Post-Quantum Cryptography Market by Competitive Vendors in Top Regions and Countries, Development Trends, Threats, Opportunities and Forecast to 2028-…

Global Post-Quantum Cryptography Market by Product Types, By Application, By End-user industry Outlook, and By Geography (Asia-Pacific, North America, Europe, South America, and the Middle East & Africa), Segments and Forecasts from 2022-2028

The key data supplied in this Post-Quantum Cryptography market research report makes it simple to improve product offerings. Changing company practices is critical for achieving large profits, and this is feasible owing to the supply chain and value supplied here. The competitor strategy offered here for the forecast period 2022-2028 enables businesses to make key business decisions. The major facts and insights offered here assist in strategic planning and achieving corporate objectives. With the help of the main methodologies presented in this Post-Quantum Cryptography market study report, it becomes simple to discover and use trends. By implementing the substantial proof and clearer understanding here, industry players can achieve high levels of success in their businesses. The research paper provides an in-depth understanding of many sectors as well as specializations. It also helps major players come up with the greatest marketing strategies for their items to be profitable and diversify their product line. The Post-Quantum Cryptography market research analysis is important when it comes to the launch of new products or the certification of a brand.

Get a Full PDF Sample Copy of the Report: (Including Full TOC, List of Tables and Figures, and Chart) at https://www.eonmarketresearch.com/sample/92398

Scope of the Global Post-Quantum Cryptography Market

This Post-Quantum Cryptography market study explains the company objectives to help major companies avoid potential competitors. Setting a purpose and creating a strong strategic plan will undoubtedly assist businesses in overcoming challenges and adjusting their operations accordingly. Post-Quantum Cryptography market research easy-to-understand language succeeds in achieving the goal of assisting various important participants at various stages of the business by facilitating communication. It also explains the primary strategies, gives important information, suggestions, and conclusions, and clarifies the goals. This thorough yet effective Post-Quantum Cryptography market report grabs the readers attention by providing precise facts in easy-to-understand language. As a result, it achieves the goal of leaving a lasting imprint on the readers mind.

Inquiry Post-Quantum Cryptography Market Report at https://www.eonmarketresearch.com/enquiry/92398

Post-Quantum Cryptography Market Outlook

Impact of COVID-19 on the Global Post-Quantum Cryptography Market

This section of the Post-Quantum Cryptography market report discusses the worldwide impact of the covid epidemic on business. This report details the impact on manufacturing activities, production, demand, logistics management, and distribution channels. Researchers have identified the steps or strategies that corporations are employing to combat the impact of COVID-19. Theyve also identified exciting possibilities that will emerge after COVID-19. This will allow players to take advantage of opportunities to recoup losses and stabilize their operations.

Post-Quantum Cryptography Market Segmentation

Post-Quantum Cryptography Market Competitor Outlook, this report covers ID Quantique, SeQureNet, Quintessence Labs, MagiQ Technologies, Toshiba, QuantumCTek, Qasky, QudoorThe market environment for the Post-Quantum Cryptography market contains information on each manufacturer. Corporate governance, profitability, income generated, potential growth, r and d investments, emerging market proposals, international presence, production sites, and infrastructure, business strengths and limitations, public offering, clinical research infrastructure, concepts, product approvals, patent applications, merchandise width and breadth, software dominance, and innovation lifeline curve are among the information included. The information presented herein is only about the organizations concentration on the global Post-Quantum Cryptography market.

Click Here to Download Free Sample Report (Get Detailed Analysis in PDF 151 Pages)

Product Type Outlook (Revenue, USD Billion; 2022 2028) Lattice-based Cryptography, Multivariate Cryptography, Hash-based Cryptography, Code-based Cryptography

Application/ End-user Industry Outlook (Revenue, USD Billion; 2022 2028) Financial, Government, Military & Defense, Others

Region Outlook (Revenue, USD Billion; 2022 2028) North Americao USo Canadao Mexico Europeo Germanyo UKo Franceo Italyo Spaino Beneluxo Rest of Europe Asia Pacifico Chinao Indiao Japano South Koreao Rest of Asia Pacific Latin Americao Brazilo Rest of Latin America Middle East and Africao Saudi Arabiao UAEo South Africao Rest of Middle East & Africa

Objectives of the Post-Quantum Cryptography market research report:

To identify the various subsegments of the Post-Quantum Cryptography market to better understand its dynamics. Identifies describes, and analyses the volume of sales, value, market dominance, Post-Quantum Cryptography market competitive landscape, PESTEL analysis, and development strategies for the major worldwide Post-Quantum Cryptography producers over the next several years. To examine the individual growth trends, career outlook, and proportion to the entire market for the Post-Quantum Cryptography market. To disseminate a precise overview of the most important aspects impacting Post-Quantum Cryptography market growth (growth potential, opportunities, drivers, industry-specific challenges, and risks). Analyze commercial movements in the Post-Quantum Cryptography market, such as market expansions, partnerships, new product launches, and acquisitions. To develop a strategic analysis of the prominent stakeholders and a thorough analysis of their business expansion.

Reasons to buy the global Post-Quantum Cryptography market

This research identifies the region and market sector that is likely to expand the fastest and dominate the Post-Quantum Cryptography industry. Market analysis of Post-Quantum Cryptography by region, covering the consumption of the manufacturer in each country as well as the factors that influence the market within each region. The market environment includes the top players market rankings, as well as new service/product announcements, collaborations, company growth, and acquisitions made by the companies profiled in the previous five years. For the top Post-Quantum Cryptography market players, extensive company profiles with business overviews, company insights, product evaluations, and SWOT analyses are available. The companys present and future outlook in light of recent changes (which include both advanced and developing regions growth possibilities and drivers, as well as difficulties and restraints).

Browse Complete Post-Quantum Cryptography Market Report Details with Table of contents and list of tables athttps://www.eonmarketresearch.com/post-quantum-cryptography-market-92398

About: Eon Market Research (EMR) is a specialized market research, analytics, and solutions company, offering strategic and tactical support to clients for making well-informed business decisions. We are a team of dedicated and impassioned individuals, who believe strongly in giving our very best to what we do and we never back down from any challenge. Eon Market Research offers services such as data mining, information management, and revenue enhancement solutions and suggestions. We cater to industries, individuals, and organizations across the globe, and deliver our offerings in the shortest possible turnaround time.

Contact: 8345 NW 66th St Miami, Florida, Zip 33195 United States Email: [emailprotected]

Read more:
Post-Quantum Cryptography Market by Competitive Vendors in Top Regions and Countries, Development Trends, Threats, Opportunities and Forecast to 2028-...

End-to-End Encryption: What is End-to-End Encryption, How Does it Work, What Does it Protect From, and More – MySmartPrice

End-to-end Encryption is a popular term used by many big tech companies these days. We have seen big tech companies like Apple, Google, Meta, and Microsoft use this End-to-end Encryption in their apps or services or during a keynote of a major event. End-to-End Encryption is also sometimes referred to as E2EE.

It is a system of communication where only the sender and the receiver will be able to read the message and not any other third parties. Many popular apps and services use E2EE for communication over messages as well as calls. In this article, we will learn more about End-to-end Encryption starting from its definition and then we will take a look at how End-to-end Encryption works. Lastly, we will also take a look at how it protects and the advantages and disadvantages of this service. Lets get started.

Before we jump into the meaning of End-to-end Encryption, let us take a look at what data encryption means. Data encryption is the process of using an algorithm to transfer regular text characters into an unreadable format. This process uses encryption keys to scramble data so that only authorized users can read it.

End-to-end encryption uses this same process too, but it takes a step further by securing communications/messages from one endpoint to another. End-to-end encryption prevents any third parties from accessing data while its transferred from one user device or another device. End-to-end Encryption is also popularly known as E2EE.

Also Read: [Explained] What is Card Tokenization? How it Works, Benefits, Risks, and More

The End-to-end Encryption process starts with cryptography, which is a method for protecting information by transforming it into an unreadable format called ciphertext. Only users who possess a secret key can decrypt the message into plaintext. With E2EE, the sender or creator encrypts the data, and only the intended receiver or reader can decrypt it. Not even hackers or other third parties can access the encrypted data on the server, which makes the data extremely safe. E2EE provides the gold standard for protecting communication.

In End-to-end encryption, the encryption happens at the device level. Meaning, that the messages and files are encrypted before they leave the phone/computer and arent decrypted until it reaches their destination, which can be another phone/computer. This is one of the main reasons that hackers cannot access data on the server because they do not have the private keys to decrypt the data. The secret keys are stored with the individual user on their device which makes it much harder to access an individuals data as well.

The security behind end-to-end encryption is enabled by the creation of a public-private key pair. This process is known as asymmetric cryptography. Asymmetric or public-key cryptography encrypts and decrypts the data using two separate cryptographic keys. The public key is used to encrypt a message and send it to the public keys owner. Thereafter, the message can only be decrypted using a corresponding private key, also known as a decryption key.

In end-to-end encryption, the system creates public and private cryptographic keys for each person who joins.

Also Read: Convert JSON File to Microsoft Excel File: How to Convert JSON File in Excel Using Inbuilt Tools and Third-Party Apps

Compared to other systems, End-to-end Encryption offers encrypting and decrypting of messages at endpoints only, which is on the senders and receivers devices. The usage of single-key/secret key encryption provides an unbroken layer of encryption from sender to recipient, but it uses only one key to encrypt messages. E2EE also makes sure that the messages are secure and safe from hacks. Since the E2EE messages cant be read on any servers, providers like Google, Apple, Microsoft, etc wont be able to look into your data.

These aforementioned additions make End-to-end Encryption different from any other type of encryption.

With E2EE, messages sent can only be read by the receiver who has the keys to decrypt the message. This means no one can read the messages even on the server because they do not have the private keys to decrypt the data. Only the recipient can read the message. Next, End-to-end encryption also protects against tampering with encrypted messages.

While the key exchange is considered unbreakable using known algorithms, there are certain things that E2EE doesnt protect from. The following can be considered as some of the weaknesses of E2EE.

Also Read: Telegram Channels: How to Find and Join Telegram Channels on Android, iOS Mobiles and PC

While E2EE protects the actual message, the metadata such as date, time, and participants in the exchange are not encrypted.

As said multiple times, E2EE only protects data between the endpoints, This means the endpoints themselves are vulnerable to attack. This is also one of the prime reasons for enterprises to implement endpoint security to prevent data misuse and protect data beyond in-transit.

Although a hacker cant read any message in transit, he/she can impersonate the intended recipient, swap the decryption key and forward the message to the actual recipient without being detected.

Also Read: SBI KYC Update Online: How to Submit State Bank of India KYC Documents Online to Update Your Account

Now that you are aware of what E2EE is and how it works, here are some of the popular apps and services that use E2EE.

Also Read: Masked Aadhaar Card: How to Create Masked Aadhaar Card Using Different Methods

Thanks for reading till the end of this article. For more such informative and exclusive tech content, like our Facebook page

More:
End-to-End Encryption: What is End-to-End Encryption, How Does it Work, What Does it Protect From, and More - MySmartPrice

Cyber Week in Review: July 7, 2022 – Council on Foreign Relations

Trove of Chinese Police Files Offered for Sale on the Dark Web

An unidentified hacker has listed a database for sale containing the records of over one billion Chinese citizens. The database was likely created by the Shanghai police department and contains informationfrom 1995 to 2019 such as citizens names, phone numbers, birthplaces, and national ID numbers. If the leak is legitimate, it would represent one of the largest disclosures of personal information ever. The hacker posted hundreds of thousands of entries online as proof of the existence and authenticity of the database, and reporters called several people listed in the database, who confirmed their information was correct. In a sign of the severity of the leak, Chinese social media platforms began censoring hashtags such as data leak and Shanghai national security database breach. Researchers speculated that the hacker may have gained access to the data after a developer inadvertently included the login information to the database in a blog post.

Canada's National Police Force Details Use of Spyware to Hack Phones

The Royal Canadian Mounted Police (RCMP) disclosed how they use spyware to infiltrate mobile devices to collect information on serious criminal cases. The agency has admitted to using spyware in ten investigations between 2018 and 2020. RCMP admitted it has previously used spyware to collect a wide range of data including text messages, calendar entries, financial records, and even audio recordings of private conversations or photographic images of surroundings within range of a targeted device. In justifying their use of the spyware, the RCMP noted that the increased use of encrypted communication requires police departments to update their tools to remain effective in the digital era. Spyware has become a major topic in the past year, especially the NSO Groups Pegasus spyware, which has been used improperly by numerous governments worldwide.

The United States Reveals Four Cryptographic Algorithms to Withstand Quantum Computing

More on:

Cybersecurity

China

European Union

The U.S. Department of Commerces National Institute of Standards and Technology (NIST) has revealed the first group of encryption tools that will be used to protect against quantum computers. Quantum computing has the potential to crack the encryption widely used in vital systems such as online banking and email software. While full-scale quantum computers are likely at least five years away, China has reportedly begun stockpiling encrypted communications in the event that quantum computers are able to decode them later. The four encryption algorithms NIST selected will become part of their post-quantum cryptographic standard that will be released in 2024. Despite the two-year timeline NIST has proposed, the agency strongly recommends that organizations start preparing for the transition immediately by following the Post-Quantum Cryptography Roadmap. Amongst other detailed recommendations, the roadmap suggests organizations take inventory of current cryptographic practices, create a plan for the transition, and alert the organizations IT department of the upcoming transition.

European Union Passes Two Major Technology Regulations

Net Politics

CFR experts investigate the impact of information and communication technologies on security, privacy, and international affairs.2-4 times weekly.

Digital and Cyberspace Policy program updates on cybersecurity, digital trade, internet governance, and online privacy.Bimonthly.

A summary of global news developments with CFR analysis delivered to your inbox each morning.Most weekdays.

A weekly digest of the latestfrom CFR on the biggest foreign policy stories of the week, featuring briefs, opinions, and explainers. Every Friday.

The European Parliament formally passed two major pieces of digital policy earlier this week, the Digital Services Act, which forces the platforms to take down illegal content more aggressively, and the Digital Markets Act, which bans companies from self preferencing their own apps or services. The two acts are aimed specifically at companies the European Union has termed gatekeepers, large technology companies including Apple, Google, Facebook, and Microsoft, that could stifle competition and deter smaller rivals. Gatekeepers are defined several ways, including both qualitative and quantitative measures such as either 65 billion in global market capitalization, or at least 45 million active monthly users in the EU. T. The acts will also levy fines of up to 10% total worldwide revenue for the previous year, or 20% for companies that repeatedly violate either act. While some internet advocacy groups hailed the passage of the legislation, others said that the agencies tasked with enforcing the laws are still under resourced, which could blunt the effectiveness of the laws.

United States Asks Dutch Semiconductor Equipment Manager to Stop Selling to China

In an effort to thwart the growth of the Chinese microchip manufacturing industry, the U.S. government asked the Dutch government to stop ASML, one of the most prominent manufacturers of photolithographic equipment, from selling machinery to China. Photolithographic systems are essential to the production of newer microchips, and China has struggled to develop a domestic alternative to ASMLs products. ASML is already banned from selling its most advanced equipment to Chinese firms, but U.S. officials are now trying to prevent ASML from selling older generation photolithography systems to China. While restricting sales of photolithographic equipment further would deal a major blow to the Chinese microchip industry, some have argued that the Dutch are unlikely to agree to such an aggressive step, especially given the fact that sales in China account for 15 percent of ASMLs revenue and the damage such a move would do to relations between the Netherlands and China.

More on:

Cybersecurity

China

European Union

Excerpt from:
Cyber Week in Review: July 7, 2022 - Council on Foreign Relations

Royal Army accounts hijacked. A hacktivist group claims to have hit Iranian sites. Very large database of PII for sale on the dark web. – The…

At a glance.

Sunday afternoon the British Ministry of Defence Press Officetweeteda terse announcement that the MoD was aware of a cyber incident: "We are aware of a breach of the Armys Twitter and YouTube accounts and an investigation is underway.The Army takes information security extremely seriously and is resolving the issue. Until their investigation is complete it would be inappropriate to comment further." The Army'sown feedtook an apologetic line towards any disappointed followers: "Apologies for the temporary interruption to our feed. We will conduct a full investigation and learn from this incident. Thanks for following us and normal service will now resume." It took the British Army about five hours to wrest back control of its Twitter account, the Telegraphreports.

It's unknown who hijacked the accounts or why, and the MoD isn't saying anything until it understands what happened. The Telegram, quick to suspect the worst of the Russians, asked if the incident was a Russian operation, but the MoD had no comment--as they've said, they're not jumping to conclusions until they know more. Bitdefendernotesthat many have jumped to the conclusion that the incident must have been the work of a nation-state's espionage services, but it has an alternative explanation, arguably more probable: it was possibly crypto bros working an NFT scam. They note that the hijacked YouTube account featured an NFT come-on with the inevitable bogus Elon Musk attribution.

According toreportslast weekend, the group Ghiam Sarnegouni ("Uprising till Overthrow," apparently a group of anti-Tehran hacktivists), conducted a large operation against Iran's Islamic Culture and Communication Organization (ICCO). Six sites were hijacked and fifteen others were defaced with pictures of Iranian Resistance leaders Massoud Rajaivi and Maryam Rajavi. Forty-four servers, a large number of endpoints, and at least thirty-five ICCO databases were wiped. Before the systems were wiped, the hacktivists are believed to have obtained ICCO data that include information about money laundering, front groups, and espionage and terrorist networks. The operation is said to have begun in the last week of January.

In an apparent response to recent nominally hacktivist actions, not only those by Uprising till Overthrow, but also operations attributed last week to Predatory Sparrow, Iran Wirereportsthat Tehran has temporarily suspended Iranians' ability to access bank accounts from abroad. It's a measure whose purpose, the authorities say, is preventing cyber attacks.

Last Sunday, Binance's threat research teamfounda very large database of personally identifiable information exposed in the dark web. "Our threat intelligence detected 1 billion resident records for [sale] in the dark web, including name, address, national id, mobile, police and medical records from one Asian country. Likely due to a bug in an Elasticsearch deployment by a gov agency. This has [an] impact on hacker detection/prevention measures, mobile numbers used for account take overs, etc.It is important for all platforms to enhance their security measures in this area.@Binancehas already stepped upverifications for users potentially affected."

Binance is reticent about the source of the data, but others say it came from the Shanghai National Police. It's not clear who's obtained the information, butaccordingto Bloomberg the data are being offered for ten bitcoin, roughly $200,000. HackReadreportsthat the data include the following kinds of information:

As Binance's tweet suggests, the data exposure appears to be traceable to a misconfiguration, and not a compromise or a breach proper. Reutersputthe total number of people affected by the data exposure at about one billion, but this is in any case based on the claims of someone offering the data for sale. Someone using the nom-de-hack "ChinaDan" posted this message to Breach Forums late last week: "In 2022, the Shanghai National Police (SHGA) database was leaked. This database contains many TB of data and information on Billions of Chinese citizen. Databases contain information on 1 Billion Chinese national residents and several billion case records, including: name, address, birthplace, national ID number, mobile number, all crime/case details. [sic]" Reuters sensibly points out that these claims are so far unverified. The data offered for sale are said to amount in the aggregate to some twenty-three terabytes. It's obviously difficult to confirm the legitimacy of the sample data "China Dan" posted to show that he had the goods, but the Wall Street Journalspot-checkeda few of the items by calling some people whose phone numbers appeared in the tease. The Journal found that in that tiny fraction of a billion or so people, the data were indeed genuine. Chinese authorities have issued no statement so far on the incident.

HackerOnedisclosedlast Friday that a rogue insider, "a then-employee," as the company puts it, had been improperly accessing the bug-bounty platform's vulnerability disclosures with the aim of collecting "additional bounties" from HackerOne customers. Alerted to the problem by a customer (who reported an implausible disclosure, offered with uncharacteristically threatening language), HackerOne investigated and found that an employee had "improperly accessed security reports for personal gain." The improper access ran from April 4th through June 23rd of this year. HackerOne fired the employee, upgraded its security, and is considering referring the former employee for criminal prosecution.

Vade hasobserveda phishing scam consisting of a wave of more than 50,000 emails sent from a malicious Zendesk account. In one campaign, the hacker is seen to be impersonating TrustWallet, an ethereum wallet and cryptocurrency wallet store. The email contains the TrustWallet official logo along with a support link, as well as Zendesks legitimate footer. The email says that an NFT update requires the wallet to be verified and that inaction will result in account suspension. The link provided says Verify your wallet, and is shortened with s.id., which hides the malicious link and provides the phisher with a dashboard of analytics. The page, when opened, displays a 10-second countdown to open their secure internet environment, in order to intentionally appear as a legitimate safety precaution, but rather, leads to the malicious site. The victim is then tasked with entering their recovery phrase to unlock the wallet, accepting both 12 and 24-word variations. The phishing email isnt marred by extensive grammatical errors, as many phishing emails are, but its also not perfect.

The US Cybersecurity and Infrastructure agency (CISA), the FBI, and the US Department of the Treasury have issued a joint alert, "North Korean State-Sponsored Cyber Actors Use Maui Ransomware to Target the Healthcare and Public Health Sector," warning of a North Korean ransomware campaign that's been in progress since at least May of 2021. "North Korean state-sponsored cyber actors used Maui ransomware in these incidents to encrypt servers responsible for healthcare servicesincluding electronic health records services, diagnostics services, imaging services, and intranet services. In some cases, these incidents disrupted the services provided by the targeted HPH Sector organizations for prolonged periods." How the threat actor obtained initial access is unclear, but the warning recommends that organizations pay particular attention to the dangers of phishing, and that they train their personnel to recognize it, which suggests that social engineering has played a significant role in the Maui campaign.

The US National Institute of Standards and Technology (NIST), at the end of a six-year competitive search, hasannouncedthe four winners in its program to develop "quantum-resistant encryption algorithms." This represents a milestone en route to NIST's publication of standards for post-quantum cryptography, expected in 2024. The algorithms are:

"For general encryption,used when we access secure websites, NIST has selected theCRYSTALS-Kyberalgorithm. Among its advantages are comparatively small encryption keys that two parties can exchange easily, as well as its speed of operation.

"For digital signatures,often used when we need to verify identities during a digital transaction or to sign a document remotely, NIST has selected the three algorithmsCRYSTALS-Dilithium,FALCONandSPHINCS+(read as Sphincs plus). Reviewers noted the high efficiency of the first two, and NIST recommends CRYSTALS-Dilithium as the primary algorithm, with FALCON for applications that need smaller signatures than Dilithium can provide. The third, SPHINCS+, is somewhat larger and slower than the other two, but it is valuable as a backup for one chief reason: It is based on a different math approach than all three of NISTs other selections."

Taking note of NIST's announcement, the US Cybersecurity and Infrastructure Security Agency (CISA)outlinessome steps organizations can take now, as they prepare for developments over the next two years:

"Although NIST will not publish the new post-quantum cryptographic standard for use by commercial products until 2024, CISA and NIST strongly recommend organizations start preparing for the transition now by following thePost-Quantum Cryptography Roadmap, which includes:

MoodysInvestors Service released a report detailing the credit implications of Contis early April ransomware attack on the government of Costa Rica. The attack impacted the governments two largest revenue streamsincome taxes and customs duties, and impacted the international trade and healthcare sectors most heavily. The report notes that this attack provides insights on the governments strength, saying that while the attacks werent prevented, they were handled with effective solutions. Moodys anticipates the fiscal deficit to remain close to 4.8% GDP, and expects to see GDP growth of 4% in 2022.

In another report,Moodysdiscusses the recent cyberattack on Clarion Housing Group in the United Kingdom, and its implications for housing associations as a whole. On June 23, Clarionreporteda cyberattack on their IT systems that impacted IT operations, such as scheduling repairs and maintenance. This attack comes on the heels of a number of other cyberattacks on housing associations in the past few years, and highlights the need for cyber risk mitigation. According to a recent cyber survey conducted by Moodys, cyber risk remains small in the housing sector, but is growing strongly, with 25% spending growth from 2018 to 2020.

In a joint appearance Wednesday at the London headquarters of MI-5, the British counterintelligence organization, the directors of MI-5 and the US FBI issued an unusually direct and bluntly worded warning about the threat of Chinese industrial espionage, much of it cyberespionage. The effort is extensive, focused, and marked by both close attention to detail and an unusually wide net.The Chinese government is set on stealing your technologywhatever it is that makes your industry tickand using it to undercut your business and dominate your market, FBI Director Wray told an audience the Wall Street Journaldescribedas composed of "business people." Theyre set on using every tool at their disposal to do it. China disagrees. A representative of Beijing's embassy in Washington, Liu Pengyu, complained of U.S. politicians who have been tarnishing Chinas image and painting China as a threat with false accusations.

CobaltStrike is often mentioned in dispatches as a penetration testing tool that threat actors often turn to malign use. Other such tools are also susceptible to abuse. Palo Alto Networks' Unit 42reportsthat Cozy Bear, generally regarded as a unit of Russia's SVR, is deploying Brute Ratel C4, a pentesting tool in use since December 2020, in a range of cyberespionage campaigns. Unit 42 doesn't formally attribute the campaign to Cozy Bear or even Russia, but it does offer circumstantial evidence that points in that direction:

"This unique sample was packaged in a manner consistent with knownAPT29techniques and their recent campaigns, which leveraged well-known cloud storage and online collaboration applications. Specifically, this sample was packaged as a self-contained ISO. Included in the ISO was a Windows shortcut (LNK) file, a malicious payload DLL and a legitimate copy of Microsoft OneDrive Updater. Attempts to execute the benign application from the ISO-mounted folder resulted in the loading of the malicious payload as a dependency through a technique known as DLL search order hijacking. However, while packaging techniques alone are not enough to definitively attribute this sample to APT29, these techniques demonstrate that users of the tool are now applying nation-state tradecraft to deploy BRc4."

The tools used in the campaign are regarded as unusually evasive and difficult to detect.

Researchers at ReversingLabsdetailedtheir discovery of a widespread supply chain attack against the NPM repository earlier this week, publishing an update on Wednesday. Though the exact scope of the attack wasn't initially clear, researchers say the packages are potentially used by thousands of mobile and desktop applications and websites, and in one instance a malicious package had been downloaded over 17,000 times. ReversingLabs called the campaign "IconBurst." Their conclusion is that IconBurst represents a major software supply chain attack "involving more than two dozen NPM modules used by thousands of downstream applications, as indicated by the package download counts." Application developers should be particularly alert to the problem, which appears to represent an organized, cooperative criminal effort. "Analysis of the modules reveals evidence of coordination, with malicious modules traceable to a small number of NPM publishers, and consistent patterns in supporting infrastructure such as exfiltration domains."

IconBurst "marks a significant escalation in software supply chain attacks," ReversingLabs says. The firm communicated its findings to the NPM security team on July 1st, 2022: "Malicious code bundled within the NPM modules is running within an unknown number of mobile and desktop applications and web pages, harvesting untold amounts of user data. The NPM modules our team identified have been collectively downloaded more than 27,000 times. As very few development organizations have the ability to detect malicious code within open source libraries and modules, the attacks persisted for months before coming to our attention. While a few of the named packages have been removed from NPM, most are still available for download at the time of this report."Developers, ReversingLabs says, should "assess their own exposure" to the threat, and the researchers have provided information that should assist them in doing so.

And there's been another attack on the NPM supply chain, this onedescribedby researchers at Checkmarx. "Checkmarx SCS team detected over 1200 npm packages released to the registry by over a thousand different user accounts," the security firm says. "This was done using automation which includes the ability to pass NPM 2FA challenge." The operators, whom the researchers call "CuteBoi," are using what Checkmarx calls a "fake identity-as-a-service provider:" "Looking at the domains with which CuteBoi is creating NPM users, we can deduce that they are usingmail.tm- a free service providing disposable email addresses with REST API, enabling programs to open disposable mailboxes and read the received emails sent to them with a simple API call. This way CuteBoi can and easily defeat NPM 2FA challenge when creating a user account."

And so far the operation seems to represent an initial, experimental phase of a larger campaign. "This cluster of packages seems to be a part of an attacker experimenting at this point." The researchers think that CuteBoi is preparing a large-scale cryptojacking campaign using XMRig derivatives. Checkmarx has also released information to help users identify the malicious activity. They also warn that further exploitation of NPM can be expected. "CuteBoi is the second attack group seen this year using automation to launch large-scale attacks on NPM. We expect we will continue to see more of these attacks as the barrier to [launch] them is getting lower."

Bravo, Emsisoft. The company has released, BleepingComputerreports, free decryptors for the AstraLocker and Yashma ransomware strains. Emsisofttweeted, "The AstraLocker decryptor is for the Babuk-based one using .Astra or .babyk extension, and they released a total of 8 keys. The Yashma decryptor is for the Chaos-based one using .AstraLocker or a random .[a-z0-9]{4} extension, and they released a total of 3 keys." BleepingComputer points out thatAstraLocker, itself derived from Babuk Locker, has gained a reputation for being both buggy and effective. The operators of AstraLocker early this week released some decryptors as theyannouncedthey were exiting the ransomware business, saying that they had decided to turn to cryptomining. They were probably kidding about getting into coin-mining. Not only did they close their announcement with an "LOL," but there's also some reason to think they were feeling the approach of law enforcement.

The US Cybersecurity and Infrastructure Security Agency (CISA) hasaddedan entry to its Known Exploited Vulnerabilities Catalog:CVE-2022-26925, an issue with Microsoft Windows Local Security Authority (LSA) that amounts to "a spoofing vulnerability where an attacker can coerce the domain controller to authenticate to the attacker using NTLM." Theprescribed mitigationis to apply Microsoft's June patch, which agencies under CISA oversight must do by close-of-business, July 22, 2022.

CISA, the US Cybersecurity and Infrastructure Security Agency, released threeIndustrial Control Systems AdvisoriesThursday, forRockwell Automation MicroLogix("mitigations for an Improper Restriction of Rendered UI Layers or Frames vulnerability in the Rockwell Automation MicroLogix controllers"),Bently Nevada ADAPT 3701-4X Series and 60M100("mitigations for Use of Hard-coded Credentials and Missing Authentication for Critical Function vulnerabilities in the Bently Nevada ADAPT 3701-4X Series and 60M100 machinery monitors"), andMitsubishi Electric MELSEC iQ-R Series C Controller Module (Update B)(a follow-up to ICSA-21-280-04 Mitsubishi Electric MELSEC iQ-R Series C Controller Module (Update A) published October 28, 2021, this "contains mitigations for anUncontrolled Resource Consumption vulnerability in Mitsubishi Electric MELSEC iQ-R Series C controller module products").

Apple has released a new, highly secure Lockdown Mode to protect users at risk of targeted attacks, Computer World reports. Lockdown Mode significantly limits the functions of an enabled device, which aids in protecting the user from "mercenary" surveillance threats. The addition of this feature closely follows the company's suit against NSO Group, which was filed in November to "hold it accountable for the surveillance and targeting of Apple users," according to a press release. The company added a new category to the Apple Security Bounty program, offering up to $2 million to researchers that can find bypasses for Lockdown Mode, as well as making a $10 million grant to support organizations involved in investigating, exposing, and preventing targeted cyberattacks, which will be given to the Ford Foundation's Dignity and Justice Fund.

Reuters reports that mercenary hackers are being used to sway litigation battles. Indian hackers attempting to steal documents via password-stealing emails from companies involved in litigation have been identified by Reuters 35 times since 2013. At least 75 US and European companies, three dozen advocacy and media groups, and numerous Western business executives have been targeted in these campaigns. At least 11 groups of victims had emails publicly leaked or submitted into evidence, and it was found that stolen documents often shaped the verdict. Lawyers of targets often also fell victim to the hackers, with around 1,000 attorneys at 108 different law firms found to be targeted. The FBI has been investigating the hacks since at least 2018, with the goal of finding who hired these hackers.

The United Kingdom is trying to nip foreign disinformation in the bud, Bloomberg reports. The UK is amending its upcoming new online safety law, requiring social media apps and search engines to curb "state-linked disinformation" or face fines. The Department for Digital, Culture, Media and Sport said in a statement that "social media platforms, search engines and other apps and websites allowing people to post their own content will have a legal duty to take proactive, preventative action to identify and minimise peoples exposure to state-sponsored or state-linked disinformation aimed at interfering with the UK." Security Minister Damian Hinds also said in the statement, "Disinformation is often seeded by multiple fake personas, with the aim of getting real users, unwittingly, then to share it. We need the big online platforms to do more to identify and disrupt this sort of coordinated inauthentic behaviour. That is what this proposed change in the law is about."

Go here to see the original:
Royal Army accounts hijacked. A hacktivist group claims to have hit Iranian sites. Very large database of PII for sale on the dark web. - The...

Supreme Court prayer ruling proves my grandmother was right about First Amendment – Fox News

Former coach wins court case over prayer

Former high school football coach Joe Kennedy and member of Kennedys legal team Jeremy Dys respond to victory at the Supreme Court in his case on Fox News @ Night.

NEWYou can now listen to Fox News articles!

When I read the U.S. Supreme Courts recent decision in Kennedy v. Bremerton School District, the one that allowed the school football coach to pray on the field after the game, I thought of my maternal grandmother, Minnie Manger. As I look back, it turns out that "Baba," as we called her, played a large part in the formation of my understanding of the religion clauses of the First Amendment.

Baba emigrated from Central Europe to the United States at the beginning of the last century in pursuit of religious freedom and economic opportunity. She found both in abundance here, and that is why Baba was one of the most patriotic Americans I ever knew. Her five children worked their way up the American ladder of economic opportunity. None of them went to college, but each of 10 grandchildren did and then went on to live successful lives that were unlimited by their Jewish faith or observance. In 2000, one of her grandsons was even nominated by the Democratic Party for vice president of the United States.

Baba was proud of all that family achievement, but I think she was most emotionally grateful for the religious freedom America gave her. She once told me that I probably could not appreciate how much it meant to her that on Sabbath when she walked to synagogue services in Stamford, Connecticut, instead of being the target of verbal abuse or worse, as she had been in the "old country," here her Christian neighbors would stop and say, "Good Sabbath, Mrs. Manger."

HIGH SCHOOL FOOTBALL COACH SCORES BIG WIN AT SUPREME COURT OVER POST-GAME PRAYER

Once during my youth, there was a local controversy in which a group of people protested the presence of a nativity scene in a public park near Babas house. She told me she did not understand the protest, explaining that the presence of that nativity depiction in the park clearly meant something spiritual to the people who put it up, and she respected that, but it did not in any way compromise the wonderful religious freedom she enjoyed in America. So why would she oppose it?

The Supreme Court is seen Wednesday, June 29, 2022, in Washington. (AP Photo/Jacquelyn Martin)

In that response, Baba captured what I believe is the meaning of the First Amendments religion clauses. If government action does not compromise freedom of religion, in any way, that government action is not prohibited. The Constitution promises freedom of religion, not freedom from religion. Therefore, it seems to me (and I think would to Baba if she were still alive) that because Coach Joseph Kennedys prayers after the game did not limit anyones freedom of religion or anyones freedom not to be religious,they were not an establishment of religion, as prohibited by the Constitution.

CLICK HERE TO GET THE OPINION NEWSLETTER

"Respect for religious expressions is indispensable to life in a free and diverse republic," Justice Neil Gorsuch wrote in his opinion for the Supreme Court majority. And he added (perhaps to reassure people that he was not establishing Coach Kennedys Christian religion but only protecting his right to pray) that if the Bremerton School System could fire the coach for his prayers on the field, "a school could fire a Muslim teacher for wearing a head scarf in the classroom or prohibit a Christian [or observant Jewish] aide from praying quietly over her lunch in the cafeteria."

CLICK HERE TO GET THE FOX NEWS APP

At law school, I was taught that over time Supreme Court decisions could slide on a "slippery slope" from what their authors intended to unacceptable applications. In his opinion, Justice Gorsuch has put up some strong roadblocks against such sliding, and we must, as always, depend on future Supreme Courts to understand that the great goal of the First Amendment is to protect freedom of religion, and that the prohibition of the establishment of a religion is in the Constitution to protect every Americans freedom of religion, not to banish religious expression from American life, as my Baba understood and taught me.

CLICK HERE TO READ MORE FROM JOE LIEBERMAN

Joseph Lieberman is chairman of United Against Nuclear Iran (UANI). He was the Democratic vice-presidential nominee in 2000 and a U.S. senator from Connecticut, 1989-2013.

Read more here:

Supreme Court prayer ruling proves my grandmother was right about First Amendment - Fox News

How The First Amendment Will Protect Us From Our Gun Crisis – Above the Law

Back in my day, I remember when The Church and The State at least pretended to operate in separate spheres. While you could debate over if the Pledge of Allegiance had us mouthing praise to a nation under a Christian God, it definitely wasnt under something secular like a Groove. In the olden times, the Elephant People espoused the importance of different spheres of action. It was a big selling point, actually. The state was supposed to make limited policy decisions that actually impacted people pave roads and maintain the prison population via the trifecta that is the War on Drugs, over-policing in communities of color, and strong on law and order rhetoric. Oh, and pardon turkeys. Presidents love doing that crap. The Church was supposed to do the rest: give thoughts and prayers, feed the homeless usually on the condition that they receive those thoughts and prayers, etc.

Now that the Supreme Court has made a bigger waste of the Establishment Clause than whatever amount of money Sony dedicated to making Morbius, things have gone topsy turvy. Given that the right to prayer includes pressuring people into being a part of your free exercise against their will, you should expect these once-separate spheres to coincide in strange ways. Like Former Education Secretary Bill Bennett forgoing law making and opting instead for the power of prayer to cull mass shootings.

Former Secretary of Education Bill Bennett, during aFox Newsappearance on Wednesday, suggested that expelling demons could be a way to cut back on mass shootings.

Bennett, who served as education secretary under President Ronald Reagan, weighed in on the function of red flag laws like those in Illinois that are designed to keep guns out of the hands of people who are deemed to be a danger to themselves or others.

Bennett, during hisFox News appearance, said parents, schools and police officers are among the people who can pay more attention to potential red flags for mass violence. But, you know, you may need an exorcist, too, he suggested. Bennett added that young men accused of mass shootings have deeply spiritual problemsIts a deeply spiritual void, I think, that these young men have in their hearts and their souls, and I think it needs to be addressed, Bennett said.

Finally, someone has the answers! It is not a good answer a bad one, even but it is one! And it is spreading like umm Im trying to make a metaphor about replicating bits of fish and loaves of bread. The juices arent flowing so please just take this Hail Mary and a tweet for good measure.

I think Louie is on to something. If prayer is the answer, it has to mean something drastic must be done. And quickly. Because prayer definitely wasnt enough to prevent a White supremacist from opening fire and killing nine churchgoers in the House of the Lord back in 2015. Or the 26 killed in a mass shooting at a San Antonio church. Or the three killed in at a church potluck. Or any one of the 314 mass shootings from this year.

Others have different solutions to Americas mass murder problem:

Although opponents of sensible gun controlthe kind that prevails throughout most of the civilized worldcontinue to put the spotlight on the shooters motivations or unstable mental states, these are cynical diversions from the one obvious truth: The common thread in all of the countrys revolting mass shootings is the absurdly easy access to guns. The science is clear: Restrictions work, and its likely that even more limitations would save thousands of livesMake protest signs. Start marching. Push lawmakers to finally break the partisan gridlock that has made moments of silence a regular observance. The National Rifle Association and its minions must be defeated. Its up to us because the victims of gun violence are tragically and devastatingly not here to protest themselves.

That said, Science.org is probably just some leftist fake media outlet anyway. All that data and peer-reviewed research aint nothing on our Second Amendment and a good Our Father. Prayer and policing doors are the only defense this country has against firearms, after all. And if you dont like it, you can get out.

Wildfire! Its spreading like wildfire! Why didnt I just say that earlier?

We Know What The Problem Is [Science]Fox News Commentator Implies Exorcists Can Curb Mass Shootings [Huff Post]

Chris Williams became a social media manager and assistant editor for Above the Law in June 2021. Prior to joining the staff, he moonlighted as a minor Memelord in the Facebook groupLaw School Memes for Edgy T14s. He endured Missouri long enough to graduate from Washington University in St. Louis School of Law. He is a former boatbuilder who cannot swim,a published author on critical race theory, philosophy, and humor, and has a love for cycling that occasionally annoys his peers. You can reach him by email atcwilliams@abovethelaw.comand by tweet at@WritesForRent.

More:

How The First Amendment Will Protect Us From Our Gun Crisis - Above the Law

The Supreme Court’s Looming Threat to First Amendment Law – Washington Monthly

Justice Clarence Thomas used to be the radical conservative outlier on the U.S. Supreme Court. Today, with the ascendance of a Trump-packed supermajority, he has become its senior voice, and his writings are harbingers of future rulings. His urging of a narrowing of press protections is a looming, if not yet imminent, threat.

Free press advocates cheered the Supreme Courts recent denial of a petition by Coral Ridge Ministries to challenge the First Amendment shield that, for more than 50 years, has constitutionalized defamation law and protected robust publishing concerning public figures. In February, former Alaska Governor Sarah Palins losing libel case against The New York Times for an allegedly defamatory editorial was similarly celebrated. But both of these cases were not close calls. Serious risks abound, augured by Thomass lonely dissent in the denial of certiorari in Coral Ridge. The appellate pipeline is full of cases presenting different fact patterns that could be used to reverse decades of press freedom. This is no time for complacency.

Since the 1964 landmark New York Times Co. v. Sullivan decision and its progeny, there has been a high legal standard to protect news coverage of government officials and other public figures. The law permits irresponsible reporting if there is no actual malicethat is, knowingly publishing a falsehood or recklessly disregarding the truth. It protects errors made in good faith, even those that cause grievous harm to an individuals reputation. It is this actual malice standard that Thomas wants to remove.

Expect an increase of well-funded litigation to stifle the media. Look for plaintiffs to file complaints in jurisdictions with friendly laws and judges who allow plaintiffs to discover defendants information, but not the reverse. Think variations of the tech billionaire conservative activist Peter Thiel bankrolling Hulk Hogans suit against Gawker, which destroyed the publication, satisfying Thiels vendetta against it. In Arizona, the Thiel protg Blake Masters is running for the U.S. Senate. He has threatened to bankrupt the independent, nonprofit Arizona Mirror using his mentors legal tactics.

Sometimes legal victories are less important than exciting your base. Winning can be measured by simply inflicting serious harm on media defendants, forcing them to bear burdensome costsnot just spiraling legal fees and increased insurance expenses, but the valuable time, sometimes stretching to years, of reporters, editors, and publishers, responding to massive discovery demands, lengthy depositions, and other exhausting pretrial preparation. To these plaintiffs, simply forcing stiff-necked executives and reporters to expose their private thought processes and open their newsroom kimonos to reveal flawed but not unlawful news-gathering and decision-making practices is a mark of success. If, in the process, other news organizations, large and small, are intimidated into making less courageous coverage decisions, so much the better.

Decades ago, media defendants would appeal losing verdicts. Today, with growing costs and uncertain outcomes, more settle. Remember Disney paying Beef Products Inc. more than $177 million to drop a $1.9 billion defamation suit against its ABC News subsidiary for its well-sourced investigation describing BPIs meat trimmings as pink slime. Few media outlets can respond effectively to vexatious lawsuits without strong protections from laws and judges. Even with legal protections, how many controversial stories are never pursued or are spiked for fear of retaliation? The chilling effects are obvious.

It takes four justices to grant a petition for review. Thomas insists that the Sullivan decision be overruled. Justice Neil Gorsuch, more nuanced, has urged that it be reconsidered. He is disturbed by the proliferation of unreliable new outlets unsupported by fact-checking and 24-hour cable news and online media platforms that monetize anything that garners clicks. In the past, Chief Justice John Roberts has also criticized aspects of Sullivan. Its not hard to imagine Justices Samuel Alito, Brett Kavanaugh, or Amy Coney Barrett signing on to hear a challenge to the case.

Depending on the facts involved, might Justice Elena Kagan provide another stepping-stone to granting review? The most promising area for revisiting the actual malice standard could come in a case featuring the sympathetic travails of a private figure drawn involuntarily into the public arena, a vortex or limited purpose public figure. Before joining the Court, Kagan wrote a 1993 law review article about Sullivan Then and Now. In it, she expressed concern about the fate of a relatively powerless individual with little societal influence and few avenues of self-protection. Think about much-maligned rape victims or bereaved survivors like the Sandy Hook parents. Could a victim of social media character assassination who has no legal recourse, because voluntarily going online makes her a public figure, provide a way to adjust the current standard?

The First Amendment scholars RonNell Andersen Jones and Sonja West have tracked years of increased negativity toward the press and warn that the Court is no longer a bulwark. Freedom of the press as a specified recognizable liberty, they wrote, has rhetorically all but disappeared. They added that the Court is giving much less consideration to the press and its freedom than it did a generation ago, and increasingly does not think well of it.

If it considered a challenge to Sullivan, the Court could take modest steps, including narrowing the definition of a public figure. It could act more broadly, overturning long-established precedent, and unintended consequences be damned.

Changes to defamation laws require delicate calibration. Some of Gorsuchs legitimate concerns about todays media environment might be better addressed through legislation, but that assumes a wise Congress. In 2010, Congress unanimously passed the SPEECH Act to protect against libel tourism. It made foreign libel judgments unenforceable unless that jurisdiction provided at least as much protection to the defendant as our First Amendment. In 2015, a bipartisan effort failed to create a level playing field to protect free speech on matters of public concern against meritless SLAPP suits that allege defamation but are designed only to harass and financially burden defendants.

Section 230 of the 1996 Communications Decency Act provides immunity for technology companies for content hosted on their networks. That law was created in a time of nave optimism about a nascent industry. Despite bipartisan support for amending it, there is no consensus on how to do that.

Years ago, the First Amendment champion Anthony Lewis urged the creation of a legal forum to establish the truth when a person claims to have been libeled. A successful plaintiff would receive no damages. Instead, there would be a formal declaration that the defamatory statement was false and a judicial order that the publisher print a correction. Where the only issue is determining truth or falsity, there would be no need to probe a publishers state of mind or unearth details of an organizations work practices.

A University of Iowa study concluded that most libel plaintiffs sue not for money but to vindicate their reputations. A 1985 bill providing a declaratory judgment remedy that limited the defamation inquiry to falsity was filed in Congress but died quietly. In todays Orwellian world, where many members disagree on what facts and truth even mean, such First Amendment legislation is a nonstarter.

To make matters worse, surveys by the Freedom Forum, Gallup, and others reveal that trust in the news media is virtually as low as it has ever been. Studies find that majorities of Americans believe the news media are biased, uncaring, and try to cover up their mistakes. Today only 14 percent trust journalists, and 41 percent say journalists threaten the First Amendment. Indeed, only 4 percent say press freedom is the First Amendment right they consider essential. PBS is the one media outlet trusted by more than 25 percent of Americans. And while social media companies are overwhelmingly disparaged, most young people, disturbingly, get their news from them. Such public distrust will surely encourage congressional and judicial mischief.

This is a far cry from the days when journalists reporting on southern brutality toward civil rights demonstrators were heroes, and others basked in a post-Watergate afterglow. Free press advocates overconfident about recent high-profile failed defamation lawsuits against media targets are missing the rest of the story. A lot of work must be done to be optimistic about the future.

See the rest here:

The Supreme Court's Looming Threat to First Amendment Law - Washington Monthly

New Arizona Law Will Make it Illegal to Film Within Eight Feet of Police – Reason

Arizona Gov. Doug Ducey, a Republican, signed a bill into law Wednesday that will make it illegal to film the police within eight feet.

The legislation, H.B. 2319, makes it a misdemeanor offense to continue filming police activity from within eight feet of an officer after receiving a verbal warning. The bill originally restricted filming the police from no closer than 15 feet away, but it was amended after criticisms.

There are also exceptions for filming the police in a private residence, during a traffic stop, and for the subject of a police encounter. But the law qualifies those exceptions, saying they apply only if the person recording is "not interfering with lawful police actions," or "unless a law enforcement officer determines that the person is interfering in the law enforcement activity or that it is not safe to be in the area and orders the person to leave the area."

Interfering with police, or obstruction of justice, is one of the most frequently cited justifications for frivolous and retaliatory arrests.

The American Civil Liberties Union (ACLU) of Arizona opposed the legislation, saying it "lacks specificity and gives officers too much discretionmaking it the bill more apt to protect bad cops who want to hide misconduct than those who are doing their job properly with a bystander recording nearby."

The bill's sponsor, state Rep. John Kavanagh (RFountain Hills), wrote in a March op-ed that he introduced it "because there are groups hostile to the police that follow them around to videotape police incidents, and they get dangerously close to potentially violent encounters."

"I can think of no reason why any responsible person would need to come closer than 8 feet to a police officer engaged in a hostile or potentially hostile encounter," Kavanagh wrote. "Such an approach is unreasonable, unnecessary and unsafe, and should be made illegal.

T. Greg Doucette, a criminal defense attorney who also specializes in free speech law, told Reason in February that there are constitutional problems with the law.

"Can you be arrested for standing still while wearing a GoPro under this statute?" Doucette asked. "It seems the answer here is yes, which would violate the First Amendment (since standing still isn't interfering with an officer's duties)."

The First Amendment right to film the police has been upheld by several federal appeals courts, as Reason's Billy Binion has reported:

The right to film government officials in public has been at the center of a slew of legal challenges over the last few decades. And several federal appeals courtsincluding the 1st, 3rd, 5th, 7th, and 11th Circuitshave ruled that it is indeed an activity protected by the First Amendment.

It was also established in the 9th Circuitwhere Arizona is locatedalmost 30 years ago, in a 1995 decision where the court ruled that a cop violated the Constitution when he physically sought to stop a man from videotaping a public protest in 1990.

The National Press Photographers Association, joined by numerous media outlets and press freedom groups, issued a letter in February opposing the bill. They declared that the legislation"violates not only the free speech and press clauses of the First Amendment, but also runs counter to the 'clearly established right' to photograph and record police officers performing their official duties in a public place."

While civil liberties groups say recording the police is both protected and crucial for government accountability, lawmakers in some states have been trying to make it harder for citizens to do it. In addition to Arizona, the South Carolina and Florida legislatures have also introduced bills over the past two years to restrict the ability to film the police.

State legislators should be less concerned with cops' feelings and more concerned about citizens' right to document how armed government agents go about their business. Giving officers another discretionary offense to slap on someone who annoys them will lead only to more confusion and more censorship.

See the article here:

New Arizona Law Will Make it Illegal to Film Within Eight Feet of Police - Reason

A woman who won’t back down: The First Amendment is alive and well in Michigan – Daily Kos

Carravallah is many things. Shes a mother, a wife, a friend, a daughter, a sister, and an American who, like anyone else who calls the United States home, enjoys the protection of the First Amendment right to free speech.

When she posted signs in her yard, she started documentingit on thesocial media app TikTok and in her videos, she is seen smiling at her husband who isfilming while she paints and while music is played on a loopfrom her front porch. The music Carravallah played to accompany her signs after Roe fellwas the unapologetic song currently trending for content creators on TikTok by artist Leikeli47. It features thedeclaration: Its my pussy I can do what I want, Im a big girl now.

The police were called to Carravallahshome, and a trio of officers warnedher that she could be cited for disturbing the peace though she is legally permitted to play music from her home in herneighborhood from 7 a.m. to 11 p.m.One neighbor on her blockcalledthe police on hertwice in 24 hours. Another neighbor called once.Police have visited her home multiple times since the signs went up.

Carravallah had less than 1,000 followers on the app before her post on June 27. She now has 53,000 and counting andher initial post has since racked up over 1 million views.

Other videosthat followed have gone viral too, including one postwith over 5 million viewswhere Carravallah is seen skipping whimsically on her sidewalk while holding a protest sign. Text overlaid at the bottom of the video states: Me on my way to paint a sign that says well see how you really feel about abortion after I f*ck your husband.

Carravallah is aware that her language is strong. But she makes no apologies for it and believes she is speaking out on a matter ofpublic concern and on an issue that has now infringed the rights of millions, including rightsto religious freedom.

I have a sister-in-law who is Jewish and this rulingnow, for Jewish girls in states with trigger laws, means their freedom of religion is being impeded, she said.

Under the Jewish faith, feelings on abortion are not a monolithbut overwhelmingly, the right to abortion access is acceptedas a value of the religious tradition and especially when there is a threat to themothers life. With Roe overturned, some Jewish organizations are pushing back by launching lawsuits challenging the ruling while othersdid sobefore the high courts decision was issued. TheCongregation L'Dor Va-Dor in Boynton Beach, Florida, for example, sued in early June, saying that Floridas 15-weekabortion ban signed by Governor Ron DeSantis this April "discriminates against Jews, the mentally ill and those who do not share the views of fundamentalist Christianity."

Carravallah is deeply disturbed by the Christian religious doctrine she believes now fiercely grips the court.

So, Ill put a sign up that says Fuck your god if your god is going to do this to women and girls in my country. Then you can look at my sign. You can all look at my sign. Everybody can look at my sign, she said.

Beforethe Supreme Courts ruling last month, Carravallah described her relationship with her neighbors in hermiddle class suburban community as amicable and warm. She was just another mom on the block who, on occasion, would receive invites to join her neighbors for friendly gatherings that she happily attended.

Her protest changed that.

And her decision to document her experience on TikTok hasgenerated a flood of hateful messages towards her online and other forms harassment likethe doxxing of her address.

When she first putup the signs, Carravallah told Daily Kos, no one on her block was around or outside. But in short order, she said, neighbors who opposed the language started showing up andstanding around to record her. This went on for multiple days and the hate started to flow onlineforcing Carravallah to field a deluge of character attacks on her as both aperson and mother. She documented multipleattempts to doxx her personal address.

Undeterred, Carravallah kept recordingher protest and the accompanying police response, as well her neighbors response on TikTok for a few days.

Then she received a notice in the mail. A petition for a personal protective order, or, in lay terms, a restraining order, something typically used to prevent stalking.The order was filed by a neighbor in an attempt to havethe mother of three remove hersigns featuring therisqu language and to stop appearing outside of her own home to protest.

Carravallahseeks to terminate that order, arguing she has at least one right not yet overturned by the high court: The First Amendment.

And now the American Civil Liberties Union has stepped in to help.ACLU cooperating attorneys Mark and Allison Kriger and ACLU senior staff attorney for ACLU of MichiganPhilip Mayorare representing Carravallah.

In a phone interview this week, Mark Kriger told Daily Kos he was confident Carravallah is perfectly within her rights and helped herfile amotion to dismiss the restraining order. And if they lose that fight, he said, they will appeal.

All of the activity Amanda engaged in was protected under the First Amendment, Kriger said beforenoting several precedents established both in the state of Michigan and in the Supreme Courts1971 ruling, Cohen v. California.

In that case, Paul Robert Cohen, a young person opposed to the Vietnam War,entered a courtroom in Los Angeles in 1968 sporting a t-shirt that proclaimed: Fuck the Draft! Stop the War!.

He was arrested and charged with disturbing the peace. Cohen served 30 days in jail after being convicted. He appealed the ruling but lost aftera California appellate court found it reasonable to presume that his clothing could spark violence. But when the states supreme court refused to hear his appeal, Cohen ran it up another rung to the U.S. Supreme Court.

In an opinion led by then-Justice John Marshall Harlan, Cohensconviction was overturned in a 5-4 decision.

One mans vulgarity is anothers lyric, Harlan famously wrote in the ruling.

Harlanadded:Government officials cannot make principled distinctions in this area that the Constitution leaves matters of taste and style so largely to the individual.

Like Cohens, Carravallahs languagewas provocative, too. But there is no supporting evidence to suggest her protest poses a threat or something worse, according to Kriger.

Kriger said he believes her case is doubly strong against any would-be challengers because all of the perceived vulgarity was confined to the borders of her own property.

Shes speaking on a political issue that has occupied the consciousness of this country for 50 years now and I think the Michigan courts have consistently ruled this is a First Amendment-protected activity, he said.

One of those cases isa 2018 matter decided by the Michigan Court of Appeals known as TM vs. MZ.

Two politically-minded neighbors with an acrimonious past tangled with each other online after a falling out. One of the defendants, identified only as MZ, postedan onslaught of accusations in public onlineforums about TMs family, character, parenting abilities, alleged drug use andcriminal past and more. MZ even went so far as to publicly accuse TM of child abduction and made derogatory comments about TMs son who had recently died.

TM filed a personal protective order, alleging stalking and threats tolife.Theprotective order was initially granted and it featured a stipulation that MZ bebarred from making any further comments targeting TM. But MZ appealed, arguing that the neighbors annoyance didnt rise to the level of defamation as allegednor was there any evidence to suggest that real violence was being threatened.

We do not disagree with [TM] or the trial court that [MZ]s statements often were inappropriate, at times crude, and even sometimes, with respect to the death of [TMs] son, offensive, wrote Michigan Court of Appeals JudgePeter Riordan. Inappropriate, crude and offensive language, however, is not necessarily excepted from constitutional protection. For that reason, we cannot addopt the trial courts preference to treat a [personal protective order], which in this case is a prior restraint on [MZs speech], as a means to help supplement the rules that we all live in a society by. The First Amendment of the United States Constitution demands that we not treat such speech-based injunctions so lightly.

And then theres people like Leo Weber, Carravallah recalled, a onetime mayoral candidate in Livonia, Michigan.

In 2020, Weber, a supporter of former President Donald Trumps, posted anti-LGBTQsignage on his front lawn with full blown slurs. The signs read: Fags R Sicko and Fags R Evil See Gen. 18.20 Sodom & Gomorrah. If I catch you, I will kill you!

Neighbors upset by the signs complained to local police and wereinformed that Weber could leave them up because they were not targeting a specific person by name and therefore, were protected under the First Amendment. Livonia Mayor Maureen Miller Brosnan publicly condemned Webers signs but acknowledged she could not force him to remove them. There was not any city ordinance in place that could stopWeber from writing exactly what he did. Another ordinance that forbade an excess of signage in the front yard could curb some of WebersFirst Amendment activity, but not all of it.

An ACLU staff attorney at the time, Jay Kaplan, urged the city to denounce Webers signs publicly since they couldnt be removed and further asked local police to emphasize publicly that violence towards members of the LGBT+ community would not be tolerated.

After Carravallah went viral on TikTok, her video was seen by Rep. Debbie Dingell, a Michigan Democrat. Dingell shared it withfellow Michigan lawmaker and Democrat Rep. Rashida Tlaib.

Carravallahs joy in the video, dancing in her pink bathing suit, was more than palpable, Tlaib told Daily Kos in a phone interview.

The first thing I thought, especially when you take such a courageous position in your community and your neighbors and folks are obviously in disgareementyou know, Ive been thereI didnt want her to feel alone, Tlaib said.

Tlaibs staff did some digging and found Carravallah, who is one of her constituents.

Shes amazing. She very much believes this is her absolute right, especially because this is her home and her property, Tlaib said. This is her way of standing up for the right to control her body and say it.

Tlaib is an attorney as well as lawmaker and is well versed with how protest functions.

I know for a fact she has a constitutional right to express herself in this way. Whats disturbing is we know of previous incidents where folks were vulgar, putting up signs that were hateful and full of divisive language and so forth. Here she is just saying, absolutely not, this is my body, I have a right to do this, Im upset, and its still coming from a place of joy, Rep. Tlaib said.

On Friday, President Joe Biden issued an executive order instructing the Department of Health and Human Services to protect access to reproductive health care services like abortion. On its face, the order vows to safeguard and expand access to abortion and emergency contraceptives. Itcalled too for privacy rights to be protected for those who use period tracker appsand called for the creation of a task force that would involve multiple agencies including the Department of Justice. Bidencalled on Congress to codify Roe but that is an uphill battle with a bleak future for now.

Tlaib said she wants the nation to move with urgency because there are lives, here and now, on the line.

This has already created a crisis where women will die if they dont have access to abortion care. So I hope we understand thatthis is about saving lives. Again, I dont onlywant, obviously, statements around executive orders but implementation. Weve got tomake sure that whatever the intent here is, and I know its well-intended, that we make sure folks on the ground understand that, she said.

In Michigan, one of the states largest health care institutions known as BHSH System, told its employees after Roe was overturned that it would only provide abortions to save the life of the mother per a 1931 state law that solely permitted abortions in this instance.

But within 48 hours BHSH backpedaled, saying it would reinstate abortions whenever medically necessarybecause there were still legal questions floating around about the 1931 law.

The law is not in effect and abortion is still legal in Michigan, according to Governor Gretchen Whitmer and Michigan Attorney General Dana Nessel. County prosecutors opposed to abortion have vowed to see the 1931 ban enforced.

But a push to see the right to abortion access locked into the states constitution has gained huge traction. An initiative in Michiganknown asReproductive Freedom for All is on track to appear on ballots this November after amassing nearly 800,000 signatures as of July 8.That ballot initiative, if activated,would repeal the 1931 abortion ban and is widely considered to be a record-breaking petition in the state.

Tlaib praised Governor Whitmer, who, she said,did not even hesitate to use the courts to make sure that shes protecting the women in our country and those who can get pregnant.

As for Amanda Carravallah, Tlaib said she is proud of a constituent who has refused to be cowed and has expressed herself peacefully in the process.

Carravallah is part of the movement to protect the rights of her fellow Americans and it doesnt begin or end with what happens at a federal level, but what happens on a local level, the lawmaker said.

What we have access to in our democracy is self-determination, Tlaib said.Amanda does not deserve to be bullied orintimidated by those that disagree with her. We are a democracy. We have diverse opinions. People have shared values but they also have different kinds of interpretations of those values. But Ill tell you this, Amanda doesnt deserve the kind of treatment shes been getting in her community. If anything, folks should welcome that kind of engagement in our country because not every country allows this kind of freedom of expression and we have to protect it.

Read the rest here:

A woman who won't back down: The First Amendment is alive and well in Michigan - Daily Kos

1A Remaking America: Is It Time For A 28th Constitutional Amendment? : 1A – NPR

The 19th Amendment was ratified 100 years ago this week. ANDREW HARNIK/POOL/AFP via Getty Images hide caption

The 19th Amendment was ratified 100 years ago this week.

America wouldn't be the country it is today without its 27 constitutional amendments.

It was these later additions to the founding document that ended slavery in the U.S. and granted Americans the right to bear arms.

It also protected the right for a show like ours to existand gave us our name1A, after the First Amendment.

But the last time a new one was added was 30 years ago.

We'll hear from the person who got the 27th amendment ratified later. But the push to add a 28th is happening now. We hear from one of those voices too.

Three-fourths of the states must ratify an amendment before it gets added to the Constitution. In today's divided nation, could any issue realistically gain that level of support?

Russ Feingold, Aziz Rana, Zakiya Thomas, and Gregory Watson join us for the conversation.

This conversation is part of our Remaking America collaboration with six public radio stations around the country. Remaking America is funded in part by the Corporation for Public Broadcasting.

Like what you hear? Find more of our programs online.

See more here:

1A Remaking America: Is It Time For A 28th Constitutional Amendment? : 1A - NPR