Bitcoin’s flash crash and recent rally explained – BNN

The notoriously volatile price of Bitcoin is rallying, surging past the US$11,000 mark for the first time this year in late July.

The cryptocurrency set a new record high for 2020 on Sunday when it briefly surpassed US$12,000, marking an important technical and psychological milestone for cryptocurrency investors, before plunging more than US$1,000 within minutes.

There are several key factors fueling this price boost including the so-called Bitcoin Halving, which occurred on May 11. The algorithm that controls market supply of Bitcoin was adjusted to reduce new market supply by half. In the 11 years since its inception, this inflation-fighting feature of Bitcoins programming has historically been a driver of price movement.

Brian Mosoff, CEO of Toronto-based fintech firm Ether Capital, says a big part of the Bitcoin narrative has been a hedge against the inflation of fiat currencies, such as the U.S. dollar.

The timing of COVID and the expansion of government and central bank balance sheets have investors nervous about inflation. Investors are seeking ways to hedge and Bitcoin stands to be an important beneficiary of this, he said in an email.

Bitcoins algorithm dictates that only 21 million Bitcoin will ever be minted, leading many investors to draw the comparison to golds scarcity. Industry watchers say many investors view Bitcoin as a kind of digital gold and for that reason, it has piggy-backed on golds current rally.

According to Bilal Hammoud, CEO and Founder of a Calgary-based cryptocurrency exchange NDAX.io, Bitcoin is the perfect long-term hedge against both monetary policy instability and political instability. In an email he said ongoing trade tensions between the U.S. and China as well as unlimited money-printing stimulus due to the pandemic make the greenback a less attractive safe haven, driving the smart money to anti-inflationary assets such as gold and bitcoin as a hedge.

Another significant development driving the price of Bitcoin higher is a July 22 letter from the U.S. federal agency responsible for monitoring national banks and federal branches of foreign banks. It states that the Office of the Comptroller of the Currency concluded providing custody of cryptocurrency is a modern form of traditional bank activities related to custody services.

Banks can continue satisfying their customers needs for safeguarding their most valuable assets, which today for tens of millions of Americans includes cryptocurrency, the OCC letter says.

The letter opened the door for all national banks to provide cryptocurrency custody services for customers, according to Taras Kulyk, a senior vice-president at Bellevue, Washington-based blockchain and Artificial Intelligence firm, Core Scientific.

Following the release ofthis letter,the price of Bitcoin jumped 10 per cent in the span of 48 hours. Kulyk said in a phoneinterview that the market realized that this truly was a fundamental shift in regulatory positioning in the United States.

American law firm Sullivan Worcester LLP, which is based in New York City, described the OCCs letter in a July 24 note to clients as a potential turning point in the notorious frenemy relationship between banks and cryptocurrency. It goes on to say its possible that this could lead to a lower barrier for consumer and merchant crypto transactions.

Kulyk said in addition to the OCCs statement, many U.S. consumer-facing fintech apps including Venmo and Paypal have recently announced plans to integrate cryptocurrency in their offerings.

In July, popular Canadian investment app Wealthsimple announced plans to offer cryptocurrency trading on its platform asBitcoin trade volumes reached record highs on major cryptocurrency exchanges around the world.

Mosoff said that historically, the majority of Bitcoin trading is done by retail investors, although institutional capital and interest is increasing.

"It's difficult and often impossible to know what leads to big, short-term price moves in crypto," he said. "Bitcoin is traded globally and traders often employ leverage; with leverage a lot of volatility is possible."

On Sunday, Bitcoin experienced a flash crash, with US$1,000 wiped from its trading price on major platforms within minutes. It has since somewhatrecovered, and the move was attributed to profit-taking by so-called whales who own large amounts of the cryptocurrency.

Bitcoins overall price increase has provided fuel for other major cryptocurrencies, including ether which runs on the Ethereum network, and was pioneered by Canadian Vitalik Buterin. Historically the largest cryptocurrencies tend to move in lockstep, though Mosoff says Ethereum, which marked its fifth anniversary at the end of July, is one to watch.

While Bitcoin is treated as a stock, commodity or store of value, Mosoff says Etheris poised to take a different path.

Later this year, the network will begin to undergo a significant upgrade that will allow investors to generate yield in what weve termed a digital bond, Mosoff said.I believe this upgrade will put substantial upwards pressure on the price.

Originally posted here:
Bitcoin's flash crash and recent rally explained - BNN

Archer Materials to showcase quantum technology during Virtual Trade Mission to London Tech Week – Proactive Investors Australia

As part of its commercial strategy, the companys CEO and senior management will virtually attend London Tech Week from September 1-11, together with international delegations of high-growth-potential technology companies.

() has been invited by the British Consulate-General Department for International Trade to attend and participate in the Virtual Trade Mission to London Tech Week 2020.

As part of the companys commercial strategy, CEOMohammad Choucair and senior management will attend London Tech Week virtually from September 1 to11 with international delegations of high-growth-potential technology companies.

London Tech Week is Europes most influential tech event showcasing the best in tech innovation from across the globeand in 2019 attracted a global audience of 58,000 attendees and an online reach of over 300 million.

Chief executive officerChoucair said: The Trade Mission to London Tech Week follows from our invitation to chair at the Quantum Tech conference this year, also in the UK.

"We are being acknowledged on the world stage due to our success and potential to make a positive impact in the quantum economy.

The focus of our 12CQ activities leading up to London Tech Week is around quantum control of the chip [qubit] components which we recently commenced the quantum in quantum computing.

We look forward to engaging with organisations in sectors that will be disrupted and enabled by quantum computing.

Archer aims to initiate strategic business relationships, identify upcoming opportunities and conduct virtual meetings with key decision-makers in the deep tech economy.

The curated program for delegates spans industries directly relevant to Archers 12CQ quantum computing chip including fintech, healthtech, smart citiesand AI.

12CQ is a world-first technology that Archer aims to build for quantum computing operation at room-temperature and integration onboard modern electronic devices.

In strengtheningthe commercial readiness of its 12CQ chip, the company has recently accomplished a number of achievements.

Archer has progressed patent applications internationally including in the EU, successfully begun assembling chip prototypes and has recently entered into a quantum computing agreement with IBM that supports the companys plans to use IBM's open-source framework, Qiskit, as the software stack for the12CQ chip.

See the original post here:
Archer Materials to showcase quantum technology during Virtual Trade Mission to London Tech Week - Proactive Investors Australia

China Is Waging Cyber-Enabled Economic War on the U.S. How to Fight Back. – Barron’s

For all practical intents, the United States is at war with China. This may come as a surprise since no bullets have been fired nor declarations made. Yet there is little question that, for over a decade, the Chinese government has engaged in a sustained campaign of cyber-enabled economic aggression against us and our allies. They have targeted our most productive economic sectors and are currently winning. But as we restart our economy after Covid-19, we have a unique opportunity to shift this fight decisively back in our favor.

At the heart of this conflict is a series of grand economic competitions across key industries, including telecommunications, advanced computing, robotics, energy generation, resource extraction, aerospace, and the medical sciences, to name just a few. We are currently facing off with China on 5G technology, machine learning, quantum computing, nuclear and solar power, satellites, rare earth metals, biotechnology, and pharmaceuticals. Fundamental to the Chinese strategy for winning in each of these areasand many moreis the rampant theft of American intellectual property.

The Chinese playbook is deceptively simple: Why spend trillions of dollars on basic science or advanced research when it can be stolen with almost no penalties? The Chinese government is stunningly good at this theft. Not only do they employ thousands of government operatives to engage in this effort, a new federal indictment charges that they have fostered a criminal hacker class that works for its personal economic gain as well as for the Chinese state.

This brazen theft is not just limited to intellectual property. It also involves the pilfering of massive amounts of datafrom the likes of the U.S. Office of Personnel Management, Equifax, Marriott, and Anthemthat will fuel intelligence operations and train machine learning algorithms, generating economic and political gain for decades.

Chinese companies also look to acquire American technology through investment, acquisition, litigation, and bankruptcy, turning our own markets and courts against us. They masquerade as American companies while under the control of the Chinese government. Even worse, they take advantage of our companies looking to do business in China by extorting them into creating joint ventures, transferring intellectual property, and providing data to the Chinese Communist Party.

They likewise send students and researchers to our best research universities, all the while pressuring them to steal information for the Chinese state. The recent indictment of a Chinese military officer allegedly masquerading as a researcher at Stanford is but one such example. Chinese intelligence agencies likewise seek to co-opt American academics by providing grant funding for joint research projects and invitations to write for cash.

All of this economic warfare is directed at one key goal: to replace the United States as the global leader. Their agents do this by handing over the spoils of the state-run hacking and extortion campaign to Chinese companies which, in turn, exploit Chinese (and other) workers to make goods at reduced cost, selling them back to us and our allies, making us more reliant upon them.

Weve all now seen the price of this reliance in the difficulty many Americans face in getting medical gear and life-saving drugs. But our reliance is hardly limited to these goods. We also rely on China for all manner of finished goods and key inputs, the loss of which could grind our economy to a virtual halt overnight. Indeed, years ago, the Chinese created a plan to make us reliant on them in a dozen key areas. They now see Covid-19 as an opportunity to surge forward. But it need not be so. We have a chance, in this very moment of economic turmoil, to regain the edge.

First, the U.S. government must stand shoulder-to-shoulder with our private sector to protect and push back. Just as the Chinese back their companies in competition with us, we must do the same for our industry. We should collect and share actionable threat intelligence and actively collaborate with the private sector to protect them through collective defense. We must also push back, using all elements of national power, to end the Chinese campaign of cyber-enabled economic warfare, including through the use of trade measures, sanctions, persistent cyber engagement, and, where necessary, more aggressive actions. We cannot allow trade deals or our desire for cheap Chinese goods to force us to sit on our hands, leaving our private sector alone to fight this war. Doing so means certain defeat.

Second, we must also work with our allies across the globe, including in the Indo-Pacific region, which the administration has identified as the single most consequential region for our future. Indias recent travails at Chinas hands should be a warning to all in the region and we must reject this aggression just as we have in the South China Sea. Likewise, having brought the British back on board on 5G, we must also now convince Germany to join this unified front. America need not stand alone. Making common cause with our longstanding allies is the right approach.

Finally, as we look to restart our economy, we must incentivize Americans to invest their money here and protect our innovation base. We must create tax and regulatory incentives that encourage investment in American companies struggling to survive and protect their intellectual property. These investors should be able to take advantage of low-cost capital to reorganize and reorient companies working on dual-use technologies to accelerate us into recovery and bring manufacturing and jobs back to the United States.

If we are to preserve this nation and remain a global leader, we cannot permit the continued theft of our childrens future right from under our noses. Now is the time to act.

Gen. (Ret) Keith B. Alexander is the former director of the National Security Agency and Founding Commander of United States Cyber Command, and currently serves as chairman, president and co-CEO of IronNet Cybersecurity, a start-up technology company focused on network threat analytics and collective defense and is on the Board of Advisors for the National Security Institute at George Mason Universitys Scalia Law School. Jamil N. Jaffer is the former chief counsel and senior advisor to the Senate Foreign Relations Committee and served in senior national security roles in the George W. Bush Justice Department and White House, and currently serves as senior vice president for strategy, partnerships and corporate development at IronNet Cybersecurity and as the founder and executive director of NSI.

Read the original:
China Is Waging Cyber-Enabled Economic War on the U.S. How to Fight Back. - Barron's

Australias anti-encryption law has damaged the countrys tech industry – Reclaim The Net

Nearly two years after Australia passed its controversial anti-encryption laws, the tech industry is already feeling an impact. Apparently, many non-Australian companies and IT professionals are no longer interested in doing business with Australia.

The typically-inconspicuously named Assistance and Access Act 2018 and Telecommunications and Other Legislation Amendment were supposed to create a safe online environment for Australians. The official description of AAA on Australias government website states that encryption technologies are employed by terrorists, paedophiles, drug smugglers and human traffickers to conceal illicit activities and facilitate crime.

The Australian government denies that these laws would be used to implement backdoors. Meanwhile, Australias Attorney-General Christian Porter has specifically said This ensures that our national security and law enforcement agencies have the modern tools they need, with appropriate authority and oversight, to access the encrypted conversations

As usual, fear-mongering tactics are used to justify authoritarian acts of government overreach that dwindle our freedoms. Then again, given the context its framed in, its no surprise the bill was passed. After all, lawmakers arent known to be the most informed and up to date on the latest technology.

Double your web browsing speed with today's sponsor. Get Brave.

The situation largely mirrors the FESTA/SESTA situation States-side. Initially pushed as anti-human trafficking bills, they in fact made human trafficking worse by forcing many informants underground. In the end, all they did was target innocent, consensual sex work.

But how could you not support a bill that says its against terrorism, pedophilia, and human trafficking? Only a monster wouldnt.

Australian tech giant Atlassian has decided to speak out against the laws, saying they have damaged the reputation of the technology sector, discouraged talent from working in Australia, and harmed an industry that could help drive economic growth in the nations post-Covid-19 recovery.

RELATED: FastMail says its staff are worried about being legally compelled to install secret backdoors in its software

It is my belief that the very rushed nature in which the [TOLA] bill was passed and then also the nature of the rights granted to government under TOLA have had a negative impact on the reputation of the Australian technology sector, said Patrick Zhang, Atlassians policy and government affairs head.

Another criticism is that a backdoor can be exploited not just by the government, but also by foreign governments or malicious actors weakening security as a whole.

He discussed technical capability notices (TCNs), which are basically subpoenas that can force companies to build backdoors into their encrypted services without the knowledge of their customers. Alternatively, they can also be used to compel IT employees to build said backdoors without the knowledge of their company.

That has given a number of our customers concerns. Because I think that the fear is that by working with an Australian company, whether by using its product or as a vendor is that company going to be subject to orders by the government to weaken its security or to build backdoors that will make the product less secure and expose a weak link, if you will, in the technology supply chain that is global in nature?

RELATED: Australias draconian anti-encryption laws mean device makers blacklist Australian telecoms firms

Zhangs fears arent just speculative either. Australias anti-encryption laws have already been used to strip journalists of their protections as we saw last year with the infamous AFP raid on ABC.

In June 2019, Australian federal police officers raided Australian Broadcasting Corporations headquarters with a warrant regarding allegations that Australian special forces were involved in war crimes.

The warrant, posted on Twitter, granted officers the right to add, copy, delete or alter any data in ABCs computers. The warrant further went on to detail the different types of data they were interested in, including handwritten and digital notes and correspondence, graphics, raw footage, documents classified as secret, along with any manual, instruction, password or other thing that assists to gain access to or interpret or decode any of the above things.

Former defence lawyer David McBride was charged with five counts of leaking classified information, on which the war crime allegations were based.

In a world where countries like Switzerland and Norway are considered havens of personal privacy protection, its not difficult to see where Zhang is coming from. China, Russia and India are already considered to be on the opposite end of that scale. Looks like Australia is squarely in the latter list now.

Continued here:
Australias anti-encryption law has damaged the countrys tech industry - Reclaim The Net

Senators Graham And Blumenthal Can’t Even ‘Earn’ The EARN IT Act: Looking To Sneak Vote Through Without Debate – Techdirt

from the don't-let-them dept

Senator Lindsey Graham very badly wants to push the extremely dangerous EARN IT Act across the finish line. He's up for re-election this fall, and wants to burnish his "I took on big tech" creds, and sees EARN IT as his path to grandstanding glory. Never mind the damage it will do to basically every one. While the bill was radically changed via his manager's amendment last month, it's still an utter disaster that puts basically everything we hold dear about the internet at risk. It will allow for some attacks on encryption and (somewhat bizarrely) will push other services to more fully encrypt. For those that don't do that, there will still be new limitations on Section 230 protections and, very dangerously, it will create strong incentives for internet companies to collect more personal information about every one of their users to make sure they're complying with the law.

It's a weird way to "attack" the power of big tech by forcing them to collect and store more of your private info. But, hey, it's not about what's actually in the bill. It's about whatever bullshit narrative Graham and others know the press will say is in the bill.

Either way, we've heard that Graham and his bi-partisan supporter for EARN IT, Senator Richard Blumenthal, are looking to rush EARN IT through with no debate, via a process known as hotlining. Basically, it's a way to try to get around any floor debate, by asking every Senator's office (by email, apparently!) if they would object to a call for unanimous consent. If no Senator objects, then they basically know they can skip debate and get the bill approved. If Senators object, then (behind the scenes) others can start to lean on (or horse trade) with the Senators to get the objections to go away without it all having to happen on the floor of the Senate. In other words, Graham and Blumenthal are recognizing that they probably can't "earn" the EARN IT Act if it has to go through the official process to have it debated and voted on on the floor, and instead are looking to sneak it through when no one's looking.

While Senator Wyden (once again) has said he'll do whatever he can to to block this, it would help if other Senators would stand up as well. Here's what Wyden had to say about it:

The EARN IT Act will not protect children. It will not stop thespread of child sexual abuse material, nor target the monsters whoproduce and share it, and it will not help the victims of these evilcrimes. What it will do is threaten the free speech, privacy, andsecurity of every single American. This is because, at its core, theamended EARN IT Act magnifies the failures of the Stop Enabling SexTraffickers Act--SESTA--and its House companion, the Fight Online SexTrafficking Act--FOSTA. Experts believe that SESTA/FOSTA has donenothing to help victims or stop sex trafficking, while creatingcollateral damage for marginalized communities and the speech of allAmericans. A lawsuit challenging the constitutionality of FOSTA onFirst Amendment grounds is proceeding through the courts, and there isbicameral Federal legislation to study the widespread negative impactsof the bill on marginalized groups.

Yet, the authors of the EARN IT Act decided to take this kind ofcarveout and expand it further to State civil and criminal statutes. Byallowing any individual State to set laws for internet content, thisbill would create massive uncertainty, both for strong encryption andconstitutionally protected speech online. What is worse, the flood ofState laws that could potentially arise under the EARN IT Act raisesstrong Fourth Amendment concerns, meaning that any CSAM evidencecollected could be rendered inadmissible in court and accused CSAMoffenders could get off scot-free. This is not a risk that I am willingto take.

Let me be clear: The proliferation of these heinous crimes againstchildren is a serious problem. However, for these reasons and more, theEARN IT Act is not the solution. Moreover, it ignores what Congress canand should be doing to combat this heinous crime. The U.S. has a numberof important evidence-based programs in existence that are proven tokeep kids safe, and they are in desperate need of funding to do theirgood work. Yet the EARN IT Act doesn't include a single dollar offunding for these important programs. It is time for the U.S.Government to spend the funds necessary to save children's lives now.

While a Wyden hold would block any attempt to get unanimous consent via the hotlining process, it would help quite a lot if other Senators were willing to speak up and stand with him as well. If it's just Wyden, then he'll face tremendous pressure to remove the hold. If more Senators join Wyden in saying this isn't okay, then Graham and Blumenthal will realize they have a bigger challenge in front of them.

Again, if you haven't been following this debate closely, everything that Wyden says above is accurate. EARN IT is an attack on both free speech and privacy (a twofer) without doing anything to actually deal with the problem of child sexual abuse material online. That is very much a law enforcement issue, and it's one which Congress has failed to provide the funds to law enforcement that it promised on this issue, and (even worse) the DOJ has simply ignored its requirement mandates to deal with this issue as required by Congress. The DOJ seems more focused on attacking tech companies and blaming them for its own failure to do its job.

The EARN IT Act is an incredibly dangerous piece of legislation, but it's also a complicated one -- one that many people don't understand. But Senators see something that says "protect the children" and they immediately think "well, of course we support that." But this bill doesn't protect children. It attacks free speech and privacy online in very insidious ways. Please call your Senators and ask them not to let this through.

Filed Under: debate, earn it, earn it act, encryption, free speech, lindsey graham, privacy, richard blumenthal, section 230, senate

Read this article:
Senators Graham And Blumenthal Can't Even 'Earn' The EARN IT Act: Looking To Sneak Vote Through Without Debate - Techdirt

"Fear of Authoritarian Regimes Is Pushing the Film Industry to Self-Censor" – Reason

A very interesting article in Foreign Affairs by my UCLA School of Law colleague Kal Raustiala; here's an excerpt:

What sets the United States apart from the rest of the world is and has always been its soft power. The Soviets may have equaled the Americans in nuclear capability, but they could never rival the appeal of the "American way of life." And even as China tries to spread its culture across the globe, its rise tends to inspire more trepidation than admiration.

Many ingredients combine to give U.S. soft power its strength and reach, but entertainment and culture have always been central to the mix. Film and television have shaped how the world sees the United Statesand how it perceives the country's adversaries. Yet that unique advantage seems to be slipping away. When it comes to some of the great questions of global power politics today, Hollywood has become remarkably timid. On some issues, it has gone silent altogether.

The most glaring example is the growing wariness of U.S. studios to do anything that might imperil their standing with the Chinese government. China's box office is as large as the American one, and entertainment is above all a business. So Hollywood sanitizes or censors topics that Beijing doesn't like. But the phenomenon is not limited to China, nor is it all about revenue. Studios, writers, and producers increasingly fear they will be hacked or harmed if they portray any foreign autocrats in a negative light, be it Russian President Vladimir Putin or North Korean dictator Kim Jong Un.

It wasn't always this way. In the 1930s, Charlie Chaplin'sThe Great Dictatortook on Adolf Hitler. Later, Martin Scorsese'sKundunshone a light on the fate of Tibet, andThe Unbearable Lightness of BeingandThe Hunt for Red Octobermade the Cold War come alive. Today,the market power of Chinaand the cyberpower of some rogue statesis making studios and creatives think twice about producing such daring, overtly political films. And as the retreat from the kind of films that once bolstered American soft power accelerates, Hollywood is running out of real-life antagonists.

View post:

"Fear of Authoritarian Regimes Is Pushing the Film Industry to Self-Censor" - Reason

Pence Says Administration Will ‘Lean Into’ Issue of Tech Censorship – Newsmax

Vice President Mike Pence said Tuesday the Trump administration is continuing to "lean into"investigatingthe claimsocial media and other tech companies are censoring content and opinions contrary to liberal doctrine, promising to preserve the freedom of speech and freedom of press on the Internet.

Speaking with Breitbart News Editor-in-Chief Alex Marlow on SiriusXM's "Breitbart News Daily," Pence addressed in broad terms the actions of tech companies such as Facebook, Google and particularly Twitter.

Last week, Twitter removed a Breitbart's livestream news conference of the medical group America's Frontline Doctors held on the steps of the U.S. Supreme Court regarding what it said was misinformation on the novel coronavirus.

It was also removed from YouTube.

Twitter claimed the livestream was a violation of its "COVID-19 misinformation policy," Breitbart News reported. Among the claims made by some of the participants of the event was the promotion of the half-century old anti-malaria drug hydroxychloroquine as possible treatment for the novel coronavirus.

The group's website has been removed by the tech company squarespace.com.

"We're going to do our very best every day between now and election day and for four more years after that to make sure that we preserve the freedom of speech and freedom of the press on the Internet," Pence said.

Marlow also said one of Breitbart News' Twitter accounts was "shuttered" until the video of the press conference was deleted.

Pence said the Trump administration was working to ensure freedom of opinion on social media platforms, which have enjoyed liability protection under the 1996 Communications Decency Act by claiming they are merely "passive bulleting boards" of information.

He referred to last week's action by President Donald Trump, which formally requested the Federal Communication Commission reinterpret the law particularly in regard to social media companies which selectively choose which user content to allow and which to block, edit or censor.

"Well, freedom of speech is the bedrock of American democracy, that's why our founding fathers enshrined the freedom of speech, freedom of the press, in the first amendment of the constitution and I want all your listeners to know as they've seen this president and our administration take action to prevent online censorship in the past, that we're going to continue to lean into this effort," Pence said.

"As you know, last summer the Department of Justice launched a broad antitrust review of big tech, that's ongoing. The president this summer signed an executive order that set into motion a series of actions that launched a tech bias reporting tool at the White House and called on the FTC to consider action whenever is appropriate to prohibit unfair or deceptive acts affecting commerce, etc."

2020 Newsmax. All rights reserved.

Continued here:

Pence Says Administration Will 'Lean Into' Issue of Tech Censorship - Newsmax

South Park: Why Episodes "200" and "201" Were Banned – Screen Rant

South Park is well known for its crude and controversial material, however, some episodes have caused such an uproar that they are now banned.

South Park is well known for its crude and controversial material;however, there are some episodes that have caused suchan uproar that they are now banned from Comedy Central, South Park Studios website, and any streaming platform that airs the show. While there are five episodes banned in total, season 14 episodes "200" and "201" sparked an enormous outcry from Middle-Eastern terrorism groups over their planned depiction of the Prophet Muhammad.

Released in 1997,South Park became known for its crude animation and subject matter, before pivoting to more political, current-events-based satire. Still, despite its offensive material, the show has earned itself an array of awards and accolades, such as Primetime Emmy Awards, and its success has not waivered, remaining one of Comedy Central's most-watched shows.

Related:Why Winnie The Pooh Is Banned In China

Censorship was at the heart of episodes "200" and "201," with series creators Trey Parker and Matt Stone taking a strong stance against it. The episodes upon airing, however, were censored; even the dialogue at the end of "201" was completely bleeped. The creators weren't happy with the network's decision (as per a statement South Park Studios released), which was no doubt increased by the fact that an image of Muhammad had already aired in 2001 during season 5 episode 3's "Super Best Friends."

Ross Douthat of The New York Timesstated thatthe move to censorSouth Park was a result of the Danish newspaper,Jyllands-Posten,running unflattering images of the Prophet Muhammad in 2005, which lead to global riots and death threats. In Islam traditions, the Prophet is not allowed to be depicted in any way. Despite this, the newspaper ran the images, and even with outcries from several prominent Muslim groups, the paper did not back down.

In the United States, tensions were high between the West and Islamic people due to the 9/11 terrorist attack. While US news outlets covered the controversy, they did not reprint any of the depictions of Muhammad, even though the US values freedom of speech and the press. For the US, religious sensitivity along with a larger population of people of the Islamic faith was a more important factor.

Episodes "200" and "201" revolve around pastSouth Parkepisodes, storylines, and controversies, with Trey Parker and Matt Stone pushing the boundaries of censorship, especially in the case of Muhammad. Irritated that they could show Jesus and other religious icons, the inability to display Muhammad becomes a focal point of the episode. Throughout the story, past celebrities, angered by the town of South Park for continually ridiculing and mocking them, want to steal the powers Muhammad has to not be shown or insulted.

Related:South Park: Every Celebrity Guest Star

After episode "200" aired, threats were leveled against both creators of the show and Comedy Central if they depicted the image of Muhammad further. Revolution Muslim, a group known for advocating the end of western imperialism, had an author post to Twitter wishing death and Hell for both Trey Parker and Matt Stone. Additional threats and veiled references were made comparing the creators to Dutch director Theo Van Gogh, who was murdered after a film he made portrayed violence against women in some Islamic societies.

While Trey Parker and Matt Stone continued to advocate against censorship and defended their work, Comedy Central heavily censored the episode in order to protect its employees. Further, they went back and removed "Super Best Friends" from the South Park lineup, as well as censored "Cartoon Wars Parts 1 and 2." WhileSouth Park has released episodes in the past that have pushed the boundaries enough to warrantcensorship, episodes "200" and "201" are notable due to their focused plot points, as well as the threats that were leveled against both show creators before the episodes even aired.

More:Is South ParkOn Netflix, Hulu Or Prime? Where To Watch Online

Friends: Every Character The Show Totally Forgot About

Jeff lives and breathes TV shows, movies, and video games. He's built his own media/gaming PC to house all of his media. Trained as a Screenwriter, Jeff dreams of being a Showrunner one day. His encyclopedic knowledge of TV shows allows him to write on a wide array of topics. Recently, he's been exploring Screenwriting for Virtual Reality. He draws from his love of science fiction, horror, drama, fantasy, and real-world politics/religion to craft his stories. In addition to writing, he has a passion for teaching, as well as Technology, Science, and Space Exploration.

Read the original:

South Park: Why Episodes "200" and "201" Were Banned - Screen Rant

Breaking up the Patent Monopoly for the Benefit of Batteries – JD Supra

PV Magazine - July 23, 2020

The patent monopoly is at odds with the global need for battery storage technology. As the world mobilizes towards climate change solutions, companies with battery patents will face increasing pressure to share this critical intellectual property (IP). How they respond will impact our planets future.

The effort to make battery technology more widely available could not be more vital. It currently takes 20-30 years for energy sector inventions to reach the mass market. To reach current climate goals, we need to halve the diffusion time for clean technologies globally, according to Bernice Lee et al.s Who Owns Our Low Carbon Future? Intellectual Property and Energy Technologies.

There are a variety of steps that need to be taken, and quickly, in order for the patent industry to make the innovation well need to change the world: a global licensing database, patent pools, standard setting organizations, co-assigned patents, university-to-industry technology transfer, open to the public and patent pledges.

Global Licensing Database

Licensing has the benefit of being familiar to most sophisticated corporate players and many major universities. Licensing alone may not sufficiently speed diffusion, particularly if the licenses are exclusive. Cross-licensing agreements between parties to license their IP to each other may address part of this problem.

Because the existence, let alone terms, of many license agreements are confidential, parties hoping to enter a license have few benchmarks for price or other important terms. One way to provide such benchmarks would be to establish a global database with licensing data and best practices.

Patent Pools

In a patent pool, multiple patent holders assign or license their individual rights to a central entity, which in turn exploits the collective rights by licensing, manufacturing, or both. according to Robert P. Merges, Contracting into Liability Rules: Intellectual Property Rights and Collective Rights Organizations. Member patent holders generally must license all patents covering industry-relevant technology, but can use any other members IP for a fixed fee. Patent pools can vary widely in size.

Pooling IP may be essential in industries with complex technology that requires access to many, complementary, patents to function meaningfully. They significantly reduce the transaction costs of acquiring IP. However, the technology in a pool is only open to members; a small pool may do little to diffuse clean energy technology. Additionally, potential members may not want to pool royalties, particularly companies with high-value patents.

Standard Setting Organizations

Standard setting organizations (SSOs) are governing bodies of member companies that form technical standards. Like patent pools, member entities will typically contribute IP for the groups mutual use and may pay royalties into a shared pool. But SSOs go beyond patent pools by writing a catalogue of technical standards to which industry players commit to comply. This effort encourages standardization. And standardization is key to mass production.

On the other hand, SSOs require coordinated collective action and significant up-front investment. Establishing a battery technology SSO may take so much time that it overshadows the benefits.

Co-Assigned Patents

In the United States, and other nations, more than one entity or person can own a patent. Each co-owner may exploit the patent without compensating co-owners or obtaining their consent. This shared ownership obviates the need for a license between the co-owners. This arrangement also increases enforcement power, since all co-owners must join in enforcement actions.

But co-assigned patents may not be a viable global solution. The co-ownership statute does not allow co-owners to make, use, offer to sell, or sell the patented invention outside the U.S. (unsurprisingly). Co-owners must also be prepared to incur the additional expense of joining enforcement actions.

University-To-Industry Technology Transfer

Major research universities typically have technology transfer offices responsible for licensing technology invented by students and researchers to private enterprise. These licensed technologies can sometimes spin off into corporations. Many universities also have clean technology competitions, such as the MIT Clean Energy Prize, that encourage student-led startups.

Universities attract bright minds with time and resources to experiment with novel technologies. Dr. John Goodenough, inventor of the lithium-ion battery, is a professor of mechanical engineering at University of Texas at Austin. Universities also have clear monetary and prestige incentives to share their work with private industry. But research institutions may have existing relationships with companies, making access to this technology selective.

Open to the Public: Create a Culture of Open Innovation

The clean energy industry can also look to the example of open source software to guide its response to the need for globally-diffused battery storage technology.

Authors of open source software make the software open to the public; anyone can modify and improve on the source code. Users are still subject to a license, but the license is royalty free and contains minimal restrictions. Some open source licenses require that anyone who modifies the software must release their modifications publicly and free of charge.

These clever licensing schemes would not be possible without a programming culture that valued the free exchange of ideas. Companies with critical clean energy patents could recreate that same culture in the clean energy industry.

Patent Pledge

Patent pledges are a promise not to assert ones patents against others who use the patented technology. As remarkable as it may seem to promise something for nothing, more than 100 companies have historically taken patent pledges, including Google, IBM, Microsoft, Red Hat, Sun Microsystems, and Twitter.

This amnesty is not without exception; most pledges ends if the party using the patents sues the pledging patent holder. Companies with patent pledges are, in fact, getting something in return: goodwill with the public and, more importantly, with open source developers who rely on the free flow of information to innovate. Indeed, failing to take a patent pledge may tarnish your brand.

Unfortunately, its not clear if patent pledges are enforceable in court. Moreover, sharing ones patent is not at all the same as sharing best practices for producing the invention.

Conclusion

These solutions may seem challenging, but as the effects of climate change are more widely felt, the adoption of one or more of these strategies to make green technology more broadly available appears increasingly essential. Better to understand the available tools now with time yet to strategize for a cleaner future.

Read the original:
Breaking up the Patent Monopoly for the Benefit of Batteries - JD Supra

Police Infiltration of Protests Undermines the First Amendment – brennancenter.org

The protests that followed the police killing of George Floyd in late May prompted allegations of infiltration byout-of-stateanti-fascist agitators (which have beenrefuted) and white supremacists (which have beenborne out). But little attention has been paid to a third group of infiltrators: police. As with so many other police practices that are now coming under scrutiny, the longstanding practice of using undercover police to monitor protests and protest movements should be closely examined and reconsidered.

There is solid evidence that police infiltrated the recent demonstrations. A North Dakota officerposed as a protester, photographed activists, and yelled F**k the police while checking for guns at a Black Lives Matter protest in Fargo. Undercover officersdisguised as Orthodox Jewsattended anti-racism protests in New Jersey. The Texas Department of Public Safetyoutright acknowledgedembedding undercover officers in the protests to root out criminals.

The idea, ostensibly, is that plainclothes officers can overhear people conspiring to commit violence or other illegal acts and disrupt their plots. But this rationale falls apart on closer examination. The notion that there were coordinated plans to engage in illegal activity turns out to be false. An internalDepartment of Homeland Security intelligence assessmentfound that most of the violence at protests has been committed by opportunists interested in looting, not agitators or extremists.

The benefits of infiltration are thus speculative at best. On the other hand, there are proven downsides. Indeed, undercover officerssometimes initiateorenableviolence between police and protesters, further escalating thealready-violent policing of dissent a problem that is particularly pertinent foranti-police brutalityandBlack-ledprotests, which meet especially forceful resistance from law enforcement.

Additionally,the history of police infiltrationis one of the government disproportionately targeting progressive activists and movements sometimes even going so far as to gin up violence as justification for scrutiny rather than keeping protesters safe.

Take, for instance, the FBIs Counter Intelligence Program, known asCOINTELPRO. From 1956 to 1971, it targeted groups that the government deemed subversive, with methods including unconstitutional surveillance and infiltration. Included in its mission were efforts to expose, disrupt, misdirect, discredit, or otherwise neutralize the activities of the Black Panthers and other Black nationalist groups. COINTELPRO was designed explicitly to target Black activists because of their political stances. One of its ignominiesinvolved an FBI informantproviding Black Panthers with sticks of dynamite to blow up the Statue of Liberty.

Or take the more recent example of the protests surrounding President Trumps inauguration. As part of aninvestigation into a potential conspiracyto foment violence, police officersinfiltrateda small group called Disrupt J20 that was planning meetings for the demonstrations. They followed up by arresting more than 200 anti-capitalist and anti-fascist activists, journalists, and legal observersen masse, simply because the individuals were in the vicinity of acts of property damage. The resulting prosecutions casesended in mistrials, dismissals, and acquittalsover the next 18 months. And while law enforcement agenciesfocustheir infiltration on the advocacy of left-leaning groups, Black protesters, and Muslims, theycontinueto payinsufficient attentionto the United States manyviolent white supremacistthreats.

Police infiltration of protests also has a chilling effect on protesters First Amendment rights.Fearof plainclothes police joining protests to surveil activists,the danger to undocumented immigrantsof Immigration and Customs Enforcement officers attendance at protests, thepresence of agents-provocateur, and the resultingdistrust of ones fellow protestersall discourage would-be marchers from participating.

These significant risks and harms outweigh any marginal benefit that might accrue from police infiltration, at least as it has been practiced up to now. It is apparent that the use of undercover officers at protests needs to be revisited.

At a minimum, there should be more transparency and accountability accompanying the use of undercover police in protests. One model for this is the wave of surveillance oversight legislation being passed across the nation, most recently in the form of thePOST Act in New York City. The measure will require the New York City Police Department to disclose basic information about the surveillance toolsit uses, the deployment of those tools, and safeguards for New Yorkers civil liberties. Analogous legislation requiring police departments to develop and share policies regarding infiltration operations, including specific protections for protesters First Amendment rights, could increase their accountability to the communities they are intended to serve.

A more far-reaching approach would be to adapt and expand the recommendations of the Church Committee a Senate panel that investigated the abuses of various intelligence authorities, including COINTELPRO by law enforcement. The recommendations in the committees landmark 1976reportfocused on raising the threshold for intelligence collection by shifting the focus from association and advocacy to demonstrated dangerous conduct. A similar approach could be adopted in the context of police infiltration of protests for instance, by limiting its use to cases in which there is a preexisting investigation based on facts that support reasonable suspicion of criminal activity.

It is not clear, however, that raising the threshold would solve the problem. In Washington, DC, the2004 First Amendment Rights and Police Standards Actalready requires police to obtain clearance from top police officials, along with evidence of a threat of violence, for infiltration of advocacy groups and those measures did not prevent the J20 debacle. And the citys auditor had previously raised concerns about police noncompliance with the law.

A broader solution is to simply prohibit plainclothes police from attending protests. Using undercover police in connection with protests and protest movements can only further undermine trust between law enforcement and communities at a time when that trust has already been badly eroded by repeated, high-profile instances of racialized police brutality. Whatever the merits and drawbacks of undercover operations in other settings, protests are one context where people should feel free to come together and express themselves without fear of surreptitious law enforcement monitoring.

More here:

Police Infiltration of Protests Undermines the First Amendment - brennancenter.org