On Global Encryption Day, Let’s Stand Up for Privacy and Security – EFF

At EFF, we talk a lot about strong encryption. Its critical for our privacy and security online. Thats why we litigate in courts to protect the right to encrypt, build technologies to encrypt the web, and its why we lead the fight against anti-encryption legislation like last years EARN IT Act.

Weve seen big victories in our fight to defend encryption. But we havent done it alone. Thats why were proud this year to join dozens of other organizations in the Global Encryption Coalition as we celebrate the first Global Encryption Day, which is today, October 21, 2021.

For this inaugural year, were joining our partner organizations to ask people, companies, governments, and NGOs to Make the Switch to strong encryption. Were hoping this day can encourage people to make the switch to end-to-end encrypted platforms, creating a more secure and private online world. Its a great time to turn on encryption on all the devices or services you use, or switch to an end-to-end encrypted app for messagingand talk to others about why you made that choice. Using strong passwords and two-factor authentication are also security measures that can help keep you safe.

If you already have a handle on encryption and its benefits, today would be a great day to talk to a friend about it. On social media, were using the hashtag #MakeTheSwitch.

The Global Encryption Day website has some ideas about what you could do to make your online life more private and secure. Another great resource is EFFs Surveillance Self Defense Guide, where you can get tips on everything from private web browsing, to using encrypted apps, to keeping your privacy in particular security scenarioslike attending a protest, or crossing the U.S. border.

We need to keep talking about the importance of encryption, partly because its under threat. In the U.S. and around the world, law enforcement agencies have been seeking an encryption backdoor to access peoples messages. At EFF, weve resisted these efforts for decades. Weve also pushed back against efforts like client-side scanning, which would break the promises of user privacy and security while technically maintaining encryption.

If you already have a handle on encryption and its benefits, today would be a great day to talk to a friend about it. On social media, were using the hashtag #MakeTheSwitch.

The Global Encryption Coalition is listing events around the world today. EFF Senior Staff Technologist Erica Portnoy will be participating in an Ask Me Anything about encryption on Reddit, at 17:00 UTC, which is 10:00 A.M. Pacific Time. Jon Callas, EFF Director of Technology Projects, will join an online panel about how to improve user agency in end-to-end encrypted services, on Oct. 28.

Originally posted here:
On Global Encryption Day, Let's Stand Up for Privacy and Security - EFF

How To Enable End-to-End Encryption In Microsoft Teams – TechDecisions

Microsoft is starting to toll out a public preview for end-to-end encryption for Microsoft Teams calls, specifically for unscheduled one-to-one calls that encrypts the communication between both parties.

The company first announced this feature in March during an Ignite conference, and the company announced during this falls version of the virtual conference that the feature will be rolling out public preview.

Microsoft says end-to-end encryption is available for calls made between two parties using the latest version of Teams desktop client for Windows or Mac, or the latest versions of the app on iOS and Android.

For general availability, Microsoft has it pegged for next month on its Microsoft 365 roadmap website. However, it is unclear when Microsoft plans to roll out end-to-end encryption for groups or meetings.

According to the company, both participants must turn on the feature to enable end-to-end encryption, and only the real-time medial flow of video and voice data is encrypted.

However, IT must first enable end-to-end encryption for Teams one-on-one calls in the IT Admin port under Enhanced Encryption policies. There, admins can set which users can use the feature and decide whether the entire organization can use the enhanced encryption or just a select group of users just like you would normally set other policies.

Admins can also manage end-to-end encryption policies using Microsoft PowerShell to apply policies to the tenant, users and groups.

To make end-to-end encryption calls available by using the Teams admin center:

However, end-to-end encryption is still off by default after the policy is configured. After that, users need to turn it on in their Team settings by following these steps, per Microsoft:

When both users have the setting enabled, they will see a shield in the top left corner of the Teams call. Users can hover over the shield to display confirmation that the call is end-to-end encryption.

Microsoft reminds users that Teams still secures a call or meeting with other encryption measures based on industry standards, and data exchanged during a call is always secure while in transit and at rest, according to Microsoft.

Other important points:

Read the original:
How To Enable End-to-End Encryption In Microsoft Teams - TechDecisions

Encryption and the Digital Economy: Balancing Security, Privacy and National Security – APN News

Published on October 21, 2021

New Delhi: Data Security Council of India (DSCI), launched a whitepaper on encryption titled Encryption and the Digital Economy: Balancing Security, Privacy and National Security. The paper offers a holistic viewpoint on the more extensive encryption debate by engaging with stakeholders within academia, government, law enforcement, as well as the industry. The paper endeavours to widen the horizon around encryption deliberations and bring up the technical, moral, and law enforcement complexities, encryption creates as we attempt to secure personal data and digital services through end-to-end encryption (E2EE).

It extends a deep dive into various perspectives from law enforcement to technology companies, governments, and users. It also provides a detailed overview on the regulatory landscape in India and around the globe on the benefits and challenges of encryption and encryption challenging interventions. The paper offers a comprehensive breakdown of various facets, ranging from encryptions historical and legal context to the technical and constitutional considerations of breaking E2EE and traceability. It also advises the user to look at encryption as a complex tool with a broad and varied impact that has both primary effects and consequences and secondary implications in criminal justice and law enforcement.

The launch took place in the presence of eminent dignitaries, such as Shri Rakesh Maheshwari, Group Coordinator-Cyber Laws, Ministry of Electronics & IT; Dr Gulshan Rai, Former National Cyber Security Coordinator, Government of India; Mr. Subhashis Banerjee, Professor, Computer Science and Engineering, Indian Institute of Technology, Delhi and Ms. Rama Vedashree, CEO, DSCI. A wide cross-section of IT Industry members also participated and offered their perspectives.

Rama Vedashree, CEO, DSCI, said, Encryption has become a ubiquitous part of digital products and platforms and is the necessary protection that underpins digital transactions. Our paper looks at encryption not simply as a security tool but rather places it in the larger narrative around individual privacy, national security, human rights, and the digital economy. Its important to approach this in a holistic manner and engage all stakeholders in progressive policy making.

Prof. Subhashis Banerjee, Professor, IIT-D, said, End-to-end encryption and traceability are contentious issues for which informed nation-wide debate is essential. I congratulate DSCI for its whitepaper on encryption which can provide valuable inputs for such debates. We also require comprehensive threat models for both privacy and national security requirements without which a complete understanding of the problem at hand will remain elusive.

See original here:
Encryption and the Digital Economy: Balancing Security, Privacy and National Security - APN News

Renowned Encryption Experts Sound the Alarm on Client-Side Scanning (CSS) – OODA Loop

Public safety and law enforcement officials continue to explore a viable technological solution to their need to lawfully gain access to information on smartphones. The solution currently under consideration, Client-Side Scanning or CSS, grows out of an August 2021 proposal from Apple, Inc.

A group of technologists, who for the last 25 years have come together to co-author seminal articles warning about threats to encryption, have released yet another warning, this time concerning CSS. The paper, entitled Bugs in our Pockets: The Risks of Client-Side Scanning, comes complete with recommendations for lawmakers and policymakers.

This post provides insights on CSS leading to actionable recommendations for business and government decision-makers.

Already a member?Sign in to your account.

OODA Loop provides actionable intelligence, analysis, and insight on global security, technology, and business issues. Our members are global leaders, technologists, and intelligence and security professionals looking to inform their decision making process to understand and navigate global risks and opportunities.

You can chose to be an OODA Loop Subscriber or an OODA Network Member. Subscribers get access to all site content, while Members get all site content plus additional Member benefits such as participation in our Monthly meetings, exclusive OODA Unlocked Discounts, discounted training and conference attendance, job opportunities, our Weekly Research Report, and other great benefits.

For more information please click here. Thanks!

Already a member?Sign in to your account.

Now more than ever, organizations need to apply rigorous thought to business risks and opportunities. In doing so it is useful to understand the concepts embodied in the terms Black Swan and Gray Rhino. See: Potential Future Opportunities, Risks and Mitigation Strategies in the Age of Continuous Crisis

The OODA leadership and analysts have decades of experience in understanding and mitigating cybersecurity threats and apply this real world practitioner knowledge in our research and reporting. This page on the site is a repository of the best of our actionable research as well as a news stream of our daily reporting on cybersecurity threats and mitigation measures. See:Cybersecurity Sensemaking

OODAs leadership and analysts have decades of direct experience helping organizations improve their ability to make sense of their current environment and assess the best courses of action for success going forward. This includes helping establish competitive intelligence and corporate intelligence capabilities.Our special series on the Intelligent Enterprise highlights research and reports that can accelerate any organization along their journey to optimized intelligence. See: Corporate Sensemaking

This page serves as a dynamic resource for OODA Network members looking for Artificial Intelligence information to drive their decision-making process. This includes a special guide for executives seeking to make the most of AI in their enterprise. See: Artificial Intelligence Sensemaking

From the very beginning of the pandemic we have focused on research on what may come next and what to do about it today. This section of the site captures the best of our reporting plus daily daily intelligence as well as pointers to reputable information from other sites. See: OODA COVID-19 Sensemaking Page.

A dynamic resource for OODA Network members looking for insights into the current and future developments in Space, including a special executives guide to space. See: Space Sensemaking

OODA is one of the few independent research sources with experience in due diligence on quantum computing and quantum security companies and capabilities. Our practitioners lens on insights ensures our research is grounded in reality. See: Quantum Computing Sensemaking.

In 2020, we launched the OODAcast video and podcast series designed to provide you with insightful analysis and intelligence to inform your decision making process. We do this through a series of expert interviews and topical videos highlighting global technologies such as cybersecurity, AI, quantum computing along with discussions on global risk and opportunity issues. See: The OODAcast

View original post here:
Renowned Encryption Experts Sound the Alarm on Client-Side Scanning (CSS) - OODA Loop

Global Endpoint Encryption Software Market Application, Trends, Growth, Opportunities and Worldwide Forecast 2021 To 2026 Puck77 – Puck77

The recently published report titled Global Endpoint Encryption Software Market 2021 by Company, Regions, Type and Application, Forecast to 2026 is inclusive of an in-depth evaluation of this industry, and a commendable brief of its segmentation. The report, in a nutshell, incorporates a basic overview of the market with respect to its current status and the market size, with regards to its volume and revenue. The report includes a global Endpoint Encryption Software market overview, detailed literature on products, services, and overall industry scenario by 2026. The key categories covered in the market segmentation are region, applications, and key players.

The report incorporates a basic overview of the market with respect to its current status and the market size, with regards to its volume and revenue. Also, the study is inclusive of a summary of important data considering the regional scope of the global Endpoint Encryption Software industry as well as the firms that seem to have strongly established their position across the market. The authors of the report used simple language and easy-to-understand statistical images to provide detailed information and data on the global market.

NOTE: Consumer behaviour has changed within all sectors of the society amid the COVID-19 pandemic. Industries on the other hand will have to restructure their strategies in order to adjust with the changing market requirements. This report offers you an analysis of the COVID-19 impact on the Endpoint Encryption Software market and will help you in strategising your business as per the new industry norms.

DOWNLOAD FREE SAMPLE REPORT: https://www.marketquest.biz/sample-request/74759

Top key players studied in the global Endpoint Encryption Software market:

The report delivers market research on several categories by an organized method of judging the client, examining market supply, researching, struggle, and demand, accompanied by integrating the feedback of the client. The market estimates along with the statistical nuances included in the report give an insightful view of the global Endpoint Encryption Software market. The market analysis serves present as well as future aspects mainly depends on factors in which companies participate within market growth, crucial trends, and segmentation analysis.

Market segmented by product type:

Market segmented by application:

Starting from industry chain analysis to cost structure analysis, the report assesses multiple aspects, including the production and end-use segments of the global Endpoint Encryption Software market products. The latest trends the detailed in the report to measure their impact on the production of market products. The report provides regional analysis and valuable insights into the progress of the global Endpoint Encryption Software market and approaches related to the market.

ACCESS FULL REPORT: https://www.marketquest.biz/report/74759/global-endpoint-encryption-software-market-2021-by-company-regions-type-and-application-forecast-to-2026

Market segmented by region:

Key Questions Answered by Market Report:

Customization of the Report:

This report can be customized to meet the clients requirements. Please connect with our sales team ([emailprotected]), who will ensure that you get a report that suits your needs. You can also get in touch with our executives on +1-201-465-4211 to share your research requirements.

Contact UsMark StoneHead of Business DevelopmentPhone: +1-201-465-4211Email: [emailprotected]Web: http://www.marketquest.biz

You May Check Our Other Report @

Global Sultamicillin Market 2021 Business Opportunities, Key Players Analysis, Segmentation and Forecast by 2027

Global Loxapine Market 2021 Industry Insights, Top Trends, Key Players, Production Development and Opportunities to 2027

Global Chlorambucil Market 2021 Growth by Top Companies, Key Trends, Industry Dynamics and Future Growth by 2027

Global Opipramol Market 2021 Report Overview, Manufacturing Analysis, Development Status, Competitive Analysis to 2027

Global Propantheline Bromide Market 2021 Business Insights, Emerging Opportunities with Current Trends Analysis, and Industry Development to 2027

Global Hydromorphone Market 2021 Analytical Assessment, Segments Analysis, Classifications and Competitive Landscape Analysis by 2027

Global Bepotastine Market 2021 Top Countries Data, Industry Growth Analysis, Future Demand and Leading Players by 2027

Global Benzphetamine Market 2021 Business Development Strategy, Key Stakeholders and Regional Demand Analysis to 2027

Global Pirenzepine Market 2021 Industry Analysis by Application, Top-Vendor Landscape and Key Regions upto 2027

Global Pipotiazine Market 2021 Sales Revenue Analysis, Product Introduction, Industry Share and Forecast by 2027

Global Physostigmine Market 2021 Segment Overview, Regional Study, Growth Drivers, Challenges and Opportunities by 2027

Global Liquild Anhydrous Hydrogen Chloride Market 2021 Industry Overview, Development Analysis, Strategic Outlook, Demand Analysis and Forecast by 2027

Global Promazine Market 2021 Status and Outlook, Future Estimations with Top Key Players, Application and Segmentation by 2027

Global Doxylamine Market 2021 Top Companies, Research Strategies, Future Growth and Geographical Regions to 2027

Global Phenylpropanolamine Market 2021 Competitive Dynamics, COVID Impact, Segmentation and Key Players Strategies by 2027

View original post here:
Global Endpoint Encryption Software Market Application, Trends, Growth, Opportunities and Worldwide Forecast 2021 To 2026 Puck77 - Puck77

If WhatsApp chats are end-to-end encrypted why do Bollywood chats keep leaking all the time – India Today

WhatsApp chats are end-to-end encrypted, something that the Facebook-owned company has always maintained. End-to-end encryption means that no one apart from the sender and receiver can read the messages, not even WhatsApp. So despite such stringent rules, why is it that every time there is a Bollywood scandal, the WhatsApp chats of the person involved are leaked and accessed? Of late, there have been too many instances of WhatsApp chats of Bollywood celebrities leaking.

In 2020, WhatsApp chats belonging to actress Rhea Chakraborty were circulated all over the internet. Then we saw Deepika Padukone heading to the NCB office after her chats with an alleged drug dealer were accessed. The latest case involves Bollywood actress Ananya Pandey, who was summoned by the NCB after her chats with Aryan Khan, son of Shah Rukh Khan, were allegedly revealed to the authorities.

All these incidents make one question whether WhatsApp messages are really end-to-end encrypted? And how do the chats leak or are accessed by others? We try to explain.

WhatsApp has always maintained that all its messages are end-to-end encrypted. In the given scenario, the messages can only be read by the sender and the receiver and no third person can gain access to them, not even WhatsApp and Facebook. WhatsApp's end-to-end encryption uses a Signal Protocol which keeps the third parties and WhatsApp itself from having access to messages or calls.

"WhatsApp has no ability to see the content of messages or listen to calls that are end-to-end encrypted. That's because the encryption and decryption of messages sent and received on WhatsApp occur entirely on your device. Before a message ever leaves your device, it's secured with a cryptographic lock, and only the recipient has the keys. In addition, the keys change with every single message that's sent. While all of this happens behind the scenes, you can confirm your conversations are protected by checking the security verification code on your device," WhatsApp's FAQ page states.

End-to-end encryption, when implemented well, is a serious business. It is near impossible, if not impossible, to break into end-to-end encrypted data. So, how do WhatsApp chats leak? The reality, in most cases, is that they don't. Instead, they are accessed. And this access happens simply with: Unlock your phone and give it to me. In India, the law around the access of personal devices like smartphones is hazy. In the US or many European countries, cops require warrant before they can seize and search phones and computers.

Here are several scenarios:

-- The phone is physically accessed and the user is told to unlock it. Once unlocked, all chats are accessible. Screenshots can be taken, they can be copied, they can be shared.

-- The phone is physically accessed but it is not unlocked. In this instance, forensics teams can do some of their magic. WhatsApp chats are encrypted but until a couple of weeks ago the Chat Backups that WhatsApp was making to Google Drive or iCloud were not encrypted. These chat backups could be accessed using some specialised tools.

For example, once someone has the phone, data on it could be cloned to a computer and then could be accessed using forensic tools.

-- At the same time, there is an option available to law enforcement agencies to approach Google and Apple with a valid court order and get the WhatsApp chat backups (unencrypted until recently) from them. These backups then could be taken apart in forensic labs.

Even now when the chat backups can be encrypted, the option has to be enabled by the user. So, unless you explicitly tell WhatsApp to encrypt your chat backups, they will still be in unencrypted form.

Law enforcement authorities can contact WhatsApp to share the account records of a user in emergency situations. The store contents of any account may include "about" information, profile photos, group information and address book, if available. Once a request is placed, WhatsApp carefully reviews, validate and respond to law enforcement requests based on applicable law and policy.

However, nowhere does the FAQ page of WhatsApp states that the messaging app shares the message content with the law enforcement authorities. It is because WhatsApp does not store messages once they are delivered or transaction logs of such delivered messages. The undelivered messages are deleted from WhatsApp servers after 30 days. The end-to-end encryption, which is activated by default, does not allow WhatsApp to access the chats of its users.

More:
If WhatsApp chats are end-to-end encrypted why do Bollywood chats keep leaking all the time - India Today

WhatsApp Brings End-to-End Encryption To Backups – We are Social Media

Five years after WhatsApp made end-to-end encrypted default, the platform is extending its privacy setting to chat backups.

WhatsApps default-on End-to-end encryptionensures that the 100 billion messages its 2 billion users exchange each day are kept private among sender and receiver only.

Now, five years after launching end-to-end encryption, WhatsApp is announcing the expansion to chat backups as well, allowing users to secure the privacy of entire chats they choose to back up if they lose their phone.

This week, the new option starts rolling out, providing an extra layer of security and online privacy, protecting backups stored on Google Drive or iCloud with end-to-end encryption.

The update is massive when you consider the sheer volume of text and voice messages that people exchange not to mention everything else they send each other on the app, including media, video calls, etc.

WhatsApp is now the only global messaging service at its scale that provides this level of security for its users messages.

To activate the feature and ensure backups are end-to-end encrypted, WhatsApp users can either set up a password of their choice or a 64-digit encryption key that only they know. As end-to-end encryption fundamentals go, neither WhatsApp nor their Google or Apple backup service provider will be able to access neither the backups nor the key required to unlock them.

WhatsApp is starting to slowly roll out the feature this week to users with the latest version of the app.

Note: You wont be able to restore your backup if you lose your WhatsApp chats and forget your password or key. WhatsApp cant reset your password or restore your backup for you.

WhatsApp is piloting a new feature that lists small local businesses in a directory searchable by users looking for local

WhatsApp will soon let users choose to hide their "last seen" timestamp from some specific contacts at a time.

WhatsApp is offering access to a new beta version of its desktop app to let you experiment with new features.

WhatsApp has announced that your entire chat history can now be seamlessly transferred between operating systems without losing encryption.

According to reports, WhatsApp is developing a way to let you transfer your chat history between operating systems and phone

WhatsApp is rolling out a new feature called 'View Once' that lets users set photos and videos to disappear from

WhatsApp is introducing a new feature that lets users join group calls, audio and video, even after they have already

WhatsApp is rolling out a limited public beta test allowing support for multiple devices without the need of having a

The WhatsApp Vaccine Finder is part of the National Month of Action initiative to get 70% of Americans at least

The rest is here:
WhatsApp Brings End-to-End Encryption To Backups - We are Social Media

Database Encryption Market Opportunities And Key Insights 2021 Puck77 – Puck77

DataIntelo announces the release of a new report, Database Encryption Market Research Report 2021. The statistics and insights provide an in-depth look into the market and opportunities.

The report provides a comprehensive analysis of key market shares, size, trends, and forecasts for the global Database Encryption market. It also covers data on new product launches, major deals, and projects in the industry. Analysis of key players with major projects, developments that are impacting the market.

On the basis of region, the report covers the global Database Encryption market in six regions, namely North America (NA), Western Europe (WE), Eastern Asia (EA), Central and Eastern Europe (CEE) Middle East & Africa (MEA), and Latin America & Caribbean. Country-level data is also provided in the report.

Get Exclusive Sample Report at: https://dataintelo.com/request-sample/?reportId=84795

Global Database Encryption Market is expected to grow at a CAGR of XX% in the forecast period. The report also provides insightful information relating worldwide key companies prominently operating in the industry.

Global Database Encryption Industry which includes:

International Business Machines CorporationSymantec CorporationIntel Security (Mcafee)Microsoft CorporationOracle CorporationNetapp, Inc.Hewlett-Packard CompanyVormetricSophos LtdGemalto

On the basis of Type, the report is segmented into:

Transparent EncryptionColumn-level EncryptionFile-system EncryptionApplication- Level EncryptionKey Management

On the basis of Application, the report is segmented into:

SMBsEnterprises

Factors such as increased investment on R&D activities resulting into technological innovations are expected to provide lucrative opportunities for players involved with this industry over the forecast period.

You can buy the complete report at: https://dataintelo.com/checkout/?reportId=84795

The report studies the factors considered to have greater influence over future course of the market such as size, share and dynamics in industry, companies regionally analyzed for domestic markets, value chains analysis including consumption and demand. It also includes crucial pockets of this industry which include products or services offered downstream fields end-user historic data figures relating to revenue sales market contexts more.

Successful businesses know that a competitive edge is the key to success. Thats why you need us we have years of experience in writing top-quality custom reports, and when they come from our team your rivals wont stand a chance! Our research report will provide all necessary information for strategic decisions like business growth plans by providing up-to date industry knowledge on competitors straight away at an affordable price.

Major Chapters Covered In This Report:

Chapter 1. Report Overview

Chapter 2. Global Growth Trends

Chapter 3. Market Share by Key Players

Chapter 4. Breakdown Data by Type and Application

Chapter 5. Market by End Users/Application

Chapter 6. COVID-19 Outbreak: Database Encryption Industry Impact

Chapter 7. Opportunity Analysis in Covid-19 Crisis

Chapter 8. Market Driving Force

And Many More

For Any Questions On This Report: https://dataintelo.com/enquiry-before-buying/?reportId=84795

About DataIntelo

DataIntelo is a globally leading distributor of market research report that has experienced by dealing with more than 800+ global clients. We offer quality market research report and provide data that can help generate a totally new approach for our clients to help change the outlook of their investment and business. Our mission is singular and well-defined we want to help our clients envisage their business environment so that they are able to make informed, strategic and therefore successful decisions for themselves.

Contact Info:

Name: Alex Mathews

Address: 500 East E Street, Ontario,

CA 91764, United States.

Phone No: USA: +1 909 414 1393

Email:[emailprotected]

Website:https://dataintelo.com

See the original post here:
Database Encryption Market Opportunities And Key Insights 2021 Puck77 - Puck77

We need to do a better job teaching citizens about the First Amendment – USA TODAY

Amy Kristin Sanders| Opinion contributor

Supreme court sides with Pennsylvania cheerleader over Snapchat post

The Supreme Court ruled that a Pennsylvania public school wrongly suspended a cheerleader over her profane Snapchat post.

Fox - LA, Fox - LA

For a country that purports to value our First Amendment right to freedom of speech, it has become clear that some of our elected officials dont understand it.

State legislatures across the country have passed bill after bill that violate the First Amendments free expression protections protections that limit the governments ability to infringe on individuals speech.

Yet a recent survey by the Freedom Forumof more than 3,000 Americans found that 94% value the First Amendment as vital, and more than half say it should never be altered.

Now more than ever, we need a renewed focus on civic education to ensure Americans understand their constitutional rights. In addition, one study from the Freedom Forumsuggests nearlyone in fiveAmericans cannot name a singleFirst Amendment freedom.

Still, elected officials are regularly quoted in the media, espousing plans to require social media platforms to carry certain speech or barring them from shutting down certain accounts. Ask honest constitutional scholars, and theyll assure you these plans are unconstitutional.

This summer, a federal judge in Florida temporarily barred the state from enforcing a new law that targeted social media platforms that shut down accounts of political candidates or journalistic enterprises, allowing up to $250,000 in fines per day.

Texas Gov. Greg Abbott has signed several similarly unconstitutional bills. One,House Bill 20, purports to restrictsocial media platforms when it comes tocontent moderation. Another,Senate Bill 4, aims to require Texas sports teams to play the national anthem.

The Arizona State Legislature hasconsidered a law that would require parents to opt-in toany curriculum that addresses gender identity orgender expression of sexuality effectively limiting schools ability to teach about historical events including the Stonewall riots. It also restricted the teaching of HIV and AIDS awareness.Doing so represents a clear violation of the First Amendment. Gov. Doug Ducey a Republican vetoed Senate Bill 1456, yet lawmakers persisted andreintroducedthe measure.

So why are all these lawmakers, many of whom graduated from elite law schools, proposing laws that contravene the First Amendment? Perhaps its political theater. Or perhaps they simply need a bit of civics education.

Like our elected officials, it seems even we voters need a refresher course on these issues. Only 36% of Americans know that companies like Twitter and Facebook are not liable for the content users post on their platforms, while just over half of respondents in the Freedom Forum survey knew the First Amendment protected flag burning as a form of free speech.

In numerous opinions during the past century, the Supreme Court has made clear that there are stringent limits placed upon the government when it comes to regulating speech.

As recently as June, the Court ruled 8-1 in favor of a high school student who was sanctioned by her school for a social media post that contained a well-known, four-letter expletive. Although the court stopped short of saying public school officials could never sanction students for off-campus speech, it made clear that some speech is protected by the First Amendment.

In November, the Supreme Court will hear a case asserting that the city of Austin, Texasexceeded its authority to regulate speech when it enacted an ordinance that treats on-premises signage differently from off-premises signage.

The courts decision could give federal, state and local governments much greater latitude to regulate speech if the justices decide to narrow the types of restrictions to which their highest level of scrutiny applies. In the Austin case, this would allow the city to regulate on-premise and off-premise signs differently including banning digital billboards while permitting on-site digital signage.

Without a greater emphasis on civic education, and First Amendment rights in particular, many of us will continue to lack the knowledge and tools we need to fully participate in our governance, and taxpayers will continue to foot the bill for legal challenges to state laws that are plainly unconstitutional laws that should never have been proposed or passed in the first place.

Our nations first president, George Washington, famously saidthat without free speech"dumb and silent we may be led, like sheep to the slaughter."Free Speech Week offers a great reminder that many of us need to reeducate ourselves about the collective rights and obligations that we have as citizens living under a republican form of government.

Amy Kristin Sanders is an associate professor of journalism andlaw at The University of Texas at Austin, where she studies global free expression rights.

See more here:

We need to do a better job teaching citizens about the First Amendment - USA TODAY

Transformative Justice Coalition (TJC) Press Conference and March: "Justice And the First Amendment " – Johnson City Press (subscription)

BRUNSWICK, Ga., Oct. 22, 2021 /PRNewswire/ -- On October 22, family members of Ahmaud Arbery, will join the Transformative Justice Coalition at a press conference to address recent attacks raised in court proceedings against the Transformative Justice Coalition (TJC). The press conference will precede a March sponsored by TJC and the family of Ahmaud Arbery at approximately 2:00 PM EDT. Following the press conference, the march demanding justice for Ahmaud Arbery will commence and go through the community in which Ahmaud was raised.

The Transformative Justice Coalition (TJC) sponsored 100 activists from around the nation to attend the first week of the trial of Ahmaud Arbery's accused killers. Kicking off the march with a press conference, TJC will also discuss its impressions from the first week of the murder trial and its response to the scurrilous and unfounded attacks on TJC and the First Amendment.

What:

Justice at the First Amendment

Who:

Diane Arbery, Matriarch of Ahmaud Arbery Family

Marcus Arbery, Father of Ahmaud Arbery

Barbara Arnwine, Esquire Founder/President/Co-Leader, Transformative Justice Coalition

Daryl D. Jones, Esquire, Board Chair/Co-Leader, Transformative Justice Coalition

When:

October 22, 2021 at 2:00 pm

Where:

Brunswick, GA

Founded in 2015 by Barbara Arnwine, president emeritus of the Lawyer's Committee for Civil Rights, the Transformative Justice Coalition seeks to be a catalyst for transformative institutional changes that bring about justice and equality in the United States and abroad. Learnmoreattjcoalition.org.

Formoreinformation,contact:

Lynn Whitfield, Esq.

322008@email4pr.com

(561) 856-6757

Ricky Parker

Cell: (347) 524-2530

Email: 322008@email4pr.com

View original content:https://www.prnewswire.com/news-releases/transformative-justice-coalition-tjc-press-conference-and-march--justice-and-the-first-amendment--301406859.html

SOURCE Transformative Justice Coalition

Go here to see the original:

Transformative Justice Coalition (TJC) Press Conference and March: "Justice And the First Amendment " - Johnson City Press (subscription)