U.S. J-School Digital Security Sample Slides
�Questions? Suggestions? �Reach out:�https://freedom.press/contact/
Freedom of the Press Foundation (CC BY 4.0)
README: How might these slides be used?
https://freedom.press
README: Use or modify as needed
Freedom of the Press Foundation (CC BY 4.0)
https://freedom.press
Legal requests in the U.S.
https://freedom.press
We’re going to talk about authorities used by U.S. law enforcement to access electronic data, and implications for journalistic work.
This is not about intelligence agencies or their capabilities.
https://freedom.press
Data you may need to keep confidential in your work
https://freedom.press
Reminder: The more places your data resides, the more places that may be compelled to disclose it!
Hello!
Hello!
Service provider�(e.g., email provider)
Intermediaries�(e.g., ISP)
https://freedom.press
Good news / bad news: We have strong constitutional protections in the U.S., with some caveats
https://freedom.press
If caught up in a law enforcement investigation, prosecutors or courts may compel third parties to share your data
https://freedom.press
Roadmap
Data type | Request type | Standard for request |
|
|
|
|
|
|
|
|
|
https://freedom.press
Roadmap
Data type | Request type | Standard for request |
Call metadata records | -- | -- |
Email metadata records | -- | -- |
Message content (e.g., in emails) | -- | -- |
https://freedom.press
What’s a subpoena anyway?
https://freedom.press
Source: Associated Press
https://freedom.press
Email metadata requests with D Orders
https://freedom.press
What are the implications of this kind of legal request for reporting?
https://freedom.press
Another example: Ali Watkins’ emails and phone calls
Credit: X/aliwatkins
https://freedom.press
Metadata requests have lower burden of proof than requests for message content
Conversation metadata includes…
Metadata may be requested with a subpoena or court order. Even properly encrypted messages produce metadata.
https://freedom.press
Metadata and account information usually require a subpoena or court order, such as a D Order.
For communications content, courts increasingly require a warrant.
https://freedom.press
What’s a warrant anyway?
https://freedom.press
Fox News’ James Rosen’s emails seized
https://freedom.press
Google - Way of a Warrant: https://www.youtube.com/watch?v=MeKKHxcJfh0
Google - Way of a Warrant: https://www.youtube.com/watch?v=MeKKHxcJfh0
https://freedom.press
In other words…
https://freedom.press
In other words…
Data type | Request type | Standard for request |
Call metadata records | Subpoena | Low - Relevance |
Email metadata records | 2703(d) Order | Slightly higher - Reasonable Articulable Suspicion (RAS) |
Message content (e.g., in emails) | Warrant | High: Probable cause |
https://freedom.press
Generally, cell phone location records require a warrant
Telephone companies
https://freedom.press
BUT… Some agencies purchase cell location records
Instead of subpoenaing records, Immigration and Customs Enforcement (ICE) has purchased cell location records from Venntel, a data broker. The legality of this behavior is still unclear.
https://freedom.press
Requests for live information about phone calls
https://freedom.press
Cloud services share many rules with communications data
https://freedom.press
Pick a company! Use their transparency report to see how they’ve responded to requests for their most recent 6 months:�
https://freedom.press
What about legal requests from other countries?
https://freedom.press
If you only take one thing away…��Assume third parties may be compelled to share your data, and act accordingly.
https://freedom.press