Welcome to DU! The truly grassroots left-of-center political community where regular people, not algorithms, drive the discussions and set the standards. Join the community: Create a free account Support DU (and get rid of ads!): Become a Star Member Latest Breaking News General Discussion The DU Lounge All Forums Issue Forums Culture Forums Alliance Forums Region Forums Support Forums Help & Search

The Straight Story

(48,121 posts)
Thu Jul 25, 2013, 08:01 PM Jul 2013

Feds tell Web firms to turn over user account passwords

The U.S. government has demanded that major Internet companies divulge users' stored passwords, according to two industry sources familiar with these orders, which represent an escalation in surveillance techniques that has not previously been disclosed.

If the government is able to determine a person's password, which is typically stored in encrypted form, the credential could be used to log in to an account to peruse confidential correspondence or even impersonate the user. Obtaining it also would aid in deciphering encrypted devices in situations where passwords are reused.

"I've certainly seen them ask for passwords," said one Internet industry source who spoke on condition of anonymity. "We push back."

A second person who has worked at a large Silicon Valley company confirmed that it received legal requests from the federal government for stored passwords. Companies "really heavily scrutinize" these requests, the person said. "There's a lot of 'over my dead body.'"

Some of the government orders demand not only a user's password but also the encryption algorithm and the so-called salt, according to a person familiar with the requests. A salt is a random string of letters or numbers used to make it more difficult to reverse the encryption process and determine the original password. Other orders demand the secret question codes often associated with user accounts.
"This is one of those unanswered legal questions: Is there any circumstance under which they could get password information?"
--Jennifer Granick, Stanford University

http://news.cnet.com/8301-13578_3-57595529-38/feds-tell-web-firms-to-turn-over-user-account-passwords/

73 replies = new reply since forum marked as read
Highlight: NoneDon't highlight anything 5 newestHighlight 5 most recent replies
Feds tell Web firms to turn over user account passwords (Original Post) The Straight Story Jul 2013 OP
so will the worshippers still be worshipping when the feds break down their doors at midnight? nt msongs Jul 2013 #1
Maybe their worship makes them immune cthulu2016 Jul 2013 #4
You will know them by their worship sign posted on the door. "No Ram-Me Likey!" Safetykitten Jul 2013 #5
If they can't break the passwords what good is the NSA? cthulu2016 Jul 2013 #2
Since many folks use the same password across systems (when they can) The Straight Story Jul 2013 #6
Anyone stupid enough to use the same password for two different purposes deserves to be hacked. FarCenter Jul 2013 #10
What kind of elitist crap is this? People who don't use unique passwords are Ed Suspicious Jul 2013 #12
Maybe people will read a strong statement and learn - better some are outraged than poor practices FarCenter Jul 2013 #15
Why are you talking like that's easy? caseymoz Jul 2013 #46
Security also requires buy in and engagement Paulie Jul 2013 #48
you mean like older folks who maybe aren't really good at using computers or have memory liberal_at_heart Jul 2013 #14
Anyone who talks like this deserves it, actually. JackRiddler Jul 2013 #18
No, FarCenter, they do not. Fantastic Anarchist Jul 2013 #26
Even if you have many unique passwords, only one or two is really needed Bradical79 Jul 2013 #45
No intelligence agency is nearly as omniscient as people seem to think they are. Posteritatis Jul 2013 #21
Uh, I wouldn't bank on that Aerows Jul 2013 #36
yep ConcernedCanuk Jul 2013 #52
There's nothing serious about that computing power alongside modern encryption. Posteritatis Jul 2013 #65
Both ends still need a key, JoeyT Jul 2013 #70
Funny rejoinder, but this is truly scary. It's all super secret. chimpymustgo Jul 2013 #68
Perhaps the warrants ( if there are actual warrants) dixiegrrrrl Jul 2013 #71
Nothing to see here. If you are not doing anything wrong, what's the problem. Besides 'our people' Purveyor Jul 2013 #3
Even Bush did not got this far. avaistheone1 Jul 2013 #7
"The sky is falling!" whatchamacallit Jul 2013 #8
........ ohheckyeah Jul 2013 #9
I have more security on my world of warcraft account than I have at any of my banking institutions, Ed Suspicious Jul 2013 #11
Let's see: 20 passwords * 200,000,000 people * changed every 30 days dickthegrouch Jul 2013 #13
Changed every thirty days? Fumesucker Jul 2013 #17
Yeah...LOL. bvar22 Jul 2013 #69
Is it fascism yet? GiaGiovanni Jul 2013 #16
Nope. Obamcism. bigwillq Jul 2013 #19
they can demand all they want but those companies have lawyers who know arely staircase Jul 2013 #20
Last I read warrants were coming 200 sheets/roll for two-ply, 48 rolls in the Family size. n/t jtuck004 Jul 2013 #25
well, maybe but apparantly that hasn't happened according to the OP nt arely staircase Jul 2013 #28
Given that the court that issues them is secret, and the entity they are served on is bound by that jtuck004 Jul 2013 #29
Warrants? - who needs warrants! ConcernedCanuk Jul 2013 #53
Yeah. About that... Pholus Jul 2013 #34
Yeah, just ask that guy from Qwest. Fuddnik Jul 2013 #44
Article doesn't really give a Date or that this is a New Sweeping Request, though. KoKo Jul 2013 #22
Some passwords/combinations used: kentauros Jul 2013 #23
+1. nt bemildred Jul 2013 #66
This is beyond infuriating if true. Fantastic Anarchist Jul 2013 #24
I know right! Mojorabbit Jul 2013 #37
Yep ... a recipe for tyranny at that point. Fantastic Anarchist Jul 2013 #38
Well it is meta data zeemike Jul 2013 #41
That was my thought. Jackpine Radical Jul 2013 #42
This is an interesting and fascinating artcile, well worth reading beyond the headline. arcane1 Jul 2013 #27
Why do you hate Obama? Iggo Jul 2013 #30
I don't trust CNET, as no major outlet has reported this Federosky Jul 2013 #31
If I were not to trust CNET, it would be because of a poor reputation. tuvor Jul 2013 #39
The author Declan McCullagh doesn't have a good reputation struggle4progress Jul 2013 #56
Thank you. n/t tuvor Jul 2013 #57
Can you elaborate? nt Mojorabbit Jul 2013 #58
He has a history of making stuff up. In mid-June, he misrepresented remarks of Congressman Nadler: struggle4progress Jul 2013 #60
Anything else? Mojorabbit Jul 2013 #61
He says he created the "Al Gore invented the internet" quote struggle4progress Jul 2013 #62
I know. nt Mojorabbit Jul 2013 #63
But isn't collection involving just METADATA??? Pholus Jul 2013 #32
All I can say is wow. With that they could lure whistle blowers to remote sites and kidnap them. pam4water Jul 2013 #33
It's the obstructionist congress zipplewrath Jul 2013 #35
Good for the firms that push back. geek tragedy Jul 2013 #40
Any real online company doesn't store passwords MannyGoldstein Jul 2013 #43
More ginned up outrage. randome Jul 2013 #47
Perhaps you missed other parts in the article: The Straight Story Jul 2013 #50
Who in their right mind would say that abuse never occurs? randome Jul 2013 #67
I'm tired of this shit. I'm going to Ilsa Jul 2013 #49
Oh but wait~! U.S. Postal Service Logging All Mail for Law Enforcement Purveyor Jul 2013 #51
I remember that post. I have doubts about Ilsa Jul 2013 #54
Declan McCullagh? The libertarian liar? Really? struggle4progress Jul 2013 #55
It would be nice to know who sent the request. Incitatus Jul 2013 #59
Well the state of Oregon just made it illegal for businesses (OR universities)... cascadiance Jul 2013 #64
"If it's true that Al Gore created the Internet, then I created the 'Al Gore created the Internet' DevonRex Jul 2013 #72
The author is a global warming denier, libertarian economist, Carnegie Melon grad. DevonRex Jul 2013 #73

The Straight Story

(48,121 posts)
6. Since many folks use the same password across systems (when they can)
Thu Jul 25, 2013, 08:07 PM
Jul 2013

know one and either know the rest or have a good start on them.

And that can come in quite handy for bank sites, web mail, social media, etc (and they can hack the passwords, they are stored in a hash and will have to break them anyway - anonymous dumps passwords like this - and even if a person knows they were compromised on one system most don't change them everything).

Ed Suspicious

(8,879 posts)
12. What kind of elitist crap is this? People who don't use unique passwords are
Thu Jul 25, 2013, 08:25 PM
Jul 2013

stupid and deserve ill fate? Just wow.

 

FarCenter

(19,429 posts)
15. Maybe people will read a strong statement and learn - better some are outraged than poor practices
Thu Jul 25, 2013, 08:30 PM
Jul 2013

Security requires knowledge and the diligence to apply it effectively.

caseymoz

(5,763 posts)
46. Why are you talking like that's easy?
Thu Jul 25, 2013, 11:04 PM
Jul 2013

Everything that makes a password strong is what makes it difficult or impossible to remember, and if you're over 50-60 years old, and you have accounts on eighty different sites, you're going to have to come up with a system or have weak passwords and/or nine or ten passwords for the whole group.

Maybe computer geeks find memorizing random symbols an easy thing, if so, that's only because they spend what is or becomes their "work hours" at it. People who have other professions are using computer devices because those purportedly make things easier. If those professional people are supposed to memorize page after page of random keyboard symbols, they wouldn't be using computers very much and a lot of computer geeks would be out of their jobs.

Maybe you trained yourself for those memory feats in high school or college, but the rest of us don't have time doing anything like it. You'd better hope you never get a concussion or have electro-convulsive therapy, because that ability is very actually fragile.

My opinion is if passwords are that much of a hassle, computer geeks better stop being arrogant SOB's about it and start trying to make it easier.

I have a system for managing passwords. It's not conventional, but they're all strong, and I don't have them memorized.

And I'll just add: websites and companies should practice due diligence about this, too. For one thing, I don't know why anybody should get away with brute force password cracking. If websites would limit the number of times per minute log ins can be attempted to something closer to the speed a human being could type it, that would neutralize brute force attacks. I know it presents its own attack issue (you can close a user out of an account by sending attempts), so it's not that simple, but I'm sure there are solutions. They should be thinking along those lines.

liberal_at_heart

(12,081 posts)
14. you mean like older folks who maybe aren't really good at using computers or have memory
Thu Jul 25, 2013, 08:28 PM
Jul 2013

problems? They deserve it huh? Geez.

Fantastic Anarchist

(7,309 posts)
26. No, FarCenter, they do not.
Thu Jul 25, 2013, 08:57 PM
Jul 2013

Nor women who remain with abusive guys deserve to be beaten, or people who are black deserve to be shot.

What an incredibly stupid thing to say. Does your apologia know no bounds?

 

Bradical79

(4,490 posts)
45. Even if you have many unique passwords, only one or two is really needed
Thu Jul 25, 2013, 11:02 PM
Jul 2013

If someone wants to hack you, all they need to do is get the password for you email account(s). With the reset/remember password features of web services, they can just change the rest of your passwords.

Posteritatis

(18,807 posts)
21. No intelligence agency is nearly as omniscient as people seem to think they are.
Thu Jul 25, 2013, 08:43 PM
Jul 2013

Modern encryption, competently applied, is beyond just about anything on this planet to crack in anything resembling a reasonable timeframe. It's not like in the movies where someone can just flail at a keyboard for a few seconds and suddenly "I'm in."

 

Aerows

(39,961 posts)
36. Uh, I wouldn't bank on that
Thu Jul 25, 2013, 09:31 PM
Jul 2013

Considering that graphics cards can run parallel processes to the tune of several teraflops. CPUs, no, but GPUs? They are extremely good at encryption cracking due to the fact that they inherently run simultaneous processes. Stick 2 top of the line AMD or Geforce cards in a box, and you can better believe they can churn out some serious crunching. Not even out of the reach of the every day user, either. Heck, I have 2 overclocked Geforce 460's in my own box and a 4.5 ghz oc'd processor, and it's pretty much outdated compared to other rigs people run.

 

ConcernedCanuk

(13,509 posts)
52. yep
Thu Jul 25, 2013, 11:30 PM
Jul 2013

.
.
.

just cuz we don't like the powers that be - don't underestimate them.

They got trillions of our tax dollars to play with . . .

and they are

CC

Posteritatis

(18,807 posts)
65. There's nothing serious about that computing power alongside modern encryption.
Fri Jul 26, 2013, 06:15 AM
Jul 2013

Look up some conjectured brute-force times against 128 or 256-bit encryption. Bazillion-dollar budget and reputation as living embodiment of the Matrix notwithstanding, physics is physics.

JoeyT

(6,785 posts)
70. Both ends still need a key,
Fri Jul 26, 2013, 05:05 PM
Jul 2013

or you're just sending random gibberish.

All it requires is one end be compromised, and with secret courts issuing secret blanket warrants that no one is allowed to publicly acknowledge having gotten, it isn't hard to compromise one end.

chimpymustgo

(12,774 posts)
68. Funny rejoinder, but this is truly scary. It's all super secret.
Fri Jul 26, 2013, 10:21 AM
Jul 2013

-edit-
A Microsoft spokesperson would not say whether the company has received such requests from the government.

-edit-
Google also declined to disclose whether it had received requests for those types of data.

-edit-
A Yahoo spokeswoman would not say whether the company had received such requests.

-edit-

Apple, Facebook, AOL, Verizon, AT&T, Time Warner Cable, and Comcast did not respond to queries about whether they have received requests for users' passwords and how they would respond to them.

-edit-

The FBI declined to comment.

-edit-

dixiegrrrrl

(60,010 posts)
71. Perhaps the warrants ( if there are actual warrants)
Fri Jul 26, 2013, 06:39 PM
Jul 2013

are part of a law that says web firms cannot admit to being ordered to give up passwords.
I remember reading that in the original Patriot act, re: libraries, it was not legal to tell the victim the Feds were snooping.

 

Purveyor

(29,876 posts)
3. Nothing to see here. If you are not doing anything wrong, what's the problem. Besides 'our people'
Thu Jul 25, 2013, 08:04 PM
Jul 2013

are in the White House so why worry. All is good and my tomatoes are ripening.

whatchamacallit

(15,558 posts)
8. "The sky is falling!"
Thu Jul 25, 2013, 08:10 PM
Jul 2013

Or some such rancid apologist mockery. DU teaches no terrorist can fuck you like your own authoritarian countrymen.

Ed Suspicious

(8,879 posts)
11. I have more security on my world of warcraft account than I have at any of my banking institutions,
Thu Jul 25, 2013, 08:23 PM
Jul 2013

email providers, or social networks. These companies should make access impossible without a unique, momentary key that is held only by the account holder on a device. Something that could put some sort of roadblock in front of these spooks.

dickthegrouch

(3,183 posts)
13. Let's see: 20 passwords * 200,000,000 people * changed every 30 days
Thu Jul 25, 2013, 08:26 PM
Jul 2013

48 billion passwords for the feds to keep up with - hahahahahahaha - Good Luck!

bvar22

(39,909 posts)
69. Yeah...LOL.
Fri Jul 26, 2013, 12:35 PM
Jul 2013

They would need a massive complex with rows of SuperComputers and a massive Security Complex in Utah to do something like THAT!

Never Happen LOL.

arely staircase

(12,482 posts)
20. they can demand all they want but those companies have lawyers who know
Thu Jul 25, 2013, 08:38 PM
Jul 2013

they don't have to turn anything over without a court warrant.

 

jtuck004

(15,882 posts)
29. Given that the court that issues them is secret, and the entity they are served on is bound by that
Thu Jul 25, 2013, 09:04 PM
Jul 2013

secrecy, how would anyone know?
 

ConcernedCanuk

(13,509 posts)
53. Warrants? - who needs warrants!
Thu Jul 25, 2013, 11:45 PM
Jul 2013

.
.
.

Took me a year, and over $5,000 to beat criminal charges regarding a firearm that was a result of an illegal search and seizure of said firearm.

Beat the charges, but still have not recovered the firearm yet.

And this be Canada?

Get's better - It was a USAmerican living illegally in Canada who conspired with our Provincial Police to create the charges.

Canada ain't what it's cracked up to be, not by a long shot.

(sigh)

CC

KoKo

(84,711 posts)
22. Article doesn't really give a Date or that this is a New Sweeping Request, though.
Thu Jul 25, 2013, 08:48 PM
Jul 2013

but talks about efforts over a long timeline...from my read of it.

More of a Time Line of Requests and speculation and info over who complied...who won't answer and who is suspected of doing it.

But, an interesting read although it's kind of jumbled.

kentauros

(29,414 posts)
23. Some passwords/combinations used:
Thu Jul 25, 2013, 08:50 PM
Jul 2013
Roland: One.
Dark Helmet: One.
Colonel Sandurz: One.

Roland: Two.
Dark Helmet: Two.
Colonel Sandurz: Two.

Roland: Three.
Dark Helmet: Three.
Colonel Sandurz: Three.

Roland: Four.
Dark Helmet: Four.
Colonel Sandurz: Four.

Roland: Five.
Dark Helmet: Five.
Colonel Sandurz: Five.

Dark Helmet: So the combination is... one, two, three, four, five? That's the stupidest combination I've ever heard in my life! That's the kind of thing an idiot would have on his luggage!

. . .

President Skroob: Did it work? Where's the king?
Dark Helmet: It worked, sir. We have the combination.
President Skroob: Great. Now we can take every last breath of fresh air from Planet Druidia. What's the combination?
Colonel Sandurz: 1-2-3-4-5
President Skroob: 1-2-3-4-5?
Colonel Sandurz: Yes!
President Skroob: That's amazing. I've got the same combination on my luggage.
Dark Helmet, Colonel Sandurz: {looks at each other}


Mojorabbit

(16,020 posts)
37. I know right!
Thu Jul 25, 2013, 09:38 PM
Jul 2013

How easy it would be for them to set someone up if they can get access to an account and post as the person who owns the account.

zeemike

(18,998 posts)
41. Well it is meta data
Thu Jul 25, 2013, 10:30 PM
Jul 2013

And you gave it to a third party so you don't own it...and besides it keeps us safe.
Do you want the terrorist to come over here and bomb us?
I think your hair is on fire, and I see some clutching their perls...

 

arcane1

(38,613 posts)
27. This is an interesting and fascinating artcile, well worth reading beyond the headline.
Thu Jul 25, 2013, 09:03 PM
Jul 2013

Thanks for posting!

 

Federosky

(37 posts)
31. I don't trust CNET, as no major outlet has reported this
Thu Jul 25, 2013, 09:09 PM
Jul 2013

And no, don't tell me that the MSM doesn't care, because the Washington Post broke the PRISM news and the USA Today broke the 2005 news that Bush was illegally wiretapping people.

Plus CNET's sources are anonymous.

tuvor

(15,663 posts)
39. If I were not to trust CNET, it would be because of a poor reputation.
Thu Jul 25, 2013, 09:52 PM
Jul 2013

Not because they might have been the first to report something.

struggle4progress

(118,332 posts)
60. He has a history of making stuff up. In mid-June, he misrepresented remarks of Congressman Nadler:
Fri Jul 26, 2013, 12:11 AM
Jul 2013

NSA admits listening to U.S. phone calls without warrants
http://www.democraticunderground.com/10023024565

Nadler denied Declan's version of events, which was based on a thoroughly dishonest partial reading of a hearing transcript:

Jerrold Nadler Does Not Think the NSA Can Listen to U.S. Phone Calls
http://www.democraticunderground.com/10023027901

The website's parent company retracted the story:

Congressman denies report claiming NSA can listen to calls without warrants
http://www.democraticunderground.com/1014510665

Mojorabbit

(16,020 posts)
61. Anything else?
Fri Jul 26, 2013, 12:14 AM
Jul 2013

I read the transcript myself and it was a weirdly worded walkback. I know his politics are different from mine but I am looking for out and out lies. Thanks!

pam4water

(2,916 posts)
33. All I can say is wow. With that they could lure whistle blowers to remote sites and kidnap them.
Thu Jul 25, 2013, 09:21 PM
Jul 2013

Ops I mean arrest them without any public knowledge. Scary. Who is president again... Nixon?

zipplewrath

(16,646 posts)
35. It's the obstructionist congress
Thu Jul 25, 2013, 09:24 PM
Jul 2013

Obama's not a dictator. Don't people understand he doesn't have a magic wand and force congress to do anything. There are three branches of government and the GOP has decided to obstruct everything.

At least I read that this is what we're supposed to say when bad things happen in the government.

 

geek tragedy

(68,868 posts)
40. Good for the firms that push back.
Thu Jul 25, 2013, 09:57 PM
Jul 2013

Only with a warrant or subpoena, and then only after all appeals have been exhausted.

 

MannyGoldstein

(34,589 posts)
43. Any real online company doesn't store passwords
Thu Jul 25, 2013, 10:51 PM
Jul 2013

They store hashes, which can't be used themselves to gain access, and can't easily turned back into a password.

Weird.

 

randome

(34,845 posts)
47. More ginned up outrage.
Thu Jul 25, 2013, 11:04 PM
Jul 2013

"I've certainly seen them ask for passwords" and "legal requests". Wow. How scary that law enforcement would resort to...gasp!...legal requests to acquire passwords!

It's all in the wording. This article -which I have no doubt will not see the light of day beyond CNET- is more red meat for those who are predisposed to see the worst in everything.

Believe what you want but my advice is to always look at evidence before getting outraged.
[hr][font color="blue"][center]I'm always right. When I'm wrong I admit it.
So then I'm right about being wrong.
[/center][/font][hr]

The Straight Story

(48,121 posts)
50. Perhaps you missed other parts in the article:
Thu Jul 25, 2013, 11:14 PM
Jul 2013

The Florida man who received the subpoena claimed the Fifth Amendment, which protects his right to avoid self-incrimination, allowed him to refuse the prosecutors' demand. In February 2012, the U.S. Court of Appeals for the Eleventh Circuit agreed, saying that because prosecutors could bring a criminal prosecution against him based on the contents of the decrypted files, the man "could not be compelled to decrypt the drives."

In January 2012, a federal district judge in Colorado reached the opposite conclusion, ruling that a criminal defendant could be compelled under the All Writs Act to type in the password that would unlock a Toshiba Satellite laptop.

Both of those cases, however, deal with criminal proceedings when the password holder is the target of an investigation -- and don't address when a hashed password is stored on the servers of a company that's an innocent third party.

"If you can figure out someone's password, you have the ability to reuse the account," which raises significant privacy concerns, said Seth Schoen, a senior staff technologist at the Electronic Frontier Foundation.

-------------------

If you have a password and you can use that account that is ripe for abuse - and if you don't think there are people in government who have and do abuse things, well

 

randome

(34,845 posts)
67. Who in their right mind would say that abuse never occurs?
Fri Jul 26, 2013, 06:36 AM
Jul 2013

Of course it does. But this article shows no evidence it occurs. It mentions 'legal requests', which means 'warrant' but deliberately avoids using that word.

It's an outrage generator, nothing more than that.

Your example is one of different courts having different opinions on password-locked data. Has nothing to do with the deliberately provocative implication that the 'feds' are demanding passwords on a whim.

If there is abuse, show us the evidence.
[hr][font color="blue"][center]I'm always right. When I'm wrong I admit it.
So then I'm right about being wrong.
[/center][/font][hr]

 

Purveyor

(29,876 posts)
51. Oh but wait~! U.S. Postal Service Logging All Mail for Law Enforcement
Thu Jul 25, 2013, 11:19 PM
Jul 2013

WASHINGTON — Leslie James Pickering noticed something odd in his mail last September: a handwritten card, apparently delivered by mistake, with instructions for postal workers to pay special attention to the letters and packages sent to his home.

“Show all mail to supv” — supervisor — “for copying prior to going out on the street,” read the card. It included Mr. Pickering’s name, address and the type of mail that needed to be monitored. The word “confidential” was highlighted in green.

“It was a bit of a shock to see it,” said Mr. Pickering, who with his wife owns a small bookstore in Buffalo. More than a decade ago, he was a spokesman for the Earth Liberation Front, a radical environmental group labeled eco-terrorists by the Federal Bureau of Investigation. Postal officials subsequently confirmed they were indeed tracking Mr. Pickering’s mail but told him nothing else.

As the world focuses on the high-tech spying of the National Security Agency, the misplaced card offers a rare glimpse inside the seemingly low-tech but prevalent snooping of the United States Postal Service.

more...

http://www.nytimes.com/2013/07/04/us/monitoring-of-snail-mail.html?_r=0

Ilsa

(61,697 posts)
54. I remember that post. I have doubts about
Thu Jul 25, 2013, 11:50 PM
Jul 2013

All mail on everyone being surveilled, though. I guess I figure that I'm not important enough.

 

cascadiance

(19,537 posts)
64. Well the state of Oregon just made it illegal for businesses (OR universities)...
Fri Jul 26, 2013, 01:43 AM
Jul 2013

... to demand Facebook or other social media account passwords from prospective (or current employees) or students in the case of schools.

So in effect we've made it illegal for a government entity (a university) to demand from a person (a student) their facebook passwords. If corporations are people, then perhaps we could sue the government here if the NSA tries to obtain private passwords from "corporate persons" (these companies they're asking for passwords from). Of course we will still need new laws if we overturn Citizen's United to definitively define these passwords on these servers as OUR property and not the companies' property that are storing them. But for now that might be a line of defense.

DevonRex

(22,541 posts)
72. "If it's true that Al Gore created the Internet, then I created the 'Al Gore created the Internet'
Fri Jul 26, 2013, 07:32 PM
Jul 2013

story." - Declan McCullagh

http://en.m.wikipedia.org/wiki/Declan_McCullagh

"Declan McCullagh is an American journalist and columnist for CBSNews.com. He specializes in computer security and privacy issues. He is notable, among other things, for his early involvement with the media interpretation of U.S. presidential candidate Al Gore's statement that he "took the initiative in creating the Internet." McCullagh himself once claimed that "If it's true that Al Gore created the Internet, then I created the 'Al Gore created the Internet' story."[1]
In 2009, McCullagh turned his journalistic focus to the issue of climate change.[2]
McCullagh has written frequently in defense of libertarianism.[3] He began writing weekly columns for CBSnews.com on economic commentary entitled Other People's Money upon CBS Corporation's acquisition of CNET Networks. In August 2009, McCullagh renamed his column to Taking Liberties, which focuses on "individual rights and liberties, including both civil and economic liberties."[4] He also participated and won $100,000 on the California Lottery's Make Me a Millionaire game show in episode 2002.[5]
He attended Carnegie Mellon University and was student body president before being removed from office due to charges of committing domestic violence.[6][7][8] He pleaded guilty to harassment.[9]"

DevonRex

(22,541 posts)
73. The author is a global warming denier, libertarian economist, Carnegie Melon grad.
Fri Jul 26, 2013, 07:57 PM
Jul 2013
http://beta.mediamatters.org/research/2009/06/29/reporting-on-possibly-suppressed-epa-document-c/151642

"Reporting on possibly "suppressed" EPA document, CBS suppressed actual climate science

CBSNews.com uncritically reported an internal EPA document's false claim that "global temperatures have declined for 11 years."

In a June 26 CBSNews.com article reporting that the Environmental Protection Agency "may have suppressed" an internal report on climate change, senior correspondent Declan McCullagh uncritically reported the document's false claim that, in the article's words, "global temperatures have declined for 11 years." McCullagh identified that claim as one of "a number of recent developments [one of the document's authors, EPA researcher Alan Carlin] said the EPA did not consider" before it submitted a key finding that could lead to EPA regulation of carbon dioxide. In fact, the claim that "global temperatures have declined for 11 years" is simply not true. Annual global average temperatures have both risen and fallen over the past 11 years, and while there have been some relatively cooler years during that period -- including a decline in each of the past three relative to the year before -- climate scientists reject the idea that those temperatures are any indication that global warming is slowing or does not exist. Scientists have identified a long-term warming trend spanning several decades that is independent from the normal climate variability -- which includes relatively short-term changes in climate due to events like El Niño and La Niña -- to which they attribute the recent relatively cooler temperatures.

In a February 11 Guardian op-ed, Vicky Pope, the head of climate change advice at the U.K. Met Office Hadley Centre, wrote that claims about the pace of global warming based only on developments in the past 10 years or in the 1990s are not valid, "since natural variations always occur on this timescale." She continued, "1998 was a record-breaking warm year as long-term man-made warming combined with a naturally occurring strong El Niño. In contrast, 2008 was slightly cooler than previous years partly because of a La Niña. Despite this, it was still the 10th warmest on record." According to the Met Office, "Over the last ten years, global temperatures have warmed more slowly than the long-term trend. But this does not mean that global warming has slowed down or even stopped. It is entirely consistent with our understanding of natural fluctuations of the climate within a trend of continued long-term warming."

As this graph of annual global average temperatures from the U.K. Met Office Hadley Centre shows, the claim in the internal EPA document that, in the words of CBS, "global temperatures have declined for 11 years" is simply not true:"
Latest Discussions»General Discussion»Feds tell Web firms to tu...