lt;span data-ccp-props=&quot;{}&quot;&gt;&lt;strong&gt;HARLO HOLMES:&lt;/strong&gt; A little bit of both. I&#039;m an avid media consumer who cares a lot about media history, and in undergraduate school I studied comparative literature, which is all based off of the fact that the media itself has its own unique power. And the way that it is expressed says way more than what is actually said.&lt;br /&gt;And I&#039;ve always found that to be the most important thing to do. As far as technology is concerned, as any young inquisitive person might do, I got into coding like so hardcore and, it wasn&#039;t until I was in grad school that I discovered, via a class with this fantastic person, &lt;a href=&quot;https://cyber.harvard.edu/people/nfreitas&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;Nathan Freitas&lt;/a&gt;, who&#039;s a Harvard, uh, Berkman Fellow Emeritus, and also the head of the &lt;a href=&quot;https://guardianproject.info/&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;Guardian Project&lt;/a&gt;, where he opened my eyes to the fact that like the code that you&#039;re writing, just like, you know, for fun or whatever, like you can actually use this to defend human rights.&lt;br /&gt;And so it was kind of the culmination of those ideas that led me through, like, a couple of things. Like, um, I was an open news fellow at, um, the New York Times for about a year where I worked with the computer assisted reporting team and that was really impressive. And that was the first time where I got to see how people will, like, scrape a webpage in order to write an investigative story.&lt;br /&gt;And I was like, wow, people do that that&#039;s so cool! And then also because I was hanging out with like Nathan and other folks, um, I was the, the one of the kids in the newsroom floor who knew what Tor was, they&#039;re like, that&#039;s cool. How do we use this in journalism? I&#039;m like, well, I got ideas. And that&#039;s how, kind of how my career got started.&lt;/span&gt;&lt;/p&gt;
  1525. &lt;p&gt;&lt;span data-ccp-props=&quot;{}&quot;&gt;&lt;strong&gt;CINDY COHN:&lt;/strong&gt; That&#039;s so great. Nathan&#039;s an old friend of EFF. That&#039;s so fun to hear the tentacles of how, you know, people inspire other people. Inspire other people. I think that&#039;s part of the fun story of digital rights.&lt;/span&gt;&lt;/p&gt;
  1526. &lt;p&gt;&lt;span data-ccp-props=&quot;{}&quot;&gt;&lt;strong&gt;HARLO HOLMES:&lt;/strong&gt; Yeah, yeah. I agree. I think anyone is super duper lucky to understand not only like the place that you occupy right now, but also where it sits within, like, a long history. And, I also really love, any experience where I get to kind of touch people with that as well.&lt;/span&gt;&lt;/p&gt;
  1527. &lt;p&gt;&lt;span data-ccp-props=&quot;{}&quot;&gt;&lt;strong&gt;CINDY COHN:&lt;/strong&gt; Nice. Ooh, that&#039;s a nice place to end. What do you think, Jason?&lt;/span&gt;&lt;/p&gt;
  1528. &lt;p&gt;&lt;span data-ccp-props=&quot;{}&quot;&gt;&lt;strong&gt;JASON KELLEY:&lt;/strong&gt; That sounds great. Yeah. And think of all the people who are saying the same thing about you now that you&#039;re saying about Nathan. Right. It never stops.&lt;/span&gt;&lt;/p&gt;
  1529. &lt;p&gt;&lt;span data-ccp-props=&quot;{}&quot;&gt;&lt;strong&gt;HARLO HOLMES:&lt;/strong&gt; It shouldn&#039;t ever stop. It shouldn&#039;t. This is our history.&lt;/span&gt;&lt;/p&gt;
  1530. &lt;p&gt;&lt;span data-ccp-props=&quot;{}&quot;&gt;&lt;strong&gt;CINDY COHN:&lt;/strong&gt; Oh, Harlo, thank you so much for coming and spending time with us. It&#039;s just been a delight to talk to you and good luck going forward. The times really need people like you.&lt;/span&gt;&lt;/p&gt;
  1531. &lt;p&gt;&lt;span data-ccp-props=&quot;{}&quot;&gt;&lt;strong&gt;HARLO HOLMES:&lt;/strong&gt; Thank you so much. Um, it&#039;s always a pleasure to talk to you and, um, I love your pod. I love the work that you do, and I&#039;ll, you know, see you next time.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;JASON KELLEY:&lt;/strong&gt; Well, I&#039;m really glad that we got a chance to talk to Harlo because these conversations with folks who work in these, um, specific areas with people are really helpful when, you know, it&#039;s not our job every day to talk to journalists, just like it&#039;s not our job every day to talk to specific advocates about specific issues. But you learn exactly what the kinds of things are that they think about and what we need to get things right and what it&#039;ll look like if we do get things right for journalists or, or whomever it is.&lt;/span&gt;&lt;/p&gt;
  1532. &lt;p&gt;&lt;span data-ccp-props=&quot;{}&quot;&gt;&lt;strong&gt;CINDY COHN:&lt;/strong&gt; Yeah, and I think the thing that I loved about the conversation is the stuff that she articulated is stuff that will help all of us. You know, it&#039;s a particular need for journalists. But when, you know, when we asked her, you know, what kind of tools need to exist, you know, she pointed, you know, not only to the open source decentralized tools like Ether Pad and things like that, but to basically an interoperability issue that making Google Docs secure, so that Google doesn&#039;t know what you&#039;re saying on your Google Docs. And I would toss Slack in there as well. That, you know, taking the tools that people rely on every day and building in things that make them secure against the company and against government coming and strong arming the company into giving them information, like that&#039;s a tool that will be really great for journalists, and I can see that. It&#039;ll also help all the rest of us.&lt;/span&gt;&lt;/p&gt;
  1533. &lt;p&gt;&lt;span data-ccp-props=&quot;{}&quot;&gt;&lt;strong&gt;JASON KELLEY:&lt;/strong&gt; Yeah.&lt;/span&gt;&lt;/p&gt;
  1534. &lt;p&gt;&lt;span data-ccp-props=&quot;{}&quot;&gt;&lt;strong&gt;CINDY COHN:&lt;/strong&gt; And the, you know, the other thing she said when she was giving, you know, what advice do you give to journalists, like off the top? She said, well, use separate devices for the things that you&#039;re doing and don&#039;t have everything on one device, you know, because, uh, I think I love the, what she say, they&#039;re data-hungry? &lt;/span&gt;&lt;/p&gt;
  1535. &lt;p&gt;&lt;span data-ccp-props=&quot;{}&quot;&gt;&lt;strong&gt;JASON KELLEY:&lt;/strong&gt; Data-greedy.&lt;/span&gt;&lt;/p&gt;
  1536. &lt;p&gt;&lt;span data-ccp-props=&quot;{}&quot;&gt;&lt;strong&gt;CINDY COHN:&lt;/strong&gt; Data-greedy, even better. That our devices are data greedy. So separating them gives us something. That&#039;s a useful piece of information for anyone who’s in activism.&lt;/span&gt;&lt;/p&gt;
  1537. &lt;p&gt;&lt;span data-ccp-props=&quot;{}&quot;&gt;&lt;strong&gt;JASON KELLY:&lt;/strong&gt; Yeah. And so, I mean, I, I wanna say easy. It&#039;s not always simple to have two devices, but the idea that the solution wasn&#039;t something more complicated. It reminds me that often the best advice is something that&#039;s fairly simple and that really, you know, anyone who has the ability and the money could have multiple devices and, and journalists are no different.&lt;br /&gt;So it reminded me also that, you know, when we&#039;re working on things like our surveillance, self-defense guides, it&#039;s helpful to remember that, like Harlo said, her job is to make the journalist’s job easy, right? They shouldn&#039;t have to think about this stuff. And that&#039;s how sort of the spirit of the guides that we write as well.&lt;br /&gt;And that was just a really good reminder that sometimes you feel like you&#039;re trying to convince everyone, or explain to them how all these tools work and actually it might be better to think about, well, you shouldn&#039;t have to understand all of this deeply like I do. In some cases you just need to know that this works and that&#039;s what you need to use.&lt;/span&gt;&lt;/p&gt;
  1538. &lt;p&gt;&lt;span data-ccp-props=&quot;{}&quot;&gt;&lt;strong&gt;CINDY COHN:&lt;/strong&gt; Yeah, I think that&#039;s right and I, you know, obviously, you know, ‘just go out and buy a second device’ isn&#039;t advice that we would give to people in parts of the world where that&#039;s a really a prohibitive suggestion. But there are many parts of the world, and journalists, many of them, live in them, where it is actually not that hard a thing to do to get yourself a burner phone or get a simpler phone for your work, rather than having to try to, you know, configure one device to really support all of those things. &lt;br /&gt;And turning on two FA right? Turning on two factor authentication. Another thing that is just good advice for anybody. So, you know, what I&#039;m hearing is that, you know, if we build a place that is better for journalists, it&#039;s better for all of us and vice versa. If we build a world that&#039;s better for all of us, it&#039;s also better for journalists. So, I really liked that. I also really liked her articulating and lifting up the role that the Tor project plays in what they do with Secure Drop. What they do to try to help protect journalists who have, uh, confidential sources.&lt;br /&gt;Because we&#039;re, again, as we&#039;re looking into all of these various tools that help create a better future, a more secure future, we&#039;re discovering that actually open source tools, like Tor, underlie many different pieces of the better world. And so we&#039;re starting to see kind of the network for good, right, the conspiracy for good of a lot of the open source security projects. &lt;/span&gt;&lt;/p&gt;
  1539. &lt;p&gt;&lt;span data-ccp-props=&quot;{}&quot;&gt;&lt;strong&gt;JASON KELLEY:&lt;/strong&gt; I didn&#039;t really realize when we were putting together these guests for this season, how interconnected they all were, and it&#039;s been really wonderful to hear everyone lift everyone else up. They really do all depend on one another, and it is really important to see that for the people who maybe don&#039;t think about it and use these tools as one-offs, right?&lt;/span&gt;&lt;/p&gt;
  1540. &lt;p&gt;&lt;span data-ccp-props=&quot;{}&quot;&gt;&lt;strong&gt;CINDY COHN:&lt;/strong&gt; Yeah. And I think as those of us who are trying to make the internet better, recognizing that we&#039;re all in this together, so as we&#039;re headed into this time, where we&#039;re seeing a lot of targeted attacks on different pieces of a secure world. You know, recognizing that these things are interconnected and then building strength from there seems to me to be a really important strategy.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;JASON KELLEY:&lt;/strong&gt; And that&#039;s our episode for today. If you have feedback or suggestions, we&#039;d love to hear from you. Visit eff.org/podcast and click on listener feedback. And while you&#039;re there, you can become a member and donate, maybe even pick up some of the merch, and just see what&#039;s happening in digital rights this week and every week.&lt;br /&gt;Our theme music is by Nat Keefe of Beat Mower with Reed Mathis, and How to Fix the Internet is supported by the Alfred P SLoan Foundation&#039;s program and public understanding of science and technology. We&#039;ll see you next time. I&#039;m Jason Kelley.&lt;/span&gt;&lt;/p&gt;
  1541. &lt;p&gt;&lt;span data-ccp-props=&quot;{}&quot;&gt;&lt;strong&gt;CINDY COHN:&lt;/strong&gt; And I&#039;m Cindy Cohn.&lt;/span&gt;&lt;/p&gt;
  1542. &lt;p&gt;&lt;span data-ccp-props=&quot;{}&quot;&gt;&lt;em&gt;&lt;strong&gt;MUSIC CREDITS:&lt;/strong&gt; This podcast is licensed creative commons attribution 4.0 international, and includes the following music licensed creative commons attribution 3.0 unported by its creators: Drops of H2, The Filtered Water Treatment by Jay Lang. Sound design, additional music and theme remixes by Gaetan Harris.&lt;/em&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;
  1543. &lt;p&gt;&lt;span data-ccp-props=&quot;{}&quot;&gt;&lt;/span&gt;&lt;/p&gt;
  1544.  
  1545. &lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
  1546.     <pubDate>Wed, 18 Jun 2025 07:05:11 +0000</pubDate>
  1547. <guid isPermaLink="false">110798 at https://www.eff.org</guid>
  1548. <category domain="https://www.eff.org/how-to-fix-the-internet-podcast">How to Fix the Internet: Podcast</category>
  1549. <category domain="https://www.eff.org/issues/free-speech">Free Speech</category>
  1550. <category domain="https://www.eff.org/issues/end-end-encryption">End-to-End Encryption</category>
  1551. <dc:creator>Josh Richman</dc:creator>
  1552. <enclosure url="https://www.eff.org/files/banner_library/2025-htfi-harlo-blog.png" alt="How to Fix the Internet - Harlo Holmes - Securing Journalism on the ‘Data-Greedy’ Internet" type="image/png" length="515257" />
  1553.  </item>
  1554.  <item>
  1555.    <title>Betting on Your Digital Rights: EFF Benefit Poker Tournament at DEF CON 33</title>
  1556.    <link>https://www.eff.org/deeplinks/2025/06/betting-your-digital-rights-eff-benefit-poker-tournament-def-con-33</link>
  1557.    <description>&lt;div class=&quot;field field--name-body field--type-text-with-summary field--label-hidden&quot;&gt;&lt;div class=&quot;field__items&quot;&gt;&lt;div class=&quot;field__item even&quot;&gt;&lt;p&gt;Hacker Summer Camp is almost here... and with it comes the Third Annual EFF Benefit Poker Tournament at &lt;a href=&quot;https://www.eff.org/event/eff-def-con-33&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;DEF CON 33&lt;/a&gt; hosted by security expert &lt;a href=&quot;https://infosec.exchange/@Tarah&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;Tarah Wheeler&lt;/a&gt;.&lt;/p&gt;
  1558. &lt;p&gt;Please join us on Friday, August 8th, at high noon at our new location: Planet Hollywood Poker Room. The fees haven’t changed; it’s still $250 to register plus $100 the day of the tournament with unlimited rebuys. (AND all players will receive a complimentary EFF Titanium Level Membership for the year.)&lt;/p&gt;
  1559. &lt;p&gt;Tarah Wheeler—EFF board member and resident poker expert—has been working hard on the tournament since last year! We will have Lintile as emcee this year and there&#039;s going to be bug bounties! When you take someone out of the tournament, they will give you a pin. Prizes—and major bragging rights—go to the player with the most bounty pins. Be sure to &lt;a href=&quot;https://supporters.eff.org/civicrm/event/register?id=497&amp;amp;reset=1&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;register today&lt;/a&gt; and see lintile in action!&lt;/p&gt;
  1560. &lt;p&gt;Did we mention there will be Celebrity Bounties? Knock out Wendy Nather, Chris “WeldPond” Wysopal, Jake “MalwareJake” Williams, Bryson Bort, Allan Friedman and get neat EFF swag and the respect of your peers! Plus, as always, knock out Tarah&#039;s dad Mike, and she donates $250 to the EFF in your name!&lt;/p&gt;
  1561.  
  1562. &lt;p&gt;&lt;/p&gt;&lt;center&gt;&lt;strong&gt;EFF Benefit Poker Tournament at DC33 &lt;/strong&gt;&lt;br /&gt;&lt;strong&gt;Planet Hollywood Poker Room&lt;/strong&gt;&lt;br /&gt;&lt;strong&gt;3667 Las Vegas Blvd South, Las Vegas, NV 89109&lt;/strong&gt;&lt;br /&gt;&lt;strong&gt;Friday, August 8, 12:00 pm&lt;/strong&gt;&lt;/center&gt;&lt;center&gt;&lt;strong&gt;&lt;/strong&gt;&lt;/center&gt;&lt;br /&gt;
  1563. &lt;p class=&quot;take-action&quot;&gt;&lt;a href=&quot;https://supporters.eff.org/civicrm/event/register?id=448&amp;amp;reset=1&quot;&gt;Register Now&lt;/a&gt;&lt;/p&gt;
  1564. &lt;p class=&quot;take-explainer&quot;&gt;&lt;strong&gt;Find Full Event Details and Registration&lt;/strong&gt;&lt;/p&gt;
  1565. &lt;p&gt;Have a friend that might be interested but not sure how to play? Have you played some poker before but could use a refresher? Join poker pro Mike Wheeler (Tarah’s dad) and celebrities for a free poker clinic from 11:00 am-11:45 am just before the tournament. Mike will show you the rules, strategy, table behavior, and general Vegas slang at the poker table. Even if you know poker pretty well, come a bit early and help out.&lt;/p&gt;
  1566. &lt;p&gt;&lt;a href=&quot;https://supporters.eff.org/civicrm/event/register?id=448&amp;amp;reset=1&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;Register today&lt;/a&gt; and reserve your deck. Be sure to invite your friends to join you!&lt;/p&gt;
  1567. &lt;p&gt; &lt;/p&gt;
  1568.  
  1569. &lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
  1570.     <pubDate>Tue, 17 Jun 2025 05:17:14 +0000</pubDate>
  1571. <guid isPermaLink="false">110793 at https://www.eff.org</guid>
  1572. <dc:creator>Melissa Srago</dc:creator>
  1573. <enclosure url="https://www.eff.org/files/banner_library/poker-dogs-1.jpg" alt="Dogs playing at the EFF Benefit Poker Tournament table" type="image/jpeg" length="305538" />
  1574.  </item>
  1575.  <item>
  1576.    <title>Connectivity is a Lifeline, Not a Luxury: Telecom Blackouts in Gaza Threaten Lives and Digital Rights</title>
  1577.    <link>https://www.eff.org/deeplinks/2025/06/connectivity-lifeline-not-luxury-telecom-blackouts-gaza-threaten-lives-and-digital</link>
  1578.    <description>&lt;div class=&quot;field field--name-body field--type-text-with-summary field--label-hidden&quot;&gt;&lt;div class=&quot;field__items&quot;&gt;&lt;div class=&quot;field__item even&quot;&gt;&lt;p&gt;&lt;span&gt;For the third time since October 2023, Gaza has faced a near-total telecommunications blackout—plunging over 2 million residents into digital darkness and isolating them from the outside world. According to Palestinian digital rights organization&lt;/span&gt;&lt;a href=&quot;https://7amleh.org/post/total-internet-blackout-expands-across-gaza,-threatening-complete-telecommunications-collapse&quot;&gt; &lt;span&gt;7amleh&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, the latest outage began on June 11, 2025, and lasted three days before partial service was &lt;/span&gt;&lt;a href=&quot;https://www.france24.com/en/live-news/20250614-internet-restored-in-gaza-after-3-days-palestinian-telecom-official&quot;&gt;&lt;span&gt;restored&lt;/span&gt;&lt;/a&gt;&lt;span&gt; on June 14. As of today, &lt;/span&gt;&lt;a href=&quot;https://x.com/Hind_Gaza/status/1934515652242358536&quot;&gt;&lt;span&gt;reports from inside Gaza&lt;/span&gt;&lt;/a&gt;&lt;span&gt; suggest that access has been cut off again in central and southern Gaza. &lt;/span&gt;&lt;/p&gt;
  1579. &lt;p&gt;&lt;span&gt;Blackouts like these affect internet and phone communications across Gaza, leaving journalists, emergency responders, and civilians unable to communicate, document, or call for help.&lt;/span&gt;&lt;/p&gt;
  1580. &lt;p&gt;&lt;span&gt;Cutting off telecommunications during an active military campaign is not only a violation of basic human rights—it is a direct attack on the ability of civilians to survive, seek safety, and report abuses. Access to information and the ability to communicate are core to the exercise of freedom of expression, press freedom, and the right to life itself.&lt;/span&gt;&lt;/p&gt;
  1581. &lt;p&gt;&lt;span&gt;The threat of recurring outages looms large. Palestinian digital rights groups warn of a complete collapse of Gaza’s telecommunications infrastructure, which has already been weakened by years of blockade, lack of spare parts, and now sustained bombardment.&lt;/span&gt;&lt;/p&gt;
  1582. &lt;p&gt;&lt;span&gt;These blackouts systematically silence the people of Gaza amidst a humanitarian crisis. They &lt;/span&gt;&lt;span&gt;prevent the documentation of war crimes&lt;/span&gt;&lt;span&gt;, hide the extent of humanitarian crises, and obstruct the global community’s ability to witness and respond.&lt;/span&gt;&lt;/p&gt;
  1583. &lt;p&gt;&lt;span&gt;EFF has &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/deeplinks/2024/03/access-internet-infrastructure-essential-wartime-and-peacetime&quot;&gt;&lt;span&gt;long maintained &lt;/span&gt;&lt;/a&gt;&lt;span&gt;that governments and occupying powers must not disrupt internet or telecom access, especially during times of conflict. The blackout in Gaza is not just a local or regional issue—it’s a global human rights emergency.&lt;/span&gt;&lt;/p&gt;
  1584. &lt;p&gt;&lt;span&gt;As part of the campaign led by 7amleh to &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/deeplinks/2025/03/eff-joins-7amleh-campaign-reconnectgaza&quot;&gt;&lt;span&gt;#ReconnectGaza&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, we call on all actors, including governments, telecommunications regulators, and civil society, to demand an end to telecommunications blackouts in Gaza and everywhere. Connectivity is a lifeline, not a luxury. &lt;/span&gt;&lt;/p&gt;
  1585.  
  1586. &lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
  1587.     <pubDate>Mon, 16 Jun 2025 21:17:54 +0000</pubDate>
  1588. <guid isPermaLink="false">110810 at https://www.eff.org</guid>
  1589. <category domain="https://www.eff.org/issues/international">International</category>
  1590. <dc:creator>Jillian C. York</dc:creator>
  1591. <enclosure url="https://www.eff.org/files/banner_library/gaza-2.jpg" alt="social media icon speaking about refugees, with war image background" type="image/jpeg" length="381027" />
  1592.  </item>
  1593.  <item>
  1594.    <title>Google’s Advanced Protection Arrives on Android: Should You Use It?</title>
  1595.    <link>https://www.eff.org/deeplinks/2025/06/googles-advanced-protection-arrives-android-should-you-use-it</link>
  1596.    <description>&lt;div class=&quot;field field--name-body field--type-text-with-summary field--label-hidden&quot;&gt;&lt;div class=&quot;field__items&quot;&gt;&lt;div class=&quot;field__item even&quot;&gt;&lt;p&gt;&lt;span&gt;With this week’s &lt;/span&gt;&lt;a href=&quot;https://blog.google/products/android/android-16/&quot;&gt;&lt;span&gt;release of Android 16&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, Google added a new security feature to Android, called Advanced Protection. At-risk people—like journalists, activists, or politicians—should consider turning it on. Here’s what it does, and how to decide if it’s a good fit for your security needs.&lt;/span&gt;&lt;/p&gt;
  1597. &lt;p&gt;&lt;span&gt;To get some confusing naming schemes clarified at the start: Advanced Protection is an extension of &lt;/span&gt;&lt;a href=&quot;https://landing.google.com/intl/en_in/advancedprotection/&quot;&gt;&lt;span&gt;Google’s Advanced Protection Program&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, which protects your Google account from phishing and harmful downloads, and is not to be confused with Apple’s Advanced Data Protection, which enables end-to-end encryption for most data in iCloud. Instead, Google&#039;s Advanced Protection is more comparable to the &lt;/span&gt;&lt;a href=&quot;https://ssd.eff.org/module/how-to-enable-lockdown-mode-on-iphone&quot;&gt;&lt;span&gt;iPhone’s Lockdown Mode&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, Apple’s solution to protecting high risk people from specific types of digital threats on Apple devices. &lt;br /&gt;&lt;/span&gt;&lt;/p&gt;
  1598. &lt;p&gt;&lt;span&gt;Advanced Protection for Android is meant to provide stronger security by: enabling certain features that aren’t on by default, disabling the ability to turn off features that are enabled by default, and adding new security features. Put together, this suite of features is designed to isolate data where possible, and reduce the chances of interacting with unsecure websites and unknown individuals.&lt;/span&gt;&lt;/p&gt;
  1599. &lt;p&gt;&lt;span&gt;For example, when it comes to enabling existing features, Advanced Protection turns on &lt;/span&gt;&lt;a href=&quot;https://ssd.eff.org/module/how-to-get-to-know-android-privacy-and-security-settings#set-up-find-my-device-and-theft-protection-features&quot;&gt;&lt;span&gt;Android’s “theft detection” features&lt;/span&gt;&lt;/a&gt;&lt;span&gt; (designed to protect against in-person thefts), forces Chrome to use HTTPS for all website connections (a feature we’d like to see expand to everything on the phone), enables scam and spam protection features in Google Messages, and &lt;/span&gt;&lt;a href=&quot;https://ssd.eff.org/module/how-to-get-to-know-android-privacy-and-security-settings#disable-2g&quot;&gt;&lt;span&gt;disables 2G&lt;/span&gt;&lt;/a&gt;&lt;span&gt; (which helps prevent your phone from connecting to &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/wp/gotta-catch-em-all-understanding-how-imsi-catchers-exploit-cell-networks&quot;&gt;&lt;span&gt;some Cell Site Simulators&lt;/span&gt;&lt;/a&gt;&lt;span&gt;)&lt;/span&gt;&lt;span&gt;. You could go in and enable each of these individually in the Settings app, but having everything turned on with one tap is much easier to do.&lt;/span&gt;&lt;/p&gt;
  1600. &lt;p&gt;&lt;span&gt;Advanced Protection also prevents you from disabling certain core security features that are enabled by default, like Google Play Protect (Android’s built-in malware protection) and Android Safe Browsing (which safeguards against malicious websites).&lt;/span&gt;&lt;/p&gt;
  1601. &lt;p&gt;&lt;span&gt;But Advanced Protection also adds some new features. Once turned on, the “Inactivity reboot” feature restarts your device if it’s locked for 72 hours, which prevents ease of access that can occur when your device is on for a while and you have settings that could unlock your device. By forcing a reboot, it resets everything to being encrypted and behind biometric or pin access. It also turns on “USB Protection,” which makes it so any new USB connection can only be used for charging when the device is locked. It also prevents your device from auto-reconnecting to unsecured Wi-Fi networks.&lt;/span&gt;&lt;/p&gt;
  1602. &lt;p&gt;&lt;span&gt;As with all things Android, some of these features are limited to select devices, or only phones made by certain manufacturers. Memory Tagging Extension (MTE), which attempts to mitigate memory vulnerabilities by blocking unauthorized access, debuted on Pixel 8 devices in 2023 is only now showing up on other phones. These segmentations in features makes it a little difficult to know exactly what your device is protecting against if you’re not using a Pixel phone. &lt;br /&gt;&lt;/span&gt;&lt;/p&gt;
  1603. &lt;p&gt;&lt;span&gt;Some of the new features, like the ability to generate security logs that you can then share with security professionals in case your device is ever compromised, along with the aforementioned insecure network reconnect and USB protection features, won’t launch until later this year.&lt;/span&gt;&lt;/p&gt;
  1604. &lt;p&gt;&lt;span&gt;It’s also worth considering that enabling Advanced Protection may impact how you use your device. For example, Advanced Protection disables the JavaScript optimizer in Chrome, which may break some websites, and since Advanced Protection blocks unknown apps, you won’t be able to side-load. There’s also the chance that some of the call screening and scam detection features may misfire and flag legitimate calls.&lt;/span&gt;&lt;/p&gt;
  1605. &lt;h2&gt;&lt;span&gt;How to Turn on Advanced Protection&lt;/span&gt;&lt;/h2&gt;
  1606. &lt;p&gt;&lt;span&gt;&lt;img src=&quot;/files/2025/06/16/advancedprotection.png&quot; width=&quot;2048&quot; height=&quot;1993&quot; alt=&quot;screenshots of Android&#039;s Advanced Protection page&quot; title=&quot;screenshots of Android&#039;s Advanced Protection page&quot; /&gt;&lt;/span&gt;&lt;/p&gt;
  1607. &lt;p&gt;&lt;span&gt;Advanced Protection is easy to turn on and off, so there’s no harm in giving it a try. Advanced Protection was introduced with Android 16, so you may need to &lt;/span&gt;&lt;a href=&quot;https://support.google.com/android/answer/7680439?hl=en&quot;&gt;&lt;span&gt;update your phone&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, or wait a little longer for your device manufacturer to support the update if it doesn’t already. Once you’re updated, to turn it on:&lt;/span&gt;&lt;/p&gt;
  1608. &lt;ul&gt;
  1609. &lt;li&gt;&lt;span&gt;Open the &lt;/span&gt;&lt;b&gt;&lt;i&gt;Settings&lt;/i&gt;&lt;/b&gt;&lt;span&gt; app.&lt;/span&gt;&lt;/li&gt;
  1610. &lt;li&gt;&lt;span&gt;Tap &lt;/span&gt;&lt;b&gt;&lt;i&gt;Security and Privacy&lt;/i&gt;&lt;/b&gt;&lt;span&gt; &amp;gt; &lt;/span&gt;&lt;b&gt;&lt;i&gt;Advanced Protection&lt;/i&gt;&lt;/b&gt;&lt;span&gt;, and enable the option next to “Device Protection.” &lt;/span&gt;&lt;/li&gt;
  1611. &lt;li&gt;&lt;span&gt;If you haven’t already done so, now is a good time to consider enabling &lt;/span&gt;&lt;a href=&quot;https://landing.google.com/advancedprotection/&quot;&gt;&lt;span&gt;Advanced Protection&lt;/span&gt;&lt;/a&gt;&lt;span&gt; for your Google account as well, though you will need to enroll a &lt;/span&gt;&lt;a href=&quot;https://ssd.eff.org/module/how-enable-two-factor-authentication#how-do-i-enable-2fa&quot;&gt;&lt;span&gt;security key &lt;/span&gt;&lt;/a&gt;&lt;span&gt;or &lt;/span&gt;&lt;a href=&quot;https://ssd.eff.org/module/how-enable-two-factor-authentication#what-about-passkeys&quot;&gt;&lt;span&gt;a passkey&lt;/span&gt;&lt;/a&gt;&lt;span&gt; to use this feature.&lt;/span&gt;&lt;/li&gt;
  1612. &lt;/ul&gt;
  1613. &lt;p&gt;&lt;span&gt;We welcome these features on Android, as well as the simplicity of its approach to enabling several pre-existing security and privacy features all at once. While there is no panacea for every security threat, this is a baseline that improves the security on Android for at-risk individuals without drastically altering day-to-day use, which is a win for everyone. We hope to see Google continue to push new improvements to this feature and for different phone manufacturer’s to support Advanced Protection where they don’t already.&lt;/span&gt;&lt;/p&gt;
  1614.  
  1615. &lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
  1616.     <pubDate>Mon, 16 Jun 2025 20:33:37 +0000</pubDate>
  1617. <guid isPermaLink="false">110806 at https://www.eff.org</guid>
  1618. <category domain="https://www.eff.org/issues/security-education">Security Education</category>
  1619. <dc:creator>Thorin Klosowski</dc:creator>
  1620. <enclosure url="https://www.eff.org/files/banner_library/mobile-privacy.png" alt="" type="image/png" length="23559" />
  1621.  </item>
  1622.  <item>
  1623.    <title>EFF to NJ Supreme Court: Prosecutors Must Disclose Details Regarding FRT Used to Identify Defendant</title>
  1624.    <link>https://www.eff.org/deeplinks/2025/06/eff-nj-supreme-court-prosecutors-must-disclose-details-regarding-frt-used-identify</link>
  1625.    <description>&lt;div class=&quot;field field--name-body field--type-text-with-summary field--label-hidden&quot;&gt;&lt;div class=&quot;field__items&quot;&gt;&lt;div class=&quot;field__item even&quot;&gt;&lt;p&gt;&lt;em&gt;This post was written by EFF legal intern Alexa Chavara.&lt;/em&gt;&lt;/p&gt;
  1626. &lt;p&gt;Black box technology has no place in the criminal legal system. That’s why we’ve once again filed an amicus brief arguing that the both the defendant and the public have a right to information regarding face recognition technology (FRT) that was used during an investigation to identify a criminal defendant.&lt;/p&gt;
  1627. &lt;p&gt;Back in June 2023, we filed an amicus brief along with Electronic Privacy Information Center (EPIC) and the National Association of Criminal Defense Lawyers (NACDL) in &lt;a href=&quot;https://www.eff.org/deeplinks/2023/06/victory-new-jersey-court-rules-police-must-give-defendant-facial-recognition&quot;&gt;&lt;em&gt;State of New Jersey v. Arteaga&lt;/em&gt;&lt;/a&gt;. We argued that information regarding the face recognition technology used to identify the defendant should be disclosed due to the fraught process of a face recognition search and the many ways that inaccuracies manifest in the use of the technology. The New Jersey appellate court agreed, holding that state prosecutors must turn over detailed information to the defendant about the FRT used, including how it works, its source code, and its error rate. The court held that this ensures the defendant’s due process rights with the ability to examine the information, scrutinize its reliability, and build a defense.&lt;/p&gt;
  1628. &lt;p&gt;Last month, partnering with the same organizations, we filed another amicus brief in favor of transparency regarding FRT in the criminal system, this time in the New Jersey Supreme Court in &lt;em&gt;State of New Jersey v. Miles&lt;/em&gt;.&lt;/p&gt;
  1629. &lt;p&gt;In &lt;em&gt;Miles&lt;/em&gt;, New Jersey law enforcement used FRT to identify Mr. Miles as a suspect in a criminal investigation. The defendant, represented by the same public defender in &lt;em&gt;Arteaga&lt;/em&gt;, moved for discovery on information about the FRT used, relying on &lt;em&gt;Arteaga&lt;/em&gt;. The trial court granted this request for discovery, and the appellate court affirmed. The State then appealed to the New Jersey Supreme Court, where the issue is before the Court for the first time.&lt;/p&gt;
  1630. &lt;p&gt;As explained in our amicus brief, disclosure is necessary to ensure criminal prosecutions are based on accurate evidence. Every search using face recognition technology presents a unique risk of error depending on various factors from the specific FRT system used, the databases searched, the quality of the photograph, and the demographics of the individual. &lt;a href=&quot;https://nvlpubs.nist.gov/nistpubs/Legacy/IR/nistir7709.pdf&quot;&gt;Study&lt;/a&gt; after &lt;a href=&quot;https://ieeexplore.ieee.org/document/8636231&quot;&gt;study&lt;/a&gt; shows that facial recognition algorithms are &lt;a href=&quot;https://www.sciencedirect.com/science/article/abs/pii/S0364021302000848&quot;&gt;not always reliable&lt;/a&gt;, and that error rates &lt;a href=&quot;https://nvlpubs.nist.gov/nistpubs/ir/2019/NIST.IR.8280.pdf&quot;&gt;spike significantly&lt;/a&gt; when involving faces of &lt;a href=&quot;https://arxiv.org/pdf/1904.07325&quot;&gt;people of color&lt;/a&gt;,  especially &lt;a href=&quot;https://proceedings.mlr.press/v81/buolamwini18a/buolamwini18a.pdf&quot;&gt;Black women&lt;/a&gt;, as well as &lt;a href=&quot;https://qz.com/1726806/facial-recognition-ai-from-amazon-microsoft-and-ibm-misidentifies-trans-and-non-binary-people&quot;&gt;trans and nonbinary people&lt;/a&gt;.&lt;/p&gt;
  1631. &lt;p&gt;Moreover, these searches often determine the course of investigation, reinforcing errors and resulting in &lt;a href=&quot;https://www.nytimes.com/2023/08/06/business/facial-recognition-false-arrest.html&quot;&gt;numerous&lt;/a&gt; &lt;a href=&quot;https://www.freep.com/story/news/local/michigan/detroit/2020/07/10/facial-recognition-detroit-michael-oliver-robert-williams/5392166002/&quot;&gt;wrongful&lt;/a&gt; &lt;a href=&quot;https://www.cnn.com/2021/04/29/tech/nijeer-parks-facial-recognition-police-arrest/index.html&quot;&gt;arrests&lt;/a&gt;, &lt;a href=&quot;https://apnews.com/article/mistaken-arrests-facial-recognition-technology-lawsuits-b613161c56472459df683f54320d08a7&quot;&gt;most often&lt;/a&gt; of &lt;a href=&quot;https://www.wired.com/story/face-recognition-software-led-to-his-arrest-it-was-dead-wrong/&quot;&gt;Black&lt;/a&gt; &lt;a href=&quot;https://www.washingtonpost.com/technology/2021/04/13/facial-recognition-false-arrest-lawsuit/&quot;&gt;folks&lt;/a&gt;. Discovery is the last chance to correct harm from misidentification and to allow the defendant to understand the evidence against them.&lt;/p&gt;
  1632. &lt;p&gt;Furthermore, the public, including independent experts, have the right to examine the technology used in criminal proceedings. Under the First Amendment and the more expansive New Jersey Constitution corollary, the public’s right to access criminal judicial proceedings includes filings in pretrial proceedings, like the information being sought here. That access provides the public meaningful oversight of the criminal justice system and increases confidence in judicial outcomes, which is especially significant considering the documented risks and shortcomings of FRT.&lt;/p&gt;
  1633.  
  1634. &lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
  1635.     <pubDate>Mon, 16 Jun 2025 19:56:29 +0000</pubDate>
  1636. <guid isPermaLink="false">110805 at https://www.eff.org</guid>
  1637. <category domain="https://www.eff.org/issues/face-surveillance">Face Surveillance</category>
  1638. <category domain="https://www.eff.org/issues/street-level-surveillance">Street-Level Surveillance</category>
  1639. <dc:creator>Hannah Zhao</dc:creator>
  1640. <enclosure url="https://www.eff.org/files/banner_library/face-recognition-banner_0_0.jpg" alt="This image shows a person&amp;#039;s face with layers of pixelation throughout. " type="image/jpeg" length="182336" />
  1641.  </item>
  1642.  <item>
  1643.    <title>Protecting Minors Online Must Not Come at the Cost of Privacy and Free Expression</title>
  1644.    <link>https://www.eff.org/deeplinks/2025/06/protecting-minors-online-must-not-come-cost-privacy-and-free-expression</link>
  1645.    <description>&lt;div class=&quot;field field--name-body field--type-text-with-summary field--label-hidden&quot;&gt;&lt;div class=&quot;field__items&quot;&gt;&lt;div class=&quot;field__item even&quot;&gt;&lt;p&gt;&lt;span&gt;The European Commission has taken an important step toward protecting minors online by releasing draft guidelines under Article 28 of the Digital Services Act (DSA). EFF recently submitted feedback to the Commission’s Targeted Consultation, emphasizing a critical point: Online safety for young people must not come at the expense of privacy, free expression, and equitable access to digital spaces.&lt;/span&gt;&lt;/p&gt;
  1646. &lt;p&gt;&lt;span&gt;We support the Commission’s commitment to proportionality, rights-based protections, and its efforts to include young voices in shaping these guidelines. But we remain deeply concerned by the growing reliance on invasive age assurance and verification technologies—tools that too often lead to surveillance, discrimination, and censorship.&lt;/span&gt;&lt;/p&gt;
  1647. &lt;p&gt;&lt;span&gt;Age verification systems &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/issues/digital-identity&quot;&gt;&lt;span&gt;typically depend on government-issued ID&lt;/span&gt;&lt;/a&gt;&lt;span&gt; or biometric data, posing significant risks to privacy and shutting out millions of people without formal documentation. Age estimation methods fare no better: they’re inaccurate, especially for marginalized groups, and often rely on sensitive behavioral or biometric data. Meanwhile, vague mandates to protect against “unrealistic beauty standards” or “potentially risky content” threaten to overblock legitimate expression, disproportionately harming vulnerable users, including LGBTQ+ youth.&lt;/span&gt;&lt;/p&gt;
  1648. &lt;p&gt;&lt;span&gt;By placing a disproportionate emphasis on age assurance as a necessary tool to safeguard minors, the guidelines do not address the root causes of risks encountered by all users, including minors, and instead merely focus on treating their symptoms.&lt;/span&gt;&lt;/p&gt;
  1649. &lt;p&gt;&lt;span&gt;Safety matters—but so do privacy, access to information, and the fundamental rights of all users. We urge the Commission to avoid endorsing disproportionate, one-size-fits-all technical solutions. Instead, we recommend user-empowering approaches: Strong default privacy settings, transparency in recommender systems, and robust user control over the content they see and share.&lt;/span&gt;&lt;/p&gt;
  1650. &lt;p&gt;&lt;span&gt;The DSA presents an opportunity to protect minors while upholding digital rights. We hope the final guidelines reflect that balance.&lt;/span&gt;&lt;/p&gt;
  1651. &lt;p&gt;&lt;span&gt;Read more about digital identity and the future of age verification in Europe &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/deeplinks/2025/04/digital-identities-and-future-age-verification-europe&quot;&gt;&lt;span&gt;here&lt;/span&gt;&lt;/a&gt;&lt;span&gt;.&lt;/span&gt;&lt;/p&gt;
  1652.  
  1653. &lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
  1654.     <pubDate>Mon, 16 Jun 2025 15:52:46 +0000</pubDate>
  1655. <guid isPermaLink="false">110803 at https://www.eff.org</guid>
  1656. <category domain="https://www.eff.org/issues/international">International</category>
  1657. <category domain="https://www.eff.org/issues/digital-identity">Digital Identity</category>
  1658. <category domain="https://www.eff.org/issues/lgbtq">LGBTQ+</category>
  1659. <category domain="https://www.eff.org/issues/eu-policy">EU Policy</category>
  1660. <dc:creator>Jillian C. York</dc:creator>
  1661. <enclosure url="https://www.eff.org/files/banner_library/ageverificationbanner.png" alt="Purple padlock with an 18+ only symbol and a combination lock requiring Day, Month, and Year. Surrounded by abstract purple dashed lines." type="image/png" length="1291379" />
  1662.  </item>
  1663.  <item>
  1664.    <title>A New Digital Dawn for Syrian Tech Users</title>
  1665.    <link>https://www.eff.org/deeplinks/2025/06/new-digital-dawn-syrian-tech-users</link>
  1666.    <description>&lt;div class=&quot;field field--name-body field--type-text-with-summary field--label-hidden&quot;&gt;&lt;div class=&quot;field__items&quot;&gt;&lt;div class=&quot;field__item even&quot;&gt;&lt;p&gt;&lt;span&gt;U.S. sanctions on Syria have for several decades not only restricted trade and financial transactions, they’ve also severely limited Syrians’ access to digital technology. From software development tools to basic cloud services, Syrians were locked out of the global internet economy—stifling innovation, education, and entrepreneurship.&lt;/span&gt;&lt;/p&gt;
  1667. &lt;p&gt;&lt;span&gt;EFF has for many years pushed for sanctions exemptions for technology in &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/deeplinks/2011/09/stop-the-piecemeal-export-approach&quot;&gt;&lt;span&gt;Syria&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, as well as in &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/deeplinks/2015/02/success-general-license-allows-export-communications-tools-sudan?language=tr&quot;&gt;&lt;span&gt;Sudan&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/deeplinks/2020/01/iranian-tech-users-are-getting-knocked-web-sanctions&quot;&gt;&lt;span&gt;Iran&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, and &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/deeplinks/2010/03/better-u-s-net-rules-iran-cuba-and-syria&quot;&gt;&lt;span&gt;Cuba&lt;/span&gt;&lt;/a&gt;&lt;span&gt;. While civil society had early wins in securing general licenses for Iran and Sudan allowing the export of communications technologies, the conflict in Syria that began in 2011 made loosening of sanctions a pipe dream.&lt;/span&gt;&lt;/p&gt;
  1668. &lt;p&gt;&lt;span&gt;But recent changes to U.S. policy could mark the beginning of a shift. In a quiet yet significant move, the U.S. government has eased sanctions on Syria. On May 23, the Treasury Department issued &lt;/span&gt;&lt;a href=&quot;https://home.treasury.gov/news/press-releases/sb0148&quot;&gt;&lt;span&gt;General License 25&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, effectively allowing technology companies to provide services to Syrians. This decision could have an immediate and positive impact on the lives of millions of Syrian internet users—especially those working in the tech and education sectors.&lt;/span&gt;&lt;/p&gt;
  1669. &lt;h3&gt;&lt;b&gt;A Legacy of Digital Isolation&lt;/b&gt;&lt;/h3&gt;
  1670. &lt;p&gt;&lt;span&gt;For years, Syrians have found themselves barred from accessing even the most basic tools. U.S. sanctions meant that companies like Google, Apple, Microsoft, and Amazon—either by law or by cautious decisions taken to avoid potential penalties—restricted access to many of their services. Developers couldn’t access GitHub repositories or use Google Cloud; students couldn’t download software for virtual classrooms; and entrepreneurs struggled to build startups without access to payment gateways or secure infrastructure.&lt;/span&gt;&lt;/p&gt;
  1671. &lt;p&gt;&lt;span&gt;Such restrictions can put users in harm’s way; for instance, not being able to access the Google Play store from inside the country means that Syrians can’t easily download secure versions of everyday tools like Signal or WhatsApp, thus potentially subjecting their communications to surveillance.&lt;/span&gt;&lt;/p&gt;
  1672. &lt;p&gt;&lt;span&gt;These restrictions also compounded the difficulties of war, economic collapse, and internal censorship. Even when Syrian tech workers could connect with global communities, their participation was hampered by legal gray zones and technical blocks.&lt;/span&gt;&lt;/p&gt;
  1673. &lt;h3&gt;&lt;b&gt;What the Sanctions Relief Changes&lt;/b&gt;&lt;/h3&gt;
  1674. &lt;p&gt;&lt;span&gt;Under &lt;/span&gt;&lt;a href=&quot;https://home.treasury.gov/news/press-releases/sb0148&quot;&gt;&lt;span&gt;General License 25&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, companies will now be able to provide services to Syria that have never officially been available. While it may take time for companies to catch up with any regulatory changes, it is our hope that Syrians will soon be able to access and make use of technologies that will enable them to more freely communicate and rebuild.&lt;/span&gt;&lt;/p&gt;
  1675. &lt;p&gt;&lt;span&gt;For Syrian developers, the impact could be transformative. Restored access to platforms like GitHub, AWS, and Google Cloud means the ability to build, test, and deploy apps without the need for VPNs or workarounds. It opens the door to participation in global hackathons, remote work, and open-source communities—channels that are often lifelines for those in conflict zones. Students and educators stand to benefit, too. With sanctions eased, educational tools and platforms that were previously unavailable could soon be accessible. Entrepreneurs may also finally gain access to secure communications, e-commerce platforms, and the broader digital infrastructure needed to start and scale businesses. These developments could help jumpstart local economies.&lt;/span&gt;&lt;/p&gt;
  1676. &lt;p&gt;&lt;span&gt;Despite the good news, challenges remain. Major tech companies have &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/deeplinks/2014/06/sudan-tech-sanctions-harm-innovation-development-us-government-and-corporations-must-act&quot;&gt;&lt;span&gt;historically been slow&lt;/span&gt;&lt;/a&gt;&lt;span&gt; to respond to sanctions relief, often erring on the side of over-compliance to avoid liability. Many of the financial and logistical barriers—such as payment processing, unreliable internet, and ongoing conflict—will not disappear overnight.&lt;/span&gt;&lt;/p&gt;
  1677. &lt;p&gt;&lt;span&gt;Moreover, the lifting of sanctions is not a blanket permission slip; it’s a cautious opening. Any future geopolitical shifts or changes in U.S. foreign policy could once again cut off access, creating an uncertain digital future for Syrians.&lt;/span&gt;&lt;/p&gt;
  1678. &lt;p&gt;&lt;span&gt;Nevertheless, by removing barriers imposed by sanctions, the U.S. is taking a step toward recognizing that access to technology is not a luxury, but a necessity—even in sanctioned or conflict-ridden countries.&lt;/span&gt;&lt;/p&gt;
  1679. &lt;p&gt;&lt;span&gt;For Syrian users, the lifting of tech sanctions is more than a bureaucratic change—it’s a door, long closed, beginning to open. And for the international tech community, it’s an opportunity to re-engage, responsibly and thoughtfully, with a population that has been cut off from essential services for too long.&lt;/span&gt;&lt;/p&gt;
  1680.  
  1681.  
  1682. &lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
  1683.     <pubDate>Thu, 12 Jun 2025 15:19:49 +0000</pubDate>
  1684. <guid isPermaLink="false">110796 at https://www.eff.org</guid>
  1685. <category domain="https://www.eff.org/issues/international">International</category>
  1686. <category domain="https://www.eff.org/issues/export-controls">Export Controls</category>
  1687. <category domain="https://www.eff.org/issues/free-speech">Free Speech</category>
  1688. <category domain="https://www.eff.org/issues/privacy">Privacy</category>
  1689. <dc:creator>Jillian C. York</dc:creator>
  1690. <enclosure url="https://www.eff.org/files/banner_library/laptop-spying_0.png" alt="" type="image/png" length="11826" />
  1691.  </item>
  1692.  <item>
  1693.    <title>EFFecting Change: Pride in Digital Freedom</title>
  1694.    <link>https://www.eff.org/deeplinks/2025/06/effecting-change-pride-digital-freedom</link>
  1695.    <description>&lt;div class=&quot;field field--name-body field--type-text-with-summary field--label-hidden&quot;&gt;&lt;div class=&quot;field__items&quot;&gt;&lt;div class=&quot;field__item even&quot;&gt;&lt;p&gt;Join us for our next EFFecting Change livestream this Thursday! We&#039;re talking about emerging laws and platform policies that affect the digital privacy and free expression rights of the LGBT+ community, and how this echoes the experience of marginalized people across the world.&lt;/p&gt;
  1696. &lt;p&gt;&lt;/p&gt;&lt;center&gt;&lt;strong&gt;EFFecting Change Livestream Series:&lt;/strong&gt;&lt;br /&gt;&lt;strong&gt;Pride in Digital Freedom&lt;/strong&gt;&lt;br /&gt;Thursday, June 12th&lt;br /&gt;4:00 PM - 5:00 PM Pacific - &lt;a href=&quot;https://dateful.com/eventlink/1181420983&quot;&gt;Check Local Time&lt;/a&gt;&lt;br /&gt;This event is LIVE and FREE!
  1697. &lt;p&gt;&lt;strong&gt;&lt;em&gt;&lt;a data-cke-saved-href=&quot;https://supporters.eff.org/civicrm/event/register?id=476&amp;amp;reset=1&quot; href=&quot;https://supporters.eff.org/civicrm/event/register?id=496&amp;amp;reset=1&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;&lt;img alt=&quot;RSVP Today&quot; height=&quot;51&quot; data-cke-saved-src=&quot;https://www.eff.org/files/2024/03/20/rsvptoday_0.png&quot; src=&quot;https://www.eff.org/files/2024/03/20/rsvptoday_0.png&quot; width=&quot;193&quot; /&gt;&lt;/a&gt;&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;
  1698. &lt;p&gt;&lt;/p&gt;&lt;/center&gt;
  1699. &lt;p&gt;Join our panel featuring EFF Senior Staff Technologist &lt;a href=&quot;https://www.eff.org/event/effecting-change-pride-digital-freedom#Daly&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;Daly Barnett&lt;/a&gt;, EFF Legislative Activist &lt;a href=&quot;https://www.eff.org/event/effecting-change-pride-digital-freedom#Rin&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;Rindala Alajaji&lt;/a&gt;, Chosen Family Law Center Senior Legal Director &lt;a href=&quot;https://www.eff.org/event/effecting-change-pride-digital-freedom#Andy&quot;&gt;Andy Izenson&lt;/a&gt;, and Woodhull Freedom Foundation Chief Operations Officer &lt;a href=&quot;https://www.eff.org/event/effecting-change-pride-digital-freedom#Mandy&quot;&gt;Mandy Salley&lt;/a&gt; while they discuss what is happening and what should change to protect digital freedom.&lt;/p&gt;
  1700. &lt;p&gt;&lt;a href=&quot;https://supporters.eff.org/civicrm/event/register?id=496&amp;amp;reset=1&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;&lt;div class=&quot;media media-element-container media-default&quot;&gt;&lt;div id=&quot;file-57758&quot; class=&quot;file file-image file-image-png&quot; class=&quot;file file-image file-image-png&quot;&gt;
  1701.  
  1702.        &lt;h2 class=&quot;element-invisible&quot;&gt;&lt;a href=&quot;/file/effectingchangepridesocialbannerpng&quot;&gt;effectingchangepride_social_banner.png&lt;/a&gt;&lt;/h2&gt;
  1703.    
  1704.  
  1705.  &lt;div class=&quot;content&quot;&gt;
  1706.    &lt;img style=&quot;display: block; margin-left: auto; margin-right: auto;&quot; class=&quot;media-element file-default&quot; data-delta=&quot;1&quot; src=&quot;https://www.eff.org/files/effectingchangepride_social_banner.png&quot; width=&quot;1200&quot; height=&quot;600&quot; alt=&quot;&quot; /&gt;  &lt;/div&gt;
  1707.  
  1708.  
  1709. &lt;/div&gt;
  1710. &lt;/div&gt;&lt;/a&gt;&lt;/p&gt;
  1711. &lt;p&gt;&lt;a href=&quot;https://supporters.eff.org/civicrm/event/register?id=496&amp;amp;reset=1&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;We hope you and your friends can join us live&lt;/a&gt;! Be sure to spread the word, and share our past livestreams.&lt;span&gt; &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/EFFectingChangeRecordings&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;Please note that all events will be recorded for later viewing on our YouTube page&lt;/a&gt;.&lt;/p&gt;
  1712. &lt;p&gt;&lt;span class=&quot;NormalTextRun SCXW212089369 BCX0&quot;&gt;Want to make sure you&lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;NormalTextRun SCXW212089369 BCX0&quot;&gt;don’t&lt;/span&gt;&lt;span class=&quot;NormalTextRun SCXW212089369 BCX0&quot;&gt;&lt;span&gt; &lt;/span&gt;miss our next livestream?&lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;NormalTextRun SCXW212089369 BCX0&quot;&gt;Here’s&lt;/span&gt;&lt;span class=&quot;NormalTextRun SCXW212089369 BCX0&quot;&gt;&lt;span&gt; &lt;/span&gt;a link to sign up for updates about this series:&lt;span&gt; &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/ECUpdates&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;eff.org/ECUpdates&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
  1713.  
  1714.  
  1715. &lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
  1716.     <pubDate>Thu, 12 Jun 2025 00:06:34 +0000</pubDate>
  1717. <guid isPermaLink="false">110792 at https://www.eff.org</guid>
  1718. <dc:creator>Melissa Srago</dc:creator>
  1719. <enclosure url="https://www.eff.org/files/banner_library/09_pride.png" alt="An orange tabby cat with yellow lightning markings in a blue spacesuit, wearing a jetpack, flying through pink and purple space. There are planets in the sky with colors representing a variety of pride flags." type="image/png" length="1051271" />
  1720.  </item>
  1721.  <item>
  1722.    <title>Congress Can Act Now to Protect Reproductive Health Data</title>
  1723.    <link>https://www.eff.org/deeplinks/2025/06/congress-can-act-now-protect-reproductive-health-data</link>
  1724.    <description>&lt;div class=&quot;field field--name-body field--type-text-with-summary field--label-hidden&quot;&gt;&lt;div class=&quot;field__items&quot;&gt;&lt;div class=&quot;field__item even&quot;&gt;&lt;p&gt;&lt;span&gt;State, federal, and international regulators are increasingly concerned about the harms they believe the internet and new technology are causing to users of all categories. Lawmakers are currently considering many proposals that are intended to provide protections to the most vulnerable among us. Too often, however, those proposals do not carefully consider the likely unintended consequences or even whether the law will actually reduce the harms it’s supposed to target. That’s why EFF supports &lt;a href=&quot;https://sarajacobs.house.gov/news/press-releases/rep-jacobs-sens-hirono-and-wyden-reintroduce-bill-to-protect-reproductive-and-sexual-health-data?adfadf&quot;&gt;Rep. Sara Jacobs’ newly reintroduced “My Body, My Data&quot; Act&lt;/a&gt;, which will protect the privacy and safety of people seeking reproductive health care, while maintaining important constitutional protections and avoiding any erosion of end-to-end encryption. &lt;/span&gt;&lt;/p&gt;
  1725. &lt;p class=&quot;take-action&quot;&gt;&lt;a href=&quot;https://act.eff.org/action/congress-can-act-now-to-protect-reproductive-health-data&quot;&gt;Take Action&lt;/a&gt;&lt;/p&gt;
  1726. &lt;p class=&quot;take-action take-explainer&quot;&gt;Tell Congress to Protect Reproductive Health Data&lt;/p&gt;
  1727. &lt;p&gt;&lt;span&gt;Privacy fears should never stand in the way of healthcare. That&#039;s why this common-sense bill will require businesses and non-governmental organizations to act responsibly with personal information concerning reproductive health care. Specifically, it restricts them from collecting, using, retaining, or disclosing reproductive health information that isn&#039;t essential to providing the service someone requests.&lt;/span&gt;&lt;/p&gt;
  1728. &lt;p class=&quot;pull-quote&quot;&gt;&lt;span&gt;The bill would protect people who use fertility or period-tracking apps or are seeking information about reproductive health services.&lt;/span&gt;&lt;/p&gt;
  1729. &lt;p&gt;&lt;span&gt;These restrictions apply to companies that collect personal information related to a person’s reproductive or sexual health. That includes data related to pregnancy, menstruation, surgery, termination of pregnancy, contraception, basal body temperature or diagnoses. The bill would protect people who, for example, use fertility or period-tracking apps or are seeking information about reproductive health services. &lt;/span&gt;&lt;/p&gt;
  1730. &lt;p&gt;&lt;span&gt;We are proud to join Planned Parenthood Federation of America, Reproductive Freedom for All, Physicians for Reproductive Health, National Partnership for Women &amp;amp; Families, National Women’s Law Center,  Center for Democracy and Technology, Electronic Privacy Information Center, National Abortion Federation, Catholics for Choice, National Council for Jewish Women, Power to Decide, United for Reproductive &amp;amp; Gender Equity, Indivisible, Guttmacher, National Network of Abortion Funds, and All* Above All in support of this bill. &lt;/span&gt;&lt;/p&gt;
  1731. &lt;p&gt;&lt;span&gt;In addition to the restrictions on company data processing, this bill also provides people with necessary rights to access and delete their reproductive health information. Companies must also publish a privacy policy, so that everyone can understand what information companies process and why. It also ensures that companies are held to public promises they make about data protection and gives the Federal Trade Commission the authority to hold them to account if they break those promises. &lt;/span&gt;&lt;/p&gt;
  1732. &lt;p&gt;&lt;span&gt;The bill also lets people take on companies that violate their privacy with a strong private right of action. Empowering people to bring their own lawsuits not only places more control in the individual&#039;s hands, but also ensures that companies will not take these regulations lightly. &lt;/span&gt;&lt;/p&gt;
  1733. &lt;p&gt;&lt;span&gt;Finally, while Rep. Jacobs&#039; bill establishes an important national privacy foundation for everyone, it also leaves room for states to pass stronger or complementary laws to protect the data privacy of those seeking reproductive health care. &lt;/span&gt;&lt;/p&gt;
  1734. &lt;p&gt;&lt;span&gt;We thank Rep. Jacobs and Sens. Mazie Hirono and Ron Wyden for taking up this important bill, &lt;a href=&quot;https://www.congress.gov/bill/119th-congress/house-bill/3916?s=1&amp;amp;r=2&quot;&gt;H.R. 3916&lt;/a&gt;, and using it as an opportunity not only to protect those seeking reproductive health care, but also highlight why data privacy is an important element of reproductive justice. &lt;/span&gt;&lt;/p&gt;
  1735. &lt;p class=&quot;take-action&quot;&gt;&lt;a href=&quot;https://act.eff.org/action/congress-can-act-now-to-protect-reproductive-health-data&quot;&gt;Take Action&lt;/a&gt;&lt;/p&gt;
  1736. &lt;p class=&quot;take-action take-explainer&quot;&gt;Tell Congress to Protect Reproductive Health Data&lt;/p&gt;
  1737.  
  1738. &lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
  1739.     <pubDate>Wed, 11 Jun 2025 22:58:14 +0000</pubDate>
  1740. <guid isPermaLink="false">110794 at https://www.eff.org</guid>
  1741. <dc:creator>India McKinney</dc:creator>
  1742. <dc:creator>Hayley Tsukayama</dc:creator>
  1743. <enclosure url="https://www.eff.org/files/banner_library/repro-rights-hd-2.jpg" alt="a female figure with ultrasound revealing security icon" type="image/jpeg" length="371102" />
  1744.  </item>
  1745.  <item>
  1746.    <title>Oppose STOP CSAM: Protecting Kids Shouldn’t Mean Breaking the Tools That Keep Us Safe</title>
  1747.    <link>https://www.eff.org/deeplinks/2025/06/oppose-stop-csam-protecting-kids-shouldnt-mean-breaking-tools-keep-us-safe</link>
  1748.    <description>&lt;div class=&quot;field field--name-body field--type-text-with-summary field--label-hidden&quot;&gt;&lt;div class=&quot;field__items&quot;&gt;&lt;div class=&quot;field__item even&quot;&gt;&lt;p&gt;&lt;span&gt;A Senate bill re-introduced this week threatens security and free speech on the internet. EFF urges Congress to reject the STOP CSAM Act of 2025 (&lt;/span&gt;&lt;a href=&quot;https://www.congress.gov/bill/119th-congress/senate-bill/1829/text?s=1&amp;amp;r=1&amp;amp;q=%7B%22search%22%3A%22S.1829%22%7D&quot;&gt;&lt;span&gt;S. 1829&lt;/span&gt;&lt;/a&gt;&lt;span&gt;), which would undermine services offering end-to-end encryption and force internet companies to take down lawful user content.   &lt;/span&gt;&lt;/p&gt;
  1749. &lt;p class=&quot;take-action&quot;&gt;&lt;a href=&quot;https://act.eff.org/action/tell-congress-don-t-outlaw-encrypted-applications&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;TAKE ACTION&lt;/a&gt;&lt;/p&gt;
  1750. &lt;p class=&quot;take-explainer&quot;&gt;&lt;a href=&quot;https://act.eff.org/action/tell-congress-don-t-outlaw-encrypted-applications&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;Tell Congress Not to Outlaw Encrypted Apps&lt;/a&gt;&lt;/p&gt;
  1751. &lt;p&gt;&lt;span&gt;&lt;/span&gt;&lt;/p&gt;
  1752. &lt;p&gt;&lt;span&gt;As in the version introduced &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/deeplinks/2023/04/stop-csam-act-would-put-security-and-free-speech-risk&quot;&gt;&lt;span&gt;last Congress&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, S. 1829 purports to limit the online spread of child sexual abuse material (CSAM), also known as child pornography. CSAM is already highly illegal. Existing law already requires online service providers who have actual knowledge of “apparent” CSAM on their platforms to report that content to the National Center for Missing and Exploited Children (NCMEC). NCMEC then forwards actionable reports to law enforcement agencies for investigation.  &lt;/span&gt;&lt;/p&gt;
  1753. &lt;p&gt;&lt;span&gt;S. &lt;/span&gt;&lt;span&gt;1829 goes much further than current law and threatens to punish any service that works to keep its users secure, including those that do their best to eliminate and report CSAM. The bill applies to “interactive computer services,” which broadly includes private messaging and email apps, social media platforms, cloud storage providers, and many other internet intermediaries and online service providers. &lt;/span&gt;&lt;/p&gt;
  1754. &lt;h3&gt;The Bill Threatens End-to-End Encryption&lt;/h3&gt;
  1755. &lt;p&gt;&lt;span&gt;The bill makes it a crime to intentionally “host or store child pornography” or knowingly “promote or facilitate” the sexual exploitation of children. The bill also opens the door for civil lawsuits against providers for the intentional, knowing or even reckless “promotion or facilitation” of conduct relating to child exploitation, the “hosting or storing of child pornography,” or for “making child pornography available to any person.”  &lt;/span&gt;&lt;/p&gt;
  1756. &lt;p&gt;&lt;span&gt;The terms “promote” and “facilitate” are broad, and civil liability may be imposed based on a low recklessness state of mind standard. This means a court can find an app or website liable for hosting CSAM even if the app or website did not even know it was hosting CSAM, including because the provider employed end-to-end encryption and could not view the contents of content uploaded by users.&lt;/span&gt;&lt;/p&gt;
  1757. &lt;p&gt;&lt;b&gt;Creating new criminal and civil claims against providers based on broad terms and low standards will undermine digital security for all internet users.&lt;/b&gt;&lt;span&gt; Because the law already prohibits the distribution of CSAM, the bill’s broad terms could be interpreted as reaching more passive conduct, like merely providing an encrypted app.  &lt;/span&gt;&lt;/p&gt;
  1758. &lt;p&gt;&lt;span&gt;Due to the nature of their services, encrypted communications providers who receive a notice of CSAM may be deemed to have “knowledge” under the criminal law even if they cannot verify and act on that notice. And there is little doubt that plaintiffs’ lawyers will (wrongly) argue that merely providing an encrypted service that can be used to store any image—not necessarily CSAM—recklessly facilitates the sharing of illegal content.  &lt;/span&gt;&lt;/p&gt;
  1759. &lt;h3&gt;&lt;b&gt;Affirmative Defense Is Expensive and Insufficient &lt;/b&gt;&lt;/h3&gt;
  1760. &lt;p&gt;&lt;span&gt;While the bill includes an affirmative defense that a provider can raise if it is “technologically impossible” to remove the CSAM without “compromising encryption,” it is not sufficient to protect our security. Online services that offer encryption shouldn’t have to face the impossible task of proving a negative in order to avoid lawsuits over content they can’t see or control. &lt;/span&gt;&lt;/p&gt;
  1761. &lt;p&gt;&lt;span&gt;First, by making this protection an affirmative defense, providers must still defend against litigation, with significant costs to their business. Not every platform will have the resources to fight these threats in court, especially newcomers that compete with entrenched giants like Meta and Google. Encrypted platforms should not have to rely on prosecutorial discretion or favorable court rulings after protracted litigation. Instead, specific exemptions for encrypted providers should be addressed in the text of the bill.  &lt;/span&gt;&lt;/p&gt;
  1762. &lt;p&gt;&lt;span&gt;Second, although technologies like &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/deeplinks/2019/11/why-adding-client-side-scanning-breaks-end-end-encryption&quot;&gt;&lt;span&gt;client-side scanning break encryption&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, &lt;/span&gt;&lt;span&gt;members of Congress have &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/document/earn-it-act-myths-and-facts-document&quot;&gt;&lt;span&gt;misleadingly claimed otherwise. &lt;/span&gt;&lt;/a&gt;&lt;span&gt;Plaintiffs are likely to argue that providers who do not use these techniques are acting recklessly, leading many apps and websites to scan all of the content on their platforms and remove any content that a state court could find, even wrongfully, is CSAM.&lt;/span&gt;&lt;/p&gt;
  1763. &lt;p class=&quot;take-action&quot;&gt;&lt;a href=&quot;https://act.eff.org/action/tell-congress-don-t-outlaw-encrypted-applications&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;TAKE ACTION&lt;/a&gt;&lt;/p&gt;
  1764. &lt;p class=&quot;take-explainer&quot;&gt;&lt;a href=&quot;https://act.eff.org/action/tell-congress-don-t-outlaw-encrypted-applications&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;Tell Congress Not to Outlaw Encrypted Apps&lt;/a&gt;&lt;/p&gt;
  1765.  
  1766. &lt;h3&gt;&lt;b&gt;The Bill Threatens Free Speech by Creating a New Exception to Section 230 &lt;/b&gt;&lt;/h3&gt;
  1767. &lt;p&gt;&lt;span&gt;The bill allows a new type of lawsuit to be filed against internet platforms, accusing them of “facilitating” child sexual exploitation based on the speech of others. It does this by creating an exception to &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/issues/cda230&quot;&gt;&lt;span&gt;Section 230&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, the foundational law of the internet and online speech. &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/issues/cda230&quot;&gt;&lt;span&gt;Section 230&lt;/span&gt;&lt;/a&gt;&lt;span&gt; provides partial immunity to internet intermediaries when sued over content posted by their users. Without that protection, platforms are much more likely to aggressively monitor and censor users.&lt;/span&gt;&lt;/p&gt;
  1768. &lt;p&gt;Section 230 creates the legal breathing room for internet intermediaries to create online spaces for people to freely communicate around the world, with low barriers to entry. However, creating a new exception that exposes providers to more lawsuits will cause them to limit that legal exposure. Online services will censor more and more user content and accounts, with minimal regard as to whether that content is in fact legal. Some platforms may even be forced to shut down or may not even get off the ground in the first place, for fear of being swept up in a flood of litigation and claims around alleged CSAM. On balance, this harms all internet users who rely on intermediaries to connect with their communities and the world at large. &lt;/p&gt;
  1769.  
  1770. &lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
  1771.     <pubDate>Tue, 10 Jun 2025 23:08:57 +0000</pubDate>
  1772. <guid isPermaLink="false">110788 at https://www.eff.org</guid>
  1773. <category domain="https://www.eff.org/issues/end-end-encryption">End-to-End Encryption</category>
  1774. <category domain="https://www.eff.org/issues/privacy">Privacy</category>
  1775. <dc:creator>India McKinney</dc:creator>
  1776. <enclosure url="https://www.eff.org/files/banner_library/keys-crossed-pink-starburst_0.png" alt="" type="image/png" length="20659" />
  1777.  </item>
  1778.  <item>
  1779.    <title>Despite Changes, A.B. 412 Still Harms Small Developers</title>
  1780.    <link>https://www.eff.org/deeplinks/2025/06/despite-changes-ab-412-still-harms-small-developers</link>
  1781.    <description>&lt;div class=&quot;field field--name-body field--type-text-with-summary field--label-hidden&quot;&gt;&lt;div class=&quot;field__items&quot;&gt;&lt;div class=&quot;field__item even&quot;&gt;&lt;p&gt;&lt;span&gt;California lawmakers are continuing to promote a bill that will reinforce the power of giant AI companies by burying small AI companies and non-commercial developers in red tape, copyright demands and potentially, lawsuits. After several amendments, the bill hasn’t improved much, and in some ways has actually gotten worse. If A.B. 412 is passed, it will make California’s economy less innovative, and less competitive. &lt;/span&gt;&lt;/p&gt;
  1782. &lt;h3&gt;&lt;b&gt;The Bill Threatens Small Tech Companies&lt;/b&gt;&lt;/h3&gt;
  1783. &lt;p&gt;&lt;span&gt;A.B. 412 masquerades as a transparency bill, but it’s actually a government-mandated “reading list” that will allow rights holders to file a new type of lawsuit in state court, even as the federal courts continue to assess whether and how federal copyright law applies to the development of generative AI technologies. &lt;/span&gt;&lt;/p&gt;
  1784. &lt;p&gt;&lt;span&gt;The bill would require developers—even two-person startups— to keep lists of training materials that are “registered, &lt;/span&gt;&lt;a href=&quot;https://www.copyright.gov/prereg/&quot;&gt;&lt;span&gt;pre-registered&lt;/span&gt;&lt;/a&gt;&lt;span&gt; or indexed” with the U.S. Copyright Office, and help rights holders create digital ‘fingerprints’ of those works—a technical task with no established standards and no realistic path for small teams to follow. Even if it were limited to registered copyrighted material, that’s a monumental task, as we &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/deeplinks/2025/03/californias-ab-412-bill-could-crush-startups-and-cement-big-tech-ai-monopoly&quot;&gt;&lt;span&gt;explained in March&lt;/span&gt;&lt;/a&gt;&lt;span&gt; when we examined the earlier text of A.B. 412. &lt;/span&gt;&lt;/p&gt;
  1785. &lt;p&gt;&lt;span&gt;The bill’s amendments have made compliance even harder, since it now requires technologists to go beyond copyrighted material and somehow identify “pre-registered” copyrights. The amended bill also has new requirements that demand technologists document and keep track of when they look at works that aren’t copyrighted but are subject to exclusive rights, such as pre-1972 sound recordings—rights that, not coincidentally, are primarily controlled by large entertainment companies. &lt;/span&gt;&lt;/p&gt;
  1786. &lt;p&gt;&lt;span&gt;The penalties for noncompliance are steep—up to $1,000 per day per violation—putting small developers at enormous financial risk even for accidental lapses.&lt;/span&gt;&lt;/p&gt;
  1787. &lt;p&gt;&lt;span&gt;The goal of this list is clear: for big content companies to more easily file lawsuits against software developers, big and small. And for most AI developers, the burden will be crushing. Under A.B. 412, a two-person startup building an open-source chatbot, or an indie developer fine-tuning a language model for disability access, would face the same compliance burdens as Google or Meta. &lt;/span&gt;&lt;/p&gt;
  1788. &lt;h3&gt;&lt;b&gt;Reading and Analyzing The Open Web Is Not a Crime &lt;/b&gt;&lt;/h3&gt;
  1789. &lt;p&gt;&lt;span&gt;It’s critical to remember that AI training is very likely protected by fair use under U.S. copyright law—a point that’s still being worked out in the courts. The idea that we should preempt that process with sweeping state regulation is not just premature; it’s dangerous.&lt;/span&gt;&lt;/p&gt;
  1790. &lt;p&gt;&lt;span&gt;It’s also worth noting that copyright is governed by federal law. Federal courts are already working to define the boundaries of fair use and copyright in the AI context—the California legislature should let them do their job. A.B. 412 tries to create a state-level regulatory scheme in an area that belongs in federal hands—a risky legal overreach that could further complicate an already unsettled policy space.&lt;/span&gt;&lt;/p&gt;
  1791. &lt;p&gt;&lt;span&gt;A.B. 412 is a solution in search of a problem. The courthouse doors are far from closed to content owners who want to dispute the use of their copyrighted works. There are multiple high-profile litigations over the copyright status of AI training works that are working their way through trial courts and appeal courts right now. &lt;/span&gt;&lt;/p&gt;
  1792. &lt;h3&gt;&lt;b&gt;Scope Creep&lt;/b&gt;&lt;/h3&gt;
  1793. &lt;p&gt;&lt;span&gt;Rather than narrowing its focus to make compliance more realistic, the latest amendments to A.B. 412 actually expand the scope of covered works. The bill now demands documentation of obscure categories of content like pre-1972 sound recordings. These recordings have rights that are often murky, and largely controlled by major media companies.&lt;/span&gt;&lt;/p&gt;
  1794. &lt;p&gt;&lt;span&gt;The bill also adds “preregistered” and indexed works to its coverage. Preregistration, designed to help entertainment companies punish unauthorized copying even before commercial release, expands the universe of content that developers must track—without offering any meaningful help to small creators. &lt;/span&gt;&lt;/p&gt;
  1795. &lt;h3&gt;&lt;b&gt;A Moat Serving Big Tech&lt;/b&gt;&lt;/h3&gt;
  1796. &lt;p&gt;&lt;span&gt;Ironically, the companies that will benefit most from A.B. 412 are the very same large tech firms that lawmakers often claim they want to regulate. Big companies can hire teams of lawyers and compliance officers to handle these requirements. Small developers? They’re more likely to shut down, sell out, or never enter the field in the first place.&lt;/span&gt;&lt;/p&gt;
  1797. &lt;p&gt;&lt;span&gt;This bill doesn’t create a fairer marketplace. It builds a regulatory moat around the incumbents, locking out new competitors and ensuring that only a handful of companies have the resources to develop advanced AI systems. Truly innovative technology often comes from unknown or small companies, but A.B. 412 threatens to turn California—and anyone who does business there—into a fortress where only the biggest players survive.&lt;/span&gt;&lt;/p&gt;
  1798. &lt;h3&gt;&lt;b&gt;A Lopsided Bill &lt;/b&gt;&lt;/h3&gt;
  1799. &lt;p&gt;&lt;span&gt;A.B. 412 is becoming an increasingly extreme and one-sided piece of legislation. It’s a maximalist wishlist for legacy rights-holders, delivered at the expense of small developers and the public. The result will be less competition, less innovation, and fewer choices for consumers—not more protection for creators.&lt;/span&gt;&lt;/p&gt;
  1800. &lt;p&gt;&lt;span&gt;This new version does close a few loopholes, and expands the period for AI developers to respond to copyright demands from 7 days to 30 days. But it seriously fails to close others: for instance, the exemption for noncommercial development applies only to work done “exclusively for noncommercial academic or governmental” institutions. That still leaves a huge window to sue hobbyists and independent researchers who don’t have university or government jobs. &lt;/span&gt;&lt;/p&gt;
  1801. &lt;p&gt;&lt;span&gt;While the bill nominally exempts developers who use only public or developer-owned data, that’s a carve-out with no practical value. Like a search engine, nearly every meaningful AI system relies on mixed sources — and developers can’t realistically track the copyright status of them all.&lt;/span&gt;&lt;/p&gt;
  1802. &lt;p&gt;&lt;span&gt;At its core, A.B. 412 is a flawed bill that would harm the whole U.S. tech ecosystem. Lawmakers should be advancing policies that protect privacy, promote competition, and ensure that innovation benefits the public—not just a handful of entrenched interests.&lt;/span&gt;&lt;/p&gt;
  1803. &lt;p&gt;&lt;span&gt;If you’re a California resident, now is the time to speak out. &lt;/span&gt;&lt;a href=&quot;https://findyourrep.legislature.ca.gov/&quot;&gt;&lt;span&gt;Tell your legislators&lt;/span&gt;&lt;/a&gt;&lt;span&gt; that A.B. 412 will hurt small companies, help big tech, and lock California’s economy in the past.&lt;/span&gt;&lt;/p&gt;
  1804.  
  1805. &lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
  1806.     <pubDate>Tue, 10 Jun 2025 22:07:32 +0000</pubDate>
  1807. <guid isPermaLink="false">110787 at https://www.eff.org</guid>
  1808. <category domain="https://www.eff.org/issues/innovation">Creativity &amp; Innovation</category>
  1809. <dc:creator>Joe Mullin</dc:creator>
  1810. <enclosure url="https://www.eff.org/files/banner_library/robotai.png" alt="A robot painting a self-portrait" type="image/png" length="177967" />
  1811.  </item>
  1812.  <item>
  1813.    <title>35 Years for Your Freedom Online</title>
  1814.    <link>https://www.eff.org/deeplinks/2025/06/35-years-internet-freedom</link>
  1815.    <description>&lt;div class=&quot;field field--name-body field--type-text-with-summary field--label-hidden&quot;&gt;&lt;div class=&quot;field__items&quot;&gt;&lt;div class=&quot;field__item even&quot;&gt;&lt;p&gt;Once upon a time we were promised flying cars and jetpacks. Yet we&#039;ve arrived at a more complicated timeline where rights advocates can find themselves defending our hard-earned freedoms more often than shooting for the moon. &lt;em&gt;In tough times, it&#039;s important to remember that your vision for the future can be just as valuable as the work you do now.&lt;/em&gt;&lt;/p&gt;
  1816. &lt;p&gt;Thirty-five years ago, a small group of folks saw the coming digital future and banded together to ensure that technology would empower people, not oppress them—and EFF was born. While the dangers of corporate and state forces grew alongside the internet, EFF and supporters like you faithfully rose to the occasion. &lt;a href=&quot;https://eff.org/r.76bz&quot;&gt;Will you help celebrate EFF’s 35th anniversary and donate in support of digital freedom?&lt;/a&gt;&lt;/p&gt;
  1817. &lt;p class=&quot;take-action&quot;&gt;&lt;a href=&quot;https://eff.org/r.76bz&quot;&gt;Give today&lt;/a&gt;&lt;/p&gt;
  1818. &lt;p class=&quot;take-explainer&quot;&gt;Protect Online Privacy &amp;amp; Free Expression&lt;/p&gt;
  1819. &lt;p&gt;Together we’ve won many fights for encryption, free speech, innovation, and privacy online. Yet it’s plain to see that we must keep advocating for technology users whether that’s in the courts, before lawmakers, educating the public, or creating privacy-enhancing tools. EFF members make it possible—you can lend a hand and get some great perks!&lt;/p&gt;
  1820. &lt;h2&gt;Summer Swag Is Here&lt;/h2&gt;
  1821. &lt;p&gt;We love making stuff for EFF’s members each year. It’s our way of saying thanks for supporting the mission for your rights online, and I hope it’s your way of starting a conversation about internet freedom with people in your life.&lt;/p&gt;
  1822. &lt;p&gt;&lt;/p&gt;&lt;center&gt;&lt;div class=&quot;media media-element-container media-default&quot;&gt;&lt;div id=&quot;file-57747&quot; class=&quot;file file-image file-image-jpeg&quot; class=&quot;file file-image file-image-jpeg&quot;&gt;
  1823.  
  1824.        &lt;h2 class=&quot;element-invisible&quot;&gt;&lt;a href=&quot;/file/shirts-both-necklines-wider-square-750pxjpg&quot;&gt;shirts-both-necklines-wider-square-750px.jpg&lt;/a&gt;&lt;/h2&gt;
  1825.    
  1826.  
  1827.  &lt;div class=&quot;content&quot;&gt;
  1828.    &lt;img title=&quot;Get free EFF 35th Anniversary swag when you join!&quot; class=&quot;media-element file-default&quot; data-delta=&quot;4&quot; src=&quot;https://kittens.eff.org/files/2025/06/05/shirts-both-necklines-wider-square-750px.jpg&quot; width=&quot;750&quot; height=&quot;750&quot; alt=&quot;&quot; /&gt;  &lt;/div&gt;
  1829.  
  1830.  
  1831. &lt;/div&gt;
  1832. &lt;/div&gt;&lt;/center&gt;
  1833. &lt;p&gt;Celebrate EFF&#039;s 35th Anniversary in the digital rights movement with this &lt;a href=&quot;https://www.eff.org/files/2025/05/29/shop-2025-mem-shirt-art_700px.png&quot;&gt;EFF35 Cityscape member t-shirt by Hugh D’Andrade&lt;/a&gt;! EFF has a not-so-secret weapon that keeps us in the fight even when the odds are against us: &lt;em&gt;we never lose sight of our vision for a better future.&lt;/em&gt; &lt;a href=&quot;https://eff.org/r.76bz&quot;&gt;Choose a roomy Classic Fit Crewneck or a soft Slim Fit V-Neck.&lt;/a&gt;&lt;/p&gt;
  1834. &lt;p&gt;&lt;/p&gt;&lt;center&gt;&lt;div class=&quot;media media-element-container media-default&quot;&gt;&lt;div id=&quot;file-57746&quot; class=&quot;file file-image file-image-jpeg&quot; class=&quot;file file-image file-image-jpeg&quot;&gt;
  1835.  
  1836.        &lt;h2 class=&quot;element-invisible&quot;&gt;&lt;a href=&quot;/file/hoodie-front-back-alt-square-750pxjpg&quot;&gt;hoodie-front-back-alt-square-750px.jpg&lt;/a&gt;&lt;/h2&gt;
  1837.    
  1838.  
  1839.  &lt;div class=&quot;content&quot;&gt;
  1840.    &lt;img title=&quot;Motherboard Hooded Sweatshirt for Titanium Level Members&quot; class=&quot;media-element file-default&quot; data-delta=&quot;5&quot; src=&quot;https://kittens.eff.org/files/2025/06/05/hoodie-front-back-alt-square-750px.jpg&quot; width=&quot;750&quot; height=&quot;750&quot; alt=&quot;&quot; /&gt;  &lt;/div&gt;
  1841.  
  1842.  
  1843. &lt;/div&gt;
  1844. &lt;/div&gt;&lt;/center&gt;
  1845. &lt;p&gt;And enjoy Lovelace-Klimtian vibes on EFF’s new &lt;a href=&quot;https://www.eff.org/files/2025/06/02/hoodie-details-back-square-750px.jpg&quot;&gt;Motherboard Hooded Sweatshirt by Shirin Mori&lt;/a&gt;. Gold details and orange poppies pop on lush forest green. Don&#039;t lose the forest for the trees—keep fighting for a world where tech supports people irl.&lt;/p&gt;
  1846. &lt;h2&gt;Join the Sustaining Donor Challenge (it’s easy)&lt;/h2&gt;
  1847. &lt;p&gt;You&#039;ll get a numbered &lt;a href=&quot;https://eff.org/coin&quot;&gt;EFF35 Challenge Coin&lt;/a&gt; when you become a &lt;a href=&quot;https://eff.org/r.d98c&quot;&gt;monthly&lt;/a&gt; or &lt;a href=&quot;https://eff.org/r.13hk&quot;&gt;annual&lt;/a&gt; Sustaining Donor by &lt;del&gt;July 10&lt;/del&gt; &lt;strong&gt;August 11, 2025&lt;/strong&gt;. It’s that simple.&lt;/p&gt;
  1848. &lt;p&gt;If you&#039;re already a Sustaining Donor—THANKS! You too can get an EFF 35th Anniversary Challenge Coin when you upgrade your donation. Just increase your monthly or annual gift and &lt;a href=&quot;mailto:upgrade@eff.org?subject=Sustaining%20Donor%20Upgrade&amp;amp;amp;body=Item%20(size%20%26%20style%20if%20applicable)%3A%20%0A%0AShipping%20Address%3A%20&quot;&gt;let us know by emailing upgrade@eff.org&lt;/a&gt;. Get started at &lt;a class=&quot;theme markdown__link&quot; href=&quot;https://eff.org/recurring&quot; rel=&quot;noopener noreferrer&quot; target=&quot;_blank&quot;&gt;&lt;span&gt;eff.org/recurring&lt;/span&gt;&lt;/a&gt;. If you used PayPal, just &lt;a class=&quot;theme markdown__link&quot; href=&quot;https://www.paypal.com/myaccount/autopay&quot; rel=&quot;noopener noreferrer&quot; target=&quot;_blank&quot;&gt;&lt;span&gt;cancel your current recurring donation&lt;/span&gt;&lt;/a&gt; and then go to eff.org to &lt;a class=&quot;theme markdown__link&quot; href=&quot;https://eff.org/r.d98c&quot; rel=&quot;noopener noreferrer&quot; target=&quot;_blank&quot;&gt;&lt;span&gt;start a new upgraded recurring donation&lt;/span&gt;&lt;/a&gt;.&lt;/p&gt;
  1849. &lt;p&gt;&lt;/p&gt;&lt;center&gt;&lt;div class=&quot;media media-element-container media-default&quot;&gt;&lt;div id=&quot;file-57725&quot; class=&quot;file file-image file-image-jpeg&quot; class=&quot;file file-image file-image-jpeg&quot;&gt;
  1850.  
  1851.        &lt;h2 class=&quot;element-invisible&quot;&gt;&lt;a href=&quot;/file/coincat1200pxjpg&quot;&gt;coin_cat_1200px.jpg&lt;/a&gt;&lt;/h2&gt;
  1852.    
  1853.  
  1854.  &lt;div class=&quot;content&quot;&gt;
  1855.    &lt;img title=&quot;EFF35 Challenge Coin for monthly &amp;amp; annual donors (kitty not included).&quot; class=&quot;media-element file-default&quot; data-delta=&quot;2&quot; src=&quot;https://kittens.eff.org/files/2025/06/02/coin_cat_1200px.jpg&quot; width=&quot;1200&quot; height=&quot;900&quot; alt=&quot;&quot; /&gt;  &lt;/div&gt;
  1856.  
  1857.  
  1858. &lt;/div&gt;
  1859. &lt;/div&gt;&lt;/center&gt;
  1860. &lt;p&gt;Support internet freedom with a no-fuss automated recurring donation! Over 30% of EFF members have &lt;a href=&quot;https://eff.org/r.d98c&quot;&gt;joined as Sustaining Donors&lt;/a&gt; to defend digital rights (and get some great swag every year). Challenge coins follow a long tradition of offering a symbol of kinship and respect for great achievements—and EFF owes its strength to technology creators and users like you.&lt;/p&gt;
  1861. &lt;p&gt;With your help, EFF is here to stay.&lt;/p&gt;
  1862. &lt;p class=&quot;take-action&quot;&gt;&lt;a href=&quot;https://eff.org/r.76bz&quot;&gt;Join EFF&lt;/a&gt;&lt;/p&gt;
  1863. &lt;p class=&quot;take-explainer&quot;&gt;Protect Online Privacy &amp;amp; Free Expression&lt;/p&gt;
  1864.  
  1865.  
  1866. &lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
  1867.     <pubDate>Tue, 10 Jun 2025 07:04:46 +0000</pubDate>
  1868. <guid isPermaLink="false">110762 at https://www.eff.org</guid>
  1869. <dc:creator>Aaron Jue</dc:creator>
  1870. <enclosure url="https://www.eff.org/files/banner_library/circuit-city-og-static.png" alt="Green EFF 35th Anniversary digital cityscape on a black background." type="image/png" length="189965" />
  1871.  </item>
  1872.  <item>
  1873.    <title>NYC Lets AI Gamble with Child Welfare</title>
  1874.    <link>https://www.eff.org/deeplinks/2025/06/nyc-lets-ai-gamble-child-welfare</link>
  1875.    <description>&lt;div class=&quot;field field--name-body field--type-text-with-summary field--label-hidden&quot;&gt;&lt;div class=&quot;field__items&quot;&gt;&lt;div class=&quot;field__item even&quot;&gt;&lt;p&gt;The Markup revealed in its &lt;a href=&quot;https://themarkup.org/investigations/2025/05/20/the-nyc-algorithm-deciding-which-families-are-under-watch-for-child-abuse&quot;&gt;reporting&lt;/a&gt; last month that New York City’s Administration for Children’s Services (ACS) has been quietly deploying an algorithmic tool to categorize families as “high risk&quot;. Using a grab-bag of factors like neighborhood and mother’s age, this AI tool can put families under intensified scrutiny without proper justification and oversight.&lt;/p&gt;
  1876. &lt;p&gt;ACS knocking on your door is a nightmare for any parent, with the risk that any mistakes can break up your family and have your children sent to the foster care system. Putting a family under such scrutiny shouldn’t be taken lightly and shouldn’t be a testing ground for  automated decision-making by the government.&lt;/p&gt;
  1877. &lt;p&gt; This “AI” tool, developed internally by ACS’s Office of Research Analytics, scores families for “risk” using 279 variables and subjects those deemed highest-risk to intensified scrutiny. The lack of transparency, accountability, or due process protections demonstrates that ACS has learned nothing from the failures of similar products in the realm of child services.&lt;/p&gt;
  1878. &lt;p&gt;The algorithm operates in complete secrecy and the harms from this opaque “AI theater” are not theoretical. The 279 variables are derived only from cases back in 2013 and 2014 where children were seriously harmed. However, it is unclear how many cases were analyzed, what, if any, kind of auditing and testing was conducted, and whether including of data from other years would have altered the scoring.&lt;/p&gt;
  1879. &lt;p&gt;What we do know is disturbing: Black families in NYC face ACS investigations at &lt;a href=&quot;https://www.nyclu.org/report/racism-every-stage-data-shows-how-nycs-administration-childrens-services-discriminates&quot;&gt;seven times the rate&lt;/a&gt; of white families and ACS staff has admitted that the agency is &lt;a href=&quot;https://www.nytimes.com/2022/11/22/nyregion/nyc-acs-racism-abuse-neglect.html&quot;&gt;more punitive&lt;/a&gt; towards Black families, with parents and advocates calling its practices “&lt;a href=&quot;https://www.nytimes.com/2022/11/22/nyregion/nyc-acs-racism-abuse-neglect.html&quot;&gt;predatory&lt;/a&gt;.” It is likely that the algorithm effectively automates and amplifies this discrimination.&lt;/p&gt;
  1880. &lt;p&gt;Despite the disturbing lack of transparency and accountability, ACS’s usage of this system has subjected families that this system ranks as “highest risk” to additional scrutiny, including possible home visits, calls to teachers and family, or consultations with outside experts. But those families, their attorneys, and even caseworkers don&#039;t know when and why the system flags a case, making it difficult to challenge the circumstances or process that leads to this intensified scrutiny.&lt;/p&gt;
  1881. &lt;p&gt;This is not the only incidence in which usage of AI tools in the child services system has encountered issues with systemic biases. Back in 2022, the &lt;a href=&quot;https://apnews.com/article/child-welfare-algorithm-investigation-9497ee937e0053ad4144a86c68241ef1&quot;&gt;Associated Press reported&lt;/a&gt; that Carnegie Mellon researchers found that from August 2016 to May 2018, Allegheny County in Pennsylvania used an algorithmic tool that flagged 32.5% of Black children for “mandatory” investigation compared to just 20.8% of white, all while social workers disagreed with the algorithm&#039;s risk scores about one-third of the time.&lt;/p&gt;
  1882. &lt;p&gt;The Allegheny system operates with the same toxic combination of secrecy and bias now plaguing NYC. Families and their attorneys can never know their algorithmic scores, making it impossible to challenge decisions that could destroy their lives. When a judge asked to see a family’s score in court, &lt;a href=&quot;https://apnews.com/article/child-welfare-algorithm-investigation-9497ee937e0053ad4144a86c68241ef1&quot;&gt;the county resisted&lt;/a&gt;, claiming it didn&#039;t want to influence legal proceedings with algorithmic numbers, which suggests that the scores are too unreliable for judicial scrutiny yet acceptable for targeting families.&lt;/p&gt;
  1883. &lt;p&gt;Elsewhere these biased systems were successfully challenged. The developers of the Allegheny tool had already had their product &lt;a href=&quot;https://apnews.com/article/child-welfare-algorithm-investigation-9497ee937e0053ad4144a86c68241ef1&quot;&gt;rejected in New Zealand&lt;/a&gt;, where researchers correctly identified that the tool would likely result in more Māori families being tagged for investigation. Meanwhile, California spent $195,273 developing a similar tool before abandoning it in 2019 due in part to concerns about racial equity.&lt;/p&gt;
  1884. &lt;p&gt;Governmental deployment of automated and algorithmic decision making not only perpetuates social inequalities, but removes mechanisms for accountability when agencies make mistakes. The state should not be using these tools for rights-determining decisions and any other uses must be subject to vigorous scrutiny and independent auditing to ensure the public’s trust in the government’s actions.&lt;/p&gt;
  1885.  
  1886. &lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
  1887.     <pubDate>Mon, 09 Jun 2025 21:36:05 +0000</pubDate>
  1888. <guid isPermaLink="false">110782 at https://www.eff.org</guid>
  1889. <category domain="https://www.eff.org/issues/transparency">Transparency</category>
  1890. <category domain="https://www.eff.org/issues/ai">Artificial Intelligence &amp; Machine Learning</category>
  1891. <dc:creator>Hannah Zhao</dc:creator>
  1892. <enclosure url="https://www.eff.org/files/banner_library/predictive_policing_animation3x.gif" alt="3 squares hover over a map, seemingly looking for crime hot spots" type="image/gif" length="139216" />
  1893.  </item>
  1894.  <item>
  1895.    <title>Criminalizing Masks at Protests is Wrong </title>
  1896.    <link>https://www.eff.org/deeplinks/2025/06/criminalizing-masks-protests-wrong</link>
  1897.    <description>&lt;div class=&quot;field field--name-body field--type-text-with-summary field--label-hidden&quot;&gt;&lt;div class=&quot;field__items&quot;&gt;&lt;div class=&quot;field__item even&quot;&gt;&lt;p&gt;&lt;span&gt;There has been a &lt;/span&gt;&lt;a href=&quot;https://www.washingtonpost.com/health/2024/06/24/mask-ban-north-carolina-new-york/&quot;&gt;&lt;span&gt;crescendo&lt;/span&gt;&lt;/a&gt;&lt;span&gt; of states attempting to criminalize the wearing of face coverings while &lt;/span&gt;&lt;a href=&quot;https://thesicktimes.org/mask-bans-and-proposed-bans-by-state/&quot;&gt;&lt;span&gt;attending protests&lt;/span&gt;&lt;/a&gt;&lt;span&gt;. Now &lt;/span&gt;&lt;a href=&quot;https://www.msnbc.com/rachel-maddow-show/maddowblog/pointing-protesters-not-ice-agents-trump-demands-arrests-masks-rcna211787&quot;&gt;&lt;span&gt;the President&lt;/span&gt;&lt;/a&gt;&lt;span&gt; has demanded, in the context of ongoing protests in Los Angeles: “ARREST THE PEOPLE IN FACE MASKS, NOW!” &lt;br /&gt;&lt;/span&gt;&lt;/p&gt;
  1898. &lt;p&gt;&lt;span&gt;But the truth is: whether you are afraid of catching an airborne illness from your fellow protestors, or you are concerned about reprisals from police or others for expressing your political opinions in public, you should have the right to wear a mask. Attempts to criminalize masks at protests fly in the face of a right to privacy. &lt;br /&gt;&lt;/span&gt;&lt;/p&gt;
  1899. &lt;p class=&quot;pull-quote&quot;&gt;&lt;span&gt;Anonymity is a fundamental human right.&lt;/span&gt;&lt;/p&gt;
  1900. &lt;p&gt;&lt;span&gt;In terms of public health, wearing a mask while in a crowd can be a &lt;/span&gt;&lt;a href=&quot;https://www.yalemedicine.org/news/can-strategic-masking-protect-against-covid-19-flu-and-rsv&quot;&gt;&lt;span&gt;valuable tool &lt;/span&gt;&lt;/a&gt;&lt;span&gt;to prevent the spread of communicable illnesses. This can be essential for people with &lt;/span&gt;&lt;a href=&quot;https://cv.nmhealth.org/archives/extra-protection/&quot;&gt;&lt;span&gt;compromised immune systems&lt;/span&gt;&lt;/a&gt;&lt;span&gt; who still want to exercise their First Amendment-protected right to protest.&lt;/span&gt;&lt;/p&gt;
  1901. &lt;p&gt;&lt;span&gt;Moreover, wearing a mask is a perfectly legitimate surveillance self-defense practice during a protest. There has been a massive proliferation of surveillance camera networks, &lt;/span&gt;&lt;a href=&quot;https://sls.eff.org/technologies/face-recognition&quot;&gt;&lt;span&gt;face recognition technology&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, and databases of personal information. There also is a long law enforcement’s history of &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/deeplinks/2024/08/atlanta-police-must-stop-high-tech-spying-political-movements&quot;&gt;&lt;span&gt;harassing and surveilling people &lt;/span&gt;&lt;/a&gt;&lt;span&gt;for publicly criticizing or opposing law enforcement practices and other government policies. What’s more, non-governmental actors may try to identify protesters in order to retaliate against them, for example, by limiting their employment opportunities.&lt;/span&gt;&lt;/p&gt;
  1902. &lt;p&gt;&lt;span&gt;All of this may chill our willingness to speak publicly or attend a protest in a cause we believe in. Many people would be less willing to attend a rally or march if they know that a drone or helicopter, equipped with a camera, will take repeated passes over the crowd, and police later will use face recognition to scan everyone’s faces and create a list of protest attendees. This would make many people&lt;/span&gt;&lt;a href=&quot;https://www.motherjones.com/politics/2025/06/los-angeles-ice-protests-helicopter/?utm_source=dlvr.it&amp;amp;utm_medium=slack&quot;&gt;&lt;span&gt; rightfully concerned&lt;/span&gt;&lt;/a&gt;&lt;span&gt; about surveillance and harassment from law enforcement. &lt;br /&gt;&lt;/span&gt;&lt;/p&gt;
  1903. &lt;p&gt;&lt;span&gt;Anonymity is a fundamental human right. EFF has long advocated for anonymity &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/issues/anonymity&quot;&gt;&lt;span&gt;online&lt;/span&gt;&lt;/a&gt;&lt;span&gt;. We’ve also supported low-tech methods to protect our anonymity from high-tech snooping in public places; for example, we’ve supported legislation to allow car owners to use &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/deeplinks/2018/01/how-license-plate-covers-would-protect-vulnerable-communities?language=ko&quot;&gt;&lt;span&gt;license plate covers&lt;/span&gt;&lt;/a&gt;&lt;span&gt; when their cars are parked to reduce their exposure to &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/cases/automated-license-plate-readers&quot;&gt;&lt;span&gt;ALPRs&lt;/span&gt;&lt;/a&gt;&lt;span&gt;.&lt;/span&gt;&lt;/p&gt;
  1904. &lt;p&gt;&lt;span&gt;A word of caution. No surveillance self-defense technique is perfect. Technology companies are trying to develop ways to use face recognition technology to &lt;/span&gt;&lt;a href=&quot;https://www.cnet.com/health/facial-recognition-firms-are-scrambling-to-see-around-face-masks/&quot;&gt;&lt;span&gt;identify people wearing masks&lt;/span&gt;&lt;/a&gt;&lt;span&gt;. But if somebody wants to hide their face to try to avoid government scrutiny, the government should not punish them.&lt;/span&gt;&lt;/p&gt;
  1905. &lt;p&gt;&lt;span&gt;While members of the public have a right to wear a mask when they protest, law enforcement officials should &lt;/span&gt;&lt;i&gt;&lt;span&gt;not&lt;/span&gt;&lt;/i&gt;&lt;span&gt; wear a mask when they arrest protesters and others. An elementary principle of police accountability is to require uniformed officers to identify themselves to the public; this discourages officer misconduct, and facilitates accountability if an officer violates the law. This is one reason EFF has long supported the First Amendment &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/deeplinks/2020/06/you-have-first-amendment-right-record-police&quot;&gt;&lt;span&gt;right to record&lt;/span&gt;&lt;/a&gt;&lt;span&gt; on-duty police, including &lt;/span&gt;&lt;a href=&quot;https://www.eff.org/deeplinks/2025/02/yes-you-have-right-film-ice&quot;&gt;&lt;span&gt;ICE officers&lt;/span&gt;&lt;/a&gt;&lt;span&gt;. &lt;br /&gt;&lt;/span&gt;&lt;/p&gt;
  1906. &lt;p&gt;&lt;span&gt;For these reasons, EFF believes it is wrong for state legislatures, and now federal law enforcement, to try to criminalize or punish mask wearing at protests. It is especially wrong, in moments like the present, where government it taking extreme measures to crack down on the civil liberties of protesters. &lt;/span&gt;&lt;/p&gt;
  1907.  
  1908.  
  1909. &lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
  1910.     <pubDate>Mon, 09 Jun 2025 20:37:53 +0000</pubDate>
  1911. <guid isPermaLink="false">110780 at https://www.eff.org</guid>
  1912. <category domain="https://www.eff.org/issues/street-level-surveillance">Street-Level Surveillance</category>
  1913. <dc:creator>Matthew Guariglia</dc:creator>
  1914. <dc:creator>Adam Schwartz</dc:creator>
  1915. <enclosure url="https://www.eff.org/files/banner_library/protest-2024-2.jpg" alt="2 protestors in silhouette on retro starburst background" type="image/jpeg" length="719510" />
  1916.  </item>
  1917.  <item>
  1918.    <title>Privacy Victory! Judge Grants Preliminary Injunction in OPM/DOGE Lawsuit  </title>
  1919.    <link>https://www.eff.org/press/releases/privacy-victory-judge-grants-preliminary-injunction-opmdoge-lawsuit</link>
  1920.    <description>&lt;div class=&quot;field field--name-field-pr-subhead field--type-text field--label-hidden&quot;&gt;&lt;div class=&quot;field__items&quot;&gt;&lt;div class=&quot;field__item even&quot;&gt;Court to Decide Scope of Injunction Later This Week  &lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field--name-body field--type-text-with-summary field--label-hidden&quot;&gt;&lt;div class=&quot;field__items&quot;&gt;&lt;div class=&quot;field__item even&quot;&gt;&lt;p&gt;&lt;span&gt;NEW YORK–In a victory for personal privacy, a New York federal district court judge today &lt;/span&gt;&lt;span&gt;granted a preliminary injunction in a lawsu&lt;/span&gt;&lt;span&gt;it&lt;/span&gt; &lt;span&gt;challenging the &lt;/span&gt;&lt;span&gt;U.S. Office of Personnel Management&lt;/span&gt;&lt;span&gt;’s&lt;/span&gt;&lt;span&gt; (OPM) &lt;/span&gt;&lt;span&gt;disclosure of records &lt;/span&gt;&lt;span&gt;to DOGE&lt;/span&gt; &lt;span&gt;and its agents.&lt;/span&gt;&lt;span data-ccp-props=&quot;0}&quot;&gt; &lt;br /&gt;&lt;/span&gt;&lt;/p&gt;
  1921. &lt;p&gt;&lt;span&gt;Judge Denise L. Cote of the U.S. District Court for the Southern District of New York&lt;/span&gt;&lt;span&gt; found that OPM violated the Privacy Act and bypassed its established cybersecurity practices under the Administrative Procedures Act. &lt;/span&gt;&lt;span&gt;The court will decide the scope of the injunction later this week. &lt;/span&gt;&lt;span&gt;The p&lt;/span&gt;&lt;span&gt;laintiffs have asked the court to &lt;/span&gt;&lt;span&gt;halt DOGE agents’ access to OPM records and &lt;/span&gt;&lt;span&gt;for DOGE &lt;/span&gt;&lt;span&gt;and its &lt;/span&gt;&lt;span&gt;agents to &lt;/span&gt;&lt;span&gt;delete any records &lt;/span&gt;&lt;span&gt;that have already been disclosed. &lt;/span&gt;&lt;span&gt;OPM’s databases &lt;/span&gt;&lt;span&gt;hold highly sensitive personal information about tens of millions of federal employees, retirees, and job applicants.&lt;/span&gt;&lt;/p&gt;
  1922. &lt;p&gt;&lt;span&gt;“The plaintiffs have shown that the defendants disclosed OPM records to individuals who had no legal right of access to those records,” &lt;/span&gt;&lt;span&gt;Cote found.&lt;/span&gt; &lt;span&gt;“&lt;/span&gt;&lt;span&gt;In doing so, the defendants violated the Privacy Act and departed from cybersecurity standards that they are obligated to follow. This was a breach of law and of trust. Tens of millions of Americans depend on the Government to safeguard records that reveal their most private and sensitive affairs.&lt;/span&gt;&lt;span&gt;”&lt;/span&gt;&lt;span data-ccp-props=&quot;0}&quot;&gt; &lt;br /&gt;&lt;/span&gt;&lt;/p&gt;
  1923. &lt;p&gt;&lt;span data-contrast=&quot;none&quot;&gt;The Electronic Frontier Foundation (EFF), &lt;/span&gt;&lt;a href=&quot;https://www.lex-lumina.com/&quot;&gt;&lt;span data-contrast=&quot;none&quot;&gt;Lex Lumina LLP&lt;/span&gt;&lt;/a&gt;&lt;span data-contrast=&quot;none&quot;&gt;, &lt;/span&gt;&lt;a href=&quot;https://statedemocracydefenders.org/fund/&quot;&gt;&lt;span data-contrast=&quot;none&quot;&gt;Democracy Defenders Fund&lt;/span&gt;&lt;/a&gt;&lt;span data-contrast=&quot;none&quot;&gt;, and &lt;/span&gt;&lt;a href=&quot;https://www.chandralaw.com/&quot;&gt;&lt;span data-contrast=&quot;none&quot;&gt;The Chandra Law Firm&lt;/span&gt;&lt;/a&gt;&lt;span data-contrast=&quot;none&quot;&gt; requested the injunction as part of their ongoing lawsuit against OPM and DOGE on behalf of two labor unions and individual current and former government workers across the country. The lawsuit’s union plaintiffs are the&lt;/span&gt;&lt;a href=&quot;https://www.afge.org/&quot;&gt; &lt;span data-contrast=&quot;none&quot;&gt;American Federation of Government Employees AFL-CIO&lt;/span&gt;&lt;/a&gt;&lt;span data-contrast=&quot;none&quot;&gt; and the&lt;/span&gt;&lt;a href=&quot;https://aalj.org/&quot;&gt; &lt;span data-contrast=&quot;none&quot;&gt;Association of Administrative Law Judges, International Federation of Professional and Technical Engineers Judicial Council 1 AFL-CIO&lt;/span&gt;&lt;/a&gt;&lt;span data-contrast=&quot;none&quot;&gt;. &lt;/span&gt;&lt;/p&gt;
  1924. &lt;p&gt;&lt;span data-contrast=&quot;none&quot;&gt;The lawsuit argues that OPM and OPM Acting Director Charles Ezell illegally disclosed personnel records to DOGE agents in violation of the Administrative Procedures Act and the federal Privacy Act of 1974, a watershed anti-surveillance statute that prevents the federal government from abusing our personal information. In addition to seeking to permanently halt the disclosure of further OPM data to DOGE, the lawsuit asks for the deletion of any data previously disclosed by OPM to DOGE.&lt;/span&gt;&lt;span data-ccp-props=&quot;0}&quot;&gt; &lt;br /&gt;&lt;/span&gt;&lt;/p&gt;
  1925. &lt;p&gt;&lt;span data-contrast=&quot;none&quot;&gt;The federal government is the nation’s largest employer, and the records held by OPM represent one of the largest collections of sensitive personal data in the country. In addition to personally identifiable information such as names, social security numbers, and demographic data, these records include work information like salaries and union activities; personal health records and information regarding life insurance and health benefits; financial information like death benefit designations and savings programs; nondisclosure agreements; and information concerning family members and other third parties referenced in background checks and health records. &lt;br /&gt;&lt;/span&gt;&lt;/p&gt;
  1926. &lt;p&gt;&lt;span data-contrast=&quot;none&quot;&gt;OPM holds these records for tens of millions of Americans, including current and former federal workers and those who have applied for federal jobs. OPM has a history of privacy violations—an OPM breach in 2015 exposed the personal information of 22.1 million people—and its recent actions make its systems less secure. &lt;/span&gt;&lt;span data-ccp-props=&quot;0}&quot;&gt;&lt;/span&gt;&lt;/p&gt;
  1927. &lt;p&gt;&lt;span data-contrast=&quot;none&quot;&gt;With few exceptions, the Privacy Act limits the disclosure of federally maintained sensitive records on individuals without the consent of the individuals whose data is being shared. It protects all Americans from harms caused by government stockpiling of our personal data. This law was enacted in 1974, the last time Congress acted to limit the data collection and surveillance powers of an out-of-control President. &lt;/span&gt;&lt;/p&gt;
  1928. &lt;p&gt;&lt;span data-contrast=&quot;none&quot;&gt;A &lt;/span&gt;&lt;a href=&quot;https://www.lawfaremedia.org/projects-series/trials-of-the-trump-administration/tracking-trump-administration-litigation&quot;&gt;&lt;span&gt;number of courts&lt;/span&gt;&lt;/a&gt;&lt;span data-contrast=&quot;none&quot;&gt; have already found that DOGE’s activities at other agencies likely violate the law, including at the Social Security Administration and the Treasury Department.&lt;/span&gt;&lt;span data-ccp-props=&quot;0}&quot;&gt; &lt;br /&gt;&lt;/span&gt;&lt;/p&gt;
  1929. &lt;p&gt;&lt;b&gt;&lt;span data-contrast=&quot;none&quot;&gt;For the preliminary injunction:&lt;/span&gt;&lt;/b&gt; &lt;a href=&quot;https://www.eff.org/document/afge-v-opm-opinion-and-order-granting-preliminary-injunction&quot;&gt;https://www.eff.org/document/afge-v-opm-opinion-and-order-granting-preliminary-injunction&lt;/a&gt;&lt;br /&gt;&lt;b&gt;&lt;span data-contrast=&quot;none&quot;&gt;For the complaint: &lt;/span&gt;&lt;/b&gt;&lt;span data-contrast=&quot;none&quot;&gt;&lt;a href=&quot;https://www.eff.org/document/afge-v-opm-complaint&quot;&gt;https://www.eff.org/document/afge-v-opm-complaint&lt;/a&gt;&lt;br /&gt;&lt;/span&gt;&lt;b&gt;&lt;span data-contrast=&quot;none&quot;&gt;For more about the case: &lt;/span&gt;&lt;/b&gt;&lt;a href=&quot;https://www.eff.org/cases/american-federation-government-employees-v-us-office-personnel-management&quot;&gt;&lt;span data-contrast=&quot;none&quot;&gt;https://www.eff.org/cases/american-federation-government-employees-v-us-office-personnel-management&lt;/span&gt;&lt;/a&gt;&lt;span data-ccp-props=&quot;0}&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;
  1930. &lt;p&gt;&lt;strong&gt;Contacts:&lt;/strong&gt;&lt;br /&gt;Electronic Frontier Foundation: &lt;a href=&quot;mailto:press@eff.org&quot;&gt;press@eff.org&lt;/a&gt;&lt;br /&gt;Lex Lumina LLP: Managing Partner Rhett Millsaps, &lt;a href=&quot;mailto:rhett@lex-lumina.com&quot;&gt;rhett@lex-lumina.com&lt;/a&gt;&lt;/p&gt;
  1931.  
  1932. &lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
  1933.     <pubDate>Mon, 09 Jun 2025 19:28:37 +0000</pubDate>
  1934. <guid isPermaLink="false">110779 at https://www.eff.org</guid>
  1935. <dc:creator>Hudson Hongo</dc:creator>
  1936. <enclosure url="https://www.eff.org/files/banner_library/opm-eye-3b.jpg" alt="An eye with the OPM logo in the iris, green digital background" type="image/jpeg" length="149733" />
  1937.  </item>
  1938.  </channel>
  1939. </rss>
  1940.  
Copyright © 2002-9 Sam Ruby, Mark Pilgrim, Joseph Walton, and Phil Ringnalda