Weighing the Value and Risks of Deplatforming GNET

Last month, the video platform TikTok banned far-right extremists Britain First and Tommy Robinson, the latest action taken by a tech platform to address hateful and extreme content by sanctioning abusers. Platforms embrace of deplatforming as the default tool for repeated or severe violations of terms of service shows progress in prioritising the issue of online extremism, but as a tool, it is a blunt instrument that may not be equally valuable in all circumstances. Not all platforms can or will address all content equally efficiently, and whether they should requires an assessment of unintended consequences. Whether those factors are correctly balanced by platforms, or deplatforming is simply the most straightforward tool at their disposal, remains to be seen.

Addressing harmful content that could lead to hate, extremism, and terrorism is critical for tech platforms, sometimes for legal compliance and other times simply because it is imperative to protect their users and our communities. For a sense of scale, recent transparency reports show that between January and June of 2019, Twitter took action against almost 600,000 accounts for violating policies related to hate and Facebook took action against 17.8 million pieces of content based on terrorist propaganda concerns and 15.5 million related to hate speech between January and September of 2019. The Global Internet Forum to Counter Terrorism asserts that its joint hashing database the shared mechanism for large tech companies such as Facebook, Microsoft, Twitter, YouTube, and others to post or find terrorism-related content has over 200,000 pieces of unique content. When these actions manifest as banning a user, the result can be severe: an oft-cited example of the success of deplatforming is that of far-right provocateur Milo Yiannopoulos, who may be as much as $2 million in debt following bans that have removed his ability to benefit financially from his notoriety. Alex Jones media outlet InfoWars had about 1.4 million daily views of its site and users before being banned from YouTube and Facebook, and 715,000 afterward, according to the New York Times analysis.

On the other hand, these results raise questions regarding whether platforms are efficient in carrying out bans. Jones, for example, launched Infowars is Back on Facebook an hour after it banned Infowars. Proxy channels emerged on YouTube, sharing Jones videos with over 1.6 million viewers, including 550,000 views in a thirty day period, and 10,000 subscribers. Lesser known antisemitic and white supremacist channels have managed to circumvent attempted bans. If the strategy to address online extremism must be whack-a-mole, there is considerable room to improve efficiency in finding users and content to ban, implementing bans, and finding and removing proxies.

Beyond efficiency is effectiveness: banning an individual or group may feel cathartic, but whether it achieves the desired result of degrading and helping defeat extremists and their movements is a far more central question. The verdict on that is, unfortunately, unclear.

Researchers at Georgia Institute of Technology looked at bans on Reddit, concluding that users that experienced sanctions from Reddit for hate speech left Reddit entirely, reduced hate speech on Reddit by 80-90 percent, and many also migrated to new Reddit threads. Audrey Alexanders study for the George Washington University Program on Extremism shows that mass bans of Islamic State (IS) followers on Twitter deteriorates [IS] followers ability to gain traction on the platform, likely hindering their reach to potential recruits and acknowledges that the decay on Twitter corresponded with IS strategic shift to Telegram as its platform of choice.

Strategic success for mass bans has often been interpreted (1) as digital decay for the individual platform in question, rather than the integrated online ecosystem, and (2) in terms of the volume of users and their hateful content rather than the escalation or de-escalation of extremism.

Telegram, for example, became the platform of choice for jihadists as mainstream platforms began to use bans, removing IS sympathizers ability to recruit followers from a mainstream audience, but driving their online communications underground to a less-visible and less-regulated platform. Now it is also becoming a destination of the global white supremacist movement.

Similar platform migration has led to extremist use of VK, the Russian Facebook-equivalent; Gab, far right-extremists Twitter-equivalent; and lesser-known sites that their users would move to if those platforms began regulating, which, as ADL analysis suggests, could be WrongThink, minds.com, toko.tech, MeWe, or freezoxee. The evolution of the chans is illustrative: bringing attention to 4chan or 8chan may have led to particular actions to limit extremist content on them, but also led 8chan to go dark and return several times, and also gave rise to Endchan, 7chan, and myriad other copycat sites that aim to circumvent attempts to regulate them.

According to an analysis by ADL and the Network Contagion Research Institute, during months when a Twitter mass ban took place corresponded to more than double the percent of new members on Gab than a typical month. The frequency with which the users referenced the ban, and the corresponding spiteful references to censorship (e.g. fascistbook and goolag) suggests that the new users are joining Gab due to mass bans on another platform, and that being banned fueled their anger not self-reflective anger for the behavior that got them banned, but toward the authorities than banned them. Another study reached similar conclusions, looking at Facebook and VK. This analysis suggests that the grievances that fuel far-right extremism may be heightened in users that are banned from mainstream platforms, and that those grievances are then expressed in fora with less oversight and a higher portion of like-minded members. In other words, there is a distinct possibility that deplatforming trades high exposure to a broad population for more extreme exposure to other extremists. And no amount of whack-a-mole will prevent extremists from finding the next forum on which they can post their hate and recruit new followers, with authorities potentially unaware of the platform migration.

Removing users and content also hinders investigation and research into the threat. Imagine an individual that poses a security concern and whose primary means of being discovered by law enforcement is online behavior for example, Conor Climo, whose online conversations and support for the Feuerkrieg Division led law enforcement to search his home, where they found bomb making materials and evidence of violent plots. If such a suspect were removed from all platforms that could be accessed by law enforcement and informants, then plots may continue, but out of sight. Further, researchers looking into such behavior to inform policymakers and the public no longer have visibility into concerning behavior once it is removed, which could distort public opinion and decision-making based on an inaccurate picture of threats.

Deplatforming may limit the breath of hate and extremism on mainstream platforms but increase extremists motivations to plot, doing so in secret. On the other hand, allowing hate unfettered access to the worlds most powerful megaphones to recruit more to their cause is similarly risky. Neither, of course, is an acceptable outcome, which is why comprehensive approaches and comprehensive research into what works is needed. Whether providing law enforcement more opportunities to track extremism, tech platforms better ways to implement terms of service enforcement, or promoting good speech to overwhelm hate and extremism online comprehensive, integrated approaches are necessary.

Read more:

Weighing the Value and Risks of Deplatforming GNET

Julian Assange writes letter to King Charles and urges him to visit …

Julian Assange has written a letter to King Charles ahead of his coronation inviting him to visit the UK prison where the WikiLeaks founder has been captive for more than four years on behalf of an embarrassed foreign sovereign.

The letter is the first document the Australian journalist and WikiLeaks founder has written and published since his time in Belmarsh prison in London and accounts the horrors of his life there.

On the coronation of my liege, I thought it only fitting to extend a heartfelt invitation to you to commemorate this momentous occasion by visiting your very own kingdom within a kingdom: his majestys prison Belmarsh, Assange writes.

One can truly know the measure of a society by how it treats its prisoners, and your kingdom has surely excelled in that regard.

It is here that 687 of your loyal subjects are held, supporting the United Kingdoms record as the nation with the largest prison population in Western Europe.

Assange, an Australian citizen, remains at Belmarsh as he fights a US attempt to extradite him to face charges in connection with the publication of hundreds of thousands of leaked documents about the Afghanistan and Iraq wars as well as diplomatic cables.

He goes on to point sarcastically to the UK governments commitment to roll out the biggest expansion of prison places in more than a century, and the culinary delights of eating on a budget of two pounds per day.

As a political prisoner, held at your majestys pleasure on behalf of an embarrassed foreign sovereign, I am honoured to reside within the walls of this world class institution, Assange writes.

Beyond the gustatory pleasures you will also have the opportunity to pay your respects to my late friend Manoel Santos, a gay man facing deportation to Bolsonaros Brazil, who took his own life just eight yards from my cell using a crude rope fashioned from his bedsheets.

Assange goes on to invite the King to the most isolated place within [the] walls of Belmarsh Healthcare, or Hellcare and the Belmarsh End of Life Suite.

Listen closely, and you may hear the prisoners cries of Brother, Im going to die in here, a testament to the quality of both life and death within your prison, Assange writes.

I implore you, King Charles, to visit His Majestys Prison Belmarsh, for it is an honour befitting a king.

As you embark upon your reign, may you always remember the words of the King James Bible: Blessed are the merciful, for they shall obtain mercy. And may mercy be the guiding light of your kingdom, both within and without the walls of Belmarsh.

On Friday, the Australian opposition leader, Peter Dutton, agreed with the prime minister, Anthony Albanese, that the detention of Assange needed to come to an end.

For the first time in more than a decade, the leaders of Australias major political parties both publicly back a diplomatic intervention in the case, with Albanese saying enough is enough and Dutton agreeing it has gone on too long.

Albanese told journalists in the UK, where he is attending King Charles coronation, that the matter needed to be brought to a conclusion and he was continuing to raise it through diplomatic channels.

There is nothing to be served by his ongoing incarceration, Albanese said. And I am concerned about Mr Assanges mental health. There was a court decision here in the United Kingdom that was overturned on appeal that went to Mr Assanges health as well and I am concerned for him.

On Friday morning, the opposition leader told ABC radio RN Breakfast it had gone on for too long at the fault of many people.

A cross-section of Australian politicians have been raising the matter internally with their colleagues and international counterparts for the last few years, rallying for Assanges freedom. Nearly 50 federal parliamentarians have called on the US to drop its extradition bid.

See the article here:

Julian Assange writes letter to King Charles and urges him to visit ...

Australian lawmakers press US envoy for Julian Assange release

Assanges supporters say he is an anti-establishment hero who has been victimised because he exposed the US wrongdoings.

Australian lawmakers have met United States Ambassador Caroline Kennedy, urging her to help drop the pending extradition case against WikiLeaks founder Julian Assange and allow him to return to Australia.

The Bring Julian Assange Home Parliamentary Group said on Tuesday it informed Kennedy of the widespread concern in Australia about the continued detention of Assange, an Australian citizen.

The meeting comes before US President Joe Bidens scheduled visit to Australia this month for the Quad leaders summit.

There are a range of views about Assange in the Australian community and the members of the Parliamentary Group reflect that diversity of views. But what is not in dispute in the Group is that Mr Assange is being treated unjustly, the legislators said in a statement after meeting Kennedy in the capital, Canberra.

Assange is battling extradition from the United Kingdom to the US where he is wanted on criminal charges over the release of confidential military records and diplomatic cables in 2010. Washington says the release of the documents had put lives in danger.

Assanges supporters say he is an anti-establishment hero who has been victimised because he exposed US wrongdoings, including in conflicts in Afghanistan and Iraq.

The US embassy in Australia confirmed the meeting in a tweet but did not share further details.

Assanges brother, Gabriel Shipton, said he felt the meeting was an important acknowledgement by the US government that Julians freedom is important to millions of Australians.

After [Prime Minister Anthony Albanese] expressed frustration with the Biden administration, this is now a test for Ambassador Kennedy to see if she can move Washington on this issue, said Shipton.

Albanese, who has been advocating for the release of Assange, last week aired his frustration for not yet finding a diplomatic fix over the issue.

Support for Assange among US policymakers remains low. Only a few members of Congress have come forward in support of the demand to drop charges against him.

If extradited, Assange faces a sentence of up to 175 years in a maximum-security prison.

View original post here:

Australian lawmakers press US envoy for Julian Assange release

The Bradley Manning Trial: A Short(ish) Guide To Understanding … – NPR

Army Pfc. Bradley Manning (right) is escorted out of a courthouse in Fort Meade, Md., on June 25, 2012. His lawyer announced that Manning, who is accused of leaking classified information to WikiLeaks, had agreed to plead guilty to lesser charges. Patrick Semansky/AP hide caption

Army Pfc. Bradley Manning (right) is escorted out of a courthouse in Fort Meade, Md., on June 25, 2012. His lawyer announced that Manning, who is accused of leaking classified information to WikiLeaks, had agreed to plead guilty to lesser charges.

For the next 12 weeks, a military judge in Fort Meade, Md. will consider the case of Army Pfc. Bradley Manning. It's bound to be a complicated, long-running and often secretive process that kicked off on Monday.

Before we get too far into the court-martial, we wanted to put together a shortish guide to bring you up to speed on the trial.

-- First Off, The Leaks:

Central to this court-martial is the vast trove of government data that Manning handed to the website WikiLeaks. They mark the largest leak of classified information in the history of the United States.

It was a video dubbed "Colateral Murder" that first brought attention to Wikileaks in 2010. It showed a 2007 incident in which a U.S. military crew on an Army Apache helicopter shot at Iraqi civilians and a Reuters journalist, after allegedly mistaking them for insurgents. It provided a rare chance to witness an incident of what the military calls collateral damage.

The leaks continued, peaking with the release of hundreds of thousands of diplomatic cables, that brought mostly diplomatic headaches for the United States. Some argued that they revealed much more in some cases the identities of operatives and informants across the world. The government said during the first day of the court-martial that it will present evidence that Osama bin Laden asked for and received some of these cables. The documents are archived here.

-- Who Is Bradley Manning?:

PBS' Frontline has a quick 10-minute profile of Manning that is worth watching. In short, he is son of an American dad and a British mother who grew up in a small town near Oklahoma City. His relationship with his dad and his stepmother was strained. He joined the Army in 2007 seeking some structure and direction for his life.

He became an intelligence analyst for the Army and received access to classified information.

Manning was arrested in May of 2010 over the leaks. Since then, he has been held by the U.S. military.

-- What Manning Has To Say:

Since his arrest, we have not heard much from Manning. His most significant statement came when a judge was considering throwing out the case against him because of the way the U.S. government treated him.

As NPR's Carrie Johnson reported in November of 2012, it was highly unusual for a court-martial to be delayed for more than three years. Not only that but at one point, Manning was kept in complete isolation and in some instances forced to sleep naked and without a blanket.

Manning's defense attorney David Coombs, who himself has been pretty quiet, said that Manning's treatment at the Marine Corps Base in Quantico, Va., will "forever be etched, I believe, in our nation's history as a disgraceful moment in time."

The military judge ultimately refused to drop the charges against Manning. But the proceedings allowed him to plead guilty to lesser charges and make his first public statements.

Manning read from a 35-page statement. He explained that he thought the battle field reports were not considered sensitive in the military and that he leaked the diplomatic cables, hoping it would lead to a more open diplomacy.

"I believed that these cables would not damage the United States," Manning said. "However, I believed these cables would be embarrassing.

-- The Charges:

The government decided to go through with the more serious charges against Manning. As NPR's Carrie Johnson reported earlier this month, Manning is facing charges "including violations of the Espionage Act and aiding the enemy, which carries a possible life sentence."

Carrie adds that during the 12-week trial, the government will have to prove "Manning had reason to believe the leaks would hurt national security."

Court House News Service reports that on the aiding the enemy charge, the government has to prove that Manning leaked the information with that intent in mind.

-- How To Follow The Action:

We will post on major developments in the case, but several reporters covering the trial have been tweeting live updates. Ed Pilkington is covering it for The Guardian; Alexa O'Brien is covering it for The Huffington Post, and Kevin Gosztola is covering it for the liberal website FireDogLake.

Here is the original post:
The Bradley Manning Trial: A Short(ish) Guide To Understanding ... - NPR

How to Encrypt Files, Folders and Drives on Windows | TechSpot

One of the best ways to protect your privacy is to encrypt important information on your computer. Whether you need to send personal information to someone, or simply want to make sure that no one who gets access to your computer can see stuff you would rather keep private, encryption is the way to go.

Editor's Note:Guest author Heinrich Long is a writer at Restore Privacy, a blog dedicated to inform about best online privacy practices, secure your electronic devices, unblock restricted content and defeat censorship.

As a Windows 10 user, you have numerous options for encrypting information. In this guide we will show you ways to encrypt individual files, file folders, and even entire disk drives. Each approach has its own benefits and drawbacks, so we'll cover those, too. That way, you'll have a better sense of which type of encryption you will need for various situations. Before we go further, here are a couple of points to keep in mind:

Now let's talk about when to use the three types of encryption that you can use:

As the name implies, individual file encryption refers to encrypting one file at a time. Each file has its own password or key.

Individual file encryption is great for files you plan to share or store in the cloud. Windows 10 users can encrypt individual files using a tool like 7-zip. You can also encrypt individual Microsoft Office files from within their apps, although this is better suited to casual person use than protection against serious adversaries.

Next up is folder level encryption. This approach involves encrypting everything that is stored in a folder. Passwords or keys are assigned to the folder, not individual files.

Folder encryption is a great organizational tool. For example, you could create a different encrypted folder for each member of your family. Give Sally only the password for her folder, and Jimmy only the password for his, and each can have their own private space on the same device.

Note that storing a file in an encrypted folder doesn't prevent you from also encrypting files individually.

Hard drive or disk encryption protects the entire drive at once. To use a device with an encrypted hard drive you would need to enter the password or key when you logged on, or nothing on the disk would be accessible.

This kind of encryption is a good first line of defense in case of theft. If someone stole your laptop, or ripped the drives out of one of your servers, they would need to defeat the hard drive encryption to get any data at all.

You can still apply folder level encryption and individual file encryption to an encrypted disk.

Before we dive into the details of file encryption, we need to make an important note on passwords. You need to be using a good password manager, along with good password hygiene.

Why is that? Well, if you lose or forget the password for accessing your encrypted files, then they'll probably be gone for good. A good password manager is critical. We've reviewed many options, including 1Password, LastPass, and many more.

See our guide on the best password managers for the top recommendations and step-by-step information for good password management. Now that we've hit the basics, it is time for some specifics. Let's start with...

Your options for encrypting files and folders on Windows 10 devices depend on which version of Windows 10 you have. Windows 10 Pro and Enterprise users have a built-in encryption tool called the Encrypting File System (EFS). Any Windows 10 user, including those with the Home edition, can also use third-party apps such as 7-zip for file and folder encryption.

Beyond these options, Microsoft Office apps have a basic file locking / encryption feature built in, as does Adobe Acrobat. We'll round out our coverage of Windows 10 encryption by taking a look at these.

The Encrypting File System (EFS) is built into the Professional and Enterprise versions of Windows 10. It is treated as an Advanced feature of the Windows File Explorer. This makes a lot of sense, since used carelessly, EFS can leave you with files you can never access again.

EFS does all its encryption work in the background, including automatically creating a File Encryption Key (FEK), and encrypting that key so only the account that encrypted the file can decrypt it. All this happens automatically and transparently.

Aside from a lock symbol that appears in the File Explorer next to a file or folder that is encrypted, there is no easy way to tell that a file or folder is encrypted with EFS.

Unfortunately, EFS has some quirks that make it a less than ideal choice for many uses. Knowing what these are will help you decide whether EFS is the answer to your Windows 10 file encryption needs:

If these quirks haven't scared you away, here's how to encrypt files and folders with EFS:

That is all you need to do, from now on, the encrypted file or folder will appear encrypted to anyone other than the user account that encrypted the item in the first place.

7-zip is a freeware file compression program that can also encrypt files and folders using AES-256 encryption, which is the industry standard for most encrypted systems. If you plan to use 7-zip to encrypt files or folders you should know that the process creates an encrypted copy of the file or folder. The original, unencrypted file or folder is unchanged.

If you are creating the encrypted item because you plan to send it somewhere, or store it in the cloud or something like that, this is fine. But if your goal is to protect the files and folders on your own device, this isn't ideal.

In the rest of this section, we'll first look at how to encrypt files and folders with 7-zip. After that we'll talk about what else you need to do if your goal is to protect the files and folders on your own device. The following instructions assume you already have 7-zip installed on your system. If not, you can download it here.

The result of encrypting something with 7-zip the way we did here is a zipped archive that is AES-256 encrypted. This archive appears in the same folder as the file or folder that you encrypted, alongside the original file or folder. What this means to you depends on what you plan to do with the encrypted file or folder.

If you created the archive to share copies of the file or folder, this is fine. Just send the archive to the recipient. Assuming they have 7-zip or a similar program on their system (and you securely conveyed the password to them somehow), they will be able to unzip the archive, then double-click the file to enter the password in a dialog box like this one:

Once they do that, the operating system should open the file in whatever app is appropriate, and the recipient can view it, or save it, or do whatever is necessary with it. Note that they will still have the encrypted files on their system as well.

If you created the archive to protect the files or folders on your system, you should skip down to the section titled, "Eliminate any possible unencrypted copies of the file" once you are done encrypting files and follow the instructions there to make sure no unencrypted copies of things are lying around where some snoop can find them.

Some applications now have options to encrypt the types of files they themselves use. For example, Microsoft Word can encrypt Word files, and Adobe Acrobat can encrypt PDF files. We'll demonstrate this below.

Let's use Microsoft Word to show how it is done by encrypting a simple Word document.

From now on, the only way to view this document will be by entering the password when prompted from within a Microsoft Office application that supports the unencrypted file type. But please see the next section to eliminate any possible unencrypted copies of the file on your computer.

If you use 7-zip or Microsoft Office to encrypt files, it is likely that Windows 10 still has one or more temporary copies of the unencrypted files stashed on the disk. To be safe, you will want to delete all temporary files once you are done encrypting things.

When it comes to disk encryption on Windows 10, BitLocker Device Encryption is the tool that Microsoft provides. Built into Windows 10 Pro and Enterprise, BitLocker Device Encryption does exactly what it sounds like - it encrypts all the storage devices in your system.

This sounds ideal, but there are some drawbacks to using BitLocker.

Happily for us, there is a great alternative available. Called VeraCrypt, it addresses all of the drawbacks we just saw:

VeraCrypt is Free, Open Source Software (FOSS), which we really like. Without getting into the OpenSource vs Proprietary software argument that plagues the computer world, from our perspective, FOSS software is generally considered more secure, and of course is free to use. Once VeraCrypt is installed, all you need to do is enter your VeraCrypt password whenever you start the computer.

Given all that, you know where we're going with this. In the following section we'll walk you through installing VeraCrypt on one of our lab machines. Ready?

While installing VeraCrypt is much simpler than the alternative, there is more to it than just launching an installer and pressing Okay a few times. And if you mess up, there is a chance you will lose files or even access to the entire disk drive.

We suggest you read through the instructions that follow before starting the process. If you are not confident you can complete the steps shown, or if you have a bad habit of losing important passwords, it is better to skip this type of encryption.

Here are the steps to install VeraCrypt on Windows 10:

Encrypting important information is one of the best things you can do to protect yourself from everyone who is trying so hard to get their hands on your personal information.

In this guide we covered techniques that Windows 10 users can use to encrypt individual files, folders, and entire drives on their Windows systems. While no one can guarantee that your data will be 100% safe against any and all attacks, the simple act of encrypting your most important data can make a big difference.

Masthead credit: eamesBot

Original post:
How to Encrypt Files, Folders and Drives on Windows | TechSpot