Letter: A revolution in reverse – Concord Monitor

Published: 7/26/2020 12:01:16 AM

Its time for our members of Congress and for all of us to yell fire, because we are in a crowded and volatile theater. The Trump administration and its militarized troops have declared war a revolutionary war against the American people.

In Portland, Ore., unarmed and nonviolent protesters are being rounded up and taken away by men dressed in camouflage, with their nametags removed and faces masked. These troops, decked out in the latest wartime military gear, forcibly shove the protesters into unmarked vehicles (vans, not police cruisers). They dont have warrants, they dont have probable cause, and they refuse to indicate what, if any, crimes they are arresting these Americans for having committed.

And who are the protesters being rounded up in this brutal fashion? They are part of ongoing demonstrations, advocating for racial justice and an end to police violence against citizens of color. They have been marching, along with the Black Lives Matter movement and white and brown allies, seeking a reconciliation among all racial and ethnic groups and a reorientation of our economy in a way thats fair to everyone, regardless of wealth, race, ethnicity, or religion.

As such, these demonstrations are part of the most sacred American values: the right of the people to petition the government for a redress of grievances. These rights, along with freedom of speech and assembly, are enshrined in the First Amendment to our Constitution. These bedrock principles of our democracy have been at the heart of Americas uniqueness and greatness for centuries. They are the beacon we have held up for other nations to emulate.

Now that our fundamental American values are under threat from a revolutionary president, all of us political leaders, community leaders, and we grassroots Americans must forcefully reject Trumps latest moves toward authoritarianism. We should make it abundantly clear that we refuse to go down the road that Germany went down in the 1930s. We will not succumb to the ruthless rule of a dictator. In America, we the people will democratically decide what policies shall guide our nation.

As Sen. Jeff Merkley said: These authoritarian Trump/Barr tactics designed to eliminate any accountability are absolutely unacceptable in America, and must end.

KEN BARNES

Contoocook

Follow this link:

Letter: A revolution in reverse - Concord Monitor

John Krull: The innocents at home, anti-mask tales of purity – Terre Haute Tribune Star

None dare call them hypocrites.

The conservative politicians who oppose Gov. Eric Holcombs statewide mandate that Hoosiers wear masks while in public have the purest histories and the cleanest hands one could imagine. They wouldnt dream of endangering their fellow citizens lives and creating dissension in a time of crisis out of personal pique.

No, no, no.

These guys have unblemished reputations of selfless, unimpeachable devotion to serving both the state and its citizens, uncorrupted by baser considerations or loyalties. They are above such crass motivations.

Take Indiana Attorney General Curtis Hill, for example.

Hill issued an opinion at the request of several conservative state lawmakers that Holcombs order exceeded his authority. The attorney general devoted at least 15 or 20 seconds of research and analysis to this carefully reasoned argument.

One would expect such diligence and creativity from a man who argued with vehemence that he should remain as attorney general even though his license to practice law had been suspended and Indiana law requires that one be an attorney in good standing to hold the office.

The demands that Hill resign his office came from every corner. The chorus calling for him to leave included most Hoosier Republican officeholders.

But Hill recognized that to honor his duty to the law he must ignore, even break, the law. To do otherwise would be to violate his oaths both as an officer of the court and as the states highest-ranking defender of the law.

So, Curtis Hill stayed fought tooth and nail, in fact, to hold onto his office in the face of unending criticism and censure from the Indiana Supreme Court because his devotion to the law knows no bounds. He knew it would be wrong to deprive Indiana of such a paragon of principled commitment to the rule of law.

No, none dare call them hypocrites.

Then theres Indiana Rep. Jim Lucas, R-Seymour.

Lucas recently found himself on the receiving end of a spanking from his own partys leadership. He lost several key committee assignments because he had posted a racist meme on Facebook a picture of a laughing Black child in what appeared to be a diaper chortling, We gon get free money.

After his trip to the woodshed, Lucas said he was going to leave social media and try to strike a more respectful tone.

That lasted about 90 seconds.

The day after the governor announced the mask mandate, Lucas offered the following calm and reasoned post on Facebook:

Starting Monday, the governor wants to lock me in a cage for 180 days and fine me $1,000 if I dont wear a mask that has no published standards for effectiveness.

What if I dont comply, Governor Eric Holcomb?

The words sat atop a photo of a gun and a pocket copy of the U.S. Constitution.

Many people who saw the post called it a threat to the governor and thus a violation of the law. Lucas denied that.

He always does.

Thats because Lucas is like the kid in the band who just knows that everyone but him is marching out of step.

His devotion to the Constitution is depthless. Thats why he likes to berate and shout down citizens who want to exercise their First Amendment right to petition government for redress of grievances. Thats also why he tried to waive gun owners Fourth Amendment rights a few years back so he could make it possible for them to bring their guns to school.

Hes just following the wisdom of the Vietnam War general who said, In order to save the village, it was necessary to destroy the village.

Lucas knows that, to save the Constitution, sometimes one must destroy the Constitution.

No, none dare call them hypocrites.

Eric Holcombs motivations arent nearly so high-minded and complicated. Hes requiring Hoosiers to wear masks because, selfishly, he wants to see fewer of us getting sick and dying.

What a cad.

What a tyrant.

Hill, Lucas and the others who oppose the governors mandate have one other thing in common.

They all say theyre pro-life.

No, none dare call them hypocrites.

John Krull is director of Franklin Colleges Pulliam School of Journalism and publisher of TheStatehouseFile.com, a news website powered by Franklin College journalism students.

We are making critical coverage of the coronavirus available for free. Please consider subscribing so we can continue to bring you the latest news and information on this developing story.

See original here:

John Krull: The innocents at home, anti-mask tales of purity - Terre Haute Tribune Star

RCFP supports fight for records related to Jamal Khashoggi killing – Reporters Committee for Freedom of the Press

Amicus brief filed by the Reporters Committee for Freedom of the Press and 32 media organizations

Court: U.S. Court of Appeals for the District of Columbia Circuit

Date Filed: July 23, 2020

Background: In 2018, the Committee to Protect Journalists and the Knight First Amendment Institute separately submitted Freedom of Information Act requests to five federal agencies related to the Saudi Arabian governments execution of journalist Jamal Khashoggi.

The two organizations sought records about the duty to warn a person about a known threat, under Intelligence Community Directive 191, and specifically about the duty to warn Khashoggi prior to his murder.

After all of the agencies failed to respond to the FOIA requests, the Knight Institute filed a lawsuit, which CPJ joined. During litigation, each of the agencies except the State Department responded to the request by invoking the Glomar doctrine, claiming that acknowledging the existence or non-existence of documents responsive to the requests would compromise national security. Subsequently, the Knight Institute voluntarily dismissed its claims, leaving CPJ as the sole plaintiff. The U.S. District Court for the District of Columbia upheld the Glomar responses, granting summary judgment for the government.

CPJ then appealed to the U.S. Court of Appeals for the District of Columbia Circuit.

Our Position: The D.C. Circuit should reverse the district courts decision that the intelligence agencies adequately justified their Glomar responses to the FOIA requests.

Quote: Given the unbridled growth of Glomar responses across federal agencies, the pernicious way in which overclassification of documents interacts with the Glomar doctrine, and the press freedoms implicated by the records at issue, district courts should be required to apply a heightened standard of proof in this case and others like it would bring the doctrine back in line with the language and purpose of the [Freedom of Information] Act.

Related: In 2019, a D.C. district court ruled that the FBI could not invoke the Glomar doctrine in response to a FOIA request about the agencys impersonation of documentary filmmakers. The Reporters Committee filed suit after the agency invoked the doctrine to avoid searching for records related to agents impersonation of a documentary film crew to investigate Nevada rancher Cliven Bundy and his followers after a 2014 armed standoff between Bundy and the U.S. Bureau of Land Management.

In 2016, a New York appeals court allowed the New York City Police Department to invoke the Glomar doctrine in response to a FOIA request about the departments surveillance of two Muslim men. The Reporters Committee and 20 media organizations submitted a friend-of-the-court brief in the case, arguing that the doctrine cannot be invoked by a state.

Read the original:

RCFP supports fight for records related to Jamal Khashoggi killing - Reporters Committee for Freedom of the Press

OCC Announces that Federally-Chartered Banks and Thrifts May Provide Custody Services for Crypto Assets – JD Supra

The Office of the Comptroller of the Currency (OCC) issued a letterstating that a national bank [and federal savings associations] may provide . . . cryptocurrency custody services on behalf of customers, including by holding the unique cryptographic keys associated with cryptocurrency. This letter also reaffirms the OCCs position that national banks may provide permissible banking services to any lawful business they chose, including cryptocurrency business, so long as they effectively manage the risks and comply with applicable law. (Letter).

The key phrase above is any lawful business. When a financial institution deals with crypto clients, whether the institution is actually dealing with a customer engaged in lawful activity is literally the question. Oddly, therefore, the Letter is simultaneously groundbreaking and yet also nothing new.

The Letter, which is 11 pages long, first describes cryptocurrencies and the related distributed ledger technology, and then explains at length that providing fiduciary and non-fiduciary customer services for cryptocurrency (here, holding a digital currency on behalf of a customer typically would mean taking possession of the cryptographic access keys to the cryptocurrency units) merely falls within banks longstanding authority to provide all forms of safekeeping and custody activities. The Letter states that the OCC

. . . . recognizes that, as the financial markets become increasingly technological, there will likely be increasing need for banks and other service providers to leverage new technology and innovative ways to provide traditional services on behalf of customers. By providing such services, banks can continue to fulfill the financial intermediation function they have historically played in providing payment, loan and deposit services. Through intermediated exchanges of payments, banks facilitate the flow of funds within our economy and serve important financial risk management and other financial needs of bank customers.

So, although the medium of value may be new fangled, the role of banks here is nothing new.

However, the letters last paragraph is likely the most instructive. Please note the suggestion to confer first with the OCC before onboarding any cryptocurrency clients. The Letter states:

Consistent with OCC regulations and guidance on custody activities, the risks associated with an individual account should be addressed prior to acceptance. A custodians acceptance process should provide an adequate review of the customers needs and wants, as well as the operational needs of the account. During the acceptance process, the custodian should also assess whether the contemplated duties are within its capabilities and are consistent with all applicable law.

Just in case the message is not sufficiently clear, the Letter continues (with emphasis added):

Understanding the risks of cryptocurrency, the due diligence process should include a review for compliance with anti-money laundering rules. Banks should also have effective information security infrastructure and controls in place to mitigate hacking, theft, and fraud. Banks should also be aware that different cryptocurrencies may have different technical characteristics and may therefore require risk management procedures specific to that particular currency. Different cryptocurrencies may also be subject to different OCC regulation and guidance outside of the custody context, as well as non-OCC regulations. A national bank should consult with OCC supervisors as appropriate prior to engaging in cryptocurrency custody activities. The OCC will review these activities as part of its ordinary supervisory processes.

Translation: providing custody services for digital currency assets is not inherently wrong. However, the compliance obligations still will be significant, because financial institutions must satisfy their AML obligations when dealing with an industry, form of value, and customer base that, historically at least, often has resisted full transparency, the cornerstone value of any AML system.

The Letter clearly signals the growing acceptance of digital currency by regulators and the global financial system, and therefore is significant. But the Letter also makes clear that traditional financial institutions still must be very careful regarding digital currency, which contains many potential AML traps in practice. Not inherently wrong does not equate to safe at all times.

Read more from the original source:
OCC Announces that Federally-Chartered Banks and Thrifts May Provide Custody Services for Crypto Assets - JD Supra

Encryption Software Market Report 2020: Manufacturers, Countries, Type and Application, Global Forecast To 2025 – CueReport

The most recent market research study on Global Encryption Software market 2020 by Manufacturers, Regions, Type and Application, Forecast to 2025 the overall growth of the market for the 2015 to 2025 time period. The report focuses on numerous aspects of the current market scenario and several segments that are present in the market. The report studies supply chain operations, new product development, and other activities in the market. The report covers the global Encryption Software market growth and market share for the estimated forecast period of 2025.

The research report on Encryption Software market report provides a detailed analysis of this business landscape. The document analyses various market dynamics such as the opportunities and factors which drive the market growth. The market is poised to generate notable revenue and display a remunerative growth rate during the analysis timeframe, cites the report.

Request Sample Copy of this Report @ https://www.cuereport.com/request-sample/25885

Additionally, the report assesses the existing market competition trends and elaborates on various risk factors which may hamper the growth of the Encryption Software market during the analysis timeframe.

Request Sample Copy of this Report @ https://www.cuereport.com/request-sample/25885

The document also highlights the impact of COVID-19 pandemic on the growth of Encryption Software market.

Details of the regional analysis of the Encryption Software market:

As per the report, based on the regional landscape, the Encryption Software market is bifurcated into North America, Europe, Asia-Pacific, South America and Middle East & Africa.

Additional takeaways of the Encryption Software market report:

Objective of Studies:

Request Customization on This Report @ https://www.cuereport.com/request-for-customization/25885

See the original post here:
Encryption Software Market Report 2020: Manufacturers, Countries, Type and Application, Global Forecast To 2025 - CueReport

Xen Project Hypervisor Version 4.14 brings added security and performance – Yahoo Finance

New version introduces Linux stubdomains and robust live patching to build on security features.

SAN FRANCISCO, July 24, 2020 /PRNewswire/ --TheXen Project, an open source hypervisor hosted atthe Linux Foundation, today announced the release of Xen Project Hypervisor 4.14, which introduces Linux stubdomains, better nested performance, more robust live patching and reflects contributions from across the community and ecosystem. This release also continues the fundamental shift for Xen, which was outlined in version 4.13, to make it increasingly resistant to side-channel attacks and hardware issues.

"Xen Project Hypervisor 4.14 is a clear example of important investments from companies and community members to move the project forward," said George Dunlap, Xen Project Advisory Board Chair. "We continue to see broad participation from many companies, which is validation of the important role Xen plays in the open-source virtualization space: a project focused solely on virtualization, with a mature code base and community."

Security Advanced security has always been one of Xen's distinctive strengths. This precedent continues with more security-focused features this release.

Key updates and improvements include:

Embedded and Safety-Critical As the Xen project continues to evolve and grow, it has become relevant for the embedded and automotive use cases. Due to this, and the importance of functional safety and safety certification to these use cases, Xen continues on a journey to become Safety Certifiable. A key part of this initiative is the progress made in the Xen Project Functional Safety Working group, which was created in the Spring of 2019 and is supported by multiple vendors, including safety assessors. A new development out of this group is the successful drafting of prototype requirement documents and progress towards the processes and procedures on maintaining these documents.

Support for new platforms Support for Raspberry Pi 4 has been extended and now all versions of the RPI4, including the popular ones with 4GB and 8GB of RAM, work on Xen. Additionally, version 4.14 will support the next generation AMD EPYC processor, codenamed "Milan", when it is available to the public.

Featured Highlights

Xen Hypervisor version 4.14 also includes improvements to hypervisor build, x2APIC mode, mem sharing, altp2m, x86 boot path, microcode handling, libxl event handling, xenstore, xentop, network hotplug scripts and more.

Ongoing work on upcoming features

Community Quotes

AMD "We are pleased to be working with the Xen Project Hypervisor team not only on our current generation of AMD EPYC processors but for future generations as well. With the release of 4.14, AMD EPYC processors and Xen users can now scale their compute environments from low to extremely high core counts, as workloads dictate. Xen users can take full advantage of AMD EPYC processors' 64 cores per socket, and the X2APIC feature enables the Xen hypervisor to support up to 256 threads. Whether those users are on-prem or in the cloud, AMD EPYC processors scale to meet their needs." -- Robert Gomer, Director AMD Datacenter Alliances

Citrix "The Xen Project Hypervisor remains a key building block for enabling the success of the Citrix Hypervisor product," Jacus de Beer, Director of Engineering, Hybrid Cloud Platforms at Citrix. "The enhanced live patching features and continued security improvements released in version 4.14 are key to the success of our customers as it enables them to address security concerns without impacting VM uptime. In addition, enabling Xen workloads to run in the cloud opens up interesting opportunities for hybrid cloud deployments."

EPAM "The Xen Project continues to make major strides in functional safety compliance, and we're seeing a growing number of automotive industry leaders intensively evaluating the solution for in-vehicle central computer units," said Alex Agizim, CTO, Automotive & Embedded,EPAM Systems. "We're excited to be part of this initiative, and as one of the leaders in Xen's FuSa SiG, we look forward to enabling vehicles to become more seamlessly integrated with the connected services ecosystem using open source software."

Intel "Thriving open source ecosystems such as the Xen community are key to widespread innovation and peer-reviewed security," said Mark Skarpness, Vice President of Intel's Architecture, Graphics and Software Organization, IAGS and General Manager of System Software Engineering at Intel Corporation. "Our latest Intel Xeon platforms are ready to deliver the performance and features Xen users need to take full advantage of Xen 4.14."

SUSE "We are happy to announce that in this new Xen hypervisor community release a new hypervisorfs feature will be available, which SUSE contributed to respond to customer demand for a reliable and easy to use mechanism to probe configuration and get/set runtime options," said Claudio Fontana, Engineering Manager, Virtualization, SUSE. "SUSE has also given attention, among other features, to 'core scheduling', which is steadily progressing towards being ready for production use."

Xilinx "Xilinx is very happy with the progress Xen has made in the 4.14 release toward supporting usage in functional safety applications," said Tony McDowell, Senior Embedded Platforms Marketing Engineer, Xilinx. "Xilinx believes the flexibility of virtualized multiprocessing on architectures such as Zynq UltraScale+ MPSoC and Versal is key to success in these domains. This is why we continue to invest our engineering know-how into continuous improvement in Xen overall and specifically focus on efforts such as the Xen FuSa SIG."

Additional Release InfoDownloads

About the Xen Project Xen Project software is an open source virtualization platform licensed under the GPLv2 with a similar governance structure to the Linux kernel. Designed from the start for cloud computing, the Project has more than a decade of development and is being used by more than 10 million users. A project at The Linux Foundation, the Xen Project community is focused on advancing virtualization in a number of different commercial and open source applications including server virtualization, Infrastructure as a Services (IaaS), desktop virtualization, security applications, embedded and hardware appliances. It counts many industries and open source community leaders among its members including Alibaba, Amazon Web Services, AMD, Arm, Bitdefender, Citrix, EPAM Systems, Huawei and Intel. For more information about the Xen Project software and to participate, please visit XenProject.org.

Intel, the Intel logo and Xeon are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries. AMD, the AMD logo, EPYC, and combinations thereof are trademarks of Advanced Micro Devices, Inc.

About Linux Foundation Founded in 2000, the Linux Foundation is supported by more than 1,000 members and is the world's leading home for collaboration on open source software, open standards, open data, and open hardware. Linux Foundation's projects are critical to the world's infrastructure including Linux, Kubernetes, Node.js, and more. The Linux Foundation's methodology focuses on leveraging best practices and addressing the needs of contributors, users and solution providers to create sustainable models for open collaboration. For more information, please visit us at linuxfoundation.org.

The Linux Foundation has registered trademarks and uses trademarks. For a list of trademarks of The Linux Foundation, please see our trademark usage page: https://www.linuxfoundation.org/trademark-usage. Linux is a registered trademark of Linus Torvalds.

Media Contact Rachel Romoff rromoff@linuxfoundation.org 210-241-8284

View original content to download multimedia:http://www.prnewswire.com/news-releases/xen-project-hypervisor-version-4-14-brings-added-security-and-performance-301099464.html

SOURCE The Linux Foundation

Go here to see the original:
Xen Project Hypervisor Version 4.14 brings added security and performance - Yahoo Finance

Conservative alternative to Twitter based in Henderson – Las Vegas Review-Journal

WASHINGTON When the Campaign Against Anti-Semitism released screenshots of Twitter locking several accounts that displayed the Star of David which could be unlocked if users removed the hateful imagery Twitter admitted it had made a mistake.

We categorically do not consider the Star of David as a hateful symbol or hateful image, the social media giant tweeted on July 22.

In two tweets that followed news reports, Twitter explained, We have for some time seen the yellow star or yellow badge being used by those seeking to target Jewish people. While the majority of cases were correctly actioned, some accounts highlighted recently were mistakes and have now been restored.

Meanwhile, in Henderson, Parler, a start-up platform pronounced like the word for a sitting room in a bygone era, acted on the truism that when one door closes, another opens.

Aware that critics allege Twitter exercises a heavy hand censoring Jewish users, which Twitter denies, Parler sent out a news release with links to stories about the locked accounts under the heading, Anti-Semitism at Twitter?

The release included a statement by Parler strategic investor Jeffrey Wernick, who said that for him, as a Jew, the Star of David symbolizes my love for Judaism, which does not conflict in any way with my love for my nation and my love for humanity. To designate it, if the allegations are true, as a hateful image, is not only an act of hate, but also likely libelous and slanderous.

Alternative to Twitter

Parler, with its nearly 3 million users signing on since its start in 2018, offers an outside-Silicon Valley alternative for conservatives and activists who feel targeted by Twitter policies to check hate speech and inaccuracies.

Its a suspicion shared by President Donald Trump, who this year found himself on the receiving end of Twitter warnings and fact-checking.

On its homepage, Parler bills itself as an unbiased social platform focused on open dialogue and user engagement. We allow free speech and do not censor ideas, political parties or ideologies. When a reporter created an account, Parler displayed the accounts of famous customers, including a Trump son, GOP members of Congress and Fox News personalities.

Ubiquitous Fox News figure Dan Bongino not only joined Parler, he took an ownership stake in the platform, which he dubs the hottest social media alternative in the market right now. Bongino frequently pops up on where else? Twitter to tell followers to ditch the tech tyrants and sign up with Parler.

Roger Stone, the one-time Trump whisperer, convicted felon and presidential commutation recipient, has an account. Ditto Sen. Ted Cruz, R-Texas and second son Eric Trump.

Parler CEO John Matze recently told C-SPAN that the platforms requirement that users submit a phone number and limits the number of bot accounts and restricts users to one handle, which should cut down on social-media mischief. In an apparent homage to Twitter CEO Jack Dorseys Twitter handle, @Jack, Matze signs on as @John.

Matze says his platform welcomes users from all political persuasions. Some liberals have complained that they tried to join Parler, if only to spar with Trump voters, only to find themselves kicked off. Matze told C-SPAN that his platform has blocked users who posted pornography or images of fecal matter.

Otherwise, Matze said, Parler tries to stay out of ideological pursuits. Weve had these censorship platforms for ten years now, he told C-SPAN, and Id say the countrys only gotten more divided.

Wernick said that he invested in Parler because, I felt that we were going to lose free speech rights in the country. As for Parlers conservative bent, he observed, I like to say, its not a conservative platform by design. Its a conservative platform by consequence.

Anti-Semitism or no?

Wernick told the Review-Journal he did not know for certain that Twitter showed bad faith in locking the Star of David accounts reported by the Campaign Against Anti-Semitism, but he said he is sure Twitter has a double standard that shortchanges Jewish expression.

Campaign Against anti-Semitism Director of Investigations Stephen Silverman didnt buy Twitters explanation. Only one of the accounts locked featured a yellow star, and it very clearly did so as a means of reclaiming the yellow stars used by the Nazis, Silverman said. This is precisely the kind of inept response to anti-Semitism that we have come to expect from Twitter, which just last week tried to convince us that the viral anti-Semitic #JewishPrivilege hashtag was legitimate.

Silverman was referring to an anti-Semitic hashtag campaign which some Jewish users slyly turned into an opportunity to discuss hardships their families had endured.

It seems that Twitter prefers to go after Jewish users who proudly display their identity but not after anti-Semitic users who unabashedly promote anti-Jewish vitriol, Silverman concluded.

In 2018, the Anti-Defamation League found an estimated 4.2 million tweets with anti-Semitic expressions, stereotypes, code words, symbols and conspiracy theories within the previous year.

Boston University Professor Marshall Van Alstyne, who specializes in communications markets, laid out a scenario where Twitter, which claims 330 million active users, could have made an honest mistake made by a programmer that did not anticipate the consequences of picking up patterns.

Purveyors of hate speech might have exhibited a pattern of sharing this content independent of honest, noble and caring citizens also sharing this content, Van Alstyne explained. One was bad, the other was good, and the machine that flagged it wasnt smart enough to distinguish the two. By contrast, if a human made the decision to flag it, then I would be seriously concerned.

Matt Brooks, executive director of the Republican Jewish Coalition, sees a pattern of Twitter accounts that remain active despite a history of anti-Semitic remarks, including Nation of Islam leader Louis Farrakhan, Iran Supreme Leader Ali Khamenei, and Rep. Ilhan Omar, who tweeted that congressional support for Israel was all about the Benjamins.

Cancel culture fight

The fact that they find that people who want to showcase the Star of David in terms of their Jewish heritage and pride as hate speech is ridiculous and its really a crystal ball into the future where if this cancel culture and political correctness run amok is allowed to continue, Brooks said.

For that reason, Brooks added, 2020 will be a contest that pits the right against the progressive left who want to cancel everything and take down the Star of David and take down statues of (George) Washington and Mount Rushmore.

Brooks has been a key player in Trumps effort to increase his share of the Jewish vote which was 24 percent in 2016 even though Jewish support for Republicans fell to 17 percent in 2018.

Will Parler be an influencer in November? Van Alstyne thinks not. For one thing, Parler is just too small with less than four months to go.

And he wonders if Parler eventually could fall into the same trap that ensnared Twitter, which once considered itself the free speech wing of the free speech party.

Its not clear Parler can yet draw the line for less censorship that doesnt cross the line for no censorship when Twitter already tried that. In the future, maybe theyll find a way but in time for the current election, I dont think so.

The Review-Journal is owned by the family of Las Vegas Sands Corp. Chairman and CEO Sheldon Adelson. Adelson is on the board of directors of the Republican Jewish Coalition.

Contact Debra J. Saunders at dsaunders@reviewjournal.com or 202-662-7391. Follow @DebraJSaunders on Twitter.

The rest is here:

Conservative alternative to Twitter based in Henderson - Las Vegas Review-Journal

Yes, TikTok Really Is Spying On You For ChinaNew Report – Forbes

AFP via Getty Images

The relentless pressure on TikTok ramped up further this week, with U.S. Secretary of State Mike Pompeo again claiming user data is sent to to China. Its not possible to have your personal information flow across a Chinese server, he warned during a British media interview, suggesting that data would end up in the hands of the Chinese Communist Party, which he characterized as an evil empire. TikTok is firmly in the sights of the Trump administration, and theyre not letting up.

But now, as TikTok continues to deny U.S. accusations of data mishandling, of it bowing to pressure from Beijing, a new report from the cyber experts at ProtonMail has called those denials into question. Beware, it warns, the social media giant not only collects troves of personal data on you, but also cooperates with the CCP, extending Chinas surveillance and censorship reach beyond its borders.

TikToks world is now dominated by speculation as to whether the U.S. will find some way to ban the app, cutting access to tens of millions of American users and calling a halt to TikToks soaraway growth. The week had started with confirmation of a ban on federal employees installing the app on government-issued devices, seen by many as a precursor to some form of wider action by the Trump administration. We also now know how such a ban would operateTikTok would be added to a Commerce Department entity list, in the same way Huawei has been sanctioned.

With every week that goes by, it is becoming ever more critical to remind ourselves of what we know and what we dont know. Yes, TikTok is a potential threat to the west, in as much as it is a Chinese-owned app now installed on hundreds of millions of devices. In a world where Facebook data has allegedly facilitated so much damage to political processes, so much manipulation and disinformation, to assume that TikTok doesnt carry any serious threat is woefully naive.

But, that said, allegations of data exfiltration and spying are technical, they are binary, they can be proven one way or the other. And this is where the rhetoric meets a reality test. For all the talk, there is no solid proof that TikTok sends any data to China, there is no solid proof that any information is pulled from users devices over and above the prying data grabs typical of all social media platforms.

When TikTok is asked about claims to the contrary, it stands by the lack of proof, the missing smoking gun. Theres no evidence, it says, its a political campaign steeped in the standoff between Washington and Beijing. There's a lot of misinformation about TikTok out there, the company tells me, pointing to its U.S. CEO and its CISO with decades of U.S. military and law enforcement experience, and a U.S. team that works diligently to develop a best-in-class security infrastructure. The company also reassures that U.S. data never travels to China.

But the warning this week from the cyber security analysts at ProtonMail isnt political point scoringthese are ex-CERN security engineers. TikToks zealous data collection, the company warns, its use of Chinese infrastructure, and its parent companys close ties to the Chinese Communist Party make it a perfect tool for massive surveillance and data collection by the Chinese government.

ProtonMail says that it reviewed TikToks data collection policies, lawsuits, cybersecurity white papers, past security vulnerabilities, and its privacy policy, and concluded that we find TikTok to be a grave privacy threat that likely shares data with the Chinese government.We recommend everyone approach TikTok with great caution, especially if your threat model includes the questionable use of your personal data or Chinese government surveillance.

ProtonMail also cites a white paper published by Penetrum earlier this year, which warned that 37.70% of the known IP addresses linked to TikTok are Chinese, and which described the excessive amount of data harvesting, vulnerabilities in TikToks code, as well as a few things that may make you feel pretty uncomfortable.

TikTok stands by its defense, telling me millions of American families use TikTok for entertainment and creative expression, which we recognize is not what federal government devices are for. Our American CEO, our CISO... our entire and growing U.S. teamwhich has tripled since the start of the yearhave no higher priority than promoting a safe app experience that protects our users' privacy. That's our focus.

ProtonMails conclusion on TikTok is pretty stark: The fact that TikTok is owned by a Chinese company, one that has explicitly said it would deepen its cooperation with the Chinese Communist Party, makes this excessive data collection even more concerning. The Chinese government has a history of strong-arming and co-opting Chinese tech companies into sharing their data and then using this data to intimidate, threaten, censor, or engage in human rights abuses.

The Swiss-based company goes on to warn TikTok users that from a security and privacy standpoint,TikTok is an extremely dangerous social media platform. Its potential for mass collection of data from hundreds of millions of adults, teenagers, and children poses a grave risk to privacy. And its advice to those users is to proceed with great caution... and and if this concerns you, you should strongly considerdeleting TikTokand its associated data.

And so another week ends, and TikTok remains caught in this maelstrom of security controversy and Sino-American politics. A ban or sanctions of some sort seem ever more likely with each passing week, and the U.S. rhetoric has found an audience with other hawkish politicians around the world. As things stand, TikTok owner ByeDance has gone from topping the social media world to contemplating a sale of its prize asset to U.S. investors in just a few short weeks.

The real issue for TikTok, though, is that there doesnt need to be a smoking security gun for the U.S. and its allies to have a credible excuse to sanction and restrict the platform. China is an adversarial state to the U.S., the U.K. and their allies. There are reasons to believe Beijing could exert influence over TikTok parent ByteDance. That should be reason enough to actand its looking ever more likely it will be.

See the article here:

Yes, TikTok Really Is Spying On You For ChinaNew Report - Forbes

The ‘Primary Subsource’s’ Guide To Russiagate, As Told To The FBI – The Federalist

Much of the Crossfire Hurricane investigation into Donald Trump was built on the premise that Christopher Steele and his dossier were to be believed. This, even though early on Steeles claims failed to bear scrutiny. Just how far off the claims were became clear when the FBI interviewed Steeles Primary Subsource over three days beginning on Feb. 9, 2017. Notes taken by FBI agents of those interviews were released by the Senate Judiciary Committee Friday afternoon.

The Primary Subsource was in reality Steeles sole source, a longtime Russian-speaking contractor for the former British spys company, Orbis Business Intelligence. In turn, the Primary Subsource had a group of friends in Russia. All of their names remain redacted. From the FBI interviews, it becomes clear that the Primary Subsource and his friends peddled warmed-over rumors and laughable gossip that Steele dressed up as formal intelligence memos.

Steeles operation didnt rely on great expertise, to judge from the Primary Subsources account. He described to the FBI the instructions Steele had given him sometime in the spring of 2016 regarding Paul Manafort: Do you know [about] Manafort? Find out about Manaforts dealings with Ukraine, his dealings with other countries, and any corrupt schemes. The Primary Subsource admitted to the FBI that he was clueless about who Manafort was, and that this was a strange task to have been given.

The Primary Subsource said at first that maybe he had asked some of his friends in Russia he didnt have a network of sources, according to his lawyer, but instead just a social circle. And a boozy one at that: When the Primary Subsource would get together with his old friend Source 4, the two would drink heavily. But his social circle was no help with the Manafort question, and so the Primary Subsource scrounged up a few old news clippings about Manafort and fed them back to Steele.

Also in his social circle was Primary Subsources friend Source 2, a character who was always on the make. He often tries to monetize his relationship with [the Primary Subsource], suggesting that the two of them should try and do projects together for money, the Primary Subsource told the FBI (a caution that the Primary Subsource would repeat again and again.) It was Source 2 who told [the Primary Subsource] that there was compromising material on Trump.

And then there was Source 3, a very special friend. She would borrow money from the Primary Subsource that he didnt expect to be paid back. She stayed with him when visiting the United States. The Primary Subsource told the FBI that in the midst of their conversations about Trump, they would also talk about a private subject. (The FBI agents, for all their hardnosed reputation, were too delicate to intrude by asking what that private subject was).

One day, Steele told his lead contractor to get dirt on five individuals. By the time he got around to it, the Primary Subsource had forgotten two of the names, but seemed to recall Carter Page, Paul Manafort, and Trump lawyer Michael Cohen. The Primary Subsource said he asked his special friend Source 3 if she knew any of them. At first she didnt. But within minutes, she seemed to recall having heard of Cohen, according to the FBI notes. Indeed, before long, it came back to her that she had heard Cohen and three henchmen had gone to Prague to meet with Russians.

Source 3 kept spinning yarns about Michael Cohen in Prague. For example, she claimed Cohen was delivering deniable cash payments to hackers. But come to think of it, the Primary Subsource was not sure if Source 3 was brainstorming here, the FBI notes say.

The Steele dossier would end up having authoritative-sounding reports of hackers who had been recruited under duress by the FSB the Russian security service and how they had been using botnets and porn traffic to transmit viruses, plant bugs, steal data and conduct altering operations against the Democratic Party. What exactly, the FBI asked the subject, were altering operations? The Primary Subsource wouldnt be much help there, as he told the FBI that his understanding of this topic (i.e. cyber) was zero. But what about his girlfriend whom he had known since they were in eighth grade together? The Primary Subsource admitted to the FBI that Source 3 is not an IT specialist herself.

And then there was Source 6. Or at least the Primary Subsource thinks it was Source 6.

While he was doing his research on Manafort, the Primary Subsource met a U.S. journalist at a Thai restaurant. The Primary Subsource didnt want to ask revealing questions but managed to go so far as to ask, Do you [redacted] know anyone who can talk about all of this Trump/Manafort stuff, or Trump and Russia? According to the FBI notes, the journalist told the Primary Subsource that he was skeptical and nothing substantive had turned up. But the journalist put the Primary Subsource in touch with a colleague who in turn gave him an email of this guy journalist two had interviewed and that he should talk to.

With the email address of this guy in hand, the Primary Subsource sent him a message in either June or July 2016. Some weeks later, the Primary Subsource received a telephone call from an unidentified Russia guy. He thought but had no evidence that the mystery Russian guy was that guy. The mystery caller never identified himself. The Primary Subsource labeled the anonymous caller Source 6. The Primary Subsource and Source 6 talked for a total of about 10 minutes. During that brief conversation, they spoke about the Primary Subsource traveling to meet the anonymous caller, but the hook-up never happened.

Nonetheless, the Primary Subsource labeled the unknown Russian voice Source 6 and gave Christopher Steele the rundown on their brief conversation how they had a general discussion about Trump and the Kremlin and that it was an ongoing relationship. For use in the dossier, Steele named the voice Source E.

When Steele was done putting this utterly unsourced claim into the style of the dossier, heres how the mystery call from the unknown guy was presented: Speaking in confidence to a compatriot in late July 2016, Source E, an ethnic Russian close associate of Republican US presidential candidate Donald TRUMP, admitted that there was a well-developed conspiracy of co-operation between them and the Russian leadership. Steele writes, Inter alia, yes, he really does deploy the Latin formulation for among other things Source E acknowledged that the Russian regime had been behind the recent leak of embarrassing e-mail messages, emanating from the Democratic National Committee [DNC], to the WikiLeaks platform.

All that and more is presented as the testimony of a close associate of Trump, when it was just the disembodied voice of an unknown guy.

Perhaps even more perplexing is that the FBI interviewers, knowing that Source E was just an anonymous caller, didnt compare that admission to the fantastical Steele bluster and declare the dossier a fabrication on the spot.

But perhaps it might be argued that Christopher Steele was bringing crack investigative skills of his own to bear. For something as rich in detail and powerful in effect as the dossier, Steele must have been researching these questions himself as well, using his hard-earned spy savvy to pry closely held secrets away from the Russians. Or at the very least, he must have relied on a team of intelligence operatives who could have gone far beyond the obvious limitations of the Primary Subsource and his group of drinking buddies.

But no. As we learned in December from Inspector General Michael Horowitz, Steele was not the originating source of any of the factual information in his reporting. Steele, the IG reported, relied on a primary sub-source (Primary Sub- source) for information, and this Primary Sub-source used a network of [further] sub-sources to gather the information that was relayed to Steele. The inspector generals report noted that neither Steele nor the Primary Sub-source had direct access to the information being reported.

One might, by now, harbor some skepticism about the dossier. One might even be inclined to doubt the story that Trump was into water sports as the Primary Subsource so delicately described the tale of Trump and Moscow prostitutes. But in this account, there was an effort, however feeble, to nail down the rumor and speculation that Trump engaged in unorthodox sexual activity at the Ritz.

While the Primary Subsource admitted to the FBI he had not been able to confirm the story, Source 2 (who will be remembered as the hustler always looking for a lucrative score) supposedly asked a hotel manager about Trump, and the manager said that with celebrities, one never knows what theyre doing. One never knows not exactly a robust proof of something that smacks of urban myth. But the Primary Subsource makes the best of it, declaring that at least it wasnt a denial.

If there was any denial going on, it was the FBIs, an agency in denial that its extraordinary investigation was crumbling.

This article by Eric Felten was originally published by RealClearInvestigations.

Here is the original post:
The 'Primary Subsource's' Guide To Russiagate, As Told To The FBI - The Federalist

Machine Learning in Healthcare Market: Technological Advancement & Growth Analysis with Forecast to 2025 – Owned

Market Study Report provides a detailed overview of Machine Learning in Healthcare Industry market with respect to the pivotal drivers influencing the revenue graph of this business sphere. The current trends of Machine Learning in Healthcare Industry market in conjunction with the geographical landscape, demand spectrum, remuneration scale, and growth graph of this vertical have also been included in this report.

The Machine Learning in Healthcare Industry market report provides a granular assessment pertaining to the key development trends and dynamics impacting this industry landscape over the analysis timeframe. It offers significant inputs with respect to the regulatory outlook as well as geographical landscape of this business space. The study also elaborates on the factors that are positively influencing the overall market growth and encloses a detailed SWOT analysis. Additionally, the document comprises of limitations & challenges impacting the future remuneration and y-o-y growth rate of this market.

Request a sample Report of Machine Learning in Healthcare Industry Market at:https://www.marketstudyreport.com/request-a-sample/2803215

The report offers an in-depth analysis of the competitive landscape alongside raw materials and downstream buyers of Machine Learning in Healthcare Industry market. Moreover, the study assesses the effect of COVID-19 pandemic on the growth opportunities of this industry vertical.

Expanding on the regional analysis of the Machine Learning in Healthcare Industry market:

Elaborating on the competitive landscape of Machine Learning in Healthcare Industry market:

Ask for Discount on Machine Learning in Healthcare Industry Market Report at:https://www.marketstudyreport.com/check-for-discount/2803215

Other details enlisted in the Machine Learning in Healthcare Industry market report:

The report answers important questions that companies may have when operating in the global Machine Learning in Healthcare Industry market. Some of the questions are given below:

For More Details On this Report: https://www.marketstudyreport.com/reports/covid-19-outbreak-global-machine-learning-in-healthcare-industry-market-report-development-trends-threats-opportunities-and-competitive-landscape-in-2020

Related Reports:

1. COVID-19 Outbreak-Global Carbon Offset or Carbon Credit Trading Service Industry Market Report-Development Trends, Threats, Opportunities and Competitive Landscape in 2020Read More: https://www.marketstudyreport.com/reports/covid-19-outbreak-global-carbon-offset-or-carbon-credit-trading-service-industry-market-report-development-trends-threats-opportunities-and-competitive-landscape-in-2020

2. COVID-19 Outbreak-Global Residential Luxury Interior Design Industry Market Report-Development Trends, Threats, Opportunities and Competitive Landscape in 2020Read More: https://www.marketstudyreport.com/reports/covid-19-outbreak-global-residential-luxury-interior-design-industry-market-report-development-trends-threats-opportunities-and-competitive-landscape-in-2020

Contact Us:Corporate Sales,Market Study Report LLCPhone: 1-302-273-0910Toll Free: 1-866-764-2150 Email: [emailprotected]

Continued here:
Machine Learning in Healthcare Market: Technological Advancement & Growth Analysis with Forecast to 2025 - Owned