Investigating the Use of Blockchain to Authenticate Data from the Statistics Canada Website – Statistique Canada

Executive summary

Do you know what a non-fungible token (NFT) is? This question started a chain reaction that resulted in an investigation by a diverse team into how Statistics Canada (StatCan) could use blockchain, or distributed ledger technology, to authenticate a document. The question was posed as part of a more significant idea of how the Dissemination Division might use NFTs, or similar technology, to authenticate the products leaving the StatCan website. Initially, our team was composed of internal StatCan employees: Mathieu Laporte, Director of the Dissemination Division; Jacqueline Luffman, Chief of Publishing Services; and Lillian Klein, Research Librarian. These individuals discussed the idea among other StatCan staff to evaluate whether it was feasible. However, as we recognized a gap in our blockchain experience, we reached out to academics who research various aspects of blockchain technology. Through those meetings, we were connected to four blockchain experts: Dr.Florian Martin-Bariteau from the University of Ottawa, Dr.Jeremy Clark from Concordia University, Dr.Victoria Lemieux from the University of British Columbia and Dr.Tracey Lauriault from Carleton University. We met with these experts for a brainstorming session, where Jeremy Clark presented the idea of using digital signatures to authenticate StatCan documents. With this idea in mind, a team of researchers was formed to explore up-to-date cryptographic technology and applications to develop a comprehensive understanding of the technology and determine whether using this technology in StatCans work would be meaningful. Our research team includes Kathryn Fedchun, a PhD student at Carleton University; Didem Demirag, a PhD candidate at Concordia University; and Lillian Klein, a research librarian with StatCan. This paper summarizes months of collaborative work completed by this team.

The main focus of this project is to understand more about blockchain and see whether, as StatCan expands its website, it could use blockchain technology to enable users to authenticate the data downloaded from the website. With an increased understanding of these emerging technologies, the aim of this project is to develop a process of authentication that would allow users to verify that the material downloaded from the StatCan website has not been tampered with and was produced by StatCan. This would increase overall trust in the agency as a statistical organization. By using blockchain to determine the authenticity of its data, StatCan has the ability to increase social trust with its users. It was identified that the ideal method of authenticating the data should be easy to use and available in an online and offline format to ensure users with varying degrees of Internet connection can authenticate their data.

Our research successfully defined and explained what blockchain is and identified how blockchain is currently being used in a Canadian context. We found that there has recently been a call to action for government agencies to embrace blockchain technology and take strides to implement it in their work. To create a well-rounded assessment of the technology, we included a review of concerns regarding blockchain. We focused primarily on the environmental impact, the public perception of the technology and any potential backlash our team could anticipate, the lack of regulations, and the potential to be blinded by the hype of blockchain technology. Finally, we completed a brief comparison of five blockchains that could be used in our solution. This comparison focuses on general information about each chain, along with the transactions per second, the consensus mechanism, whether it is private or public, and each blockchains environmental impact. This analysis enabled us to decide that Avalanche is the best option for us as we move forward with our technical solution.

With the knowledge gained from this research, our team recommends that this project could be the agencys opportunity to answer the call to action. We propose that StatCan conduct a pilot project based on Jeremy Clarks idea about using digital signatures and build an application that users can download to authenticate their data. We propose using a hybrid model with a blockchain that will allow both online and offline users to authenticate their data. The technical details of this project are explained in depth below; to summarize:

In the hybrid solution, authentication will occur through an application that users must download. The list of hashes of files is updated periodically to contain the hashes of new StatCan products. The authentication of a file will occur as follows: the user will need to upload the file needing authentication to the app. This action will prompt the app to compute the hash of the file and compare it with the list of already existing hashes from StatCan products. The app will then inform the user whether the file is valid.

This solution adds tremendous value to the agencys transparency and trust with users. Hosting the hash values on the blockchain creates an immutable record over time of the products the agency has released and increases users ability to trust the information downloaded from the StatCan website. This project is an opportunity to experiment with blockchain technology without overhauling the agencys existing system.

In the age of information, it is necessary to acknowledge the growing amount of digital information available to Canadians and their increasing distrust of digital sources (Ipsos Public Affairs for Canadas Centre for International Governance Innovation [CIGI-IPSOS], 2019). According to Ipsos Public Affairs for Canadas Centre for International Governance Innovation (2019), 36% of Canadians feel that the government contributes to their sense of distrust in the Internet. As Statistics Canada (StatCan) is the branch of government responsible for disseminating information to Canadians, it should not ignore this statistic. During the 2020/2021 fiscal year, the StatCan website had over 28million web page visitors and 766,589 table downloads (Statistics Canada, 2021). StatCan prides itself on its transparency and accountability to the public and strives to meet the needs of its users (Statistics Canada, 2018). As an organization, StatCan advertises itself as being a trusted source of statistics on Canada (Statistics Canada, 2018). According to StatCans Trust Centre, the people of Canada can trust that information gathered from them, and about them, is done so for themand that these activities are carried out with integrity and the highest ethical standards (Statistics Canada, 2018). The Statistics Act guides StatCan to ensure that it promotes and develops integrated social and economic statistics pertaining to the whole of Canada (Statistics Act, 1985).

Users count on the agency and expect to access and download authentic, reliable data when they enter the StatCan website. But once a product has been downloaded, it is challenging to validate that it belongs to StatCan and has not been tampered with by a malicious actor. This means that users may believe they are accessing untampered data from StatCan when downloading a corrupted comma-separated value (CSV) file. Regarding the likelihood of StatCan becoming a victim of cyber threats at the hands of malicious agents, the increased number of ransomware attacks on Canadian organizations shows that the country is a potential target (Communications Security Establishment Canada, 2021). Therefore, as StatCan begins to plan the expansion and innovation of its website, it is essential that it consider how it can give users the ability to verify and authenticate the data they download from the website.

This research aims to investigate whether StatCan could respond to the authentication gap on its website by integrating emerging technologies into its existing publication methods. To find answers, we began by familiarizing ourselves with the current research surrounding blockchain and distributed ledger technology. We then considered the importance of record keeping, confidentiality, trust and authentication. We looked at multiple examples of other Canadian organizations and government agencies using blockchain and found multiple articles calling on the government to adopt this new technology. However, we also considered concerns related to these emerging technologies, including environmental impact, public image and potential backlash, a lack of regulation, and the possibility of being blinded by the hype. We investigated five blockchains that could be used in our system design: Ethereum, Avalanche, Cardano, Hyperledger and Solana. With a better understanding of the technology available to StatCan, we worked to conceptualize a system that allows users to authenticate the data they download from the website. Our goal is that the system enables users to verify that the material downloaded from the website has not been tampered with and was produced by StatCan. We believe that our method of authenticating data should be available in online and offline formats to ensure that users with varying degrees of Internet connection can authenticate the data. Our team prioritized this component to serve all Canadian users, knowing that high-speed Internet connection is inconsistent because of the digital divide in the country (Canadas Public Policy Forum, 2014). Additionally, we prioritized usability when considering options for a solution, which needs to be as simple as possible to ensure the technology is accessible and easy to understand by users.

Before a solution can be recommended, it is necessary to introduce the technology behind it to provide the context required to understand how the technology can help StatCan accomplish its goal. The main features that need to be understood are the digital signatures and hash functions that support our concept. In addition to the introduction and literature review, Appendix A has a glossary of terms to help readers understand the more technical material.

Throughout the research process, we found a few gaps in the literature. Given that blockchain is still a relatively new technology, especially for government use, it is not surprising that gaps were found. It was difficult to find any concrete Canadian government regulations or policies on how to incorporate blockchain. This means that directives on the implementation of blockchain within the government are still coming to light. This gap leaves our team with questions surrounding how policies might change in the future to simplify or complicate the implementation of this project. Another identified gap is the lack of variety in the way organizations have published their method of incorporating blockchain into their daily work. We found a lot of material about how blockchain is being used in cryptocurrency, record keeping and financial technology (fintech). However, it was difficult to determine how blockchain is used by organizations on a daily basis. We were also unable to find significant information on the legal implications of using blockchain for our purposes. For example, in the case of health records discussed below, it was difficult to determine how patient files were uploaded or tracked on the blockchain. Furthermore, it was difficult to find research on similar projects. We were unable to locate published research seeking to address the issue of how to give users the ability to authenticate data that have been downloaded from a website. We believe that our project fills some of the gaps in the literature and is a valuable step in the direction of new technology for StatCan.

We performed a systematic literature review for this study, which allowed us to understand the breadth and depth of the existing body of work and identify gaps to explore (Xiao and Watson, 2019, p.93). A successful systematic literature review involves three stages: planning, conducting and reporting (Xiao and Watson, 2019, p.102). The first stage, planning, is when researchers identify the need for a review, specify research questions, and develop a review protocol (Xiao and Watson, 2019, p.102). In the second stage, researchers conduct the research and identify and select primary studies, extract, analyze, and synthesize data (Xiao and Watson, 2019, p.102). Finally, the third stage involves researchers writ[ing] the report to disseminate their findings (Xiao and Watson, 2019, p.102). For this project, we had the following three research questions in mind:

In the planning phase of this study, we compiled a list of search terms that focused on our areas of interest in this project. The list of search terms can be found in Appendix B. As Xiao and Watson (2019) described in their article on how to conduct a systematic literature review, we used these search terms to identify relevant articles. As we collected academic research articles, our team added more search terms. We then used a variety of combinations of the search terms listed in Appendix B with Boolean operators to focus our results. In total, we completed 15 unique searches.

Depending on the number of results listed in a search, we reviewed between 100 and 300 results. If the number of results listed was below 1,000, we examined the first 100. If the number of results was below 100,000, we reviewed the first 200; if there were over 100,000 results, we examined the first 300. In the review process, we assessed academic articles based on their relevance to this study using the title of the article, the abstract and the listed keywords. Overall, we collected 59 papers and entered the source information into a spreadsheet, including the title, authors, year the article or book was published, abstract, and complete citation.

Upon collecting the sources, we began reviewing each article to determine its relevance to this project. We assessed the abstracts in further detail and skimmed through the articles to assess their usefulness. Of the 59 papers, we found 18 sources that proved significantly valuable for this project. Most of the excluded papers were too technical for the purpose of this literature review. While we have attempted to make this paper relatively accessible, we have provided a list of technical terminology and definitions in Appendix A. While some of these definitions are paraphrased, they contain a fair amount of quoted material to maintain integrity.

From our 18 sources, we extracted relevant information and data and synthesized them into the literature review below. Using the research questions listed above, we provided a detailed overview of the technology; considered the significance of record keeping, confidentiality, trust and authentication; and provided a list of examples of other government organizations and agencies using blockchain. In addition, we were surprised to find multiple articles calling on the government to use these new technologies, and we also included this as a theme below.

Beyond academic articles, we reviewed multiple articles on the concerning aspects of blockchain related to environmental impact, public image and potential backlash, a lack of regulation, and the potential to be blinded by the hype of blockchain technology. We also researched five specific blockchains: Ethereum, Avalanche, Cardano, Hyperledger and Solana. The number of blockchains available grows each day, but our team chose to investigate these five. Ethereum is an extremely popular peer-to-peer blockchain that uses a fair amount of energy. Avalanche is a more environmentally friendly proof-of-stake blockchain, like Cardano, which is also a proof-of-stake blockchain that is easy on the environment compared with Ethereum. Hyperledger is an umbrella project of open-source blockchains and related tools, and Solana is a carbon-neutral, proof-of-stake blockchain. More information about these five blockchains and their differences is provided below. This systematic literature review strengthened our knowledge of this technology and supported us in creating recommended solutions and next steps for this project, found below.

This project aims to explore how technology can help users verify and authenticate data from the StatCan website. This literature review begins with a brief overview of cryptographic technology. Next, we consider the importance of record keeping, confidentiality, trust and authentication. We provide examples of organizations, agencies and companies in Canada that use this technology. Then, we list multiple sources that call on the government to move toward new technology such as blockchain. Next, we consider potential concerns with using blockchain, such as environmental impact, public image and potential backlash, a lack of regulation, and the possibility of being blinded by the hype of blockchain technology. Finally, we compare five blockchains: Ethereum, Avalanche, Cardano, Hyperledger and Solana. This project is a small step for StatCan toward new technology that can better protect its data.

In the early 1990s, cryptographers Scott Stornetta and Stuart Haber conceived the idea of connecting blocks via hashed data (Treiblmaier and Clohessy, 2020, p. v). Almost 20 years later, on October 31, 2008,

A mysterious individual, or group of individuals, known only as Satoshi Nakamoto, posted a link to a paper entitled Bitcoin: A Peer-to-Peer Electronic Cash System to an obscure mailing list called Cryptography List. In this paper, Nakamoto proposed the creation of what would become known as a blockchain as a means of enabling an electronic payment system that did not require a trusted third-party intermediary (Urban and Pineda, 2018, p.5).

A blockchain is a digital, decentralized and distributed ledger in which transactions are logged and added in chronological order with the goal of creating permanent and tamper-proof records (Treiblmaier, 2018, p.547). The idea of the ledger has existed for a long timeit is a permanent collection of recorded transactions, historically written in a physical book. Moving the ledger online into a digital currency is where blockchain originated. Since then, blockchain has broadened to include digital security beyond digital currency such as Bitcoin.

Much of this technology stems from cryptography. The term cryptography is derived from the Greek word kryptos, which is used to describe anything that is hidden, veiled, secret, or mysterious (Mohamed, 2020, np). Cryptography secures communication and information using technology and codes. It is well known that data are valuable and often vulnerable. In todays world, producing fake documents is becoming more common. As the fake ones accurately look like the originals, it is impractical for a common man to identify the real and the duplicate one (Prathibha and Krishna, 2021, p.71). Given this information, technology that uses cryptography and blockchain can protect the information, making it tamper-resistant [and] exceptionally hard to change or delete (DeFilippi, 2018, p. 3435). As people begin to recognize the significant and inherent value of data, blockchain and distributed ledger technology may force some organizations fundamentally to rethink their relations with users and approaches to privacy (Maull et al., 2017, p.484). Before providing some examples of blockchain use in Canada, we will discuss the importance of record keeping, confidentiality, trust and authentication for our project.

Victoria Lemieux, an archival studies scholar, claims that much of the discussion about trusted records or systems boils down to two interlinking concepts: reliability and authenticity (2016a, p.112). When a user accesses a record, they consider any potential risks associated with the data (Lemieux, 2016a). Users determine the reliability of data based on how they are accessing the data and on record creation, including who created the record and how (Lemieux, 2016a). Lemieux argues that long-term preservation of information in digital form requires that technical dangers to the longevity of authentic information be addressed (2016a, p.114). In our case, the purpose of what is actually stored on chain is not archiving but rather to establish that the original transaction record is authentic (Lemieux, 2016b, p.15). The aim of this project is to proactively safeguard StatCan data through the added value of blockchain technology.

This project demonstrates that StatCan recognizes the importance of confidentiality. When dealing with data, confidentiality refers to the protection of information, such as computer files or database elements, so that only authorized persons may access it in a controlled way (Mohamed, 2020, np). StatCan data need to be protected from potential threats or attacks. To accomplish this, we must determine the vulnerability or weakness of the current StatCan system (Mohamed, 2020). It is possible that data on the StatCan website could be altered without the users knowledge. This project attempts to fix the potential risk by addressing confidentiality and ensuring that information can be authenticated by the user.

According to a chapter on how authenticity can transform social trust, Batista et al. illustrate the three most important aspects of trust: accuracy, reliability and authenticity (2021, p.112). They argue that accurate [and reliable] records are precise, correct, truthful consistent, complete, and objective (Batista et al., 2021, p.114). To generate trust, the authors describe that authentic records need to preserve their identity and integrity over the period of long-term preservation (Batista et al., 2021, p.116). In the case of digital archives, the authors describe the difficulty in maintaining trust with a digital document. For example, suppose a statistical document has been altered. In this case, it might be challenging to detect the variances between the original and the copy that has been tampered with, and this can negatively impact social trust because of what they call uncertain authenticity (Batista et al., 2021, p.117). This project seeks to improve trust between StatCan and its users by providing a way to authenticate data from the StatCan website and removing uncertainty.

Authentication refers to the ability to determine the validity of a source. It answers the question, How does a receiver know that [the] remote communicating entity is who it is claimed to be? (Mohamed, 2020, np). In this project, StatCan wants to help users determine the validity of a source through an authentication process. Cryptographic algorithms support authenticated encryption, meaning that users can be sure the source is authentic (Mohamed, 2020). This verification also instills integrityit means they can know that the information has not been modified unless StatCan employees changed it through proper authorization (Mohamed, 2020). Evidently, record keeping, confidentiality, trust and authentication are significant factors in this project. Next, we provide examples in Canada that demonstrate this technology in use.

Many examples were found in our research of the Canadian government incorporating blockchain into specific projects. In a policy book published by the Mowat Centre for Policy Innovation at the University of Toronto, Urban and Pineda (2018, p. 6162) list many Canadian government agencies experimenting with blockchain, such as Innovation, Science and Economic Development Canada; the Treasury Board of Canada Secretariat; and the National Research Council Canada (NRCC). In January 2018, the Industrial Research Assistance Program in the NRCC used an Ethereum blockchain to proactively publish grants and contribution data in real-time (Industrial Research Assistance Program, 2019). This project was an experiment that ran for one year and concluded on March 1, 2019. While the experiment is not ongoing, this work has provided constructive insight into the potential for this technology and how it may be used for more open and transparent operations for public programs (National Research Council Canada, 2018).

Multiple levels of government have moved toward using blockchain for permits, including the Government of Ontario, the City of Toronto and the Government of British Columbia (Urban and Pineda, 2018, p.62). One article lists a variety of ways that governments are using blockchain, including for digital identity, the storing of judicial decisions, financing of school buildings and tracing money, marital status, e-voting, business licenses, passports, criminal records and even tax records (lnes, Ubacht, and Janssen, 2017, 357). The Government of Ontario also ran a blockchain hackathon that generated a number of ideas for other blockchain applications in government (Urban and Pineda, 2018, p.62). Supporting pilot projects that use blockchain is an effective way for the government to begin using these new technologies successfully (Urban and Pineda, 2018, p.67). Governments are using blockchain in many areas, and StatCan can use this knowledge and build upon their work in this project.

In addition to government agencies implementing blockchain and distributed ledger technology, health care is moving rapidly toward blockchain and digital health care records. Storing electronic health records on a blockchain is not only improving record keeping but also giving patients greater control over their own health and medical treatments (Urban and Pineda, 2018, p.42). Doctors, nurses, hospitals and other health care institutions are using blockchain to certify the health of patients (DeFilippi, 2018, p.112). It is being used to store encoded personal health records (Zheng, Zhu, and Si, 2019, p.17). The blockchain can provide access to specific individuals, so a persons health records can be secure and confidential when stored in a distributed ledger (Zheng, Zhu, and Si, 2019). Lemieux writes, the underlying conditions in Canada are particularly well-suited to leading blockchain research and implementation Canada has a vibrant, highly active blockchain technoscape, with a diversity of start-ups and consultancies doing innovative work (2016b, p.5). We are excited to add to this work in our project.

Multiple papers called on governments to move toward new technology to better secure their data. Urban and Pineda argue that blockchain can offer governments the possibility of improved transparency, efficiency, and effectiveness (2018, p.42). While blockchain is not a new technology, its use in government is relatively new, so the level of blockchain expertise and capacity within Canadian governments and regulators is currently limited (Urban and Pineda, 2018, p.61). They claim that one of the first things the Canadian government should do is what we are doing currently in this project: building up groups of technologists and policymakers within government who understand the technology, its implications, and the potential opportunities and challenges that flow from it (Urban and Pineda, 2018, p.61). While Urban and Pineda (2018) are pushing for more blockchain in government, lnes, Ubacht and Janssen emphasize that the government should shift from a technology-driven to need driven approach with blockchain applications (2017, p.355). They argue that blockchain will lead to innovation and transformation of governmental processes (lnes, Ubacht, and Janssen, 2017, p.355). Considering the ease with which digital files can be altered (Bell et al., 2019, p.6), we argue that this project is driven by a need for authentication on the StatCan website.

According to DeFilippi, governments have established and stewarded a variety of systems and institutions designed to enhance social welfare and provide the foundational infrastructure for economic and political growth throughout history (2018, p.107). In an article on cryptography and government, Aljeaid et al. argue that e-government acts as a communication bridge between government to citizen, or government to government, or government to business in efficient and reliable ways (2014, p.581). The authors emphasize the importance of data security in government related to potential vulnerability if left unsecured. They claim that end users need robust security solutions to achieve assurance when dealing with e-government systems (Aljeaid et al., 2014, p.581). Creating a tamper-resistant and resilient repository for public records (DeFilippi, 2018, p. 107108) using cryptography and blockchain can help the government avoid data leaks, data loss and other vulnerabilities. We agree with this call to action and believe that this project will improve public trust in StatCan and the Government of Canada.

While the call to action is significant, we also want to take the time to investigate any potential concerns regarding blockchain. We have summarized our findings into four categories: environmental impact, public image and potential backlash, a lack of regulation, and the potential to be blinded by the hype of blockchain technology.

There have been many claims about the environmental impact of new blockchain technology. In November 2021, a blockchain project called Solana contracted Robert Murphy, a climate and energy advisor, to publish an energy use report (Solana, 2021). They compared common activities that involve energy consumption with one Solana transaction, one Ethereum transaction and one Bitcoin transaction (Solana, 2021). While they did not include all of the blockchain options that we have chosen to investigate, it is helpful to consider how blockchain transactions compare with everyday activities. Conducting a single Google search uses 1,080 joules of energy, working on a computer with a monitor for an hour uses 46,800 joules, and using one gallon of gasoline uses 121,320,000 joules (Solana, 2021). By comparison, one Solana transaction uses 1,837 joules of energy, one Ethereum transaction uses 692,820,000 joules, and one Bitcoin transaction uses 6,995,592,000 joules (Solana, 2021). According to Huang, ONeill, and Tabuchi for The New York Times, the process of creating Bitcoin to spend or trade consumes around 91 terawatt-hours of electricity annually, more than is used by Finland, a nation of about 5.5million (2021). While we are not using Bitcoin for our project, these numbers are staggering.

Many of the big players in blockchain, including Ethereum, are using an astonishing amount of energy because of their proof-of-work (PoW) consensus mechanism. PoW requires network participants on the blockchain to expend large amounts of computational resources and energy on generating new valid blocks (Chandler, 2021). In comparison, proof of stake (PoS) requires network participants on the blockchain to stake cryptocurrency as collateral in favor of the new block they believe should be added to the chain (Chandler, 2021). Chandler argues that PoW, such as Ethereum, can be more secure and decentralized, but also uses an immense amount of electricity, is slower and is less scalable (Chandler, 2021). By contrast, PoS, such as Avalanche, Cardano and Solana, has a smaller environmental impact and allows for faster transactions and better scaleability, but it is a newer form of technology and may not be as secure or tamper-resistant as proof of work (Chandler, 2021). Evidently, both PoS and PoW have advantages and disadvantages, and we consider the specific environmental impact of five blockchains (Ethereum, Avalanche, Cardano, Hyperledger and Solana) in the chart below.

There have been multiple examples of companies and organizations that received backlash when attempting to use blockchain. In December 2021, Kickstarter announced that it was moving to blockchain (Plunkett, 2021). The blog post, titled Lets Build Whats Next for Crowdfunding Creative Projects, received many critiques and complaints from creators (Plunkett, 2021). Kickstarter responded by providing a frequently asked questions section, where it claims it is confident that a crowdfunding protocol built on top of Celo will not significantly negatively impact our carbon emissions given its underlying architecture (Kickstarter, 2022). Still, many creators and backers have claimed that they will no longer be using Kickstarter, given this information (Morse, 2021).

Similar to Kickstarter, the digital communication platform Discord tweeted about integrating Ethereum into its platform in November 2021 (Pearson, 2021). The founder and chief executive officer of Discord, Jason Citron, quickly backed off the project two days later, after public backlash (Pearson, 2021). Pearson states that people in the game industry hate blockchain either because of the environmental impact of proof-of-work tokens on Ethereum, the idea that blockchain collectibles are a grift based on mythical thinking, or both (2021). Many users unsubscribed from the platforms premium Nitro paid service or threatened to do so (Jiang, 2021). Given that both of these examples took place recently, in November and December 2021, it is difficult to consider what the public opinion might be regarding StatCan and this project. However, it is important to be aware of these examples and recognize that backlash is a potential outcome.

Another concern is the decentralized and unregulated nature of blockchain. Given that control and decision making about the blockchain is not conducted by a single entity, this is an area of concern for StatCan. Rather than putting trust in one entity, trust is put in mathematical algorithms. Given that there have been other blockchain projects by Canadian governments, they should be used as a guide for StatCan policies regarding this project. Between the five blockchains we look at below, each has different regulations, goals and abilities. It can also be difficult to scale, depending on the blockchain chosen. This may be a concern because it has not yet been decided how many StatCan products will be available for authentication. Since we looked at trust and confidentiality earlier in this literature review, the lack of regulation is less worrisome than the impact on the environment and public image. In fact, this project is an opportunity to be an early example and leader in blockchain implementation regulations, and we hope that we will be able to incorporate new policies into our project.

The overall hype of blockchain technology needs to be addressed. According to Victoria Lemieux, we need to address the shortcomings in designs and implementations of blockchain record keeping so as to be better able to realize the worthy vision of blockchains (Lemieux, 2019). She writes, claims associated with use of blockchain technology for recordkeeping are, in a number of cases, overhyped. As an example, blockchain solutions that claim to provide archival solutions do not actually preserve or provide for long-term accessibility of records (Lemieux, 2016b, p.4). She claims that the biggest danger in blockchain comes from blindly trusting it (2016b, p.23). However, critically investigating these limitations is the key to successfully leveraging technological innovations like the blockchain for the benefit of all Canadians (Lemieux, 2016b, p.8). While blockchain technology does not solve every problem that it has been claimed to, it is a useful technology that will continue to be used in industry and is deserving of further research and experimentation (Ruoti et al., 2020, p.53). While this relatively new technology is exciting, and considering risks can bring up fears of stifling innovation (Lemieux, 2016b, p.5), it is imperative that we are critical of the potential limitations and concerns about blockchain technology to have the best possible outcome in this project.

For this project, we chose to evaluate and compare five different blockchains, with specific considerations. We decided to look at Ethereum, Avalanche, Cardano, Hyperledger and Solana. Ethereum is one of the most popular blockchains, yet it conducts the fewest transactions per second and has significant energy consumption compared with other options because it uses proof of work (PoW). PoW means that a majority of users need to vote on each new blockchain, and this takes more time and effort than proof-of-stake (PoS) blockchains. We also included Avalanche and Cardano, which are both PoS public blockchains. While Avalanches environmental impact is carbon neutral, its transaction rate per second is the highest, compared with the other four blockchains we analyzed. Meanwhile, Cardano is less energy efficient and slower than Avalanche. We also chose to include Hyperledger, as it is a private blockchain that uses Practical Byzantine Fault Tolerance as its consensus mechanism. It is a private blockchain, which means that it is centralized. This potentially impacts trust, as fewer nodes can make the network less secure. Finally, we included Solana because it is carbon neutral, uses PoS and has provided a report on energy consumption in comparison with blockchains such as Ethereum. All of the blockchains outlined below have advantages and disadvantages. Upon reviewing them, we have decided to use Avalanche for this project. Avalanche is an open-source PoS blockchain with the highest transaction rate per second, at 4,500. Additionally, it is a public network that is carbon neutral, an important consideration for us.

Figure 1 displays an overview of five blockchains in a chart: Ethereum, Avalanche, Cardano, Hyperledger and Solana. In the chart, we provide general information about each blockchain, the transaction per second rate, the type of consensus mechanism that each blockchain uses, whether the blockchain is public or private, and the environmental impact of each blockchain. We also include a link to the website for each blockchain.

Our research team has designed a solution that incorporates blockchain technology using the knowledge gained from our literature review and pre-existing technical experience. This section outlines system details and the recommended solution for enabling users to authenticate documents downloaded from the StatCan website. We will begin by introducing three technical elements that are the pillars of our solution: digital signatures, hash functions and secure tunnels. These three technical elements interact as follows: a hash computed over the file that belongs to StatCan is used to make sure the file has not been tampered with; a digital signature over this hash proves that the file is owned by StatCan, and the secure tunnel ensures secure communication between the user and the StatCan website. In this section, we explain how these building blocks work and how they are integrated into our proposed solutions.

When users download a file from the StatCan website, there are two questions that they may have. First, do the data actually belong to StatCan? And second, have the data been tampered with?

To address this question, we propose using a digital signature. The idea is similar to signing a document with a penif you receive a signed letter or document from x, you can check whether the signature on the document belongs to x and consequently whether the document is theirs. In a digital signature scheme, a private-public key pair is used to sign a document and verify the signature over a documents hash. There are three steps to a digital signature scheme: StatCan needs to (1) generate the public-private key pair, so that (2) it can sign the hash of the document with its private key, and (3) any user with the public key can verify the signature.

Step1: Key generation.

Using a function that generates keys, StatCan can obtain a public-private key pair. The public key is shared on the website for users to download and use during the signature verification. StatCan would not share the private key, as it might lead to a malicious actor using the private key to forge StatCans signature on documents. It is important to note that key generation is a one-way function, which means that it is infeasible to compute the private key, given the public key. StatCan would use its private key to generate the signature over a documents hash rather than the document itself, as it is faster and more efficient, and the resulting signature is shorter. Consider the signature generation as a function that asks the user to provide their private key and hash of the document and generates a file that contains the signature.

Step2: Signing the hash of a document

To create the signature, StatCan needs its private key and the hash of the document. It is infeasible to compute a signature on the hash of a document if the private key is not known. The resulting signature is kept in a separate file. StatCan would upload the signature file and its public key on its website, so that users can download (1) the file they want to use, (2) the signature file created over the hash of that document and (3) StatCans public key. Consider the signature verification as a function that asks the user to provide the three files that they downloaded from the website.

Step3: Verifying a signature

Any user can verify the validity of the signature by providing (1) the file they want to check, (2) the signature file created over the hash of that document and (3) StatCans public key. If the signature is verified, the user can be sure that the file actually belongs to StatCan.

Public key infrastructure binds public keys with identities. This is done through a registration process where a certification authority (CA) issues certificates by signing StatCans public key. As a result, a CA verifies that the public key really belongs to StatCan. CAs are entities that issue certificates used to verify the ownership of a public key. Any user with access to the CAs public key can verify the certificate issued over StatCans public key. The certificates are valid for a specific amount of time.

Hash functions are used to create a unique fingerprint for the input message. This technology gives StatCan the ability to hash a document (such as a CSV file) and create a unique fingerprint of it in the form of a fixed-size hash. Once StatCan computes the hash of the file, it uploads it to the website. When users download a file, the document is hashed. The resulting hash is compared with the uploaded value to make sure that the file has not been tampered with. This part of the process is handled by the application itself. We will explain this in more detail in the proposed solutions.

To solve users concern about the authentication of their downloaded file, along with digital signatures, we must use hash functions in our solution. This is common practice in cryptography, as hash functions are known to be secure (Al-Kuwari, Davenport, and Bradford, 2011). They are used against malicious parties that may try to change data deliberately. Using hash functions fills a demand in our proposed system, because an attacker should not be able to create a file with a particular hash and replace it with a file from StatCan. For the hash functions to operate effectively, they require certain properties. For example, when two people hash the same document using the same hash function, they get the same hash value. The hash function produces the same output for a given input (which is also called pre-image); this means that hash functions are deterministic. Even if a single letter is added to a single cell in the document, the resulting hash will be different (see Figure2). The determinism property is relevant in the context of guessing the pre-image. Input to the hash function cannot be computed by just looking at the hash value. However, one can try to guess the pre-image, hash it and compare it with the hash value. Consider user authenticationpasswords are generally stored as hashes. If an attacker can access this database of hashes, they can pick a password (for example, one of the most commonly used passwords), hash it and compare it against the database to see whether there is a match.

Figure 2 is an illustration of how hashing works. The image shows a document with the word Hello, pointing toward a centre black box with the words hash function. On the right side of the image, there is a randomly generated list of numbers and letters. Below, there is a document with the word Hello! pointing toward the hash function black box. Because this document includes an exclamation mark, the hash output is distinct as well. When a document is hashed, a fixed-size output is created. Each distinct document has its own distinct output, even if only a single character is different.

Note: This image illustrates how hashing works. Document1 contains the word Hello, and the hash function creates Hash 1 over this document. The second document differs from Document1 by one character: Hello! The hash function creates Hash 2 over Document2. Hash 1 and Hash 2 have different values, as Document1 and Document2 are different. Hash 1 and Hash2 are the same size, as the hash function produces fixed-size outputs.

Most relevant to our project, it is imperative to note that we expect a hash function to have the collision resistance property, meaning that it is infeasible to find any two different messages that have the same hash. In other words, an adversary cannot find another CSV file with different content that has the same hash as the original document and cannot replace the original document with another one.

For the sake of a comprehensive understanding, we must also mention the other two properties that a hash function should have. To ensure clarity, note that a message to be hashed is known as the pre-image, and the resulting hash is known as an image. Pre-image resistance implies that given the hash of a message, it is infeasible to find a corresponding message. Weak collision resistance states that given a message, it is infeasible to find another message with the same hash. As previously mentioned, the hash function is also needed for the signing operation. StatCan signs the hash of the document, rather than the document itself, to have a shorter signature. This increases efficiency, as signing the hash is much faster. Since the hash is used in the signature function, we need the collision resistance property.

There are well-known hash functions, such as MD5, SHA1, SHA2 and SHA3. However, not all are secure. MD5 and SHA1 are proven to be insecure, as they do not have the collision resistance property. While it takes longer to attack SHA1 than MD5, both are currently considered weak. Hash functions can break over time, but they get replaced with secure ones. For now, we know that SHA2 and SHA3 are secure (National Institute of Standards and Technology, 2015). As SHA3 is more secure than SHA2, we propose using SHA3 in our solution.

The proposed solutions require a secure tunnel between the user and the StatCan website for communication. In both the offline and hybrid solutions found below, the user has to download an application from the StatCan website. The user has to make sure they get the actual application, and a secure tunnel is needed between the user and StatCan for that purpose. Also, in the online solution, the user communicates with the StatCan website using the secure tunnel. Https provides a secure tunnel, meaning that if an attacker observes the traffic in the tunnel, they will not know the content of the message being transmitted. All an attacker can observe is that there is traffic between two parties.

The secure tunnel provides

There are three potential solutions that could be implemented using the previously mentioned technology to resolve user needs to authenticate a StatCan document. Offline and hybrid solutions require the creation of an application that is downloaded by the user. In these solutions, the user interacts with the application to check the validity of a document.

Figure 3 is a detailed image of our offline solution. It displays the setup of the solution, which includes how Statistics Canada will hard-code the keys into the application, and an illustration of the secure tunnel between Statistics Canada and the application. The figure continues onto the next page and displays how the solution is used. This section involves a user uploading a .csv file to the application, the application computing the hash, the user providing the signature file to the application and the application checking whether the signature is verified over the hash.

In this solution, the user downloads an application from the StatCan website through the secure tunnel. This enables the user to ensure that the application they download belongs to StatCan. The application checks the validity of the users document. The user takes the CSV file and signature file they downloaded from the website together, then drags and drops the CSV file into the app. The app computes the hash over the file, then prompts the user to provide the corresponding signature file computed over the hash of the CSV file. The application checks whether the signature is verified over the hash. To do so, the StatCan keys must be hard-coded into the app (setup phase in Figure3). The key is needed to verify the signature over a file.

Figure 4 is a detailed illustration of our online solution. In this image, the setup involves the list of hashes on the Statistics Canada server and a secure tunnel between the Statistics Canada website and the user. Then, the figure displays the use of the online solution, which involves the user dragging and dropping a file they want to check into the Statistics Canada website through the secure tunnel. Next, the website computes the hash client-side over the file. Then, the website compares the hash with the list of hashes, and finally, the application prompts the user whether the file is valid.

In this solution, StatCan maintains a page on its website for the user to check document validity. The user communicates with the StatCan website using the secure tunnel, and they drag and drop a file that they want to check. Since the website knows the list of hashes of all files, it can compute the hash client side over the file provided by the user and compare it with the list; StatCan maintains a server where the list of hashes is kept. The user then learns whether the file they uploaded is valid. If valid, the file has not been tampered with and belongs to StatCan. Compared with the offline solution, this approach offers a more straightforward experience for the user, as they only have to provide the products file. However, this solution requires the user to be online, unlike the previous application that runs offline.

Figure 5 is a detailed illustration of the hybrid solution. In this image, the setup is more complex. Statistics Canada adds file hashes to the Statistics Canada server, which then get pushed to the website and application through a secure tunnel. The Statistics Canada server updates the list of hashes every three days. There is an illustration below of how the hybrid solution is used. It shows how the user uploads the .csv file to the application, how the application computes the hash, then how the application compares the hash against the updated list of hashes, and finally how the application prompts the user whether the file is valid.

In the hybrid solution, the user must download an application (similar to the offline solution) over the secure tunnel. The app has a list of hashes of files that belong to StatCan. To authenticate the document, the user uploads the file to the app, which computes the hash and compares it with the list. Then, the app informs the user whether the file is valid. The app occasionally connects to the StatCan website to update the list of hashes; StatCan maintains a server where the list of hashes is kept. While we suggest that the app connect every three days, the duration can be greater or shorter, depending on how frequently StatCan shares files. Every three days, the app receives the updated list of hashes that is kept on the server to have the most recent list. A signature over a hash proves ownership. Receiving the list of hashes over the secure connection means that StatCan is the owner of the hashes. This solution eliminates the step of providing the signature file, if the hash of the file that the user offers appears in the list of hashes. If the hash is not in the list, the app prompts the user to provide the signature file over the hash, so the app can compute the hash and verify the signature over the file. This situation might occur if a user tries to authenticate a file before the app has the opportunity to connect to the StatCan website and update the list of hashes.

Figure 6 is a detailed illustration of our recommended solution, which is the hybrid solution with the addition of blockchain. For the setup, Statistics Canada adds the hash of the file to the Statistics Canada server, and it is logged on the blockchain. This, in turn, gets pushed to the Statistics Canada website and then through a secure tunnel to the application. The list of hashes is updated every three days in the application. In the illustration of how the hybrid solution is used, the user uploads the .csv file to the application, the application computes the hash, then the application compares the hash against the updated list of hashes, and finally, the application prompts the user whether the file is valid. The image of the users experience is the same as Figure 5. It shows how the user uploads the .csv file to the application, how the application computes the hash, then how the application compares the hash against the updated list of hashes, and finally, how the application prompts the user whether the file is valid.

All three solutions offer users the opportunity to authenticate data from the StatCan website. However, they do not all equally meet the standards we set in our objectives for the project. While the offline solution meets our objective of allowing users across the digital divide to authenticate data, it requires the user to submit the corresponding signature file to the app. With regard to the online solution, the user only needs to provide the CSV file, minimizing the number of downloads for the user. Therefore, the online solution offers better usability compared with the offline solution. However, the online solution does not meet the requirement to provide an accessible method of authentication, regardless of the users access to the Internet.

For these reasons, we have decided that the hybrid solution is ideal because it provides a usability level comparable to the online solution and does not require the user to be online to check the file they have. This solution addresses the barriers discussed above regarding consistent access to the Internet. Adding blockchain to the hybrid solution provides improvements; it affects a subcomponent of the proposed solutionthe way the hash of a file is stored. StatCan creates the hash of a file and logs this hash on the ledger. When compared with Figure5, the hashes are logged on the blockchain, and the app receives the updated list of hashes from it. The added element of blockchain increases trust between StatCan and the public: StatCan cannot change the data once it is posted. If StatCan changes the data, a history of that change is recorded. Another benefit of including blockchain is that hashes can still be reached if the StatCan website is down, as they are recorded on the blockchain. Blockchain also offers better archival properties, as it ensures that the recorded data are reachable over a longer period than if the data are stored on a server. The server may go down or may not be continuously maintained, making the data unreachable. Blockchain provides provenance over the data (hash of the file) for a long time, but does not actually archive files. A possible drawback of incorporating blockchain into the hybrid solution is that if the ledger nodes manipulate the list of hashes, StatCan cannot do anything about ita global network has control over the data. Ledger nodes are the entities in this network that accept or reject a block of transactions based on their validity; they broadcast these transactions so all of the nodes stay up to date. However, in the hybrid solution without blockchain, StatCan maintains exclusive control.

Al-Kuwari, S., Davenport, J. H., and Bradford, R. J. (2011). Cryptographic Hash Functions: Recent Design Trends and Security Notions. Short Paper Proceedings of Inscrypt 10, 137. Retrieved 2022, from https://eprint.iacr.org/2011/565.pdf.

Aljeaid, D., Ma, X., and Langensiepen, C. (2014). Biometric identity-based cryptography for e-Government environment. Proceedings of 2014 Science and Information Conference, SAI 2014. 581-588. https://doi.org/10.1109/SAI.2014.6918245.

Batista, D., Kim, H., Lemieux, V.L., Stancic, H., and Unnithan, C. (2021). Block and provenance: How a technical system for tracing origins, ownership and authenticity can transform social trust. In V. Lemieux and C. Feng (eds.) Building decentralized trust: Multidisciplinary perspectives on the design of blockchains and distributed ledgers (First ed., pp. 111128). Springer. https://doi.org/10.1007/978-3-030-54414-0.

Bell, M., Green, A., Sheridan, J., Collomosse, J., Cooper, D., Bui, T., Thereaux, O., & Higgins, J. (2019). Underscoring archival authenticity with blockchain technology. Insights: The UKSG Journal, 32. https://link.gale.com/apps/doc/A594619025/AONE?u=anon~eafb9693&sid=googleScholar&xid=e1544e71

Canadas Public Policy Forum. (2014). Northern Connections: Broadband and Canadas Digital Divide. Public Policy Forum: Reports. Retrieved January 27, 2022, from https://ucarecdn.com/68b98fff-32c9-4904-904c-09b1d98cdd2e/

Chandler, S. (2021, December 22). Proof of stake vs. proof of work: Key differences between these methods of verifying cryptocurrency transactions. Business Insider. https://www.businessinsider.com/personal-finance/proof-of-stake-vs-proof-of-work

Chowdhury, N. (2019). Inside blockchain, Bitcoin, and cryptocurrencies. Auerbach.

Communications Security Establishment Canada. (2021, December 6). Ministers urge Canadian organizations to take action against Ransomware. Canada.ca. Retrieved January 26, 2022, https://www.canada.ca/en/communications-security/news/2021/12/ministers-urge-canadian-organizations-to-take-action-against-ransomware.html

Computer Security Resource Center. (n.d.a). Certification authority. In Computer Security Resource Center: Glossary. Retrieved from, https://csrc.nist.gov/glossary/term/certification_authority

Computer Security Resource Center. (n.d.b). Collision. In Computer Security Resource Center: Glossary. Retrieved from, https://csrc.nist.gov/glossary/term/collision

Computer Security Resource Center. (n.d.c). Collision resistance. In Computer Security Resource Center: Glossary. Retrieved from, https://csrc.nist.gov/glossary/term/collision_resistance

Computer Security Resource Center. (n.d.d). Key generation. In Computer Security Resource Center: Glossary. Retrieved from, https://csrc.nist.gov/glossary/term/key_generation

Computer Security Resource Center. (n.d.e). Message digest. In Computer Security Resource Center: Glossary. Retrieved from, https://csrc.nist.gov/glossary/term/message_digest

Computer Security Resource Center. (n.d.f). Node. In Computer Security Resource Center: Glossary. Retrieved from, https://csrc.nist.gov/glossary/term/node

Computer Security Resource Center. (n.d.g). Preimage. In Computer Security Resource Center: Glossary. Retrieved from, https://csrc.nist.gov/glossary/term/preimage

Computer Security Resource Center. (n.d.h). Preimage resistance. In Computer Security Resource Center: Glossary. Retrieved from, https://csrc.nist.gov/glossary/term/preimage_resistance

Computer Security Resource Center. (n.d.i). Public key infrastructure (PKI). In Computer Security Resource Center: Glossary. Retrieved from, https://csrc.nist.gov/glossary/term/public_key_infrastructure.

De Filippi, P. D. F. (2018). Blockchain and the law: The rule of code. Harvard University Press. https://doi.org/10.4159/9780674985933

Hirose, S. (2004). Yet another definition of weak collision resistance and its analysis. In Lim JI., Lee DH. (eds) Information Security and Cryptology - ICISC2003. ICISC2003. Lecture Notes in Computer Science, vol.2971. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-24691-6_8

Huang, J., ONeill, C., and Tabuchi, H. (2021, September 3). Bitcoin uses more electricity than many countries. How is that possible? The New York Times. https://www.nytimes.com/interactive/2021/09/03/climate/bitcoin-carbon-footprint-electricity.html

Industrial Research Assistance Program. (2019). Blockchain publishing prototype. National Research Council of Canada. Government of Canada. https://nrc-cnrc.explorecatena.com/en

Ipsos Public Affairs for Canadas Centre for International Governance Innovation. (2019). Global Survey Internet Security & Trust. CIGI-Ipsos Global Survey Internet Security Trust Part I & II: Internet security, online privacy & trust. Retrieved from, https://www.cigionline.org/sites/default/files/documents/2019%20CIGI-Ipsos%20Global%20Survey%20-%20Part%201%20%26%202%20Internet%20Security%2C%20Online%20Privacy%20%26%20Trust.pdf

Jiang, S. (2021, November 9). Discords hints about crypto, NFTs are tearing its community apart. Kotaku. https://kotaku.com/discords-hints-about-crypto-nfts-are-tearing-its-commu-1848023955

Katz, A., & Dash, S. (n.d.). Error correcting codes. Brilliant Math & Science Wiki. Retrieved January 27, 2022, from https://brilliant.org/wiki/error-correcting-codes/

Read more here:
Investigating the Use of Blockchain to Authenticate Data from the Statistics Canada Website - Statistique Canada

6 Technological Innovations in the New York Sports Betting Industry – Qrius

As you know, New York has been among the top states in the United States to make it to the peak of gambling. To blend it with digitization and modernity, online gambling has incorporated multiple technological benefits to make their way stronger for the future.

The sports betting industry has evolved over the last decade, and this transformation knows no boundaries. Gambling operations over the digitized platform need a convergence of technology, website security, player privacy, convenient payment options, etc. The emerging New York sports betting apps have promised to cover all these needs and bring more to the gamblers. Looking ahead to the industry, these apps will become the sectors future, and the continued innovations are bound to elevate the domain further and make the experience even more seamless. Read along to know more about some of these technological advancements simultaneously revolutionizing the entire industry.

It is essential to understand the imagination of players and bring them to reality. Computer-generated reality does precisely the same. It empowers online sports betting websites to catch gamblers thought processes or originality. They tend to understand these players challenges and eliminate them while hosting an online event.

Considering virtual reality, one can watch multiple games with VR headsets and dive deep into the three-dimensional approach of the event. One can wager as well as enjoy the computer-generated events happening around the globe. The innovation has allowed bookmakers to captivate the players with hundreds of opportunities. These games are the best for players asking for something more than random stuff.

Blockchain technology has been a massive change for the world, and the gambling industry has significantly impacted its operations. When cryptocurrency took charge over the online betting market, people started feeling relaxed about their modes of payment. By the time cryptography started making establishments worldwide, the gambling sector had already fostered them.

Not only gambling, but numerous organizations are also engaging their work culture with cryptos and crypto payments to make transactions safe and secure. Safety in payments is one of the significant lookouts of any person scrolling through the internet. This is why betting operators have shifted to cryptographic forms to make deposits and withdrawals easy for bettors.

The creation of virtual reality and live streaming services is one of the achievements of online sports betting operators. It is a valuable asset to keep bettors loyal and engaged to the operator. And this means no harm to them as it brings out several options for them to explore.

Having an opportunity to watch the sports event or the match live and perhaps wager on it through the app itself is exciting. Live streaming has paved the way for endless opportunities. These options are increasingly valuable for players wishing to invest in live in-play betting markets.

One of the biggest reasons to think twice before making online transactions is to doubt the payment method or the provider. However, gambling operators worldwide use encryptions to protect the players financial information. Also, these encryptions make it easy for the players and the operator to encode and decode. All betting apps these days are encrypted, making it impossible for hackers to steal any information from an individuals account. Companies sometimes use systems to make a trade over your data. This stores a users unique information in their memory. Try to be smart when you make payments and check for encryptions.

VR is no more a new thing to this world. VR lets you explore your imaginative ends quickly and conveniently in the comfort of your homes when out of reality. All you need to gather is a VR headset, a glass, and perhaps a set of gloves. VR takes you to a different zone, immersive a realistic, three-dimensional experience associated with gaming. It acts as a catalyst for the entire gambling industry as gamers enjoy the real-life experience by not taking the pain of traveling to traditional gambling platforms. VR has gathered a total number of audiences over the last decade.

You already know VR and how it functions. The metaverse is another relevant thing to consider when it comes to technology. It is the future iteration of technology or the internet. Online gambling is expected to live within this metaverse in the future.

Virtual realities and physical changes will be blended to provide gamers with new experiences. This will allow a considerable number of players to interact with each other virtually on global terms. Payments would be conducted seamlessly and securely. Metaverse would allow an expansion of the entire gambling sphere. It brings a common currency within the space, eliminating translational complexity among the players.

Online sports betting has significantly evolved due to technological advancements in New York and worldwide. Gamblers these days are no more interested in traveling to traditional platforms. They take an interest in wagering online with the comfort of emerging betting apps and improvements in technology. However, to make the best use of these apps, one must be aware of the evolving technology.

Stay updated with all the insights.Navigate news, 1 email day.Subscribe to Qrius

View post:
6 Technological Innovations in the New York Sports Betting Industry - Qrius

Excessive Secrecy and the Deep State: Is there Cause for Concern? – LA Progressive

Whatever your feelings about former President Trump, there are reasons to be skeptical when government officials say it was necessary to raid his Florida home to recover classified documents that threatened national security.

Like the former president, I was once accused by the government of mishandling classified information connected to my representation of a detainee at Guantanamo Bay. There was nothing in my clients file that posed any danger to national security. My client was an innocent shopkeeper who was sold to the Americans back in 2003 when the U.S. was paying bounties to corrupt Afghan warlords to turn in Al Qaeda or Taliban fighters, and then shipping those men 8,000 miles to our newly built prison camp in Cuba. The government decided to classify every document in the detainee files as secret, not to protect national security, but so it could lie with impunity and tell the American people that the prisoners at Gitmo were the worst of the worst, and terrorists captured on the battlefield.

I never revealed any classified information. I got into trouble after writing an article criticizing the governments practice of classifying certain evidence above the security clearance level of the detainees lawyer, making it impossible to challenge. Following a hearing at the Department of Justice, I was allowed to keep my security clearance long enough to see my client released back to his home and his family after 12 years of unjust imprisonment.

I was never in serious legal jeopardy. But the experience opened my eyes to the ways that our government abuses its power to classify information as secret to protect its own officials from embarrassment or criminal exposure. Since 9/11, the people most aggressively pursued for mishandling classified materials are whistleblowers, not traitors.

Chelsea Manning and Julian Assange revealed official crimes such as the murder of unarmed Iraqi civilians and journalists. Daniel Hale revealed that our drone assassination program regularly slaughters innocent civilians, contrary to public statements about surgical strikes. John Kiriakou revealed inconvenient facts about our torture program. Edward Snowden revealed an illegal mass surveillance program. All these truth-tellers were aggressively pursued under the Espionage Act. Assange may die in prison for telling the truth about the crimes of our leaders.

While Trump may not fit the mold of a selfless whistleblower, there is still cause for concern. First, the official justifications for the raid on Mar-a-Lago are highly suspect. Initially we were told that Trump possessed classified documents relating to nuclear weapons that he might sell to a foreign government like Saudi Arabia. This shocking accusation has been quietly dropped. Now we are told that the government has grave concern that Trump might blow the cover on clandestine human sources described in the mainstream media as the lifeblood of our intelligence community. Disclosure could jeopardize the life of the human source, a former legal adviser to the National Security Council told the New York Times.

This second justificationto protect sourcesis also dubious. The DOJ has been in negotiation with Trumps lawyers since he left the oval office with his boxes of documents. If the government was just concerned about protecting its informants, a deal could have easily been struck wherein government lawyers would go to Mar-a-Lago and redact the lines in the documents that identify informants without the need for a full-blown raid.

The sudden concern in the mainstream media about protecting informants in order to take down Trump is short-sighted. The U.S. has a long and sordid history of using corrupt, lying informants to launch disastrous policies like the Iraq War. In 2002-03, we were told by Bush, Cheney, Rumsfeld, and Powell that the government had solid intelligence that the Iraqi regime possessed mobile production facilities for biological and chemical weapons. Had ordinary Americans then had access to the intelligence reportsleaked years later, after the disastrous war was in full flightwe would have learned that the solid intelligence about mobile weapons labs came from a single informant named Curveball, who had been described by his handlers as crazy and probably a fabricator and his intelligence as highly suspect. Had some brave patriot leaked these reports in real time, millions more Americans would have taken to the streets in 2002 to stop the planned invasion of Iraq.

The media should be demanding more information from our government, especially about its use of informants, and not more secrecy. It is a basic rule of journalism that governments lie, and they often bribe (and sometimes torture) informants to support those lies.

Many innocent men, including my client, were sent to Guantanamo Bay on the word of informants who were bribed with large cash rewards. If these informants are the lifeblood of our intelligence service, then that service should be defunded.

A more plausible explanation for the Mar-a-Lago raid was provided by two high-level U.S. intelligence officials who told Newsweeks William M. Arkin that the true target of the raid was a personal stash of hidden documents that Justice Department officials feared Donald Trump might weaponize. This stash reportedly included material that Trump thought would exonerate him of any claims of Russian collusion in 2016 or any other election-related charges. Trump was particularly interested in matters related to the Russia hoax and the wrong-doings of the deep state, one former Trump official told Newsweek.

This explanation is corroborated by former senior director for counterterrorism Kash Patel, who prepared a key House report that revealed significant intelligence tradecraft failings in connection with the Intelligence Communitys Assessment on Russian interference. But the CIA has blocked the release of Patels report by classifying it as secret.

Kash Patel, who is a current board member of Trump Media and Technology Group (TMTG), began his career in government under President Obama as a national security prosecutor and later held several positions in the Trump administration. In April 2017, he was picked to lead a team of investigators for the House Intelligence Committee, chaired by Republican Devin Nunes (now CEO of TMTG), and tasked with evaluating the Intelligence Community Assessment (ICA) on Russian interference. Although the media touted the ICA as the consensus view of all 17 U.S. intelligence agencies, it was in fact a rushed job completed in the final days of the Obama administration by a small group of CIA analysts led by then-CIA Director John Brennan.

Scroll to Continue

Patels team obtained and reviewed the key documents underlying the ICAs conclusions, and interviewed around 70 witnesses under oath. His demands that intelligence agencies produce relevant documents caused a stir among deep state officials unaccustomed to being called to account for their actions. As the Washington Post reported, Democrats criticized the unusual direct requests to the agencies by Patels team of investigators. Patel, a former public defender, apparently believed that even the intelligence community should be subject to the rule of law.

In March 2018, Patels team produced a report that found serious flaws in the CIAs Russia investigation and called into question the intelligence communitys key claims that Russia ordered a cyber-hacking and interference campaign to help Trump. The CIAs response to Patels report was to classify it as secret and block its release.

During the next three years, Patel and others, including then-President Trump and Director of National Intelligence John Ratcliffe, pushed for declassification of Patels report on the ICA. But the heads of the intelligence agencies continued to obstruct, claiming that releasing the report would compromise intelligence sources and methods and cause harm to national security, including specific harm to the military. Trump eventually backed down.

Then in December 2020, according to the Post, Trump tried to fire Gina Haspel as CIA director for resisting efforts by Trump and Patel to declassify Patels report. But once again, Trump backed down and the document still remains under lock and key. Not surprisingly, in its article about Patels battle with the intelligence community, the Washington Post sides with the CIA, describing CIA Director Haspel and her colleagues, who demanded that Patels report criticizing their work be kept secret, as courageous officials who sought to protect the government.

Patel has publicly voiced his frustration with the CIA for blocking release of his report on the ICA. I think there were people within the IC [Intelligence Community], at the heads of certain intelligence agencies, who did not want their tradecraft called out, even though it was during a former administration, because it doesnt look good on the agency itself, Patel said in an interview. Patel also said he has been threatened with criminal prosecution just for talking to the media about his classified report. The power of government officials to say, we have classified your report and if you even talk about it to the media we might put you in jail, is the power of a despot.

In an interview with the Grayzones Aaron Mat, Patel disputed the claim that releasing his report harms national security, noting that his committee released similar reports of its other investigations and we didnt lose a single source, we didnt lose a single relationship, and no one died by the public disclosures we made, because we did it in a systematic and professional fashion.

For example, in January 2018, Patel authored a report that showed serious abuses by the FBI in the Carter Page investigation, which caused a former FBI lawyer to plead guilty to falsifying information that was used to apply for warrants from the Foreign Intelligence Surveillance Court. This report criticizing the FBI was released to the public, suggesting that it is still permissible to criticize the FBI, but not the CIA.

Patels public statements suggest his agreement with Newsweeks report that the true motivation for the FBI raid on Mar-a-Lago was seizing documents relating to the Russia investigation that Trump took with him when he left the White House. In a recent interview with Real Clear Politics, Patel noted that the same corrupt FBI government gangsters, the same agents that were involved in Russiagate, the same counterintelligence agents that were involved in making the bad false call on Hunter Bidens laptop, are also involved in the raid on President Trumps home, with the intent to make sure the American public never gets the full story on Russiagate.

The saga of the Mar-a-Lago raid sheds some light on the important question of who really controls what we are permitted to see about the inner workings of our own government. While the sitting president may in theory have unilateral authority to declassify and release information to the American people, the deep state bureaucracy still holds the power to obstruct the president. As one former bureaucrat told CNN, the process for declassification must include signoff from the agency that classified the information in the first place in order to protect the intelligence-gathering process, its sources and methods.

Whatever one thinks of Trump, is it really in the public interest to have a deep state controlling what information gets out to the public? In 1953, the CIA directed a military coup that overthrew democratically elected Iranian leader Mohammad Mosaddegh, and in 1973, the CIA helped overthrow democratically elected Chilean leader Salvador Allende. These leaders were targeted not because they were unfriendly to the American people but because they were unfriendly to international oil and copper interests that wanted to exploit those countries resources. And while the people of Iran and Chile knew in real time who was responsible, the American people were kept in the dark for decades until key historical documents were finally declassified.

Many scholars believe the CIA was complicit in the assassination of President John F. Kennedy. Yet 60 years later, thousands of key documents remain redacted or under seal. President Trump came to office promising to release those records, as required by the JFK Records Act. But deep state bureaucrats opposed the release, claiming it would cause potentially irreversible harm to our Nations security. Trump backed down, quite possibly recalling the fate of the last president to go to war with the CIA.

Its not necessary to side with Trump to oppose excessive secrecy. Its our government. We have a right to see whatever secrets Trump had hidden in his basement. And if government bureaucrats are truly concerned that one of their informants might be outed, they can redact those few lines from the reports. But show us the rest.

Independent Media Institute

This article originally appeared on ScheerPost and is distributed in partnership with Economy for All, a project of the Independent Media Institute.

See the original post here:
Excessive Secrecy and the Deep State: Is there Cause for Concern? - LA Progressive

Salman Rushdie and the Neoliberal Culture Wars – Boston Review

The brutal attack on novelist Salman Rushdie at a public lecture in Chautauqua, New York, last month has prompted a flood of revealing responses from liberals in the West. In the New Yorker, Adam Gopnik decried the enduring terrorist threat to liberal civilization in rhetoric that might well have been issued by the administration of George W. Bush. (Even law enforcement has declined to link the assault to terrorism.) Meanwhile, Graeme Wood, writing in the Atlantic, likens criticism of texts to complicity in assassination, while Bernard-Henri Lvys predictable diatribe against fanaticism calls for a campaign to ensure that Rushdie wins this years Nobel Prize in Literaturea cause New Yorker editor David Remnick has now joined, too. If it shocks us that the novelist was attacked after so long, it should also shock us that this commentary looks much the same as it did when his life was first threatened more than thirty years ago.

The defining feature of liberal exasperation over free speech is a dogmatic repudiation of history.

The defining feature of this genre of liberal exasperation is a dogmatic repudiation of history. In place of careful analysis of particular (and therefore changing) circumstances, it relies on stereotype and anecdote to depict a metaphysical conflict between religious fanaticism and liberal toleranceone that is always and everywhere the same.

The erasure of context is striking. You will search these pieces in vain for any distinction between the original protests following the September 1988 publication of The Satanic Verses and Ayatollah Khomeinis call for Rushdies death months later, in February 1989. The effect is to obscure perhaps the central historical question: how, exactly, the publication of Rushdies novel became a global geopolitical phenomenon that resulted in the threat to his life.

You will also search in vain for even the most basic awareness of Muslim legal history and culture, passing familiarity with which cant help but revise ones understanding of the Rushdie affair. It is no surprise that these commentators persist in using the wrong terminology by calling Khomeinis pronouncement a fatwa; as the Washington Post explained two and a half decades ago, it was in fact a hukm. (A fatwa is issued by a religious authority in response to a hypothetical question and possesses no legal force, while a hukm, or decree by the head of state, represents the intervention of a government.) It was the Western press, not Iran, that insisted on calling the declaration of fatwaa tellingly ignorant but typical conflation of politics and religion (and exactly what liberals accuse Muslim fanatics of doing).

Nor does the liberal conceit of an unchanging battle between fanaticism and tolerance illuminate the specific Muslim arguments against Rushdie, which were more about secular hurt than sin. Rushdies American attacker, born in California and living in New Jersey, undoubtedly believed he was defending Islam, but his motivations share a great deal with his countrys more familiar culture of violence. By all accounts he was fixated by a marginal cause, one that has been of no interest to recent Sunni militancy and is not a live issue in Shia Iran, either. Apart from some official glee in Tehran and some scattered support on social media, the attack was more or less ignored by Muslims globally. In short, Rushdie was correct in thinking there was no longer a systematic threat against him.

Perhaps the most glaring context omitted from these accounts, given their banal propagandizing on behalf of free speech, are the threats to free expression with which this anti-Islamic rhetoric is linkedfrom the radical diminution of the civil liberties of all Americans (to say nothing of the human rights of non-Americans) in the Wests post9/11 security states, carried out in the name of the War on Terror, to the U.S. governments hunting down of Julian Assange, Edward Snowden, and Chelsea Manning. These responses to the challenge of global Islam, inaugurated by the Rushdie affair at the end of the Cold War, represent threats to freedom wider and more profound than the easy contrast between fanaticism and tolerance can explain.

The first thing to note about the Rushdie affair is that it had little to do with theology. While Islamic tradition does proscribe abusing sacred figures, its terms and debates have rarely featured in the controversy or since. Occurring initially among Muslims of South Asian descent in Britain, and then moving back to India and Pakistan, the first protests against The Satanic Verses deployed a nineteenth-century colonial vocabulary that had been enshrined in the Indian Penal Code of 1860. Itself a secular document meant to allow the British to govern a religiously diverse society, the code disavowed blasphemy and penalized hurting religious sentiments instead. It was this specifically South Asian terminology about the hurt sentiments of believers in all religions, not the true faith of one, that was globalized in the Rushdie affair.

Muslim protests and violence over insults to Muhammad first emerged in colonial India during the middle of the nineteenth century. They had to do with the creation of a market in publishing through mass circulation by way of the printing press. Rather than any traditional dispute between theologians, in other words, press stories about Muhammad not only lacked theological import but were addressed to an anonymous public. They were justified on the grounds of free speech, itself modeled on free trade in proposing the market as a site at which true value, whether economic or religious, emerged through the impersonal operation of an invisible handthat is, through the marketplace of ideas. Given the unavailability of political freedoms in colonial societies, Muslim protesters took the market as their arena of operations. Accepting its non-religious character, they invoked a protectionist argument, asking for their hurt sentiments to be recognized in the same way as libel and defamation laws did for other kinds of offensive speech under British law.

The first thing to note about the Rushdie affair is that it had little to do with theology.

The only theological category in these debates was the idea of an invisible hand. The title of Rushdies novel refers to a contested incident from the life of Muhammad, when he briefly agreed to compromise with his polytheist rivals by agreeing to accept their goddesses as intercessors with God. Soon, however, he declared the verses recognizing them in the Quran as a satanic interpolation. Whether Satan could interrupt God is a real theological question, and Rushdie made brilliant use of this anecdote to reflect upon the meaning of literary creation and authorship. Tellingly, however, complaints against Rushdie never focused on this theological reference. His Muslim critics were only interested in a dream sequence where the women in a house of prostitution were given the names of the Prophets wives.

Why did theological debate suddenly give way in the nineteenth century to a focus on Muhammad as amenable to insult and offense?

Islams modernization in colonial times meant its rationalization, which involved stripping the Prophet of many superhuman traits to make him a perfect, though fully mortal, figure. Muhammad came to be seen as a model father, husband, and statesman, allowing his followers to identify with him. While God, who retained his transcendence, could neither be identified with nor insulted, the all-too human prophet had become vulnerable to any perceived abuse. Correspondingly, Muslims could take offense. This was an issue in which theology could only play an indirect role, chiefly by way of Christianity in using the term blasphemy. We should recall that one of the demands of British Muslim protesters in 1988 was that their sanctities be included in the UKs since rescinded blasphemy laws that had hitherto protected only the Church of England.

The Muslim protesters, then and now, offer no alternatives to liberalism but ask only for what they see as inclusion into it. Such demands take the form of protectionist measures in the marketplace of ideas modeled on libel and defamation law or invoking Christian notions of blasphemy. It is liberalisms hypocrisy and betrayal at failing to accommodate them, not liberalism as such, that fuels their rage which in addition is meant to exemplify the violent consequences of an unregulated market. The loss of self-control that that is said to define Muslim rage, in other words, mirrors the lack of control in the marketplace of ideas. This is hardly the great metaphysical battle between fanaticism and tolerance that commentators have conjured since 1989, and it must be understood as a conflict within liberalism itself. In the absence of a theological register, the violence of Muhammads defenders might even be described as a failure of language itself. Only very recently in Pakistan has this liberal vocabulary been supplemented by Islamic theological categories like apostasy and martyrdom to justify violence against those allegedly insulting Muhammada result of competition between rival Muslim groups to take control of the market in which the Prophet has become a commodity.

Rushdie and his novel became incidental to Muslim debate after Khomeini stepped into the controversy and made it a geopolitical issue in February 1989. The year is significant. The Rushdie affair emerged at the end of the Cold War and the dismantling of the grand narrative of bipolar conflict. Issues of culture and identity came to the fore in new forms of nationalism and religion and in renewed political and cultural contests around race, gender, and sexuality. The globalization of protests about Muhammad, in other words, unfolded against the backdrop of Americas emerging culture wars in the late 1980s as well as the return of the antagonisms so clearly articulated in Samuel Huntingtons influential 1993 essay, The Clash of Civilizations, which later became a best-selling book.

Leaving behind the state-centered parties and ideologies of the Cold War for a politics in and of the social, the culture wars became premised upon the neoliberal erasure of any distinction between state and society. Submitting both domains to the logic of the market had the effect of dispersing conflict among individuals and groups. In one case, an impossible theology gave rise to violence, and in another an impossible politics produced new forms of social discipline outside the state. The cult of offense that writers like Wood rail against is not a symptom of any particular political orientation, left or right. It is the product of neoliberalism.

The Rushdie affair thus signaled the coming together of a post-colonial narrative with a neoliberal one, both dominated by the focus on marketized social relations and hurt sentiments. In a bitter irony, Rushdies attempt to give voice to immigrant lives and experience in The Satanic Verses was fulfilled by protests against it in Britain that for the first time gave Muslims a public platform. It marked a shift from race and nationality to religion as defining immigrant identity.

Khomeini dispensed with these culture wars and made the Rushdie affair into a political issue for the first time. He seems to have been aiming to consolidate his authority among Sunni Muslims in the aftermath of the Iran-Iraq war by defending the Prophet, who for the Shia plays the secondary role of announcing the Imam Ali. The Ayatollah had earlier dismissed Muslim complaints against Rushdie as a distraction, only to change his mind once a number of those protesting the novel were killed by police firing in Pakistan. Far more numerous than the unfortunate translators and publishers of The Satanic Verses killed or attacked by Rushdies enemies, these men are rarely mentioned and never mourned in Western commentary. Presumed to be fanatics, their deaths, for which nobody is held culpable, are collateral damage in the fight for free expression. In issuing his sentence against Rushdie, Khomeini not only took these deaths seriously but threatened for the first time to reciprocate the impunity of Western countries in killing or tolerating the deaths of civilians elsewhere.

The cult of offense is not a symptom of any particular political orientation, left or right. It is the product of neoliberalism.

Rushdie himself seemed to have changed places with his own characters. Like the figures in his novel who are changed into animals as a result of racist perceptions, he became a demon in the eyes of many Muslims. Conversely, Rushdie was made into an example of tolerance and even Western civilization by his liberal defendersa symbolic role in a metaphysical battle that has likely endangered him further. Like Mahound in The Satanic Verses, Rushdie also sought a compromise with his enemies by briefly recanting his book and claiming to have become a good Muslim. As with the novels prophet, this has not shaken the faith of his admirers. In such ways Rushdie has been forced to live the life of a figure he is accused of insulting.

Condemned either as liberal prophet or religious demon, Rushdie has become a larger-than-life figure known more for his ordeal than for his literary career. His ordeal has also pushed Rushdie to adopt some unfortunate views, including supporting the disastrous War on Terror. But then, like Muhammad, Rushdie is only human.

He has since returned to an earlier version of himself and speaks out against the persecution of minorities, including the Muslims of his native India who had been the first to ban his book. This generosity of spirit can only be admired, and we must hope Rushdie makes a quick recoverynot least so that he continues to stand as a global representative for the freedom of conscience and expression. Making him the victim of a metaphysical battle between tolerance and fanaticism can only inhibit his work on this front, however, because it entails a false reading both of the Rushdie affair as well as the modern history of threats to speech which need to be thought about more expansively and in connected ways.

In the end, there are really two debates here: one about geopolitics and the behavior of liberal states, and one about social identity and the fight for cultural respect. We would do well to resist the neoliberal pressure to conflate them, as Khomeini did in his own way. While both seem intractable, each is arguably capable of resolution if dealt with separately. The political debate should be engaged not by invocations of Western values and civilization, which have long been seen as hypocritical in the world beyond, but through tough diplomacy about the real issues involved. Such engagement requires careful attention to the circumstances of history, rather than their ideological erasure. As for the social debate about offenses against religious, racial, sexual, and other identities, we must reject the neoliberal cultural warsin which Islam is the chief among several offended as well as offending groupsfor a vision of the social that rises above the marketized competition of hurt sentiments.

As we know all too well from contemporary America, social relations in the liberal West need to be rebuilt. But doing so requires understanding the controversies that derange them in more complex terms than those supplied by the banal and historically inaccurate opposition between fanaticism and tolerance.

Read more here:
Salman Rushdie and the Neoliberal Culture Wars - Boston Review

apnews.com

Press release content from Globe Newswire. The AP news staff was not involved in its creation.

Click to copy

Washington, D.C., Sept. 01, 2022 (GLOBE NEWSWIRE) -- The New Civil Liberties Alliance, the Attorney General of Missouri, and the Attorney General of Louisiana, have filed a lawsuit that blows the lid off a sprawling federal censorship regime that will shock the conscience of Americans. The joint statement on discovery disputes in the lawsuit, State of Missouri ex rel. Schmitt, et al. v. Joseph R. Biden, Jr., et al., reveals scores of federal officials across at least eleven federal agencies have secretly communicated with social-media platforms to censor and suppress private speech federal officials disfavor. This unlawful enterprise has been wildly successful.

Under the First Amendment, the federal government may not police private speech nor pick winners and losers in the marketplace of ideas. But that is precisely what the government has doneand is still doingon a massive scale not previously divulged. Multiple agencies communications demonstrate that the federal government has exerted tremendous pressure on social media companiespressure to which companies have repeatedly bowed.

Discovery has unveiled an army of federal censorship bureaucrats, including officials arrayed at the White House, HHS, DHS, CISA, the CDC, NIAID, the Office of the Surgeon General, the Census Bureau, the FDA, the FBI, the State Department, the Treasury Department, and the U.S. Election Assistance Commission. Communications show these federal officials are fully aware that the pressure they exert is an effective and necessary way to induce social-media platforms to increase censorship. The head of the Cybersecurity and Infrastructure Security Agency even griped about the need to overcome social-media companies hesitation to work with the government.

These actions have precipitated an unprecedented rise in censorship and suppression of free speechincluding core political speechon social-media platforms. Many viewpoints and speakers have been unlawfully and unconstitutionally silenced or suppressed in the modern public square. This unlawful government interference violates the fundamental right of free speech for all Americans, whether or not they are on social media. More discovery is needed to uncover the full extent of this regimei.e., the identities of other White House and agency officials involved and the nature and content of their communications with social-media companies.

The government has been uncooperative and has resisted complying with the discovery order every step of the wayespecially with regard to Anthony Faucis communications. Defendants claim, for example, that White House communications are privileged, even though such privilege does not apply to external communications. The U.S. District Court for the Western District of Louisiana should overrule the government defendants objections and order them to supply this highly relevant, responsive, and probative information immediately.

NCLA released the following statements:

If there was ever any doubt the federal government was behind censorship of Americans who dared to dissent from official Covid messaging, that doubt has been erased. The shocking extent of the governments involvement in silencing Americans, through coercing social-media companies, has now been revealed. These bureaucrats continue to resist efforts to expose the degree of their unconstitutional actions every step of the way. Jenin Younes, Litigation Counsel, NCLA

The incredible extent of government interference with the speech rights of Americans must be seen to be believed. Yet, even with all that this case has revealed, the government defendants are still resisting their obligation to disclose the names of all the public servants who were involved in this unlawful scheme. John J. Vecchione, Senior Litigation Counsel, NCLA

For more information visit the case page here.

ABOUT NCLA

NCLA is a nonpartisan, nonprofit civil rights group founded by prominent legal scholar Philip Hamburger to protect constitutional freedoms from violations by the Administrative State. NCLAs public-interest litigation and other pro bono advocacy strive to tame the unlawful power of state and federal agencies and to foster a new civil liberties movement that will help restore Americans fundamental rights.

###

Judy Pino New Civil Liberties Alliance 202-869-5218 judy.pino@ncla.legal

See the article here:

apnews.com

‘Near-Perfect Detection:’ World Economic Forum Pushes AI Censorship of …

The World Economic Forum (WEF), notorious for its great reset agenda, featuring the now-infamous slogan you will own nothing and be happy, has published an article pushing for artificial intelligence-powered censorship to contain the problem of online abuse.

The article, published on the WEFs website, bundles together the real problems faced by online content moderators, such as detecting and removing child sexual abuse material (CSAM), with establishment preoccupations like containing misinformation and white supremacy increasingly flexible labels that tech elites use to censor the enemies of progressivism.

Joe Biden arrives on stage to address the assembly on the second day of the World Economic Forum, on January 18, 2017 in Davos. (Photo by FABRICE COFFRINI/AFP via Getty Images)

Via the WEF:

Since the introduction of the internet, wars have been fought, recessions have come and gone and new viruses have wreaked havoc. While the internet played a vital role in how these events were perceived, other changes like the radicalization of extreme opinions, the spread of misinformation and the wide reach of child sexual abuse material (CSAM) have been enabled by it.

The article goes on to recommend the increased adoption of a technique already used by Silicon Valley leftists using feedback from content moderators (who are typically either leftist or following leftist guidelines from social media companies) to train AI censorship models.

To overcome the barriers of traditional detection methodologies, we propose a new framework: rather than relying on AI to detect at scale and humans to review edge cases, an intelligence-based approach is crucial.

By bringing human-curated, multi-language, off-platform intelligence into learning sets, AI will then be able to detect nuanced, novel online abuses at scale, before they reach mainstream platforms. Supplementing this smarter automated detection with human expertise to review edge cases and identify false positives and negatives and then feeding those findings back into training sets will allow us to create AI with human intelligence baked in. This more intelligent AI gets more sophisticated with each moderation decision, eventually allowing near-perfect detection, at scale.

Leftists in tech are increasingly fixated on owning and imprinting their biases on the field of artificial intelligence. The field of machine learning fairness, which blends critical race theory with computer science, is one such example of this. A devotee of the field, former Google employee Meredith Whittaker, is now a member of Joe Bidens FTC.

Allum Bokhari is the senior technology correspondent at Breitbart News.He is the author of#DELETED: Big Techs Battle to Erase the Trump Movement and Steal The Election.

See original here:

'Near-Perfect Detection:' World Economic Forum Pushes AI Censorship of ...

Sex, incest and menstruation: cultural censorship The Orion – The Orion

Language is our greatest tool. Its how we communicate and express ourselves, but yet, we falter when we have to listen to or say sex, menstruation, incest, masturbation, vagina, penis and other similar words.

When I was in high school I was always involved in some sort of extracurricular. I was in the school orchestra, the leadership community and on a dance team. One day when I was backstage at a dance performance, I was trying to convince my friend to watch Game of Thrones.

I was doing my best to make the case that theyd want to watch the series because of the fantasy aspects, like the dragons and White Walkers, to help show them a world of wonder. However, before I could continue, they said in a hushed tone that they were uncomfortable with the theme and concept of incest that is woven throughout the storyline.

I was taken aback by their confession. My teenage mind at the time tried to defend one of my favorite shows by saying that incest, while immoral, was not a dirty concept. Its well-ingrained in our countrys history and culture. It still exists in many areas of the world; whether you look at our species origin from a religious or evolutionary perspective, we all come from the same organisms.

This then sparked a debate about the origins of incest, and of course, this meant that wed said the word incest a lot. One rule backstage was that if someone said something that interrupted the positive atmosphere, we had the right to ask that person to stop talking about it. As per this rule, one of my other friends, in a very hushed and frustrated tone, said that I was interrupting the atmosphere by saying the word incest.

Once again, I was surprised by this common mentality that words such as incest were considered dirty or scandalous.

This led me to consider other words that our culture deems to be vulgar or taboo. The perceived nature of some words like sex, menstruation, masturbation, penis and vagina grew more apparent to me as I tried talking to students on campus. Some students I attempted to talk to were hesitant or even backed out of interviews after hearing what words I was specifically asking about.

Yarely Contreras, a sophomore and liberal studies major at Chico State, said that thinking of saying these words naturally feels uncomfortable and that this mentality is a very cultural thing that doesnt have much of an explanation behind why people are so uncomfortable saying these words.

Timothy Jay, a psychology professor at Massachusetts College of Liberal Arts, in a 2009 journal that outlines how and why taboo words are used so much, said, At the institutional level, taboos on certain forms of speech arise from authorities that have the power to restrict speech and can act as arbiters of harmful speech.

Jay further elaborates by writing that some examples of arbiters are courts of law, religious leaders, educators and mass-media managers. All of which play important roles in our society and culture.

The Federal Communication Commission, which monitors communications such as radio and television nationally and internationally, vaguely outlines how they define obscene, indecent and profane language. The FCC says that in order for content to be considered obscene or language which isnt protected by the First Amendment that it must meet the standards of a three-pronged test.

The test says that content cannot encourage sexual interest, show or describe sexual conduct in an offensive manner and must lack serious literacy, artistic, political or scientific value.

Words such as sex, vagina and penis have scientific value. The words themselves and the context we use them in are what Luke Richardson, a senior and psychology (pre-med) major at Chico State, says are straight up biology.

As a result of this, they are used in TV shows and movies that dont have a mature or restricted rating. However, we still hear these words sparingly on-screen and in our everyday lives.

Leah Schultz, a junior and biology major at Chico State said, we are conditioned as children to regard those things [taboo words] as private, they are avoided to try to protect children.

Our culture has embraced a more conservative ideology regarding sex and sexual organs as well as immoral acts such as incest because of historical and religious principles. Parents will be more inclined to want to protect their children from sexual themes that include the identification of the penis or vagina or the notion of sex or incest.

Jay expands on this idea in his journal about how children could possibly learn these words and their culturally taboo nature.

Indeed, we learn not to use them when we are punished by caregivers, Jay said. Surprisingly, no one has clearly established how a child acquires word taboos.

A child may be more likely to hear these terms in a variety of circumstances as media becomes more widely available to the general population in forms like portable devices and streaming. However, if a parent catches their child watching something that contains these words, social norms would suggest that they must attempt to direct the child away from it.

The more these words are stigmatized and restricted by caregivers, the more uncomfortable it is to speak them. Therefore, frequency in usage and exposure plays a part in assigning the idea of vulgarity to words like penis, vagina and sex.

In a 2016 journal, which outlines the impact of the frequency and intensity of taboo words in everyday language, Patricia Rosenburg, Sverker Sikstrm and Danilo Garcia, professors and researchers of religion and psychology, said, Indeed, individuals affectivity is linked to how frequent taboo words are used.

The trio approaches the discomfort of speaking taboo words from the perspective that the more frequently we hear or say taboo words, the more comfortable we become with them. So, if these words are avoided all together, people are more likely to feel uncomfortable when in the presence of someone saying the words.

Ty Whittington-Brown, a senior and psychology student at Chico State, said that the comfort of saying these terms varies depending on the context and environment.

He said that if it was just an everyday conversation surrounding a topic regarding the words, he wouldnt be uncomfortable saying them.

In an uncomfortable environment I would use the words as comedic relief to open up a conversation, Whittington-Brown said.

There are multiple reasons that our culture censors words like sex, menstruation, penis, vagina and so on. Despite the FCCs three-pronged test, lawmakers debates on the restraints of the First Amendment and attempts by parents to shield their children, these words are still heard, learned and repeated.

If we do our best to define these words as body parts like Richardson said, and remove the negative stigma behind the usage of them, we could potentially break down the walls our culture builds around the appreciation of the human body and human nature.

We could help encourage the use of terms like sex, menstruation, incest, masturbation, penis and vagina in appropriate contexts at the proper time and place without subconsciously flinching or speaking in hushed tones.

Ariana Powell can be reached at [emailprotected]

Read more from the original source:

Sex, incest and menstruation: cultural censorship The Orion - The Orion

The Crusade on Critical Race Theory Is Censorship – LA Progressive

The right is obsessed with Critical Race Theory (CRT). It is hell-bent on censoring it where public schools are deprived of teaching students some inconvenient truths about the dark side of history in the United States.

The censoring of CRT will deprive students of a chance to gain knowledge of the U.S.s racism in the past and the overt and institutional racism of today; and how they connect. After all, present conditions are the results of past events. The past influences the present. It is cause and effect. In turn, censoring CRT will make students, and people in general, ignorant of why and how racism still exists today and thus will put obstacles in the way to finding out how to eliminate racism in the future.

There is a group called the Alliance Defending Freedom. This entity published a fact sheet on October 4, 2021 and revised it on August 5, 2022 entitled What is Critical Race Theory? In its opposition to CRT, the argument it presents sounds sophisticated, but contains a number of flaws making its bottom-line message suspect.

It starts out saying, Critical Race Theory (CRT) teaches that people are either oppressor or oppressed, good or bad based on their race. This is a simplistic claim that doesnt get to the shades of gray regarding racial conflict. It seems to imply that in CRT, one race has to be totally bad while another is totally good. This isnt realistic since there is good and bad in every race.

There is the claim that CRT wants to tear down existing institutions and replace our constitutional form of government as the only way to stop racism. This is another simplistic claim that ignores the shades of gray in CRT. Those who teach CRT probably have somewhat different ideas about it. But one of the goals of CRT is to eliminate institutional, and overt, racism. Does that mean tearing down existing institutions? It means tearing down the institutions that are inherently racist. What about our constitutional form of government? Likewise, it has the goal of tearing down only the racist aspects of government.

The sheet quoted Richard Delgado and Jean Stefancic, authors of Critical Race Theory: An Introduction:

The critical race theory (CRT) movement is a collection of activists and scholars interested in studying and transforming the relationship among race, racism, and powerUnlike traditional civil rights, which embraces incrementalism and step-by-step progress, critical race theory questions the foundations of the liberal order, including equality theory, legal reasoning, Enlightenment rationalism, and neutral principles of constitutional law.

What in hell is wrong with transforming relationships that perpetuate racism, as well as homophobia, sexism and classism? The assertions from them also includes step-by-step progress and incrementalism as though that alone will guarantee real change. In reality, one can look at the civil rights movement and see that there was not only step-by-step progress, but also civil disobedience. Rosa Parks refused to sit in the back of a bus. Was that wrong? No. There were marches led by Martin Luther King which invited oppression from the racist establishment in the South. Was that wrong? No. These were necessary steps to push the political establishment into taking action.

The sheet mentions Martin Luther King and implies that proponents of CRT would be against his legacy based on race being the only thing that matters. First, the hypocrisy: whites have historically oppressed people of color based on race. Second, the statement is a wide generalization about people of color who support CRT. There are probably gray areas among supporters of CRT.

Scroll to Continue

Other claims: CRT rejects religious freedom and free speech. Another generalization. CRT rejects racism, both overt and institutionalized; CRT views fundamental freedoms as more ways to oppress the oppressed. But there is no doubt that among the oppressed there are CRT supporters. And the oppressed have largely been targets of white racism, past and present.

As with the Alliance Defending Freedom, there are like-minded individuals in politics who oppose CRT and have introduced bills to censor it. In an article published in The Atlantic (May 7, 2021) by Adam Harris, there is mention of Keith Ammon, a Republican of the New Hampshire House of Representatives who introduced a bill that bans divisive concepts like CRT. The bill would forbid race or sex scapegoating, questioning meritocracy and not allowing the word, racist, to be used against New Hampshire and the United States itself.

Other states have been taking up the crusade. Among them, Arkansas where the state legislature approved a ban on CRT. Harris partially quoted the bill which states that there will be no promotion of division between, resentment of, or social justice for groups based on race, gender or political affiliation. The Idaho legislature passed a bill that would prohibit public schools from compelling students to personally affirm, adopt or adhere to specific beliefs about race, sex or religion. Louisiana, likewise, is considering censoring CRT.

Meanwhile in Kentucky, there are Sens. Max Wise and Robby Mills who introduced the Teaching American Principles Act. Writing for Peoples World (February 9, 2022), Berry Craiga Kentuckian who is an emeritus professor at West Kentucky Community and Technical College in Paducahasserted that the bill promotes censorship, restricting the teaching of systemic racism in public schools. The bill is supposed to promote the teaching of diverse topics without giving a preference to a particular topic. But it may ,e.g, present pro-slavery positions and anti-slavery positions as morally equivalent.

Craig boiled it down to the following regarding the purpose of the bill: A teacher mustnt make white students feel bad by telling the truth about whites enslaving black people and whites making black people second-class citizens. Craig quoted Brian Clardy, a Murray, Ky., State University historian, who said the language of the bill is Orwellian double-talk. How is shielding students from the brutal lessons of history going to benefit the intellectual and personal development of any student? The bill is lunacy.

What those who oppose CRT have been doing is creating a moral panic. According to Thom Hartmann, writing in CounterPunch (February 4, 2022), he wrote specifically who the guilty parties are: libertarian billionaires, Republican Party leaders, multi-millionaire white evangelical preachers, white supremacist militia leaders, etc. Hartmann: These are goal-oriented crisis actors whove brought us the moral panic around Critical Race Theory that has now morphed into a book-banning frenzy.

Hartmann quoted Betsy DeVos, the unqualified Education Secretary, who wanted to end unionized, public education: Because wokeness is the lefts religion, banning critical race Theory wont fix the problem. The liberal education establishment will simply rename, rebrand, or repackage these insidious ideas to get around so-called bans. So, according to DeVos and others of the right-wing establishment, wokeness is portrayed as a bad thing. But being woke means being aware or alert. And wokeness is preferable to ignorance, the latter of which is rampant among the right.

Students in U.S. public schools need an overall education about the United States, teaching the good and the bad. That can contribute to making real change. Heres hoping that the censorship of CRT will eventually fail.

Crossposted from StarrNarrative.

Continue reading here:

The Crusade on Critical Race Theory Is Censorship - LA Progressive

The Download: The Merge arrives, and Chinas AI image censorship – MIT Technology Review

The must-reads

Ive combed the internet to find you todays most fun/important/scary/fascinating stories about technology.

1 Social medias biggest companies appeared before the US SenatePast and present Meta, Twitter, TikTok and YouTube employees answered questions on social media's impact on homeland security. (TechCrunch)+ Retaining user attention is their algorithms primary purpose. (Protocol)+ TikToks representative avoided committing to cutting off Chinas access to US data. (Bloomberg $)

2 China wants to reduce its reliance on Western techInvesting heavily in native firms is just one part of its multi-year plan. (FT $)+ Cybercriminals are increasingly interested in Chinese citizens personal data. (Bloomberg $)+ The FBI accused him of spying for China. It ruined his life. (MIT Technology Review)

3 California is suing AmazonAccusing it of triggering price rises across the state. (WSJ $)+ The two-year fight to stop Amazon from selling face recognition to the police. (MIT Technology Review)

4 Russia is waging a surveillance war on its own citizensIts authorities are increasingly targeting ordinary people, not known dissidents or journalists. (Slate $)+ Russian troops are still fleeing northern Ukraine. (The Guardian)

5 Dozens of AIs debated 100 years of climate negotiations in secondsTheyre evaluating which policies are most likely to be well-received globally. (New Scientist $)+ Patagonias owner has given the company away to fight climate change. (The Guardian)

6 Iranian hackers hijacked their victims printers to deliver ransom notesThe three men have been accused of targeting people in the US, UK and Iran. (Motherboard)

7 DARPAs tiny plane could spy from almost anywhereThe unmanned vehicle could also carry small bombs. (WP $)+ The Taliban have crashed a helicopter left behind by the US military. (Motherboard)

8 Listening to stars helps astronomers to assess whats inside themThe spooky-sounding acoustic waves transmit a lot of data. (Economist $)+ The James Webb Space Telescope has spotted newborn stars. (Space)+ The next Space Force chief thinks the US needs a satellite constellation to combat China.(Nikkei Asia)

9 Well never be able to flip and turn like a catBut the best divers and gymnasts are the closest we can get. (The Atlantic $)+ The best robotic jumpers are inspired by nature. (Quanta)

10 This robot is having a laughEven if its not terribly convincing. (The Guardian)

Quote of the day

Tesla has yet to produce anything even remotely approaching a fully self-driving car."

Briggs Matsko, a Tesla owner, explains his rationale for suing the company over the deceptive way it marketed its driver-assistance systems, according to Reuters.

See more here:

The Download: The Merge arrives, and Chinas AI image censorship - MIT Technology Review

Student tells BOE censorship is not the ‘correct option’ – Newnan Times-Herald

(Updated 9.15.22, 7:50 p.m. for typos.)

An East Coweta High School sophomore is pushing back against a year-long campaign to remove certain books from school libraries.

Ill be frank, I don't believe that censorship is the correct option, Natalie Zern told the Coweta County Board of Education Tuesday. Historically, when books get banned, it doesn't end up well for the people or for the leadership.

A nationwide crusade to eliminate a particular batch of objectionable books in public schools made its way into the Coweta boardroom last fall, resulting in near-monthly tirades and a few lewd read-alouds from local activists who say they want to protect students from exposure to inappropriate materials.

Its been a long, contentious back-and-forth, further complicated by a Georgia General Assembly-mandated policy clarification that effectively excludes those activists from the decision-making process for evaluating objectionable materials unless they are doing so at a school their children attend.

An important voice missing from those tense exchanges, Zern said, has been that of the Coweta County School System students themselves.

Weve had teachers, parents, guardians and concerned citizens with nothing to do with the school system share their opinions, Zern said. However, we've got to hear from someone whom this censorship will actually affect someone you as teachers, parents, citizens and school board members are supposed to be representing.

Zerns parents, both educators, helped her understand that literacy is not only the ability to read and write, she said, but also knowledge or competence in a specific area.

While some speakers may have been able to read, they do not have literacy skills in areas such as childhood education, juvenile and adolescent development or political ideology, Zern told board members.

She recited part of the Coweta County School Systems Mission, Vision and Beliefs statement (www.cowetaschools.com): We believe, as leaders of learners, we must empower students to be active and accountable participants in their learning.

Zern told board members that, as leaders of 23,000 students, you must give us the tools to empower and educate ourselves on matters we deem important to us.

We are not active if we do not get to choose the materials we wish to read in an already very rigid curriculum, she said. We are not accountable if we aren't taught the freedom of media and the freedom to choose. We are not participating if our curriculum is being left in the hands of representatives who are going to take away our books. We are not learning if all media we ingest is tailored to fit the specific wants and wishes of people in the county. And we are not empowered if you refuse to dignify us with the right to learn about different cultures, ideas and things we're interested in.

She said she recently studied censorship in an advanced placement history class taught by Jennifer Sandlin at ECHS, where she learned that banned books throughout history have included any version of the New Testament that was not written in Latin, the works of Galileo, Voltaire, Copernicus and Victor Hugo, and George Orwells anti-authoritarian 1984.

When leaders censor books, they aren't looking out for the good of the people they're looking to forward an agenda that they believe in, Zern said.

They often do so with weak evidence and claims, she said, citing the reading of an isolated passage from Sarah J. Maas Court of Mist and Fury last December. The speaker chose a sexually explicit excerpt to make the point that the book should not be available to students, Zern said, but missed its wider purpose.

Had the speaker exercised their literacy skills, they would have found out that the book is a social commentary with focus on mental health, the main characters severe depression and the abusive relationship the main character undergoes, she said, noting that several areas of the Bible also include sexually explicit or inappropriate content.

Im not trying to bring religion into issues for the sake of controversy, she said. Im simply trying to illustrate that the inclusion of these passages does not undermine the influence or message of the Bible.

Zern also emphasized the importance of reading for fun as well as for school, citing a Scholastic study conducted in 2013 that indicated the practice can increase students Lexile scores and comprehension skills.

Both forms of reading are necessary to fully develop literacy skills and are needed to completely develop a childs reading process, so children should have equal opportunities to read the books they want, she said.

The practice of removing so-called objectionable materials from classrooms robs students of important educational opportunities, Zern said.

A child who is not permitted to read a book in class a book that's being taught by an educator that has been reading and studying it for years is missing out on the lessons, analysis and literacy development that goes along with it, she said. It may seem like a few angry adults now, and one or two censored texts, but before long, it's sure to become a systemic problem.

Convincing students to hate certain books will teach them to hate reading, Zern said.

You're teaching them that the happiness and the lessons found in literature don't exist, she told board members. You're telling them that you value your own personal comfort over their development into a functioning, intelligent and well-read adult. You're telling them that you want them to be treated like a 5-year-old.

Zern was not the only student speaker at Tuesdays meeting.

Seventh grader Colby Wilson also took to the lectern to make the board aware of her objections to the outdated dress code at Arnall Middle School.

Wilson said she has been pulled for dress code violations several times once when she was wearing sweatpants and a sweater.

I would never wear anything inappropriate anywhere, she said.

Shorts have been a particular issue, Wilson said. She was pulled for a violation recently while walking to class, surrounded by her friends and peers.

Not only was this embarrassing, but the situation was handled horribly, Wilson said. The administrator should have pulled me aside to speak about whatever they thought was the problem.

Wilson said she is tall and has trouble finding clothes to fit the dress code.

The teachers and staff say that girls thighs and legs are inappropriate and distracting, she said. But if anyone is distracted, then that person should be punished, not the girls. It is not that you can see my thighs. When girls wear jeans with holes in the thigh area, putting tape over the hole (a fix accepted by many schools) only makes people stare at the area.

Wilson said she thinks its unfair that boys also are allowed to wear shorts but never seem to get violations.

Administrators should be focused on girls education, not our clothing, she said. We are 14 and younger. We should not have to worry about this. When girls get punished for others actions, it makes us feel like it's our fault, and it is not. I hope you take all this into consideration and update Arnalls dress code.

While all seven elected board members were present at the meeting, only six appeared to have been supportive of the students who came before them.

During Zerns comments, Board Chair Beth Barnett gaveled down an interruption from board member Buzz Glover, reminding the board that it was the publics time to speak. Glover explained his outburst later, during board comments.

Ive been on this board a year and nine months, and I heard the most disgusting thing that I have heard said in this room tonight. And no, it was not from the speaker it was from my colleague to the right, Glover said, referring to District 4 representative Linda Menk. I heard my colleague say, What a dimwit. I don't know if she intended for me to hear it or not, but I did.

Glover said hes known Zern for several years and is proud of her. He apologized for Menks alleged comment, which was not picked up on audio.

I hope you didnt hear that, Glover said to Zern.

He went on to issue an open invitation for other Coweta students to speak at future meetings.

I invite all 23,000 of you that are out there to come speak on whatever subject you like, and I never and I hope nobody on this board would think anything less of any student whether I agree with them or not. Or any other speaker, he said. Im looking forward to January 2023.

Menk, an embattled two-termer, was unseated by challenger Rob DuBose in June after he earned nearly 80 percent of the runoff election vote.

DuBose takes office in January 2023.

More:

Student tells BOE censorship is not the 'correct option' - Newnan Times-Herald