How the VA is using artificial intelligence to improve veterans’ mental health | TheHill – The Hill

Navy veteran Lee Becker knows how hard it can be to ask for help in the military.

I remember when I was in the military I had to talk to leaders [who] would chastise service members for getting medical support for mental health, said Becker, who served at the Navy's Bureau of Medicine and Surgery, providing care to Marines and Sailors serving in Iraq and Afghanistan.

So when he began his career at the Department of Veterans Affairs (VA) about a decade ago, he knew things needed to change. In 2017, the suicide rate for veterans was 1.5 times the rate for nonveteran adults, according to the 2019 National Veteran Suicide Prevention Annual Report, increasing the average number of veteran suicides per day to 16.8.

The VA historically has always been in reactive mode, always caught by surprise, he said, citing the example of the lack of health care for female veterans, who are 2.2 times more likely to die by suicide than non-veteran women.

WHAT YOU NEED TO KNOW ABOUT CORONAVIRUS RIGHT NOW

FAUCI ADDRESSES WHY BLACK AMERICANS ARE DISPROPORTIONALLY AFFECTED BY CORONAVIRUS

REPORT HIGHLIGHTS ASIAN AMERICAN DISCRIMINATION AMID CORONAVIRUS PANDEMIC

IM A FOREIGN-BORN DOCTOR FIGHTING AMERICAS WAR AGAINST THE CORONAVIRUS. THE US NEEDS MORE OF US

WOMEN AND THE HIDDEN BURDEN OF THE CORONAVIRUS

400,000 CALL ON CONGRESS TO EASE HOUSING CONCERNS FOR AMERICAN FAMILIES IMPACTED BY CORONAVIRUS

After an explosive report by the Washington Post in 2014 detailing tens of thousands of veterans waiting for care as VA employees were allegedly directed to manipulate records, some things have changed. This April, veteran trust in the VA reached 80 percent, up 19 percent since January 2017, according to the agency. And the former chief of staff for the Veterans Experience Office is now working for Medallia, a customer experience management company. He is the solutions principal for public sector and health care, and he helped launch the Veterans Signals program in partnership with the VA.

The programutilizesartificial intelligence systems typically used in the customer experience industry to monitor responses based on tone and language and respond immediately to at-risk veterans. About 2,800 crisis alerts have been routed to VA offices, according to Medallia, providing early intervention for more than 1,400 veterans in need within minutes of being alerted.

If they have the ability to harness this capability so they can sell more, why cant public service agencies have the ability to serve more? Becker asked. "It opened the aperture, making sure we really targeted the care. We were getting insights that helped anticipate future problems. We were able to identify veterans that are in crisis and route that case directly to the veterans crisis line.

Through surveys, Medallia collects customer feedback for the VA that seeks to understand veterans as customers with other identities outside of their military service. One call came from an Asian American female veteran living in Idaho who was scared to leave her house due to racist stigma blaming Asian Americans for the coronavirus pandemic.

I think the greatest tragedy is that I see a tsunami coming around mental health and if we dont mitigate that by truly listening and anticipating the needs of the people, were going to have an issue, Becker said.

Our country is in a historic fight. Add Changing America to your Facebook or Twitter feed to stay on top of the news.

The coronavirus pandemic has exacerbated existing inequities for the most vulnerable communities. The VA medical system has recorded more than 53,000 cases of COVID-19 among veterans in all 50 states, the District of Columbia and Puerto Rico, AARP reported, withmore than 3,000 deaths not including veterans who were not diagnosed at VA hospitals and medical centers.

Access to care is still an issue. A report released last week by the Department of Veterans Affairs, Office of Inspector General revealed deficiencies in care, care coordination and facility response in the case of patient who died by suicide after being discharged by the Memphis, Tenn., VA Medical Center. But Becker remains optimistic that he can make change from within the system.

"It has to start on the military side. We have to make sure that it's very clear it's ok not to be ok, if someone needs mental health support it's not weakness," he said.

And that support needs to carry through veterans' transitions to civilian life, Becker added.

"[The military is] a cocoon, you get fed, you have a job, you get issued clothes, he said. When you leave, how do we make sure that all of those needs are getting met?"

While hes optimistic, Becker is also a realist and he knows there are still very real problems with the VA. But he says its more an issue of capability than bad intentions.

Theres a few bad apples, Ive supervised those bad apples and I've had to get rid of those bad apples, Becker said. But hes also seen new leaders step up.

Its a tale of two cities, he said. Were seeing a set of leadership behaviors that are not conducive to the needs of what were looking for, but were seeing great leaders within the federal government who are career employees and even some politicians.

THE LATEST FROM CHANGING AMERICA ON THE CORONAVIRUS PANDEMIC

FAUCI PUSHES BACK AGAINST MINIMIZING OF CORONAVIRUS DEATH TOLL

HERD IMMUNITY EXPLAINED

THE PROBLEM WITH HOLDING UP SWEDEN AS AN EXAMPLE FOR CORONAVIRUS RESPONSE

FALSE POSITIVE AND NEGATIVE TEST RESULTS EXPLAINED

NOBEL LAUREATE PREDICTS WE WILL HAVE MUCH FASTER CORONAVIRUS RECOVERY THAN EXPECTED

The rest is here:
How the VA is using artificial intelligence to improve veterans' mental health | TheHill - The Hill

Bluetooth advocacy group warns of critical encryption exploit – IT PRO

Certain configurations of Bluetooth 4.2 to 5.0 on dual-mode devices containa flaw that could allow hackers to conduct 'man in the middle' (MITM) attacks or overwrite encryption keys.

Known as BLURtooth, the vulnerability assigned CVE-2020-15802 can be found on devices supporting both Bluetooth Basic Rate/Enhanced Data Rate (BR/EDR) transportation methods as well as Low Energy (LE) connections.

Although an alert, published by Carnegie Melon University, doesn't specify which particular devices are affected, a number of widely-available dual-mode devices fall into the bracket, including the Dynabook Portg X30L-Gbusiness notebook, the Nokia 5.3 smartphone, and the Sonos Move wireless speaker system.

The flaw lies in the pairing mechanism in these dual-band Bluetooth devices, with the vulnerability allowing third-parties to overwrite the key used to establish a link between two devices. The vulnerability, and the group of viable attacks, categorised as BLUR, was first discovered by academics with cole Polytechnique Fdrale de Lausanne (EPFL) and Purdue University.

The researches identified that CTKD, when implemented to older versions of the specification, may permit escalation of access between the two transports with non-authenticated encryption keys replacing authenticated keys or weaker encryption keys replacing stronger encryption keys, according to the Bluetooth Special Interest Group (SIG).

BLURtooth mainly affectsdevices that use the Cross-Transport Key Derivation (CRKD) mechanism for Bluetooth pairing. The fault may allow an attacker to reduce the strength of the encryption key, or overwrite an authenticated key with an unauthenticated key in order to gain access to profiles or services.

To conduct successful attacks, a hacker must be within wireless range of a vulnerable Bluetooth device that supports CTKD connections and supports pairing either with no authentication or no access restrictions on pairing.

An attacker spoofing another devices identity may bond with the vulnerable device and derive a key through the CTKD mechanism that overwrites a pre-existing encryption key of much greater strength. In doing so, the attacker can access authenticated services, or conduct a MITM attack in future between devices that were previously bonded.

BLURtooth is the latest serious Bluetooth vulnerability to be recognised by the Bluetooth SIG in recent months after the organisation was forced to update the core specification following the discovery of BIAS in May 2020.

Also centred on devices using BR/EDR, the Bluetooth Impersonation Attacks (BIAS) flaw allowed attackers to break security mechanisms and impersonate one device in a pair after a bond has been established.

The State of Email Security 2020

Email security insights at your email perimeter, inside your organisation, and beyond

BIAS can also work in conjunction with other attacks, such as the Key Negotiation of Bluetooth (KNOB) attack, which allowed hackers to brute force watered-down encryption keys and intercept data transmitted between devices.

Bluetooth SIG has recommended that potentially vulnerable devices should be updated with the restrictions placed on CTKD, as mandated by the Bluetooth Core Specification version 5.1 and beyond.

The details of the vulnerability are also being relayed to members of the organisation, which includes hundreds of device manufacturers, with these members encouraged to rapidly integrate any patches as and when they become available.

2020 email security strategy guide

A people-centric approach to stopping malware, phishing, and email fraud

The ultimate guide to hybrid cloud

Demystifying your options and explaining the business benefits

Reducing downtime for SAP HANA

Automating high availability and disaster recovery with Red Hat

Top 3 cyber attacks to watch out for in 2020

Discover prevalent threats and how to combat them

Read more:
Bluetooth advocacy group warns of critical encryption exploit - IT PRO

Heres why quantum computing is a cat among the pigeons – BusinessLine

Much is made of the virtues of this new technology called quantum computing, which earned itself a special mention and money allocation in Finance Minister Nirmala Sitaramans budget speech of February.

Quantum computers, (fundamentally and not incrementally) different from conventional computers in the core of their working, will be far, far faster than the most complex (exoscale) conventional computers of today.

Good, right? Not quite.

The reason is, quantum computers can pose a grave threat to data security, which has implications not just in privacy and business, but also in defence and national security. Data security today is ensured by encrypting datasort of jumbling everything upwhich can be reversed only at the other end.

But even computers, while encrypting data, follow certain patterns only these patterns are so complex that to copy them would take much more computing power than is available today. That is why today data is safe, if at all.

However, when quantum computers enter the fray (which is likely to be soon), they can decode the encryption, no matter how complex. And, there goes your data security.

Many experts have agonised over this problem in the last few years and now, solutions are coming up. How do you tackle a problem posed by quantum technology? By going back to the same quantum technology for a solution.

IIT-Madras-incubated, Bengaluru-based start-up QNu Labs is among the few companies that have developed a solution. We are both a product and solutions company, says Sunil Gupta, Co-founder & CEO of the company.

The company offers two products for encryption. The quantum random number generator gives complete randomness in encryption keys. Basically, if encryption can be thought of assigning a number to every data point, if the assignment of numbers is not random enough and is based on a formula, a fast computer can potentially read the formula and guess the data. But the quantum random number generator produces truly random numbers, making the data secure.

Another product is the quantum key distributor, which exchanges cryptographic keys over networks. Essentially, these products make eavesdropping impossible.

Gupta says these two products enable the company to offer complete data encryption services to customers. These find application in transfer of data between data centers, securing access to data in the cloud, securing virtual private networks (VPN) and securing blockchain transactions. Businesses such as banks, healthcare providers, pharma companies and, importantly, Defence, are potential customers of QNus services, Gupta told Business Line.

For example, the company has provided some details of its service to the Defence PSU, Bharat Electronics Ltd. BEL used to courier encryption keys manually to every defence field units for safety, but this also meant that the keys could not be refreshed frequently enough.

QNu solved this problem by transporting the encryption keys in a secure way over public network in real time. It estimates potential saving of 100 crore to BEL.

Gupta says the market for quantum encryption is about to boom. One estimate puts it at $ 25 billion by 2025. The start-up is about to scale up and is in the market to raise funds. About $ 5-7 million, Gupta said.

Here is the original post:
Heres why quantum computing is a cat among the pigeons - BusinessLine

Better late than never: Zoom boosts security with 2FA – Verdict

Zoom has added two-factor authentication (2FA) to its video communications platform, a long-awaited feature that will provide a security boost.

Users that turn on 2FA will be asked to present another piece of information to verify they are the account owner. This could be a security code texted to a linked mobile, or an expiring one-time password sent by an authenticator app such as Google Authenticator or Microsoft Authenticator, as well as other authentication methods.

Account admins can turn on 2FA by signing into the Zoom Dashboard and heading to security. Admins have the option to enable 2FA for all accounts used at its company, or users in specified roles.

2FA is the latest security feature that the US company has added after it came under criticism for security flaws, including Zoom-bombing and encryption concerns. These were brought to light due to Zooms soaring popularity during the pandemic, which caused revenues to rocket by 355% year-on-year in its most recent quarter.

In response, the company embraced the criticism head-on and established a 90-day security plan to address its shortcomings, with CEO Eric Yuan providing regular progress updates.

Security experts welcomed the addition of 2FA to Zoom.

This security inclusion comes better late than never, said Jake Moore, cybersecurity specialist at Slovak internet security company ESET. Zoom became the go-to conference call tool at the start of lockdown, and played well into the hands of convenience minded users rather than those focused on security or privacy due to its initial lack of security features such as encryption.

This new addition is a fantastic effort to help protect all end users and I urge every user to apply this essential layer of extra protection from now on.

Niamh Muldoon, senior director of trust and security at OneLogin said it was a necessary development given Zooms soaring user numbers. However, he cautioned that Zoom could go further than 2FA.

Moreover, Zoom should endeavour to implement stronger methods of authentication in the near future, she said.

The growing sophistication of phishing threats means traditional forms of 2FA like SMS and OTP are becoming risky. Zoom should introduce more modern forms of 2FA like WebAuthn, which leverages device-based encryption to prevent even advanced malware and man-in-the-middle phishing attacks.

Read more: Zoom will now offer end-to-end encryption to all users

Follow this link:
Better late than never: Zoom boosts security with 2FA - Verdict

an open source and encrypted alternative to Google Docs – Explica

Cryptpad is a tool for editing collaborative documents in the purest Google Docs style, the difference is that in this case we are talking about an open source and encrypted solution. Cryptpad uses 100% client-side encryption, so that the content we write about them and the people who host the server is protected.

You can use the service with or without registration, but if you create an account you get 50 MB of permanent storage (currently it was extended to 1 GB by the COVID-19 crisis) so that the documents that you store in your CryptDrive are never deleted due to inactivity. You can also use it without even registering, and in neither case do they ask you for any personal information.

Cryptpad has a large battery of web applications. It has the three classics: the text editor, spreadsheets and presentations, but in addition to this it has the creation of surveys, Trello-style Kanban boards, a collaborative drawing board, and a code editor.

It offers you the possibility of protect your files or documents with a password, and has a self-destruct function that erases documents according to the time you decide.

In Cryptpad the files you create can be public or private, you control the documents permissions before sharing, you can insert your documents on any website using a segment with iframe, and you have collaborative editing options and a chat.

In general, all the tools work very well from the browser, it has a basic and easy-to-use design, perhaps more similar to Microsofts Office online than to Google documents. Payment plans are offered from $ 5 to $ 15 with much more storage space and the only personal information they require is an email.

More:
an open source and encrypted alternative to Google Docs - Explica

Julian Assange is not on trial for his personality but heres how the US government made you focus on it – The Independent

On Monday Julian Assange was driven to the Old Bailey to continue his fight against extradition to the United States, where the Trump administration has launched the most dangerous attack on press freedom in at least a generation by indicting him for publishing US government documents. Amid coverage of the proceedings, Assanges critics have inevitably commented on his appearance, rumours of his behaviour while isolated in the Ecuadorian embassy, and other salacious details.

These predictable distractions are emblematic of the sorry state of our political and cultural discourse. If Assange is extradited to face charges for practising journalism and exposing government misconduct, the consequences for press freedom and the publics right to know will be catastrophic. Still, rather than seriously addressing the important principles at stake in Assanges unprecedented indictment and the 175 years in prison he faces, many would rather focus on inconsequential personality profiles.

Assange is not on trial for skateboarding in the Ecuadorian embassy, for tweeting, for calling Hillary Clinton a war hawk, or for having an unkempt beard as he was dragged into detention by British police. Assange faces extradition to the United States because he published incontrovertible proof of war crimes and abuses in Iraq and Afghanistan, embarrassing the most powerful nation on Earth. Assange published hard evidence of the ways in which the first world exploits the third, according to whistleblower Chelsea Manning, the source of that evidence. Assange is on trial for his journalism, for his principles, not his personality.

Youve probably heard the refrain from well-meaning pundits: You dont have to like him, but you should oppose threats to silence him. But that refrain misses the point by reinforcing the manipulative tropes deployed against Assange.

When setting a gravely dangerous precedent, governments dont typically persecute the most beloved individuals in the world. They target those who can be portrayed as subversive, unpatriotic or simply weird. Then they actively distort public debate by emphasizing those traits.

These techniques are not new. After Daniel Ellsberg leaked the Pentagon Papers to journalists to expose the US governments lies about Vietnam, the Nixon administrations White House Plumbers broke into Ellsbergs psychiatrists office in search of material that could be used to discredit him. NSA whistleblower Edward Snowden was falsely portrayed as collaborating with the Chinese, then the Russians. Obsession with military intelligence analyst Mannings mental health and gender identity was ubiquitous. By demonizing the messenger, governments seek to poison the message.

Julian Assange in the Ecuadorian embassy - a timeline

The prosecution will be all too happy when coverage of Assanges extradition hearing devolves into irrelevant tangents and smears. It matters little that Assanges beard was the result of his shaving kit having been confiscated, or that reports of Paul Manafort visiting him in the embassy were proven to be fabricated. By the time these petty claims are refuted, the damage will be done. At best, public debate over the real issues will be derailed; at worst, public opinion will be manipulated in favour of the establishment.

By drawing attention away from the principles of the case, the obsession with personality pushes out the significance of WikiLeaks revelations and the extent to which governments have concealed misconduct from their own citizens. It pushes out how Assanges 2010 publications exposed 15,000 previously uncounted civilian casualties in Iraq, casualties that the US Army would have buried. It pushes out the fact that the United States is attempting to accomplish what repressive regimes can only dream of: deciding what journalists around the globe can and cannot write. It pushes out the fact that all whistleblowers and journalism itself, not just Assange, is on trial here.

This piece was written by Noam Chomsky and Alice Walker, co-chairs of AssangeDefense.org

Original post:
Julian Assange is not on trial for his personality but heres how the US government made you focus on it - The Independent

Attack the press – NationofChange

Over the past few years, authorities in many countries have become increasingly bold in their attacks on journalists, especially those who work in alternative media. Julian Assange, who began his extradition hearing at Londons Old Bailey court after a four month delay this past Monday, has become a powerful symbol of the hypocrisy of western states that claim to champion a free press.

A common argument made by centrist and rightwing leaders since Wikileaks embarrassed the American government by releasing documents leaked by Chelsea Manning in 2010 is that someone like Assange, who faces up to 175 years in prison if sent to the United States, is not a professional journalist and thus not afforded the same protections that apply to those who toil in corporate news rooms. Even more speciously, the current Secretary of State has argued that the countrys 1stAmendment doesnt apply to the publisher because hes Australian.

Worse still, in representative democracies now governed by so-called populists of the right, leaders routinely call stories they dont like fake news and demonize outlets and reporters critical of them at every opportunity. Some, like Brazils Jair Bolsonaro, evenpersonally threatenindividual journalists for asking uncomfortable questions.

At the state and local level here in North America, current attacks by authorities, not only on journalists but on the right to free assembly, have tended to be more physical in nature. While weve seen similar behavior on the part of police in confronting the press at anti-pipeline protests and other actions throughout the continent over the past decade, the context of a widespread Black Lives Matter uprising in the United States this year and the politically motivated hysteria of the far right in reaction to it has led to what appears at some times like targeted, and at others like indiscriminate violence against journalists covering the protests, in some cases leading toserious injuries.

Thanks to the work of theU.S. Press Freedom Tracker, its possible to see a troubling trend line over the course of the current U.S. presidents term. As reported by the group, there were a total of 144 attacks on press freedom in all of 2017while, As of Sept. 1, the Tracker has confirmed 238 press freedom violations including physical assaults, arrests, and equipment searches and seizures more than three quarters of which occurred while journalists were documenting the Black Lives Matter protests.

This impunity on the part of local authorities, encouraged by the countrys president and many of his surrogates, was on display on a national news network on May 29thin Minneapolis. As he was reporting on the protests following the murder of George Floyd, CNN reporter Omar Jimenez, who is African American,was arrested on cameraby the citys police.

Jimenez, aveteran reporterbased in Chicago, previously covered the trials of the officers charged in the death of Freddie Gray in Baltimore and was nominated for an individual Emmy award when employed by local Baltimore station WBAL, where he worked prior to taking a job as a correspondent for CNN in 2017.

Its hard to argue that Jimenezs arrest didnt to some degree come about as the result of bias.More so after it wasreported by the Guardiana few days laterthat, another of CNNs correspondents, Josh Campbell, who is white, was reporting about a block away from Jimenez. He said police were polite when they approached him to ask him which outlet he was with, and they told him: OK, youre good.

Soon after Jimenezs release, the American Civil Liberties Union filed a class action suit in Minnesota to put an end to what it claimed was the unconstitutional targeting of journalists during the protests.

As an ACLU attorney said in astatementabout the suit, We are facing a full-scale assault on the First Amendment freedom of the press. We will not let these official abuses go unanswered. This is the first of many lawsuits the ACLU intends to file across the country. Law enforcement officers who target journalists will be held accountable.

Rather than being something unique to the United States and its current political scene, examples of this kind of bias in the policing of some journalists as opposed to others is also demonstrated by the ongoing case of Karl Dockstader, a journalist and radio host from Oneida Nation of the Thames in the Canadian province of Ontario, who has beencharged with mischief and violating a court imposed injunctionas a result of his reporting from an indigenous protest camp established on a construction site south of Canadas largest city, Toronto.

While journalists in Canada have fewer protections under the law than those south of the border, exceptions for press covering protests by the countrys indigenous people have been carved out as recently as 2019, when adecisionfrom the Supreme Court of the province of Newfoundland and Labrador found, An injunction can be a very blunt instrument. Unless carefully crafted in its scope and judiciously applied in its enforcement, it risks wrapping within its purview persons who were not part of the mischief to which the original injunctive remedy was directed and also risks unnecessarily trenching upon such other important constitutional and legal values like freedom of association, freedom of the press and, in appropriate cases like the present one, the protection of rights pertaining to indigenous interests.

No charges were brought against any other reporter at what is called the 1492 Land Back Lane protest encampment that Dockstader was covering, leading one to the suspicion that like Jimenez in Minneapolis, his identity plays a role in the case being made by Ontario police against him.

As Dockstader told Canadas national broadcaster,the CBC, I never thought I was going to have to sit my 10- and 12-year-old daughters down in our living room and talk to them about how their dad was arrested. Thats a cycle of violence that I am trying to break as an Indigenous man and I thought that an honorable career like journalism would give me an opportunity to break the cycle of violence, not to bring it into my own house It was just earth-shattering.

Back in the U.S., less troubling in terms of possible motivation on the part of authorities but arguably more worrying in terms of tactics, wasthe arrest and alleged assaultin Seattle on July 1st,of U.K. Independent correspondent Andrew Buncombe as he covered the dismantling of the CHOP (Capital Hill Organized Protest) autonomous zone in the city.

Still, outlets like CNN and the Independent have the resources and reputation to fight back against such overreach on the part of police, but what of those journalists without this kind of institutional backing?

One such reporter isEddy Binford-Ross, a student covering the protests for her high school paper, the Clypion, where she is also editor in chief covering the protests in Portland. Though wearing a helmet and other tags toclearly identify herself as press, Binford-Ross has faced tear gas and other non-lethal projectiles used by police over the course of her work this summer.

As Binford Ross explained to the SPLC (Student Press Law Center) in aninterview, Its very concerning to me that they seem to be targeting the press and, at the very least, disregarding the distinction between who is a member of the press and who is a protester. Sometimes, when I identify myself as a journalist, theyll say okay Ill leave you alone, but normally it doesnt seem to phase them.

In normal times, we often see a gradual chipping away of basic rights like weve seen in the trials of Julian Assange, where a narrative, some of it true, a lot of it based on character assassination and outright lies, has been built over time, denying the publisher the presumption of innocence. In extraordinary circumstances, like after 9/11 or in our current era of crisis, norms are smashed to bits instead of merely being degraded in individual cases over time, with consequences that are often far ranging and permanent.

Although it is in many ways a conservative document, the United States constitution set a new standard for the world in establishing the 4thEstate as a kind of unofficial branch of government tasked with informing the public, this is why oligarchs and politicians have been trying, with some success, to either terrorize or control its practitioners ever since.

FALL FUNDRAISER

If you liked this article, please donate $5 to keep NationofChange online through November.

Read more:
Attack the press - NationofChange

Enemies of the State Film Review: Powerful Documentary Cuts to the Heart of Internet-Era Persecution and Paranoia – Yahoo Entertainment

Was hacker Matthew DeHart a whistleblower, a spy or a child pornographer? Or some combination of the above? Watching the provocative new documentary Enemies of the State, your opinion may shift more than once, as director Sonia Kennebeck (National Bird) pursues both the elusive nature of truth and the seductive qualities of conspiracy theories.

Featuring interviews with the key players alongside dramatized recreations the documentary pioneer of this method, Errol Morris, acts an executive producer here Kennebeck takes us deep inside one familys harrowing ordeal and pulls the rug out from our assumptions and prejudices, offering an array of contradicting experts whose judgment and assertions shift in their credibility.

The facts are these: Air National Guard veteran Matt DeHart, who purports to be involved with on-line whistleblowers Anonymous and Wikileaks, has his house ransacked by federal investigators looking for evidence regarding child pornography allegations against Matt. He flees to Mexico shortly thereafter with thumb drives he claims contain volatile classified information regarding an FBI investigation into a CIA operation.

Also Read: 'David Byrne's American Utopia' Film Review: Byrne and Spike Lee Burn Down the House With Style

His parents Paul and Leann both veterans themselves rally to their sons defense, and the next few years involve attempted defections to Russia and Venezuela, an application for asylum in Canada, a car accident on a snowy highway, allegations of government torture and interrogation using the drug Thorazine, and activists and journalists seeking to help out Matt, particularly in the wake of events surrounding Edward Snowden and Chelsea Manning.

In the face of all these conflicting testimonies, then whats the truth? Thats the onion that Kennebeck and her editor Maxine Goedicke (Pope Francis: A Man of His Word) so skillfully unwind over the course of Enemies of the State. People prone to assume the worst about governments and the best about individuals will evaluate the presented evidence in one way, and their opposites in the other, and it isnt until the films final 15 minutes that the audience is presented with the most unassailable facts. (In the timeline of making the film, this final bit of intel came late in the game as well, or so the films intertitles suggest.)

Story continues

Also Read: Toronto International Film Festival Reverses Optional Mask Policy Inside Theaters

Without ever announcing itself as such, the film brilliantly dissects the way that conspiracy theories work and why theyre so irresistible. In an age when so many are willing to dismiss reputable, sourced news and science in favor of shadowy and even anonymous internet experts, Enemies of the State sneakily but indelibly takes us through one individual case and tests our individual ability to filter out white noise and presupposition in favor of whats irrefutable.

For a story about espionage on one hand and accusations of child endangerment on the other, the film focuses on a family that, on paper, seems to be as upright and four-square as possible: Paul DeHart, who entered the ministry after serving in both the Army and the Air Force, describes Leann and himself as the kind of kids who always sat down and followed the rules. Theyre clearly loving parents to Matt, but as the film progresses, we are left to wonder whether or not theyre playing too large a role in the life of their son as he enters his late twenties, and whether or not their distrust of the authorities represents creeping paranoia or a justified response to outrageous government interference.

Also Read: How the Pandemic Will Shake Up Toronto Film Festival's (Virtual) Sales Market

Its also a case study in extremes; its plausible, given years of disclosure of governmental dirty tricks, that accusations of child molestation would be used to silence an activist who has become privy to confidential information. By the same token, its just as plausible that someone guilty of child pornography might weave a fiction around himself and his family to explain being the target of a federal investigation. Kennebecks ability to work with both possibilities seems to have translated in access to players on both sides, from the DeHarts to the Tennessee prosecutors working the child pornography case.

Enemies of the State is a chilling watch, both for what it contemplates and for the internal path that each viewer will take while experiencing it. That some will come away from the film unwilling to accept its conclusions merely proves the films point.

Read original story Enemies of the State Film Review: Powerful Documentary Cuts to the Heart of Internet-Era Persecution and Paranoia At TheWrap

More here:
Enemies of the State Film Review: Powerful Documentary Cuts to the Heart of Internet-Era Persecution and Paranoia - Yahoo Entertainment

Charlie and the First Amendment | Columns | theadanews.com – Theadanews

The First Amendment: Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof; or abridging the freedom of speech, or of the press; or the right of the people peaceably to assemble, and to petition the Government for a redress of grievances.

If you are a regular reader of mine, you have already figured out that I like to write about former students and the many things I learned from them. Back in the early 1980s, I taught in a small country school. It was culturally diverse and mostly poor. I had a very memorable student who dropped out when he turned 16 named Charlie. By the way he dressed, Charlie had been born in the wrong decade. He wore neatly pressed khaki pants, plaid cotton shirts, and brown leather shoes. His hair was short, brushed to the side, and had hair cream on it to keep it slicked down tight. He was mostly silent in class, very respectful, and his classwork was punctual and thorough.

There was something unusual about Charlie besides his dress and quiet manner. When we would say the Pledge of Allegiance in assemblies, I noticed that Charlie would stay seated and silent. I was so surprised because he was one of the most respectful students I had ever had. A few days after noticing this, I pulled him aside after class and asked him about it. In his usual quiet way, he said that his religious beliefs did not allow him to say the pledge or to stand for the National Anthem. He said his church believed it to be a form of idolatry.

I was totally astonished and asked him what church he attended. He said he was a Jehovahs Witness, as were most of his family. I thanked him for the explanation and he went on his way. How had I lived in this country my whole life and had never heard this?

I occasionally heard other students talk about Charlie and these differences. I heard them mention that his family did not celebrate Christmas, either. The students discussing this were not being rude or mean, they were just stating a fact. They thought it was a little odd, but didnt call him names, say he was unpatriotic and hated America, or anything of the sort. They accepted him for who he was and what he believed. When Charlie turned 16, he dropped out of school to take the GED. He turned his books in and told me his plan. He said he was leaving school because he wanted to help his family in their carpentry business, and thanked me for being his teacher. I had no doubt he would pass his GED with flying colors; he was an exceptionally smart young man.

His story resonates with me because even though Charlie did not do what was expected, no one vilified him for it. His classmates accepted the fact that his beliefs told him not to recite the Pledge of Allegiance or stand for the National Anthem. They respected his decision and didnt give him any grief for it, which is pretty remarkable when you consider how mean some high school students can be. It makes me wonder how we got to where we are today, when someone taking a knee is immediately regarded by many with disdain and hatred. Whether or not I agree with those who choose to kneel during the National Anthem is besides the point; my opinion of such doesnt really matter. It is their First Amendment right. In fact, if you insist that every single person must stand because you think it is the right thing to do, that smacks of totalitarianism, not democracy.

It is saddening that we are at a place in our country where we think there is only one true point of view, one valid stance, or one right way to live. This goes for both those who lean right or left we stopped listening to and trying to understand one another a long time ago. As a former counselor, I know when someones behavior is questionable, rather than just vilify the behavior, it is of utmost importance to ask why that behavior is happening. Once one can decipher the reason behind something, the behavior often makes more sense. This holds true whether we are talking about a fussy baby or a rebellious twenty-something.

Our founding fathers understood that this country would be diverse and should be a place where a citizen has the freedom to think and express themselves, as long as it didnt bring physical harm to anyone. We are the most speech-protected and expression-protected country in the world. It is a freedom that our soldiers have fought and died for. If we as a country can ever hope to get past this current time of extreme polarization, we must go back to the first amendment, remember what it says, and begin listening to each other.

Even when its hard. Even when it is the opposite of what we believe. Our countrys health depends on it.

We are making critical coverage of the coronavirus available for free. Please consider subscribing so we can continue to bring you the latest news and information on this developing story.

More:

Charlie and the First Amendment | Columns | theadanews.com - Theadanews

First Amendment rights on display in Rochester protests – Newswise

Protests in Rochester, NY continued this week for the eighth day after a federal lawsuit revealed police involvement in the death of Daniel Prude in March along with a subsequent alleged cover up of the incident. The police chief and members of police department leadership have since resigned.

Tyler Valeska is a fellow at the Cornell University Law School First Amendment Clinic, which handles litigation, advocacy and policy matters related to First Amendment cases for news outlets, journalists, researchers, and scholars.

Bio: https://www.lawschool.cornell.edu/faculty/bio_clinical_fellows.cfm?id=1049

Valeska says:

The right to peaceful assembly is enshrined in our First Amendment for good reason: democracy requires that the people be able to gather in opposition to unjust governmental activity. The recent protests in Rochester are a prime example of this principle in action.

The protests have been largely nonviolent, with some exceptions, and have forcefully voiced the communitys outrage with how Daniel Prude was killed. Protestors are constitutionally protected in their expressive demonstrations and cannot be targeted based on the content of that activity. Police should not engage in any counter-demonstration efforts that unnecessarily chill protestors speech, such as firing projectiles into crowds indiscriminately or without justification. And police should refrain from targeting journalists covering the protests in any way. Even brief detainments of journalists, as have been reported, can undermine the critical newsgathering function the press plays.

Were very much in a broader moment of increased protest activity, both nationally and globally. Weve seen an increase of over 10% in the number of protests worldwide in the last decade, and domestically weve had over 25,000 protests attended by over 13.5 million people since President Trumps inauguration. That comprises big and small cities and underscores the criticality of First Amendment protections in an era of mass political demonstrations.

Excerpt from:

First Amendment rights on display in Rochester protests - Newswise