U.S. spy agency abandons controversial surveillance technique

FILE PHOTO - An aerial view shows the National Security Agency (NSA) headquarters in Ft. Meade, Maryland, U.S. on January 29, 2010. REUTERS/Larry Downing/File Photo

By Dustin Volz

WASHINGTON (Reuters) – The U.S. National Security Agency said on Friday it had stopped a form of surveillance that allowed it to collect without a warrant the digital communications of Americans who mentioned a foreign intelligence target in their messages, marking an unexpected triumph for privacy advocates long critical of the practice.

The decision to stop the once-secret activity, which involved messages sent to or received from people believed to be living overseas, came despite the insistence of U.S. officials in recent years that it was both lawful and vital to national security.

The halt is among the most substantial changes to U.S. surveillance policy in years and comes as digital privacy remains a contentious issue across the globe following the 2013 disclosures of broad NSA spying activity by former intelligence contractor Edward Snowden.

“NSA will no longer collect certain internet communications that merely mention a foreign intelligence target,” the agency said in a statement. “Instead, NSA will limit such collection to internet communications that are sent directly to or from a foreign target.”

NSA also said it would delete the “vast majority” of internet data collected under the surveillance program “to further protect the privacy of U.S. person communications.”

The decision is an effort to remedy privacy compliance issues raised in 2011 by the Foreign Intelligence Surveillance Court, a secret tribunal that rules on the legality of intelligence operations, sources familiar with the matter said.

The court recently approved the changes, NSA said in its statement.

The NSA is not permitted to conduct surveillance within the United States. The so-called “about” collection went after messages that mentioned a surveillance target, even if the message was neither to nor from that person.

That type of collection sometimes resulted in surveillance of emails, texts and other communications that were wholly domestic. The NSA will continue to collect communications directly involving intelligence targets.

Friday’s announcement came as a surprise to privacy advocates who have long argued that “about” collection was overly broad and ran afoul of the U.S. Constitution’s protections against unreasonable searches.

Julian Sanchez, a privacy and surveillance expert with the Cato Institute, a libertarian think tank, called the decision “very significant” and among the top priorities of surveillance reform among civil liberties groups.

“Usually you identify a specific individual to scrutinize their content; this was scrutinizing everyone’s content to find mentions of an individual,” Sanchez said.

Other privacy advocates seized on the change to advocate for additional reforms to the Foreign Intelligence Surveillance Act (FISA). The part of the law under which the banned surveillance occurred, known as Section 702, is due to expire at the end of the year unless Congress reauthorizes it.

Democratic Senator Ron Wyden said in a statement he would introduce legislation “banning this kind of collection in the future.”

A U.S. government official familiar with the matter said the change was motivated in part to ensure that Section 702 is renewed before it sunsets on Dec. 31, 2017. FISA has come under increased scrutiny in recent months amid unsubstantiated claims by President Donald Trump and other Republicans that the Obama White House improperly spied on Trump or his associates.

Pieces of differing bits of digital traffic are often packaged together as they travel across the internet. Part of the issue with “about” collection stemmed from how an entire packet of information would be vacuumed up if one part of it contained information, such as an email address or phone number, connected to a foreign target.

NSA told the Privacy and Civil Liberties Oversight Board as recently as last year that changes to “about” collection were not “practical at this time,” according to a report from the government watchdog.

News of the surveillance activity being halted was first reported on Friday by The New York Times, which first revealed its existence in 2013, two months after Snowden leaked intelligence documents to journalists.

(Additional reporting by Mark Hosenball; writing by Eric Beech; editing by Tim Ahmann, Leslie Adler and Bill Rigby)

Anti-Putin protesters get a smart phone app to help get out of jail

Alexander Litreev, developer of the "Red Button" phone application used to tackle police detention of protesters at demonstrations across the country, poses for a picture in Moscow, Russia, April 26, 2017. REUTERS/Sergei Karpukhin

By Parniyan Zemaryalai

MOSCOW (Reuters) – Anti-Kremlin protesters who run the regular risk of being detained by the police are being given a helping hand: A smart phone app that allows them to instantly inform others where and when they have been arrested.

Russia faces a presidential election next year, which Vladimir Putin is expected to contest, and was last month shaken by large anti-government protests. More are planned.

The result of a collaboration between a Russian firm, a human rights group and an opposition movement, the notification system, called Red Button, automatically transmits the location and emergency contact details of a detained protester.

That, says its St Petersburg-based developer Alexander Litreev, should allow others to act quickly to help free them as it will include details of the police station where the individual is being held.

“Using this information, human rights defenders can help this person in some way, like sending him a lawyer,” Litreev told Reuters in an interview.

“When I see that people are being detained and experiencing violence at the hands of the authorities, and people can’t do anything about it, I think this must be fought against,” he said.

Litreev said he sympathized with the country’s liberal opposition and sometimes attended protests himself.

President Vladimir Putin remains by far the most popular politician in Russia, but opponents argue he keeps a check on dissent through control of the media, especially television, and limiting protest.

In developing the app, he partnered with the Open Russia foundation, founded by Kremlin critic Mikhail Khodorkovsky, and OVD-Info, a human rights organization that monitors detentions.

The app will also allow observers to track how protests unfold as it is linked to a special Twitter page that will generate maps and notifications.

It is currently available for devices on iOS and Android and, according to Litreev, some 4,000 users have already downloaded the app, which is free. A version for Windows will launch in the summer.

The alert system is due to go live on April 29 — the day when Open Russia has called for nationwide demonstrations against the government. Another protest, organized by opposition politician Alexei Navalny, is scheduled for June 12.

(Editing by Andrew Osborn and)

Cashless society getting closer, survey finds

FILE PHOTO: Samsung's new Samsung Pay mobile wallet system is demonstrated at its Australian launch in Sydney, June 15, 2016. REUTERS/Matt Siegel/File Photo

By Jeremy Gaunt

LONDON (Reuters) – More than a third of Europeans and Americans would be happy to go without cash and rely on electronic forms of payment if they could, and at least 20 percent already pretty much do so, a study showed on Wednesday.

The study, which was conducted in 13 European countries, the United States and Australia, also found that in many places where cash is most used, people are among the keenest to ditch it.

Overall, 34 percent of respondents in Europe and 38 percent in the United States said they would be willing to go cash-free, according to the survey conducted by Ipsos for the ING bank website eZonomics.

Twenty-one percent and 34 percent in Europe and the United States, respectively, said they already rarely use cash.

The trend was also clear. More than half of the European respondents said they had used less cash in the past 12 months than previously and 78 percent said they expected to use it even less over the coming 12 months.

Ian Bright, managing director of group research for ING wholesale banking, said he did not believe people would quit cash entirely, but the direction was obvious.

“More and more people will end up with a situation where they can quite comfortably get by for two days, three days, four days, even a week, without ever using cash,” he told Reuters Television.

Payment systems such as contactless cards and mobile-phone digital wallets have become so prevalent the issue has become political in some countries.

Cash-loving Germans, for example, have been concerned that a move by the European Central Bank to phase out the 500 euro note by the end of next year is the start of a slippery slope.

Germany is one of the countries that uses cash the most. The ING survey showed only 10 percent of Germans saying they rarely use cash, compared, for example, with 33 percent and 35 percent, respectively, in neighbors Poland and France.

The survey also showed that, in general, countries where cash is much in use were most likely to want to go cashless.

Only 19 percent of Italians said they rarely used cash but 41 percent said they would be willing to go cash. There was a similar trend in Turkey, Romania, the Czech Republic, Spain and even Germany.

(Editing by Catherine Evans)

Cyber extortion demands surge as victims keep paying: Symantec

A man walks past a display of hexadecimal code in a file photo. REUTERS/Nigel Treblin

By Alastair Sharp

TORONTO (Reuters) – Hackers are demanding increasingly hefty ransoms to free computers paralyzed with viruses, as cyber criminals seek to maximize profits from large numbers of victims willing to pay up, according to cyber security firm Symantec Corp.

The average demand embedded in such malicious software, which is known as ransomware, more than tripled last year to $1,077 from $294, and the pricing has continued to rise in 2017, according to Symantec.

“The bad guys haven’t found the top end of what people will pay,” Symantec Director of Security Response Kevin Haley said in a telephone interview.

Symantec said 69 percent of ransomware infections in 2016 hit consumer computers, with the remainder targeting businesses and other organizations.

More than a third of consumer ransomware victims around the globe pay cyber criminals to regain access to their data, according to Symantec. In the United States, where such attacks are most prevalent, 64 percent pay.

“If six out of ten people will pay your ransom when it’s three hundred bucks, you’re thinking ‘What if I raise it to four hundred? What if I raise to five hundred?'” Haley said.

The surge in cyber extortion has been fueled partly by the sale of ransomware kits, which sell for $10 to $1,800 on underground markets and make it easy for wannabe cyber crooks to get in the business, according to Symantec.

One kit, known as Shark, lets users name their demand, which its creators collect from victims and pass on to attackers, minus a 20 percent commission.

Ransomware attacks have increased sharply over the past year, with criminals targeting hospitals, police departments and other providers of critical services in the United States and Europe.

In some cases, the attacks have interrupted critical public services.

U.S. and European hospitals have been forced to divert patients to other facilities when ransomware paralyzed computer systems.

Local police have been forced to manually dispatch calls, and San Francisco’s public transit system was unable to collect fares for a weekend during the busy Christmas shopping season.

(Reporting by Alastair Sharp; Editing by Steve Orlofsky; Editing by Jim Finkle and Steve Orlofsky)

Waymo testing self-driving car ride service in Arizona

Waymo unveils a self-driving Chrysler Pacifica minivan during the North American International Auto Show in Detroit, Michigan, U.S., January 8, 2017. REUTERS/Brendan McDermid

SAN FRANCISCO (Reuters) – Alphabet Inc’s Waymo autonomous vehicle group will begin testing a self-driving car program for hundreds of families in Phoenix, Arizona and is buying 500 Chrysler minivans to do so, the companies said on Tuesday.

Waymo, which along with Google is owned by Alphabet Inc<GOOGL.O>, recently has been quietly testing the service for a handful of families, learning what potential customers would want from a ride service, the company said in a blog post.

It urged people to apply to take part in an expanded test, which is the first public trial of Waymo’s self-driving cars. The vehicles include human operators from Waymo behind the wheel, in case intervention is required and to take feedback.

Silicon Valley is racing to master self-driving technology, betting that it will transform the auto industry and be a gold mine for leading companies. Waymo has one of the best technology track records, and it has an alliance with Fiat Chrysler Automobiles <FCHA.MI>.

Many companies expect that customers will use autonomous vehicles as a service, rather than owning them outright. Ride service Uber in particular expects to use autonomous cars.

The new Waymo test in Arizona is meant to help the company understand what people want out of self-driving cars and see how they use and integrate the service. Testers will get access every day at any time.

Waymo already has with 100 Chrysler Pacifica minivans and is acquiring five times more, partly to be able to support the service.

(Reporting by Peter Henderson; Editing by Mary Milliken)

German cabinet agrees to fine social media over hate speech

The Facebook logo is displayed on their website in an illustration photo taken in Bordeaux, France, February 1, 2017. REUTERS/Regis Duvignau

BERLIN (Reuters) – The German cabinet approved a plan on Wednesday to fine social networks up to 50 million euros ($53 million) if they do not remove hateful postings quickly, prompting concerns the law could limit free expression.

Germany already has some of the world’s toughest hate speech laws covering defamation, public incitement to commit crimes and threats of violence, backed up by prison sentences for Holocaust denial or inciting hatred against minorities.

“There should be just as little tolerance for criminal rabble rousing on social networks as on the street,” Justice Minister Heiko Maas said in a statement, adding that he would seek to push for similar rules at a European level.

The issue has taken on more urgency as German politicians worry that a proliferation of fake news and racist content, particularly about 1 million migrants who have arrived in the last two years, could sway public opinion in the run-up to the national election in September.

However, organizations representing digital companies, consumers and journalists, accused the government of rushing a law to parliament that could damage free speech.

“It is the wrong approach to make social networks into a content police,” said Volker Tripp, head of the Digital Society Association consumer group.

The draft law would give social networks 24 hours to delete or block obviously criminal content and seven days to deal with less clear-cut cases, with an obligation to report back to the person who filed the complaint about how they handled the case.

Failure to comply could see a company fined up to 50 million euros, and the company’s chief representative in Germany fined up to 5 million euros.

Bitkom, an association which represents digital companies, said the government should build up specialist teams to monitor online content for potential infringements, rather than expect social networks to do it themselves.

“Given the short deadlines and the severe penalties, providers will be forced to delete doubtful statements as a precaution. That would have a serious impact on free speech on the internet,” said Bitkom manager Bernhard Rohleder.

Since it was unveiled last month, the draft law has been amended to include new categories of content, such as child pornography. It also now allows courts to order social networks to reveal the identity of the user behind criminal posts.

To address free speech concerns, the legislation was tweaked to make clear that a fine would not necessarily be imposed after just one infraction. “It is clear that freedom of expression is of huge importance in our vibrant democracy … however, freedom of expression ends where criminal law begins,” Maas said. Maas said a government survey showed Facebook deleted just 39 percent of content deemed criminal and Twitter only 1 percent, even though they signed a code of conduct in late 2015 including a pledge to delete hate speech within 24 hours.

(Reporting by Emma Thomasson and Thorsten Severin; Editing by Tom Heneghan)

UK and Swedish watchdogs warn of international cyber attack

A magnifying glass is held in front of a computer screen in this picture illustration taken in Berlin May 21, 2013. REUTERS/Pawel Kopczynski

STOCKHOLM (Reuters) – A large-scale cyber attack from a group targeting organizations in Japan, the United States, Sweden and many other European countries through IT services providers has been uncovered, the Swedish computer security watchdog said on Wednesday.

The cyber attack, uncovered through a collaboration by Britain’s National Cyber Security Centre, PwC and cyber security firm BAE Systems, targeted managed service providers to gain access to their customers’ internal networks since at least May 2016 and potentially as early as 2014.

The exact scale of the attack, named Cloud Hopper from an organization called APT10, is not known but is believed to involve huge amounts of data, Sweden’s Civil Contingencies Agency said in a statement. The agency did not say whether the cyber attacks were still happening.

“The high level of digitalization in Sweden, along with the amount of services outsourced to managed service providers, means that there is great risk that several Swedish organizations are affected by the attacks,” the watchdog said.

The agency said those behind the attacks had used significant resources to identify their targets and sent sophisticated phishing e-mails to infect computers.

It also said Swedish IP addresses had been used to coordinate the incursions and retrieve stolen data and that APT10 specifically targeted IT, communications, healthcare, energy and research sectors.

(Reporting by Johan Ahlander; Editing by Niklas Pollard and Stephen Powell)

Major internet providers say will not sell customer browsing histories

The NBC and Comcast logo are displayed on top of 30 Rockefeller Plaza, formerly known as the GE building, in midtown Manhattan in New York July 1, 2015. REUTERS/Brendan McDermid/File Photo

By David Shepardson

WASHINGTON (Reuters) – Comcast Corp, Verizon Communications Inc and AT&T Inc said Friday they would not sell customers’ individual internet browsing information, days after the U.S. Congress approved legislation reversing Obama administration era internet privacy rules.

The bill would repeal regulations adopted in October by the Federal Communications Commission under former President Barack Obama requiring internet service providers to do more to protect customers’ privacy than websites like Alphabet Inc’s Google or Facebook Inc.

The easing of restrictions has sparked growing anger on social media sites.

“We do not sell our broadband customers’ individual web browsing history. We did not do it before the FCC’s rules were adopted, and we have no plans to do so,” said Gerard Lewis, Comcast’s chief privacy officer.

He added Comcast is revising its privacy policy to make more clear that “we do not sell our customers’ individual web browsing information to third parties.”

Verizon does not sell personal web browsing histories and has no plans to do so in the future, said spokesman Richard Young.

Verizon privacy officer Karen Zacharia said in a blog post Friday the company has two programs that use customer browsing data. One allows marketers to access “de-identified information to determine which customers fit into groups that advertisers are trying to reach” while the other “provides aggregate insights that might be useful for advertisers and other businesses.”

Republicans in Congress Tuesday narrowly passed the repeal of the rules with no Democratic support and over the objections of privacy advocates.

The vote was a win for internet providers such as AT&T Inc, Comcast and Verizon. Websites are governed by a less restrictive set of privacy rules.

The White House said Wednesday that President Donald Trump plans to sign the repeal of the rules, which had not taken effect.

Under the rules, internet providers would have needed to obtain consumer consent before using precise geolocation, financial information, health information, children’s information and web browsing history for advertising and marketing. Websites do not need the same affirmative consent.

Some in Congress suggested providers would begin selling personal data to the highest bidder, while others vowed to raise money to buy browsing histories of Republicans.

AT&T says in its privacy statement it “will not sell your personal information to anyone, for any purpose. Period.” In a blog post Friday, AT&T said it would not change those policies after Trump signs the repeal.

Websites and internet service providers do use and sell aggregated customer data to advertisers. Republicans say the rules unfairly would give websites the ability to harvest more data than internet providers.

Trade group USTelecom CEO Jonathan Spalter said in an op-ed Friday for website Axios that individual “browser history is already being aggregated and sold to advertising networks – by virtually every site you visit on the internet.”

This week, 46 Senate Democrats urged Trump not to sign the bill, arguing most Americans “believe that their private information should be just that.”

(Reporting by David Shepardson; Editing by Cynthia Osterman and Lisa Shumaker)

A scramble at Cisco exposes uncomfortable truths about U.S. cyber defense

The logo of Cisco is seen at Mobile World Congress in Barcelona, Spain, February 27, 2017. REUTERS/Eric Gaillard

By Joseph Menn

SAN FRANCISCO (Reuters) – When WikiLeaks founder Julian Assange disclosed earlier this month that his anti-secrecy group had obtained CIA tools for hacking into technology products made by U.S. companies, security engineers at Cisco Systems <CSCO.O> swung into action.

The Wikileaks documents described how the Central Intelligence Agency had learned more than a year ago how to exploit flaws in Cisco’s widely used Internet switches, which direct electronic traffic, to enable eavesdropping.

Senior Cisco managers immediately reassigned staff from other projects to figure out how the CIA hacking tricks worked, so they could help customers patch their systems and prevent criminal hackers or spies from using the same methods, three employees told Reuters on condition of anonymity.

The Cisco engineers worked around the clock for days to analyze the means of attack, create fixes, and craft a stopgap warning about a security risk affecting more than 300 different products, said the employees, who had direct knowledge of the effort.

That a major U.S. company had to rely on WikiLeaks to learn about security problems well-known to U.S. intelligence agencies underscores concerns expressed by dozens of current and former U.S. intelligence and security officials about the government’s approach to cybersecurity.

That policy overwhelmingly emphasizes offensive cyber-security capabilities over defensive measures, these people told Reuters, even as an increasing number of U.S. organizations have been hit by hacks attributed to foreign governments.

Larry Pfeiffer, a former senior director of the White House Situation Room in the Obama administration, said now that others were catching up to the United States in their cyber capabilities, “maybe it is time to take a pause and fully consider the ramifications of what we’re doing.”

U.S. intelligence agencies blamed Russia for the hack of the Democratic National Committee during the 2016 election. Nation-states are also believed to be behind the 2014 hack of Sony Pictures Entertainment and the 2015 breach of the U.S. Government’s Office of Personnel Management.

CIA spokeswoman Heather Fritz Horniak declined to comment on the Cisco case, but said it was the agency’s “job to be innovative, cutting-edge, and the first line of defense in protecting this country from enemies abroad.”

The Office of the Director of National Intelligence, which oversees the CIA and NSA, referred questions to the White House, which declined to comment.

Across the federal government, about 90 percent of all spending on cyber programs is dedicated to offensive efforts, including penetrating the computer systems of adversaries, listening to communications and developing the means to disable or degrade infrastructure, senior intelligence officials told Reuters.

President Donald Trump’s budget proposal would put about $1.5 billion into cyber-security defense at the Department of Homeland Security (DHS). Private industry and the military also spend money to protect themselves.

But the secret part of the U.S. intelligence budget alone totaled about $50 billion annually as of 2013, documents leaked by NSA contractor Edward Snowden show. Just 8 percent of that figure went toward “enhanced cyber security,” while 72 percent was dedicated to collecting strategic intelligence and fighting violent extremism.

Departing NSA Deputy Director Rick Ledgett confirmed in an interview that 90 percent of government cyber spending was on offensive efforts and agreed it was lopsided.

“It’s actually something we’re trying to address” with more appropriations in the military budget, Ledgett said. “As the cyber threat rises, the need for more and better cyber defense and information assurance is increasing as well.”

The long-standing emphasis on offense stems in part from the mission of the NSA, which has the most advanced cyber capabilities of any U.S. agency.

It is responsible for the collection of intelligence overseas and also for helping defend government systems. It mainly aids U.S. companies indirectly, by assisting other agencies.

“I absolutely think we should be placing significantly more effort on the defense, particularly in light of where we are with exponential growth in threats and capabilities and intentions,” said Debora Plunkett, who headed the NSA’s defensive mission from 2010 to 2014.

GOVERNMENT ROLE

How big a role the government should play in defending the private sector remains a matter of debate.

Former military and intelligence leaders such as ex-NSA Director Keith Alexander and former Secretary of Defense Ashton Carter say that U.S. companies and other institutions cannot be solely responsible for defending themselves against the likes of Russia, China, North Korea and Iran.

For tech companies, the government’s approach is frustrating, executives and engineers say.

Sophisticated hacking campaigns typically rely on flaws in computer products. When the NSA or CIA find such flaws, under current policies they often choose to keep them for offensive attacks, rather than tell the companies.

In the case of Cisco, the company said the CIA did not inform the company after the agency learned late last year that information about the hacking tools had been leaked.

“Cisco remains steadfast in the position that we should be notified of all vulnerabilities if they are found, so we can fix them and notify customers,” said company spokeswoman Yvonne Malmgren.

SIDE BY SIDE

A recent reorganization at the NSA, known as NSA21, eliminated the branch that was explicitly responsible for defense, the Information Assurance Directorate (IAD), the largest cyber-defense workforce in the government. Its mission has now been combined with the dominant force in the agency, signals intelligence, in a broad operations division.

Top NSA officials, including director Mike Rogers, argue that it is better to have offensive and defensive specialists working side by side. Other NSA and White House veterans contend that perfect defense is impossible and therefore more resources should be poured into penetrating enemy networks – both to head off attacks and to determine their origin.

Curtis Dukes, the last head of IAD, said in an interview after retiring last month that he feared defense would get even less attention in a structure where it does not have a leader with a direct line to the NSA director.

“It’s incumbent on the NSA to say, ‘This is an important mission’,” Dukes said. “That has not occurred.”

(Reporting by Joseph Menn in San Francisco. Additional reporting by Warren Strobel in Washington.; Editing by Jonathan Weber and Ross Colvin)

NATO to spend 3 billion euros on satellite, cyber defenses

FILE PHOTO - A NATO flag flies at the Alliance's headquarters in Brussels, March 2, 2014. REUTERS/Yves Herman/File Photo

By Robin Emmott

BRUSSELS (Reuters) – NATO plans to spend 3 billion euros ($3.24 billion) to upgrade its satellite and computer technology over the next three years as the Western military alliance adapts to new threats, a senior official said.

Seeking to deter hackers, and other threats including Iranian missiles, the investments underscore NATO’s recognition that conflicts are increasingly fought on computer networks as well as in the air, on land and at sea.

A senior official at the NATO Communications and Information Agency said the plans include a 1.7-billion-euro investment in satellite communications to better support troops and ships deployed across the alliance, as well as aiding the use of Unmanned Aerial Vehicles (UAVs) or drones.

It was not immediately clear if NATO allies would fund a new military communications satellite to be launched into space or if an increase in broadband capacity could be gained from existing U.S. and other allied satellites.

Non-NATO member Japan launched its first military communications satellite in January.

The proposals, for which some funding must still be approved by NATO governments, also envisage spending about 800 million euros on the computer systems that help command air and missile defenses, said the official, who declined to be named.

Seventy-one million euros will go to improving the protection of NATO’s 32 main locations from cyber attacks.

NATO says it has seen a five-fold increase in suspicious events on its networks in the past three years, while Russian group APT28 is blamed by Western intelligence for the hacking of the U.S. Democratic Party during last year’s U.S. election.

NATO officials have told Reuters they suspect Russia sponsors attacks against their networks before major summits.

Another 180 million euros are to be spent to provide more secure mobile communications for alliance soldiers in the field.

NATO will present its needs in detail at a conference in Ottawa in April and then begin launching the bidding process.

It is likely to attract major Western defense contracts including Airbus Group, Raytheon and Lockheed Martin Corp, the official said, in part because “there cannot be content that does not come from NATO nations.”

NATO rules prohibit Russian or Chinese suppliers unless there is a specific need that allied companies cannot provide.

(Reporting by Robin Emmott; Editing by Janet Lawrence)