Art Collective Forensic Architecture Has Teamed Up With Edward Snowden to Investigate a Shadowy Global Spyware Company – artnet News

Three years ago, Yana Peel abruptly resigned as director of the Serpentine Galleries in London after reports connected hervis--vis her husbands private equity firmto NSO Group, a controversial Israeli cybersecurity company known for its flagship spyware that allows users to hack unsuspecting cell phones. Those who have raised alarm about the group describe it as analogous to gun manufacturers prior to U.S. firearm regulations: a weapons merchant operating indiscriminately within a legal system ill-equipped to control it.

Peels relationship to the company, it turned out, was tenuous. (She owns an indirect and passive interest in Novalpina, the investment fund that acquired the NSO Group in 2019, but has had no involvement with the Israeli company.) The Guardianone of the first publications to report on the directors alleged involvementissued a rare retraction saying as much.

And yet Peels resignation from the Serpentine represented an important milestone in the 11-year history of the Israeli company, according to Eyal Weizman, founding director of the investigative art collective Forensic Architecture: it marked the first moment of accountability to any actions related to the NSO Group.

If Weizman and his group have their way, this instance of accountability likely wont be the last. This month, Forensic Architecture unveiled its newest project: an interactive platform that charts thousands of instances of so-called digital violence tied to the NSO Groupas well as the events, private interests, and other forces that have empowered the company along the way.

Its part art, part legal resourceone that, like other Forensic Architecture projects, may well be employed as evidence in a courtroom one day. The Turner Prize-nominated research lab has previously trained its eyes on subjects ranging from Russian military activity in Ukraine and U.S. drone strikes in Pakistan. The new project is the most comprehensive database ever assembled dedicated to whats been called the worlds most notorious surveillance company.

Rounding out the artsier features of Digital Violence, as the platform is titled, are video investigations narrated by Edward Snowden; interviews with activists, journalists, and lawyers worldwide who have been the subject of targeted hacks; and a sound piece composed by Brian Eno. Laura Poitras, the Academy Award-winning director of Citizenfour,the documentary about Snowden, has also made a short film about the project, which is set to debut at Cannes Film Festival this month.

Courtesy of Forensic Architecture.

A missed call or a strange text: these are perhaps the only signs that your phone has been infected by Pegasus, the name of the NSO Groups signature software, according to Forensic Architectures lead researcher Shourideh Molavi. After that, the users on the other end have access to virtually everything on your deviceyour calls and texts; your passwords and GPS information; your network of friends, family, and colleagues. They can even tap into your camera and microphone, enabling real-time surveillance. This is what Forensic Architectures members have dubbed digital violence.

Were used to examining missiles, tanks, bullets, Molavi told Artnet News. Now, were dealing with a kind of state violence that you cannot see, that is difficult to detectthat doesnt require any agency from the user, and thats privately funded and sold by a private company. All of these things make for a dangerous package of human rights violations.

Often, physical violence isnt far away. What Forensic Architectures platform makes clear is that instances of Pegasus-related digital violence are often accompanied by real-world attacks, be it in the form of break-ins, lawsuits, or arrests. In interviews, hacking victims recall the psychological and emotional toll of being infected: they become anxious, have trouble sleeping, and feel like theyre constantly being watched.

Its hard for people to understand how a hack can have physical consequences, Molavi said. Its just your phone, right? But really, its your relationships, its your family, its your feeling of security, its your mental health.

Theres another crucial consideration, too: digital violence transcends geopolitical boundaries. Whereas states cant exercise judicial power outside the limits of their respective territories, Pegasus gives its users the power to terrorize almost anyone, anywhere, according to numerous reports on the product.

Despite challenges in court, Israels Ministry of Defense continues to grant the NSO Group export licenses; and the companys corporate structure has allowed it to put its signature product in markets in Saudi Arabia, the United Arab Emirates, and even the United States. NSO has yet to confirm any of its clients, but according to a report from Citizen Lab, Pegasus has been used in at least 45 countries worldwide since 2015.

Representatives from the NSO Group did not immediately respond to Artnet Newss request for comment, but in a statement to the Washington Post, a spokesperson for the company dismissed Forensic Architectures platform.

These are recycled claims, filled with inaccuracies and half-truths, the spokesperson said. The company investigates all credible claims of misuse, and takes appropriate action based on the results of its investigations. This includes shutting down a customers systema step NSO has taken several times in the past, and will not hesitate to take again if a situation warrants.

For Forensic Architecture and its allies, Digital Violence aims to do what international judicial organizations, traditional press outlets, and other authorities wontor cant.

During a recent event to inaugurate the platform at Haus der Kulturen der Welt (HKW) in Berlin, where Forensic Architecture is currently included in an exhibition on open-source investigation, Edward Snowden said: The investigation of not just the NSO group, but this sector and this technology, is the most important unwritten story in media today.

Read more:
Art Collective Forensic Architecture Has Teamed Up With Edward Snowden to Investigate a Shadowy Global Spyware Company - artnet News

Greenwald: WH and Big Tech ‘ironically’ creating textbook ‘definition of fascism’ they claim to be against – Fox News

Investigative journalist Glenn Greenwald sounded off on Thursday about the Biden White House admitting it has joined forces with Big Tech entities like Facebook to censor what it dubs "misinformation."

Greenwald, who notably broke the Edward Snowden-NSA civilian surveillance story, told "Fox News Primetime" that the apparent merger between large private business firms and a powerful federal government is a "classic definition" of economic fascism.

"I have been trying to make the point for well over a year now [that] lot of people think that this censorship is coming from executives of Facebook, Google, and Twitter, which really isn't true," Greenwald said Thursday.

The journalist added that Big Tech appeared cowed by liberal journalists "shaming" them for not censoring enough during the Trump era as the Democrats "increased in power" while Democratic lawmakers kept summoning tech CEOs to Capitol Hill to further "threaten" them if they neglected to censor what the left considers "hate speech" or "misinformation."

"It's really a merger of state and corporate power which is ironically is the classic definition of fascism," said Greenwald.

"We have heard so much about fascism over the last five years. This is what it actually is. And the people who say they are against it are actually now supporting it," he said.

The increased concern over federal government interventionist actions came to a head earlier in the day when White House Press Secretary Jennifer Psaki essentially admitted the Biden administration is enlisting the Big Tech giants to quash speech they don't like or as host Pete Hegseth said, turning Facebook, Google and Twitter into "the de-facto censorship arm of the federal government."

Hegseth noted Surgeon General Vivek Murthy, whose role is the nation's chief medical doctor, spoke at the White House over the apparent epidemic of such "misinformation."

Murthy noted that his office's public advisories are saved for "public health threats" such as the USSG's lung cancer warning long denoted on tobacco packaging but instead warned of the "insidious threat" that "misinformation" poses to public health.

"Misinformation, its always misinformation," Hegseth said. "Its a word that the Biden administration cant get enough of.Its Orwellian double-speak deliberately ambiguous, so they can define italways."

Hegseth noted once again that Psaki, Murthy and Biden can essentially ask Big Tech to label whatever statements or images it wants to be "misinformation" even if the facts therein are true.

He also remarked that "misinformation" has since supplanted "circle-back" as the spokeswoman's buzzword-du-jour.

The host further added that President Trump long derided as a purveyor of "fascist" policies by groups like Antifa, whose name is a portmanteau of "Anti-Fascist" was essentially given a gift in his pending class action litigation against Big Tech.

CLICK HERE TO GET THE FOX NEWS APP

Trump sued social media companies in Miami federal court earlier this month, claiming he and others to have been wrongfully silenced for their political beliefs.

"The White Houses admission today hammers home the point that President Trump is making in his class-action lawsuit against Facebook that social media companies act as the de-facto censorship arm of the federal government," said Hegseth.

"I hope the Trump team makes this clip Exhibit #5,000 in their lawsuit. They just came out and said it."

Read the original here:
Greenwald: WH and Big Tech 'ironically' creating textbook 'definition of fascism' they claim to be against - Fox News

Tucker Carlson reignites NSA surveillance debate on the Right – Denver Gazette

A controversy over Fox News host Tucker Carlson's texts and emails has revived Republican interest in curtailing the National Security Agency's surveillance program, an issue that has often divided the party between libertarians and national security hawks.

Fifteen House Republicans, led by Reps. Louie Gohmert of Texas and Bill Posey of Florida, sent the NSA a letter on Tuesday, demanding explanations of its surveillance practices and how a U.S. citizen's communications might lawfully be ensnared in its spying on foreign nationals.

Sen. Rand Paul, a Kentucky Republican who is a longtime critic of the NSA, has also sought an investigation of the incident. "I write to you to demand that you investigate the National Security Agency's (NSA) alleged spying and unmasking of Tucker Carlson, as well as any leaks of his private emails from the NSA to other reporters," he said in a letter.

KAMALA IN CRISIS

House Minority Leader Kevin McCarthy requested that Republicans on the House Intelligence Committee investigate Carlson's June allegation that the NSA had spied on him in an effort to take his highly rated show off the air.

"The NSA cannot be used as a political instrument, and House Republicans will ensure accountability and transparency," McCarthy, a California Republican, said at the time.

"It's illegal for the NSA to spy on American citizens. It's a crime," Carlson said on his show. "It's not a Third World country. Things like that should not happen in America."

The spy agency has publicly denied Carlson's claims. "This allegation is untrue," an NSA spokesperson said in a statement. "Tucker Carlson has never been an intelligence target of the Agency and the NSA has never had any plans to try to take his program off the air."

"We target foreign powers to generate insights on foreign activities that could harm the United States," the statement continued. "With limited exceptions (e.g. an emergency), NSA may not target a US citizen without a court order that explicitly authorizes the targeting."

Republicans were dissatisfied with this response, especially following an Axios report that the NSA surveilled Carlson through incidental collection while attempting to secure an interview with Russian President Vladimir Putin, raising questions about how the outlet would have obtained this information.

"Asserting that Tucker Carlson is not and never has been an intelligence target of the Agency does not rule out the possibility of his being surveilled or unmasked for supposed ties to a party under investigation," the House Republicans wrote in their letter.

"I am open-minded enough to believe, if given convincing evidence, that the NSA may be telling the truth, but when a long train of abuses conducted by the NSA evinces a consistent design to evade the law and violate the constitutionally-protected liberties of the people, the NSA must do more than tweet a carefully worded denial to be trusted," Paul wrote in his letter.

Surveillance by the NSA, initially revealed in part in 2013 leaks by former agency contractor Edward Snowden while Barack Obama was president and President Joe Biden was vice president, has often become the target of GOP ire under Democratic administrations. But party leaders have been reluctant to shed powers the federal government acquired after the 9/11 terrorist attacks on the U.S.

Unmasking and surveillance became an issue again when an associate of former President Donald Trump's 2016 campaign was surveilled, and incoming national security adviser Michael Flynn had the contents of a controversial call with a Russian official leaked. Trump repeatedly alleged that the Obama administration spied on his campaign, while officials defended the initial inquiries as justified.

Flynn was charged with misleading federal investigators about the Russian call. Trump and his campaign were investigated to determine whether they colluded with the Russian government's attempts to influence the 2016 presidential election. Flynn was pardoned at the end of a complicated legal saga, and special counsel Robert Mueller did not establish a Trump-Russia election conspiracy.

As the top Republican on the House Intelligence panel, Rep. Devin Nunes of California repeatedly pressed officials on the surveillance and unmasking of Trump associates during the Obama era.

Former Rep. Justin Amash, a Michigan Republican turned Libertarian Party member who led a bipartisan effort to limit warrantless surveillance and data collection, argued that these investigations did not go far enough compared to his proposed legislative remedies.

"The NSA is doing all the things that McCarthy and Nunes voted for it to do," Amash tweeted after Republican leaders spoke out on the Carlson allegations. "When I tried to stop the FISA 702 reauthorization, they said I was endangering American lives. GOP leaders urged Trump to denounce my efforts and sign the FISA bill, which he did. Now they feign outrage."

Amash made a similar observation in 2019 when a federal surveillance court rebuked the FBI for violating Americans' privacy rights through its foreign intelligence programs. "This is FISA 702," he tweeted at the time. "In 2018, I led the charge against the establishment to stop this program. President Trump attacked my efforts and signed it into law, with the support of [former House Speaker Paul] Ryan, [House Speaker Nancy] Pelosi, McCarthy, Nunes, and [Rep. Adam] Schiff. It's an outrageous violation of our Constitution and our rights."

CLICK HERE TO READ MORE IN THE WASHINGTON EXAMINER

"The Tucker thing will get the base's juices flowing, but we haven't been consistent on this," said a veteran Republican operative in Washington, D.C.

"It is imperative that any claim of a U.S. government agency illegally spying on a private citizen be taken seriously," Gohmert, Posey, and over a dozen other House Republicans wrote, requesting an NSA response by Aug. 1. "Therefore, in addition to your response to these important questions, we are urging you to provide all documents related to your agency involving Tucker Carlson to us."

Original Location: Tucker Carlson reignites NSA surveillance debate on the Right

Go here to see the original:
Tucker Carlson reignites NSA surveillance debate on the Right - Denver Gazette

Oliver Stone revisits JFK assassination in new documentary – ABC News

CANNES, France -- Thirty years after JFK, Oliver Stone has returned to the assassination of John F. Kennedy, this time in a documentary.

JFK Revisited: Through the Looking Glass" is a kind of non-fiction addendum to one of Stone's most sensational and controversial films. The documentary, which is to premiere Monday at the Cannes Film Festival, is likely to prompt another round of debate on both the American tragedy and Stone's methods. But for the 74-year-old filmmaker, it was a way to answer his critics and go deeper into a history he's forever linked with.

I was a relative novice when that film came out. I was nave. I didnt know that Id get banged like this and it was hard, Stone said in an interview. It became as if I was untrustworthy. In Hollywood, I became labeled a conspiracy theorist which I think is a term from a 1952 CIA document an attempt to discredit people. But people liked the movie. As a movie-movie, it worked.

JFK was nominated for eight Oscars, including best picture, and won two. It grossed more than $200 million. But it was also surrounded by questions about its factuality. JFK Revisited" has doubts attached to it, too. Several streaming services passed on distributing the film in part over their fact checks. In Cannes, the film has set up international releases in several countries and is seeking a U.S. distributor.

The documentary, which has been edited down to around two hours after being twice that, makes no declarations about who killed Kennedy. It pulls in part from millions of government files that have been released in the years since JFK. In 2017, President Donald Trump delayed the release of more documents, citing national security.

JFK Revisited delves deeply into inconsistencies in Kennedy's autopsy, the handling of key pieces of evidence and Lee Harvey Oswald's alleged ties to the CIA. And its deepest suspicions not unlike JFK lie in the U.S. intelligence services.

I feel the most important is why President Kennedy was killed, said Stone. "We answered with our evidence that he was going to withdraw from Vietnam. The dtente with Cuba was in motion. The nuclear test ban treaty had been signed. He was looking for a dtente with Russia. He was an anti-colonialist."

Stone, whose films include "Platoon and Born on the Fourth of July, himself fought in Vietnam.

I went in as a hawk. I believed we were doing the right thing, he said. Even when I came out of Vietnam, I was not an activist. It takes years to reeducate yourself. And I found out more and more. By the time I made ("JFK"), I didnt know what I know now. The history of this country is screwed up. We havent told it."

In films like Wall Street," Nixon and W., Stone has charted through his own provocative lens much of the last 50 years of American history in movies that gave politically charged figures splashy big-screen portraits. But his relationship with both Hollywood and Washington has declined in more recent years. His last fiction film was 2016's Snowden," a biopic that depicted Edward Snowden as an American hero. It was painstaking to get funded and little noticed on release.

"It kind of broke my spirit," said Stone.

His skepticism for American democracy has only increased. A plutocracy is more accurate, he said, citing the influence of money in elections. Democracy is a strange word. It's in question.

At the same time, Stone has been drawn to meeting and documenting some of the world's dictators and strongmen. Stone interviewed Russia's Vladimir Putin at length for a Showtime series that was criticized as fawning. He has done interviews with Fidel Castro, Hugo Chavez and Stone is currently prepping a series with the former Kazakhstan leader Nursultan Nazarbayev.

What attracted to me those figures was they are balancing America. American cannot be the sole power in the world. I think Henry Kissinger would agree with me. I think Machiavelli would agree with me," said Stone. Balance of power is the only way this world can be free of one control, one tyrant. Thats the real tyrant. America.

I'm not a bad guy, Stone added. And I don't love dictators.

As for Stone's relationship to Hollywood, he said he tries not to think about too much. I just try to keep going, Stone said. In Cannes, he also screened a director's cut of JFK. But when he considers the kinds of movies that get made today in the U.S., he sees little political inquiry or international perspective.

I find that many American filmmakers would be very good but they deal with crime issues its on TV all the time. Theyre great at violence. Except for a few filmmakers, they never go against American foreign policy, which is wrong. Thats wrong.

America is censoring itself. Its censoring Facebook, its censoring the ex-president. Were scared. Were scared of hearing the truth, Stone continued. Sometimes you have to hear the Alex Joneses of the world. You have to have different points of view.

Follow AP Film Writer Jake Coyle on Twitter at: http://twitter.com/jakecoyleAP

Follow this link:
Oliver Stone revisits JFK assassination in new documentary - ABC News

Facebook often removes evidence of atrocities in countries like Syria and Myanmar but we can preserve it – The Conversation UK

Nearly half of the worlds population owns a smartphone. For those living in conflict zones or suffering human rights violations, these devices are crucial. They help ordinary people record and share the atrocities they witness alerting the world to their plight, and holding to account those responsible for crimes against humanity.

Yet when they come to post this vital digital evidence on social media platforms, citizens often find their posts censored and permanently removed. Companies such as Facebook have no obligation to preserve the evidence, and have been accused of rushing to moderate content on an ad hoc, sometimes incoherent basis.

Given that Human Rights Watch has called atrocities the new normal in the modern world, we must urgently set about creating a system through which citizens across the globe can preserve, share and publish digital evidence of atrocities without the fear of retribution or censorship.

Recent history has shown that social media companies cannot be trusted to preserve vital digital evidence of atrocities. Take the perplexing role of Facebook in Myanmar as an example. Facebook recently banned accounts related to Myanmars military in response to the February 2021 coup.

Read more: Myanmar coup: how the military has held onto power for 60 years

But in 2017, during the genocide of Rohingya Muslims by the same military, Facebook took little action against military-linked accounts. Instead, the platform was accused of whipping up hate in the country, while deleting the posts of Rohingya activists, presumably deeming their evidence of atrocities to have been shared for sadistic pleasure or to celebrate or glorify violence. Facebook has admitted it was too slow to act in Myanmar, but that better technology and more content reviewers are now in place to prevent the spread of hate in the country.

This subjective censorship is not unique to Myanmar. In the recent conflict between Gaza and Israel, Facebook silenced dissident views, blocking editors accounts at the Gaza-based Shehab News agency. YouTube has also been accused of routinely removing evidence of atrocities during the Arab Spring and the Syrian civil war. That content is mistakenly flagged by algorithms as violating YouTubes guidelines, something the platforms parent company Google accepts doesnt always get it right but takes incredibly seriously.

To address this problem, the United Nations Human Rights Council has in recent years established a mechanism to collect, consolidate, preserve and analyse evidence related to serious international crimes. For Syria its called IIIM and for Myanmar its the IIMM.

These situation-specific mechanisms have adopted the approach of traditional news outlets, where experienced investigators strategically select individuals and their evidence. Material is selected based on its ability to be used as evidence in court proceedings in the future, where perpetrators of atrocities may be held to account.

Elsewhere, global citizen journalism organisations such as Bellingcat have taken a different approach. They collect evidence from different social media platforms and use a network of volunteers to analyse and investigate it. It was Bellingcat, for instance, behind the unmasking of the Russian man accused of poisoning Sergei and Yulia Skripal in the UK city of Salisbury in 2018.

Laudable as they are, these approaches have their flaws. One of them is that theyre centralised. This increases the risk that citizens identities could be exposed (via a hack, for instance) which often deters people from coming forward and providing evidence in the first place.

Centralised systems are also susceptible to compromise, subjectivity, discrimination or even destruction. The computer hard drive containing evidence from the whistleblower Edward Snowden was destroyed by the Guardian, under the supervision of officials from the UK intelligence agency GCHQ, in 2013. More recently, Israels armed forces bombed the offices of Associated Press and Al Jazeera in Gaza in May 2021, destroying any evidence the news agencies may have been storing.

Its clear we need a decentralised platform, without gatekeepers or potential single points of failure, to properly preserve peoples digital evidence of atrocities. This could be seen as similar to Wikipedia: distributed and under no ones direct control.

However, unlike Wikipedia, such a platform must be able to guarantee anonymity to protect citizens from exposure and future retribution. Once evidence is uploaded, it needs to be time-stamped and made immutable, so that no one (including the evidence provider) can edit or delete the evidence. The platform itself also needs to be resistant to any form of cyberattack, so that it cant be taken down. All this requires engagement with new technologies.

First, creating a distributed website is relatively easy. Conventional websites use whats called a hypertext transfer protocol (HTTP), which keeps the websites files stored on a central server or computer. But there are alternative, peer-to-peer protocols (like IPFS, for instance) which enable a websites files to be stored across many computers. This means no authority can shut it down. Similarly, IPFS can also be used to store evidence-related files in a distributed and decentralised fashion.

Making evidence-sharing anonymous simply requires the website to be integrated with an evidence drop box area supported by Tor, which creates free and open-source software for anonymous communication. News outlets such as the Guardian and the New York Times already use Tor for anonymous file drops. Citizens should also be encouraged to use Tors anonymous browser to shield themselves from corporate tracking and government surveillance.

Finally, unlike centralised systems, the evidence uploaded anonymously to this distributed file system (IPFS) must remain immutable and indestructible. This can be achieved by engaging with the blockchain network, which is the technology behind cryptocurrencies.

Blockchain is an open-source distributed ledger or database system in which an updated copy of the records is available to all stakeholders at all times across the globe. This makes it almost impossible for a single person or company to hack everybodys ledger, ensuring security against cyberattacks. The database stores cryptocurrency transaction data but blockchain could also store digital evidence.

The evidence-drop website we propose means victims and witnesses can upload their evidence during a crisis and, when situation is favourable, see it used by investigative journalists or by prosecutors at the International Court of Justice.

Such a website would empower ordinary citizens and whistleblowers to fight injustice and atrocities. At the same time, it would put psychological pressure on perpetrators, whod know evidence exists of their crimes which cannot be destroyed, altered or invalidated. This shift of power and mindset could reconfigure the relationship between oppressor and oppressed, overturning the new normal of atrocities that appears to have taken hold across the world.

Read the original post:
Facebook often removes evidence of atrocities in countries like Syria and Myanmar but we can preserve it - The Conversation UK

Happy 4.20: Latest version of Tails bakes connection wizard into pro-privacy Linux distro – The Register

Privacy and security-focused Linux distribution Tails, The Amnesic Incognito Live System, has announced a major new release completely overhauling how it connects users to the Tor network.

"After connecting to a local network, a Tor Connection assistant helps you connect to the Tor network," the project maintainers explained in the release notes for the latest version, Tails 4.20.

"This new assistant is most useful for users who are at high risk of physical surveillance, under heavy network censorship, or on a poor Internet connection."

The team claimed its freshly developed wizard, which launches with the option of "easier" automatic connection or "safer" hidden connectivity, offers better protection to users who may need to hide their activity from network operations, makes it easier to connect to Tor bridges, assists with troubleshooting network connectivity issues, and walks first-time users through getting Wi-Fi up and running.

It's far from finished, though. The team is working on a laundry list of improvements, including the option to save Tor bridge details to persistent storage, automatically detect when a Wi-Fi network is not working, and the ability to detect and handle captive-portal login requirements common to commercial Wi-Fi hotspots.

First released in June 2009 as a successor to the Incognito project but not hitting a stable 1.0 milestone until five years later, Tails aims to preserve users' privacy by routing all traffic through the Tor network a volunteer-driven encrypted overlay network itself launched back in 2002.

Given a publicity boost by whistleblower Edward Snowden, Tails has proven popular even if simply downloading it can get you on the NSA's naughty list. Development on the project has never ceased, from fixing security issues to improving memory privacy, the user interface, adding support for booting from USB sticks, and most recently boosting performance.

As well as the new connection wizard, Tails 4.20 includes the ability to host a website accessible only on the Tor network as an "onion service," an updated browser and email client, the latest Tor client, and a shift to Linux 5.10.46 to broaden support for running on newer hardware.

The release also includes a range of bug fixes, though comes with a warning: users looking to upgrade from a Tails 4.14 or earlier installation will need to upgrade manually, or if they've already hit a bug which breaks the update system for automatic upgrading should follow instructions on the release page to manually fix things again.

The new release is available on the Tails site now.

More:
Happy 4.20: Latest version of Tails bakes connection wizard into pro-privacy Linux distro - The Register

The Year of the Everlasting Storm: Film Review | Cannes 2021 – Hollywood Reporter

It was perhaps inevitable that someone would organize an international grab bag of auteurs reflecting on the worlds COVID-19 crisis in 2020. While there have already been documentaries like Wuhan Wuhan collecting human interest stories about coronavirus in a very specific place, The Year of the Everlasting Storm chooses a global approach. Its bow in Cannes in the Special Screenings sidebar is amply justified by two whimsical exercises in art house cinema directed by Jafar Panahi and Apichatpong Weerasethakul. The other tales are quirky but mixed in impact.

Panahi opens the parade in person with his personal domestic lockdown story, in which a giant pet iguana called Iggy features prominently. Shot in the directors luminous apartment in Tehran, where he spent many years of house arrest pre-COVID courtesy of the Iranian authorities, the 19-minute tale centers around his familys emotional reactions to being separated from each other. With typical humor, Panahi describes how his aging mother turns up at their door dressed head to foot in PPE. After his wife sprays her outerwear with disinfectant, granny talks to her distant granddaughter on a video call that turns very sentimental, with both sides insisting Ill die for you. Grannys mistrust of toothless old Iggy turns to something like sympathy by the films close.

The Bottom LineA mixed bag of coronavirus tales.

Venue: Cannes Film Festival (Special Screenings)Cast: Dongyu Zhou, Yu Zhang, Catherine Machovsky, Bobby Yay Yay JonesDirectors: Jafar Panahi, Anthony Chen, Malik Vitthal, Laura Poitras, Dominga Sotomayor, David Lowery, Apichatpong Weerasethakul

Three episodes come from the American directors David Lowery, Laura Poitras and Malik Vitthal. Vitthals brief take on a Black fathers overwhelming love for his three kids, all of whom have been placed in foster homes, is worth repeat viewing, even if its connection to the pandemic seems marginal. In eight edgy, machine-gun-fire minutes, Bobby Yay Yay Jones educates his son about how to act if he hears gunshots outside (you lie down) and mentions in passing how he himself was a homeless, neglected child and has had to deal with PTSD while fighting for seven years to regain custody of his kids. The synthesized music track plays off against simple animation around the live images, adding surprise to the emotional expressiveness of this striking work.

Poitras, who produced and directed the politically engaged docs Citizenfour, about whistle blower Edward Snowden, and Risk, featuring WikiLeaks Julian Assange, here directs a futuristic, multi-screen mini-documentary that is more nerve-wracking than any horror film. It highlights the threat that coronavirus tracing apps can be used to increase government and police surveillance of citizens without their knowledge. The film proceeds via interviews with those in the know to discuss digital infection of our phones, computers and cameras by malware. The Israeli company NSO Group (which denied the films allegations) is singled out as a bad actor prone to intimidate and sue anyone calling them out. NSO is both a cyber weapons manufacturer and, guess what, the producer of coronavirus tracing apps. Brian Enos music adds to the films dystopian atmosphere, along with a rolling database that scrolls sinisterly over the screen. Its enough to ruin anyones day, which is probably what Poitras intended.

David Lowery returns to the moody atmosphere of his indie Western crime drama Aint Them Bodies Saints in a puzzling tale about a Texas woman (Catherine Machovsky), who once was called Clyde. She sets out to dig up the body of her little brother on the basis of old letters from her father (now also dead). Many years earlier her father stole his sons dead body from a hospital and, unable to get the putrefying corpse to Texas, buried him in the remote countryside. One imagines the boy might have died from some kind of contagion to connect to the films theme, but that has no importance in this weird and partially incomprehensible Gothic horror tale in which skeletons talk.

Singapore director Anthony Chen (Ilo Ilo) offers an excellent take on the stress a young family goes through sharing close quarters during 45 days of lockdown. Though set in China with Chinese actors, the situation is universally recognizable. The break-down in the marriage of a couple played by Dongyu Zhou (noteworthy as the female teen lead in Derek Tsangs Better Days) and her husband Yu Zhang (An Elephant Sitting Still) is gradual but steady as they struggle to take care of their young child on a limited income in a small apartment. While she still works for a call center from home, he (a car salesman) hibernates on the couch. Her nerves are frayed; he wants sex and she refuses. It ends in a liberating but possibly no-return outburst of wildness. Chen offers the viewer some relief from the claustrophobia with outdoor shots of deserted streets and a huge banner that says Wuhan.

Chilean director Dominga Sotomayor, who became the first woman to win Locarnos Golden Leopard with her 2018 feature Too Late to Die Young, looks at the separation of loved ones under COVID restrictions. A plucky mother and her grown daughter keep up a farmhouse, while a city daughter announces her first baby has been born. The family is briefly reunited under a third-floor balcony, where we get a glimpse of new life, a child who will eventually help repopulate the empty pandemic landscape. The use of ancient church music underlines hope in a no-frills story.

Less simple and linear (as might be expected) is Apichatpong Weerasethakuls closing reflection. The set is a naked bed surrounded by neon tube lights, vaguely suggesting a porn film before the action begins. But in the tropical night, the action already has begun: Attracted by the lights, insects of all sizes and shapes congregate indiscriminately over and on the sheets. There is promiscuity, but also death big insects eat smaller ones with unemotional cannibalism. Disembodied human voices float from a scratchy gramophone record off screen, talking over old black and white photographs. Is this life after the apocalypse?

More:
The Year of the Everlasting Storm: Film Review | Cannes 2021 - Hollywood Reporter

Bill Bishop interview: The writer of China-focused newsletter Sinocism – Press Gazette

Bill Bishop is (literally) the original Substacker.

In the spring of 2017, Bishop an American media entrepreneur who previously lived and worked in Beijing was preparing to start charging readers for his China-focused blog/email newsletter.

In October of that year, after being approached by one of the founders of Substack, former journalist Hamish McKenzie, he became the newsletter platforms first writer.

Today, Substack is home to thousands of newsletters. The platform has millions of readers a month and says that its writers collectively have more than 500,000 paying subscribers.

Bishops newsletter, Sinocism, had 30,000 free subscribers (built up since 2012) when it launched on Substack, and a fair few of them decided to start paying immediately.

On the first day I was at over $100,000 in revenue for the year, says Bishop, who became an early investor in Substack after launching his newsletter. So it was a great start. And it grows every year.

The appeal of Substack for Bishop and others is that the platform handles the technical side of the business enabling writers to easily send out newsletters and collect payments. In return, Substack takes a 10% cut of paid subscriptions.

Bishop does not say what his annual revenues are currently more than zero, less than a million. But he does reveal that Sinocism today has more than 90,000 subscribers and that a single-digit percentage of these people pay for his premium edition. He charges $15 a month, or $168 a year.

Bishop, a co-founder of CBS MarketWatch which is now part of Dow Jones/News Corp lived and worked in China between 2005 and 2015.

He first started Sinocism as a blog during this period. In 2012, Chinas great firewall of internet regulation forced him to start sharing his content by email.

After moving to Washington DC in 2015, Bishop continued to write Sinocism, which provides readers with analysis, commentary and links to the biggest news about China.

Sinocism says its audience is made up of investors, policymakers, executives, analysts, diplomats, journalists, scholars, and others.

Bishop, who studied China academically and speaks Mandarin Chinese, describes himself as an analyst, commentator and meta-editor.

Reporters working in China often report instances of being followed or disrupted in their work. Bishop says that he had no apparent issues when living in Beijing, possibly because he was never officially recognised as a journalist.

But he adds that, because US-China relations have worsened since his move in 2015, I wouldnt be doing my newsletter if I was living in Beijing now. That would no doubt cause all sorts of problems for me.

Bishop says the big stories for him in the coming years will be the length of Xi Jinpings presidential reign will he become a leader for life? Chinas relations with the West and the developed world how much worse does it get? and the fallout from Covid-19, including how and where the disease originated.

Substack says its top ten writers collectively now make more than $15m a year through paid subscriptions. Bishop is no longer in the top ten but, because of his early investment in the company, their success is his success to an extent.

I really liked the team, and I thought it was interesting, says Bishop when asked about why he decided to invest in Substack. But I had no idea it was going to become a noun and a verb the way it has. It seems kind of crazy. Its really quite remarkable.

Substacks reputation has grown significantly over the past year or so. Several high-profile writers and public figures including Edward Snowden, Glenn Greenwald and Dominic Cummings, the former chief adviser to UK prime minister Boris Johnson have launched their own newsletters on the platform.

[Read more: Interview with Substack co-founder Hamish McKenzie]

But Substack is now facing serious competition. Apparently inspired by the platforms success, both Twitter and Facebook are launching themselves into the newsletter business, with Revue and Bulletin respectively.

Bishop is not overly concerned. Sure, its hard to compete in some ways with Facebook and Twitter. But at the same time and youve seen this across industries those companies are massive, and they have much bigger things theyre focused on.

He believes Substacks work has been validated by this new competition after the concept was initially ignored or poo-pooed.

If, three years into this, the big guys werent paying attention, it would make me wonder whether or not this was a space worth caring about.

Now Facebook and Twitter have made it clear that this is an area thats very much worth caring about and fighting over.

Bishop believes the growth of Substack has been good for journalists and writers because it has made employers realise their value.

For a long time journalists, with very few exceptions, were not really considered talent, he says.

And now things like Substack, Revue/Twitter, whatever the Facebook thing is, are making it much more complicated for managers at these media companies to figure out how they deal with talent.

In the US, there have been several stories of journalists leaving established news groups to earn more for themselves on Substack.

So does Bishop think Substack is the future of journalism? Not quite.

Really good enterprise reporting is expensive, it takes a team, it takes good editor, and a lot of times it takes a really good brand behind you.

So its not like every journalist is going to be able to make the jump to become a Substacker making a couple of hundred grand a year.

But I think people who are very good in their niche can do extremely well.

Top picture credit: Reuters/ Carlos Garcia Rawlins

Press Gazette's must-read weekly newsletter featuring interviews, data, insight and investigations.

View original post here:
Bill Bishop interview: The writer of China-focused newsletter Sinocism - Press Gazette

Leveraging Encryption Keys to Better Secure the Federal Cloud – Nextgov

Delteks Federal Cloud Computing Market, 2020-2022 Report predicts federal cloud investments will reach $7.8 billion by fiscal 2022.For government agencies, migrating resources to the cloud increases flexibility, efficiency and promises enhanced security features.But in a cloud-centric world, security is increasingly complex. While security tools do exist within platforms, users may accidentally or unknowingly disable security features.

Additionally, cloud-based applications must be protected from cloud infrastructure attacks, including insider threats.This requires encrypting data at rest and end-to-end encryption for data-in-transit. Taking it a step further than encryption itself, agencies must consider security and access to the keys used to encrypt data.

Have You Seen My Keys?

When employing a cloud solution, agencies may enlist multiple providers to create a multi or hybrid cloud environment. Utilizing multiple clouds can mean encryption keys end up stored in more than one location across various infrastructures, enhancing the risk of the keys falling into the hands of a bad actor.

In the same way we use a key to lock valuable assets in a safe deposit box, agencies can lock up encryption keys for personally identifiable information, such as email addresses and mobile device management credentials. Locking encryption keys grants agencies the ability to control access to keys, manage key rotation and handle data within a specific region, which is especially helpful in government, as agencies face FISMA compliance regulations.

The cloud will continue to grow in importance for federal agencies and the time is now to ensure the government cloud is as secure as possible. The Cloud Security Alliance recommends encrypting data in the cloud and managing the encryption keys on-premises within a FIPS-certified boundary. Keys should be managed and secured in a FIPS 140-2 certified key manager.

Tamper-resistant FIPS 140-2 Level 3 Hardware Security Modules provide the highest level of security against internal and external threats that may result from an increased number of endpoint devices connecting to resources via the cloud.

Cloud Encryption and Mobile Applications

Cloud-based applications often connect directly to mobile and other endpoint devices. By processing and storing data on the cloud, mobile applications can function more efficiently, extending battery life and improving reliability. However, with multiple cloud applications connecting to agency resources through mobile devices, the threat landscape is greatly expanded.

Cloud-based applications on mobile devices can also serve as entry points for bad actors through malicious apps, mobile phishing and more. As such, encryption and other cloud security must extend to mobile.

Protection on mobile devices needs to include, but go beyond, cloud encryption for comprehensive mobile endpoint security. Precautions, such as user education and a zero-trust policy that extends to mobile, can ensure mobile devicesand the information they contain stay safe.

To fully protect an agency and its information, mobile security needs to protect applications, networks and devices from phishing and other mobile threats. While workers may be able to identify phishing attacks on desktops or laptops, it becomes much more difficult on mobile devices. Attacks may be harder to spot due to small screen size and layout of a mobile device but can gain the same access to agency data if successful.

Cloud Is Here to Stay

As agencies continue to prioritize cloud in a government, the ability to manage encryption keys offers assurance that sensitive data can never be accessed or controlled by unauthorized individuals. This includes apps on mobile endpoint devices, which constantly communicate with the cloud, transferring data to and from the device. Mobile security must extend to the cloud, keeping agencies and the devices accessing their resources protected from cybercriminals and malicious nation-states as attacker strategies evolve.

Tim LeMaster is vice president ofWW Systems Engineering at Lookout.

Go here to read the rest:
Leveraging Encryption Keys to Better Secure the Federal Cloud - Nextgov

If full encryption of police radios necessary? Berkeley may allow public to hear one of their channels – The Daily Post

This story was originally published June 30 in the Daily Post. To get all of the local news first, pick up the Post in the mornings at 1,000 Mid-Peninsula locations.

BY ELAINE GOODMANDaily Post Correspondent

The Berkeley Police Department might decide to keep one of its radio channels unencrypted, meaning the public would be able to listen in to some police activities, an official said yesterday.

If Berkeley keeps a radio channel public, it would be a departure from the approach taken by Palo Alto, Mountain View and Los Altos, which fully encrypted their police radio transmissions earlier this year.

The Berkeley Police Department is still undecided if we will encrypt BPD-1 as well; or just BPD-3 (RB-1), Berkeley Police Capt. Kevin Schofield said in a written statement provided to the Post.

Details werent immediately available on what information would be transmitted over BPD-1 versus BPD-3. A police department manual on the citys website described BPD-1 as a primary channel for patrol officers, and said RB-1 is used to communicate with the records center.

The question of encrypting police radio transmissions comes after the California Department of Justice in October told law enforcement agencies that they have to protect individuals personally identifiable information and criminal justice information when using the California Law Enforcement Telecommunications System, or CLETS. Examples of information that needs protecting are a persons drivers license number, Social Security number or criminal history.

The DOJ memo, from Joe Dominic, chief of the California Justice Information Services Division, described two ways a law enforcement agency could protect the information: by encrypting radio traffic, or establishing a policy to not publicly broadcast certain types of information.

Police scanners go silent

Police departments in cities including Palo Alto, Mountain View, and Los Altos responded to the DOJ memo by going to full encryption of their radio channels. News reporters and the public can no longer tune in using police scanners to hear what officers in those cities are doing. Police scanners have been in existence for about 70 years.

But some cities are taking a different approach. As the Post reported last month, the San Francisco Police Department will partially encrypt its radio transmissions when it moves to a digital system this year.

San Francisco dispatchers will use a public channel to send officers to an incident, such as a report of a robbery at a particular location. After that, radio communications related to the incident will be encrypted and the public wont be able to listen in. But when the incident concludes, dispatchers will state on an unencrypted channel what the outcome was, for example, officers took a report or made an arrest.

San Francisco officers will check a persons drivers license information or criminal history using encrypted channels.In Berkeley, whose police department is closer in size to that of Palo Alto, the move to encryption is complicated by a number of factors, according to information obtained by the Post through a public records request.

The department noted that Berkeley is a member of the East Bay Regional Communications System, or EBRCSA, a radio system that operates under a joint powers agreement between Alameda and Contra Costa County. EBRCSA owns and manages the digital radio system.

It could take more than two years for EBRCSA members to move to encryption. In the meantime, the Berkeley PD is taking steps to protect subjects personal information.

Phones for confidential information?

In the interim, we will attempt to use our MDTs, department cellular phones, or land line telecommunications to transmit and receive PII, the police department stated in a letter. An MDT is a mobile data terminal, or computer, that officers use in their patrol cars. PII refers to personal identifiable information.

In Palo Alto, Police Chief Robert Jonsen said in a January blog post that alternative methods of protecting personal information, such as using cell phones, are not operationally practical or safe for our personnel.

In Berkeley, officers have a strategy to help protect personal information when cell phones or MDTs arent feasible and they transmit the information over the radio. In those cases, officers will break up the personal information by transmitting details such as a persons name, birthday and address in separate transmissions, or even in different channels, Berkeley PD said in its letter.Budget shortfalls may hamper the move to encryption, the letter said.

Due to Covid-19, we are anticipating budget shortfalls in our projected revenue for projects such as this, the letter stated. In addition, the community is asking to reduce our budgets.

The letter ends by referring further questions to Lt. Peter Hong. Hong did not respond to the Posts request for a telephone interview yesterday.

Previous stories about the encryption of police radios

June 16, 2017, Palo Alto to spend $4 million on new radio system; Redwood Citys experience was a fiasco

Jan. 6, 2021, Police cut off their radio transmissions to the public

Jan. 8, 2021, Editorial, Police decision to encrypt police radio transmissions reduces transparency

Jan. 11, 2021, Mayor says that encrypting police radio signals was a mistake

Jan. 11, 2021, Palo Alto Council will discuss police radio encryption, Mountain View will follow Palo Altos lead

Feb. 14, 2021, Opinion, Encryption isnt a mandate, its a choice

March 29, 2021, Police chief willing to consider alternatives to full encryption but lacks examples

April 1, 2021, One city is reluctant to switch to encrypted police radio

April 5, 2021, Palo Alto Police ask state if they can temporarily drop encryption

May 24, 2021, San Francisco finds an alternative to full encryption of police radios

May 27, 2021, Opinion, 55 days later and state DOJ hasnt complied with records request for information on police radio encryption

See the article here:
If full encryption of police radios necessary? Berkeley may allow public to hear one of their channels - The Daily Post