US distrust of Huawei linked in part to malicious software update in 2012 – The Register

Suspicions about the integrity of Huawei products among US government officials can be attributed in part to a 2012 incident involving a Huawei software update that compromised the network of a major Australian telecom company with malicious code, according to a report published by Bloomberg.

The report, based on interviews with seven former officials, some identified and some not, says that Optus, a division of Singapore Telecommunications Ltd., had its systems compromised through a malicious update in 2012 a claim the company disputes.

"The update appeared legitimate, but it contained malicious code that worked much like a digital wiretap, reprogramming the infected equipment to record all the communications passing through it before sending the data to China, [the sources] said," Bloomberg's report explains.

After several days, the snooping code reportedly deleted itself, but Australia's intelligence services decided China's intelligence services were responsible, "having infiltrated the ranks of Huawei technicians who helped maintain the equipment and pushed the update to the telecoms systems."

Australian intelligence is said to have shared details about the incident with American intelligence agencies, which subsequently identified a similar attack from China using Huawei hardware in the US.

The report seeks to provide an evidentiary basis for efforts by the US and other governments to shun Huawei hardware amid global 5G network upgrades and to give that business to non-Chinese firms.

Notably absent is any claim that Huawei leadership knew of this supposed effort to subvert Optus' network. "Bloomberg didnt find evidence that Huaweis senior leadership was involved with or aware of the attack," the report says.

In short, the claim is that China's intelligence agencies compromised an Australian network by placing agents within Huawei, an ongoing risk for any number of prominent global technology firms.

China has denied "Australia's slander." It's perhaps worth noting that The Register is unaware of any nation owning up to recent intelligence activities. Even Russian President Vladimir Putin, faced with compelling evidence unearthed by investigative news service Bellingcat of the FSB's attempt to poison political opposition leader Alexey Navalny, denied that Russian agents had anything to do with Navalny's near-fatal poisoning.

But the statement from China's Ministry of Foreign Affairs is unusual in that it suggests mutual guilt more than wounded innocence: "Australias slander on China carrying out cyberattacks and espionage penetration are purely a move like a thief crying to catch a thief."

In other words, everyone spies and Australia has poor manners to air its grievances in public. Consider that the US National Security Agency by 2010 had already penetrated Huawei's network to spy on founder Ren Zhengfei and associates, based on prior concern that Huawei could create backdoors in its equipment. That's according to documents made available by former NSA contractor Edward Snowden.

The Register asked Huawei to comment and a spokesperson provided us with a copy of the remarks John Suffolk, Huaweis global cybersecurity officer, offered to Bloomberg.

"[W]ithout specifics, it is not possible to give you a detailed assessment as each operator is different," said Suffolk in an emailed statement. "It is fanciful to suggest that 'Huawei's software updates can push whatever code they want into those machines, whenever they want, without anyone knowing.' It does not work that way."

"It is fanciful to suggest engineers can reprogram the code as they have no access to source code, cannot compile the source code to produce binaries and the binaries have tamper proofing mechanisms within them. We are leaders in encouraging governments, customers and the security ecosystem to review our products, look for design weaknesses, provide feedback on vulnerabilities or poor code examples and it is this openness and transparency that acts as a great protector."

"Finally no tangible evidence has ever been produced of any intentional wrongdoing of any kind."

But this isn't about evidence presented in a public forum or court room. Huawei is not on trial, at least in this context.

Yes, there was that dustup with its CFO, resolved to avoid a serious diplomatic row, the US government's trade secret theft lawsuit against Huawei based on T-Mobile's civil lawsuit, and claims that Huawei screwed over a California IT consultancy and backdoored a network in Pakistan.

Even so, Huawei's guilt or innocence as it applies to helping China spy is largely irrelevant. As far as the US is concerned, Huawei can't be trusted because the Chinese government could, in theory, make demands the company could not refuse. The feds are worried about precrime, to use the terminology of Philip K. Dick's Minority Report, a story about a police unit that apprehends people predicted to commit crimes.

The US Federal Communications Commission recently used future concerns, alongside past behavior and secret accusations, to ban another Chinese firm from operating in the US. In October, the FCC announced that China Telecom Americas could no longer do business in America. The agency said it based its decision [PDF] partly on classified evidence provided by national security agencies.

But it also said "the totality of the extensive unclassified record alone" was sufficient to justify its decision. The agency concluded that China Telecom Americas could potentially be forced to comply with Chinese government requests and company officials have demonstrated a lack of candor and trustworthiness to US officials.

And trust is key. The changeable nature of software and the possibility of concealed hardware functions make it inherently risky to accept IT systems from untrusted sources. The risk can be mitigated through source code inspection, auditing, and other precautions, but not completely.

Trust is an issue for everyone involved. In February, Bloomberg followed up on its controversial 2018 report of covert spy chips with word that similar snooping hardware was found in 2015 on the motherboards of servers made by US computer maker Supermicro, a claim the company disputed. The Register at the time spoke with a former executive at a prominent chip making firm who insisted such devices exist and that he'd personally held some of them. We trust our source but still, more concrete proof would be nice.

In retrospect it seems obvious any intelligence agency with enough funds and know-how would want such a thing. And it's difficult to believe no one has ever successfully deployed a surveillance chip or backdoored a system destined for a geopolitical rival. But the absence of samples that have been publicly dissected and analyzed means again, we're left to interpret national-state shadowplay with hints and whispers.

Coincidentally, this state of affairs where lack of trust means nation-based IT stacks works just fine for companies based in the countries where they can make claims about spying behind closed doors and see government funding that puts their products in the place of ousted competitors.

We can only imagine the cheer that went out among network switch vendors when the FCC announced it would pay US telecom providers to rip and replace their Huawei gear. And given the ways in which China has tilted its market toward local firms, it might be fair to say turnabout is fair play, if anyone were actually concerned about fair play.

Read the original:

US distrust of Huawei linked in part to malicious software update in 2012 - The Register

Why Fears Of A Government Crackdown On Bitcoin Are Overrated – Forbes

TOPSHOT - A woman buys in a store that accepts bitcoins in El Zonte, La Libertad, El Salvador on ... [+] September 4, 2021. - The Congress of El Salvador approved in June a law that will make bitcoin legal tender in the country from September 7, with the aim of boosting its economy although analysts warn of a negative impact. (Photo by MARVIN RECINOS / AFP) (Photo by MARVIN RECINOS/AFP via Getty Images)

A consistent thread about bitcoin has been that if it succeeds, it will inevitably invite government legislation and regulation to shut it down. This has been a backhanded critique of sorts advanced by investors like Ray Dalio who are on bitcoins side, but worry about its success attracting the attention of the state powers that be.

This isnt an altogether surprising or irrational fear. We live centuries after the establishment of the nation-state as all-powerful welfare state, military, and taxation hub. Its clear that state powers are often only reined in by political constraints (rather than physical or technical ones). Could governments shut down bitcoin if they wanted to?

This is probably a lot harder than one might think. Bitcoin is somewhat resilient to government crackdowns because of its origin, and the way the network is built. While states, if focused enough, could probably inflict some damage to bitcoin if it was a central state objective across the board, there are many factors for why a government crackdown on bitcoin is overrated for destroying the network.

Since bitcoin is internationalized, it would require consent and coordination among almost every nation-state in order to effectively crack down on bitcoin. While the major world powers (such as the United States and China) have a bloc-like effect, and whereas there has been more coordination (often US-led) on issues such as climate change and corporate tax rates, when you look at issues as diverse as COVID-19 and the tit-for-tats of strategic rivals and Olympic boycotts it is still difficult to see countries focusing on bitcoin in unison.

Large-scale coordination would be required to shut down the network in any meaningful way: otherwise, people could transact and support the bitcoin network in other nations or even in space. A slow nation-by-nation ban can affect the network: at an extreme, an unlikely state-led ban in the United States might choke off bitcoin from American-led financial systems and markets with near-total global reach. Yet, so long as bitcoin was trans-actable across other states, a global ban could not be accomplished nor a government crackdown.

One of the most unique points about bitcoin is that there is no central leader figure to pin down. Satoshis disappearance, and Hal Finneys untimely death, have led to a situation where there isnt a company CEO or some other central leader to go after. While there are pressure points nation-states can use to pursue their objectives (for example, physical concentration of miners, key technical contributors still constrained by borders), there isnt a central one, but rather a set of diffused ones. We saw this when the Chinese state banned bitcoin mining in its territory: did that spell the end of bitcoin? No: miners simply shifted their equipment elsewhere, and within a few months, hash rate was as high if not higher than what it was before.

States are not used to dealing with organizations like this: they are used to dealing with multinational corporations to a certain extent, but there are usually a set of central pressure points and leadership that a state can lean on to get that corporation to adhere to certain rules and regulations. That, due to bitcoins unique creation story, is very unlikely to happen with any attacks on the bitcoin network.

In the United States, code is regarded as protected speech software source code which powers bitcoin is protected by the First Amendment. In order to attack the distribution of code that powers bitcoin, countries like the United States would have to fundamentally change themselves and subvert long-held covenants of limited powers and the rule of law. This is not impossible (bitcoin, over a decades and even centuries long time horizon is a bet that (some) technical constraints are better than purely political ones for maintaining rule of law) but would be very out of character, and probably politically untenable.

The Internet may never have been encrypted at all export controls were initially placed on encryption, and commercial uses were seen skeptically. However, states partially relented when the commercial possibility of the Internet became clear. Now encryption powers communications as well as online banking and e-commerce sales. This is not something states like: the Five Eyes and allied countries want to subvert end-to-end encryption and authoritarian states like the Chinese state either have backdoors or other mechanisms to promote social control. Yet it shows that, when faced with something that might threaten national security, the need for states to show GDP outcomes and to deliver wealth to their peoples might override their preferences in other areas.

As more and more countries adapt bitcoin in some fashion, this pressure will become larger until perhaps one day, we might see a bitcoin-friendly bloc of nations emerge similar to the Cairns Group for agriculture. Some will find that their domestic power-generation is more efficiently parsed through open-source bitcoin rather than supporting the fractional reserves of other countries. The more states are turned over to supporting the bitcoin network, the harder it will be for other states to attack it.

The way bitcoin is implemented makes it (more) prohibitive for any centralized collection of computers to disrupt the system.

With more than 170,000 PH/s of hash rate securing the system (as of the date of writing) from a coordinated 51% attack (where an attacker could take over the system and propogate invalid spends in order to down the system for legitimate users, or to benefit monetarily from it), a projected security budget of around $45-60mn a day, and enough stakeholders (from investors, code contributors, analytics firms, miners and businesses and now governments that accept bitcoin) who have placed their financial livelihoods on monitoring the chain such that bitcoin could be secure beyond its fundamental dynamics bitcoin is large enough to warrant significant resources for any attack, resources that wouldnt be available for just any nation-state, and which would have to be continually deployed in a way that would make it hard to obscure who the attacker was.

-

We live in a heady time where magic Internet money has suddenly become the concern of Clausewitz readers around the world. As bitcoin grows more prominent, the possibility that it attracts state powers to disrupt or fully coopt it grows yet those who play some part in the network, either from investing, transacting or supporting its infrastructure, can rest assured that the system has some inherent properties that make it more resilient than you might expect to even the strongest of attacks.

Read the original post:

Why Fears Of A Government Crackdown On Bitcoin Are Overrated - Forbes

Microsoft adds end-to-end encryption to Teams – TechTarget

Microsoft has released end-to-end encryption for one-on-one Teams calls, adding a feature already offered by competitors Zoom and Webex.

Microsoft this week made E2EE generally available to Teams users on Windows and Mac computers, allowing workers to secure calls so only the participants have access to the content. Usually, Teams secures data through Transport Layer Security encryption, in which data can be decrypted in Microsoft's cloud before being re-encrypted and sent to the intended recipient.

Because E2EE removes Microsoft's ability to access meeting data, customers' employees can't use cloud-based services when using the feature. The company said workers would be unable to record, capture or transcribe meetings while E2EE is on. Transferring calls, merging calls, adding a meeting participant and moving calls onto another device will not work either.

The feature is more limited than the E2EE offered by Microsoft competitors. While Teams E2EE calls are limited to two workers, Zoom and Webex allow encrypted meetings with multiple participants.

E2EE will make Teams more attractive to customers in highly regulated fields, like government, military, healthcare and finance.

"[E2EE] comes up where it's mandated that you must have [meetings] encrypted end to end," said Tom Arbuthnot, an IT architect at systems integrator Modality Systems. He added that most organizations are unlikely to use the E2EE for typical staff meetings, however. "It's really a pretty niche requirement."

Administrators need to enable E2EE before workers can use it. Once IT configures its encryption policy, employees must activate the security feature in their Teams settings. According to Microsoft, IT retains the ability to disable E2EE at any time.

E2EE for video conferencing became a hot topic after the pandemic made Teams and Zoom household names. In 2020, individual users filed a class-action suit against Zoom, claiming the company did not provide E2EE as advertised. Zoom settled the lawsuit and a Federal Trade Commission complaint about its E2EE marketing. It later added the feature to its service in October 2020.

In other Teams news, Microsoft has improved search in the service to help users find the information they want more effectively. The redesigned search lets people choose whether they're looking for a chat message, file or person within the company. Workers can specify by date and the people involved and exclude messages from apps and bots.

It can be challenging to find information in Teams, Arbuthnot said. In chat, a flood of messages can quickly bury a needed attachment.

"[Teams search] wasn't the best, to be honest," he said. "There's so much data, so finding the exact thing you need was challenging."

Microsoft also plans to improve its Teams Rooms conference-room product next year to bridge the gap between in-office and remote meeting attendees. A new layout will place remote workers at eye level and let those in the room see the meeting chat and which participants have raised their hands to speak. Microsoft plans to release the layout, called front row, in January.

Zoom and Cisco's Webex have introduced features to level the playing field for hybrid work. Zoom's Smart Gallery and Webex's People Focus place conference-room participants in individual video frames to allow remote workers to read body language and nonverbal cues readily.

Providing an equal experience for at-home and in-office workers will be the most prominent video conferencing problem of 2022, said Bob O'Donnell, founder of Technalysis Research. He added that he expects it will take some time before vendors fix it.

"The experience of having some people remote and some in the room is pretty bad right now," he said. "It's incredibly hard to do well."

Many workers will just bring their laptops into conference rooms and individually join meetings until room-based systems provide parity, O'Donnell said.

Mike Gleason is a reporter covering unified communications and collaboration tools. He previously covered communities in the MetroWest region of Massachusetts for theMilford Daily News,Walpole Times,Sharon AdvocateandMedfield Press. He has also worked for newspapers in central Massachusetts and southwestern Vermont and served as a local editor for Patch. He can be found on Twitter at @MGleason_TT.

See the rest here:
Microsoft adds end-to-end encryption to Teams - TechTarget

We Now Know What Information the FBI Can Obtain from Encrypted Messaging Apps – Just Security

What user data can U.S. federal law enforcement obtain from providers of encrypted messaging services? A recently disclosed January 2021 document from the Federal Bureau of Investigation (FBI) supplies a concise summary with respect to nine different secure messaging apps. It shows that with legal process, the FBI can get various types of metadata, and in some cases even stored message content. Exactly whats available, though, varies widely by app. The one-page document should give useful guidance to privacy-conscious people including journalists, whistleblowers, and activists while also helping to dispel misconceptions about the FBIs surveillance capabilities (or lack thereof) in the encrypted messaging context. Kudos to government-transparency nonprofit Property of the People (POTP), run by FOIA guru Ryan Shapiro and indefatigable lawyer Jeffrey Light, for obtaining this record under the Freedom of Information Act.

Dated Jan. 7, 2021, the document states that it reflects FBI capabilities as of November 2020. The apps included in the chart are iMessage, LINE, Signal, Telegram, Threema, Viber, WeChat, WhatsApp (owned by Meta, fka Facebook), and Wickr (which was acquired by AWS in June). Most of these appsiMessage, Signal, Threema, Viber, WhatsApp, and Wickrend-to-end encrypt messages by default. As for the rest, Telegram uses default end-to-end encryption (E2EE) in some contexts, but not others. E2EE is on by default in newer versions of LINE, but it may not be turned on in older clients. And WeChat, owned by Chinese giant Tencent, does not support end-to-end encryption at all (just client-to-server encryption). This variance may explain why the document refers to the apps as secure instead of E2EE.

What User Data Can the FBI Get?

The chart illuminates the variation in how much data different services collect and retain about users and their communicationsand consequently, what data theyll provide to law enforcement given a valid warrant, subpoena, or court order. (Think, for example, about a warrant asking for all records in a providers possession pertaining to a user: the more information it retains about its users, the more it can be required to provide to law enforcement.) This ranges from the minimal information available from Signal and Telegram, to the basic subscriber information and other metadata that several services disclose to the FBI, and even limited stored message content from three of the nine apps: LINE (which, as said, still supports non-E2EE chats), iMessage, and WhatsApp.

That last part may come as a surprise to some iMessage and WhatsApp users, given that were talking about E2EE messaging. True, E2EE renders users messages inaccessible to law enforcement in transit, but its a different story for cloud storage. If an iMessage user has iCloud backups turned on, a copy of the encryption key is backed up along with the messages (for recovery purposes) and will be disclosed as part of Apples warrant return, enabling the messages to be read. WhatsApp messages can be backed up to iCloud or Google Drive, so a search warrant to one of those cloud services may yield WhatsApp data including message content (although a search warrant to WhatsApp wont return message content). (WhatsApp recently started rolling out the option to E2EE message backups in the cloud, rendering the FBI chart slightly out-of-date.)

While its possible to piece together some of the information in the chart by scouring app makers public documentation and courts criminal dockets, the FBI conveniently pulled it into one at-a-glance page. It might be old news to you, if you happen to be familiar with both the law governing electronic communications privacy and the technical nuances of your encrypted messaging app(s) of choice. That may describe a lot of Just Security readers and government surveillance beat reporters, but it probably doesnt reflect the average users mental model of how an E2EE messaging service works.

The chart also reveals details that app makers dont talk about forthrightly, if at all, in their public-facing guidelines about law enforcement requests. With a warrant, WhatsApp will disclose which WhatsApp users have the target user in their address books, something not mentioned on WhatsApps law enforcement information page. And Apple will give 25 days worth of iMessage lookups to and from the target number irrespective of whether a conversation took place, which is described in Apples law enforcement guidelines but takes a little digging to understand since neither the FBI nor Apple explains what that means in plain English. In each case, the company is disclosing a list of its other users that happen to have the target users contact info, whether or not the target communicated with them. (If other messaging services make a practice of disclosing similar information, its not reflected in the chart.) These details underscore the broad sweep of U.S. electronic surveillance law, which lets investigators demand any record or other information pertaining to a [target] subscriber in response to a 2703(d) order or search warrant. While Apple and Meta have both fought for user privacy against overreaching government demands, the law nevertheless renders a lot of user data fair game.

Popular Misperceptions of Messaging Privacy

In short, its no easy task for the average person to accurately understand precisely what information from their messaging apps could wind up in the hands of federal investigators. Not only do different apps have different properties, but app makers dont have much of an incentive to be straightforward about such details. As the FBI chart demonstrates, the market of free, secure messaging apps is a gratifyingly crowded and competitive field. Providers want to give current and would-be users the impression that their app is tops when it comes to user security and privacy, whether the user is concerned about malicious hackers, governments, or the provider itself. Providers have learned to be wary of overstating their services security properties, but theyre betting that marketing copy will get more attention than technical whitepapers or transparency reports.

In this regard, app makers incentives are aligned with those of the FBI. Given the FBIs years-long campaign against encryption, it makes a strange bedfellow to the encrypted service providers it has condemned by name in public speeches. But service providers and the FBI both benefit from a popular misconception that underestimates the user data available to investigators from certain E2EE services. That misapprehension simultaneously maintains the providers image in the eyes of privacy-conscious users while upholding the FBIs narrative that its going dark in criminal investigations due to encryption.

Although this misunderstanding may help law enforcement investigators, it can have significant consequences for their targets. Not just garden-variety criminals, but also journalists and their sources, whistleblowers, and activists have a lot riding on their choice of communications service. As noted in Rolling Stones article about the FBI chart, WhatsApp metadata was key to the arrest and conviction of Natalie Edwards, a former U.S. Treasury Department official who leaked internal documents to a reporter with whom she exchanged hundreds of messages over WhatsApp. Edwards (and presumably also the reporter, who owed Edwards an ethical duty of source protection) believed that WhatsApp was safe for journalist/source communication. That misunderstanding cost Edwards her freedom.

The Reality Behind the Myth

Thanks to FOIA and its zealous disciples at POTP, the public can now see the internal FBI document that neatly summarizes the reality behind the myth. It shows that despite its going dark claims, the FBI can obtain a remarkable amount of user data from messaging apps that collectively have several billion global users. (The ability to test the governments public claims against its internal statements is one of the reasons why public access to government records, POTPs raison dtre, is so crucial.) It shows the role that cloud storage and metadata play in mitigating end-to-end encryptions impact on real-time communications surveillance. And it shows which popular E2EE messaging services truly do know next to nothing about their users.

If users think the encrypted apps they use dont keep much information about them, the FBI chart shows that belief to be largely false. With some exceptions, many major E2EE messaging services hand over all kinds of data to federal law enforcement, and cloud backups can even enable the disclosure of stored messages sent on two of the biggest E2EE messaging apps. Even if little or none of whats in the document is truly news, its still helpful to see it laid out so succinctly in a single page. If you are concerned about messaging privacy, use this chart (together with privacy and security guides specific to your situation, such as for journalism or protests) to help you decide which app is best for youand share it with the people you chat with, too. That way, you can make a more informed decision about which app(s) to keep (and which to leave behind) as we enter the new year.

Apple, Digital Surveillance, Encryption, FBI, FOIA, Law enforcement, Privacy, Stored Communications Act, Technology, WeChat, WhatsApp

See the original post:
We Now Know What Information the FBI Can Obtain from Encrypted Messaging Apps - Just Security

‘I’m a big believer in encryption technology,’ says the former chairman of the US SEC. – BollyInside

Previous chairman of the U.S. Securities and Exchange Commission, or SEC, Jay Clayton, was delegated by ex-President Donald Trump to serve in 2017. In his tenure as head of the SEC, Clayton often defended Bitcoin (BTC) as a store of significant worth. This previous Wednesday, during a interview with CNBCs Squawk Box show, Jay shared his musings on digital currency and how it ought to be directed going ahead. The previous SEC seat said that he is a huge believer in crypto technology and that its productivity benefits in the financial system and tokenization are enormous.

When asked whether the present chairperson is creating too many restrictions for the crypto industry, Jay said that cryptocurrencies have numerous purposes and are connected to a variety of industries, and the SEC should be in charge of regulating only those sectors that are linked to it.

Claytons remarks come as the current SEC chair, Gary Gensler, recently confirmed that the watchdog has no plans to ban crypto, but that U.S. congress could. Gensler warned, however, that crypto in its current form is comparable to the wild west without proper regulation.

Crypto is a wide variety of products, with a wide variety of functions, and the rules of our financial system are clear and long-standing. If you are raising capital for a project, you have to register your capital raising with SEC. If you are trading securities it has to be on a registered venue, But there are many crypto sectors like stablecoins that are not securities and outside of SEC purview.

Clayton did not allow the approval of a Bitcoin ETF during his term, which occurred now in 2021 under Gary Gensler. The agency has since come under fire for rejecting spot ETF applications and approving Bitcoin futures ETFs. Grayscale submitted a letter to SECs secretary, Vanessa Countryman, in which it stated that there is no basis for the position that investing in derivatives for an asset is acceptable for investors but not investing in the asset itself. The SEC was accused of treating the two Bitcoin ETF proposals unequally under the Administrative Protections Act, or APA.

According to Clayton, cryptocurrencies should be implemented but with appropriate regulation. He said that the government should be reactive to people who are violating our well-defined laws but proactive in encouraging the adoption of this technology throughout our financial system.

News Summary:

See the article here:
'I'm a big believer in encryption technology,' says the former chairman of the US SEC. - BollyInside

MPs charged with analysing Online Safety Bill say end-to-end encryption should be called out as ‘specific risk factor’ – The Register

Britain's Online Safety Bill is being enthusiastically endorsed in a "manifesto" issued today by MPs who were tasked with scrutinising its controversial contents.

Parliament's Joint Committee on the Online Safety Bill published the report declaring the bill would let government ministers "call time on the Wild West online."

The committee, made up of MPs and peers from various political parties, was asked to carry out a serious analysis of the controversial legislation. Surprising some onlookers, its Conservative chairman, Damian Collins MP, used the committee's 193-page report to talk about what he described as a "wider manifesto" for Big Tech regulation.

Ministers have two months before they have to formally respond to the report. As drafted, the bill doesn't go far enough (in the committee's view) and ought to impose more bans and regulations on activities that take place over an internet connection for example, "cyberflashing" (using Apple Airdrop and similar mobile device technologies to send obscene content to unwitting recipients), promotion of self-harm, posting adverts for online fraud, and so on.

"The Committee has set out recommendations to bring more offences clearly within the scope of the Online Safety Bill, give Ofcom the power in law to set minimum safety standards for the services they will regulate, and to take enforcement action against companies if they don't comply," said Collins in a canned statement.

Among other things, the committee called for:

It also said:

British legislators have been grappling with largely US-owned social media and web platforms failing to pay enough attention to increasingly loud demands for content censorship and for end-to-end encryption to be banned.

The bill's stated aim is protecting children from unsuitable content on the World Wide Web, though every political campaigning group imaginable (including a pro-free speech group) has weighed in during the general public debate about the bill.

The British Computer Society, the chartered institute for IT, praised the bill's focus on public risk assessments by platforms and nascent internet regulator Ofcom alike, but expressed reservations about exactly what legal duties it will impose.

"The Bill leaves a lot of definitions abstract, and much of the concrete expectations for what platforms will be asked to do will be set out in secondary legislation and Codes of Practice," said the BCS, "meaning it's currently very difficult to assess what exactly platforms will be asked to do to reduce harms and protect rights, and whether it will be sufficient."

Warnings about the risks to free expression online of over-regulation have largely been ignored by the committee, whose members included politicians from the Conservative, Labour, SNP, and Lib Dem parties.

The bill's second reading in Parliament is expected this week as the government moves to make it legally binding.

See the rest here:
MPs charged with analysing Online Safety Bill say end-to-end encryption should be called out as 'specific risk factor' - The Register

Assange: WikiLeaks founder one step closer to extradition – Aljazeera.com

Video Duration 26 minutes 20 seconds 26:20

The WikiLeaks founder suffers a setback in his legal fight against the US governments extradition efforts. Plus, Turks turning to YouTube for their news.

A court in the United Kingdom greenlights Julian Assanges extradition to the United States Press freedom groups call it a travesty of justice, but the response from the mainstream media has been muted.

Contributors:Tariq Ali Co-editor, In Defence of Julian Assange; editor, New Left ReviewNils Melzer UN Special Rapporteur on torture; author, The Trial of Julian AssangeLester Munson Senior associate, Center for Strategic and International StudiesRebecca Vincent Director of International Campaigns and UK Bureau director, RSF

The investigation into the January 6 Capitol Hill riot in the US has revealed private pleas, via text, from top Fox News anchors to Trump staffers. Producer Tariq Nafi tells Richard Gizbert why those messages have led to accusations of hypocrisy against the network.

Independent journalists in Turkey, like Cneyt zdemir, are taking refuge online. zdemirs daily YouTube programme has become a staple for Turks younger viewers looking for journalism of a different kind.

Contributors:Cneyt zdemir Creator and host, Cneyt zdemir ShowCansu amlibel Former columnist, Gazete Duvar; Former editor-in-chief, Duvar EnglishEmre Kizilkaya Turkish vice chair, International Press Institute; author, The New Mainstream Media Is Rising

Read more:
Assange: WikiLeaks founder one step closer to extradition - Aljazeera.com

Julian Assanges mother tells of unending pain over possible US extradition – The Canary

Support us and go ad-free

The mother of WikiLeaks founder Julian Assange has spoken of her unending, gut-wrenching pain over her sons possible extradition to the US. The 50-year-old is facing extradition to the US over espionage charges relating to the publication of classified military information in 2010 and 2011 by WikiLeaks.

His mother Christine has written an open letter describing her fears over her son remaining in prison for the rest of his life.

She said:

Fifty years ago in giving birth for the first time as a young mother, I thought there could be no greater pain. But it was soon forgotten when I held my beautiful baby boy in my arms. I named him Julian.

I realise now that I was wrong. There is a greater pain.

Read on...

The unending, gut-wrenching pain of being the mother of a multi-award winning journalist who had the courage to publish the truth about high-level government crimes and corruption.

The pain of watching my son, who sought to publish important truths, being endlessly globally smeared.

The pain of watching my son, who risked his life to expose injustice, being fitted up and denied a fair legal process, over and over again.

She spoke of her son being cruelly psychologically tortured by the authorities.

Christine Assange added:

The constant nightmare of him being extradited to the US and being buried alive in extreme solitary confinement for the rest of his life. The constant fear the CIA will carry out its plans to assassinate him.

The rush of sadness as I saw his frail, exhausted body slumping from a mini-stroke in the last hearing due to chronic stress.

Many people are also traumatised by seeing a vengeful superpower using its unlimited resources to bully and destroy a single defenceless individual.

I wish to thank all the caring, decent citizens globally protesting Julians brutal political persecution.

Please keep raising your voices to your politicians till its all they can hear. His life is in your hands.

Julian Assange has spent the past two years in Belmarsh Prison in London after almost a decade hiding in the Ecuadorian embassy in the capital. He is facing a renewed push for his extradition to the US after the High Court last week overturned a previous ruling against such a move.

Australias deputy prime minister Barnaby Joyce also came to his defence, saying they should either try Assange in Britain or allow him to return to his home nation. Assanges fiancee has accused UK authorities of playing the role of executioner after he suffered a mini-stroke in prison.

Go here to read the rest:
Julian Assanges mother tells of unending pain over possible US extradition - The Canary

Young people in Scotland speak up for Julian Assange: We cannot just watch as remote legal proceedings develop and liberal articles are exchanged -…

The World Socialist Web Site has received messages of support from young people in Scotland for Julian Assanges freedom. The WikiLeaks publisher will spend his third Christmas inside Belmarsh maximum security prison in London next week, with the threat of extradition and lifetime incarceration in a US federal prison hanging over his head, deprived of his most fundamental legal and democratic rights.

On December 10, Britains High Court ruled in favour of a US government appeal aimed at securing Assanges extradition. The courts vicious decision confirms that the British state, its government, judiciary, and intelligence agenciesand all of its political partiesare determined to destroy Assange in retribution for WikiLeaks courageous exposure of war crimes in Iraq and Afghanistan.

Next Wednesday, the Socialist Equality Party in Australia is hosting an emergency online meeting, British court decision puts Assanges life in danger. Demand his immediate release! The meeting will take place at 7pm AEDT (see here for registration details, including international start times). We urge workers and young people all over the world to help promote the meeting and make plans to attend.

The thoughtful comments published below show the enormous potential to win support among a generation of workers and young people being politicised by momentous world events, including unending wars, staggering social inequality, climate change, the collapse of democracy and a pandemic that has claimed millions of lives.

Jordan, 23, a delivery driver from Inverness said, Assange did not sell a product, but brought to light truths with evidence, and they want to lock up the truth and throw the key away in the USA! For years the TV, radio, and written press networks have been in the hands of tycoons who in turn finance their companies and keep journalists mouths sealed with millions of dollars.

That is why there is no longer a place for journalists who are not corrupt, or who are willing to go beyond the script set by their bosses. Manipulative garbage is what exists in all these media today, almost entirely.

Calum, 23, a postal packing worker from Inverness said, The betrayal of Assange years ago by the global press was a sign of things to come. Unfounded accusations and his continual smearing by the press should have shocked more and shown people the bias of capitalist media as anti-journalistic, but the reality of the situation was smothered and confused by the weight of that media.

Now as hes facing American justice, the threat of life imprisonment and the chance of execution or assassination in response to the highest journalistic integrity. It should say something about the death of our democratic ideals and should rally the working class and journalists, anyone with a conscience, in a fight for his freedoma fight that is not only to save a man's life, but to save journalism and is intertwined with the fight for socialism.

Now, more than ever, we cannot watch as remote legal proceedings develop and liberal articles are exchanged. The people need to take to the streets, to their workplaces, to their communities in protest and discussion. This needs to become a real political issue and exposed as the serious political crime it is.

Daniel, 23, a sound technician from Inverness said, Assange's extradition is a travesty of justice and morality. The silence of the pseudo-left and the Labour Party is tantamount to complicity. Assange should never have been held without due cause for any length of time, and the duration of the ordeal he has gone through will have undeniably caused severe degradation of his mental and physical health.

The fact that the working class are the only force to bring forward the struggle for truth, justice, and for Assange himself, is evidence that the ruling class care nothing for any of the ideals that give us our humanity, and are a force in undeniable opposition to the proletariat and the common good of all the earth's people.

Andrew, 21, a cook in Glasgow said, This vicious entrapment of Julian Assange exemplifies the brutal lengths the ruling classes will go to cover up and disguise their own heinous war crimes. His extradition to the US is being used by the ruling classes to strengthen British-American relations. Giving Assange to the Americans now is quite literally a death sentence. The fact is that we, the working class, are the only class interested in fair justice because we are the class that these hidden crimes, done by the ruling class, affects. We are the people in danger of learning the truth behind the atrocities conducted overseas especially in the Middle East.

Jill, a social care worker and the mother of a young Socialist Equality Party member from Inverness wrote, Article 10 of the Human Rights Act 1998 says, everyone has the right to freedom of expression in the UK. I am personally disgusted by the treatment of Julian Assange and that there has been an ongoing criminal investigation and that his kidnap and his murder was actually planned by the US government.

So, a man is going to either 1) Rot in prison or 2) Be kidnapped and murderedfor what? Speaking the truth?

I personally am ashamed to say that until recently I did not know who he was and was only made aware due to the World Socialist Web Site. The working class need to take a stand and can make a difference because this outcome will also make a difference to their own democratic rights.

We need to act now because either way this poor man has a death sentence hanging over him due to his treatment. Todays generation needs to be the ones who say no more! The proletarians have nothing to lose but their chains. They have a world to win. (Karl Marx, The Communist Manifesto).

Ari, 23, a final year media student in Glasgow, said the case against Assange means, The presumption of innocence and peoples democratic rights, thats all out the window.

Ari described Assanges achievements as a journalist, highlighting the Collateral Murder video which he watched for the first time when he was a 13-year-old, Its horrific, its a war crime. I was really enraged. Theyre killing those people as if its a video game, theyre so detached from it. That was my first introduction to WikiLeaks.

In 2012 when Assange first went into the embassy, I was 14, so Ive been aware of the case for quite a while. Ari said the sight of Assange being dragged from the Ecuadorian Embassy in 2019 by police was brutal, they made a show of it for the worlds media. Theyre making an example of him. Its been very brutal and drawn out over many years. Its a horrific example to make, and journalism is under a threat because of it.

Ari recently watched a YouTube video called, The CIAs plot to assassinate Julian Assange, showing evidence of CIA and US government plans to kidnap and kill Assange in London during his time inside the Ecuadorian Embassy. At the same time, efforts to smear Assange personally were being intensified, Theyve thrown a lot of bogus accusations against him.

Asked if there was discussion at university about Assange, Ari replied, Because of the rape stuff [bogus allegations against Assange by the Swedish state], amongst the leftist student types hes not very popular. Its definitely bullshit. It was too convenient, far too convenient.

The WSWS told Ari about UN Rapporteur on Torture Nils Melzers forensic take-down of the Swedish allegations that Assange and his lawyers had also refuted. In contrast, leading pseudo-left parties in Europe, Australia and the United States eagerly weaponised the CIA-backed rape narrative, using gender politics to incite middle class hysteria against a journalist persecuted for exposing war crimes. Ari agreed, adding, Obviously, they were false allegations and they have been dropped now.

This all happened about five years before the #MeToo era, and it was a prototype for what was to come.

Ari questioned the precedent being established by #MeToo, including its undermining of the presumption of innocence, Wasnt the #MeToo movement another form of essentially throwing away peoples democratic rights, including to a fair trial? Its pretty messed up.

Ari warned that the promotion of gender and race-based politics and its undermining of democratic rights was playing into the hands of the far-right, When the pseudo-left come up with this kind of nonsense, the far-right dismantle it and sometimes they do a good job of dismantling it, and the danger is that it brings young people towards the right. Theyre giving them an ammunition in a way. Ari described the January 6 coup in the United States as a very worrying development.

A recent survey by the Institute of Economic Affairs found nearly 70 percent of young people in Britain want to live in a socialist economic system. It found 73 percent of 1634-year-olds believe a socialist system would boost solidarity, compassion and cooperation among people. Ari said, Ive been speaking to my classmates about this, and its remarkable how much more radical everyones got. People are talking much more about Marxism and socialism compared to when I was 13 or 14. Back then, my friend and I would talk about Karl Marx and socialism, but people didnt really want to talk about it. But now young people are completely interested and that is growing.

Sign up for the Free Assange Newsletter

Visit link:
Young people in Scotland speak up for Julian Assange: We cannot just watch as remote legal proceedings develop and liberal articles are exchanged -...

How Open Source Is Shaping The World Around Us – Outlook India

Recently, the billionaire space race sparked everything from debates to frenzied excitement, depending on who you ask. But theres one thing we can all agree on humans are making real, significant strides in space exploration. We only have to look at the Ingenuity Mars Helicopter, which departed Earth for its 293 million mile trip to Mars aboard the Perseverance Rover last July. Marking a huge milestone for humanity, the 1.8 kilogram helicopter hovered 10 feet above the surface of Mars, in an atmosphere thats less than 1% of earths density, proving for the first time that its possible for a helicopter to achieve lift-off on Mars.

To make this launch possible, Ingenuitys software required intense preparation, no margin for error and real time collaboration. But behind Ingenuitys expansive software there was another crucial element thousands of open source developers from all over the world, many of whom were unaware of the significance of their contributions. With nearly 12,000 people on GitHub contributing code, documentation, graphic design, and more, its fair to say that the explosion of open source made this historic space mission possible.

And its not just space exploration. The world is powered by software. It touches every aspect of our lives, from our cars, to how we communicate, connect, live and work. Today, 99% of software projects are developed using open source. The mobile phones we use everyday are underpinned by open source technology, with Android OS and Apples iOS both relying on many open source components. These operating systems have revolutionised the way we use smartphones and created a flourishing mobile economy. WordPress uses open source so people and businesses can easily create websites, forming the backend of many websites you regularly visit. Even the US air traffic control (ATC) relies on Linux, one of the most popular open source operating systems, to monitor aeroplanes in the sky. The list goes on with industries such as automotive, finance, telecommunications, and many more all using open source.

Its easy to see why open source software is attractive to so many organisations and why its experiencing increased adoption across verticals. Open source democratises technology and enables fast innovation by giving organisations access to a global pool of talent and the tools needed to develop secure, reliable and scalable software. Plus, it almost always offers a cost advantage and high functionality. Theres also a passionate and ever-growing worldwide community to tap into when it comes to support and bug fixes. Businesses are paying attention to these benefits and are realising that increasing the use of open source software and adopting more collaborative development methodologies is now a competitive economic advantage.

The power of open source has captured the attention of governments as well. The Indian government, for example, is a strong advocate and promoter of open source, having recognised how it can help bridge the digital divide in India. Driving open source innovation and open APIs has been a central pillar to the governments Digital India vision. Many of the governments citizen connect initiatives like Aarogya Setu, the AADHAR initiative, and the Cowin app for managing the Covid-19 vaccine drive, have all made use of open source. This has helped accelerate the development of these programs and also allows others to integrate and build on top of them.

India has a unique advantage, given the large and diverse STEM talent pool, and is already playing a leading role in the global open source community. We have some of the largest systems integrators as well as global innovation centres that are creating compelling projects, plus a diverse ecosystem of start-ups and enterprises that are driving digital transformation. Im proud, and truly inspired, by the Indian developers who are building and enabling the software of the future, thanks to their participation and contribution to open source projects.

In the next five years, open source development will be driven by an increased demand for applications and software. Were already seeing this trend within the open source community in India. The number of contributions to public open source repositories surged by 80 percent on GitHub in 2020 from India and it is the world's fastest growing country in terms of new open source developers. Over one million developers in India created their first repository on GitHub this past year, more than any other country in the world! The GitHub developer community in India totals 5.8M developers as of March 2021 and by February 2023, we believe more than 10 million developers in India will be calling GitHub home. India is well and truly an innovation powerhouse, with open source software development at the core, and uniquely positioned to continue driving innovation that accelerates human progress.

Read the original:
How Open Source Is Shaping The World Around Us - Outlook India