10 Best Hollywood Spy Thriller movies available in Hindi – JanBharat Times

If you have an interest in Intelligent agencies around the world you must have heard the name Eli Cohen, he was a Mossads(Israels secret agency) agent, the guy had almost fetched the top rank post in the neighbor countrys government (Syria) through his intellect and brainpower.

He would send the intelligence to Israel by letters, radio. One of his famous achievements is the intelligence gathering of Syrian fortifications which many believe helped Israel to win the famous 6-day war. There is a Web Series available on the giant streaming platform Netflix based on the life of Eli Cohen.

Here we are updating some of the best espionage Hollywood spy movies that are based on real-life spies like Cohen, Although there are many amazing spy thriller movies/shows that have been made over the years like The Americans, Operation Finale, Fauda, etc, sadly they are not available in their dubbed versions. We are going to talk about those best spy movies that are available in their dubbed version.

Related

10 Best Spy Thriller Movies in Bollywood

Upcoming Bollywood Movies 2022-23

Steven Speilbergs directorial, this amazing action spy thriller is based on real-life events, The film tells the story of the Vengeance of Munich Massacre in which Israels Olympic players were killed by the terrorists during the 1972 summer Olympics.

How Mossad agents succeeds to kill all those who were involved in the incidents, the film narrates the story of Operation Wrath Of God, it has an IMDb rating of 7.5 out of 10. It stars Eric Bana and James Bond fame Daniel Craig in the pivotal roles. It is available on the streaming Services Netflix & Amazon Prime Video.

It is a biographical spy thriller based on the life of Edward Snowden a C. I consultant, who would work for the CIA(American Spy Agency) but later in 2013 leaked N.S.As (National Security Agency) highly classified files and smuggled out of the country. The IMDb rating of the show is 7.3 out of 10. It stars Joseph Gordon-Levitt, Shailene Woodley, and Melissa Leo in the Pivotal roles. Available on Netflix.

Ben Afflecks directorial Argo revolves around, rescuing Americans that were hostages in Tehran, Iran, during the Iran hostage crisis(1979-81). It stars Ben, Bryan Cranston, Alan Arkin, John Goodman, and Tate Donovan in significant roles.

It was made on a budget of 4.5 crore U.S dollars and grossed the whopping 23 crores U.S dollars at the box office worldwide. This must-watch film is critically acclaimed and has an IMDb rating of 7.7/10. Available on the giant streaming platform Amazon Prime.

This historical Spy drama film Bridge of Spies is available on the Sony Liv app and has an IMDb rating of 7.6 out of 10. It revolves around The cold war between the U.S and the Soviet Union.

It was released in Oct 2015 and did an overall business of 16.5 crores U.S dollars at the box office worldwide. Another masterpiece from the director Steven Speilberg, It stars the veteran actor Tom Hanks in the pivotal role, other actors includes Mark Rylance, Scott Shepherd, Amy Ryan & Sebastian Coch.

Bruce Willis starrer action comedy Red revolves around a former black operation agent who is all geared up to capture an executioner who has vowed to kill Willis. IMDb rating is 7.7 out of 10 and available on the leading streaming platform Amazon Prime Video. Helmed by Robert Schwentke, Cinematography and Editing have been carried out by Florian Ballhaus and Thom Noble.

Charlie Wilsons War is based on the CIAs mission Operation Cyclone to arm and support the Afghan Mujahidin during Cold War 1979-89, Directed by Mike Nicholas, it has an IMDb rating of 7 out of 10 and is available on the leading streaming Platform Netflix and on youTube.

It has an ensemble star casts veteran actor Tom Hanks, famous Hollywood actress Julia Roberts, Amy Adams, Emily Blunt, and veteran Bollywood actor Om Puri.

It is an American action spy thriller film directed by Kenneth Branagh. Jack Ryan: Shadow Recruit is based on a real-life story. It stars Chris Pine, Keira Knightley, Kevin Costner, and director Kenneth in pivotal roles. You will find it on the streaming platform Netflix. The IMDb rating is 6.2 out of 10. Harish Zambarloukos and Martin Walsh were the cinematographers and the editor respectively.

George Clooney and Brad Pitt starrer this film is a critically acclaimed film. It was released on Oct 2008, was made on a budget of 3.7 crore U.S dollars, and grossed an overall 16.3 crores U.S dollars at the box office worldwide. Joel Coen and Ethan Coen helmed, wrote, Edit and produced the film. It is a black comedy spy crime film that has an IMDb rating of 7 out of 10 and is available on Amazon Prime Video.

Rogue Nation was the fifth installment in the hit franchise Mission Impossible, Where the IMF (Impossible Mission Force) Agent is hiding from the American intelligence force CIA on the account of IMFs dissolution and now the agent has to prove the existence of the mysterious group, a syndicate that consists of former espionage officers of several countries. It is available on Netflix and has an IMDb rating of 7.4/10.

On the no. 10 spot we have the Oscar award-winning film The Hunt For Red October, It revolves around the story of a CIA analyst who has got intelligence on a Soviets naval captain who was trying to defect to the U.S.

Now the analyst must prove his theory before the U.S Navel to stop the violent confrontation between the Soviet and U.S Navies. The film is set in the time of the Cold War and has an IMDb rating of 7.6/10. Available on Netflix.

The rest is here:
10 Best Hollywood Spy Thriller movies available in Hindi - JanBharat Times

Cyber Challenges for the New National Defense Strategy – War on the Rocks

A major moment for Americas approach for cyberspace might be just around the corner. Its hard to make a new national defense strategy an exciting watershed, especially when a curious and ill-defined term integrated deterrence is at the center of it. But skeptics should be a little more open to the idea that the Pentagon is on the verge of pushing out a key idea that could solve many of its struggles in cyberspace. According to defense officials, integrated deterrence includes incorporating military capabilities across domains, theaters, and phases of conflict; rebuilding alliances; and fostering innovation and technological development, all with an eye towards creating a more resilient military. This list sounds good in theory. But, gauging from some expert reactions so far, its not clear what successful integration (or deterrence) would look like in practice.

Recently, Assistant Secretary of Defense Mara Karlinemphasized that the Pentagon is stress-testing ideasso that everybody knows what were talking about. In the spirit of this stress test and, since the Defense Department has a well-known track record with vague deterrence strategies and neologisms that seem designed to justify defense budgets, below we conduct our own stress test for cyber and the new strategy.

What does integration look like for cyberspace? What will the strategy have to overcome in order to be successful? Is deterrence the right frame for strategic success, or should the new strategy focus more squarely on resilience? The answers to these questions can help guide the Department of Defense as they make the final tweaks to their new strategy and, hopefully, make the United States more successful not just in cyberspace but across domains.

How Would Integrated Deterrence Actually Integrate Cyber?

Cyberspace is an important component of the Defense Departments integrated deterrence efforts. As Secretary of Defense Lloyd Austin noted in his remarks, this new strategic approach involves integrating our efforts across domains and across the spectrum of conflict as well as the elimination of stovepipes between services and their capabilities, and coordinated operations on land, in the air, on the sea, in space and in cyberspace.

This idea makes inherent sense. It is also consistent with research that has found cyber operations have limited utility as independent instruments of coercion, are rarely decisive in conflicts, and are generally poor signals of resolve for deterrence. Instead, cyber operations are more effective when they augment other military and foreign policy tools. This could include through deception and espionage, manipulating the information environment and decision-making, and potentially shaping or complementing conventional operations on the battlefield.

So, integrating cyber operations across theaters, domains, andphases of conflict is a good thing. Why does the Department of Defense need a new concept to do this? Cyber operations have been difficult to incorporate into the normal defense planning process. This process, a highly formulaic procedure (usually focused on a single theater) of allotting troops and weapons by phases of conflict, is unwieldy for cyberspace operations. This is because cyber operations struggle with assured access, good estimates of effectiveness or extent of damage, or even certainty about for how long they will work (or even if they will work as intended). Though using a cyber operation, for instance, to blind air defenses before an airstrike sounds good on paper, in practice mission commanders would rather rely on cruise missiles or electronic jamming that can meet time on target needs and have better estimates of effectiveness than cyber operations. Further, cyber accesses for conventional conflicts (for instance, access to an adversarys weapons networks or military command systems) are difficult to obtain and retain, meaning that cyber capabilities rarely sit on a shelf for an extended period, available to use at a whim when an operational plan is executed. That said, substituting cyber for conventional capabilities comes with some unique benefits, such as the temporary and reversible nature of the damage inflicted and the ability to operate in a more deniable fashion. Discerning how to capitalize on these aspects of cyber capabilities while addressing their limitations represents a central challenge for planners.

For years, the solution was to invest in systems (like Cyber Commands Unified Platform) that were supposed to provide greater certainty about cyber effects. However, these efforts have struggled to create certainty in a domain where uncertainty is a fixture, not a temporary defect. Perhaps, therefore, a better approach is to instead assimilate other domains and capabilities into processes in which cyber operations have been innovative and successful. In particular, event-based task forces increasingly used for cyber events (such as Joint Task Force-Ares or the inter-agency task force to combat election interference) provide an alternative planning mechanism that is dynamic, works across government agencies, and fits nicely within the infamous phase 0 of competition where most gray zone operations take place (and the joint planning process is notoriously unsatisfying).

Commanders also need to think about cyber effects in conflict as more than just replacements for things they could otherwise do with conventional capabilities. Cyber operations are at their best not when they are designed to create an effect in a moment in time, but instead when they are part of a larger strategy of obfuscation, deception, and sabotage. These can be extremely useful complements to conventional missions but how they are targeted, tasked, and executed will likely not fit best within the tasking order cycle or even in service silos that disproportionately focus on single platforms versus network effects.

Finally, planning and process integration will ultimately fail if the Defense Department does not make good on innovation. Currently, the program of record and acquisition process makes acquiring cyber capabilities (especially on the defensive side where commercial software solutions far outpace the Department of Defense) extremely difficult. Software, unlike most defense acquisition widgets, requires constant development, patching, and updating all tasks the current acquisition process is not designed to accommodate. Even worse is the Pentagons record of investing in software through research or small businesses and getting it across the valley of death and implemented on its own networks. Further, the lack of information technology integration between the armed services means that networks, software, even data are owned and more often than not administered separately by each service. This is a nightmare for acquiring cyber capabilities whether defensive or offensive and large enterprise-wide solutions (even from Cyber Command) are almost impossible to implement without an advocate from one of the armed services spearheading the effort.

Challenges (and Opportunities) of Alliances

Integrated deterrence goes beyond what is already a very difficult challenge of making cyberspace work better within the U.S. military. Alliances also seem to play a huge role in the Department of Defenses new deterrence concept. As Undersecretary of Defense Colin Kahl explained, the new strategy requires that the Department of Defense be integrated across our allies and partners, which are the real asymmetric advantage that the United States has over any other competitor or potential adversary.

Cyberspace presents a unique challenge for alliances. For years, Washingtons traditional alliance relationships struggled to even agree on basic cyber terms and attempts to share information were complicated by cyber operations close relationship with the highly classified world of signals intelligence. Moreover, U.S. actions in cyberspace have, in some cases, strained alliance relationships. Two prominent examples include the backlash over the Edward Snowden leaks as well as concerns about the implications of persistent engagement and defend forward for allied-owned networks.

These were considerable challenges.However, as cyber incidents have escalated over the last few years, there has also been an increasing recognition across these relationships that cyberspace matters.This joint recognition spurred new information-sharing mechanisms and partner efforts to find and root out adversary infiltration attempts on allied networks. Most recently, joint attribution by NATO and E.U. partners called out China for the Microsoft Exchange Hack a rare reaction from these organizations. This comes on the heels of public statements at the NATO summit in Geneva in June that reaffirmed the applicability of the mutual defense clause of the alliance agreement to cyberspace. Further, despite the aforementioned alliance tensions, the Defense Department has conducted 24 hunt forward operations in which U.S. cyber protection teams partnered with 14 countries to root out adversary activity on allied networks.

Building on this forward momentum, perhaps the greatest opportunity for the Biden administrations national defense strategy is to use military alliances and partnerships to facilitate norm development. Norms are shared understandings about appropriate behavior. Some norms are written down and formalized in agreements, while others are more informal and emerge as a result of state practice over time. Moreover, norms are agnostic with respect to morality: there could be good norms that facilitate cooperation, but also bad norms that make the international system less stable.

In the past, particularly under the Obama administration, norms were considered the realm of the State Department while the Department of Defense focused on deterrence by punishment and denial. This changed under the Trump administration, when the State Departments norms efforts took a back seat to Department of Defense efforts to defend forward.The initial foundational work done by the Obama administration on cyber norms, paired with four years of experimentation and more risk-acceptant cyber authorities under the Trump administration, have created a track record for cyber norms that is far more heterogeneous than policymakers have let on. While there are certainly many areas where states disagree, norms do exist in cyberspace. For instance, a diverse set of states beyond just the United States and like minded nations has come to formal agreements about rules of the road for cyberspace through various international institution-driven processes, most notably the United Nations Group of Governmental Experts and the Open-Ended Working Group. To the surprise of many observers, earlier this year both of these processes resulted in consensus reports where parties agreed to a set of cyber norms. And from a bilateral perspective, rivals such as Russia have been willing to engage the United States in discussions about cyber norms, even if the prospects for cooperation remain uncertain. And beyond formalized agreements, there is a range of unwritten, implied norms that shape mutual expectations of behavior in cyberspace. These include a firebreak between cyber and conventional operations, such that states to not respond to cyber attacks with the use of kinetic military force; the idea that cyber espionage is generally treated as other forms of espionage (with some exceptions); and a pattern of tit-for-tat responses in cyberspace that have led to a nascent sense of what counts as proportional.

The Defense Department plays a large role in this process though in the past this hasnt been a formal effort. Specifically, how the Department of Defense uses its own cyber capabilities or threatens to respond to cyber capabilities can play an outsized role in whether cyberspace norms proliferate. Some have argued that employing military cyber power can, through a tacit process, contribute to the development of cyber norms. However, the ambiguous signaling strategies that this line of argument generates are often overly complicated and obtuse. Strategic documents are some of the clearest articulations of norms that adversaries receive. Given that, the U.S. military should use the opportunity of a new national defense strategy to voice clearly what the U.S. believes are appropriate norms of behavior in cyberspace. In particular, it should consider making unambiguous statements about what the Pentagon wont do in cyberspace in effect, a declaratory policy of restraint. This may be as important to norm propagation as efforts by the State Department to codify international agreements.

Are the Assumptions Correct?

We have previewed what integrated deterrence might look like in practice and how difficult it can be to actually integrate.Knowing whether deterrence can work is even more difficult.For cyber, we are concerned that previews of cyber deterrence assumptions rest on shaky assumptions. In particular, Austins remarks about the strategic environment in cyberspace suggest some faulty assumptions about escalation and deterrence in cyberspace. Austin described cyberspace as a domain in which norms of behavior arent well established and the risks of escalation and miscalculation are high. Implied in this statement is a link between the former and the latter in other words, one of the reasons cyberspace may be a dangerous domain is due to the purported absence of meaningful norms of behavior. However, this is problematic for two reasons.

First, (as we alluded to before) cyberspace is not an ungoverned Wild West bereft of norms. When U.S. policymakers lament the absence of norms in cyberspace (or in other domains), they almost always mean the lack of norms that the United States perceives to be in its own interests or consistent with its values but this does not mean that norms do not exist.

Second, despite fears among scholars and practitioners, there is little empirical support for the notion that cyberspace is a uniquely escalatory domain (or that cyber operations are effective signals for cross-domain deterrence). Academics have systematically explored this question through deductive analysis, wargames, and statistical analysis and rarely find evidence of escalation from cyberspace to violence. The reality is that escalation in cyberspace is neither rampant, nor wholly impossible thats because escalation is an inherently political phenomenon driven by the perceptions and risk calculations of adversarial actors. Therefore, sweeping pronouncements about cyber escalation do little to aid policymakers in developing reasonable assessments of escalation risks (and may actually handcuff otherwise useful below-violent options for decision-makers).

Assumptions matter because they guide strategy development and implementation, even if not explicitly. Therefore, reexamining long-held but erroneous understandings of the nature of strategic competition in cyberspace can provide a stronger basis for discerning how to incorporate cyber operations into defense strategy. Specifically, policymakers should set aside truisms about cyber escalation and instead focus on more granular discussions about a set of plausible scenarios that could give rise to different forms of escalation risks, and the mitigation strategies that follow from them.

Looking Ahead: Resilience!

Finally, Austins speech hints at what we see as a compelling opportunity to reimagine cyber strategy in a resilience context, potentially making progress in an environment of seemingly intractable debates among policymakers about the feasibility of cyber deterrence. The main difference between strategies of resilience versus other strategies that focus on deterrence or even defense is that resilience is about perseverance over time while responding to disruptive attacks. Whereas deterrence fails when states attack, resilience assumes that states will attack but instead predicates success on the ability to absorb these attacks and recoup, retrench, and conduct sustained campaigns. One of the limitations of previous cyber strategy has been the caging of ideas like persistent engagement in offensive or defensive language. Instead, the value of persistence is in resilience and survival.

What might a resilient cyber strategy look like? While a comprehensive take is beyond the scope of this article indeed, it represents a significant research agenda in its own right we offer a few initial suggestions for policymakers to consider. First, it would require the joint force to identify the critical functions and processes that are essential for core missions. Second, it would incentivize (and punish) the services for creating highly centralized or exquisite and fragile networks and platforms recognizing that cyber security is less likely to succeed when these types of capabilities are built. Third, it would require the services to build manual workarounds and back-up solutions to limit adversary impact to critical systems and functions and to prioritize recovery efforts. Finally, a cyber strategy based on resiliency would measure success not by how many attacks occur but instead by the effects of cyber attacks on Americas ability to conduct operations across domains and achieve key military objectives. Together, these initiatives towards resilience would both require and create a more integrated force.

Erica Lonergan, Ph.D., is an assistant professor in the Army Cyber Institute and a research scholar in the Saltzman Institute of War and Peace Studies at Columbia University. The views expressed in this article are personal and do not reflect the policy or position of any U.S. government organization or entity. Follow her on Twitter @eborghard.

Jacquelyn Schneider, Ph.D., is a Hoover Fellow at Stanford University and an affiliate at Stanfords Center for International Security and Cooperation. Follow her on Twitter @jackiegschneid.

Image: U.S. Space Force (Photo by Senior Airman Andrew Garavito)

Continued here:
Cyber Challenges for the New National Defense Strategy - War on the Rocks

Whistleblower Edward Snowden Issues Crypto Gaming Warning, Highlights Potential Unethical Practices – The Daily Hodl

Whistleblower Edward Snowden says that the use of non-fungible tokens (NFT) in crypto gaming comes with certain consequences.

In a new interview on Parachains, a Polkadot and Kusama-focused YouTube channel, Snowden says he is against the monetization of gaming platforms that use NFTs because they utilize a false sense of scarcity.

We have people that are trying to sort of maybe theyre not even trying to but the ultimate result of what theyre doing is they are injecting an artificial sense of scarcity into a post-scarcity domain. I think that is actually an inherently anti-social urge here.

The former Central Intelligence Agency (CIA) employee says gamers who seek a virtual escape can potentially be put at a disadvantage from the NFT-based gaming business model.

If you think about the world that people are retreating from to their games, where they live in a cold bare box, if theyre lucky enough to even have a home in some overly expensive city where they spend all their time working, they get home exhausted.

They make their cheap meal, and then they turn on their device to escape from all that and then in their digital world, where theyre on a beautiful island, they build a beautiful home, and they want to change the color of the wall, and you got to pay $19.99 for the wall or for a token to let you roll for the potential to maybe recolor your wall. There is something horrible and heinous and tragic in that to me.

Snowdens comment comes following the exponential rise of gaming altcoins and the crypto-based metaverse. According to Snowden, the crypto sector is at risk of facilitating unethical practices.

I think the community should very much be trying to bend the arc of development away from injecting artificial unnecessary scarcity entirely for the benefit of some investor class into these post-scarcity domains.

One of the promises, one of the privileges of technology, is that it frees us from material limits that only exist in a material space. To try to reimpose material in immaterial space, I think is a little bit unethical.

o

Featured Image: Shutterstock/Julia Ardaran and Salamahin

Visit link:
Whistleblower Edward Snowden Issues Crypto Gaming Warning, Highlights Potential Unethical Practices - The Daily Hodl

Vice Season 8 Episode 12: December 12 Release, Where To Watch and What Is It About? – Gizmo Story

A huge hole appeared in news feeds after HBO ended Shane Smiths documentary journalism series. He still continues to run his own media empire. Showtime picked up the series soon after it was canceled. Now on to Vice season 8, episode 12, which continues to provide us with global news and information from the vantage points and journalistic style that Vice is known for.

We saw how the Taliban government is coping with terrorism in the previous episode. In the aftermath of the Biden administrations decision to withdraw from the country after 20 years of occupation, the orthodox political and religious group was able to effortlessly take over the country. Further, we saw how Georgias criminal cases are affected by the citizens arrest problem.

A new episode of Vice Season 8 will air on Showtime at 8:00 PM on Wednesday, December 12, 2021. As with most episodes, this one is entitled State of Surveillance & Killing Dissent. It is unclear which journalists will cover the news, nor has Showtime released an official description of its new program. Thus, we can only guess what topics the program will cover.

You can watch Vice season 8 episode 11 by tuning into Showtime during the time slot. Check out the main Showtime site or download their application to see the show online. Additionally, if you dont have cable, you can watch them onHulu, which allows you to add subscriptions to the basic plan. A wide variety of Television series and films are present on Showtime.

The earlier seasons of Vice can only be watched onHBO, which means you have to switch networks. You can see your broadcast schedule to see when Vice airs.HBO Maxallows you to watch earlier seasons on any device if you are a cable cutter. Additionally,Hulu, Amazon Prime Video, and DirecTVmight be able to add the extras.

Although Showtime has not released a list of topics or journalists involved in the show, we can deduce quite a lot from the title: State of Surveillance & Killing Dissent. Lets take a look at those in more detail. Geopolitics and social issues are two of Vices main focus areas.

Big data and technology have made government surveillance a big issue. After Edward Snowdens revelations about mass data collection and Big Techs penchant for using your information however they want, privacy has become one of the hot topics of debate in public.

Those who argue for surveillance programs say these programs are necessary for public safety by protecting them from the threats of non-state terrorism, state-sponsored hostilities, and the promotion of law enforcement.

Those who oppose surveillance programs believe these programs open the door for racial profiling, the targeting of political views without proper justification, and the suppression of dissent in an age of harsh penalties for conformity.

In democratic societies, dissension is often a topic of discussion. Democracy and its values are often questioned all over the world for their effectiveness and ethical nature. Putting those ideas into words can sometimes prove hazardous. Despite the powerful influence of prevailing, pervasive ideas, dissent as an opinion, sentiment, or philosophy can earn you a dismissal and ostracization in todays society.

Who is ready to carry the chance? In what way is dissent enforced? Considering the editorial line of the long-running docu-series, magazine, and webzine, these are some of the topics and perspectives that Vice Journalists might consider.

Each installment in the show focuses on specific aspects of the way this -alongwith more society problems are discussed in the public discourse, with segments on civil rights, government narrative control, and the states intervention in these affairs.

See the original post here:
Vice Season 8 Episode 12: December 12 Release, Where To Watch and What Is It About? - Gizmo Story

An Apple ID Credentials System for checkpoint security at airports shows a deep link to the U.S. Department of Homeland Security – Patently Apple

On Thursday the US Patent & Trademark Office published a patent application from Apple titled "Checkpoint Identity Verification Mobile Identification Credential." When looking up the patent inventors, I couldn't find one listed as working for Apple. What are the odds of that? Digging deeper, all of inventors were linked to the U.S. Government "as represented by the Secretary of Homeland Security." One segment of the patent states: "Statement of Government Interest: The present invention was made by one or more employees of the United States Department of Homeland Security in the performance of official duties. The U.S. Government has certain rights in this invention."

On the surface, it would appear that Apple Pay's new ID credentials is important to the U.S. Government and Homeland Security. This patent could raise eyebrows for those who depend on Apple for privacy. Activists like Edward Snowden, who railed against Apple's photo-scanning plan, will likely find this latest connection between Apple and Homeland Security troubling.

On the flipside, having an ID Credential program should ensure that Apple is properly vetting those trying to get a digital ID so that terrorists and illegals don't get credentials they're not supposed to attain so as to protect airports and other points of entry into the U.S. and beyond. This is also crucial in creating a digital passport that other governments will need to rely on at international airports.

Apple's patent background states that staffing and computing resources are devoted to verifying the identity of a subject (also referred to herein as a user, passenger, or traveler) at a security checkpoint. Such staffing and resources are further burdened by a need for manual verification performed by an agent, who checks physical documents from the subject, and checks other sources of information available for the subject.

Such resources are even further burdened when attempting to resolve inconsistencies between a subject's travel booking/reservation information, physical documents, and/or identity information. Furthermore, the subject is burdened with a need to check-in with a travel carrier such as an airline, in addition to undergoing the checkpoint experience.

Apple's patent further notes that in an environment that supports its use, a Mobile Identification Credential (MIC) can enable a user to conveniently prove their identity. One embodiment of a MIC is a mobile driver license (mDL) issued by an official agency such as a state Department of Motor Vehicles (DMV).

Another embodiment of a MIC is a mobile passport. A mobile passport may, for example, be issued by the U.S. Department of State or a foreign ministry of another nation. The MIC can include various information, such as information relating to identity or privileges pertaining to the user.

The MIC itself is portable and can be provisioned to devices. Below, the device to which the MIC is provisioned is referred to hereafter as a User Mobile Identification Credential Device (UMD). The term UMD pertains to any device to which a MIC can be provisioned including, without limitation: smart watches, smart fitness bands, smart objects, smart phones, e-readers, tablet computers, smart televisions and displays, smart cameras, laptop computers, desktop computers, servers, kiosks, chips, flash drives, and USB drives.

In an embodiment, the issuer of the MIC (the MIC Issuer) may provision and issue the valid, authentic MIC to the UMD. The issuer of the MIC also may work with a MIC provider to facilitate the provisioning of the MIC to the UMD. The MIC Issuer also may work with a third party to provision the MIC to the UMD. In another embodiment, the user may provision the MIC from one device of the user to another device of the user (for example, from their desktop computer to their smart fitness band).

A MIC may be validated by an Authorizing Party (AP). In one embodiment, the AP is an official agency such as a state DMV. In another embodiment, the AP is a third party empowered by an official agency to perform such verification operations. The AP employs an Authorizing Party System (APS). The APS may provision the MIC to the UMD.

It stands to reason that this is a technical patent which covers the following:

Apple's patent FIG. 1 below illustrates a MIC environment #10 including a security checkpoint kiosk RPS #100 to obtain authorization of MIC user information #40 according to an embodiment. Briefly, benefits include providing an increase in the efficiency of security checkpoint operations, such as at airline security areas, by enabling a passenger (referred to alternatively as user or traveler) to prove their identity using a MIC #210.

In one embodiment, the passenger uses a Mobile Identification Credential (MIC) when booking travel reservations. In another embodiment, the passenger uses the MIC at the airport security checkpoint using kiosk RPS. Using the MIC in these ways improves the system's overall function by avoiding potential mismatches between user travel information and actual passenger information.

(Click on image to Enlarge)

In addition, the MIC provides readily-accessed, official biographic and biometric information, which reduces the need for network traffic and facilitates cross-checking with airline-supplied manifests.

Furthermore, the MIC supports automated verification of the passenger at the security checkpoint via kiosk RPS, and thereby improves utilization of security staffing resources.

In yet another embodiment, use of the MIC 210 enhances the passenger experience by reminding the passenger to check in with a travel carrier (see FIG. 2), or even by eliminating a need for the passenger to check in with an airline.

(Click on image to Enlarge)

For example, the checkpoint RPS #100 completes verification of the passenger's identity and directs the UMD #200 to prompt the user with a reminder to check in with a travel carrier. In another embodiment, the security checkpoint kiosk RPS facilitates an automated transaction to check in the passenger, or may selectively relay verified passenger information to airline data systems, travel carriers, security back ends, or other parties. In such embodiments, there is no longer a need for the passenger to separately check in with the airline.

In other embodiments, there is no need for the passenger to present a physical boarding pass at the checkpoint, because the checkpoint checks with the airline data systems for the travel status of the user independent of the physical boarding pass.

Accordingly, the MIC environment #10 enables the checkpoint to identify passengers whose physical boarding pass information is fraudulent or outdated (e.g., in situations where a passenger obtains a legitimate physical boarding pass but is subsequently added to a no-fly list, rendering that user's existing physical boarding pass obsolete).

Apple's patent FIG. 5 below illustrates a User Mobile Identification Credential Device (UMD).

(Click on image to Enlarge)

Apple's patent FIGS. 18 and 19 below illustrate a privacy dialog #1800 that enables interaction between a user and the UMD #200, enabling the user to grant selective consent to release of MIC user information. In embodiments, the UMD provides the privacy dialog via APS/RPS consent logic running on the UMD.

(Click on image to Enlarge)

For more details, review Apple's patent application number 20210377742.

Considering that this is a patent application, the timing of such a product to market is unknown at this time.

In April, Patently Apple covered another patent relating to Apple developing a user authentication framework covering Digital ID, Driver License and ePassport.

View post:
An Apple ID Credentials System for checkpoint security at airports shows a deep link to the U.S. Department of Homeland Security - Patently Apple

Ali Fazal on next Hollywood outing: Im humbled to be sharing my notes with the best in the field – Hindustan Times

Actor Ali Fazal is all set to take his next flight to Hollywood with Kandahar co-starring alongside actor Gerard Butler. And the Indian talent promises lots of action and drama in his next international outing, for which he is preparing for the past one month.

The film is being helmed by Ric Roman Waugh, known for bringing alive varied stories on the big screen through projects such as Angel Has Fallen, Felon, Greenland and upcoming National Champions. They will start shooting the project in Saudi Arabias AlUla region soon.

Its quite a pleasant outing after the pandemic for me. I wouldnt complain. Also as actors, we are always looking to better ourselves with every passing prospect. I continue to find new spaces, an excited Fazal tells us from Saudi Arabia as he continues to be in prep mode before the lights, camera and action call.

The screenplay of the project comes from Mitchell LaFortune, who is looking deep into his own experiences as a military intelligence officer in Afghanistan at the time of the Edward Snowden leaks.

Opening up about the project, the 35-year-old says, It has been a lot of prep work for me for the last one month and studying all the material Ric and Mitch have given me to work with. Ric is a visionary in all senses.

The film captures the story of an undercover CIA operative, stuck deep in hostile territory in Afghanistan, and his journey of escaping it. Fazal, who has made a name for himself in the international market with projects such as Victoria & Abdul and Death On The Nile, says the script is just spectacular.

I am very humbled to be sharing my notes with the very best in the field out there yet again. Its a whole lot of action and drama. And the script is spectacular to say the least, adds the actor, who cant reveal much about the project at the moment, but promises it to come packed with lots of thrills.

Read more:
Ali Fazal on next Hollywood outing: Im humbled to be sharing my notes with the best in the field - Hindustan Times

America wants to restrict export of surveillance technology – The Germany Eye

The United States, in cooperation with its allies, wants to restrict the export of surveillance technologies that could be used for human rights abuses. As a White House representative said in Washington on Thursday, President Joe Biden plans to launch an "export control and human rights initiative" at the democracy summit he convened next week. The representative pointed out that America has already enacted related measures against China.

According to the information, a "voluntary and informal" working group of "like-minded governments" is to "develop a written, non-binding code of conduct or statement of principles." This, it said, should serve as a "guide for applying human rights criteria to export licensing policies and practices." This is necessary, he said, because of the "increasing misuse" of technologies "by end users for human rights abuses." This abuse is also taking place across national borders, he said.

The representative did not say which allied countries would participate in the initiative. But he indicated that "many" signatories to the Wassenaar Arrangement would participate. The agreement is an informal multilateral commitment to control exports of conventional weapons and so-called dual-use goods and technologies. These are technologies that can be used for both civilian and military purposes. The agreement includes 42 countries, including Germany.

The United States accuses China of using surveillance technologies to suppress the Muslim Uighurs living in Xinjiang province. They have therefore banned the sale of relevant technologies to Chinese authorities. America has also issued similar measures against the military junta in Myanmar, which uses violence against opposition members and protesters. American authorities have also blacklisted Israeli surveillance software providers NSO and Candiru.

Surveillance technologies encompass a wide range of tools - from surveillance cameras, facial recognition software and drones to phone tapping and data tracking systems. The United States is itself under criticism for the mass surveillance revealed by Edward Snowden in the NSA scandal.

View post:
America wants to restrict export of surveillance technology - The Germany Eye

Edward Snowden posts new Farsi tweet – Iran Front Page

Former US whistleblower Edward Snowden says in a new Farsi tweet he underestimated Persian Twitter.

Snowden recently launched a Persian account on Twitter. This is his third tweet in Farsi. He started his account by tweeting a famous Persian saying which literally translates into The wall has rats, and rats have ears. The proverb means people should be cautious when they say something as spies could be eavesdropping.

The second tweet read, I would just say theres got to be a reason why felines are popular.

Snowden did not explicitly explain what he meant by the tweets nor did he give a reason for launching a Persian account on Twitter.

The former US intelligence consultant in 2013 leaked classified documents to journalists describing surveillance programs run by the NSA to tap peoples cell phones and internet communications.

Some view him as a hero but others call him a traitor to his country. Following the leaks, Snowden fled the US. He was later granted asylum in Russia and is now living there.

View post:
Edward Snowden posts new Farsi tweet - Iran Front Page

Panama, Pandora, and Pentagon Papers: 10 of the most groundbreaking leaks in history – Gwinnettdailypost.com

Country

United States of AmericaUS Virgin IslandsUnited States Minor Outlying IslandsCanadaMexico, United Mexican StatesBahamas, Commonwealth of theCuba, Republic ofDominican RepublicHaiti, Republic ofJamaicaAfghanistanAlbania, People's Socialist Republic ofAlgeria, People's Democratic Republic ofAmerican SamoaAndorra, Principality ofAngola, Republic ofAnguillaAntarctica (the territory South of 60 deg S)Antigua and BarbudaArgentina, Argentine RepublicArmeniaArubaAustralia, Commonwealth ofAustria, Republic ofAzerbaijan, Republic ofBahrain, Kingdom ofBangladesh, People's Republic ofBarbadosBelarusBelgium, Kingdom ofBelizeBenin, People's Republic ofBermudaBhutan, Kingdom ofBolivia, Republic ofBosnia and HerzegovinaBotswana, Republic ofBouvet Island (Bouvetoya)Brazil, Federative Republic ofBritish Indian Ocean Territory (Chagos Archipelago)British Virgin IslandsBrunei DarussalamBulgaria, People's Republic ofBurkina FasoBurundi, Republic ofCambodia, Kingdom ofCameroon, United Republic ofCape Verde, Republic ofCayman IslandsCentral African RepublicChad, Republic ofChile, Republic ofChina, People's Republic ofChristmas IslandCocos (Keeling) IslandsColombia, Republic ofComoros, Union of theCongo, Democratic Republic ofCongo, People's Republic ofCook IslandsCosta Rica, Republic ofCote D'Ivoire, Ivory Coast, Republic of theCyprus, Republic ofCzech RepublicDenmark, Kingdom ofDjibouti, Republic ofDominica, Commonwealth ofEcuador, Republic ofEgypt, Arab Republic ofEl Salvador, Republic ofEquatorial Guinea, Republic ofEritreaEstoniaEthiopiaFaeroe IslandsFalkland Islands (Malvinas)Fiji, Republic of the Fiji IslandsFinland, Republic ofFrance, French RepublicFrench GuianaFrench PolynesiaFrench Southern TerritoriesGabon, Gabonese RepublicGambia, Republic of theGeorgiaGermanyGhana, Republic ofGibraltarGreece, Hellenic RepublicGreenlandGrenadaGuadaloupeGuamGuatemala, Republic ofGuinea, RevolutionaryPeople's Rep'c ofGuinea-Bissau, Republic ofGuyana, Republic ofHeard and McDonald IslandsHoly See (Vatican City State)Honduras, Republic ofHong Kong, Special Administrative Region of ChinaHrvatska (Croatia)Hungary, Hungarian People's RepublicIceland, Republic ofIndia, Republic ofIndonesia, Republic ofIran, Islamic Republic ofIraq, Republic ofIrelandIsrael, State ofItaly, Italian RepublicJapanJordan, Hashemite Kingdom ofKazakhstan, Republic ofKenya, Republic ofKiribati, Republic ofKorea, Democratic People's Republic ofKorea, Republic ofKuwait, State ofKyrgyz RepublicLao People's Democratic RepublicLatviaLebanon, Lebanese RepublicLesotho, Kingdom ofLiberia, Republic ofLibyan Arab JamahiriyaLiechtenstein, Principality ofLithuaniaLuxembourg, Grand Duchy ofMacao, Special Administrative Region of ChinaMacedonia, the former Yugoslav Republic ofMadagascar, Republic ofMalawi, Republic ofMalaysiaMaldives, Republic ofMali, Republic ofMalta, Republic ofMarshall IslandsMartiniqueMauritania, Islamic Republic ofMauritiusMayotteMicronesia, Federated States ofMoldova, Republic ofMonaco, Principality ofMongolia, Mongolian People's RepublicMontserratMorocco, Kingdom ofMozambique, People's Republic ofMyanmarNamibiaNauru, Republic ofNepal, Kingdom ofNetherlands AntillesNetherlands, Kingdom of theNew CaledoniaNew ZealandNicaragua, Republic ofNiger, Republic of theNigeria, Federal Republic ofNiue, Republic ofNorfolk IslandNorthern Mariana IslandsNorway, Kingdom ofOman, Sultanate ofPakistan, Islamic Republic ofPalauPalestinian Territory, OccupiedPanama, Republic ofPapua New GuineaParaguay, Republic ofPeru, Republic ofPhilippines, Republic of thePitcairn IslandPoland, Polish People's RepublicPortugal, Portuguese RepublicPuerto RicoQatar, State ofReunionRomania, Socialist Republic ofRussian FederationRwanda, Rwandese RepublicSamoa, Independent State ofSan Marino, Republic ofSao Tome and Principe, Democratic Republic ofSaudi Arabia, Kingdom ofSenegal, Republic ofSerbia and MontenegroSeychelles, Republic ofSierra Leone, Republic ofSingapore, Republic ofSlovakia (Slovak Republic)SloveniaSolomon IslandsSomalia, Somali RepublicSouth Africa, Republic ofSouth Georgia and the South Sandwich IslandsSpain, Spanish StateSri Lanka, Democratic Socialist Republic ofSt. HelenaSt. Kitts and NevisSt. LuciaSt. Pierre and MiquelonSt. Vincent and the GrenadinesSudan, Democratic Republic of theSuriname, Republic ofSvalbard & Jan Mayen IslandsSwaziland, Kingdom ofSweden, Kingdom ofSwitzerland, Swiss ConfederationSyrian Arab RepublicTaiwan, Province of ChinaTajikistanTanzania, United Republic ofThailand, Kingdom ofTimor-Leste, Democratic Republic ofTogo, Togolese RepublicTokelau (Tokelau Islands)Tonga, Kingdom ofTrinidad and Tobago, Republic ofTunisia, Republic ofTurkey, Republic ofTurkmenistanTurks and Caicos IslandsTuvaluUganda, Republic ofUkraineUnited Arab EmiratesUnited Kingdom of Great Britain & N. IrelandUruguay, Eastern Republic ofUzbekistanVanuatuVenezuela, Bolivarian Republic ofViet Nam, Socialist Republic ofWallis and Futuna IslandsWestern SaharaYemenZambia, Republic ofZimbabwe

Here is the original post:
Panama, Pandora, and Pentagon Papers: 10 of the most groundbreaking leaks in history - Gwinnettdailypost.com

Media scandals: sound and fury, but in the end, little changes – The Conversation UK

The recent political scandal in the UK involving Owen Paterson, a Conservative MP who was found to have broken parliamentary standards by repeatedly lobbying the government on behalf of two companies which paid him a large regular monthly fee, presents a classic case of a media scandal.

Patersons lobbying work was revealed by an investigation in The Guardian newspaper in 2019. Allegations of wrongdoing were followed by an inquiry by the parliamentary standards commissioner, Kathryn Stone, and a damning report from the House of Commons committee on standards, which recommended a 30-day suspension for the MP.

The Johnson government then tried to overturn the process, leading to a political and public furore, forcing a U-turn. Paterson subsequently resigned as an MP and opprobrium was heaped on the prime minister, Boris Johnson, with allegations in the media of sleaze and corruption about him and his government.

Spurred on by this episode, journalists dug for stories about other Conservative MPs who may have broken the rules. These included the former attorney general Geoffrey Cox, whose work for the British Virgin Islands, among other clients, has reportedly brought him more than 6 million in his 16 years as an MP.

The episode played out with daily revelations in the press at a time when all eyes were on the UK as the host of the COP26 climate summit.

It is hard to imagine scandals existing without news coverage. Media attention provides the oxygen that fuels scandals. No matter if they happen in politics (the Watergate Affair), business (Enron and fraud), entertainment (Harvey Weinstein and #Me Too), sports (Lance Armstrongs doping scandal), science Andrew Wakefield and the MMR vaccine, or religion (the Catholic Church and sexual abuse), scandals pry open gaps between expected and actual behaviour. This is why virtually no part of society is exempt.

But if scandals need the media to provide oxygen, it the media also benefits from scandals, which illustrates the multiple motivations for press coverage. There are a number of reasons a news organisation might go after a scandal. Exposing wrongdoing by the powerful bolsters the credentials of the press as a public watchdog. Scandals attract eyeballs, increasing audience ratings and circulation and boosting revenues. They can also help reinforce the ideological positions of news organisations.

So, for instance, while the left/liberal Guardian was part of the team that exposed tax-avoidance practices of the powerful elites, the conservative Daily Telegraph vigorously pursued MPs expenses, trumpeting of Labour transgressors: The party may take the moral high ground, but lying and cheating are deep in its DNA.

Sometimes the news media itself becomes the centre of a scandal, engaging in dubious practices such as deception and invasion of privacy to get the story. The phone-hacking case in the UK was a prime example of this.

The mainstream media remain important in breaking scandalous news and further documenting wrongdoing. But they arent the only gatekeepers now. Legacy media has been joined by specialist investigative sites, such as the Bureau of Investigative Journalism and social media where people can share tips and stories.

As these new sources of information have added their voices, the dynamics of reporting and gatekeeping scandal stories have become more complex and fluid and the unfolding of scandals has become far more unpredictable. The pace and the content of scandals can rapidly and unexpectedly shift as various different voices introduce new revelations and broadcast to large new and motivated audiences, sending stories viral when people pass them on to their friends.

Accordingly, scandal management has had to change. People and institutions implicated in scandals have to confront a more chaotic information ecology to control messages and provide tight, well-managed responses.

The digital revolution has also brought with it new ways of finding, processing and reporting sensitive information with scandalous potential. Journalists and citizens have learned to explore digital data to reveal wrongdoing. As digital footprints can be traced and reconstructed, professional and citizen reporters can scrutinise people and institutions to shed light on their political and financial records as well as their behaviour and statements.

Often they set up collaborative platforms to pool their resources in researching stories. The emergence of new types of journalistic collaboration led to the revelations about the surveillance state by former NSA employee Edward Snowden and the Panama papers exposure, which were investigated by an international group of newspapers and the International Consortium of Investigative Journalists.

But while their newsmaking power continues to grow, revelations by these non-traditional platforms need support from established news organisations and digital platforms with large followings.

The big media organisations are more likely to have the resources, expertise and social prominence to get the stories in front of large audiences. This in turn will spark further revelations as a story gathers pace.

Media scandals overwhelmingly focus on flawed people, rather than on the structural forces that allow, foster and condone their transgressions. Individual peccadilloes are more likely to attract attention than systemic social problems: corruption, wrongdoing, institutional racism, violence, sexism and corporate abuses.

Media narratives tend to accentuate this problem as they tend to offer simplified stories about heroes and villains instead of deeper examination of social problems that have led to the scandal and all-too often remain after the noise has died down.

The Paterson scandal is following this classic path. Inevitably as soon as the people portrayed as villains are taken down, it will be back to business as usual. The scandal may lead to minor changes in the way the standards committee investigates MPs. But if major structural changes had taken place following the 1994 cash for questions scandal, this latest scandal would not have occurred.

But it didnt, so decades later the watchword for public officials remains: dont get caught.

More:
Media scandals: sound and fury, but in the end, little changes - The Conversation UK