Cryptography-based Vulnerabilities in Applications – Security Boulevard

Introduction to cryptography

Cryptography is designed to help protect the confidentiality, integrity and authenticity of data. By using an encryption algorithm, it is possible to transform data in a way that makes it impossible to read by anyone lacking knowledge of the secret key. Both hash functions and digital signatures can provide integrity protection, and a digital signature verifies the authenticity of a message as well.

However, these benefits of cryptographic algorithms only apply if the algorithms are used correctly. Cryptographic algorithms are very delicate, and a single mistake in design or implementation can render their protections meaningless.

Cryptography can go wrong in a number of different ways. Some of the most common mistakes are trying to use insecure or custom algorithms, using algorithms with known weaknesses and misusing cryptography entirely.

It seems that using a custom and secret encryption algorithm would protect data confidentiality better than a known one. If no one knows how an algorithm works, then it should be harder for someone to break it.

The problem with this theory is that most people are not trained cryptographers, and even trained cryptographers make mistakes when developing cryptographic algorithms. For every well-known and trusted encryption algorithm in use today, there are others that seemed like a good idea at the time but carried fatal weaknesses.

Take the Advanced Encryption Standard (AES), for example. The National Institute of Standards and Technology (NIST) put on a multi-year contest to select the AES. In August 1998, fifteen candidate algorithms were chosen from those submitted. Within a year, major vulnerabilities were discovered within five of the algorithms and another four had less-serious attacks.

These were algorithms developed by experienced cryptographers with knowledge of common cryptanalytic techniques, yet many were rapidly broken. Dont try to create (Read more...)

More here:
Cryptography-based Vulnerabilities in Applications - Security Boulevard

Global Encryption Key Management Market 2020 (Impact of the COVID-19) by Types, Application, Region, Industry Analysis, Recent Trend & Forecast…

Global Encryption Key Management Market study delivers an in-depth study of the business space as well as the thorough overview of the number of significant segments. This research study on the Global Encryption Key Management Market has been designed through complete primary research as well as secondary research methodologies. Furthermore, a separate analysis of present and future trends in the Global Encryption Key Management Market, micro and macro-economic indicators as well as different mandates and regulations is included in the Global Encryption Key Management Market report. In addition, this research study also features an inclusive qualitative and quantitative evaluation by studying data gathered from several market players and market predictors across various key factors in this market. By doing so, this market report assesses the attractiveness of every major segment of Global Encryption Key Management Market industry over the estimate period. Similarly, the market covers several key regions with industry status and income details.

Request a sample of this report @ https://www.orbisresearch.com/contacts/request-sample/4177121

In addition, the research report also sheds light on major insights related with the regional development of the Global Encryption Key Management Market and the main organizations along with prominence of the market. This report extensively explains the geographic hierarchy of the target market, while categorizing it into diverse regions such as North America, Europe, Asia Pacific, and the MEA.

Key vendors/manufacturers in the market:

The major players covered in Encryption Key Management are: Thales Group, Ciphercloud, Google, IBM, Amazon, Egnyte, Keynexus, Box, Alibaba Cloud Computing, Unbound Tech, etc.

Browse the complete report @ https://www.orbisresearch.com/reports/index/global-encryption-key-management-market-2020-by-company-regions-type-and-application-forecast-to-2025

Similarly, the Global Encryption Key Management Market study sums up the total market scenario offering the comprehensive overview of the Global Encryption Key Management Market with respect to its present status and market size on the basis of share and volume. Likewise, primary sources explained in this study contains analytical service providers, processing organizations, as well as management organizations of the Global Encryption Key Management Market industry value chain. Though, all the primary sources were cross-examined to validate and accumulate quantitative and qualitative statistics and determine the imminent growth prospects.

Global Market By Type:

By Type, Encryption Key Management market has been segmented into Folders/Files, SaaS App, etc.

Global Market By Application:

By Application, Encryption Key Management has been segmented into Enterprise, Personal, etc.

Additionally, this research report documents the information associated with Global Encryption Key Management Market share held by each single region with prospective growth forecasts on the basis of regional study. The research estimates the industry growth rate on the basis of each regional segment during the prediction period. Similarly, in the inclusive primary research technique undertaken for this investigation, the primary sources market experts such as innovation & technology directors, vice presidents, CEOs, founders, marketing director, and major executives from numerous major industries as well as administrations in the Global Encryption Key Management Market industry also have been interviewed to achieve and verify major aspects of this research study. The study also helped in the segmentation as per the major industry trends to the bottom-most level, geographic markets, and major expansions from technology and market-based perspectives. Furthermore, the secondary research technique offers substantial data about the industry value chain, applications extents, and prominent service providers.

Make an enquiry of this report @ https://www.orbisresearch.com/contacts/enquiry-before-buying/4177121

About Us :

Orbis Research (orbisresearch.com) is a single point aid for all your market research requirements. We have vast database of reports from the leading publishers and authors across the globe. We specialize in delivering customized reports as per the requirements of our clients. We have complete information about our publishers and hence are sure about the accuracy of the industries and verticals of their specialization. This helps our clients to map their needs and we produce the perfect required market research study for our clients.

Contact Us :

Hector CostelloSenior Manager Client Engagements4144N Central Expressway,Suite 600, Dallas,Texas 75204, U.S.A.Phone No.: USA: +1 (972)-362-8199 | IND: +91 895 659 5155

See the original post:
Global Encryption Key Management Market 2020 (Impact of the COVID-19) by Types, Application, Region, Industry Analysis, Recent Trend & Forecast...

5 Signs You’ve Found the Most Secure VPN – The Apopka Voice

By Emily Walsh

Are you working from home and need to secure your company data? Maybe you are in the journalism world or trying to blow the lid off government corruption and need to protect your identity? These scenarios, and many more, require top-notch security, and a VPN is a great way to achieve that. Fortunately, you dont need to be a tech wiz to find the most secure VPN for the job.

If youre short on time, heres a list of secure VPNs from ProPrivacy. Each one of their recommendations ticks all the boxes for privacy and security. Read on for the details so you know what keeps your data safe and sound.

Even the most secure VPN isnt perfect, but thats why safety features are a thing in engineering. Lets say you have trouble connecting to your providers server, or your VPN connection drops for whatever reason and you dont notice until later. Any cyber criminal worth their salt can take advantage of that small window of opportunity.

Since your network traffic isnt encrypted (i.e. obfuscated) by your VPN, you can be the victim of a man-in-the-middle attack. This is especially the case if you use an unsecured Wi-Fi network. In fact, due to some security flaws in modern Wi-Fi encryption protocols, even password-protected networks arent as safe as you think.

This is where the kill switch comes into play. This feature automatically stops all network traffic until you can safely reconnect to the VPN preventing any accidental data leaks.

If you werent aware, many ISPs have been caught selling your data to the highest bidders. VPNs encrypt your traffic so not even your ISP can snoop on your browsing behavior. However, your VPN provider can see the websites you access and which of your apps access the Internet so youd better pick someone reliable to protect your data.

One way to know if your provider is trustworthy is to look at their data logging policy. No-logs VPNs dont keep tabs on your browsing behavior, meaning your online data wont be exposed to potential hacking incidents. Nor do you risk your data being seized by restrictive governments.

Bonus points if they dont keep connection logs either. They are relatively harmless on their own, as they only show non-identifiable data such as connection times, the amount of data used, etc. However, connection logs could leave you open to a traffic correlation attack which is sometimes used to break the anonymity of TOR users.

Claiming they keep no logs in their privacy policy is nice and all, but having that fact verified is even better. This could be done through two methods:

Nothing useful could be found in either case, because the providers dont keep any logs.

The 5/9/14 Eyes alliance is a group of countries whose intelligence agencies collaborate and share information. This wouldnt be a problem in itself until you realize they also share data about their own citizens. Moreover, the countries that are part of this collective tend to have dystopian surveillance programs in place (see the UK Investigatory Powers Act).

Ideally, the VPNs jurisdiction should have strong privacy laws (for example, no mandatory data retention). ExpressVPN is based in the British Virgin Islands (BVI), a small territory with no data retention laws. Furthermore, other countries (such as the UK or the US) cant compel BVI companies to share data about their users.

Of course, there are exceptions to the rule. The US is a major player in the 5 Eyes alliance, and Private Internet Access is a US-based VPN. However, theyve had the security of their service proven twice, as seen in the previous section.

VPNs encrypt your data using complex mathematical equations. The only way that data can be read is by having the correct key to decrypt it. Now, if a VPN used a single master key to encrypt your data and a hacker got their hands on that key, they could intercept everything thats being encrypted with it.

Perfect Forward Secrecy solves that by using a different key for each session. Say, you log into your VPN in the morning before work to make a quick online payment then log off a few hours later. When you log back in, the VPN will use a different encryption key.

Of course, thats just one example. Some encrypted messaging apps can generate a new key for every message, as described in the Wired article linked above. VPN providers like ExpressVPN use dynamic encryption keys that change every 60 minutes if you tend to browse the web for longer periods.

In the unlikely event that a hacker obtains one key, all they could see is the data for that specific session. Its still not an ideal scenario, but certainly not as bad as if they could continue to spy on your online activity with the master key.

We could also talk about how secure VPN clients shouldnt expose your IP address through things like WebRTC or DNS leaks. Although, truth be told, we consider IP leak protection to be a bare minimum for a quality VPN provider.

Other than that, the encryption protocols they use in their software are another deciding factor. Most providers nowadays offer OpenVPN, which is widely considered the most secure VPN protocol out there. As such, we couldnt include it as much of a distinguishing feature though its good to keep in mind for your research.

Read more here:
5 Signs You've Found the Most Secure VPN - The Apopka Voice

Trump Retweets Doctor Who Warned of Sex with Demons and Alien DNA – Democracy Now!

As the U.S. death toll from COVID-19 rapidly approached 150,000, President Trump declared Tuesday that much of the United States is COVID-free. Speaking from the White House press room, Trump lamented polls showing his approval rating lagging far behind top infectious disease expert Dr. Anthony Fauci.

President Donald Trump: So, it sort of is curious. A man works for us, with us, very closely, Dr. Fauci and Dr. Birx, also highly thought of and yet theyre highly thought of, but nobody likes me. It can only be my personality. Thats all.

Trump walked out of Tuesdays press briefing after a CNN reporter asked him about his retweeting of a video featuring Stella Immanuel, an evangelical Christian doctor who has urged people not to wear masks and embraced the drug hydroxychloroquine for COVID-19 despite studies showing it offers no benefit and can cause deadly side effects. Immanuel has previously suggested alien DNA was used in pharmaceuticals and that gynecological problems are caused by sexual visitations by demons.

See original here:

Trump Retweets Doctor Who Warned of Sex with Demons and Alien DNA - Democracy Now!

Equation Group is alive and kicking and active in Russia: Group-IB report – iTWire

Singapore-based Group-IB listed the Equation Group, which is generally acknowledged as being a part of the NSA. It was originally discovered and named by Russian security outfit Kaspersky. In its latest Hi-Tech Crime Trends report for 2019-20, Group-IB pointed out that the Equation Group was operating against Russia and countries formed from the break-up of the former Soviet Union.

Of itself, GroupIB says it is a leading provider of highfidelity adversary tracking and threat attribution framework, and bestinclass antiAPT and online fraud prevention solutions

It claims to have been in business for 16 years, with more than 60,000 hours of incident response experience, says it has carried out more than 1000 cyber crime investigations globally and has more than 360 top-drawer cyber security experts on its staff.

When Kaspersky described the Equation Group, it characterised the entity as the one of the most sophisticated cyber attack groups in the world and "the most advanced ... we have seen", operating alongside but always from a position of superiority with the creators of Stuxnet and Flame.

Kaspersky says most of the Equation Group's targets had been in Iran, Russia, Pakistan, Afghanistan, India, Syria, and Mali.

According to Wikipedia, the name Equation Group was chosen because of the group's choice of sophisticated encryption methods in their operations. By 2015, Kaspersky had documented 500 malware infections by the group in at least 42 countries, while acknowledging that the actual number could be in the tens of thousands due to its self-terminating protocol.

The geographical areas that various APTs focus on. Courtesy Group-IB

In 2017, WikiLeaks published a discussion held within the CIA on how it had been possible to identify the group. One commenter wrote that "the Equation Group as labelled in the report does not relate to a specific group but rather a collection of tools" used for hacking.

Kaspersky announced the existence of the Equation Group during its annual summit in Mexico in 2015, saying the group had been active at least since 2001 and had more than 60 actors. The malware it used, dubbed EquationDrug and GrayFish, was found to be capable of reprogramming hard disk drive firmware.

Because of the advanced techniques involved and high degree of covertness, the group is suspected of ties to the NSA, but Kaspersky has not identified the actors behind the group.

In August 2016, a group calling itself The Shadow Brokers, widely suspected to be NSA insiders, released stolen exploits from the Equation Group on the web. Kaspersky cited similarities between the stolen code and earlier known code from the Equation Group malware samples it had in its possession, including quirks unique to the Group's way of implementing the RC6 encryption algorithm, and concluded that this announcement was legitimate.

The stolen files date from as recent as June 2013, thus prompting NSA whistleblower Edward Snowden to speculate that a likely lockdown resulting from his leak of the NSA's global and domestic surveillance efforts stopped The Shadow Brokers' breach of the Equation Group.

Exploits against Cisco Adaptive Security Appliances and Fortinet's firewalls were featured in some malware samples released by the Shadow Brokers. EXTRABACON, a Simple Network Management Protocol exploit against Cisco's ASA software, was a zero-day exploit at the time of the announcement.

Network equipment maker Juniper also confirmed that its NetScreen firewalls were affected. The EternalBlue exploit was used to conduct the damaging worldwide WannaCry ransomware attack in May 2017.

Apart from the Equation Group, the Group-IB report also lists what it claims are APTS from Russia, Iran, North Korea, Pakistan, the Middle East, China, Gaza, Vietnam, the UAE, Turkey and India. Several of these groups have more than geographical area of operation, according to Group-IB.

The report said the key threat to telecommunications networks was hijacking of the border gateway protocol, with nine of the APTs posing a threat to the sector, more than the number of groups that were considered a threat to the financial sector.

The firm said that as 5G networks expanded, the cyber security problems of each company's gear would reflect their share of the market.

"In a few years, telecom companies will struggle to detect hardware and firmware backdoors in 5G infrastructure equipment," Group-IB predicted.

"Many telecom operators are managed service providers and provide security services to government and commercial organisations. Threat actors will attack operators to penetrate the networks they protect."

The 63-page Group-IB report said that only two Russian-linked groups showed an interest in attacking the energy sector by compromising networks and using traditional malware.

Regarding the financial sector, the report said SilentCards was a new group that was focused on attacking banks in Africa.

The trend of attacks had changed since 2017, Group-IB claimed, pointing to big ransomware attacks like WannaCry, NotPetya and Bad Rabbit in 2017, followed by side-channel attacks and targeting vulnerabilities in processors the following year and moving to overt military operations in cyber space in 2019.

One incident of sabotage was noticed in March 2019 when Simn Bolvar Hydroelectric Plant, also known as the Guri Dam, was attacked. This resulted in a mass-scale blackout in Caracas and 22 of the 23 states. The Russian news agency TASS, cited the Venezuelan Communications Minister Jorge Rodriguez as saying there had been a cyber attack against the automated control system. This is the first time large parts of a country have been left without power for many days due to an attack of this kind.

A second incident involved a group affiliated to the Palestinian group Hamas. Group-IB said cited Israeli sources as saying on 4 May 2019, hackers tried to carry out a cyber attack but did not reveal details. The Israel Defence Forces launched an air strike on a building in the Gaza Strip in retaliation, where the hackers; headquarters is believed to have been located. This is said to be the first time that a missile strike has been launched in response to a cyber attack.

A third incident was recorded in June 2019. On 20 June, Iran's Islamic Revolutionary Guard Corps shot down a US drone. The US retaliated a few days later by launching a cyber attack on IRGC's missile control systems.

As this kind of attack needs months of preparation, the systems had probably been compromised some time ago, Group-IB reasoned.

BGP hijacking occurs when traffic is directed to the wrong sources. When it came to inter-carrier routing, carriers (and content providers like Google, Facebook etc) often need to send traffic to each other.

Launtel ISP chief Damian Ivereigh explained it this way: "They rely on a protocol called BGP Border Gateway Protocol which essentially allows each carrier to broadcast to each other what IP address ranges (called 'prefixes') should be sent to them. We, for example, announce to the world that any traffic for the IP address range 103.216.190.0 to 103.216.191.255 should be sent to us."

The security of the process was "not great" and one carrier could announce incorrect prefixes and effectively take over the address ranges of another provider (and take them down).

"This is limited only by the level of trust that each carrier places in another carrier when they receive an advertisement.

Group-IB listed three BGP incidents in 2018 and 2019 which had affected traffic on the Internet. On 25 November 2018, a small Russian operator Krek made a mistake in its BGP configuration which led to between 10% and 20% of Russian Internet users losing access for more than an hour.

Companies like Amazon, YouTube, Russian social network VK and online video streaming service ivi.ru and a number of other organisations were also affected.

The same month, MainOne, a Nigerian ISP, made a configuration error that changed routes in such a way that traffic to Google services was sent to China, with a total of 180 prefixes being affected. The problem was fixed after 74 minutes.

A third incident, on 6 June 2019, the Swiss company Safe Host caused a leak of 70,000 routes to China Telecom. Swisscom, the Dutch ISP KPN and French ISPs Bouygues Telecom and Numericable-SFR were all affected for two hours.

Group-IB said during the period covered by the report, its researchers had analysed attacks carried out by 38 groups from Russia, North Korea, Pakistan, China, Vietnam, Iran, the US, the UAE, India, Turkey and unspecified South American countries.

"It is important to note that there is still no public information about attacks originating from developed countries. This again confirms that well-orchestrated attacks are difficult to detect or attribute to a specific group or country," the report said.

Group-IB said its previous report had identified BIOS/UEFI attacks as a prominent trend, with experts predicting that the main targets would be firmware and motherboard makers in the Asia-Pacific region where many big companies have their production facilities.

Soon after the report was published, news of a malware campaign called Operation ShadowHammer came to light, with malware being delivered through the ASUS Live Update, a legitimate utility that automatically updates BIOS, UEFI, drivers and applications.

The malicious utility was signed with a legitimate certificate from ASUSTeK Computer and hosted on an ASUS server.

In July 2018, experts found a new malware campaign involving the Plead backdoor, which was digitally signed using a valid D-Link Corporation certificate. At the end of April 2019, these experts identified multiple attempts to deploy the same malware in an unusual way. The Plead backdoor was created and executed by a legitimate process named AsusWSPanel.exe.

The executable file was digitally signed by ASUS Cloud Corporation. Plead malware has always been most widely deployed in Taiwan.

In December 2018, Chinese attackers reportedly infiltrated the networks of Hewlett Packard Enterprise and IBM as part of the Cloudhopper campaign. By gaining access to the networks, they were subsequently able to break into computers belonging to HPE and IBM clients.

Cloudhopper compromised client data in 12 countries, including Brazil, Germany, India, Japan, the United Arab Emirates, Great Britain, and the United States.

The clients were from industries such as finance, electronics, medical equipment, biotechnology, automotive, mining, and oil and gas.

The Group-IB report also contains exhaustive details of JavaScript sniffers used to attack content management systems. details of other BGP attacks, details about attacks on ATMs and financial institutions and numerous other cyber heists, including PC banking trojans and bog-standard phishing exploits.

See the original post here:
Equation Group is alive and kicking and active in Russia: Group-IB report - iTWire

Weve Neglected the Freedom of Assembly for Years Before Portland – Slate

People gather in protest in front of the Mark O. Hatfield federal courthouse in Portland, Oregon, on Tuesday.Spencer Platt/Getty Images

The First Amendment prevents the government from doing a whole lot of things. We tend to focus on the freedom of speech, but the First Amendment also protects other, equally important freedoms, among them, the right of the people peaceably to assemble. The right to assemble, protest, and gather is the neglected younger sister to the free speech clause. As the Supreme Court lavishes attention on commercial speech and money as speech and religious signage and union dues and cake baking as speech, the freedom to gather and protest is often forgotten.

But this spring and summer, as protests broke out across the country initially in response to the police killing of George Floyd, a Black man, and increasingly in response to government crackdowns on protest itself, we are left with the grim prospect of protesters without much legal protection, despite the First Amendment. This much was plain to see in two congressional hearings on Tuesday, in which thousands of peaceful demonstrators were dismissed as anarchists and mobs, both by Republicans in Congress and by Attorney General William Barr.

The first hearing, before the House Committee on Natural Resources, was about what transpired on June 1, when government officials assaulted protesters in Washingtons Lafayette Square. Adam DeMarco, a major in the D.C.National Guard, testified that he saw what he deemed excessive force used to clear peaceableprotestersoutside the White House immediately before President Donald Trumps photo opportunity atSt. Johns Church. DeMarco testified that inaudible warnings to clear the park were issued at 6:20 p.m. and that even though a curfew was set for 7 p.m., at 6:30 he witnessed a clearing operation that included explosions and smoke he was told was stage smoke, which he recognized from his own military experience as tear gas. He said he later found spent tear gas cannisters on the street nearby. DeMarco described the people targeted as demonstratorsour fellow American citizensengaged in the peaceful expression of their First Amendment rights.

Testifying immediately before DeMarco, though, acting U.S. Park Police Chief Gregory Monahan insisted thatwhat he had seen in the same park was some of the mostviolent protests that Ive been a part of my 23 years of the United States Park Police, and that the police were responding to severe violence from a large group of bad actors including arson, vandalism, and injuries sustained by more than 50 officers.He insisted that the surge of official violence to clear the park that happened at 6:30 p.m. needed to occur in a crowded park with almost no warning because protective fencing had to be installed around the perimeter and that the presidents walk to the church at that hour was pure coincidence. In response to multiple videos of police in riot gear assaulting unarmed protesters with bats and shields, and footage of an Australian TV crew punched and assaulted, Monahan insisted that the footage represented merely a moment in time, and that violent protesters had bats, boards, water bottles, and bricks that they were using against law enforcement. Monahan concluded that the Park Police had exercised tremendous restraint in clearing the protesters, although he conceded there were no incidents involving attacks on officers that day, save a single assault after the violent clearing began.

Neither Barr nor Monahan could explain when and how one protester hellbent on violence turns an entire peaceful protest into an angry mob, or why a thrown water bottle should be met with pepperspray.

In a separate hearing held the same day, Attorney General William Barr was testifying before the House Judiciary Committee for the first time in more than a year. He had said he was the one who gave the order to clear the park in June, and during the hearing, he characterized the scene at Lafayette Square as unprecedented rioting around the White House. He also urged that the timing connected to Trumps photo shoot was a coincidence. Barr described what is widely acknowledged as weeks of peaceful racial justice protests in Portland, Oregon, as a moblike siege by violent rioters and anarchists against a courthouse, which includes the use of lasers, pellet guns, and slingshots against federal officers. (The New York Times could not confirm the use of those weapons.) Barr declared that what unfolds nightly around the [Portland] courthouse cannot reasonably be called a protest; it is, by any objective measure, an assault on the government of the United States, although he could not explain why protests in Michigan by armed white men that included overt threats of lynching the governor were not a mob. (Barr claimed he did not even know of the Michigan protests.) Chillingly, he insisted that while tear gas and violence were not appropriate responses to peaceful protesters, the problem when these things sometimes occur is, its hard to separate people. Barr claimed that unmarked vans were used on protesters so that they could pick them up where there was less of a risk to this mob response. He further claimed there could be probable cause for law enforcement officers to arrest and detain innocent protesters simply because they had been standing next to someone else suspected of using a laser against law enforcement, or because it could mean the person ditched the laser. A peaceful protest thus reverts to a violent mob if one person throws a water bottle or if unarmed protesters fail to clear the perimeter when told to disperse. It is appropriate to use tear gas when its indicatedto disperse an unlawful assembly, the attorney general of the United States said.

In other words, in Barrs hands, the freedom of assembly is transformed to mass guilt by association. Neither he nor Monahan could explain when and how one protester hellbent on violence turns an entire peaceful protest into an angry mob, or why a thrown water bottle should be met with pepper spray. And never you mind that Barr is virtually alone in his view of what happened at Lafayette Square. Trumps own former Defense Secretary James Mattishas blastedthe administration for its treatment of the D.C. protesters, calling the June 1 eventa bizarre photo op. Chairman of the Joint Chiefs of Staff Mark Milley later saidit wasa mistake for him to participate in the walk to the church. Former DHS Secretary Tom Ridge has decried the use of federal law enforcement authorities in Portland as pouring gasoline on a fire and emphasized that preserving the right to dissent is something very important, and that you cant justify the violence that has accompanied those protests. Michael Chertoff, who served as secretary of homeland security under President George W. Bush, has written that what DHS is doing in Portland is wildly inappropriate:

Videos reveal agents operating in camouflage uniforms with no clear identifying insignia. That may be appropriate combating transnational drug gangs in a border environment, but not in American cities. Other videos and reports make clear that even peaceful demonstratorssuch as individuals identifying asmilitary veteranswere struck with nonlethal projectiles and strong tear gas. And there was no respect for, or coordination with, the wishes of local authorities.

Perhaps in response to the widespread horror from virtually everyone who is not currently serving in the Trump administration, Oregon Gov. Kate Brown announced Wednesday that federal forces would be withdrawn from the city of Portland.

But even if Barr stands alone, with only the president and DHS officials sharing his views of what the right to protest actually means, the retreat from Portland isnt without consequences. In perhaps the most alarming development on Tuesday, Dara Lind at ProPublica reported that federal authorities in Portland have been arresting protesters for offenses as minor as failing to obey an order to get off a sidewalk on federal property then advising them that they are specifically barred from attending protests or demonstrations as they await trials on federal misdemeanor charges. While one of Linds experts describes these orders as sort of hilariously unconstitutional, its manifestly clear that Barrs claim that the mere act of standing next to someone holding a weapon, or failing to obey an order to disperse, means you are part of an unlawful assembly has now been used by federal prosecutors to prosecute participants and also to explicitly chill any future protest. That renders the peaceable assembly clause of the First Amendment a shell of a freedom, an alarming new phase in its overlooked status.

It hasnt always been this way. As Drexel University professor Tabatha Abu El-Haj explained in her 2009 article The Neglected Right of Assembly, the existence of a right of peaceable assembly was not controversial at the founding because it was a traditional right of English freemen. Despite crowded cities and worked-up mobs, until the late 19th century, it was widely understood that street politics demanded the right to protest, gather, assemble, and shout on busy streets and parks. As Abu El-Haj explains it, that included bonfires and toasting and rowdiness and feasting, and all of that street gathering was deemed a central, and essential, feature of civic political life. And as she notes, so widely accepted was the fundamental right to gather and protest that it was included virtually without comment in the First Amendment. Moreover, in the first United States Congress a discussion of the proposed Bill of Rights amendment [regarding assembly] was declared beneath the dignity of the members.

There was very little case law, or even academic writing, about the right to assemble, and it was also widely understood that while the state could prosecute those who behaved criminally at public rallies, rallies themselves were integral to democratic freedom and the free exchange of ideas. This all changed, Abu El-Haj explains, only in the late 19th century, when courts began to permit all sorts of licensing requirements on public assemblies. Today, its simply understood and accepted that demonstrations require paperwork and permits and state discretion as to time, place, and manner constraints, and as she notes, in this century, maintaining order, preventing traffic jams, and ensuring security are all considered significant governmental interests. We have, in short, acceded to a regulatory regime that forces protesters to both seek government permission to assemble, and then to be at the mercy of state claims about potential lawlessness, rioting, inconvenience, or traffic, when the government seeks to quell protest. As Abu El-Haj points out, we have replaced the notion that the state can only interfere with gatherings when they disturb the peace, with a legal regime in which the state is permitted to regulate in advance (by confining to certain spaces or times) assemblages that are both peaceful and not inconvenient. Garrett Epps explains here that red states have been expansively regulating protest and protesters for years now, culminating, as he writes, inagrotesque opinionout of the 5th U.S. Circuit Court of Appeals last year, approving the principle that anyone who organizes a protest can be suedand thus possibly bankruptedif someone else present commits an illegal act. That is why this summer we have seen enforcement officers justifying the use of tear gas on peaceful protesters on the grounds that they dont want to wait around to see if violence will ensure. That is essentially Barrs claim as well. And the larger the protest, the greater the chance for individual bad actors to act out, the less likely warnings to disperse will be heard, and the more likely arrests, and federal bans on future protest, will occur. In other words, as protests grow and spread, regardless of conduct, the more certain Barrs vision of all protests as inherently dangerous mobs of anarchists will become.

What the centurieslong failure to protect a robust right to assemble and demonstrate means is that we now gather to protest at the sufferance of local authorities. And the testimony of the attorney general on Wednesday signals that federal authorities will not wait to be invited to crack down on protest either. Arrests of protesters on pretext that lead to agreements not to protest in the future are perhaps the best signal that the First Amendment right to assemble is not nearly as robust as we might have believed.

Readers like you make our work possible. Help us continue to provide the reporting, commentary, and criticism you wont find anywhere else.

Continue reading here:

Weve Neglected the Freedom of Assembly for Years Before Portland - Slate

On the Hill with Denver Riggleman – Brunswicktimes Gazette

July 24, 2020

Friends,

This week the House passed the National Defense Authorization Act (NDAA). Included in this years NDAA is a section Iauthored as well as two amendments that Ico-sponsored. The National Defense AuthorizationAct fulfills one of Congress mostessential duties: funding our military. This years NDAA puts our troops and Americas security first by laying the foundations for an Indo-Pacific Command Deterrence Initiative, continuing to reform the Pentagons business practices, and improving provisions to support our military families.

Passing the National Defense Authorization Act is one of Congress most important constitutional duties. It is imperative that Congress passes a bill to support the brave men and women of our Armed Forces and provide them with the resources they need. I am especially pleased that three sections I co-authored were included in the final version of the bill. Those sections will equip our Armed Forces with the skills they need, deter our enemies threats, andkeep Americans safe.

Thelegislation I authored was the Banking Transparency for Sanctioned Persons Amendment whichrequires the Treasury Secretary to submit a semi-annual report regarding financial services for state sponsors of terrorism and puts foreign banks on alert that Congress will be watching their dealings with human rights abusers and corrupt officials.

The first amendment I co-sponsoredisentitled"Limitation on Eligibility of For-Profit Institutions To Participate In Educational Assistance Programs of the Department of Defense. This amendment to the National Defense Authorization Act will close the 90/10 loophole and help send more veterans to college by stopping for-profit institutions from exploiting Department of Defense funding.

The second amendment that I co-sponsoredis the"Homeland and Cyber Threat Act, which creates a cyber attack exception under the Foreign Sovereign Immunities Act (FSIA) to protect U.S. nationals against foreign state sponsored cyber attacks.

The application process for student nominations to the U.S. Service Academies is now open. As a Member of Congress, I have the distinct honor of nominating candidates to four of the five U.S. Service Academies. Members of Congress can nominate candidates to the U.S. Military Academy (West Point), U.S. Naval Academy, U.S. Air Force Academy, and U.S. Merchant Marine Academy. The fifth Service Academy, U.S. Coast Guard Academy, does not require a Congressional Nomination for an appointment. The honor of attending a U.S. Service Academy comes with the obligation and commitment to serve in the military for a minimum of five years upon graduation. For more information and how to apply visit my website. I am deeply proud of my own time serving as an Air Force Officer and am grateful for all our students who are willing to serve.

The National Zoo is reopening today in Washington. The zoo will be open from 8 a.m. to 4 p.m. daily.

Earlier this week, I was saddened to learn of the passing of Congressman John Lewis of Georgia. Congressman Lewis was a giant who fought for civil liberties and spoke out against injustice. It was an honor to serve with him in Congress.On Monday, the late Congressman will lie in state in the Capitol Rotunda.

If you need help with a federal agency, please contact my Charlottesville Office at (434) 973-9631. At this time all indoorSmithsonian museums in Washington, D.C. are temporarily closed to the public. Additionally, tours of the White House, US Capitol, FBI, and Library of Congress have been suspended to help contain the outbreak and prevent community spread.

See the original post:

On the Hill with Denver Riggleman - Brunswicktimes Gazette

National Labor Relations Board Announces Another Proposed Rule Regarding Representation Elections – Labor Relations Update

On Tuesday, July 28, 2020 the National Labor Relations Board (NLRB or the Board) published a Notice of Proposed Rulemaking in the National Federal Register. With its latest foray into rulemaking, the Board is looking to make two amendments to the current rules governing representation elections held under the National Labor Relations Act. Both these amendments are subject to public comment for sixty days following the published notice.

This is the third set of amendments the NLRB has made to the election rules in the past twelve months. In December 2019, the Board issued a proposed rule that would make sweeping changes to election rules and processes by eliminating many of the quickie election rules issued in 2015. As you may have seen, a federal judge blocked implementation of some of those rules, holding they failed to comply with the APA by circumventing the notice-and-comment procedure. The Board has since appealed that order, and implemented the rules that were unaffected by the order. The Board also announced changes to the Boards blocking charge policy, timing and notice requirements attendant to voluntary recognition, and 9(a) recognition in the construction industry in April. Implementation of those rules was delayed until July 31 due to COVID-19.

The first amendment announced on July 28 seeks to eliminate the Boards requirement that employers provide available personal email addresses and home and cell phone numbers of all eligible voters to the Regional Director. The Board believes that the current requirement does not protect employees privacy interests, and eliminating this rule would better advance these important privacy interests.

The second amendment seeks to provide absentee ballots to employees currently on military leave. In light of congressional policies that protect service members employment rights and provide them with the opportunity to vote in federal elections, the Board believes it should seek to accommodate service members during representation elections. Additionally, the Board believes it can do so without impeding the resolution of these elections.

These two most recent proposed changes to NLRB representation election rules will not only protect employee privacy, but will also bolster enfranchisement for workers who are out of the workplace on military leave when an election occurs. We will certainly track the progress of this most recent round of proposed rules and will keep you posted of any significant updates.

See the rest here:

National Labor Relations Board Announces Another Proposed Rule Regarding Representation Elections - Labor Relations Update

Feds charge 8 in Pittsburgh protests that turned violent – TribLIVE

TribLIVE's Daily and Weekly email newsletters deliver the news you want and information you need, right to your inbox.

About an hour ago

A federal grand jury indicted eight people in connection with alleged damage and vandalism during protests May 30 in Downtown Pittsburgh.

Most of those indicted were in some way connected to the destruction of a two Pittsburgh Bureau of Police cruisers that were set ablaze during protests sparked by the killing of George Floyd in Minneapolis police custody days prior.

The indictment was returned July 22 and unsealed Wednesday.

Those indicted are:

George Allen, 31; Nicholas Lucia, 25; Raekown Blankenship, 24; Devin Montgomery, 24; Brandon Benson, 29; and Christopher West, 35, all of whom live in Pittsburgh. DaJon Lengyel, 22, of McKees Rocks, and Andrew Augustyniak-Duncan, 25, of Carnegie, also were indicated.

The protests through Downtown carried on peacefully for much of the afternoon but turned violent after several people began damaging a marked police SUV. The marked SUV and an unmarked commanders SUV were eventually set on fire.

Throwing IEDs and bricks at police officers, throwing projectiles at and striking police horses, and setting police cruisers on fire are not the protected First Amendment activities of a peaceful protest; they are criminal acts that violate federal law, U.S. Attorney Scott Brady said in a statement.

He called those accused of sparking the violence agitators who hijacked a lawful protest and undermined a message of equality with one of destruction.

Michael Christman, Special Agent in Charge of the FBIs Pittsburgh office, vowed to continue making arrests when demonstrators spark violence. We are not done. We continue to use all of our investigative resources to find each person who chose to start a violent confrontation, he said.

Forty-six people were arrested May 30 in connection with the protest. District Attorney Stephen A. Zappalas office dropped charges against 39 of them.

Two days later, dozens were arrested during a protest in Pittsburghs East Liberty neighborhood, which had carried on peacefully for hours before the events turned violent. Zappala went on to drop charges against 22 who were arrested in that melee.

The lawlessness we saw on May 30 cannot be tolerated, said Public Safety Director Wendell Hissrich.

All of those named in the indictment also face state charges.

Allen is alleged to have thrown something through the window of a police cruiser, leading to charges of interfering with law enforcement. Blankenship, Lengyel, Montgomery and West face a similar charge for their alleged roles in kicking, punching and setting fire to the cruiser.

Augustyniak-Duncan is charged with interfering with law enforcement for allegedly throwing things at officers, and Lucia is accused of throwing a homemade explosive device at an officer that bounced off his vest and exploded on the ground. Benson and Montgomery are alleged to have tried to break into the Dollar Bank on Smithfield Street.

Megan Guza is a Tribune-Review staff writer. You can contact Megan at 412-380-8519, mguza@triblive.com or via Twitter .

Categories:Downtown Pittsburgh | Local | Allegheny | Top Stories

TribLIVE's Daily and Weekly email newsletters deliver the news you want and information you need, right to your inbox.

Read this article:

Feds charge 8 in Pittsburgh protests that turned violent - TribLIVE

Planned Parenthood sues pop-up church over noise, but pastor says there’s more to the story – Fox News

The Church at Planned Parenthood (TCAPP) in Spokane, Wash.,is being sued for making too much noise and allegedly harming patients, but theanti-abortionpastor says, "it'sfalse accusations across the board."

TCAPP's First Amendment rightsare at odds with the health care of the patients at Planned Parenthood of Greater Washington and North Idaho (PPGWNI), according to thesuit filed in Juneby Legal Voice against five area pastors and Covenant Church, which started the ministry.

BABY LIVES MATTER MURAL PAINTED IN FRONT OF PLANNED PARENTHOOD CLINIC

"You have a billion-dollar industry suing local church pastors that aren't wealthy at all, for singing and peaceably assembly," TCAPP Pastor Ken Peters told Fox News.

"We've been running for two years. We've never been cited. Wedon't cause destruction. We don't loot. We don't riot. We literally go to Planned Parenthood and we hold church once a month," Peters explained. "We do this after hours.We are not causing any harm."

Pastor Ken Peters, who started The Church at Planned Parenthood (TCAPP), speaks Tuesday, July 28, 2020 in front of a Planned Parenthood abortion clinic in Spokane, Wash. (Christine Stickelmeyer/TCAPP)

Hundreds gathered Tuesday night singing worship songs and Ryan Bomberger, a pro-life advocate who was conceived in rape andfounded the Radiance Foundation, was the speaker. The event began at 6 p.m. as the Planned Parenthoodclosed.

The abortion facility, which has been measuring noise levels, allegesthe group's worship and speakers reached disruptive and intimidating levels, violating an ordinancepassed by the Spokane City Council in March, after TCAPP started conducting the services. The lawsuit claims police are not enforcing the law because they "are on the side of the church."

BLACK PRO-LIFE LEADERS PAN PLANNED PARENTHOOD'S SANGER DISAVOWAL: 'LIKE CHANGING THE NAME OF AUSCHWITZ'

It's really, really frustrating and should not be allowed to happen, when the laws are very clear in Washington state and the city of Spokaneabout interference with health care facilities, Paul Dillon, vice president of public affairs for PPGWNI, told Crosscut. Its extremely unnerving for the patients at Planned Parenthood.

However, the pastor said their once-a-month services begin when the abortion facility closes down, and he's said they will start the service later if that is the problem.

The Church at Planned Parenthood (TCAPP), gathers Tuesday, July 28, 2020 in front of a Planned Parenthood abortion clinic in Spokane, Wash. (Christine Stickelmeyer/TCAPP)

"We arebringing attention to the fact that they are killing life for money," Peters said."That's what they don't like. That's what they're suing us for. We are shining a light for the Lord and on their sin and that's what they hate us."

PLANNED PARENTHOOD'S NEW YORK CHAPTER DISAVOWS FOUNDER MARGARET SANGER OVER RACIST EUGENICS

"At first they tried to drown us out with their own sound and their own protesters, but we kept singing, praying and praising God under our First Amendment rights of assembly and freedom of religion," Peters said.

The pastor says Planned Parenthood filled the city council with pro-abortion members and passed the city ordinance, but his gathering has even lowered their decibels.

The Planned Parenthood spokesman added that the hundreds who gather "can call themselves whatever they want, [but] in no way, shape or form is this a church.

CLICK HERE TO GET THE FOX NEWS APP

"The Church at Planned Parenthood is NOT a protest," TCAPP writes on its website, describingitself as a"gathering of Christians for the worship of God and corporate prayer for repentance for this nation, repentance for the apathetic church, and repentance for our blood-guiltiness in this abortion holocaust."

"We don't do anything but pray, preach, and give," Peters said.

TCAPP's next service is set to be held on August 18 with speaker Greg Locke, a Tennessee pastor.

Planned Parenthood claims the service isnt protected under the First Amendment because of care provided by the facility.

Patients who rely on Planned Parenthood for vital medical care have the same right as all Washingtonians to access health care without unreasonable disruption or interference, Kim Clark, Senior Staff Attorney for Legal Voice, told KREM. This is more vital than ever in a global health pandemic that is disproportionately harming people of color people who already face substantial obstacles to accessing healthcare. TCAPP and its loud mob of angry protesters, many of whom carry guns, have terrorized patients and staff at Planned Parenthood long enough.

Read this article:

Planned Parenthood sues pop-up church over noise, but pastor says there's more to the story - Fox News