359 research outputs found

    Privacy on the Line

    Get PDF
    A penetrating and insightful study of privacy and security in telecommunications for a post-9/11, post-Patriot Act world. Telecommunication has never been perfectly secure. The Cold War culture of recording devices in telephone receivers and bugged embassy offices has been succeeded by a post-9/11 world of NSA wiretaps and demands for data retention. Although the 1990s battle for individual and commercial freedom to use cryptography was won, growth in the use of cryptography has been slow. Meanwhile, regulations requiring that the computer and communication industries build spying into their systems for government convenience have increased rapidly. The application of the 1994 Communications Assistance for Law Enforcement Act has expanded beyond the intent of Congress to apply to voice over Internet Protocol (VoIP) and other modern data services; attempts are being made to require ISPs to retain their data for years in case the government wants it; and data mining techniques developed for commercial marketing applications are being applied to widespread surveillance of the population. In Privacy on the Line, Whitfield Diffie and Susan Landau strip away the hype surrounding the policy debate over privacy to examine the national security, law enforcement, commercial, and civil liberties issues. They discuss the social function of privacy, how it underlies a democratic society, and what happens when it is lost. This updated and expanded edition revises their original—and prescient—discussions of both policy and technology in light of recent controversies over NSA spying and other government threats to communications privacy

    Examining the Anomalies, Explaining the Value: Should the USA FREEDOM Act’s Metadata Program be Extended?

    Get PDF
    Edward Snowden’s disclosure of National Security Agency (“NSA”) bulk collection of communications metadata was a highly disturbing shock to the American public. The intelligence community was surprised by the response, as it had largely not anticipated a strong negative public reaction to this surveillance program. Controversy over the bulk metadata collection led to the 2015 passage of the USA FREEDOM Act. The law mandated that the intelligence community would collect the Call Detail Records (“CDR”) from telephone service providers in strictly limited ways, not in bulk, and only under order from the Foreign Intelligence Surveillance Court. The new program initially seemed to be working well, although the fact that from 40 court orders in both 2016 and 2017, the NSA collected hundreds of millions of CDRs created public concern. Then in June 2018 the NSA announced it had purged three years’ worth of CDRs due to “technical irregularities”; later the agency made clear that it would not seek the program’s renewal. This Article demystifies these situations, analyzing how forty orders might lead to the collection of several million CDRs and providing the first explanation that fits the facts of what might have caused the “technical irregularities” leading to the purge of records. This Article also exposes a rather remarkable lacuna in Congressional oversight: even at the time of the passage of the USA FREEDOM Act a changing terrorist threat environment and changing communications technologies had effectively eliminated value of the CDR collection. We conclude with recommendations on conducting intelligence oversight

    Accounting Profession in Canada; Professional Accounting in Foreign Country Series

    Get PDF
    https://egrove.olemiss.edu/aicpa_guides/1672/thumbnail.jp

    Cloning of terminal transferase cDNA by antibody screening

    Get PDF
    A cDNA library was prepared from a terminal deoxynucleotidyltransferase-containing thymoma in the phage vector λgt11. By screening plaques with anti-terminal transferase antibody, positive clones were identified of which some had β-galactosidase-cDNA fusion proteins identifiable after electrophoretic fractionation by immunoblotting with anti-terminal transferase antibody. The predominant class of cross-hybridizing clones was determined to represent cDNA for terminal transferase by showing that one representative clone hybridized to a 2200-nucleotide mRNA in close-matched enzyme-positive but not to enzyme-negative cells and that the cDNA selected a mRNA that translated to give a protein of the size and antigenic characteristics of terminal transferase. Only a small amount of genomic DNA hybridized to the longest available clone, indicating that the sequence is virtually unique in the mouse genome

    The Montreal Rebbetzin: Portraits in Time

    Get PDF

    Lawful Hacking: Using Existing Vulnerabilities for Wiretapping on the Internet

    Get PDF
    For years, legal wiretapping was straightforward: the officer doing the intercept connected a tape recorder or the like to a single pair of wires. By the 1990s, however, the changing structure of telecommunications—there was no longer just “Ma Bell” to talk to—and new technologies such as ISDN and cellular telephony made executing a wiretap more complicated for law enforcement. Simple technologies would no longer suffice. In response, Congress passed the Communications Assistance for Law Enforcement Act (CALEA) which mandated a standardized lawful intercept interface on all local phone switches. Since its passage, technology has continued to progress, and in the face of new forms of communication—Skype, voice chat during multiplayer online games, instant messaging, etc.—law enforcement is again experiencing problems. The FBI has called this “Going Dark”: their loss of access to suspects’ communication. According to news reports, law enforcement wants changes to the wiretap laws to require a CALEA-like interface in Internet software. CALEA, though, has its own issues: it is complex software specifically intended to create a security hole—eavesdropping capability—in the already-complex environment of a phone switch. It has unfortunately made wiretapping easier for everyone, not just law enforcement. Congress failed to heed experts’ warnings of the danger posed by this mandated vulnerability, and time has proven the experts right. The so-called “Athens Affair,” where someone used the built-in lawful intercept mechanism to listen to the cell phone calls of high Greek officials, including the Prime Minister, is but one example. In an earlier work, we showed why extending CALEA to the Internet would create very serious problems, including the security problems it has visited on the phone system. In this paper, we explore the viability and implications of an alternative method for addressing law enforcements need to access communications: legalized hacking of target devices through existing vulnerabilities in end-user software and platforms. The FBI already uses this approach on a small scale; we expect that its use will increase, especially as centralized wiretapping capabilities become less viable. Relying on vulnerabilities and hacking poses a large set of legal and policy questions, some practical and some normative. Among these are: (1) Will it create disincentives to patching? (2) Will there be a negative effect on innovation? (Lessons from the so-called “Crypto Wars” of the 1990s, and in particular the debate over export controls on cryptography, are instructive here.) (3) Will law enforcement’s participation in vulnerabilities purchasing skew the market? (4) Do local and even state law enforcement agencies have the technical sophistication to develop and use exploits? If not, how should this be handled? A larger FBI role? (5) Should law enforcement even be participating in a market where many of the sellers and other buyers are themselves criminals? (6) What happens if these tools are captured and repurposed by miscreants? (7) Should we sanction otherwise illegal network activity to aid law enforcement? (8) Is the probability of success from such an approach too low for it to be useful? As we will show, these issues are indeed challenging. We regard the issues raised by using vulnerabilities as, on balance, preferable to adding more complexity and insecurity to online systems

    Community, identity, and religious leadership as expressed through the role of the Rabbi's wife

    Get PDF
    This study analyzes the role of the Canadian rabbinical wife married to a rabbi who can be hired and fired from his position. While archival sources and secondary historical sources were utilized to some extent, the substantive work of the research is to be found in the interviews conducted over a period of three years. Interviews took place in areas where major Jewish populations reside such as Montreal, Toronto, and Vancouver; and in the smaller Jewish communities throughout Canada, such as the Maritimes, Ottawa, Hamilton, London, and Winnipeg. The interviews were sorted according to the year of birth of the interviewees. This provided a contemporary perspective on how these women function in the role today, as well as demonstrating the consistency of the position from the early 1950s to the present. Fifty-nine women, either currently or previously married to congregational rabbis, met with the researcher. They were asked to respond to a series of questions addressing aspects of their lives as rabbinical wives. The initial interview was tape-recorded and transcribed. The transcripts were then used in a follow-up email and/or phone interview to clarify issues that arose during the initial interview. These interviews allow us to hear from the women themselves. Many of the women were wholly involved in their communities, despite the fact the role has no official status within the Jewish community. The rabbinical wife is required to be gracious and attentive to the needs of the community and will frequently have people in her home for religious and social events. At the same time, her position inhibits deep relationships with the people around her. This research provides detail on the role of the rabbinical wife, and contributes to a rereading of the history of religious leadership in the Jewish community

    Regional brain hypometabolism is unrelated to regional amyloid plaque burden

    Get PDF
    In its original form, the amyloid cascade hypothesis of Alzheimer's disease holds that fibrillar deposits of amyloid are an early, driving force in pathological events leading ultimately to neuronal death. Early clinicopathological investigations highlighted a number of inconsistencies leading to an updated hypothesis in which amyloid plaques give way to amyloid oligomers as the driving force in pathogenesis. Rather than focusing on the inconsistencies, amyloid imaging studies have tended to highlight the overlap between regions that show early amyloid plaque signal on positron emission tomography and that also happen to be affected early in Alzheimer's disease. Recent imaging studies investigating the regional dependency between metabolism and amyloid plaque deposition have arrived at conflicting results, with some showing regional associations and other not. We extracted multimodal neuroimaging data from the Alzheimer's disease neuroimaging database for 227 healthy controls and 434 subjects with mild cognitive impairment. We analysed regional patterns of amyloid deposition, regional glucose metabolism and regional atrophy using florbetapir ((18)F) positron emission tomography, (18)F-fluordeoxyglucose positron emission tomography and T1-weighted magnetic resonance imaging, respectively. Specifically, we derived grey matter density and standardized uptake value ratios for both positron emission tomography tracers in 404 functionally defined regions of interest. We examined the relation between regional glucose metabolism and amyloid plaques using linear models. For each region of interest, correcting for regional grey matter density, age, education and disease status, we tested the association of regional glucose metabolism with (i) cortex-wide florbetapir uptake; (ii) regional (i.e. in the same region of interest) florbetapir uptake; and (iii) regional florbetapir uptake while correcting in addition for cortex-wide florbetapir uptake. P-values for each setting were Bonferroni corrected for 404 tests. Regions showing significant hypometabolism with increasing cortex-wide amyloid burden were classic Alzheimer's disease-related regions: the medial and lateral parietal cortices. The associations between regional amyloid burden and regional metabolism were more heterogeneous: there were significant hypometabolic effects in posterior cingulate, precuneus, and parietal regions but also significant positive associations in bilateral hippocampus and entorhinal cortex. However, after correcting for global amyloid burden, few of the negative associations remained and the number of positive associations increased. Given the wide-spread distribution of amyloid plaques, if the canonical cascade hypothesis were true, we would expect wide-spread, cortical hypometabolism. Instead, cortical hypometabolism appears to be linked to global amyloid burden. Thus we conclude that regional fibrillar amyloid deposition has little to no association with regional hypometabolism
    • …
    corecore