Global Open Source Software Market 2025 Cumulative Impact of COVID-19 On Top Manufacturers: Intel, Epson, IBM, Transcend, Oracle, Acquia, etc. – The…

Global Open Source Software Market: Introduction

The report representing the Global Open Source Software Market is an intensive research based documentation shedding enormous light on market developments, noteworthy trends as well a competitive vendor activities and performance analysis besides evaluating competition positioning that gradually direct hefty revenue flow and sustenance in global Open Source Software market. The report also entails significant details on COVID-19 spread and their effective management.

In this dedicated research report on global Open Source Software market, insightful detailing has been prioritized to lend report readers with qualitative and quantitative aspects of multiple vertices such as competition spectrum, positioning of the vendors as well as details pertaining to growth rate and trajectory, profit margin as well as other monetary policy making to harness maximum growth in global Open Source Software market.

The study encompasses profiles of major companies operating in the Open Source Software Market. Key players profiled in the report include:IntelEpsonIBMTranscendOracleAcquiaOpenTextAlfrescoAstaroRethinkDBCanonicalClearCenterCleversafeCompiereContinuent

Esteemed report readers, and eminent market participants comprising of key players as well as frontline investors can get hassle-free access to this in-depth market intelligence report to plan and delegate optimum business discretion complying effectively with manufacturer inclination towards harnessing COVID-19 readiness.

Manufacturing Landscape: Elaborate portfolios of various local, regional, and global vendors and manufacturers inclusive of SWOT analysis, capacity and product catalog and capacity, and other vital details that remain important constituents of the market.

Executive Summary: This particular section of the report lends appropriate to focus on various factors such as growth rate, optimum drivers and restraints, competitors as well as trends that define the competition outline.

Regional Outlook: Further in the report, discussions on other relevant factors such as revenue generation traits, lead players, thorough detailing of production and consumption ratios and the like have also been included in the report to encourage unfaltering business moves and investment discretion that secures healthy growth trail in the global Open Source Software market.

Global Open Source Software Market: Understanding Scope In-depth research and thorough evaluation of the various contributing factors reveal that the global Open Source Software market is estimated to perform decently in forthcoming years, reaching a total valuation of xx million USD in 2020, and is further poised to register xx million USD in 2027, growing at a healthy CAGR of xx%. This elaborate research report also houses extensive information of various market-specific segments, elaborating further on segment categorization comprising type, application as well as end-user sections which successively influence lucrative business discretion.

Access Complete Report @ https://www.orbismarketreports.com/global-open-source-software-market-growth-analysis-by-trends-and-forecast-2019-2025?utm_source=Puja

Segment-wise AssessmentVital market relevant information encompassing details on Open Source Software market have been sourced across myriad source hubs to draw logical conclusions. For maximum reader ease and seamless comprehension, report offerings have been classified and arranged in the form of graphs, charts and tabular format to induce mindful decision making in the competitive landscape.

By the product type, the market is primarily split into SharewareBundled SoftwareBSD(Berkeley Source Distribution)

By the end-users/application, this report covers the following segments BMForumphpBBPHPWind

Global Open Source Software Market: Regional AnalysisThis section of the report also lends veritable insights and workable cues on region specific progresses as well as country-based advances encompassing product and service portfolio developments. Key focus of the report includes details specific to Europe, North America, APAC, MEA and South America.

The key regions covered in the Open Source Software market report are:North America (U.S., Canada, Mexico)South America (Cuba, Brazil, Argentina, and many others.)Europe (Germany, U.K., France, Italy, Russia, Spain, etc.)Asia (China, India, Russia, and many other Asian nations.)Pacific region (Indonesia, Japan, and many other Pacific nations.)Middle East & Africa (Saudi Arabia, South Africa, and many others.)

This section of the report lends exclusive focus in assessing various regional and country specific elements of the Open Source Software market. Besides segregating the growth hotspots, this section embodies versatile understanding concerning various growth harnessing industrial practices as well as strategic aid favoring uncompromised growth and sustainable revenue returns in global Open Source Software market.

Scope of the ReportThe discussed Open Source Software market has been valued at xx million US dollars in 2019 and is further projected to grow at xx million US dollars through the forecast span till 2024, growing at a CAGR of xx% through the forecast period.

Place Inquiry for Buying or Customization of [emailprotected] https://www.orbismarketreports.com/enquiry-before-buying/80775?utm_source=Puja

The Report Helps You in Understanding: Dominant and emerging trend analysis, elaborate references of key drivers, restraints, threats and challenges besides also harping on product categorization as well as industry chain analysis that collectively influence uniform growth The report lends amplified focus on important business priorities and investment choices preferred by key players as well as contributing players The report discusses at length the core growth pattern and market dimensions, besides also harping on decoding competition spectrum for thorough business discretion

(*If you have any special requirements, please let us know and we will offer you the report as you want.)

About Us : Our team of expert research professionals are committed to offering high-end industry-specific critical reports inclusive of high accuracy insights for future-ready business discretion. Our commitment of unbiased research has enabled a thorough evaluation process of voluminous data to infer market-relevant derivation.

Contact Us : Hector CostelloSenior Manager Client Engagements4144N Central Expressway,Suite 600, Dallas,Texas 75204, U.S.A.Phone No.: USA: +1 (972)-362-8199 | IND: +91 895 659 5155

Continue reading here:
Global Open Source Software Market 2025 Cumulative Impact of COVID-19 On Top Manufacturers: Intel, Epson, IBM, Transcend, Oracle, Acquia, etc. - The...

Linux Operating System Market 2019 Global Recent Trends, Competitive Landscape, Size, Segments, Emerging Technologies and Industry Growth by Forecast…

Market Highlights

According to Market Research Future (MRFR), The Global Linux Operating System Market is estimated to expand at an 18.5% CAGR from 2018 to 2023 (forecast period). The research report describes and examines the effects of the COVID-19 outbreak on the global market, including prospects and threats, drivers, and risks.

Linux is an open source operating system that interfaces between computer software and hardware. Linux OS consists of a Linux kernel that contains all the required components of a fully functioning operating system. The Linux OS consists of two execution modes user mode and kernel mode with a number of privileges. Linux OS is similar to other operating systems, such as Windows, OS X, or iOS, in graphical user interface and software applications like word processing applications. Linux OS is an open source software that makes the code used to build Linux free and available to the public to view, edit, and distribute. Linux OS is distributed to leading players in the Linux operating system market for various devices, such as workstations, desktops, and servers. The vendors also give support for the Linux-based OS that they distribute.

Market Dynamics

The growth in the market for Linux operating systems is due to the growing demand for open-source operating systems and the need for a more secure operating system than Windows. Moreover, the market is also seeking opportunities, due to the growing use of a user-friendly graphical user interface (GUI) and the increasing adoption of Linux operating systems by small and medium-sized enterprises, to lower initial costs and improve business efficiency.

Several IT organizations are deploying Linux OS on desktops and workstations due to the advantages they offer in terms of usability and cost-effectiveness. Linux operating system-based workstations offer high operating performance. Linux OS is capable of managing multiple users simultaneously, which is the primary need for any IT organization. In addition, Linux OS provides virtualization, making it suitable for use in workstations. Red Hat, Inc. has a significant share in the distribution of Linux OS for enterprise workstations.

Linux-based operating system distributors dominate the server market for operating systems. Linux OS provides a secure platform for managing workloads running on bare metal, virtual machines, containers, or private or public clouds. Companies like Facebook, Amazon, Google, and Twitter run gigantic server clusters on the Linux operating system. Leading Linux OS servers are provided by CentOS, Debian, Ubuntu Server, Slackware, and Gentoo. For server Linux OS offers integrated control features for improved security, automated compliance across various environments, and simplified software updates, among others.

Get a Free Sample @https://www.marketresearchfuture.com/sample_request/7697

Segmentation:

Linuxoperating system market forecasthas been segmented into type, device type, and application.

By type, the global market has been segmented into user mode and kernel mode.

By device type, the global market has been segmented into workstations and server.

By application, the global market has been segmented into enterprise (large enterprises, SMEs) and individuals.

Regional Analysis

Linux operating system market based on the region has been segmented into North America, Europe, Asia Pacific, the Middle East & Africa, and South America.

North America had the highest market share of 36.5% in 2017, with a market valuation of USD 1.107.0 million; the market is projected to have a CAGR of 18.7% over the forecast period. Europe was the second-largest market in 2018, estimated at USD 929.9 million, and is expected to rise at the highest CAGR of 20.4%. The growth in the North American market is powered by the presence of key players such as Red Hat Inc. and IBM Corporation. In addition, the growing adoption of Linux-based server farms (data centers) by financial organizations in the region is expected to further boost the market for Linux operating systems in North America in the near future.

Key Players

The key players of the Global Linux Operating System Market are IBM Corporation (US), Ubuntu (Canonical Ltd) (UK), Linux Mint (UK), elementary, Inc., Debian, Manjaro, Arch Linux, SUSE, and Red Hat, Inc. (US).

Also Read:https://www.marketwatch.com/press-release/linux-operating-system-market-is-expected-to-expand-at-an-185-cagr-which-regions-are-affected-due-to-covid19-2020-04-06?mod=mw_quote_news

Go here to read the rest:
Linux Operating System Market 2019 Global Recent Trends, Competitive Landscape, Size, Segments, Emerging Technologies and Industry Growth by Forecast...

‘Persecuting Assange Is a Real Blow to Reporting and Human Rights Advocacy’ – FAIR

Janine Jackson interviewed Defending Rights & Dissents Chip Gibbons about Julian Assanges extradition hearing for the October 9, 2020, episode of CounterSpin. This is a lightly edited transcript.

MP3 Link

Janine Jackson: If it were not for a tiny handful of journalistsShadowProofs Kevin Gosztola preeminent among themAmericans might be utterly unaware that a London magistrate, for the last month, has been considering nothing less than whether journalists have a right to publish information the US government doesnt want them to. Not whether outlets can leak classified information, but whether they can publish that information on, as in the case of Wikileaks, US war crimes and torture and assorted malfeasance to do with, for instance, the war on Afghanistan, which just entered its 19th year, with zero US corporate media interest.

Assanges case, the unprecedented use of the Espionage Act to go after a journalist, has dire implications for all reporters. But this countrys elite press corps have evidently decided they can simply whistle past it, perhaps hoping that if and when the state comes after them, theyll make a more sympathetic victim.

Joining us now to discuss the case is Chip Gibbons. Hes policy director at Defending Rights & Dissent. He joins us now by phone from Washington, DC. Welcome back to countersign, Chip Gibbons.

Chip Gibbons: Always a pleasure to be on CounterSpin.

JJ: I wondered, first, given the absence of US news media attention, if you could tell us just whats happening? I mean, its a hearing for Julian Assanges extradition, but in the very informative webinar that Defending Rights & Dissent did last night with Kevin Gosztola of ShadowProof, whos pretty much single-handedly reporting on this, he called it a trial. So it feels like things are shifting around, just in terms of what this means, and so, if its not too crazy a question: Whats going on?

CG: Sure. So the US has indicted Julian Assange with 17 counts under the Espionage Act, as well as a count under the Computer Fraud and Abuse Act.

Assange is not a US person; hes an Australian national. He was inside the Ecuadorian embassy for a number of years, as Ecuador had granted him asylum, and the UK had refused to basically recognize that and let him leave the country, so he was de facto imprisoned inside the embassy. And after the indictment the US issued, the new government of Ecuadorwhich is much less sympathetic to Assange than the previous Correa governmentlet the US come in the embassy and seize him.

And the US is seeking Assanges extradition to the US from the UK. I guess its, probably, technically a hearing, but Kevins point was that its more like what we would think of as a trial, in that theres different witnesses, theres expert testimony, theres different legal arguments at stake.

The defense, the witness portion of it, has closed; it ended last week. And theres going to be closing arguments submitted in writing, and then the judge will render a decision, and that decision will be appealable by either side. So regardless of the outcome, we can expect appeals. So it does very closely mirror what we would think of more like a trial than a hearing in the US court context.

Its important to really understand whats at stake with Assanges extradition. He is the first person ever indicted by the US government under the Espionage Act for publishing truthful information.

The US government has considered indicting journalists before: They considered indicting Seymour Hersh, a very famous investigative reporter. They considered indicting James Bamford, because he had the audacity to try to write a book on the National Security Agency. But theyve never done that.

And Obamas administration looked at the idea of indicting Assange and said, No, this would violate the First Amendment, and it would open the door to all kinds of other bad things. But the Trump administration clearly doesnt have those qualms.

And its worth pointing out that Assanges indictment follows an unprecedented period, initiated by the Obama administration, of indicting whistleblowers or journalists sources under the Espionage Act. So weve seen Chelsea Manning indicted, weve seen Edward Snowden indicted under the Espionage Act, but to indict the journalists, though, is a real new step, and not for the best.

JJ: And thats what I wanted to just to underscore, or ask you to: We do have rules around journalists being provided materials that might be hacked, or that might be illegally obtained, or that might be leaked. Journalists have a rightI mean, through this murkinessjournalists have a right to publish information, even if that information is illegally obtained. Is that not true?

Chip Gibbons: Julian Assange is accused of publishing information about war crimes, about human rights abuses and about abuses of power, that have been tremendously important, not just for the publics right to know, but also have made a real difference in advocacy around those issues.

CG: Thats what the Supreme Court has said in the past; that is the precedent, and I believe that is what prevented the Obama administration from moving against Assange. It is very interesting to see how this plays out in a US court in the current environment. If whoeverTrump or Biden, whoever is president, when this finally comes to the USactually pursues this, and they actually are allowing the persecution of journalists, thats going to be a really dark, dark assault on free expression rights.

And its worth rememberingand Julian Assange is clearly very reviled in the corporate media and the political establishment right nowbut the information he leaked came from Chelsea Manning, it dealt with US war crimes; and he worked with the New York Times, the Guardian, Der Spiegel, Le Monde, Al Jazeera, to publish this information. So if he can go to jail for publishing this, why cant the New York Times? And is that a door anyone wants to open? There is a big press freedom angle here.

I also want to talk about the facts, though: What did Julian Assange publish, and why did it matter? One of the witnesses that took the stand in his defense was Clive Stafford Smith, whos one of the founders of Reprieve UK; hes represented men detained at Guantnamo Bay and victims of US drone strikes, and he discussed how the information published by WikiLeaks, given by whistleblower Chelsea Manning, has aided their work, including getting a court ruling in Pakistan, saying that US drone strikes were illegal and constituted a war crime. And other people who have done advocacy or journalism around Guantnamo testified about how Wikileaks published the Guantnamo Bay files, which showed how the US government was holding people it didnt suspect of any crimes.

Julian Assange is accused of publishing information about war crimes, about human rights abuses and about abuses of power, that have been tremendously important, not just for the publics right to know, but also have made a real difference in advocacy around those issues. People were able to go and get justice for victims of rendition, or able to go and get court rulings in other countries about US drone strikes, because of this information being in the public domain. So attacking Assange, persecuting Assange, disappearing him into a supermax prison, this is a real blow to reporting and human rights advocacy.

And Assange isnt even a US national, hes an Australian citizen; he didnt publish this information in this country. So, basically, the US is saying that if you exist anywhere in the world, and youre a journalist, and you do what I would call journalismexposing the crimes of the powerful; I know, a lot of journalists in this country dont do thatbut they can come and charge you with espionage, put you in solitary confinement, put you in a supermax prison?

We miss how high the stakes are in this country on this issue, but its not lost on the rest of the world. Look at who are Julian Assanges supporters: He has on his defense team Baltasar Garzn, whos the very famous Spanish ex-judge who indicted Pinochet; his main attorney, Jennifer Robinson, is a famed human rights attorney who, in addition to representing Assange, has used information released by WikiLeaks in her other human rights cases.

His international supporters include:

So if you look around the world, high-profile left-wing politicians, including current and former heads of state and internationally renowned human rights activists, support Assange, and thats because they understand this is about exposing war crimes, this is about exposing human rights abuses. And I wish more people in the US would realize thats whats going on here.

JJ: Right. And, finally, the journalists who are holding their nose right now on covering it arent offering to give back the awards that they won based on reporting relying on WikiLeaks revelations. And James Risen had an op-ed in the New York Times a while back, in which he was talking about Glenn Greenwald, but also about Julian Assange, and he said that he thought that governmentshe was talking about Bolsonaro in Brazil, as well as Donald Trumpthat theyre trying out these anti-press measures and, he said, they seem to have decided to experiment with such draconian anti-press tactics by trying them out first on aggressive and disagreeable figures.

And what struck me about that is that I feel like thats where the public comes in, frankly, because its really for us to decide, are we going to say, Well, I dont like Julian Assange, so Im not going to care about this case? Its up to us to say we can separate principle from person if we need to, that we can see whats at stake and that we wont allow, in other words, media, which, in this case, theres an explicit tactic of demonizing a person, so that you can be encouraged to think Well, this has nothing to do with me, and Assange, if something bad happens to him, that doesnt have anything to do with me. And unfortunately, media are helping us make that disassociation from the person and the principle here.

CG: Yeah, the US media has done a really fantastic job of demonizing Julian Assange, which is not to say, there can never be any legitimate criticisms or differences of opinion with him. I know a lot of people, including many of his longtime supporters, were very displeased with some of the stuff he did or said during the 2016 election. But at the end of the day, that doesnt give the US government the right to disappear and torture someone for the crime of exposing its own actual crimes.

Whether or not you agree with everything hes ever said or doneand theres no one on this planet who I agree with everything theyve ever said and done, not even myself, for that matter, right?he took real risk to bring truth. I believe he said something like, If wars can be started based on lies, then peace can be brought based on truth. Thats the motto hes operating under, and we need people like Julian Assange, and WikiLeaks, to pursue the truth, to shine light on these abuses of power.

JJ: Weve been speaking with Chip Gibbons, policy director at Defending Rights & Dissent. Theyre online at RightsAndDissent.org. Chip Gibbons, thank you so much for joining us this week on CounterSpin.

CG: Thank you for having me again.

Read this article:
'Persecuting Assange Is a Real Blow to Reporting and Human Rights Advocacy' - FAIR

Facebook and Twitter Cross a Line in Censorship – The Intercept

The Posts hyping of the story as some cataclysmic bombshell was overblown. While these emails, if authenticated, provide some new details and corroboration, the broad outlines of this story have long been known: Hunter was paid a very large monthly sum by Burisma at the same time that his father was quite active in using the force of the U.S. Government to influence Ukrainesinternal affairs.

Along with emails relating to Burisma, the New York Post also gratuitously published several photographs of Hunter, who has spoken openly and commendably of his past struggles with substance abuse, in what appeared to various states of drug use. There was no conceivable public interest in publishing those, and every reason not to.

The Posts explanation of how these documents were obtained is bizarre at best: They claim that Hunter Biden indefinitely left his laptop containing the emails at a repair store, and the stores owner, alarmed by the corruption theyrevealed, gave the materials from the hard drive to the FBI and then to Rudy Giuliani.

While there is no proof that Biden followed through on any of Hunters promises to Burisma, there is no reason, at least thus far, to doubt that the emails are genuine. And if they are genuine, they at least add to what is undeniably a relevant and newsworthy story involving influence-peddling relating to Hunter Bidens work in Ukraine and his trading on the name and power of his father, now the front-runner in the 2020 presidential election.

But the Post, for all its longevity, power and influence, ran smack into two entities far more powerful than it: Facebook and Twitter. Almost immediately upon publication, pro-Biden journalists created a climate of extreme hostility and suppression toward the Post story, making clear that anyjournalisteven mentioningit would be roundly attacked. For the crime of simply noting the story on Twitter (while pointing out its flaws), New York Times reporter Maggie Haberman was instantly vilified to the point where her name, along with the phrase MAGA Haberman, were trending on Twitter.

(That Habermanis a crypto-Trump supporter is preposterousfor so many reasons, including the fact that she is responsible for countless front-page Times stories that reflect negatively on the president; moreover,the 2016 Clinton campaign considered Haberman one of their most favorable reporters).

The two Silicon Valley giants saw that hostile climate and reacted. Just two hours after the story was online, Facebook intervened. The company dispatched a life-long Democratic Party operative who now works for Facebook Andy Stone, previously a communications operative for Democratic Sen. Barbara Boxer and the Democratic Congressional Campaign Committee, among other D.C. Democratic jobs to announce that Facebook was reducing [the articles] distribution on our platform: in other words, tinkering with its own algorithms to suppress the ability of users to discuss or share the news article. The long-time Democratic Party official did not try to hide his contempt for the article, beginning his censorship announcement by snidely noting: I will intentionally not link to the New York Post.

Even more astonishing still, Twitter locked the account of the New York Post, banning the paper from posting any content all day and, evidently, into Thursday morning. The last tweet from the paper was posted at roughly 2:00 p.m. ET on Wednesday.

And then, on Thursday morning, the Post published a follow-up article using the same archive of materials, this one purporting to detailefforts by the former vice presidents son to pursue lucrative deals with a Chinese energy company by using his fathers name.Twitter is now alsobanning the sharing or posting of links to that article as well.

In sum, the two Silicon Valley giants, with little explanation, united to prevent the sharing anddissemination of this article. As Los Angeles Times reporter Matt Pearce put it, Facebook limiting distribution is a bit like if a company that owned newspaper delivery trucks decided not to drive because it didnt like a story. Does a truck company edit the newspaper? It does now, apparently.

That the First Amendment right of free speech is inapplicable to these questions goes without saying. That constitutional guarantee restricts the actions of governments, not private corporations such as Facebook and Twitter.

But glibly pointing this out does not come close to resolving this controversy. That actions by gigantic corporations are constitutional does not mean that they arebenign.

State censorship is not the only kind of censorship. Private-sector repression of speech and thought, particularly in the internet era, can be as dangerous and consequential. Imagine, for instance, if these two Silicon Valley giants united with Google to declare:henceforth we will ban all content that is critical of President Trump and/or the Republican Party, but will actively promote criticisms of Joe Biden and the Democrats.

Would anyone encounter difficultly understanding why such adecreewould constitute dangerous corporate censorship? Would Democrats respond to such a policyby simply shrugging it off on the radical libertarian ground that private corporations have the right to do whatever they want? To ask that question is to answer it.

To begin with, Twitter and particularly Facebook are no ordinary companies. Facebook, asthe owner not just of its massive social media platform but also other key communication services it has gobbled up such as Instagram and WhatsApp, is one of the most powerful companies ever to exist, if not the most powerful. In June,the House Judiciary Subcommittee on Antitrust, Commercial, and Administrative Law launched an investigation into the consolidated power of Facebook and three other companies Google, Amazon and Apple and just last week issued a sweeping reportwhich, as Ars Technica explained, found:

Facebook outright has monopoly power in the market for social networking, and that power is firmly entrenched and unlikely to be eroded by competitive pressure from anyone at all due to high entry barriersincluding strong network effects, high switching costs, and Facebooks significant data advantagethat discourage direct competition by other firms to offer new products and services.

In his New York Times op-ed last October, the left-wing expert on monopoly powerMatt Stoller described Facebook and Google as global monopolies sitting astride public discourse, and recounted how bipartisan policy and legal changes designed to whittle away antitrust protections have bestowed the two tech giants with a radical centralization of power over the flow of information. And he warns that this unprecedented consolidation of control over our discourse is close to triggeringthe collapse of journalism and democracy.

It has been astonishing to watch Democratsover the last twenty-four hours justify this censorship on the grounds that private corporations are entitled to do whatever they want. Not even radical free-market libertarians espouse such a pro-corporate view. Even the most ardent capitalist recognizes that companies that wield monopoly or quasi-monopoly power have an obligation to act in the public interest, and areanswerable to the public regarding whether they are doing so.

That is why in both the EU and increasingly the U.S., there are calls from across the political spectrumto either break up Facebook onantitrust and monopoly grounds or regulate it as a public utility, the way electric and water companies and AT&T have been. Almost nobody in the democratic world believes that Facebook is just some ordinary company that should be permitted to exercise unfettered power and act without constraints of any kind. Indeed, Facebooks monumental political and economic power greater than most if not all the governments of nation-states is themajor impediment to such reforms.

Beyond that, both Facebook and Twitter receive substantial, unique legal benefits from federal law,further negating the claim that they are free to do whatever they want as private companies. Just as is true of Major League Baseball which is subject to regulation by Congress as a result of the antitrust exemption they enjoy under the law these social media companies receive a very valuable and particularized legal benefit in the form of Section 230 of the Communications Decency Act, which shields themfrom any liability for content published ontheir platforms, including defamatory material or other legally proscribed communications.

No company can claim such massive, unique legal exemptions from the federal law and then simultaneously claim they owe no duties to the public interest andare not answerable to anyone. To advocate that is a form of authoritarian corporatism: simultaneously allowing tech giants to claim legally conferred privileges and exemptionswhile insisting that they can act without constraints of any kind.

Then there is the practical impactof Twitter and Facebook uniting to block content published by a major newspaper. It is true in theory that one can still read the suppressed article by visiting the New York Post website directly, but the stranglehold that these companies exert over our discourse is so dominant that their censorship amounts to effective suppression of the reporting.

In 2018, Pew Research found that about two-thirds of U.S. adults (68%) get news on social media sites. One-in-five get news there often. The combination of Facebook, Google and Twitter controls the information received by huge numbers of Americans, Pew found. Facebook is still far and away the site Americans most commonly use for news.About four-in-ten Americans (43%) get news on Facebook. The next most commonly used site for news is YouTube [owned by Google], with 21% getting news there, followed by Twitter at 12%.

While Twitter still falls short of Facebook in terms of number of users, a 2019 report found that Twitter remains the leading social network among journalists at 83%. Censoring a story from Twitter thus has disproportionate impact by hiding it from the people who determine and shape the news.

The grave dangers posed by the censorship actions of yesterday should be self-evident. Just over two weeks before a presidential election, Silicon Valley giants whose industry leaders and workforce overwhelmingly favorthe Democratic candidate took extraordinary steps to block millions, perhaps tens of millions, of American voters from being exposed to what purports to be a major expos by one of the countrys oldest and largest newspapers.

As the New York Times put it in an article in March about the political preferences of tech leaders: Silicon Valley has long leaned blue. Large numbers of tech executives, including Facebooks second-in-command Sheryl Sandberg, were also vocally supportive of Hillary Clinton in 2016. At the very least, the perception, if not the reality, has been created that these tech giants are using their unprecedented power over political and election-related information to prevent the dissemination of negative reporting about the presidential candidate they favor. Whatever that is, it is not democratic or something to cheer.

The rationale offered by both Twitter and Facebook to justify this censorship makes it more alarming, not less. Twitter claimed that the Post article violates its so-called Hacked Materials Policy, which it says permits commentary on or discussion about hacked materials, such as articles that cover them but do not include or link to the materials themselves; in other words, Twitter allows links to articles about hacked materials but bans links to or images of hacked material themselves.

Thecompanyadded that their policy prohibits the use of our service to distribute content obtained without authorization because, they said, theydont want to incentivize hacking by allowing Twitter to be used as distribution for possibly illegally obtained materials.

But that standard, if taken seriously and applied consistently, would result in the banningfrom the platform of huge amounts of the most important and consequential journalism. After all, alarge bulk of journalism is enabled by sources providing content obtained without authorization to journalists, who then publish it.

Indeed, many of the most celebrated and significant stories of the lastseveral decades the Pentagon Papers, the WikiLeaks Collateral Murder video and war logs, the Snowden reporting, the Panama Papers, the exposs from the Brazil Archive we reported over the last year relied upon publication of various forms of hacked materials provided by sources. The same is true of the DNC and Podesta emails that exposed corruption and forcedthe 2016 resignation of the top five officials of the Democratic National Committee.

Does anyone think it would be justifiable or politically healthy for tech giants to bar access to those documents of historic importance in journalism and politics? That is what the Twitter policy, taken on its face, would require.

For that matter, why is Twitter not blocking access to the ongoing New York Times articles that disclose the contents of President Trumps tax returns, the unauthorized disclosure of which is a crime? Why did those platforms not block links to the now-notorious Rachel Maddow segment where she revealed details about one of Trumps old tax returns on the ground that it was content obtained without authorization? Or what about the virtually daily articles in the New York Times, Washington Post, NBC News and others that explicitly state they are publishing information that the source is unauthorized to disclose: how does that not fall squarely within the banning policy as Twitter defined it yesterday?

Worse still, why does Twitters hacking policy apply to the New York Post story at all? While the Posts claimsabout how these emails were obtained are dubious at best, there is no evidence unlike the award-winning journalism scoops referenced above that they were obtained by virtue of hacking by a source.

Facebooks rationale for suppression that it needs to have its fact checking partners verify the story before allowing it to be spread poses different but equally alarming dangers. What makes Mark Zuckerbergs social media company competent to fact check the work of other journalists? Why did Facebook block none of the endless orgy of Russiagate conspiracy theoriesfrom major media outlets that were completely unproven if not outright false?

Do we really want Facebook serving as some sort of uber-editor for U.S. media and journalism, deciding what information is suitable for the American public to read and which should be hidden from it after teams of journalists and editors at real media outlets have approved its publication? And can anyone claim that Facebooks alleged fact-checking process is applied with any remote consistency given how often they failed to suppress sketchily sourced or facially unreliable stories such as, say, the Steele Dossier and endless articles based on it? Can you even envision the day when an unproven conspiracy theory leaked by the CIA or FBI to the Washington Post or NBC News is suppressed pending fact-checking by Facebook?

Twitter is not opposed to hacked materials and Facebook is not opposed to dubiously sourced stories. They are opposed to such things only when such storiesanger powerful factions. When those power centers are the ones disseminating such stories, they will continue to have free rein to do so.

The glaring fallacy that alwayslies at the heart of pro-censorship sentimentsis the gullible, delusional belief that censorship powers will be deployed only to suppress views one dislikes, but never ones own views. The most cursory review of history, and the most minimal understanding of how these tech giants function, instantly reveals the folly of that pipe dream.

Facebook is not some benevolent, kind, compassionate parent or a subversive, radical actor who is going to police our discourse in order to protect the weak and marginalized or serve as a noble check on mischief by the powerful. They are almost always going to do exactly the opposite: protect the powerful from those who seek toundermine elite institutions and reject their orthodoxies.

Tech giants, like all corporations, are required by law to have one overriding objective: maximizing shareholder value. They are always going to use their power to appease thosethey perceive wield the greatest political and economic power.

That is why Facebook accepts virtually every request from the Israeli Government to remove the pages of Palestinian journalists and activists on the grounds of incitement, but almost never accepts Palestinians requests to remove Israeli content. It is the same reason Facebook blocks and censors governments adverse to the U.S., but not the other way around. They are going to heed the interests ofthepowerful at the expense of those who lack it. It is utter madness to want to augment their censorship powers or to expect they will use it for any other ends.

Facebook and Twitter havein the past censored the content or removed the accounts of far-right voices. They have done the same to left-wing voices. That is always how it will work: it is exclusively the voices on the fringesandthe margins, the dissidents, those who reside outside of the factions of power who will be subjected to this silencing. Mainstream political and media voices, and the U.S. Government and its allies, will be fully free to spread conspiracy theories and disinformation without ever being subjected to these illusory rules.

Censorship power, like the tech giants who now wield it, is an instrument of status quo preservation. The promise of the internet from the start was that it would be a tool of liberation, of egalitarianism, by permitting those without money and power to compete on fair terms in the information war with the most powerful governments and corporations.

But just as is true of allowing the internet to be converted into a tool of coercion and mass surveillance, nothing guts that promise, that potential, like empowering corporate overloads and unaccountable monopolists to regulate and suppress what can be heard.

To observethat those who are cheering for this today because they happen to like this particular outcome are being short-sighted and myopic is to woefully understate the case. The only people who should want to live in a world where Mark Zuckerberg andSundar Pichai and Jeff Bezos have a stranglehold on what can be said and heard are those whose actions are devoted to the perpetuation of their power and who benefit from their hegemony.

Everyone else will eventually be faced with the choice of conformity or censorship, of refraining from expressing prohibited views as the cost for maintaining access to crucial social media platforms.The only thing more authoritarian than the acts of Facebook and Twitter yesterday is the mentality that causes ordinary people to cheer it, to be grateful for the power and control they have long wielded andyesterday finally unleashed.

Update: Oct. 16, 2020, 6:18a.m. ETLateThursday evening, Twitter announced changes to its Hacked Materials Policydesigned to address concerns that its policy as stated and as applied to the Post articles would result in the banning of crucial reporting based on hacked materials or other unauthorized disclosures. Explainedby Vijaya Gadde, a top Twitter executive, the new rules now provide that Twitterspolicy applies not to articles by news outlets reporting on hacked materials but only in those cases when the hacked material is directly shared by hackers or those acting in concert with them. Additionally, going forward, Twitter will label Tweets to provide context instead of blocking links from being shared. Gadde said specifically that the changes are intended to address the concerns that there could be many unintended consequences to journalists, whistleblowers and others in ways that are contrary to Twitters purpose of serving the public conversation.

There are still serious concerns about what Twitter did in this particular case and how these rules will be appliedto future cases, but these changes are a commendablyresponsive effort to minimize the dangers of this policy and alleviatethe concerns raised by journalists and transparency advocates.

More here:

Facebook and Twitter Cross a Line in Censorship - The Intercept

Censored and Suppressed – National Review

(Pixabay)

Today is a doozy: Facebook and Twitter decided that their users shouldnt see or be able to read a particular article in the New York Post, and why so many Democrats perceived the Post story as a traumatic flashback to former FBI director James Comeys letter about Hillary Clinton on October 28, 2016.

There Is No Credible Reason for This Kind of Targeted Suppression

The editors of National Review have something important to say about the way two of the largest and most prominent social-media companies, Facebook and Twitter, decided to effectively block access to a news article in the New York Post.

Andy Stone, Facebooks policy communications manager (and, per his bio, a former staffer for Barbara Boxer, the Democratic Congressional Campaign Committee, and the House Majority PAC), announced that the social-media giant would begin reducing the distribution of aNew York Postinvestigation into emails purporting that Joe Biden met with a top executive from the Ukrainian natural-gas firm Burisma Holdings at the behest of his son Hunter Biden.

Bad idea.

Instead of simply asking pertinent questions, or debunking thePosts reporting, a media blackout was initiated. A number of well-known journalists warned colleagues and their sizable social-media audiences not to share the story.

By the afternoon, Twitter had joined Facebook in suppressing the article, not only barring its users from sharing it with followers, but barring them sharing it through direct messages as well. It locked the accounts of White House press secretary Kayleigh McEnany, thePost, and many others for retweeting the story.

There is no credible reason for this kind of targeted suppression. Over the past five years there have been scores of dramatic scoops written by major media outlets such as theNew York Times, theWashington Post, and CNN that were based on faulty information provided by unknown sources that turned out to be incorrect. Not once has Facebook or Twitter concerned itself with the sourcing methods of reporters. Not once did it censor any of those pieces.

The editors conclude the mentality at work in the high commands of Facebook and Twitter further damages the reputation of Big Tech. For another, it renders the industry more susceptible to a new regulatory regime already being championed by some in Congress. Mostly, however, it just makes the story theyre trying to suppress a far bigger deal.

Last night, Twitter CEO Jack Dorsey offered a tweet conceding, our communication around our actions on the New York Post article was not great. And blocking URL sharing via tweet or DM with zero context as to why were blocking: unacceptable.

He linked to a series of tweets from the corporate account declaring:

The images contained in the articles include personal and private information like email addresses and phone numbers which violate our rules. As noted this morning, we also currently view materials included in the articles as violations of our Hacked Materials Policy. Commentary on or discussion about hacked materials, such as articles that cover them but do not include or link to the materials themselves, arent a violation of this policy. Our policy only covers links to or images of hacked material themselves. We know we have more work to do to provide clarity in our product when we enforce our rules in this manner. We should provide additional clarity and context when preventing the Tweeting or DMing of URLs that violate our policies.

If you believe that news organizations should never publish anything that was not legally obtained or distributed, you would bar the publication of the Pentagon Papers and President Trumps tax returns.

Note that according to the New York Post, the information wasnt hacked by any traditional definition: The email is contained in a trove of data that the owner of a computer repair shop in Delaware said was recovered from a MacBook Pro laptop that was dropped off in April 2019 and never retrieved. The computer was seized by the FBI, and a copy of its contents made by the shop owner shared with The Post this week by former Mayor Rudy Giuliani.

In fact, the dynamic at work in the New York Post story about the emails regarding Biden is the same as the New York Times scoop about the presidents tax returns. That computer repair shop in Delaware has legal access to the files in the computer (because they were presumably hired by the FBI to fix something) but not legal authority to distribute whats in those files. The New York Times source has legal access to the presidents tax returns, but not legal authority to distribute whats in those tax returns. There is no moral distinction, just a partisan one.

The distinction between being a platform and being a publisher is impossible to ignore, and the longtime insistence from those big tech companies that theyre not publishers is no longer operable. For years, they insisted they were no more responsible for what gets written on Facebook then the people who build bathroom stall walls are for someone writing for a good time call Jenny at 867-5309.

The spectacularly wrongheaded decision-making at Facebook and Twitter is going to set off a lot of deliberately obtuse semantic arguments about whether or not what the companies did can legitimately be labeled censorship, driven by those who insist that only government actions can constitute censorship.

As we all know and are unnecessarily reminded every time one of these controversies comes down the pike, Facebook and Twitter are private companies. Users sign on to operate under the companies rules and judgment. The U.S. Constitution does not guarantee you a right to speak your mind on a private companys online platform. If you go to the New York Times and say, I have a terrific and important freelance article or op-ed or letter to the editor, and the Times declines to run your submission in its pages, no one believes theyve been censored.

But the companies touted themselves as neutral, minimally restrictive platforms and have, year by year, morphed into publishers with broader (and vaguer) limitations on what can be posted and shared on their sites. As I wrote back in 2018, when Apple, Google, Facebook, and Spotify erased most of the posts and videos on their services from raving lunatic/radio- and web-show host Alex Jones, none of the people who run these companies are constitutional scholars specializing in First Amendment cases, nor did they ever aspire to be in that role. They set up and joined these companies to make money and now theyre in the weird position of American Public Discourse Police.

Facebooks slogan used to be, make the world more open and connected. Twitters slogan was, see whats happening. They sold themselves on the notion that you could have a platform, and make your voice heard, no matter who you were. They clearly envisioned a society full of pleasant, relatively polite stamp collectors and poodle owners and wildlife photographers and Trekkies, groups of individuals who would want to connect and share their passions and who would do so in an amiable, harmonious, focus-group-pleasing way that could never harm others.

Except society isnt just made up of nice people with noncontroversial interests and hobbies. Our world has more than a few lunatics, hate groups, conspiracy theorists, Holocaust deniers, violent criminals, and every other unsavory type, and much to the surprise of these companies, they want their voices heard, too! They may be particularly driven to share their views online, because people are so unreceptive to their views when they share them offline.

And for a long while, most people didnt mind Facebook and Twitter and the rest taking a tougher stance to remove lunatics, hate groups, conspiracy theorists, Holocaust deniers, violent criminals, etc. Although sometimes the line between the dangerously unacceptable and simply odd or outlandish is hard to draw. QAnon is a nutty conspiracy theory, but so is the idea that Trump has been an asset of Russian intelligence since 1987. Smart, seemingly normal people can buy into conspiracy theories.

Now that theyve built their user base, Facebook and Twitter and other social-media companies want to change the rules. They want to limit what sorts of political news stories can be shared, which was never how they sold themselves or what they promised. No one complains about the New York Times refusing to publish a letter to the editor, because the Times never sold itself as the place where everyone has a voice and everyone gets a chance to speak their mind.

They might as well update the user agreement language: User agrees to believe all denials from Joe Biden regarding anything involving his sons international business partners.

The Traumatic Flashbacks of Comeys Letter

Why did the tech companies, and quite a few big names in mainstream journalism, go to DefCon One on a story with evidence suggesting Biden lied about meeting a Ukrainian politician?

Allow me to suggest that yesterday, a lot of people had flashbacks to FBI director James Comey sending a letter to Congress announcing the reopening of the email probe on October 28, 2016, eleven days before the November 8 election.

The fact that President Trumps margin over Hillary Clinton was so narrow he won Michigan by 10,704 votes, Pennsylvania by 49,543 votes, and Wisconsin by 27,257 votes means that any one factor can plausibly be labeled the decisive one. Many Democrats reacted to Clintons shocking loss by looking for the most convenient explanation possible. For some, it was Russian disinformation on social media. For others, it was Jill Stein siphoning off votes that Hillary Clinton deserved. For others, it was that the country was full of racist deplorables, even though many of these voters had just cast ballots for Barack Obama twice.

But I suspect quite a few Democrats chose to believe that it was Comeys letter which decided the election. Never mind that Comey wrote another letter, two days before the election, declaring that the reopened investigation had found nothing new or incriminating. (Yes, 24 million Americans cast early ballots in 2016, but thats out of 136 million total votes in the presidential election.)

This is one of the reasons political journalism matters. What happens is important; what we choose to learn from what happens is almost as important. Many elite progressives chose to learn the lesson that late-breaking news stories that look bad for the Democrat can elect the worst Republican in the world, and thus that scenario must be prevented, at any cost.

If a person believes that a big scoop involving the FBI looking into emails of the Democratic nominee led to Trumps election . . . how do you think they will react to the New York Post announcing this week they have a big scoop involving the FBI looking into emails of the Democratic nominee?

ADDENDUM: In the middle of all this, keep in mind that Joe Biden does not believe that Burisma was attempting to influence U.S. policy when they hired his son, that his son was hired on his own merits, and not because his father was vice president, but because hes a very bright guy.

Read the original:

Censored and Suppressed - National Review

Coinbases New Direction Is Censorship, Leaked Audio Reveals – VICE

Brian Armstrong, CEO of cryptocurrency exchange Coinbase, revealed in a late September blog post that the company would prohibit employees from debating political or social issues, deeming this a distraction from the companys mission.

Armstrong doubled down on his position during a virtual all-hands held on October 1, billed as an AMA (for ask me anything), from which Motherboard obtained audio. The AMA was meant to further explain the companys new apolitical direction for those who might consider accepting a severance package that was offered to any employee who felt uncomfortable. Executives also explained when and where dissent would be appropriate, and explained why they required employees to delete specific political Slack messages.

This, at a company that works with cryptocurrencies intended to replace government banking systems in order to create a more free world.

Are you a Coinbase employee who knows more about the company's new direction and how it's being handled? Using a non-work phone or computer, contact Edward Ongweso Jr securely on Signal at (413) 225 2938, or emailedward.ongweso@vice.com.

During the meeting, Armstrong claimed there is a silent majority at Coinbase that agreed with his decision but feared reprisal from colleagues. Armstrong and Coinbase leadership, however, failed to soothe fears that this policy would police employees if they voiced opinions that did not align with Armstrong or this silent majority.

One former Coinbase employee who left the company after the AMA and to whom Motherboard provided anonymity due to fear of industry reprisal said that these assurances were insufficient and workers feared surveillance and censorship.

These fears are not unfounded. Emile Choi, Coinbase's chief operating officer, explained that at least two employees were asked to delete Slack posts, and that HR head L.J. Brock proactively reached out to employees to explain why their posts would be taken down. He had a very productive conversation with both of them and they understood the context, she said.

One employee asked if Coinbase leadership thought that this was taking away employee power to start a discussion except with 300 character questions in an AMA format. It seems like Coinbase is stunting internal discussion.

Choi said that the entire executive team was aligned on Armstrongs post and policy, and that the new culture is focused on what unites us and what we face in the world, which is building toward our mission, Choi said. The goal was not intended to be harsh, it wasnt intended to land in a way where people felt they were being policed.

She then explained that the place for political discussion or dissent was in dedicated Slack channels for sensitive topics: While you cant try to sell folks on your belief the Flying Spaghetti Monster should be elected president, you can establish a channel where people interested in electing the Flying Spaghetti Monster can share their thoughts.

Theres fear from employees about monitoring in all channels, including private ones, the former Coinbase employee told Motherboard. The biggest fear is that employees will be confronted on what they say or do on their work and personal deviceswork systems are often on personal devices. This already happened when writers of old Slack posts were confronted by leadership and asked to delete posts.

Problems have been building at Coinbase for the past year, which culminated in a June 4 walkout that followed another company-wide AMA shortly after the killing of George Floyd by police. During that AMA, Armstrong resisted the idea of making a public statement in support of Black Lives Matter, but backtracked after the walkout and posted a series of messages in support of BLM on Twitter later that day.

Fast forward to late September, and Armstrongs announcement that political discussions at work are not acceptable and anyone uncomfortable may leave. According to the company, it lost 60 employees, or 5 percent of its workforce as a result of this decision.

One of the earliest questions raised in the AMA was What counts as political? Armstrong avoided specifying what topics could lead to discipline or firing, but offered work visas and employee resource groups as examples of incidentally political but primarily work-related things that were a totally appropriate conversation to have at Coinbase.

One employee shared their concern that a ban on political topics at work would mainly serve to silence people whose lived experiences point to systemic problems. For some, sharing their own personal experiences and traumas can be advocating or seen as advocating for certain causes, the employee wrote. Can we really support each other with those policies being kept outside of this workplace?

The former employee that Motherboard spoke with said that there is a disconnect between Coinbases supposedly apolitical direction and the inherent politics of a company working to build a new financial system.

Crypto is political, so the sense is that doing this stems from leadership (Brian) not agreeing with certain political stances. Its easier to just prohibit any discussion at all, said the former Coinbase employee.

It comes off to employees as being ruled in fear because social issues arent a distraction, they added. They cause the financial problems that crypto wants to fix. You cant fix one without the othertheyre hand-in-hand. The root is the social issues.

On top of banning discussion and forcing employees to delete Slack messages, the AMA revealed other instances of opaqueness on the part of management. When an employee asked if management would share the results of internal surveys and feedback around the new policy, Choi said no and explained, It's really meant to be feedback for the seniors.

There has been talk among former and current employees of creating a #deleteCB campaign, the former employee told Motherboard, hoping to help people move their money to more socially responsible platforms and competitors that have been trying to get in contact with Coinbase workers: "It's rooted in the understanding that we can't collectively fix the financial problems that crypto tries to solve without addressing the underlying social issues that create the problem in the first place."

The former employee, who said they have been in contact with workers who chose to stay, said that some Coinbase workers feel they must shut up and be complicit unless they want to risk losing their jobs.

From my experience and discussions, the most frightening thing about this is the timing. Were in a pandemic, theres a political election, said the former Coinbase employee. Many did not leave because even though there was a generous severance offer, its still so scary to go back out in the market right now. People felt trapped.

Coinbase acknowledged Motherboards request for comment and said these accusations are quite extreme and absolutely false. In a follow up call the company declined to go on the record and would not be specific about what allegations it believed are false. It then missed a deadline to respond to our request for comment. We will update if we hear back.

See original here:

Coinbases New Direction Is Censorship, Leaked Audio Reveals - VICE

NeverTrump Website The Dispatch Colludes With Big Tech To Censor SBA List’s Pro-Life Ads – The Federalist

Facebook censored two advertisements from the pro-life group Susan B. Anthony Lists, claiming the videos contained partly false information about Democratic Presidential Nominee Joe Biden and VP Nominee Kamala Harriss views on late-term abortions.

The ads, which focus on the Democratic Partys position in support of abortion on demand and up until the moment of birth, were labeled by independent fact-checkers who claim to look carefully into claims from elected officials, reports from the media, and disinformation on social media to help you understand whats true and whats not.

The independent fact-checker, was NeverTrump website, The Dispatch, which labeled the ads as partly false because Biden has not explicitly stated that he supports late-term abortions, even though he has repeatedly said he wants no restrictions on a womans right to choose.

Biden has not expressed support for late-term abortionswhich, while not being a medical term, generally refers to abortions performed at 21 weeks or later. And neither candidate has voiced support for abortion up to the moment of birth, the fact-check reads.

Both Biden and Harris, however, have been very clear that they do not want restrictions on abortions, implying that late-term abortions would be approved.

Despite his flip-flopping on the issue, Biden now supports the revoking Hyde Amendment which would allow taxpayer-funding of abortion and advocates for federal funding of Planned Parenthood. He even claimed that he would make Roe v. Wade the law of the land if he is elected in November.

The only responsible response to that would be to pass legislation makingRoe the law of the land, said Biden. Thats what I would do.

The Dispatchs explanation of SBA Lists claims even quotes Biden saying that he votes for no restrictions on a womans right to be able to have an abortion under Roe v. Wade.

As National Reviews Ramesh Ponnuru notes, both Biden and Harris have sponsored bills that appear to keep abortion late in pregnancy legal even if the Supreme Court were to change its mind.

Harris supported the Womens Health Protection Act, which would codify Roe v. Wade and remove state restrictions on abortions and remove a prohibition on abortion after fetal viability. As a senator, Biden sponsored legislation to make abortion legal after viability in cases needed to protect health, but without ever defining what health protections that entailed.

The censorship comes just two days after Facebook announced it would be limiting distribution of the New York Posts bombshell story detailing former vice president Joe Bidens knowledge of his son Hunter Bidens foreign business dealings.

Big Tech and the media are teaming up to run interference for the Biden-Harris campaign on what is a losing issue for Democrats their shameful support for abortion on demand through birth, said SBA List President Marjorie Dannenfelser. This is the latest example of Facebook censoring political speech and is perfectly timed to shut down SBA Lists vital digital communications as we work to reach eight million voters in key battlegrounds in the final days before Election Day.

This is not the first time the pro-life advocates were censored by Facebook. In 2018, SBA List ran an ad criticizing Democratic Senate candidate Phil Bredesen for his abortion position, urging voters to consider the Republican candidate and now-Senator Marsha Blackburn. The ad was originally shut down by Facebook, but eventually reinstated.

When Facebook shut downsimilaradsof ours in 2018, they were forced to admit we were wrongly censored andapologized, Dannenfelser said. Now they have outsourced their censorship to the anti-Trump press, continually waging a suppression campaign specifically targeting pro-life conservative voices. We refuse to be silenced.

The group also keeps a running list on their website which shows almost 20 times pro-life information was censored by big tech.

Update: Shortly after this article was published, the Dispatch issued a statement claiming that the fact check was still in draft form and was accidentally published by the editorial staff.

The fact-check was published in error and in draft form, before it had been through final edits and our own internal fact-checking process, Editor and CEO of the Dispatch Stephen Hayes wrote. As a result, the viral post was assigned a partly false rating that we have determined is not justified after completing The Dispatchfact-checking process.

The Dispatch says that they have lifted the rating from the ads and apologized to the Women Speak Out PAC.

Despite their claims that the publication of the fact check was an accident, the Dispatch received backlash for retweeting the fact check article, which was posted to social media by the reporter three days before it was taken down.

Internal Facebook fact-checking procedure also requires fact-checking tags to be directly assigned by a person, which means that this partly false rating along with the link back to the Dispatchs article was personally approved by someone at the Dispatch or Facebook.

Anti-Trumper Jonah Goldberg, the Dispatchs editor-in-chief, however, failed to claim personal responsibility for the previously stated editorial error.

Jordan Davidson is a staff writer at The Federalist. She graduated from Baylor University where she majored in political science and minored in journalism.

The rest is here:

NeverTrump Website The Dispatch Colludes With Big Tech To Censor SBA List's Pro-Life Ads - The Federalist

US Department of Justice reignites the Battle to Break Encryption – Naked Security

The US Department of Justice (DOJ), together with government representatives from six other countries, has recently re-ignited the perennial Battle to Break Encryption.

Last weekend, the DOJ put out a press release co-signed by the governments of the UK, Australia, New Zealand, Canada, India and Japan, entitled International Statement: End-To-End Encryption and Public Safety.

You might not have seen the press release (it was put out on Sunday, an unusual day for news releases in the West), but you can almost certainly guess what it says.

Two things, mainly: think of the children, and something needs to be done.

If youre a regular reader of Naked Security, youll be familiar with the long-running tension that exists in many countries over the use of encryption.

Very often, one part of the public service the data protection regulator, for instance will be tasked with encouraging companies to adopt strong encryption in order to protect their customers, guard our privacy, and make life harder for cybercriminals.

Indeed, without strong encryption, technologies that we have come to rely upon, such as e-commerce and teleconferencing, would be unsafe and unusable.

Criminals would be trivially able to hijack financial transactions, for example, and hostile countries would be able to eavesdrop on our business and run off with our trade secrets at will.

Even worse, without a cryptographic property known as forward secrecy, determined adversaries can intercept your communications today, even if they arent crackable now, and realistically hope to crack them in the future.

Without forward secrecy, a later compromise of your master encryption key might grant the attackers instant retrospective access to their stash of scrambled documents, allowing them to rewind the clock and decrypt old communications at will.

So, modern encryption schemes dont just encrypt network traffic with your long-term encryption keys, but add in what are known as ephemeral keys into the mix one-time encryption secrets for each communication session that are discarded after use.

The theory is that if you didnt decrypt the communication at the time it was sent, you wont be able to go back and do so later on.

Unfortunately, forward secrecy still isnt as widely supported by websites, or as widely enforced, as you might expect. Many servers still accept connections that reuse long-term encryption keys, presumably because a significant minority of their visitors are using old browsers that dont support forward secrecy, or dont ask to use it.

Similarly, we increasingly rely upon what is known as end-to-end encryption, where data is encrypted for the sole use of its final recipient and is only ever passed along its journey in a fully scrambled and tamper-proof form.

Even if the message is created by a proprietary app that sends it through a specific providers cloud service, the company that operates the service doesnt get the decryption key for the message.

That means that the service provider cant decrypt the message as it passes through their servers, or if it is stored there for later not for their own reasons; not if theyre told to; and not even if you yourself beg them to recover it for you because youve lost the original copy.

Without end-to-end encryption, a determined adversary could eavesdrop on your messages by doing the digital equivalent of steaming them open along the way, copying the contents, and then resealing them in an identical-looking envelope before passing them along the line.

Theyd still be encrypted when they got to you, but you wouldnt be sure whether theyd been decrypted and re-encrypted along the way.

At the same time, another part of the government will be arguing that strong encryption plays into the hands of terrorists and criminals especially child abusers because, well, because strong encryption is too strong, and gets in the way even of reasonable, lawful, court-approved surveillance and evidence collection.

As a result, justice departments, law enforcement agencies and politicians often come out swinging, demanding that we switch to encryption systems that are weak enough that they can crack into the communications and the stored data of cybercriminals if they really need to.

After all, if crooks and terrorists can communicate and exchange data in a way that is essentially uncrackable, say law enforcers, how will we ever be able to get enough evidence to investigate criminals and convict them after something bad has taken place?

Even worse, we wont be able to collect enough proactive evidence intelligence, in the jargon to stop criminals while they are still at the conspiracy stage, and therefore crimes will become easier and easier to plan, and harder and harder to prevent.

These are, of course, reasonable concerns, and cant simply be dismissed out of hand.

As the DOJ press release puts it:

[T]here is increasing consensus across governments and international institutions that action must be taken: while encryption is vital and privacy and cyber security must be protected, that should not come at the expense of wholly precluding law enforcement, and the tech industry itself, from being able to act against the most serious illegal content and activity online.

After all, in countries such as the UK and the US, the criminal justice system is largely based on an adversarial process that starts with the presumption of a defendants innocence, and convictions depend not merely on evidence that is credible and highly likely to be correct, but on being sure beyond reasonable doubt.

But how can you come up with the required level of proof if criminals can routinely and easily hide the evidence in plain sight, and laugh in the face of court warrants that allow that evidence to be seized and searched?

How can you ever establish that X said Y to Z, or that A planned to meet B at C, if every popular messaging system implements end-to-end encryption, so that service providers simply cannot intercept or decode any messages, even if a court warrant issued in a scrupulously fair way demands them to do so?

Impasse.

We cant weaken our current encryption systems if we want to stay ahead of cybercriminals and nation-state enemies; in fact, we need to keep strengthening and improving the encryption we have, because (as cryptographers like to say), attacks only ever get better.

But were also told that we need to weaken our encryption systems if we want to be able to detect and prevent the criminals and nation-state enemies in our midst.

The dilemma here should be obvious: if we weaken our encryption systems on purpose to make it easier and easier to catch someone, we simultaneously make it easier and easier for anyone to prey successfully on everyone.

O, what a tangled web we weave!

Theres an additional issue here caused by the fact that uncrackable end-to-end encryption is now freely available to anyone who cares to use it for example, in the form of globally available open source software. Therefore, compelling law-abiding citizens to use weakened encryption would make things even better for the crooks, who are not law-abiding citizens in the first place and are unlikely to comply with any weak crypto laws anyway.

Governments typically propose a range of systems to solve the strong encryption problem, such as:

The problem with all these solutions is that they can all be considered variations on the master key theme.

Endpoint interception only when its needed is just a specialised, once-in-a-while case of general message escrow; message escrow is just a specialised case of a master key; and a deliberate cryptographic flaw is just a complicated sort of master key wrapped up in the algorithm itself.

They all open up a glaring threat, namely, What happens when the Bad Guys uncover the secrets behind the message cracking system?

Simply put: how on earth do you keep the master key safe, and how do you decide who gets to use it anyway?

The DOJ seems to think that it can find a Holy Grail for lawful interception, or at least expects the private sector to come up with one:

We challenge the assertion that public safety cannot be protected without compromising privacy or cyber security. We strongly believe that approaches protecting each of these important values are possible and strive to work with industry to collaborate on mutually agreeable solutions.

Wed love to think that this is possible, but in case you were wondering were sticking to what we call our #nobackdoors principles:

[At Sophos,] our ethos and development practices prohibit backdoors or any other means of compromising the strength of any of our products network, endpoint or cloud security for any purpose, and we vigorously oppose any law that would compel Sophos (or any other technology supplier) to intentionally weaken the security of its products.

Where you do stand in this perennial debate?

Have your say in the comments below. (If you omit your name, you will default to being Anonymous.)

Read more:
US Department of Justice reignites the Battle to Break Encryption - Naked Security

Feds, ‘Five Eyes’ Allies Take Another Swing at Encryption Policy Changes – MeriTalk

U.S. policy-makers and several close foreign allies issued a statement this weekend calling for technology providers to provide access for governments and law enforcement to encrypted data and protected systems. But based on the failure of numerous similar U.S. government entreaties to the tech sector in recent years, the latest effort likely wont end up moving the needle on the issue.

In an October 11 release signed off on by the Department of Justice, and government officials from the United Kingdom, Australia, New Zealand, and Canada, the governments called on tech providers to embed the safety of the public in system designs in ways that will facilitate government and law enforcement prosecution of criminals, including access to unencrypted content and locked devices.

The five nations signing the agreement are known as the Five Eyes alliance that have signed a treaty for joint cooperation on signals intelligence.

For the past several years and going back to at least 2015 in the case of a Federal suit against Apple seeking to crack open a locked device used by a perpetrator of a mass shooting in San Bernardino, Calif. tech providers have presented a united front opposing what some have said is the governments request to build back doors into their systems for the benefit of law enforcement. Creating such avenues, they argue, will only make systems less secure.

Citing terrorism and criminal threats including from online child sexual predators the governments said in their Oct. 11 statement that there is increasing consensus across governments and international institutions that action must be taken.

While encryption is vital and privacy and cyber security must be protected, that should not come at the expense of wholly precluding law enforcement, and the tech industry itself, from being able to act against the most serious illegal content and activity online, the governments said.

We are committed to working with industry to develop reasonable proposals that will allow technology companies and governments to protect the public and their privacy, defend cyber security and human rights and support technological innovation, the governments said. While this statement focuses on the challenges posed by end-to-end encryption, that commitment applies across the range of encrypted services available, including device encryption, custom encrypted applications and encryption across integrated platforms.

We reiterate that data protection, respect for privacy and the importance of encryption, as technology changes and global Internet standards are developed, remain at the forefront of each states legal framework, they said. However, we challenge the assertion that public safety cannot be protected without compromising privacy or cyber security. We strongly believe that approaches protecting each of these important values are possible and strive to work with industry to collaborate on mutually agreeable solutions.

Read the original:
Feds, 'Five Eyes' Allies Take Another Swing at Encryption Policy Changes - MeriTalk

Five Eyes Call for Tech World to Weaken Encryption – ClearanceJobs – ClearanceJobs

This week, representatives of the Five Eyes intelligence alliance the U.S., UK, Canada, Australia and New Zealand along with the intelligence services of Japan and India issued a joint call for the tech world to provide lawful access into commercial encryption.

In a statement that was posted on the website of the United States Department of Justice, the intelligence services noted that an understanding that encryption continues to play a crucial role in protecting personal data, privacy, intellectual property, trade secrets, and cyber security. Encryption was also understood to provide a vital purpose in repressive states to protect journalists, human rights defenders, and other vulnerable individuals.

However, the intelligence services also noted, Particular implementations of encryption technology, however, pose significant challenges to public safety, including to highly vulnerable members of our societies like sexually exploited children.

The services urged industry to address the joint concerns where encryption is applied in a way that wholly precludes any legal access to content. Additionally, the statement called on technology companies to work with governments to take the necessary steps, which are focused on reasonable, technically feasible solutions to provide that lawful access.

This included:

*Embedding the safety of the public in system designs, thereby enabling companies to act against illegal content and activity effectively with no reduction to safety, and facilitating the investigation and prosecution of offences and safeguarding the vulnerable;

*Enabling law enforcement access to content in a readable and usable format where an authorization is lawfully issued, is necessary and proportionate, and is subject to strong safeguards and oversight; and

*Engaging in consultation with governments and other stakeholders to facilitate legal access in a way that is substantive and genuinely influences design decisions.

This is not the first time the Five Eyes alliance have called upon the tech giants to address the issue of end-to-end encryption (E2EE) into their respective products. Similar calls were made in 2018 and 2019, as the intelligence services have argued that way that E2EE could be supported on many major tech platforms essentially prohibits law enforcement from investigating crime rings and other illicit activities.

The issue is whether enabling access to law enforcement could in turn create potential back doors that could be used by cyber criminals or even foreign actors.

Its impossible to create an encryption backdoor that only law enforcement can take advantage of, warned Paul Bischoff, privacy advocate with Comparitech, via an email to ClearanceJobs.

If backdoors are in place, criminals will move on to other end-to-end encrypted messaging apps, while legitimate users suffer security and privacy violations, Bischoff added. If our analysis of U.S. wiretapping orders is any indication, only a fraction of law enforcement requests to decrypt data will actually be incriminating or lead to convictions. Theres little consideration for innocent parties whose communications are intercepted by law enforcement, and 99% of interception requests are granted by courts.

An argument could be made that the intelligence community and even the U.S. Department of Justice (DoJ) would be interest in relaxed standards to make it easier for investigators to do their jobs. Of course if the digital thugs were to find it easier to access information that too would be the DoJs problem.

The only down side for DoJ would be if they must abide the same standards, and we dont hear anyone in the government begging for less security in DoJ systems, do we, explained Jim Purtilo, associate professor of computer science at the University of Maryland.

What the feds call for are more ways to access protected information, and this means criminals get more bites at the apple too, Purtilo told ClearancesJobs. The algorithms will be more complex, but not in a good way. Normally computational complexity makes it tough for an unauthorized agent to reverse encryption; more complexity means more protection. However, once we architect multiple ways to access information, the programs complexity will go up there is more a programmer must get right yet the computational complexity that protects goes down.

An alternate solution that has been suggested would be for the tech community to work to provide greater access to law enforcement or the IC. Of course that falls back on the often asked question Quis custodiet ipsos custodies or who watches the watchmen.

Giving keys to the DoJ just in case they might want your information also creates a single point of failure that would have grim consequences if breached, added Purtilo. Then everyones data are exposed. This might sound unlikely, but lets remember it was the fed (Office of Personnel Management) that a few years back exposed sensitive personal records of all people who ever applied for security clearances.

The Five Eyes Alliance, which was formed in 1946 among the five English-speaking nations as a way to share security information, has increasingly had to deal with the issue of cybersecurity in recent years. That included joining with 22 other nations to determine what constitutes fair or foul play in cyberspace. Last year, the Five Eye nations were amongst those who agreed to a broadly written agreement for all nations to follow international law even online.

An issue of cybersecurity also caused the largest riff among the alliance when the UK opted to move forward with a plan to have Chinese-based Huawei build out the nations 5G network. While the telecom company would have been blocked from the core parts of the system, the fact that it was involved at all caused a serious divide within the Five Eyes. However, in July Prime Minister Boris Johnson announced that the UK would follow its IC partners and ban Huawei from its 5G network and all components and equipment deployed and/or made by the Chinese firm would be removed from the UK by 2027.

Read more:
Five Eyes Call for Tech World to Weaken Encryption - ClearanceJobs - ClearanceJobs