The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics – Foreign Affairs

Buchanans handy book offers a substantial and measured history of cyberattacks in recent decades. Buchanan traces the progression of hacking operations beginning with the early efforts of the U.S. National Security Agency and the United Kingdoms Government Communications Headquarters, or GCHQ, agencies that intercept all sorts of communicationsincluding those of supposedly friendly governments. Many countries now engage in hacking in the pursuit of their national interests. The joint U.S.-Israeli operation that transmitted the Stuxnet virus that sabotaged centrifuges in Iran was discovered in 2010. Russia easily shut down Ukraines energy supplies through hacking in 2016 and famously meddled in the U.S. presidential election that same year by hacking the email accounts of Democratic Party officials and the chair of Hillary Clintons campaign. China has used hacking for the purposes of industrial sabotage. The 2013 revelations of the former NSA contractor Edward Snowden showed how Western governments did their spying. Despite the growing ubiquity of cyberattacks, Buchanan also highlights their limits as a means of coercion or as a way of sending a message.

Loading...Please enable JavaScript for this site to function properly.

View original post here:
The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics - Foreign Affairs

Kamala Harris, Biden Differed on Trade, Medicare for All. Here’s a Guide to Their Positions. – The Wall Street Journal

Joe Biden and his running mate, Kamala Harris, share goals such as raising corporate taxes and expanding health insurance to more Americans, but they disagreed during the 2020 Democratic primary campaign on how to approach policy areas including climate and trade.

Here is a guide to her positionsand Mr. Bidenson a variety of issues.

Ms. Harris has said she supports the Green New Deal, an overhaul of the economy to combat climate change. Mr. Biden has said he supports the goals behind the Green New Deal, but during the primaries, he backed a smaller investment than many progressives wanted.

Since becoming the partys presumptive nominee, he has called for a $2 trillion program to combat climate change over four years, more spending and a more ambitious timeline than he supported in the primaries.

Mr. Biden has proposed a fracking ban, but only for oil and gas production from federal lands. Ms. Harris, meanwhile, said during a CNN town hall last year: Theres no question Im in favor of banning fracking.

Follow this link:
Kamala Harris, Biden Differed on Trade, Medicare for All. Here's a Guide to Their Positions. - The Wall Street Journal

What the Rest of Government Should Watch When the Defense Authorization Bill Goes to Conference – Nextgov

An amendment that would codify the Federal Risk and Authorization Management Program, with some major new stipulations, is one of several areas where the next National Defense Authorization Act could shake up technology policy across the federal government and private industry.

Lawmakers again took the opportunity to attach all manner of amendments that affect agencies and programs outside the Defense Department to what is considered must-pass legislation.

Both chambers passed their versions of the annual authorization bill in July, and the House and Senate Armed Services Committees must now work in conference to iron out the differences in the two final bills. The White House already issued a July 21 veto threat for the House version, including an objection to a provision to rename military installations commemorating members of the Confederacy. The Senate version passed with similar language, though the vote came in at 86-14a veto-proof majority.

Here is a sample of what each side is bringing to the table to govern emerging technology opportunities and challenges now that the dust has settled from the amendment storm.

FedRAMP Reconstruction and Modernization

The House NDAA includes the full text of the FedRAMP Authorization Act, which passed the House in February, as an amendment from Rep. Gerry Connolly, D-Va., chairman of the House Subcommittee on Government Operations.

Through FedRAMP, instituted by the General Services Administration, cloud service providers can obtain certificates of security through a joint authorization board that theoretically pre-approves them to fulfill contracts across the government. But, the streamlining ambition has not been fully realized as individual agencies have their own security review avenues.

The Connolly measure would establish FedRAMP in statutes and deliver a lot of what industry has been asking for in the way of reciprocity for security validations from one agency to another.

There shall be a presumption of adequacy regarding the JABs authorization to operate, reads the legislations instruction to the heads of federal agencies.

The bill also calls for the administrator of GSA to hire staff as needed for a program management office in order to implement measures to automate the process and establish continuous monitoring. GSA is already moving in this direction. And the Defense Department, which has already committed to FedRAMP reciprocity, is leading its own revolution in facilitating continuous authority to operate. Bringing the rest of the federal government legally into the fold has significant implications for broader cloud adoption.

The standalone House-passed bill was referred to the Senate Homeland Security and Governmental Affairs Committeeanother avenue for it to eventually become law.

Connolly also squeezed in an amendment that would make permanent a pilot program at the U.S. Patent and Trademark Office initiated under the Telework Enhancement Act of 2010.

Agencies in general should consider how cloud migrationalong with artificial intelligence and better modeling and simulation meansmight factor into plans they would have to submit to the National Telecommunications Information Administration for more efficient spectrum management. Incumbent federal users of the nations airwaves are under pressure to release more of the finite resource for commercial purposes, and section 1084 of the Senate bill includes a plan for the agency to incorporate modernized infrastructure in its work administering it.

From Phone to Drone, More Bans on China-Based Tech

The fear of China dominating the U.S. through emerging technology is a central theme of the NDAA in both chambers.

An amendment included by Rep. Tom Malinowski, D-N.J., would buttress actions the Commerce Department took July 20. Commerce added 11 Chinese companies to its Entities List, forbidding U.S. engagement with them on account of human rights violations involving ethnic minority Uighers. President Trump has made the Commerce Department reverse such a listingagainst Chinese telecom ZTE in the past. Other successful amendments would bar federal employees from installing the recreational video application TikTok on government-issued devices and stop federal agencies from procuring foreign-made drones that threaten national security, including those from China.

TikTok critics fear its ownership by Chinese company ByteDance can help facilitate massive data collection by Beijing. A bill introduced by Sen. Josh Hawley, R-Mo., banning use of the app on federal devices passed unanimously through the Committee on Homeland Security and Governmental Affairs July 22. Rep. Ken Buck, R-Colo. attached an amendment with the same goal to the House NDAA. While President Trumps larger moves against TikTok will likely face legal challenges, the NDAAs coming instructions for the federal workforce on the issue seem in place.

Federal agencies use unmanned aircraft systems for cartography, surveillance and in emergencies to provide disaster relief and conduct search and rescue missions. Some authorities are using drones, which can be equipped with thermal sensors and megaphones to enforce social distancing during the pandemic. But more than 70% of the drones being sold in the U.S. are produced by the Chinese company DJI, which reportedly donated 100 drones to 43 agencies and 22 states.

Drone watchers would have seen such a ban coming. In October 2019, the Department of Interior grounded all of its newly acquired DJI drones. The Department of Homeland Security had earlier warned the private sector their data was vulnerable if they used the Chinese drones, and the Defense Department had stopped troops from using them too.

An amendment included in the House NDAA by Rep. Mike Gallagher, R-Wis., co-chair of the esteemed Cyberspace Solarium Commission, would apply the procurement ban across the federal government.

The Solarium Commission Wants a National Cyber Director

Two years ago, the 2019 NDAA established the nonpartisan Cyberspace Solarium Commissioncomprising members of Congress, the administration and the private sectorto come to an agreement about how the U.S. should defend against serious cyberattacks. In March, the commission revealed a comprehensive report of more than 80 recommendations with the express intention of making many of them law through this years NDAA process.

The commissions primary recommendation is the establishment of a Senate-confirmed national cyber director with an office within the Executive Office of the President. The individual would be the head cyber adviser to the president, coordinate defensive cyber strategy and policy across the government, and be the chief U.S. representative and spokesperson for cybersecurity. Sen. Angus King, I-Maine, co-chair of the commission said the position would provide the president with one throat to choke and encourage accountability.

But the Senate NDAA, stopped short of including the recommendation, calling instead for a report on whether it would be feasible. On the House side, commission member Rep. Jim Langevin, D-R.I., successfully attached an amendment with the recommendation to the bill. During a hearing of the House Oversight Committee on the Solarium Commissions proposal, some lawmakers withheld their support over concerns creation of the cyber directors officeto be staffed with about 75 full-time employeeswould be fiscally wasteful.

What Else the Solarium Commission Wants: Public-Private Partnership

Apart from the national cyber director, plenty of other Solarium Commission recommendations made it into the House and Senate NDAAs. The prospects for many of them look good, with similar language in both chambers bills. But the White House veto threat flagged language in a key cyber intel sharing provision.

The Solarium Commission is mostly betting on the public and private sectors working more closely together, especially as facilitated by the Homeland Security Departments Cybersecurity and Infrastructure Security Agency. In this vein, an amendment from Rep. Dutch Ruppersberger, D-Md., calls for a gap analysis at the agency to inform where it needs more resources, including personnel; amendments from Rep. Cedric Richmond, D-La., would institute a fixed five-year term with minimum requirements for the CISA director, establish a joint planning office for coordination on readiness among federal, state and local governments and critical infrastructure owners and operators, and require DHS to establish a cyber incident reporting program; and a Langevin amendment would give CISA the authority to subpoena internet service providers for identifying information of customers that appear to be under cyberattack so they can be warned. The subpoena authority is also included in the core text of the Senate NDAA.

An amendment from Rep. Sheila Jackson Lee, D-Texas, would also require the homeland security secretary to develop a strategy for all U.S.-based email providers to implement the Domain-based Message Authentication, Reporting, and Conformance standard. DMARC adherence has been mandatory for federal agencies since October 2017. The Solarium Commission argues the recommendation will scale the blocking of email from fraudulent domains and diminish the success of phishing attacks.

But there may be limits to all the proposed public-private collaboration at CISA. The White House takes issue with section 1631 of the House bill, which calls for the homeland security secretary to develop an information collaboration environment where private-sector stakeholders could access classified data, at the discretion of the secretary in consultation with the defense secretary. The White House advisers say the section does not adequately reflect the Director of National Intelligences statutory responsibility to protect intelligence sources and methods with regard to cybersecurity threat intelligence related to information systems operated by agencies within the Intelligence Community.

Other Solarium Commission recommendations included as House NDAA amendments authorize CISA to help federal agencies who ask for assistance in meeting Federal Information Security Modernization Act requirements and other agency functions, and to continuously hunt for cyber threats on the .gov domain.

In the Senate, an amendment included by Sens. Gary Peters, D-Mich., Ron Johnson, R-Wis., and Ben Sasse, R-Neb., tasks the president with creating a plan for the continuity of the economy in preparation for an event that severely degrades economic activity in the country, including a cyberattack. Under the amendment, the president must consult with the leaders of relevant agencies and economic sectors to come up with a plan to keep things running and submit it to Congress within two years. The plan would include consideration of ways to extend financial support to key participants in the economy.

Other Strictly Cyber Things: Cash, Workforce, States

Its challenging to find cybersecurity measures in the bills that arent somehow connected to the Cyberspace Solarium Commission. An amendment from Sen. Roger Wicker, R-Miss., chairman of the Senates Committee on Commerce, Science and Transportation, is the offshoot of a cybersecurity moonshot initiative, which the commission recommends investing in. It would crowdsource high-priority breakthroughs in cybersecurity by establishing prize challenges.

Another Wicker-led bipartisan measure included in the Senate bill is the Harvesting American Cybersecurity Knowledge through Education (HACKED) Act. This legislation would strengthen Americas cybersecurity workforce in both the public and private sectors by bolstering existing science education and cybersecurity programs within the National Institute of Standards and Technology, National Science Foundation, National Aeronautics and Space Administration, and the Department of Transportation, reads a press release on the bills introduction. It requires the NIST director to develop metrics to measure the success of federally funded cyber workforce programs based on their outcomes.

Language in the Senates NDAA also allows for the directors of the Office of Management and Budget and NIST to establish an exchange program where employees working in roles outlined in NISTs National Initiative for Cybersecurity Education could go between NIST and private sector institutions.

And from the Homeland Security and Governmental Affairs Committee, Sen. Maggie Hassan, D-N.H., sponsored an amendment in the bill that would require DHS to establish a federally funded cybersecurity coordinator in every state.

Authorizes Real Intelligence with 5G Virtualization and Whistleblower Rights

The Senates NDAA contains its entire Intelligence Authorization Act. The House Intelligence Authorization Act passed out of committee July 31. Members of the House and Senate Intelligence committees may also be brought into the conferencing process with members of the House and Senate Armed Services committees to reconcile differences.

Both intelligence authorization bills include a plan to enable competition against Chinese firms Huawei and ZTE in the development of fifth-generation networks. The idea is to eliminate reliance on the hardware those firms provide by turning their functions into independent software-defined operations. Various components of the network would be connected through open, interoperable interfaces, allowing a multitude of vendors to participate, instead of through proprietary links to the hardware. Among other things, the bills call for the authorization of $750 million over 10 years in appropriations to create a Treasury fund from which grants would be issued to develop the technology, and increased participation of U.S. entities in relevant standards-setting bodies.

The House and Senate Intelligence Authorization bills also both include protections for whistleblowers. Sen. Ron Wyden, D-Ore., was alone in voting against the Intelligence Authorization Act advancing out of committee, due to issues of overclassification of information in general. But in a statement following the vote he praised measures in the bill seeking to limit revocation of security clearances as reprisal for disclosures.

Sen. Mark Warner, D-Va., ranking member of the Senate Intelligence Committee, also highlighted the whistleblower protections, but included language that would require contracted employees to provide written consent for the federal government to share certain derogatory information about themselves with the chief security officer of their employer, as a condition of accepting a security clearance with the federal government. Warners spokesperson said this was to prevent the circulation of bad apples like Edward Snowden.

A Connolly amendment to the House NDAA would make it clear that whistleblower protections also apply to subcontractors and subgrantees for disclosures of gross mismanagement or waste of federal funds.

Industries of the Future

Speaking of funds, senators voted for the director of the Office of Science and Technology Policy to come up with a plan to double baseline investments in emerging technologies such as artificial intelligence and quantum information science by 2022 and to specifically increase civilian investments in such industries to $10 billion by 2025. The Senates NDAA leaves it up to the director to further define these industries of the future with the help of a designated government council, but there is a focus on physical, foundational technology components in both the House and Senate bills.

The Senate bill for example calls on the director of national intelligence to report on critical technology trends in the development of microchips, semiconductors and their related supply chains, in addition to artificial intelligence. It also outlines a semiconductor manufacturing incentive program, under which the commerce secretary would issue grants of up to $3 billion to entities that have a documented interest in constructing, expanding, or modernizing related facilities, for example. Rep. Doris Matsui, D-Calif., successfully attached identical language on the House side.

Artificial Intelligence Good, Deepfakes Bad

Lawmakers are smitten with artificial intelligence, but they also recognize the potential dangers of the technology.

The House NDAA includes the National Artificial Intelligence Initiative Act, a bipartisan measure introduced in March. Under the bill, the director of the Office of Science and Technology Policy would establish a coordination office to be known as the National Artificial Intelligence Initiative Office and the federal government would leverage its investments toward fulfilling the initiative. The energy secretary would determine the members of an advisory committee and in doing so, consider members of Congress, industry and academic institutions. Nonfederal members of the committee would have their travel and daily expenses paid.

The AI initiative would allow agency heads to fund research institutions. It specifically authorizes about $7 billion in appropriations over five years for Energy, the National Science Foundation and the NIST to partner with other parts of the government and the private sector on research on questions like how to ensure the technology is trustworthy.

The House NDAA would also create a national cloud for artificial intelligence research that Rep. Anna Eshoo, D-Calif., an original sponsor of the legislation, told Nextgov is needed because for the U.S. to maintain its global leadership in AI, researchers must be enabled to access high-power computing, large datasets, and educational resources.

Smaller efforts on the House side would also leverage artificial intelligence to help with addressing health issues affecting veterans through a research program at the Energy.

But lawmakers are especially wary of how artificial intelligence can be used in the creation of fake media. Famous examples include spurious videos of politicians, but the technology can also be used to forge documents and in other malfeasance.

An amendment from Rep. Derek Kilmer, D-Wash., would have the Science and Technology Directorate at DHS report on the state of digital content forgery technology, and one from the Rep. Yvette Clarke, D-N.Y., would instruct the director of national intelligence to report on the defense and military implications of deepfake videos.

Senators also want to know how deepfakes threaten U.S. national security, but theyre asking DHS to do an annual study on this.

Quantum Computing and Beyond

While were on the topic of overlapping report requests, the White Houses veto threat argues that work NIST is already doing on quantum computing technology would be undermined by the House bill asking the Defense Department to report on how the technology threatens national security.

But lawmakers are already also looking beyond the current reaches of the technology for ways it might help secure critical infrastructure. The Senate bill includes a provision requiring the administrator for nuclear security, in consultation with the energy secretary, to work through the National Academy of Science to review the future of computing beyond exascale computing to meet national security needs at the National Nuclear Security Administration.

New Rules for Acquisition

Last, but most certainly not least, both versions of the bill include a few provisions related to transparency and accountability in the way the federal government acquires its technology goods and services.

On the House side, an amendment from Rep. Jim Hagedorn, R-Minn., calls on the Small Business Administration to write rules that would eventually be reflected in Federal Acquisition Regulations to require a contracting officer to consider the past performance of first-tier subcontractors in the same way they would for prime contractors.

On the Senate side, an amendment from Sen. Mike Enzi, R-Wyo., would require the defense secretary to list on the publicly accessible Beta.sam.gov site any consortia it uses to announce or otherwise make available contracting opportunities using other transaction authorityi.e. transaction authority outside the confines of Federal Acquisition Regulations. An Enzi press release said this is needed because smaller contractors often arent aware of opportunities, putting them at a disadvantage.

Defense officials are also called on in the Senate bill to develop a code-review process to implement a pilot project at the Office of Management and Budget that could drastically change current software acquisition dynamics.

The pilot is part of an OMB policy aimed at creating a culture of software use that saves taxpayers money, reduces vendor lock-in and fosters innovation. It requires agencies commissioning new custom software, to release at least 20% of the new custom-developed code as open source software for three years. Under the August 2016, Federal Source Code Policy: Achieving Efficiency, Transparency, and Innovation through Reusable and Open Source Software, federal agencies and prospective vendors alike would be able to see more of the code already in use across the government and build on top of it, instead of wastefully duplicating efforts. The code-review process called for in the NDAA is meant to balance this new, open, collaborative system with security.

Original post:
What the Rest of Government Should Watch When the Defense Authorization Bill Goes to Conference - Nextgov

The End of Cyberspace – Slate

Photo illustration by Slate. Images by Fugacar/iStock/Getty Images Plus.

In January 2010, I sat in an auditorium at the Newseum in Washington and heard Secretary of State Hillary Clinton proclaim that the spread of information networks is forming a new nervous system for our planet. Clinton announced that internet freedom would be a new pillar of U.S. diplomacy and that as a country, we stand for a single internet where all of humanity has equal access to knowledge and ideas. She described access to global information networks as being like an on-ramp to modernity and argued that even in authoritarian countries, information networks are helping people discover new facts and making governments more accountable. Paying tribute to Franklin Roosevelts four freedoms speech, she articulated a principle of the freedom to connect:

the idea that governments should not prevent people from connecting to the internet, to websites, or to each other. The freedom to connect is like the freedom of assembly, only in cyberspace. It allows individuals to get online, come together, and hopefully cooperate.

This vision was in contrast to that of countries like China, with its infamous great firewall, and other repressive countries, which held that nations internets should be divided by borders and subject to government control just as their physical territories are. Under this vision, authoritarian countries could have equally authoritarian internets.

Last week, the Trump administration followed up on weeks of saber rattling over the Chinese-built social media network TikTok and a monthslong campaign to roll back the internet equipment firm Huaweis role in global 5G networks with an even further-reaching plan. Trumps new executive order will ban any U.S. company from interacting with the Chinese producers of the apps TikTok and WeChat, meaning they cant be offered in American app stores unless they are sold by their parent companies. Secretary of State Mike Pompeo also outlined plans for a so-called clean network, prohibiting Chinese companies from accessing American app stores, apps, cloud services, mobile carrier networks and undersea internet cables.

This was all part of an overall escalation of anti-Chinese rhetoric and policy from the Trump administrationand also based on some very legitimate concerns about Chinas surveillance practices. But another way to look at it is as a final surrender to Chinas vision of internet sovereignty.

Critics have been raising the alarm about the splinternet, the Balkanization of cyberspace, and the Westphalian web for years. Its now here. This may be a tragedy, but its one that the U.S. should have seen coming and that it partly enabled.

Clintons speech felt forward-looking and futuristic at the timeand briefly appeared prescient when the social mediaenabled Arab Spring protests broke out the following yearbut actually harkened back to notions from the earliest days of the internet about cyberspace as a domain separate from that of terrestrial nation-states.

The term cyberspace was coined by the science fiction writer William Gibson in novels set in a near future where national governments had been weakened and undermined by new communications technologies. Todays internet looks very little like the fully immersive domain Gibson envisioned, but the space part of cyberspace made it a useful metaphor in conversations about the role of the state in internet governance and freedom.

At the 1996 World Economic Forum in Davos, Switzerland, John Perry Barlow, the former Grateful Dead lyricist and founder of the Electronic Frontier Foundation, penned a Declaration of the Independence of Cyberspace, which begins:

Governments of the Industrial World, you weary giants of flesh and steel, I come from Cyberspace, the new home of Mind. On behalf of the future, I ask you of the past to leave us alone. You are not welcome among us. You have no sovereignty where we gather.

Today, Barlows declaration serves a role similar to that of Francis Fukuyamas The End of History: an example of past conventional wisdom for writers to trot out and say, Well, thats not how it turned out. But for a long time, the notion that nations should not, and could not, control the internet was very pervasive, and not just among Silicon Valley libertarians. In 2000, Hillary Clintons husband likened Chinas efforts to censor the internet to trying to nail Jell-O to the wall. In the years since, China has gotten very good at nailing Jell-O.

Authoritarian governments have long rolled their eyes at American talk of internet freedom, and not entirely without reason. As with free trade, many look at the free internet and see a project of American power projection cloaked in platitudes. Is Vladimir Putin being paranoid when he says that the internet was originally a CIA project and is still developing as such? Undoubtedlybut theres some truth to the notion: The internet does trace its origins back to systems developed by U.S. intelligence, and the agency still dabbles in Silicon Valley investing.

After Edward Snowdens revelations about National Security Agency surveillance, even democratic leaders like thenBrazilian President Dilma Rousseff began talking seriously about the importance of internet sovereignty and, for a time, considered legislation mandating that Brazilian users data be stored within the countrys bordersit didnt happen there, but it did in Russia. Americas own history of mass data collection is why some see the TikTok ban as rank hypocrisy.

American officials forthright rhetoric about internet freedom may also have backfired. Its not exactly a surprise that authoritarian governments like Chinas viewed services like Google and Facebook as a threat when the secretary of state of the United States was giving high-profile speeches openly telling these governments that they should consider social media a threat to their power. (American concerns about TikTok and user privacy may be justified, but its not as if the Chinese foreign ministry isnt putting out statements boasting about how its harvesting Americans data.)

The big internet companies themselves have been almost comically cynical on the topic of internet freedom. Facebooks Mark Zuckerberg was once so anxious to gain approval from the Chinese government that he conspicuously left a copy of Chinese President Xi Jinpings book on his desk during visits by Chinese officials and asked Xi for suggestions on the name of his unborn child. Today, facing threats from government regulatorsand having given up on accessing Chinas markethe tells Congress that he is upholding democratic traditions like freedom of expression against his Chinese competitors. In 2006, Google agreed to cooperate with Chinese censors, arguing that it was necessary to fulfill its mission to provide the greatest access to information to the greatest number of people. In 2010, after the company moved its operations out of mainland China following a series of cyberattacks, Soviet-born co-founder Sergey Brin decried the forces of totalitarianism that made the move necessary and told the New York Times that the half an Internet approach of authoritarian countries would eventually fail: I think that in the long term, they are going to have to open. In 2018, it was revealed that Google was working on a new censored version of its search engine for the Chinese marketwhich it dropped after its own workers called out the project as a betrayal of Googles stated mission.

The ideal of an open internet suffered another setback in 2016 with the election of a president who evinced neither an interest in global democracy nor an understanding of how the internet works. Trump was mocked during his campaign in 2015 for suggesting he would combat ISIS by speaking to Bill Gates about in certain areas, closing that internet up in some way and preventing terrorists from using our internet. As with many of Trumps more outlandish utterances, it probably should have been taken more seriously. He will end his first term with the more closed-up internet he described, where national governments have a more proprietary right to their citizens data. Even if he loses in November, it could be a core part of his legacy. Its hard to imagine Joe Biden, who has run on being more of a China hawk than Trump, rolling back these restrictions, which are, after all, based on widely held concerns about Chinese data collection that arent just restricted to Trumps base. And if the new rules end up forcing a sale of TikTok to an American company, theres not much that can be done to reverse it.

Even if the open internet was always more of an ideal than a reality, that doesnt mean were better off simply acceding to a world of Balkanized national internets. National internet shutdowns during times of political crisis have become commonplaceBelarus on Sunday became just the latest example.

Chinas WeChatthe less discussed but probably more consequential Chinese app banned by the administration last weekcould be a preview of what these internets look like. For Chinese users, its a phenomenally convenient all-in-one platform for person-to-person messaging, social media sharing, payment, shopping, and gaming. Not only is this one app increasingly the internet for Chinese users, its the forum through which much of economic and social life is mediated, and daily lifeparticularly in large citiesis hard to live without it. (The international version of the app possesses little of this functionality and is similar to other messaging apps like WhatsApp.) Omni-apps like WeChat are the antithesis of the open internet idealglobal, unfettered, user-generatedand also function as the kind of surveillance tool that the totalitarian governments of the last century could only have dreamed of. If walled-garden internets become the norm, other countries will look for opportunities to follow Chinas lead.

National governments have always strived for what the anthropologist James Scott calls legibilityarranging their populations to simplify classic state functions like taxation, conscription, and preventing rebellion and crime. They dislike ambiguity when it comes to the territory under the states control or the people residing within it. In our era, the drive for legibility, fused with an ethnic nationalist political project, is behind the drive toward ever greater border security and crackdowns on undocumented migration.

The classical vision of cyberspace, as expressed by 90s-era visionaries like Barlow and Gibson, was supposed to be a threat to state legibilitya realm for communication and commerce outside the reach of terrestrial nation-states, and one in which authoritarian repression and censorship was ultimately impossible. Governments like Chinas were plainly hostile to this vision from the beginning. The U.S. supported it rhetoricallyif only up to a point and often opportunisticallyuntil now.

That doesnt mean this is the end of the story. National governments are taking on a greater role in the governance of cyberspace at a time when their ability to perform the basic functions of governance in the real world appears weaker than ever. Just because governments are building new walls on the internet, doesnt mean they will do a particularly good job guarding them.

The dream of the open internet may live on, but at the very least, its time to do away with a whole universe of metaphors. The Jell-O has been nailed to the wall, the weary giants of flesh and steel have elbowed their way into the home of the mind, and the nervous system of our planet will never be the same.

Future Tense is a partnership of Slate, New America, and Arizona State University that examines emerging technologies, public policy, and society.

More:
The End of Cyberspace - Slate

The splintering of the internet and how it may affect India |India Today Insight – India Today

Ever since US President Donald Trump announced he was going to ban TikTok unless an American company bought it out by the middle of September, tech experts have raised alarm over the dangers of this prospect. They say this could fragment the internet along spheres of national interests and give rise to multiple ecosystems of the internet. In other words, it could mark the beginning of an American version of the internet similar to the ecosystem that exists in China.

The US plan to implement a clean networkwhich would block Chinese companies from accessing app stores and cloud services, among other thingshas invited a strong backlash because the internet, as a subcultural project of the 70s that had de-linked itself from its strong military-industrial complex roots, was intended for everyone. Techies in Silicon Valley, as Scott Malcomson has explained in his book Splinternet, were given a free rein to work on personal computers and the internet to empower the individual and free people, as it were, from the oppression of the state, a sign of the times of the culture that thrived in the Bay area in the backdrop of the Vietnam war. Silicon Valley ethos gradually sat well with the notions of the internationalist principles that resembled American values. But as time passed, tech giants, led by commercial interests, swallowed up the internet. So much so that we associate the internet today with, say, a Google or an Amazon. Thats all the more true for us in India because we adopted the US tech model. Other countries, such as Malaysia, Indonesia and Thailand, bought into the Chinese model. But even in the 80s, when American superiority was a given, computer pioneers like Jon Postel thought long and hard about the future of internet governance because they knew it had to be protected from getting caught up in government rivalries.

In 1988, computer scientist Leonard Kleinrock chaired a National Research Council committee that submitted a report. The Kleinrock report suggested bringing in the US government as a funder of the internet project because, as the report argued, foreign competitors are busy at work with their own national research networks. Clearly, the US was wary that everyone would want some degree of control over cyberspace. Even though the internet appeared largely free from state interference, the 2013 Edward Snowden revelations told another story. The US government was allegedly using American companies to spy on citizens and enemies, whether they knew about it or not. The tech industry was taken aback by what seemed like an admission of the defeat of the global internet project. Their role as gatekeepers of the global project was downsized to, as Splinternet mentions, that of the unwitting agent of the intensely anxious security apparatus of one particular nation at a time.

Tech companies retaliated by encrypting and re-encrypting services even though the US government said they wanted special access to the internet on national security grounds. This debate has remained a flashpoint between tech companies and governments across the world. It is also currently playing out in India, where the government has asked WhatsApp, owned by Facebook, to trace the originators of fake messages. But WhatsApp has declined to do so and said that while it could provide law enforcement agencies with users meta data, it could not directly trace conversations between users since it would be a breach of their encryption policy. This debate began in 2018 after the Indian government proposed a series of new rules for social intermediaries, asking them to remove unlawful content, among other things. The norms are also related to Indias data protection bill, which is yet to be enacted into law.

Similarly, when Facebook acquired a 9.99 per cent stake in Reliance Jio platforms, the deal caused a surprise over the fact that Facebook and Reliance had differing views on two major internet policies: data localisation measures and encryption policies. Arindrajit Basu, a researcher at the Centre for Internet and Society, explains that big tech companies were typically against data localisation measures whereas Indian companies heavily favoured it. In its integrated annual report in 2018-19, Reliance mentioned that keeping a copy of citizens data in servers within the country would also spur investment in creating server and cloud capacity in India, incentivising research and developing and creating employment in line with the governments Make in India initiative. Building cloud capacitythey can never crash unlike physical servers that can come under attack quite easilyis becoming the next sphere of geostrategic competition as every country rallies to co-opt the benefits of services bound to come as a result of the roll-out of 5G. Facebook is aware of the precedent it can set if it does agree with the governments rules to keep citizens data within the countryit can again be held hostage to the whims of a government agency.

Besides, the Indian government has on several occasions shut down internet services in parts of the country, which has caught the eye of the international community. Internet shutdowns are common in authoritarian countries like China, but not in democracies. Kashmir, which has about 7 million people, has not had 4G internet for close to a year, though the Centre has announced it will start restoring 4G internet on a trial basis after August 15. Similarly, India is now part of a democratic coalition of countries, dubbed the D10 by the British government, which aims to find alternative suppliers of 5G to cut reliance on Chinas Huwaei. D10 includes all the G7 economies, along with India, Australia and South Korea.

Though India has deferred its 5G plans for a year owing to the Covid pandemic and has not announced whether itll block Huwaei and ZTE in the 5G rollout, sources in the government say India is deliberating on the 5-G plan. Several factors are being weighed, the sources said, to dictate the coming up of a Great Wall of India against these companies.

Subscribe to the daily newsletter for sharp insights delivered straight to your inbox https://www.indiatoday.in/newsletter

More here:
The splintering of the internet and how it may affect India |India Today Insight - India Today

This Week in Technology + Press Freedom: Aug. 9, 2020 – Reporters Committee for Freedom of the Press

Reminder! If you havent had a chance to fill out our five-minute survey about This Week in Technology and Press Freedom, please take a few moments to do so. Your answers will help us understand what content you want to see in the newsletter, when you want to hear from us, and more. This survey will be open until 5 p.m. ET on Aug. 24. We really appreciate your feedback!

Heres what the staff of the Technology and Press Freedom Project at the Reporters Committee for Freedom of the Press is tracking this week.

TPFPs Linda Moon recently discussed leaks, government surveillance, and protecting sources during a conversation with Barton Gellman, an award-winning journalist and author of Dark Mirror: Edward Snowden and the Surveillance State.

Gellman, now a staff writer at The Atlantic and senior fellow at the Century Foundation in New York, led The Washington Posts reporting on classified National Security Agency documents he received from former intelligence officer and contractor Edward Snowden. The documents revealed theremarkable powerof the NSAs surveillance programs, and Gellmans stories on the documents prompted national discussions about privacy and national security.

Gellman and Moon discussed the obstacles Gellman faced in obtaining and publishing accurate information while keeping himself and his sources safe.

Once Gellman found a credible source in Snowden, he looked for a news organization that would back him and bear any potential legal risks. This led Gellman to go to the Post, his former employer. With the Posts support, he was able to scour tens of thousands of documents received from Snowden and break stories one by one.

Gellman has a long history of championing free speech. As the editor of his high school newspaper, Gellman commissioned stories about teen pregnancy. The schools principal fired him for the stories and burned the printed newspapers. Gellman and two friends sued her on First Amendment grounds.

Gellman eventually won a favorable settlement, but by then he was in college and unable to publish the stories. That taught me something about the efficacy of litigation, he said. Sometimes you win in principle but not in practice. Its not always the right answer, but sometimes its indispensable.

As a client of Reporters Committee attorneys, Gellman is currently pursuing government records mentioning his name through Freedom of Information Act litigation. He made a series of FOIA requests for those records over six years ago, after seeing his name in Snowdens documents. Gellmans FOIA case is as relevant as ever: As discussed below, the U.S. Department of Homeland Security has recently been gathering intelligence on journalists.

Gellman said that although he is sometimes persuaded by government officials not to publish certain material, other times publication is in the public interest. If we didnt have reporters making decisions on the margins, he said, then you would never know there was a torture program after 9/11. You would never know about secret prisons. You wouldnt know about unlawful domestic surveillance.

Gellman added, Over the history of this country, people have done bad things with this national security power. Theyve experimented on human beings. And I just cant accept a set of rules that would say the government is entitled to keep that secret forever.

Sign up for This Week in Technology and Press Freedom to access the full interview.

Sasha Peters

The Reporters Committee recently filed afriend-of-the-court briefinLokhova v. Halper, a case in the U.S. Court of Appeals for the Fourth Circuit. The plaintiff claimed that hyperlinks to previous news stories, as well as third-party tweets linking to those stories, constituted republication and restarted the statute of limitations clock on her defamation claims against four news organizations. The lower court disagreed. The Reporters Committees brief, joined by 29 media organizations, highlights the legal and policy concerns that would arise if the appellate court held otherwise.

The Reporters Committee, along with the Knight First Amendment Institute at Columbia University, also filed afriend-of-the-courtbrief inAlasaad v. Wolf, a case in the U.S. Court of Appeals for the First Circuit. A federal district court in Boston previouslyfoundthat suspicionless border searches of electronic devices violate the Fourth Amendment, but held that border officers need only reasonable suspicion, rather than probable cause, to conduct such searches going forward. The plaintiffs, a group of U.S. citizens and one lawful permanent resident who had their devices searched at border entry points, now challenge that determination. The Reporters Committees brief in support of the plaintiffs highlights the implications of electronic device searches for newsgathering and argues that warrantless searches at the borderviolate the First Amendment.

The U.S. Department of Homeland SecurityremovedBrian Murphy from his post as acting undersecretary for intelligence and analysis after The Washington Post reported that Murphys office compiled intelligence reports on two journalists who published unclassified information about DHSs activities in Portland, Oregon. In response to the Posts reporting, the Reporters Committee issued astatementnoting that federal law prohibits the creation of dossiers on journalists precisely because doing so can morph into investigations of journalists for news coverage that embarrasses the government, but that the public has a right to know.

A day afterreportssurfaced that the materials for a mandatory media training course taken by all Department of Defense personnel referred to protesters and journalists as adversaries, Defense Secretary Mark Esperdirected the Pentagonto update the language to refer to those trying to obtain information as unauthorized recipients. Several former government officials criticized the language choice, including former Pentagon Press Secretary George Little, who called the characterization appalling and dangerous.

After the Trump administration withheld congressionally approved funds from The Open Technology Fund, a U.S. internet freedom organization, OTF wasforcedto stop 49 of its 60 projects, likely impacting the ability of millions of people around the world to access the internet and uncensored news from Voice of America. Notably, OTF works to protect journalists and their sources from digital attacks, raising concerns that halting support of its tools could threaten secure operating systems in surveillance-heavy countries and endanger those who rely on the organizations work.

The White House is once againfacing a lawsuitdemanding that Trumps personal Twitter account unblock users who are critical of him. Two years ago, a federal judge found that his blocking practicesviolatedthe First Amendment, a rulingupheldby an appeals court.The new lawsuit alleges that while Trump unblocked some critics, he refused to unblock, among others, those who were blocked before he took office.

The security firm FireEye recentlyreportedthat a group of hackers have been breaking into legitimate Eastern European news sites to spread anti-NATO disinformation. The disinformation campaign involves hackers spreading the fakenews articles on social media before they are taken down. According to FireEye, the hacking operation has been active since at least March 2017.

Former CIA Director John Brennandetailsin his new memoir how the White House specifically restricted his access to classified files after he left the agency, a permission often granted to former directors who are writing books because the manuscripts undergo governmental review for national security information. Brennan alleged that access restrictions were in retaliation for his criticism of the Trump administration.

Smart read

The National Security Agency has posted apublic advisoryon how to avoid location data tracking on mobile devices. Ultimately, if you really dont want to be tracked, NSA officials say, leave your phone at home.

Gif of the Week:This marks the last newsletter for our colleague Linda Moon, who will be wrapping up her fellowship with the TPFP team early this week. We miss you already, Linda, and best of luck on the next chapter!

Like what youve read?Sign up to get This Week in Technology + Press Freedom delivered straight to your inbox!

The Technology and Press Freedom Project at the Reporters Committee for Freedom of the Press uses integrated advocacy combining the law, policy analysis, and public education to defend and promote press rights on issues at the intersection of technology and press freedom, such as reporter-source confidentiality protections, electronic surveillance law and policy, and content regulation online and in other media. TPFP is directed by Reporters Committee Attorney Gabe Rottman. He works with Stanton Foundation National Security/Free Press Fellow Linda Moon, Legal Fellows Jordan Murov-Goodman and Lyndsey Wajert, and Legal Intern Sasha Peters.

Visit link:
This Week in Technology + Press Freedom: Aug. 9, 2020 - Reporters Committee for Freedom of the Press

This week in TikTok: So is it getting banned or what? – Vox.com

Hello from The Goods twice-weekly newsletter! On Tuesdays, internet culture reporter Rebecca Jennings uses this space to update you all on whats been going on in the world of TikTok. Is there something you want to see more of? Less of? Different of? Email rebecca.jennings@vox.com, and subscribe to The Goods newsletter here.

If you or someone you love has recently been forced to know or care about what TikTok is, first of all, Im sorry, this app will take over your life.

Second of all, when was the last time normal people got this riled up about a potential sale of a foreign tech company? I certainly cant recall, but underneath all the news is Trump banning the app? Is Microsoft buying it? Are the faceless, omnipotent gods at TikTok stealing data? are anxieties about China and, specifically, fears that the US may not be the one setting the ground rules of the internet.

On August 6, President Trump issued executive orders that would ban two apps, TikTok and WeChat, from operating in the US if they were not sold by their respective Chinese parent companies by September 15. (In response, TikTok is now suing the Trump administration.) National security concerns over how the Chinese government could force TikTok to hand over American user data or censor content sensitive to the Communist Party of China have been brewing for more than a year.

Both Microsoft and Twitter have reportedly been in talks to acquire TikTok, though a sale would be incalculably messy: Microsoft isnt trying to buy TikTok, its trying to buy TikTok in the US, Canada, Australia, and New Zealand, and as my colleague Russell Brandom explains at The Verge, no one has ever split up a social network along regional lines; its unclear whether thats even possible. That central problem is much harder than anyone is willing to admit, he writes.

Meanwhile, the vultures are swarming. Last week Instagram launched its long-in-the-works copycat product, Reels, in the US. (Snapchat also has a competitor feature.) Though Reels is functionally identical to TikTok, it is as of yet unable to recreate the particular joy and originality of its predecessor, and most of the content seems like a sad facsimile of TikToks most boring memes.

But back to why any of this matters to people who dont otherwise care about viral dances or technology companies. The best and most clear-headed take on all of this, in my opinion, comes from Sarah Jeong, also writing for The Verge. She dubs the central strategy in play here information-nationalism, or the idea that to point out a countrys failures and human rights abuses is to make it weak (e.g. to accurately describe slaverys history in the US is to slander America).

The US, she argues, is afraid of TikTok because the country has made it an avatar of the Chinese approach to tech. The irony here, though, is that there are plenty of reasons to be actively terrified of how US tech companies and its own government use that same data, particularly the information revealed by Edward Snowden in 2013; when American politicians extoll the virtues of Silicon Valley while stoking fears about China, its rather hypocritical.

Just like China had tried to use Google to spy on its activists, the National Security Agency had been secretly collecting bulk data from almost every American company you could think of, she writes. The federal government has made it harder to see numbers on coronavirus infections. The president has even said on the record that increased testing will make him look bad. The logic behind this is the same logic that drove the Chinese Communist Party to hide the pandemic in Wuhan in the very early days, much to everyones detriment. The similarities in their behavior will not stop the president from blaming China for a cover-up thats exactly how information-nationalism works.

Even if Instagram Reels takes off, or even if TikTok is turned to dust with the stroke of a pen, it wont matter, because while TikTok may be the first Chinese social media company to succeed on a truly global level, it likely wont be the last. If the US believes that this is a problem, information-nationalism isnt the answer.

On TikTok, some memes are funny, many are cringe, and a few are incredibly disgusting (do not click on that link unless you want to watch videos of people eating cereal with milk out of each others mouths). But among the worst and most insidious is the prevalence of digital blackface, in which white creators lip-sync to Black peoples voices or mimic their affectations. Digital blackface has always been a problem on the internet, and on TikTok, where mimicry is the lingua franca, its found new fertile ground.

In this months Wired cover story, Jason Parham explores how TikTok has shaped this evolution, where memes like Hot Cheeto Girl and audio like Nene Leakess whew chile, the ghetto have become fair game for white creators. Said one woman interviewed for the story, When you call them out, its, Anyone of any race can be a Hot Cheeto Girl. No sweetheart, we know what youre doing. We know that the Hot Cheeto Girl is just a derivative of the ghetto girl, the hood rat, the Shanaynay that people used to call Black and Latinx women.

The piece also includes a series of disturbing statements from TikTok creators on the racism theyve experienced on the app, either from fellow users or from the technology itself videos get taken down because sign language is read as a gang symbol, censorship of reactions to racist videos but no action taken on the racist video itself. Its now common for Black creators to keep a backup account for when their main account eventually gets suspended for some nebulous violation.

Most illuminating in Parhams piece, though, is when he details the importance of seeing images of Black people online, and TikTok, despite its apparent issues, has been a home for many Black creators. Here he is talking about what the early days of social media as a Black person were like:

It wasnt until college, where I spent hours a day clicking through Facebook, feeling connected to a world and the people who made it for what felt like the very first time, that I finally began to articulate what part of me had known since boyhood: that images make us true. From my laptop screen I gazed out into a kind of Black Universe. Here were Black people doing what we do: playing spades at a barbecue; hanging out with family members back home, caught mid-laugh. We posed for the camera every chance we got because we understood, though we never spoke it, that wed exist here somewhere forever. There was air in our lungs, fire in our bones. When white people attempt to put on that Blackness for TikTok, this is what theyre erasing.

This was a rather depressing newsletter, so please enjoy this incredibly soothing video of a self-proclaimed cottagecore lesbian preparing a picnic for her girlfriend. The sandwich looks so good!

Support Voxs explanatory journalism

Every day at Vox, we aim to answer your most important questions and provide you, and our audience around the world, with information that has the power to save lives. Our mission has never been more vital than it is in this moment: to empower you through understanding. Voxs work is reaching more people than ever, but our distinctive brand of explanatory journalism takes resources particularly during a pandemic and an economic downturn. Your financial contribution will not constitute a donation, but it will enable our staff to continue to offer free articles, videos, and podcasts at the quality and volume that this moment requires. Please consider making a contribution to Vox today.

Read more:
This week in TikTok: So is it getting banned or what? - Vox.com

Meet the cast of Netflix movie Project Power – RadioTimes

Netflix has been on top form when it comes to releasing new blockbusters lately and the next film to fall into that category is Project Power, which takes place in a near future where anyone can take a pill that will briefly give them superpowers, but may also cause their death.

Its a killer premise and luckily the streaming giant has managed to assemble a cast to match, with Jamie Foxx, Joseph Gordon-Levitt and Dominique Fishback all taking on main roles.

Read on for everything you need to know about the cast, including who theyre playing and where they might have seen them before.

Netflix

Who is Art?

What else has Jamie Foxx been in? Foxx is one of the biggest names in Hollywood, having won a Best Actor Oscar for his performance as Ray Charles back in 2004 and appeared in a slew of big budget films since, including Django Unchained, Baby Driver and The Amazing Spider-Man 2.

Other big screen highlights include roles in Collateral, Dreamgirls and Just Mercy whilst he is also a Grammy Award-winning musician, with four top ten albums to his name as a producer.

Netflix

Who is Frank?

What else has Joseph Gordon-Levitt been in? Gordon-Levitt first gained recognition as a child actor in films including 10 Things I Hate About You, before having a hugely successful spell in the late 00s and early 10s with roles in a wide range of Hollywood hits such as (500) Days of Summer,Inception, The Dark Knight Rises, 50/50 and Looper.

More recent roles include playing Edward Snowden in the 2016 biographical film Snowden, and the lead role in the Amazon Studios action thriller film 7500.

Netflix

Who is Robin?

What else has Dominique Fishback been in?Fishback is best known for her work on the small screen, having had recurring roles in the 2015 miniseries Show Me a Hero and sketch comedy show Random Acts of Flyness, as well as being a series regular on HBO series The Deuce. Big screen performances have included roles appearances in The Hate U Give and Night Comes On.

Netflix

Who is Biggie?

What else has Rodrigo Santoro been in?Santoro has had a number of main roles in TV shows both in English and Portuguese with his most high-profile small screen roles being Hector Escaton on Westworld and Paulo on Lost. On the big screen, notable appearances have included Love Actually, 300 and I Love You Phillip Morris, while he has also won numerous acting awards in his native Brazil.

Netflix

Who is Captain Crane?

What else has Courtney B. Vance been in?

Who is Gardner?

What else has Amy Landecker been in?

Who is Newt?

What else has Machine Gun Kelly been in?

Who is Landry?

What else has Allen Maldonado been in?

The supporting cast also includes Tait Fletcher (Westworld) as Wallace, Andrene Ward-Hammond (Just Mercy) as Irene, Mike Seal (The Walking Dead) as Taylor, Kyanna Simpson (Black Lightning) as Tracy, C.J. LeBlanc (Just Mercy) as Miggs, CG Lewis (Looking for Alaska) as Tommy and Joseph Poliquin (Greyhound) as Indo.

Project Power arrives on Netflix on Friday 14th August. Check out our lists of the best TV shows on Netflixand thebest movies on Netflix, or seewhat else is on with our TV Guide

View original post here:
Meet the cast of Netflix movie Project Power - RadioTimes

Why Britain is being forced to pick sides in a global battle for control of the web – Telegraph.co.uk

Trump himself has also set the tone: he is a lifelong Sinosceptic with a zero-sum view of international relations, elected on a platform of overturning his predecessor's comfortable free-trade consensus and now facing an uphill climb for re-election.

But Prof Weber argues that a Democrat president might actually be doing the same. Rather than a disruptive leader demolishing American globalism, he sees a rational response to the worldwide decay of the trust that enabled the "free and open internet" which was "always a mythology".

For years, he says, many countries did try to lower the boundaries between the mutually-compatible networks that made up the internet. Then the Edward Snowden surveillance revelations of 2013 put foreign governments on notice that the "free and open internet" was "mainly a US intelligence collection site".

American talk of the global internet as a tool for "revolution" also hastened its end. "Dictatorships of the third world really learned from that, and they learned to be nervous of the internet," says Prof O'Hara, co-author of the "four internets" paper.

At one point the US government even covertly funded an underground social network in Cuba, nicknamed "Cuban Twitter". The hope was to incite unrest by unleashing the "wild colt" of online dissent, much as then secretary of state Hillary Clinton had hailed Twitter's role in the Arab Spring. The project was shut down in 2012.

Meanwhile, the US itself became a target of government hackers. Russia's election interference in 2016 showed Americans that the internet could harm them too as did China's increasingly aggressive campaign of cyber-espionage, part of a lurch back towards authoritarianism under President Xi Jinping.

The internet, it turned out, was not a new world or better but simply a new "layer" of the dirty old one, just as capable of becoming a battlefield.

Read the original:
Why Britain is being forced to pick sides in a global battle for control of the web - Telegraph.co.uk

China: "The US is not qualified to build a coalition of ‘clean countries’ because itself is dirty all over" – DatacenterDynamics

"The new science and technology revolution, driven by information technology, is picking up speed," Yi continued.

"China will continue to work with all countries to maintain a fair, just, open and non-discriminatory business environment, promote international exchanges and cooperation in science and technology, and ensure that safe, reliable and quality information technology will boost global economic recovery and help improve people's lives around the world. We hope that the US will give up its obsession with its narrow self-interest, and return to the right track of openness and cooperation."

The comments came hours before US President Trump signed executive orders seeking to ban ByteDance's TikTok and Tencent's WeChat.

While Yi's assertions of US surveillance are well documented, his claim of a "fair, just, open and non-discriminatory business environment" in China is less well documented. US tech corporations face severe restrictions, and must work with a local partner - which is why Amazon Web Services made a deal with Beijing Sinnet Technology, while Microsoft and IBM have turned to 21Vianet Group. Apple uses state-owned Guizhou-Cloud Big Data Industry (GCBD), and previously had a contract with China Telecom.

Within the mainland, it operates a vast surveillance and censorship network focused on quelling dissent, and building citizen scores on each individual. In Xinjiang, where it is committing human rights abuses on the Xuighur population, it is beta testing more invasive forms of surveillance, with an eye to eventually being able to predict who will prove disloyal.

Outside of China, it is less clear how aggressive its surveillance efforts are - although its use of state-backed hackers to steal Western companies' intellectual property is well documented. In much of the developing world, its state bank offers low interest 'concessional loans,' where the money is used to build infrastructure using Chinese companies.

Among them is Huawei, which has benefited from billions in state loans. Sometimes the money is used to help fund data center developments, other times fiber infrastructure. Increasingly, it is used to try to replicate China's surveillance system overseas.

"China is always a firm defender of the international order and the international system," Yi said, saying it contrasted the US's interventionist approach. "In the past seven decades and more since the founding of the People's Republic, China never started a war, or occupied an inch of land of others." While it is true that the US has been far more active in promoting coups around the world, and engaged in numerous official and unofficial wars, China is currently occupying contested territory in India. The conflict led to TikTok and WeChat being banned in the country.

In the interview, Yi also mischaracterized China's involvement in the South China Sea as peaceful and said that "it should not be a wrestling ground for international politics." The nation claims most of the sea as its own, in contravention of international law, and has been building artificial islands to extend its claim.

Yi said disputes in the region should be solved by dialog and mutual consensus, and repeatedly pointed to the importance of the UN. But a 2016 UN arbitration ruled in favor of the Philippines in a dispute over territory, which China has ignored.

Philippine President and mass murderer Rodrigo Duterte addressed the issue in a July national statement amid growing criticism over inaction following Beijings increasingly aggressive moves in adjacent waters. China is claiming it, we are claiming it. China has the arms. We do not have it. So, its as simple as that. They are in possession of the property so what can we do? he admitted.

To gain the territory back, we have to go to war. And I cannot afford it. Maybe some other president can but I cannot. Im useless when it comes to that. Really, Im useless to that. I cant do anything. I cannot, Duterte said. This week, Duterte banned joint exercises with the US in the sea.

"China's US policy is always consistent and stable," Yi continued.

"In the meantime, we are also prepared for possible bumps and storms ahead. The US move to turn China into an adversary is a fundamental, strategic miscalculation. It means that the US is funneling its strategic resources in the wrong area.

"We are always ready to develop a China-US relationship featuring no conflict, no confrontation, mutual respect and win-win cooperation based on coordination, cooperation and stability. In the meantime, we will firmly defend our sovereignty, security and development interests, because this is a legitimate right inherent in China being an independent sovereign state."

See the original post here:
China: "The US is not qualified to build a coalition of 'clean countries' because itself is dirty all over" - DatacenterDynamics