Bipartisan Senate Judiciary Committee introduces bill that censors online content and attacks encryption By Kevin Reed 17 March 2020
Leading members of the Senate Judiciary Committee formally introduced a bipartisan bill on March 5 that escalates US government censorship of online content and directly attacks encryption of electronic communications under the cover of fighting online child sexual abuse material (CSAM).
Senate Judiciary Committee Chairman Lindsey Graham (Republican of South Carolina), US Senators Richard Blumenthal (Democrat of Connecticut), Josh Hawley (Republican of Missouri) and Ranking Member Dianne Feinstein (Democrat of California) jointly introduced the Eliminating Abusive and Rampant Neglect of Interactive Technologies Act (EARN IT Act) that purports to encourage the tech industry to take online child sexual exploitation seriously.
The concept behind the law is that tech companies have to earn their protected immunity from prosecution for any illegal content published by users on their platforms by scanning and decrypting every message, image or post. Until now, online service providers were not responsibleunder what are known as the Section 230 provisions of the Communications Decency Act of 1996for anything users publish on websites, social media accounts or cloud servers.
In introducing the bill, Senator Graham said, This bill is a major first step. For the first time, you will have to earn blanket liability protection when it comes to protecting minors. Senator Blumenthal added, Companies that fail to comport with basic standards that protect children from exploitation have betrayed the public trust granted them by this special exemption.
While claiming to fight online CSAM and enlisting the support of 70 organizations involved in stopping child sexual exploitation, the bills actual content shows that its ultimate purpose is an attack on fundamental democratic rights.
The law calls for the creation of a 19-member commission controlled by the attorney general and US law enforcement agencies. The EARN IT commission will establish best practices that must be followed by the technology companies or they will face criminal prosecution if content on their services is found to be illegal.
According to the Electronic Frontier Foundation (EFF), among the best practices of the EARN IT Act is a proposal by John Shehan, vice president at the National Center for Missing and Exploited Children (NCMEC), that says, online services should be made to screen their messages for material that NCMEC considers abusive; use screening technology approved by NCMEC and law enforcement; report what they find in the messages to NCMEC; and be held legally responsible for the content of messages sent by others.
Therefore, the EARN IT law will place the tech companies and their users in a Catch-22. The law mandates that tech providers either agree to monitor the content and violate the privacy and free speech rights of their users by screening everything they publish, post or store on the service or they agree to be prosecuted by the state for any illegal content that appears on their site.
EFF further explains that the 19-member commission will be completely dominated by law enforcement and allied groups like NCMEC, and the bill gives Attorney General Barr the power to veto or approve the list of best practices. Even if other commission members do disagree with law enforcement, Barrs veto power will put him in a position to strongarm them.
It is well known that William Barr and the US Justice Department have been advocates of online censorship and for abolishing end-to-end encryption in consumer electronic devices. There is nothing stopping the EARN IT Act from introducing as one of its best practices a provision for law enforcements back-door access to encrypted communications and data files. Those firms which refuse to comply would then have their Section 230 protections eliminated.
It is a measure of the dishonesty of the American political system that leading Democrats and Republicans can so transparently use the fears and emotions of the public against child exploitation as a means of attacking fundamental rights protected by the Constitution.
On May 11, the Senate Judiciary Committee held a public hearing on the EARN IT Act and took testimony from witnesses on the proposed legislation. Among the speakers were representatives from the NCMEC, Jared Sine of the online dating company Match Group, a child exploitation legal expert, and Elizabeth Banker of the Internet Association. Of these speakers, only the last spoke against the EARN IT Act.
In her presentation, Banker explained that many of the major tech firms todayincluding Amazon, Ebay, Facebook, Google, Microsoft, Twitter and Uberare members of the Internet Association. She went on to review the multi-faceted measures that tech companies have been engaged in to combat CSAM, going back to the passage of the Communications Decency Act of 1996, from their platforms.
Banker then explained how the EARN IT Act would create numerous problems and hinder the efforts to combat CSAM by violating online users First and Fourth Amendment rights because the providers will be acting as agents of the government. She stated, Under Fourth Amendment jurisprudence, a search performed by an agent of the government is subject to the same requirements as if the government performed the search directly.
Banker also spoke about the implications for freedom of speech in the Senate Judiciary Committee bill, The EARN IT Act would delegate important decisions concerning security, privacy, and free speech on the internetweighty and complex matters that directly impact hundreds of millions of consumersto an administrative body that would be composed of members who are not elected representatives and that would operate with little transparency.
Finally, Banker said that although the bill does not specifically mention encryption, Requiring companies to engineer vulnerabilities into their services would make us all less secure. Encryption technology stands between billions of internet users around the globe and innumerable threatsfrom attacks on sensitive infrastructure, including our highly automated financial systems, to attempts by repressive governments to censor dissent and violate human rights.
It could not have been lost on the Democratic and Republican senators or Elizabeth Banker of the Internet Association that the greatest threat of censorship and violation of human rights all over the world, including within the US itself, comes from American imperialism.
2019 has been a year of mass social upheaval. We need you to help the WSWS and ICFI make 2020 the year of international socialist revival. We must expand our work and our influence in the international working class. If you agree, donate today. Thank you.
- Edge Computing Is A Red-Hot Tech Trend, Here's How To Invest in It - TheStreet - June 27th, 2020
- Docker servers infected with DDoS malware in extremely rare attacks - ZDNet - June 27th, 2020
- Nebulon emerges with software-defined storage, but from the cloud - ComputerWeekly.com - June 27th, 2020
- Ampere's New 128-Core Altra CPU Targets Intel, AMD In The Cloud - CRN: Technology news for channel partners and solution providers - June 27th, 2020
- Cloud IT Infrastructure Spending Continued to Grow in Q1 2020 While Spending on Non-Cloud Environments Saw Double-Digit Declines, According to IDC -... - June 27th, 2020
- Empowering Edge Cloud in the 5G & IoT Hyper-Connected Era - insideHPC - June 27th, 2020
- Ampere's 128-Core Processor Challenges Intel and AMD in a Cloud-Based Processor Showdown - News - All About Circuits - June 27th, 2020
- This Ransomware Campaign is Being Orchestrated from the Cloud - Computer Business Review - June 27th, 2020
- Ad industry spots money in the cloud | Industry Trends | IBC - IBC365 - June 27th, 2020
- Want to work at Microsoft? Dice.com looks at top jobs, skills the tech giant is looking for - OnMSFT - June 27th, 2020
- The Winston-Salem Symphony Announces Newly Elected Directors - Yes! Weekly - June 27th, 2020
- The Best VPNs for Businesses and Teams - PCMag.com - June 27th, 2020
- NexTech AR Solutions tie-up with Fastly cloud platform leads to video security breakthrough - Proactive Investors USA & Canada - June 27th, 2020
- Moving to the cloud: Migrating Blazegraph to Amazon Neptune - idk.dev - June 27th, 2020
- Cloud-Based Automation Is a Reality; Now What? - Radio World - Radio World - June 27th, 2020
- How Azure, AWS, Google handle data destruction in the cloud - TechTarget - June 27th, 2020
- AMD EPYC Processor Adoption Expands with New Supercomputing and High-Performance Cloud Computing System Wins - GlobeNewswire - June 27th, 2020
- What it Means To Be Software-Defined in Retail and How We Got Here - Retail Info Systems News - June 27th, 2020
- Cloud Storage Market 2020: Challenges, Growth, Types, Applications, Revenue, Insights, Growth Analysis, Competitive Landscape, Forecast- 2025 - Cole... - June 27th, 2020
- Why This Cloud ETF Can Keep up its Torrid Pace - ETF Trends - June 20th, 2020
- FaceApp Privacy: What You Need To Know About The Viral Russian App - Forbes - June 20th, 2020
- Cloud flash storage: SSD options from AWS, Azure and GCP - ComputerWeekly.com - June 20th, 2020
- Could the European Cloud Deliver Data Protection by Default? - CPO Magazine - June 20th, 2020
- Private Cloud Server Market How the Business Will Grow in 2026? - Cole of Duty - June 20th, 2020
- How to Profit from the Growing Divide in Tech Stocks. - Barron's - June 20th, 2020
- Cloud Computing in Education Sector Market Size, Growth, Analysis, Outlook by 2019 Trends, Opportunities and Forecast to 2025 - Medic Insider - June 20th, 2020
- Lenovo announces ThinkSystem SR860 V2 and SR850 V2 servers - Gadgets Now - June 20th, 2020
- Here are 8 career options that are least impacted by recessions - Business Standard - June 20th, 2020
- Everything your business needs to know about VPS - Tom's Guide - June 20th, 2020
- Global Cloud Based Collaboration Software Market : Industry Analysis and Forecast (2020-2027) - WorldsTrend - June 20th, 2020
- AWS claims to have blocked the largest DDoS attack in history - Cloud Pro - June 20th, 2020
- Cloud Office Migration Tool Market to Grow at Robust 17.8% CAGR to 2027 AvePoint, Binarytree, BitTitan, CodeTwo sp. z oo sp. k - Personal Injury... - June 20th, 2020
- Healthcare Cloud Computing Market to Witness Robust Expansion by 2025 - 3rd Watch News - June 20th, 2020
- Renowned French Cloud, storage, computing and AI solution providers Actualis, has today formally rebranded to become part of the Boston Group of... - June 20th, 2020
- Startups, here's what you should know about telcos - CTech - June 18th, 2020
- US buildings firm saves big on HDDs with Nasuni cloud NAS - ComputerWeekly.com - June 18th, 2020
- Uptycs Announces $30 Million in Funding to Deliver Next-Generation Security Analytics - AiThority - June 18th, 2020
- Keeping Your Cloud-based Office Safe And Secure - ISBuzz News - June 18th, 2020
- Pensando positioned as high-performance alternative to cloud provider 'lock-in' - SiliconANGLE - June 18th, 2020
- How M&E organisations can enable remote work with cloud-based video and animation production studios - ITProPortal - June 18th, 2020
- Ampere donates Arm64 server hardware to Debian to fortify the Arm ecosystem - Stockhouse - June 18th, 2020
- Kia Motors partners with Google Cloud to develop AI-based owner's manual app - Automotive World - June 18th, 2020
- Function-as-a-Service Market Recent Trends, Development, Growth and Forecast 2017-2025 - 3rd Watch News - June 18th, 2020
- How Lenovo, Cellnex, Nearby Computing Are Delivering on the Edge - eWeek - June 18th, 2020
- Dell Technologies Shifts AI Adoption into the Fast Lane with Simplified Advanced Computing - CXOToday.com - June 18th, 2020
- AWS mitigated a record-breaking 2.3 Tbps DDoS attack in February - SiliconANGLE - June 18th, 2020
- Deluxe Revolutionizes Distribution of Content to Theaters with Cloud-Based IP Delivery Solution through Deluxe One Platform - HostReview.com - June 18th, 2020
- Report: France and Germany team up on a cloud-computing ecosystem to take on Amazon, Microsoft and Google - FierceTelecom - June 6th, 2020
- Dive into the history of server hardware - TechTarget - June 6th, 2020
- COVID-19 Impact ON Private Cloud Server Market : What is the projected sales growth for 2026? - Cole of Duty - June 6th, 2020
- NextCloud gets bigger and better with Nextcloud Hub 19 - ZDNet - June 6th, 2020
- Micron Has the Potential to Rise 50% From Here - TheStreet - June 6th, 2020
- Kofax Partners with Microsoft to Enhance Cloud-Based Universal Print Solution with ControlSuite - Industry Analysts Inc - June 6th, 2020
- Dell and Intel answer the call for AI by building specific solutions for real problems - SiliconANGLE - June 6th, 2020
- Data Protection As A Service Market Projection of Each Major Segment over the Forecast Period - Cole of Duty - June 6th, 2020
- PAM as a Service: Its All a Matter of Trust - Security Boulevard - June 2nd, 2020
- How To Best Adapt Your Business When The World Is Moving Online - Forbes - June 2nd, 2020
- Cloud computing via satellite to drive 52 Exabytes of traffic by 2029: NSR - SatelliteProME.com - June 2nd, 2020
- Multinational Insurance Company Completes Upgrade of Majesco Policy for P&C from On-Premise to Majesco CloudInsurer to Bolster Growth Strategy -... - June 2nd, 2020
- COVID-19 Impact on Healthcare Cloud Computing Market Marked US$ 13 Bn in forecast Years 2025 - 3rd Watch News - June 2nd, 2020
- Cloud computing, future trends to be followed in the industry - Optocrypto - June 2nd, 2020
- You couldn't do this already? AWS adds size and bandwidth growth to FSx for Windows File Server - Blocks and Files - June 2nd, 2020
- Upstream Security Partners With Amazon Web Services to Enhance Automotive Cybersecurity - PRNewswire - June 2nd, 2020
- Improvements on the verify domain error in Office 365 - TechGenix - June 2nd, 2020
- Digital transformation held back by lack of skilled people - ComputerWeekly.com - June 2nd, 2020
- NTT Com internal cloud server hacked, information on 621 customers stolen - DatacenterDynamics - June 2nd, 2020
- Where is the edge in edge computing? And who gets to decide? - ZDNet - June 2nd, 2020
- Cloud-native architectures will define the vRAN future - 5Gradar - June 2nd, 2020
- Developers recall career 'aha' moments that have shaped their Docker experience - SiliconANGLE News - June 2nd, 2020
- HSBC platform uses AI to analyse trading data thousands of times faster - ComputerWeekly.com - June 2nd, 2020
- CloudBolt Releases Version 9.3 of Its Award-Winning Cloud Management Platform - Container Journal - May 31st, 2020
- Kaminario offers cut-price virtual SAN in the cloud - ComputerWeekly.com - May 31st, 2020
- 4 types of mobile security models and how they work - TechTarget - May 31st, 2020
- Increased cybersecurity for the transportation industry - Commercial Carrier Journal - May 31st, 2020
- Cloud-Based Firewalls Are Key to Protecting Employees While Working Remotely - Security Boulevard - May 31st, 2020
- Cloud storage 101: File, block and object storage in the cloud - ComputerWeekly.com - May 31st, 2020
- Cloud Transition During the COVID-19 Exposing the Enterprise Vulnerabilities - EnterpriseTalk - May 31st, 2020
- The Role of Artificial Intelligence in Ethical Hacking | EC-Council Official Blog - EC-Council Blog - May 31st, 2020
- Shelves are well-stocked with cloud-native tools, but simplicity remains a moving target - SiliconANGLE - May 31st, 2020
- Uncover and overcome cloud threat hunting obstacles - TechTarget - May 26th, 2020