Category: Surveillance

  • The U.S. Intelligence Community (IC) has released its Annual Statistical Transparency Report disclosing the use of national security surveillance laws for the year 2021—and to no one’s surprise it documents the wide-ranging overreach of intelligence agencies and the continued misuse of surveillance authorities to spy on millions of Americans. Specifically, the report chronicles how Section 702, an amendment to the Foreign Intelligence Surveillance Act (FISA), that authorizes the U.S. government to engage in mass surveillance of foreign targets’ communications, is still being abused by the Federal Bureau of Investigation (FBI) to spy on Americans without a warrant.

    Specifically, the report reveals that between December 2020 and November 2021, the FBI queried the data of potentially more than 3,000,000 “U.S. persons” without a warrant.

    The post New Surveillance Transparency Report Documents An Urgent Need For Change appeared first on PopularResistance.Org.

    This post was originally published on PopularResistance.Org.

  • Fourteen Senate Democrats sent a letter to tech firms Wednesday demanding answers to reports about the collection and sale of location data of people who have visited abortion clinics.

    Sen. Elizabeth Warren (D-Massachusetts) led the lawmakers in writing letters to the two firms, expressing concerns about the data as Roe v. Wade faces being overturned by the Supreme Court. If Roe is struck down, over half of states are likely to ban abortion by automatic trigger laws or new legislation.

    “Especially in the wake of the Supreme Court’s leaked draft opinion overturning Roe v. Wade, your company’s sale of such data — to virtually anyone with a credit card — poses serious dangers for all women seeking access to abortion services,” read the letter addressed to SafeGraph, using “women” as shorthand for abortion seekers, who also include trans and nonbinary people.

    The letter was signed by Democratic lawmakers such as Bernie Sanders (I-Vermont), Ed Markey (D-Massachusetts) and Cory Booker (D-New Jersey).

    Earlier this month, Motherboard reported that data firm SafeGraph is selling information about the whereabouts of people who have visited abortion clinics such as Planned Parenthood, including their movement after the visit and how long they stay at the clinic. The publication also found that Placer.ai offered data for sale showing the approximate location of where Planned Parenthood clinic visitors live; it removed the listing for such data after reporters contacted the company for comment.

    Anti-abortion groups have been harassing, attacking and murdering abortion clinic employees, escorts and patients for years. With abortion rights under threat, clinics are prepared for more vicious attacks, especially as far right Republicans seek to place bounties on people involved in reproductive care.

    Such hate groups have already used location data in order to show patients anti-abortion messaging on their phones while they are sitting in Planned Parenthood clinics. Other data, like search engine history for abortion pills, can be tied to personal information like Google accounts. The data also provides access to information on a person’s finances and political views, and emails they send and receive. In a post-Roe world, even data from period tracker apps could be weaponized by anti-abortionists to prosecute someone whose data suggests they may have gotten an abortion.

    Access to the type of data offered by SafeGraph and Placer.ai only puts patients and providers at even more risk, the lawmakers said. “It is difficult to overstate the dangers of SafeGraph’s unsavory business practices,” they wrote.

    SafeGraph has defended its sales of the data, saying that it’s “anonymized,” but the lawmakers said that that defense demonstrates a misunderstanding of the root of the problem.

    “[A]s experts have repeatedly warned, it can be ‘trivially easy’ to link someone’s location data with their real-world identities, especially when datasets are limited to only ‘four or five’ devices in a location,” the lawmakers said. “SafeGraph’s sale of this data presents an ongoing threat to women who have sought abortions and who may seek them in the future.”

    The letters’ signatories asked the companies to provide details about the type of data that it sells about abortion clinic visitors and to pledge to stop selling such data altogether. The letters are part of Democrats’ attempts to protect abortion rights and abortion seekers ahead of the likely end of Roe.

    “Democrats need to use every tool possible to defend Americans’ right to an abortion and protect women’s health,” Warren said in a statement. “With an extremist Supreme Court poised to overturn Roe, I’m calling out data-broker companies for their disturbing practices of selling and transferring the personal information of women visiting abortion clinics, including their cell-phone location data.”

    This post was originally published on Latest – Truthout.

  • First, it was the Customs and Border Protection (CBP) vehicles speeding along on the road in front of our campsite. Then it was the Border Patrol’s all-terrain vehicles moving swiftly on a ridge above us. I was about 10 miles north of the border with Mexico, near Peña Blanca Lake in southern Arizona, camping with my six-year-old son and some other families. Like fire trucks racing to a blaze, the Border Patrol mobilization around me was growing so large I could only imagine an emergency situation developing.

    I started climbing to get a better look and soon found myself alone on a golden hill dotted with alligator junipers and mesquite. Brilliant vermilion flycatchers fluttered between the branches. The road, though, was Border Patrol all the way. Atop the hill opposite mine stood a surveillance tower. Since it loomed over our campsite, I’d been looking at it all weekend. It felt strangely like part of French philosopher Michel Foucault’s panopticon — in other words, I wasn’t sure whether I was being watched or not. But I suspected I was.

    After all, that tower’s cameras could see for seven miles at night and its ground-sweeping radar operated in a 13-mile radius, a capability, one Border Patrol officer told me in 2019, worth “100 agents.” In the term of the trade, the technology was a “force multiplier.” I had first seen that tower freshly built in 2015 after CBP awarded a hefty contract to the Israeli company Elbit Systems. In other words, on top of that hill, I wasn’t just watching some unknown event developing; I was also in the middle of the border-industrial complex.

    During Donald Trump’s years in office, the media focused largely on the former president’s fixation with the giant border wall he was trying to have built, a xenophobic symbol so filled with racism that it was far easier to find people offended by it than towers like this one. From where I stood, the closest stretch of border wall was 10 miles to the south in Nogales, a structure made of 20-foot-high steel bollards and covered with coiled razor wire. (That stretch of wall, in fact, had been built long before Trump took office.)

    What I was now witnessing, however, could be called Biden’s wall. I’m speaking about a modern, high-tech border barrier of a different sort, an increasingly autonomous surveillance apparatus fueled by “public-private partnerships.” The technology for this “virtual wall” had been in the works for years, but the Biden administration has focused on it as if it were a humane alternative to Trump’s project.

    In reality, for the Border Patrol, the “border-wall system,” as it’s called, is equal parts barrier, technology, and personnel. While the Biden administration has ditched the racist justifications that went with it, its officials continue to zealously promote the building of a border-wall system that’s increasingly profitable and ever more like something out of a science-fiction movie.

    As March ended, one week before my camping trip, I saw it up close and personal at the annual Border Security Expo in San Antonio, Texas.

    “Robots That Feel the World”

    The golden chrome robotic dog trotted right up to me on the blue carpet at the convention center hall. At my feet, it looked up as if it were a real dog expecting me to lean over and pet it. According to the Department of Homeland Security’s Science and Technology Directorate, this “dog” will someday patrol our southern border. Its vendor was undoubtedly trying to be cute when he made the dog move its butt back and forth as if wagging its tail (in reality, two thin, black antennae). Behind the vendor was a large sign with the company’s name in giant letters: Ghost Robotics. Below that was “Robots That Feel the World,” a company slogan right out of the dystopian imagination.

    According to its organizers, this was the most well-attended Border Security Expo in its 15-year history. About 200 companies crowded the hall, trying to lure officials from CBP, U.S. Immigration and Customs Enforcement, border sheriffs’ departments, and international border forces into buying their technologies, sensors, robots, detectors, and guns. As I stood staring at that surreal dog, behind me the company Teledyne Flir was showing off its video surveillance system: a giant retractable mast sitting in the bed of a black pickup truck. On the side of the truck were the words “Any Threat. Anywhere.”

    Another company, Saxon Aerospace (its slogan: “Actionable Intelligence, Anytime, Anywhere”), had a slick, white, medium-sized drone on display. One vendor assured me that the drone market had simply exploded in recent years. “Do you know why?” I asked. His reply: “It’s like when a dog eats blood and gets carnivorous.”

    Elsewhere, the red Verizon Frontline mobile command-and-control truck looked like it could keep perfect company with any Border Patrol all-terrain vehicle unit; while Dell, the Texas-based computer firm, displayed its own frontline mobile vehicle, promising that “whether you’re providing critical citizen services, innovating for the next generation, or securing the nation, we bring the right technology… and far-reaching vision to help guide your journey.”

    And don’t forget 3M, which has moved well beyond its most famous product, Scotch tape, to provide “rugged and reliable equipment across DoD [Department of Defense], DoJ [Department of Justice], DHS [Department of Homeland Security], and U.S. state and local agencies.” Top defense contractors like Airbus (with a shiny black helicopter on display in the center of the expo hall) were also present, along with top border contractors like General Dynamics, Lockheed Martin, and Elbit Systems.

    Just the day before the expo opened, the Biden administration put out its fiscal year 2023 budget, which proposed $97.3 billion for the DHS, that agency’s largest in its two-decade history. The Customs and Border Protection part of that, $17.5 billion, would similarly be the most money that agency has ever received, nearly $1.5 billion more than last year. Although Immigration and Customs Enforcement received just a marginal increase, it will still get $8.5 billion. Combine just those two and that $26 billion would be the highest sum ever dedicated to border and immigration enforcement, significantly more than the $20 billion that the Trump administration started out with in 2017. As DHS secretary Alejandro Mayorkas put it, such a budget will help secure our “values.” (And in an ironic sense, at least, how true that is!)

    “Notably,” Mayorkas added, “the budget makes smart investments in technology to keep our borders secure and includes funding that will allow us to process asylum claims more efficiently as we build a safe, orderly, and humane immigration system.”

    What Mayorkas didn’t mention was that his border plans involve ever more contracts doled out to private industry. That’s been the case since 9/11 when money began to pour into border and immigration enforcement, especially after the creation of the Department of Homeland Security in 2002. With ever-growing budgets, the process of privatizing the oversight of our southern border increased significantly during the administration of President George W. Bush. (The first Border Security Expo was, tellingly enough, in 2005.) The process, however, soared in the Obama era. During the first four years of his presidency, 60,405 contracts (including a massive $766 million to weapons-maker Lockheed Martin) were issued to the tune of $15 billion. From 2013 to 2016, another 81,500 contracts were issued for a total of $13.2 billion.

    In other words, despite his wall, it’s a misconception to think that Donald Trump stood alone in his urge to crack down on migration at the border. It’s true, however, that his administration did up the ante by issuing 87,293 border-protection contracts totaling $20.9 billion. For Biden, the tally so far is 10,612 contracts for $8 billion. If he keeps up that pace, he could rack up nearly $24 billion in contracts by the end of his first term, which would leave Trump’s numbers and those of every other recent president in the dust.

    If so, the contracts of the Trump and Biden administrations would total nearly $45 billion, slightly surpassing the $44.3 billion spent on border and immigration enforcement from 1980 to 2002. In the media, border and immigration issues are normally framed in terms of a partisan divide between Democrats and Republicans. While there is certainly some truth to that, there are a surprising number of ways in which both parties have reached a kind of grim border consensus.

    As Maryland Democratic Congressman Dutch Ruppersberger, a member of the House appropriations committee, said ever so beamingly on a screen at that Expo conference, “I have literally put my money where my mouth is, championing funding for fencing, additional Border Patrol agents, and state-of-the-art surveillance equipment.” And as Clint McDonald, a member of the Border Sheriff’s Association, said at its opening panel, the border is “not a red issue, it’s not a blue issue. It’s a red, white, and blue issue.”

    When I asked the Ghost Robotics vendor if his robo-dog had a name, he replied that his daughter “likes to call it Tank.” He then added, “We let our customers name them as they get them.” While we were chatting, a prospective customer asked, “What about weapons mountable?” (That is, could buyers weaponize that dog?) The vendor immediately assured him that they were already working with other companies to make that happen.

    Later, when I asked Border Patrol Chief Raul Ortiz about the surveillance dogs, he downplayed their significance, stressing the media hype around them, and saying that no robo-dogs were yet deployed anywhere on the border. Nonetheless, it was hard not to wander that hall and think, This, much more than a wall, could be our border future. In fact, if the “big, beautiful” wall was the emblem of Donald Trump’s border policy, then for the Biden moment, think robo-dogs.

    Border Security Is Not a “Pipe Dream”

    The night before I stood on that hill in Arizona, I had heard people passing through the campsite where my son and I were sleeping in a tent. Their footsteps were soft and I felt no fear, no danger. That people were coming through should hardly have been a surprise. Enforcement at our southern border has been designed to push such border-crossing migrants into just the sort of desert lands we were camping in, often under the cover of night.

    The remains of at least 8,000 people have been found in those landscapes since the mid-1990s and many more undoubtedly died since thousands of families continue to search for lost loved ones who disappeared in the borderlands. Those soft footsteps I heard could have been from asylum seekers fleeing violence in their lands or facing the disaster of accelerating climate change — wilted crops and flooded fields — or economic dispossession in countries where foreign corporations and local oligarchies rule the day. Or all of that combined.

    For years, I’ve been talking to migrants who crossed isolated and hazardous parts of the Arizona desert to bypass the walls and guns of the Border Patrol.

    I thought of them when, on the last day of that Border Security Expo, I watched Palmer Luckey, the CEO of Anduril, a new border surveillance company, step up to the podium to introduce a panel on “The Digital Transformation of the Border.” The 20-something Luckey, already worth $700 million, had floppy brown hair and wore a Hawaiian shirt, cargo shorts, and flip-flops. He told the audience of border industry and Homeland Security officials that he was wearing shades because of recent laser surgery, not an urge to look cool.

    He did look cool, though, as if he were at the beach. And he does represent the next generation of border tech. Since 2020, his company has received nearly $100 million in contracts from Customs and Border Protection.

    His introduction to the panel, which sounded to me more like a pitch for financing, offered a glimpse of how the border-industrial complex now works. It was like listening to a rehearsal for the lobbying appearances he and his company would undoubtedly make in Congress for the 2023 budget. In 2021, Anduril spent $930,000 lobbying on issues that mattered to its executives. It also gifted political candidates with nearly $2 million in campaign contributions.

    Luckey’s message was: fund me and you’ll create a “durable industrial base,” while ensuring that border security will not be a “pipe dream.” Indeed, in his vision, the new border-surveillance infrastructure he represents will instead be an autonomous “pipeline,” delivering endlessly actionable information and intelligence directly to the cell phones of Border Patrol agents.

    I was thinking about his pitch again as I stood atop that hill watching the border apparatus quickly mobilize. I was, in fact, looking at yet another Border Patrol vehicle driving by when I suddenly heard a mechanical buzzing overhead that made me think a drone might be nearby. At our southern border, the CBP not only operates the sizeable Predator Bs (once used in U.S. military and CIA operations abroad), but small and medium-sized drones.

    I could see nothing in the sky, but something was certainly happening. It was as if I were at the Expo again, but now it was real life. I was, in fact, in the middle of the very surveillance-infrastructure pipeline Luckey had described, where towers talk to each other, signal to drones, to the all-terrain vehicle unit, and to roving Border Patrol cars.

    Then the buzzing sound abruptly stopped as a CBP helicopter lifted into the air, its loud propellers roaring.

    The Real Crisis

    After that dramatic helicopter exit, I wondered if there was indeed a border emergency and finally decided to get in my car and see what I could find out, leaving my son with our friends. As I rounded a corner, I came across Border Patrol agents and vehicles at the side of the road with a large group of people who, I assumed, were migrants. About four individuals had already been put in the back of a green-striped Border Patrol pickup truck, handcuffed and arrested. They had the tired look I knew so well of people who had walked an entire night in an unknown, hazardous landscape, had failed, and were now about to be deported. The agents of the ATV detail were lounging around in their green jumpsuits as their quads idled, as if this were all in a day’s (or night’s) work, which indeed it was.

    I remembered then hearing those footsteps as my son slept soundly and thought: The border is not in crisis. That’s impossible. The border’s inanimate. It’s the people walking through the desert — the ones who crept past us and those in the back of that truck or soon to be put in other trucks like it, arrested so far from home — who are actually in crisis. And it’s a crisis almost beyond the ability of anyone who hasn’t been displaced to imagine. Otherwise, why would they be here in the first place?

    The ongoing border-crisis story is another example of what Uruguayan writer Eduardo Galeano once would have called an “upside down” world, so twisted in its telling that the victim becomes the victimizer and the oppressor, the oppressed. If only there were a way we could turn that story — and how so many in this country think about it — right-side up.

    As I was mulling all of that over, I suddenly noticed the omnipresent “eye” of the Elbit Systems tower “staring” at me again. Its superpower cameras were catching the whole scene. Perhaps its radar had detected this group to begin with. After all, the company’s website says, “From the darkest of nights to the thickest of brush, our border solutions help predict, detect, identify, and classify items of interest.” Not people, mind you, but the handcuffed “items of interest” in the back of that truck.

    As I watched the scene unfold, I remembered a moment at that Expo when a man from the Rio Grande Valley asked a panel of Department of Homeland Security officials a rare and pointed question. Gesturing toward the hall where all the companies were hawking their wares, he wondered why, if there was so much money to be made in border security, “would you even want a solution?”

    The long uncomfortable silence that followed told me all I needed to know about the real border crisis in this country.

    This post was originally published on Latest – Truthout.

  • The scandal of electronic eavesdropping on 65 leaders of the Catalan independence movement by Spain’s National Intelligence Centre shows signs of becoming a long-running soap opera. Dick Nichols reports.

    This post was originally published on Green Left.

  • A New Yorker investigation has exposed that from 2018‒20, at least 65 leading figures in the Catalan government and independence movement had their mobile phones bugged, reports Dick Nichols.

    This post was originally published on Green Left.

  •  

    Janine Jackson interviewed EFF’s Dave Maass about transparency and journalism for the April 22, 2022, episode of CounterSpin. This is a lightly edited transcript.

          CounterSpin220401Maass.mp3

     

    The Foilies 2022

    (image: EFF)

    Janine Jackson: A functioning democracy relies on an informed citizenry. But what you read in a high school textbook, and what you see when you look up from it, are different things. Importantly, transparency—a free flow of information—should be the norm. But it isn’t. That makes even more important the role of journalists who dig out critical information the public needs to hear, whether we know it or not: information we need to challenge the powerful. And it reminds us of the need to protect that role and that ability.

    Our next guest is all about transparency and public knowledge. Dave Maass is director of investigations at Electronic Frontier Foundation, and the prime mover behind the Foilies, a project out of EFF and MuckRock news involving tongue-in-cheek awards given to government agencies and others that thwart the public’s right to access information. He joins us now by phone from Reno, Nevada. Welcome to CounterSpin, Dave Maass.

    Dave Maass: Oh, glad to be here.

    JJ: Some folks, and especially CounterSpin listeners, may know about Sunshine Week, the yearly effort by news organizations to promote and to celebrate open government and access to information. The Foilies are connected to Sunshine Week in a way that’s funny, but kind of “laugh instead of cry” funny, because it’s about everything that matters in our lives and our relationship to power.

    DM: Exactly. I think if you work in a space where you’re filing public records requests, and you’re filing Freedom of Information requests, you have a certain personality where you love the gratification of receiving records, but you also take a little bit of—I mean, you have to laugh at the various ways that government agencies will try to evade giving you that information. And the Foilies are our annual way to provide some solace, through a little bit of humor, to those who file requests, but also to make sure that the people who are using these tricks don’t get away with it, that they are publicly in the light during Sunshine Week.

    JJ: Absolutely, which is what sunshine is all about. So it’s about conveying absurdity at the same time as you’re highlighting these real issues.

    So what, then, for 2021, what are some recent awardees that represent the problems you’re talking about? I know, for example, that Trump and the toilet stuffed with documents was a little too “fish in the barrel” for you. Maybe that’s—maybe that metaphor’s more complicated than I realized. But in other words, you’ve done Trump, and we get that. What are some of the other things that you’re trying to lift up?

    A photo of the only copy of Wu-Tang Clan's Once Upon a Time in Shaolin, revealed through a Freedom of Information request

    A photo of the only copy of Wu-Tang Clan’s Once Upon a Time in Shaolin, revealed through a Freedom of Information request (BuzzFeed, 1/5/22)

    DM: We’ve tried to make sure that we have a range of awards that go to local agencies and national agencies and things that are in the news, as well as things that are kind of pop culture–related. One that, from the very beginning, we knew was going to make it into the Foilies this year was the Wu-Tang Clan–related FOIA request filed by BuzzFeed reporter Jason Leopold. Now, if folks remember, there was a particular pharma bro whose name I can’t really pronounce, it’s gonna be a little embarrassing, but I think his name is Martin Shkreli.

    JJ: Close enough.

    DM: Before he was convicted of federal crimes, he successfully bid to win this Wu-Tang Clan one-of-a-kind, super-amazing album that there would only be one copy. And then he was convicted, and the US Marshals seized it. And in went some FOIA requests to find out more information about this secret Wu-Tang album that was eventually sold by the US Marshals, and the US Marshals refused to release how much money they got for this new Wu-Tang album. And they redacted a bunch of photos, so that we couldn’t see the pictures that they took in order to try to sell this on the open market. So immediately, whenever you can get Wu-Tang Clan in—the Wu-Tang Clan ain’t nothing to F with, unless the F stands for FOIA.

    JJ: Right. I can see why that would grab people, which it totally—it’s absurd. And I, at the same time, and as I know you do, know that some folks would hear that and be like, that’s rich versus rich, and I’ve got nothing to do with that. So let’s take a look at some of the other things. A street-level surveillance taking a picture of your face, and there’s all kinds of stuff that, you don’t need to be Wu-Tang, you don’t need to be Martin Shkreli, it still involves you.

    DM: Right. So the one that I think is probably the most offensive of the year went to a company—now, we often get these out to government agencies, but then sometimes we give these to companies that really tried to chill the public’s access to information.

    So, specifically, the company that we called out is called Clearview AI. This is a facial recognition company that has scraped the internet for photos that you have published online in order to create a database that law enforcement can use to identify you.

    We know that face recognition is racially biased and makes mistakes, can pull people into the criminal justice system. This Clearview system is more offensive than others because it grabs the images that we put on the internet to share with one another to communicate with ourselves, and it uses those against us.

    Now, the only reason that we know Clearview AI exists is because a couple of researchers, named Freddy Martinez and Beryl Lipton, filed public records requests around the country related to it. And Freddy Martinez, specifically, works for an organization called Open the Government, and he also is involved with a local organization called Lucy Parsons Labs in Chicago. And he had found out about Clearview and started filing tons of requests.

    NYT: The Secretive Company That Might End Privacy as We Know It

    New York Times (1/18/20)

    They pass this information on to the New York Times. It became a huge story. You’re seeing attorney generals take action on it. You’re seeing lawsuits over it. You’re seeing them being fined, both in the US and abroad. Huge controversy.

    And so what does Clearview decide to do? It decides to go after Freddy Martinez. So, he had never been involved in a lawsuit with Clearview AI, but Clearview used one of the other lawsuits it’s involved in to file subpoenas to try to get all of the information that Freddy Martinez had gathered, all the journalists he’d spoken with, all the communications with journalists and nonprofit organizations, in a very clear attempt to chill Freddy Martinez’s right to get access to information, and to retaliate against him.

    Now, after public outcry, Clearview withdrew those subpoenas, withdrew those legal requests. But nevertheless, you just know that they, a big company, were trying to bully an everyday researcher.

    JJ: Absolutely. And, you know, you’re describing a critical relationship, which is that open-government advocates, whistleblowers, can pitch, but they do rely on journalists to catch. Folks reveal information at great effort, sometimes at peril, and I can only imagine how disappointing it is to then see journalists dismiss that information, or not run with it, in the way that is so important, and that is so necessary in terms of getting the information out to the public.

    And I just wanted to ask you, with regard to that, I know that as scholar in residence at the Reynolds School of Journalism at the University of Nevada, Reno, you work on something called the Atlas of Surveillance, and you’re very interested in that street-level surveillance that we’re talking about.

    I saw you cited in connection with that project a couple years back, and you said, “If our goal is to keep neck and neck with the growth of the surveillance state, we’d lose”; you can’t keep up with it. The opacity is such that it’s difficult for investigators to keep on track of things like surveillance. And so I just wanted to ask you, what do you see as the goal, not just of that project, but of the project of the Foilies, and projects that are aimed at exposing the barriers that governments put up to transparency? What do you see as the hope of this kind of work?

    Dave Maass

    Dave Maass: “We have to take the victories that are there. And we have to at least try to inform people about what’s going on.”

    DM: We are kind of engaged in what the military would call asymmetrical warfare, where we are part of a small group of nonprofits and advocates up against a huge tech industry, a whole military policing complex, that just dwarfs us in funding and dwarfs us in resources. But nevertheless, by using things at our disposal, particularly transparency, we are able to have such an outsized impact.

    And maybe we’re not able to always result in something that changes everything nationwide. And honestly, with Congress as it is, that, to me, is not even a huge option. To get Congress to pass anything on anything is kind of a lofty notion these days.

    But we are able to have these victories in places like San Francisco and Boston. You’re able to get laws passed, you’re able to get new measures in place, that maybe don’t outlaw certain surveillance technologies, but at least gets some controls in place, or at least put the transparency measures in place that allow us to come back and say, “No, look, the police are abusing this technology, we need to stop it.” And we’ve seen it with face recognition: We started to get a lot of traction with governments moving back on it.

    It is hard to keep up. But I just don’t think giving up the fight is worthwhile. We have to take the victories that are there. And we have to at least try to inform people about what’s going on. And in the process, we’re going to root out corruption, we’re going to find companies like Clearview that are going to get sued for millions and millions and millions of dollars, and are going to have contracts revoked. So I’m still optimistic, even if I’m also pessimistic, if you get what I mean.

    JJ: I understand completely.

    We’ve been speaking with Dave Maass; he’s director of investigations at Electronic Frontier Foundation. You can find their work, including around the Foilies, online at EFF.org. Dave Maass, thank you so much for joining us this week on CounterSpin.

    DM: Thank you.

     

    The post ‘You Have to Laugh at the Ways Agencies Will Evade Giving You Information’ appeared first on FAIR.

    This post was originally published on FAIR.

  • Former Minister of Trade and Industry Monica Mæland visiting Myanmar in 2014. Photo: Trond Viken, Ministry of Trade and Industry

    On 25 March, Telenor announced that the telecom giant had transferred the operational activities of Telenor Myanmar to M1 Group. [see: https://humanrightsdefenders.blog/2021/10/26/norways-telenor-in-myanmar-should-do-more-than-pull-out-it-should-not-hand-sensitive-data-to-the-regime/] In a release following the announcement, the Norwegian Forum for Development and Environment (ForUM) condemns the sale, and Kathrine Sund-Henriksen, ForUM’s general manager calls it a dark day for Telenor and for Norway as a human rights nation.

    ForUM is a network of 50 Norwegian organizations within the development, environment, peace, and human rights with a vision of a democratic and peaceful world based on fair distribution, solidarity, human rights, and sustainability. ForUM writes that together with transferring the operational activities of Telenor Myanmar to M1 Group, Telenor also sells sensitive personal data of 18 million former Telenor customers, and there is an imminent danger that this information will soon be in the hands of the country’s brutal military dictatorship. ForUM is furious at the news that the sale has been completed.

    Ever since the sale was announced last summer, we have worked to prevent it because there is a big risk that the military junta will have access to sensitive personal information and use it to persecute, torture, and kill regime critics. Incredibly, Telenor is going through with a sale that has been criticized by human rights experts, civil society, Myanmar’s government in exile, and even their own employees in the country,” says Kathrine Sund-Henriksen.

    Telenor has admitted that since October last year they have known that the junta uses the M1 Group as an intermediary and that the data will soon end up in the hands of Shwe Byain Phy Group, a local conglomerate with close ties to the junta. Kathrine Sund-Henriksen believes it is only a matter of time before the sale has tragic consequences for human rights activists in the country.

    When metadata is transferred, the junta will be able to know who a user has called, how long the call has lasted, and where the call was made. All of this can be used to expose activist groups operating in secret for the junta. According to the UN, the junta has killed more than 1,600 people and more than 12,000 have been arrested since last year’s coup. Those numbers will continue to increase, and Telenor has given the junta all the information they need to expose human rights defenders,” Kathrine Sund-Henriksen says.

    https://www.forumfor.no/nyheter/2022/forum-for-utvikling-og-miljo-fordommer-salget-av-telenor-myanmar

    This post was originally published on Hans Thoolen on Human Rights Defenders and their awards.

  • ANALYSIS: By Sarah Kendall, The University of Queensland

    This week, the Parliamentary Joint Committee on Intelligence and Security released its much anticipated report on national security threats affecting the higher education and research sector.

    The 171-page report found the sector is a target for foreign powers using “the full set of tools” against Australia, which can undermine our sovereignty and threaten academic freedom.

    It made 27 recommendations to “harden the operating environment to deny adversaries the ability to engage in the national security risks in the sector”.

    The committee’s recommendations, when correctly implemented, will go a long way towards combating the threat of espionage and foreign interference. But they are not enough to protect academic freedom.

    This is because the laws that make espionage and foreign interference a crime could capture legitimate research endeavours.

    National security risks to higher education and research
    The joint committee found there are several national security threats to the higher education and research sector. Most significant are foreign interference against students and staff, espionage and data theft.

    This includes theft via talent recruitment programmes where Australian academics working on sensitive technologies are recruited to work at foreign institutions.

    These threats have been occurring through cyber attacks and human means, including actors working in Australia covertly on behalf of a foreign government.

    Foreign adversaries may target information on research that can be commercialised or used for national gain purposes.

    The kind of information targeted is not limited to military or defence, but includes valuable technologies or information in any domain such as as agriculture, medicine, energy and manufacturing.

    What did the committee recommend?
    The committee stated that “awareness, acknowledgement and genuine proactive measures” are the next steps academic institutions must take to degrade the corrosive effects of these national security risks.

    Of its 27 recommendations, the committee made four “headline” recommendations. These include:

    1. A university-wide campaign of active transparency about the national security risks (overseen by the University Foreign Interference Taskforce)
    2. adherence to the taskforce guidelines by universities. These include having frameworks for managing national security risks and implementing a cybersecurity strategy
    3. introducing training on national security issues for staff and students
    4. guidance for universities on how to implement penalties for foreign interference activities on campus.

    Other recommendations include creation of a mechanism to allow students to anonymously report instances of foreign interference on campus and diversification of the international student population.

    What about academic freedom?
    Espionage makes it a crime to deal with information on behalf of, or to communicate to, a foreign principal (such as a foreign government or a person acting on their behalf). The person may also need to intend to prejudice, or be reckless in prejudicing, Australia’s national security.

    In the context of the espionage and foreign interference offences, “national security” means defence of Australia.

    It also means Australia’s international relations with other countries. “Prejudice” means something more than mere embarrassment.

    So, an academic might intend to prejudice Australia’s national security where they engage in a research project that results in criticism of Australian military or intelligence policies or practices; or catalogues Australian government misconduct in its dealings with other countries.

    Because “foreign principals” are part of the larger global audience, publication of these research results could be an espionage offence.

    The academic may even have committed an offence when teaching students about this research in class (because Australia has a large proportion of international students, some of whom may be acting on behalf of foreign actors), communicating with colleagues working overseas (because foreign public universities could be “foreign principals”), or simply engaging in preliminary research (because it is an offence to do things to prepare for espionage).

    Research
    Even communicating about research with overseas colleagues could fall foul of espionage and foreign interference laws. Image: The Conversation/Shutterstock

    Foreign interference makes it a crime to engage in covert or deceptive conduct on behalf of a foreign principal where the person intends to (or is reckless as to whether they will) influence a political or governmental process, or prejudice Australia’s national security.

    The covert or deceptive nature of the conduct could be in relation to any part of the person’s conduct.

    So, an academic working for a foreign public university (a “foreign principal”, even if the country is one of our allies) may inadvertently commit the crime of foreign interference where they run a research project that involves anonymous survey responses to collect information to advocate for Australian electoral law reform.

    The anonymous nature of the survey may be sufficient for the academic’s conduct to be “covert”.

    Because it is a crime to prepare for foreign interference, the academic may also have committed an offence by simply taking any steps towards publication of the research results (including preliminary research or writing a first draft).

    The kind of research criminalised by the espionage and foreign interference offences may be important public interest research. It may also produce knowledge and ideas that are necessary for the exchange of information which underpins our liberal democracy.

    Criminalising this conduct risks undermining academic freedom and eroding core democratic principles.

    So, how can we protect academic freedom?
    In addition to implementing the recommendations in the report, we must reform our national security crimes to protect academic freedom in Australia. While the committee acknowledged the adequacy of these crimes to mitigate the national security threats against the research sector, it did not consider the overreach of these laws.

    Legitimate research endeavours could be better protected if a “national interest” defence to a charge of espionage or foreign interference were introduced. This would be similar to “public interest” defences and protect conduct done in the national interest.

    “National interest” should be flexible enough so various liberal democratic values — including academic freedom, press freedom, government accountability, and protection of human rights — can be considered alongside national security.

    In the absence of a federal bill of rights, such a defence would go a long way towards ensuring legitimate research is protected and academic freedom in Australia is upheld.The Conversation

    Sarah Kendall is a PhD candidate in law, The University of Queensland. This article is republished from The Conversation under a Creative Commons licence. Read the original article.

    This post was originally published on Asia Pacific Report.

  • A US$1.2 billion contract between Google, Amazon Web Services (AWS) and the Israeli government provides cloud services for the Israeli apartheid state to spy on Palestinians, reports Ramzy Baroud.

    This post was originally published on Green Left.

  • “We are anonymous because we fear retaliation.” This text was part of a letter signed by 500 Google employees last October, in which they decried their company’s direct support for the Israeli government and military.

    In their letter, the signatories protested a $1.2 billion contract between Google, Amazon Web Services (AWS) and the Israeli government which provides cloud services for the Israeli military and government that “allows for further surveillance of and unlawful data collection on Palestinians, and facilitates expansion of Israel’s illegal settlements on Palestinian land”.

    This is called Project Nimbus. The project was announced in 2018 and went into effect in May 2021, in the first week of the Israeli war on besieged Gaza, which killed over 250 Palestinians and wounded many more.

    The Google employees were not only disturbed by the fact that, by entering into this agreement with Israel, their company became directly involved in the Israeli occupation of Palestine, but were equally outraged by the “disturbing pattern of militarization” that saw similar contracts between Google – Amazon, Microsoft and other tech giants – with the US military, Immigration and Customs Enforcement (ICE) and other policing agencies.

    In an article published in The Nation newspaper in June, three respected US academics have revealed the financial component of Amazon’s decision to get involved in such an immoral business, arguing that such military-linked contracts have “become a major source of profit for Amazon.” It is estimated, according to the article, that AWS alone was responsible for 63 percent of Amazon’s profits in 2020.

    The maxim ‘people before profit’ cannot be any more appropriate than in the Palestinian context, and neither Google nor Amazon can claim ignorance. The Israeli occupation of Palestine has been in place for decades, and numerous United Nations resolutions have condemned Israel for its occupation, colonial expansion and violence against Palestinians. If all of that was not enough to wane the enthusiasm of Google and Amazon to engage in projects that specifically aimed at protecting Israel’s ‘national security’ – read: continued occupation of Palestine – a damning report by Israel’s largest human rights group, B’tselem should have served as that wake up call.

    B’tselem declared Israel an apartheid state in January 2021. The international rights group, Human Rights Watch (HRW) followed suit in April, also denouncing the Israeli apartheid state. That was only a few weeks before Project Nimbus was declared. It was as if Google and Amazon were purposely declaring their support of apartheid. The fact that the project was signed during the Israeli war on Gaza speaks volumes about the two tech giants’ complete disregards of international law, human rights and the very freedom of the Palestinian people.

    It gets worse. On March 15, hundreds of Google workers signed a petition protesting the firing of one of their colleagues, Ariel Koren, who was active in generating the October letter in protest of Project Nimbus. Koren was the product marketing manager at Google for Education, and has worked for the company for six years. However, she was the kind of employee who was not welcomed by the likes of Google, as the company is now directly involved with various military and security projects.

    “For me, as a Jewish employee of Google, I feel a deep sense of intense moral responsibility,” she said in a statement last October. “When you work in a company, you have the right to be accountable and responsible for the way that your labor is actually being used,” she added.

    Google quickly retaliated to that seemingly outrageous statement. The following month, her manager “presented her with an ultimatum: move to Brazil or lose her position.” Eventually, she was driven out of the company.

    Koren was not the first Google – or Amazon – employee to be fired for standing up for a good cause, nor would, sadly, be the last. In this age of militarism, surveillance, unwarranted facial recognition and censorship, speaking one’s mind and daring to fight for human rights and other basic freedoms is no longer an option.

    Amazon’s warehouses can be as bad, or even worse, than a typical sweatshop. Last March, and after a brief denial, Amazon apologized for forcing its workers to pee in water bottles – and worse – so that their managers may fulfill their required quotas. The apology followed direct evidence provided by the investigative journalism website, The Intercept. However, the company which stands accused of numerous violations of worker rights – including its engagement in ‘union busting’ – is not expected to reverse course any time soon, especially when so much profits are at stake.

    But profits generated from market monopoly, mistreatment of workers or other misconducts are different from profits generated from contributing directly to war crimes and crimes against humanity. Though human rights violations should be shunned everywhere, regardless of their contexts, Israel’s war on the Palestinian people, now with the direct help of such companies, remains one of the gravest injustices that continues to scar the consciousness of humankind. No amount of Google justification or Amazon rationalization can change the fact that they are facilitating Israeli war crimes in Palestine.

    To be more precise, according to The Nation, the Google-Amazon cloud service will help Israel expand its illegal Jewish settlements by “supporting data for the Israel Land Authority (ILA), the government agency that manages and allocates state land.” These settlements, which are repeatedly condemned by the international community, are built on Palestinian land and are directly linked to the ongoing ethnic cleansing of the Palestinian people.

    According to the Israeli newspaper, Haaretz, Project Nimbus is the “most lucrative tender issued by Israel in recent years.” The Project, which has ignited a “secretive war” involving top Israeli army generals – all vying for a share in the profit – has also whetted the appetite of many other international tech companies, all wanting to be part of Israel’s technology drive, with the ultimate aim of keeping Palestinians entrapped, occupied and oppressed.

    This is precisely why the Palestinian boycott movement is absolutely critical as it targets these international companies, which are migrating to Israel in search for profits. Israel, on the contrary, should be boycotted, not enabled, sanctioned and not rewarded. While profit generation is understandably the main goal of companies like Google and Amazon, this goal can be achieved without necessarily requiring the subjugation of a whole people, who are currently the victims of the world’s last remaining apartheid regime.

    The post The Billion Dollar Deal that Made Google and Amazon Partners in the Israeli Occupation of Palestine first appeared on Dissident Voice.

    This post was originally published on Dissident Voice.

  • China has accused the U.S. of intensifying spying activities in the disputed South China Sea after the U.S. Navy deployed three of its ocean surveillance vessels in the region.

    An aircraft carrier, the USS Abraham Lincoln, also entered the South China Sea on Friday, ahead of the large-scale Philippines-U.S. joint military exercise Balikatan 22.

    Data provided by the ship-tracking website MarineTraffic show the ocean survey ship USNS Bowditch is currently operating in Vietnam’s exclusive economic zone (EEZ), 60 nautical miles east of Danang and about 90 nautical miles south of China’s Hainan Island.

    At the same time, another ocean surveillance vessel, the USNS Effective, is in waters northwest of the Philippines, 250 nautical miles from Scarborough Shoal, which China calls Huangyan Island.

    The third ocean surveillance ship, USNS Loyal, is in the sea east of Taiwan.

    China’s state-run Global Times said they are “spy ships” that carry out reconnaissance in support of anti-submarine warfare against China. They have been in the area since March 17, it said.

    “The U.S. Navy has frequently sent spy vessels near China in recent years, but it is unusual to see so many of them present at the same time,” Global Times said.

    Amid the raging war in Ukraine, the deployment of the ships may serve as an indication of the U.S. commitment in the Indo-Pacific.

    A file photo showing ocean surveillance ship USNS Effective sitting in dry dock at Yokosuka, Japan, Sept. 13, 2007. The ship is currently deployed to the South China Sea. Credit: U.S. Navy
    A file photo showing ocean surveillance ship USNS Effective sitting in dry dock at Yokosuka, Japan, Sept. 13, 2007. The ship is currently deployed to the South China Sea. Credit: U.S. Navy
    ‘Spy ships’

    The USNS Bowditch is a Pathfinder-class survey ship that has often been deployed in the South China Sea. The USNS Effective and USNS Loyal are both Victorious-class ocean surveillance ships.

    The ships measure water conditions and deploy underwater drones that take very detailed measurements of water temperature, salinity, the acoustic environment and the water’s chemical make-up. They also conduct very detailed surveys of the ocean bottom. 

    “The ships’ data can be used to detect submarines and identify ships’ noises, so from China’s perspective they are spy ships,” said Carl Schuster, a retired U.S. Navy captain and former director of operations at the U.S. Pacific Command’s Joint Intelligence Center.

    “China’s survey ships do similar operations so in many ways, China’s description of the American ships provides an insight into how China uses its survey ships,” he said.

    MarineTraffic also shows that a Chinese survey vessel has just been deployed.

    China’s homegrown third-generation, spacecraft-tracking ship Yuanwang-5 is currently in waters east of Taiwan, some 255 nautical miles from the island.

    It’s unclear where the ship, described by the Chinese military as “a backbone in China’s maritime tracking and measuring network,” is heading.

    China has four Yuanwang-class tracking ships in active operation, including Yuanwang-5 which entered service in 2007.

    Some security analysts, like Paul Buchanan at the Auckland, New Zealand-based 36th Parallel Assessments risk consultancy, say the Yuanwang-class ships are “dual-platform spy ships.”

    Buchanan has previously been quoted by the NZ Herald as saying the ships are used for intelligence collection and tracking satellites. He said 60 to 70 per cent of their work is looking for other people’s signals and 30 per cent is the satellite work. Buchanan also said the U.S. and China use their signals collection ships partly to track rival submarines.

    In another development, the American expeditionary mobile base USS Miguel Keith entered the South China Sea on March 21, the Beijing-based South China Sea Strategic Situation Probing Initiative (SCSPI), a think tank, said.

    This is the first time the USS Miguel Keith entered the South China Sea since its deployment to the West Pacific in October 2021, the SCSPI said.

    The 90,000-ton ship that can serve as a strategic platform and command center is the second-biggest ship type in the U.S. Navy after aircraft carriers.

    It is unclear if the USS Miguel Keith will join the Balikatan 22 joint exercise between the U.S. and Philippine armies taking place from March 28 to April 8 across the Luzon Strait.

    With over 5,000 U.S. military personnel and 3,800 Filipino soldiers, the U.S. Embassy in Manila said that Balikatan 22 will be “one of the largest-ever iterations of the Philippine-led annual exercise” which this year coincides with the 75th anniversary of U.S.-Philippine security cooperation.


    This content originally appeared on Radio Free Asia and was authored by By RFA Staff.

    This post was originally published on Radio Free.

  • Secret, blanket policy to take mobiles and extract data from them judged unlawful on several fronts

    The Home Office operated an unlawful, secret, blanket policy to seize almost 2,000 mobile phones from asylum seekers arriving in the UK on small boats and then downloaded data from these phones, the high court has ruled.

    The court found that the policy was unlawful on multiple fronts and breached the asylum seekers’ human rights. The judges ruled that there was no parliamentary authority for seizures and data extractions and that the legal power that Home Office officials thought they could use was the wrong one.

    Continue reading…

    This post was originally published on Human rights | The Guardian.

  •  

    WaPo: ‘China will be China’: Why journalists are taking burner phones to the Beijing Olympics

    The Washington Post‘s headline (1/20/22) seems to sum up why Western journalists saw no need to factcheck claims of Chinese cyberespionage at the Beijing Olympics.

    A persistent trope in Western media coverage of China is the claim that Chinese technology is inherently compromised and used as a nefarious tool by Beijing to spy on unwitting foreigners. However, when one actually looks for evidence behind these claims or innuendos, one often finds unsubstantiated speculation.

    Before the 2022 Beijing Winter Olympics began, there was a spate of reports alleging that China could be spying on visiting athletes and journalists. The reports had a sinister tone, implying to Western audiences that China was trying to collect private information for malicious purposes:

    • Quartz (1/20/22): “Beijing Winter Olympics Athletes Have Every Reason to Worry About Their Cybersecurity”
    • BBC (1/18/22): “Winter Olympics: Athletes Advised to Use Burner Phones in Beijing”
    • New York Times (1/18/22): “Security Flaws Seen in China’s Mandatory Olympics App for Athletes”
    • CNN (2/1/22): “FBI Urges Olympic Athletes to Leave Personal Phones at Home Ahead of Beijing Games”
    • Daily Mail (1/31/22): “Over 1,000 Athletes and Coaches Are Using ‘Burner’ Phones at the Winter Olympics Because the Chinese State Has ‘Crazy, Scary’ Spying Tech that Monitors Calls, Reads Texts, Tracks Movements and Can Spot ‘Illegal’ Words in Private Conversations”
    • Washington Post (1/20/22): “‘China Will Be China’: Why Journalists Are Taking Burner Phones to the Beijing Olympics”

    Creating an anaconda

    Yahoo!: China is watching: Olympians go to great lengths to avoid stolen data at 2022 Games

    Yahoo! Sports (2/5/22) closed its article on cyberespionage at the Olympics with an analyst who compared China to an anaconda: “It doesn’t need to bite you. It doesn’t need to spit venom at you. But your behavior will change simply because you know that it exists.”

    Yahoo! Sports (2/5/22) reported on a tech advisory the US Olympic Committee distributed to sports federations that discouraged athletes from bringing their personal smartphones to Beijing. “There should be no expectation of data security or privacy while operating in China,” the advisory warned, a message echoed by other Western national Olympics committees. Yahoo! cited numerous Western officials and cybersecurity experts who claimed that broader fears of Chinese cyberespionage are “absolutely rational,” setting the stage for what Yahoo! called the “Paranoia Olympics.”

    Yahoo! cited a number of Western cybersecurity experts raising concerns for Olympic athletes:

    Their worries stem from a variety of sources, from an alleged technical flaw in an app that all Olympics participants must download to broader anti-China hysteria; from Twitter threads claiming to prove that “all Olympian audio is being collected, analyzed and saved on Chinese servers,” to genuine fears about the Chinese government’s ability and willingness to steal sensitive information and use it.

    Yahoo!’s report cited supposed China experts’ explanation for how the Chinese government doesn’t even need to conduct cyberespionage to deter athletes from causing disturbances:

    It’s a version of what Sinologist Perry Link once termed “The Anaconda in the Chandelier.” It’s a metaphor “used to describe how the Chinese government controls dissent and speech,” explained Neil Thomas, a China analyst at the Eurasia Group. “It basically sits there as a huge anaconda in the chandelier of a room…. It doesn’t need to do anything, this anaconda. It just needs to be there. It doesn’t need to bite you. It doesn’t need to spit venom at you. But your behavior will change simply because you know that it exists.”

    This raises the question: If China merely convincing athletes that it might conduct cyberespionage on them is sufficient to control their behavior, and prevent them from bringing up topics that “might trigger the Chinese government,” then wouldn’t unsubstantiated Western media allegations of a Chinese surveillance program on foreign delegations serve the same function as the supposed Chinese anaconda–regardless of whether such a program exists?

    Citizen Lab’s findings

    DW: DW exclusive: Cybersecurity flaws leave Olympians at risk with Beijing 2022 app

    Deutsche Welle (1/18/22) set the tone for coverage of Citizen Lab’s report on the Beijing Olympics app.

    Is there evidence of a Chinese surveillance program on foreign delegations? Many Western media reports (e.g., BBC, 1/18/22; CBC, 1/18/22; New York Times, 1/18/22) on China’s supposed cyberespionage efforts against foreign delegations to the Olympics can be sourced back to a report by the University of Toronto’s Citizen Lab, a cybersecurity research center best known for identifying government-authorized spyware on phones belonging to human rights activists and journalists, which was first reported by German state media outlet Deutsche Welle (1/18/22).

    DW reported on some of Citizen Lab’s findings, noting that athletes, coaches, reporters and sports officials, as well as local staff, were required to put “personal information” like passport data and flight information, as well as sensitive medical information related to possible Covid-19 symptoms, onto either the My 2022 app used for the Beijing Olympics or the Olympics’ website:

    The app’s SSL certificates—which are supposed to ensure that data traffic is only exchanged between trustworthy devices and servers—are not validated, meaning that the app has a serious encryption vulnerability. As a result, the app could be deceived into connecting with a malicious host, allowing information to be intercepted, or even malicious data to be sent back to the app.

    Citizen Lab researcher Jeffrey Knockel says he found the vulnerability not only regarding health data, but also with other important services in the app. This includes the app service that processes all file attachments as well as transmitted voice audio…. The expert says he also discovered that for some services, data traffic in the app is not encrypted at all. This means that the metadata of the app’s own chat service can easily be read by hackers.

    It also found that the app had an inactivated “censorship keyword list,” a “reporting function that allows users to report other users if they consider a chat message to be dangerous or dubious.” One option that could have been chosen (had the function been turned on) was “‘politically sensitive content,’ a phrase that is typically used in China to describe censored topics.”

    DW reported that Citizen Lab confidentially reported these findings to the Beijing Organizing Committee on December 3, 2021.  Citizen Lab’s cybersecurity experts, the news article said, conducted an audit on January 17 that found that “no changes were made to address the concerns raised over security vulnerabilities and the list of ‘illegal words.’”

    ‘A simpler explanation’

    Citizen Lab screenshots of the My2022 app

    Citizen Lab (1/18/22) found that the My 2022 app’s “widespread lack of security is less likely to be the result of a vast government conspiracy but rather the result of a simpler explanation such as differing priorities for software developers in China.”

    However, when one actually reads the full Citizen Lab report (1/18/22) that DW and other Western media outlets selectively cited, one quickly discovers that this reporting contained significant omissions that made My 2022’s alleged vulnerabilities seem more malicious and deliberate than they were described in the original report.

    For example, Citizen Lab’s report claims that while it’s “reasonable to ask whether the encryption in this app was intentionally sabotaged for surveillance purposes or whether the defect was born of developer negligence,” it also argues that “the case for the Chinese government sabotaging My 2022’s encryption is problematic” for several reasons:

    For instance, the most sensitive information being handled by this app is submitted in health customs forms, but this information is already being directly submitted to the government, and thus there would be little instrumental rationality in the government intercepting their own data, as weaknesses in the encryption of the transmission of this information would only aid other parties. While it is possible that weakness in the encryption of health customs information was collateral damage from the intentional weakening of the encryption of other types of data that the Chinese government would have an interest in intercepting, our prior work suggests that insufficient protection of user data is endemic to the Chinese app ecosystem. While some work has ascribed intentionality to poor software security discovered in Chinese apps, we believe that such a widespread lack of security is less likely to be the result of a vast government conspiracy but rather the result of a simpler explanation, such as differing priorities for software developers in China.

    In other words, Citizen Lab offered plausible reasons for why My 2022’s developers left alleged security vulnerabilities to enhance functionality that have nothing to do with a malicious Chinese government conspiracy to spy on foreign delegations. Citizen Lab also pointed out that the most sensitive information about athletes would already be directly submitted to the Chinese government for Covid containment purposes, so there would be little point in using My 2022 for espionage purposes.

    Ultimately, Citizen Lab concluded:

    While we found glaring and easily discoverable security issues with the way that My 2022 performs encryption, we have also observed similar issues in Chinese-developed Zoom, as well as the most popular Chinese Web browsers. My 2022’s functionality to report other users for “politically sensitive” expression is common in other Chinese apps, and, while we found bundled a list of censorship keyword terms capable of stifling political expression, such lists are near ubiquitous in Chinese chat apps, live streaming apps, mobile games and even open source software. In light of previous work analyzing popular Chinese apps, our findings concerning MY2022 are, while concerning, not surprising.

    Citizen Lab’s arguments and conclusions undermine the conspiratorial tone in Western media coverage, which might be why they were omitted, with the opposite impression conveyed through cherry-picked quotes. Outlets like the CBC (1/18/22), Quartz (1/20/22) and the Washington Post (1/20/22) focused on Citizen Lab’s “worst case scenarios” of all internet traffic potentially being intercepted, warning people to “pack burner digital devices” to evade the “‘devastating flaw’ that could expose users’ medical and passport information.”

    Aside from a few exceptions like the Associated Press (1/18/22), which correctly noted there “was no evidence that the easily discoverable security flaws in the MY2022 app were placed intentionally by the Chinese government,” the Chinese state media outlet CGTN (1/28/22) offered more nuanced reporting, citing the major thrust of Citizen Lab’s conclusions that were omitted from most Western media accounts, where they would have contradicted the lurid narrative.

    ‘Two software patches ago’

    There is one apparent error in Citizen Lab’s report. The group calls My 2022 “an app required to be installed by all attendees to the 2022 Olympic Games,” a claim repeated in Western media reports on My 2022’s alleged vulnerabilities. The link provided leads to a report by Fortune (12/7/22) that states attendees are “mandated to download a health app called ‘My 2022’ to input personal information and health records,” with no source provided to substantiate this claim.

    But the International Olympics Committee (IOC) has directly refuted this claim, noting that it is not mandatory for attendees to download the app, and that the app’s settings can be configured to disable access to “‘files and media, calendar, camera, contacts,’ as well as a user’s location, their phone and their phone’s microphone.” The IOC has also noted that the app has been validated by Apple’s App Store and the Google Play Store, in addition to passing two independent assessments by cybersecurity testing organizations that found “no critical vulnerabilities.”

    NBC: Experts warn Olympics participants: China doesn't need an app to spy

    NBC (2/8/22) debunked the My 2022 scare stories–but still warned Olympians to be afraid.

    Later, in early February, Citizen Lab (NBC, 2/8/22) noted its concerns about My 2022 were addressed “several weeks and two software patches ago,” after the developers reached out after the initial paper was published and sought advice on how to fix the identified problems. All of this indicates that there is no basis for the claim My 2022 was used by the Chinese government to spy on foreign delegations.

    However, NBC argued that “focusing on that single smartphone app is a red herring” in “the context of China’s larger appetite for the personal data of people around the world.” It provided no evidence of China’s alleged appetite for the personal data of people outside its borders, instead relying on resurgent Yellow Peril hysteria in Western countries to suggest that it must be true.

    Another claim about My 2022 that has gone viral on social media, spread by popular podcast host Joe Rogan and Washington Post columnist Josh Rogin, is the allegation that the app constantly records audio on users’ phones. This was debunked by numerous experts, like Will Strafach, the creator of an iPhone app that blocks location trackers, who looked at My 2022’s code and found that there was nothing beyond an overt translation function that could activate the phone’s microphone.

    More evidence-free espionage claims

    Business Insider: Everything you need to know about Huawei, the Chinese tech giant accused of spying that the US just banned from doing business in America

    Business Insider (3/16/19): “The US has upped its fight in the last year against Huawei, which it suspects of spying for the Chinese government and posing a great risk to US national security.”

    The evidence-free allegations promoted by Western media about supposed Chinese cyberespionage at the Olympics fit into a larger pattern of claims that Chinese technology is inherently compromised and engineered to serve as spyware by the Chinese government.

    Numerous headlines alleged that Huawei, a Chinese multinational tech corporation that created the world’s first 5G smartphone, was conducting espionage on behalf of the Chinese government:

    • Forbes (2/26/19): “Huawei Security Scandal: Everything You Need to Know”
    • Fox (2/13/20): “US Accuses Huawei of Spying on Mobile Phone Users”
    • NBC (2/14/20): “US Officials: Using Huawei Tech Opens Door to Chinese Spying, Censorship”
    • Business Insider (3/16/19): “Everything You Need to Know About Huawei, the Chinese Tech Giant Accused of Spying That the US Just Banned From Doing Business in America”

    Huawei had been cleared of accusations of espionage as early as October 2012, after the White House ordered an 18-month review of security risks by suppliers to US telecommunications companies. The inquiry found no evidence that the company was an espionage asset, although predictable concerns about nebulous “security vulnerabilities” were raised (Reuters, 10/17/12).

    In more recent years, Australian officials led the way in getting Western governments like the US to ban Huawei’s technology on national security grounds, after conducting simulations on the offensive espionage potential of 5G technology (Sydney Morning Herald, 5/22/19). However, when one reads past sensationalist headlines and looks for evidence that Huawei is conducting espionage on behalf of the Chinese government, one comes up dry.

    For instance, the Wall Street Journal’s report headlined “US Officials Say Huawei Can Covertly Access Telecom Networks” (2/12/20) cited anonymous US officials claiming that Huawei “can covertly access mobile-phone networks around the world through ‘backdoors’ designed for use by law enforcement.” When one reads further down, however, the Journal admitted that the officials “didn’t provide details of where they believe Huawei is able to do so,” and that they “declined to say” whether the US has observed Huawei taking advantage of these supposed backdoors.

    This is consistent with the US government’s assumption that it doesn’t need to show proof of malicious activity by Huawei; it’s a Chinese company, and therefore could be ordered to install backdoors or share data with the Chinese government, despite denials by both Huawei and the Chinese government of those allegations (Wall Street Journal, 1/23/19). In the absence of evidence, the US government has relied on asking foreign governments to shun Huawei’s technology based on speculative “what if” scenarios (Axios, 1/30/20).

    Critics of baseless US government accusations have argued that it wouldn’t make sense for China to jeopardize their own business interests by spying through Huawei’s technology, because the US and other Western countries are China’s best customers, aside from its domestic market, and it would be catastrophic if espionage were ever discovered (ZDNet, 5/20/19). This might be why Huawei has stated they are willing to sign “no spy” agreements to reassure suspicious governments that there are no backdoors in their technology (BBC, 5/19/19).

    But one doesn’t need to take Huawei or the Chinese government’s word for it, as other Western governments have confirmed there is no evidence for the US government’s allegations. The British National Cyber Security Centre (NCSC) reported that they haven’t seen any evidence of malicious activity by Huawei, contradicting evidence-free US government allegations (Reuters, 2/20/19).

    Although German spy chief Bruno Kahl claimed that Huawei “can’t be fully trusted,” he didn’t cite any evidence of malicious activity by Huawei, and the head of Germany’s IT watchdog (Federal Office for Information Security), Arne Schönbohm, stated they had “no evidence” of Huawei conducting espionage (The Local, 12/16/18). France’s cybersecurity chief, Guillaume Poupard, the head of the national cybersecurity agency ANSSI, stated that “there is no Huawei smoking gun as of today in Europe” (South China Morning Post, 1/31/20).

    ‘Is TikTok Spying on You?’

    CBS: How TikTok could be used for disinformation and espionage

    Because of TikTok, a Heritage Foundation analyst told CBS (11/15/20), if China “were to try and source a human-intelligence asset, well, they know the exact type of legend or profile that they need to have.”

    Other speculative headlines about Chinese cyberespionage revolved around the popular social media app TikTok:

    • Washington Post (7/13/20): “Is it Time to Delete TikTok? A Guide to the Rumors and the Real Privacy Risks.”
    • Forbes (7/25/20): “Is TikTok Spying on You For China?”
    • Bloomberg (5/13/21): “A Push-Up Contest on TikTok Exposed a Great Cyberespionage Threat”
    • CBS (11/15/20): “How TikTok Could Be Used for Disinformation and Espionage”

    Although these headlines suggest that the Chinese government is using the video sharing platform to spy on users, when one actually reads these reports, it becomes apparent that there is no evidence that TikTok takes more data from users than other social media apps like Facebook, or that it shares that data with the Chinese government.

    CBS (11/15/20) cited numerous claims from experts they contacted about how China could potentially  share data with the Chinese government or “push disinformation” through the “For You” page on the app that recommends videos–though it doesn’t mention a single instance where TikTok actually did such those things. Forbes (7/25/20) admitted that despite “all the talk, there is no solid proof that TikTok sends any data to China, there is no solid proof that any information is pulled from users’ devices over and above the prying data grabs typical of all social media platforms.” Although Bloomberg (5/13/21) stated that claims of cyberespionage are difficult to verify, it acknowledged there’s “no publicly available evidence that TikTok has passed American data to Chinese officials.” The Washington Post (7/13/20) concluded that “TikTok doesn’t appear to grab any more personal information than Facebook,” and there is “scant evidence that TikTok is sharing our data with China.”

    Critics of the insinuations used by US government officials to try to ban TikTok on national security grounds have argued that “TikTok is not fundamentally different from other social media platforms,” as DW editor Fabian Schmidt (8/8/20) put it. It is of “no importance in the end who runs the platforms where people choose to put themselves on stage,” Schmidt argued, since the users themselves are “primarily responsible for protecting their own data on social media.”

    However, people need not take TikTok’s word that it is not spying on behalf of the Chinese government, as groups from Citizen Lab to the CIA have concluded that there’s no evidence that Beijing has intercepted data or used the app to access users’ devices (South China Morning Post, 3/23/21; New York Times, 8/7/20).

    These accusations of Chinese hardware and software conducting espionage on foreigners on behalf of the Chinese government are ironic, since there is more evidence of the US government spying on Huawei, and using Huawei’s technology to spy on others, than there is of Huawei spying for the Chinese government. And Washington has been caught inserting secret backdoors on US hardware and embedding software on mobile apps to spy on and keep track of people’s movements, while the NSA spies on Americans and people abroad operating on a “collect it all” ethos (Der Spiegel, 12/29/13; Wall Street Journal, 8/7/20).

    Motives to sully Chinese tech

    Breakthrough News: Why They’re Telling You to Fear China All of a Sudden

    Breakthrough News (10/28/20): “China hysteria has become a weapon of mass distraction for the US political establishment.”

    Journalist Vijay Prashad (Breakthrough News, 10/28/20) has pointed out that the US information war on China has intensified in recent years, as China’s technology industry has either become a peer competitor to or surpassed the US in certain sectors. Huawei once surpassed Apple as the second-largest smartphone maker in 2018, and TikTok is one of the most popular social media apps in the US.

    Similar Yellow Peril propaganda campaigns were waged by the US against Japan in the 1980s, with familiar tropes of alleged unfair trading practices when Americans were anxious regarding Japan’s rising economy as a peer competitor, noting their dominance in exporting technology like cars, computers and semiconductors. Japan’s economy is widely believed to have been sabotaged by the 1985 Plaza Accord Tokyo was pressured to sign by the US.

    Despite racist insinuations that China isn’t capable of innovating and claims that its success stems primarily from stealing intellectual property from the US, China is now in the lead regarding 5G (and potentially 6G mobile technology) and artificial intelligence, and has had a lead over the US in global patent filings since 2019. China’s status as a competitor to the US and emerging leader in the tech industry has even led US Secretary of Commerce Gina Raimondo to say that the US and Europe should work together to “slow down China’s rate of innovation” (CNBC, 9/28/21).

    But whereas other East Asian countries like South Korea and Japan are politically subordinate to the US, in addition to having much smaller economies, China is politically independent of the US, and has already surpassed the US’s GDP when measured in purchasing power parity terms. Western corporate media thus have less incentives to vilify those countries compared to China, since they will not be independent countries capable of rivaling the US anytime soon.

    It is admittedly possible that the Chinese government is lying about not trying to conduct cyberespionage on foreign delegations at the Olympics, or spying on people through Huawei’s technology and social media platforms like TikTok. But Western media insistence on potential cyberespionage hazards are accusations without evidence. The US’s hybrid war on China includes diplomatically isolating it in world events like the Olympics, and unsubstantiated allegations of nebulous security vulnerabilities can be used to smear and sabotage China’s increasingly competitive tech industry as well.

    The post Western Media Took Gold in Evidence-Free Allegations of Chinese Olympic Spying appeared first on FAIR.

    This post was originally published on FAIR.

  • Police form a line as demonstrators gather on April 11, 2021, in Brooklyn Center, Minnesota.

    A new investigation reveals that federal and local law enforcement agencies have been surveilling journalists and activists involved in the protests that followed the murder of George Floyd for over a year under a secretive program known as Operation Safety Net (OSN), despite claiming to have shut the operation down last April.

    Officials announced OSN in February 2021, a month before the trial for former Minneapolis police officer and murderer Derek Chauvin began. Law enforcement officials claimed that the goal of the program was to ensure that the public was able to exercise its right to free speech while making sure that things like business buildings weren’t harmed in the process.

    The program has gathered a vast amount of information on activists and journalists, including pictures and documentation of their locations during the protests moves that are antithetical to the program’s supposed goal of protecting free speech. In April 2021, when Chauvin’s verdict was handed down, OSN stopped posting on social media and officials told the public that the program was stopping after it had received criticism from civil rights advocacy groups and lawmakers like Rep. Ilhan Omar (D-Minnesota).

    But reporters have found that, at least as of February, officials were still surveilling and gathering data on activists and journalists including people who are not suspected of committing a crime under an operation deemed OSN 2.0.

    The program involved nine agencies in Minnesota, 120 officers from out of state and at least 3,000 National Guard soldiers, Tate Ryan-Mosley and Sam Richards detailed in the MIT Technology Review. Federal agencies took part, with at least six FBI agents having aided with the program and the Department of Homeland Security offering its support.

    Customs and Border Protection also helped surveil protesters and the media, lending helicopters to Minneapolis police to monitor the protests at their peak, flying high to avoid detection.

    At the time, police were detaining journalists and uploading information about their location, photographs of their bodies and faces, and press passes into a surveillance tool called Intrepid Reponse. The program provides law enforcement with the geolocations of targets and colleagues, and can act as a sort of database for officials looking to control protesters.

    That information was presumably entered into a watch list of protesters and journalists, which MIT Technology Review obtained. The list, compiled by the Criminal Intelligence Division of the Hennepin County Sheriff’s Office, included photos and identifying information of people arrested by the Minnesota State Patrol.

    Ryan-Mosley and Richards reviewed thousands of documents and conducted dozens of interviews. “Taken together, they reveal how advanced surveillance techniques and technologies employed by the state, sometimes in an extra-legal fashion, have changed the nature of protest in the United States, effectively bringing an end to Americans’ ability to exercise their First Amendment rights anonymously in public spaces,” they wrote.

    Officials claim that the operation isn’t ongoing and that OSN 2.0 doesn’t exist. But the reporters found presentations, emails and intelligence that clearly referred to the operation as OSN 2.0.

    OSN was originally meant to have four phases. The first phase was for planning, the second for protests during jury selection for Chauvin’s trial, and the third for during the closing arguments and verdict. But law enforcement ended up starting phase three a week before closing arguments, and began using the planned “full deployment of law enforcement and the national guard” during this time. Officers used tear gas, rubber bullets, pepper spray, and more.

    Further, when officials announced that OSN was in phase four in April 2021, which was meant to wind the program down, the program seemed to be still ongoing. The investigation found that the program still appears to be surveilling protests in reaction to police killing 22-year-old Amir Locke after executing a no-knock warrant last month.

    “The events in Minnesota have ushered in a new era of protest policing,” Ryan-Mosley and Richards wrote. “Protests that were intended to call attention to the injustices committed by police effectively served as an opportunity for those police forces to consolidate power, bolster their inventories, solidify relationships with federal forces, and update their technology and training to achieve a far more powerful, interconnected surveillance apparatus.”

    While the findings of this investigation are chilling, it lines up with anecdotal and data-driven evidence that police and the government are averse to allowing left-wing protesters to demonstrate and exercise their First Amendment rights. For instance, research has shown that police are 3.5 times more likely to use force against left-wing protesters than against right-wing protesters. Meanwhile, lawmakers across the country have introduced and passed bills limiting protesters’ rights in reaction to 2020’s uprisings.

    In response to the investigation, Rep. Alexandria Ocasio-Cortez (D-New York) criticized lawmakers who have been calling for increased funding for law enforcement. “Shout out to everyone working to explode funding for surveillance programs like these across the country under the guise of ‘fund the police’ when in fact police budgets are already at some of their highest levels in US history across the country,” she said on Thursday. “No facts, just vibes.”

    This post was originally published on Latest – Truthout.

  • This year marks the seventieth anniversary of the theologian Paul Tillich’s famous book, The Courage to Be.  Widely read in the days when an educated public read books, it is long forgotten.  In it, Tillich surveys the history of anxiety and fear and their relation to courage, religious faith, and the meaning of life.  His closing sentence – “The courage to be is rooted in the God who appears when God has disappeared in the anxiety of doubt” – became acclaimed as an astute description of the existential need to find a foundation for faith and courage when their foundations were shaking.

    His writing profoundly influenced many, even when they didn’t wholly agree with him.  This included Dr. Martin Luther King, Jr., who, commenting on Tillich’s death in 1965, said, “His Christian existentialism gave us a system of meaning and purpose for our lives in an age when war and doubt seriously threatened all that we had come to hold dear.”

    I mention The Courage to Be not to engage in a recondite theological and philosophical analysis, which is the last thing we now need, but to contrast his call for spiritual courage with what we have been experiencing pouring forth from the mass corporate media for years  There is a drumbeat of fear-mongering so intense and constant that it is almost comical if it weren’t so effective in reducing people to quaking, frightened children.

    Primarily about Covid and the need to obey the authorities and submit to being jabbed with mRNA Covid “Vaccines” – the idolatrous religion of bio-security – this  religion of fear goes much further and much deeper.  Scenarios of fear have been rehearsed and produced for decades by the intelligence/IT/media giants on a multitude of issues, large and small.  They are rooted in a spiritually nihilistic political propaganda campaign that is exponentially increasing fear, anxiety, and despondency on a vast scale, which is its intent.  Fearful people are easily cowered and controlled.  The elites know that regular people throughout the world are fed up with being subjected to violence and abuse in multiple forms, and if courage triumphs over their fears, they might join in worldwide solidarity and revolt, as they have been doing in various places recently. To prevent this, the authorities must use terror tactics to divide and conquer them. If people dare to rise up and even question the propaganda, they have been and will be called terrorists for doing so.  Dissent is now equated with terrorism and thus it must be censored.

    All this fear-mongering draws on people’s normal fears of “not to be,” meaning dead. It is, of course, understandable not wanting to be dead, but living in constant fear is a living death.  Tillich, who suffered deep trauma as a chaplain in the trenches of WW I and was later dismissed from his teaching position in Germany when Hitler came to power, wrote that courage is rooted in the spiritual acceptance that underlying our individual lives is the power of Being, by which he meant God, and that fear and anxiety about our fates can be confronted only through the courage to accept in faith this foundational reality.

    I think it is self-evident to anyone who glances at the mainstream media that fear is their staple.  In just the last week or so, I have seen The New York Times, an official organ of propaganda if there ever were one but known historically as the Grey Lady for understatement, tell its readers in a hyperventilating style that anxiety about climate change has spawned a growing field of therapeutic treatment for sufferers, how deer in your back yard are infected with Omicron, how the Russians are coming, etc.  This is the typical fear promoting propaganda that headlines all the media sites every day and has been doing so for years.  Any casual observer can list them on a daily basis, from major to minor matters to fear.

    Yet despite this constant, blatant propaganda, governments flip the truth and warn that anyone who questions this are conspiracy theorists intent on causing trouble and therefore must be watched and refuted. Just the other day the U.S. Department of Homeland Security issued a “Summary of Terrorism Threat to the U.S. Homeland,” saying:

    The United States remains in a heightened threat environment fueled by several factors, including an online environment filled with false or misleading narratives and conspiracy theories, and other forms of mis- dis- and mal-information (MDM) introduced and/or amplified by foreign and domestic threat actors.

    After twenty years of such obvious propaganda, you would think these people would be embarrassed, but they obviously are not and intend to propagate this bullshit for years to come.  They and their media accomplices have taken their lingo lessons straight from Nineteen Eighty-Four.

    On the bio-security religious front alone, Kit Knightly of Off-Guardian has recently reported that the authorities have warned us that there is a vast underdiagnosis of heart disease that may stealthily be coming to get us (not from “vaccines,” of course) and that HIV testing and vaccines look to be the next big push, for there is now the claim that a new variant of HIV is spreading in Europe.  President Biden declared in December 2021 that his administration was aiming to “end the HIV/Aids epidemic by 2030.”  While Covid restrictions may be easing, the mRNA “vaccine push” is not, and their promoters will only find different germs to defeat with “vaccines” and tests to ease the fears of the propagandized public, so many of whom have been turned into hypochondriacs.

    The promulgation of the fear of germs and disease and foreign and domestic “threat actors” is permanent.  For anyone naively thinking that there will be an easing of this elite war of lies, I would suggest they rethink that assumption.  The state of siege that is the Covid crisis will be followed by many more, and this germ warfare includes a vast array of foreign variants, led by Russia and China.  We are in a permanent crisis and emergency engineered by the ruling classes to maintain their control.

    This elite war against regular people has no end in sight.  The elites know that people get worn down over time and lose hope; thus, they plan for the long haul and keep hammering away.  Paul Tillich’s book is important because of its stress on the need for courage in the face of the fear-mongering.  Without a spiritual foundation to sustain one for the long haul, depression will lead to despair or surrender.  History should teach us this. The evil ones often win, at least in the short run, and each of us doesn’t have a long run.  Our time is brief.

    The great dissenters and rebels of the past, even when not overtly religious, kept faith with their comrades and causes because they felt a deep, unbreakable, invincible connection.  It is called different names or none at all.  Maybe faith is the best word.  Faith in what?  Some call it God, as I do. Words can’t explain it; I feel it. Others say nothing and just carry on, sustained by the invisible. Some call it faith in human solidarity.  The names don’t matter.  It is not about naming but experiencing. The poet D.H. Lawrence said wisely that we are transmitters of life, “and when we fail to transmit life, life fails to flow through us.”  And he added in his inimitable style: “It is a fearful thing to fall into the hands of the living God.  But it is a much more fearful thing to fall out of them.”  It is not easy, but fear helps us fall out.

    There were those who called Tillich an atheist because his philosophical explanation sounded too abstruse, which is true.  But he made a fundamental point about how as human beings we participate in Being, which is the ground of our existence.  We are part of something that is far larger than our puny selves –  beings in the sea of Being.  Who can deny that?  His call to courage hit a resonant cord with believers, agnostics, and atheists alike.  Not a poet but a German trained immigrant scholar who emigrated to the U.S.A., his language was steeped in heavy philosophical verbiage, yet it found a wide audience in its analysis of fear, anxiety, and especially courage because it was about fundamental truths.  Courage is fundamental, as is faith.

    The Spanish poet Antonio Machado put it less philosophically and more elegantly:

    I talk always to the man who walks along with me;
    – men who talk to themselves hope to talk to God
    Someday –
    My soliloquies amount to discussions with this friend,
    Who taught me the secret of loving human beings.
    ….
    And when the day arrives for the last leaving of all,
    And the ship that never returns to port is ready to go,
    You’ll find me on board, light, with few belongings,
    Almost naked like the children of the sea.

    We are children of the sea and courage keeps us afloat.

    Humor also helps, for we are funny creatures.

    It is not often that one escapes an unintended assassination attempt.  I am glad to say that I have.

    This is an example of the power of fear. Where I live, the winter has been quite cold and there was a recent ice storm with thick ice everywhere on top of snow.  My wife was fearful of falling and so had bought hiking poles for herself and me as Christmas gifts.  I said I didn’t want them and wouldn’t use them; that I wasn’t afraid, that I had faith in my ability to sustain myself.  So I didn’t use them, which angered her.  One day when the ice in the driveway and on the car was inches thick, she cajoled me into using the sticks to reach the car.  She set them for me with their clips at the proper height, since they are adjustable.  We toddled down the pathway to the car, setting one pole out ahead of the other in turn.  I exaggerated my need for them, bending far over as if I were in great need of the crutches.  Approaching the driveway, I extended my right hand pole out in front and it collapsed because the clips weren’t set tight and I went flying face forward onto the ice.  She looked at me in fear, not sure if I was dead or hurt or if her fear had made her into an accidental assassin.  She needn’t worry.  It was funny.

    We all fall eventually, but in the meantime, worrying about it is self-defeating.  It is a reaction to fear.  Worrying is a form of preying on oneself (etymology: to seize by the throat with one’s teeth and kill), and it can be induced – and is – by the campaigns of fear that we are being subjected to.

    The courage to be was Tillich’s way of saying that we are upheld by far more than we know.  Call it Being, Tao, the Great Spirit, or God.  Courage is contagious and will carry us on.  It is what we need to resist the fear-mongers who are at our throats.

    The post The Fear Not to Be first appeared on Dissident Voice.

    This post was originally published on Dissident Voice.

  • The illusion of freedom will continue as long as it’s profitable to continue the illusion. At the point where the illusion becomes too expensive to maintain, they will just take down the scenery, they will pull back the curtains, they will move the tables and chairs out of the way and you will see the brick wall at the back of the theater.

    — Frank Zappa, Interview with Jim Ladd, “Zappa On Air,” April 1977.

    We are no longer free.

    We are living in a world carefully crafted to resemble a representative democracy, but it’s an illusion.

    We think we have the freedom to elect our leaders, but we’re only allowed to participate in the reassurance ritual of voting. There can be no true electoral choice or real representation when we’re limited in our options to one of two candidates culled from two parties that both march in lockstep with the Deep State and answer to an oligarchic elite.

    We think we have freedom of speech, but we’re only as free to speak as the government and its corporate partners allow.

    We think we have the right to freely exercise our religious beliefs, but those rights are quickly overruled if and when they conflict with the government’s priorities, whether it’s COVID-19 mandates or societal values about gender equality, sex and marriage.

    We think we have the freedom to go where we want and move about freely, but at every turn, we’re hemmed in by laws, fines and penalties that regulate and restrict our autonomy, and surveillance cameras that monitor our movements. Punitive programs strip citizens of their passports and right to travel over unpaid taxes.

    We think we have property interests in our homes and our bodies, but there can be no such freedom when the government can seize your property, raid your home, and dictate what you do with your bodies.

    We think we have the freedom to defend ourselves against outside threats, but there is no right to self-defense against militarized police who are authorized to probe, poke, pinch, taser, search, seize, strip and generally manhandle anyone they see fit in almost any circumstance, and granted immunity from accountability with the general blessing of the courts. Certainly, there can be no right to gun ownership in the face of red flag gun laws which allow the police to remove guns from people merely suspected of being threats.

    We think we have the right to an assumption of innocence until we are proven guilty, but that burden of proof has been turned on its head by a surveillance state that renders us all suspects and over-criminalization which renders us all lawbreakers. Police-run facial recognition software that mistakenly labels law-abiding citizens as criminals. A social credit system (similar to China’s) that rewards behavior deemed “acceptable” and punishes behavior the government and its corporate allies find offensive, illegal or inappropriate.

    We think we have the right to due process, but that assurance of justice has been stripped of its power by a judicial system hardwired to act as judge, jury and jailer, leaving us with little recourse for appeal. A perfect example of this rush to judgment can be found in the proliferation of profit-driven speed and red light cameras that do little for safety while padding the pockets of government agencies.

    We have been saddled with a government that pays lip service to the nation’s freedom principles while working overtime to shred the Constitution.

    By gradually whittling away at our freedoms—free speech, assembly, due process, privacy, etc.—the government has, in effect, liberated itself from its contractual agreement to respect the constitutional rights of the citizenry while resetting the calendar back to a time when we had no Bill of Rights to protect us from the long arm of the government.

    Aided and abetted by the legislatures, the courts and Corporate America, the government has been busily rewriting the contract (a.k.a. the Constitution) that establishes the citizenry as the masters and agents of the government as the servants.

    We are now only as good as we are useful, and our usefulness is calculated on an economic scale by how much we are worth—in terms of profit and resale value—to our “owners.”

    Under the new terms of this revised, one-sided agreement, the government and its many operatives have all the privileges and rights and “we the people” have none.

    Only in our case, sold on the idea that safety, security and material comforts are preferable to freedom, we’ve allowed the government to pave over the Constitution in order to erect a concentration camp.

    The problem with these devil’s bargains, however, is that there is always a catch, always a price to pay for whatever it is we valued so highly as to barter away our most precious possessions.

    We’ve bartered away our right to self-governance, self-defense, privacy, autonomy and that most important right of all: the right to tell the government to “leave me the hell alone.” In exchange for the promise of safe streets, safe schools, blight-free neighborhoods, lower taxes, lower crime rates, and readily accessible technology, health care, water, food and power, we’ve opened the door to militarized police, government surveillance, asset forfeiture, school zero tolerance policies, license plate readers, red light cameras, SWAT team raids, health care mandates, over-criminalization and government corruption.

    In the end, such bargains always turn sour.

    We asked our lawmakers to be tough on crime, and we’ve been saddled with an abundance of laws that criminalize almost every aspect of our lives. So far, we’re up to 4500 criminal laws and 300,000 criminal regulations that result in average Americans unknowingly engaging in criminal acts at least three times a day. For instance, the family of an 11-year-old girl was issued a $535 fine for violating the Federal Migratory Bird Act after the young girl rescued a baby woodpecker from predatory cats.

    We wanted criminals taken off the streets, and we didn’t want to have to pay for their incarceration. What we’ve gotten is a nation that boasts the highest incarceration rate in the world, with more than 2.3 million people locked up, many of them doing time for relatively minor, nonviolent crimes, and a private prison industry fueling the drive for more inmates, who are forced to provide corporations with cheap labor.

    We wanted law enforcement agencies to have the necessary resources to fight the nation’s wars on terror, crime and drugs. What we got instead were militarized police decked out with M-16 rifles, grenade launchers, silencers, battle tanks and hollow point bullets—gear designed for the battlefield, more than 80,000 SWAT team raids carried out every year (many for routine police tasks, resulting in losses of life and property), and profit-driven schemes that add to the government’s largesse such as asset forfeiture, where police seize property from “suspected criminals.”

    We fell for the government’s promise of safer roads, only to find ourselves caught in a tangle of profit-driven red-light cameras, which ticket unsuspecting drivers in the so-called name of road safety while ostensibly fattening the coffers of local and state governments. Despite widespread public opposition, corruption and systemic malfunctions, these cameras are particularly popular with municipalities, which look to them as an easy means of extra cash. Building on the profit-incentive schemes, the cameras’ manufacturers are also pushing speed cameras and school bus cameras, both of which result in hefty fines for violators who speed or try to go around school buses.

    We’re being subjected to the oldest con game in the books, the magician’s sleight of hand that keeps you focused on the shell game in front of you while your wallet is being picked clean by ruffians in your midst.

    This is how tyranny rises and freedom falls.

    With every new law enacted by federal and state legislatures, every new ruling handed down by government courts, and every new military weapon, invasive tactic and egregious protocol employed by government agents, “we the people” are being reminded that we possess no rights except for that which the government grants on an as-needed basis.

    Indeed, there are chilling parallels between the authoritarian prison that is life in the American police state and The Prisoner, a dystopian television series that first broadcast in Great Britain more than 50 years ago.

    The series centers around a British secret agent (played by Patrick McGoohan) who finds himself imprisoned, monitored by militarized drones, and interrogated in a mysterious, self-contained, cosmopolitan, seemingly idyllic retirement community known only as The Village. While luxurious and resort-like, the Village is a virtual prison disguised as a seaside paradise: its inhabitants have no true freedom, they cannot leave the Village, they are under constant surveillance, their movements are tracked by surveillance drones, and they are stripped of their individuality and identified only by numbers.

    Much like the American Police State, The Prisoner’s Village gives the illusion of freedom while functioning all the while like a prison: controlled, watchful, inflexible, punitive, deadly and inescapable.

    Described as “an allegory of the individual, aiming to find peace and freedom in a dystopia masquerading as a utopia,” The Prisoner is a chilling lesson about how difficult it is to gain one’s freedom in a society in which prison walls are disguised within the trappings of technological and scientific progress, national security and so-called democracy.

    Perhaps the best visual debate ever on individuality and freedom, The Prisoner confronted societal themes that are still relevant today: the rise of a police state, the freedom of the individual, round-the-clock surveillance, the corruption of government, totalitarianism, weaponization, group think, mass marketing, and the tendency of mankind to meekly accept his lot in life as a prisoner in a prison of his own making.

    The Prisoner is an operations manual for how you condition a populace to life as prisoners in a police state: by brainwashing them into believing they are free so that they will march in lockstep with the state and be incapable of recognizing the prison walls that surround them.

    We can no longer maintain the illusion of freedom.

    As I make clear in my book Battlefield America: The War on the American People and in its fictional counterpart The Erik Blair Diaries, “we the people” have become “we the prisoners.”

     

    The post Dystopia Disguised as Democracy: All the Ways in Which Freedom Is an Illusion first appeared on Dissident Voice.

    This post was originally published on Dissident Voice.

  • New York, January 31, 2022–Botswana authorities should retract or reform a bill that could help police and other investigators intercept journalists’ communications without oversight, the Committee to Protect Journalists said Monday.

    The Criminal Procedure and Evidence (Controlled Investigation) Bill was published in the government gazette on January 12, according to a press release by local media groups condemning the bill and media reports. Spencer Mogapi, a newspaper editor and chair of the Botswana Editors Forum, which collaborated on the press release, told CPJ by phone on Friday, January 28, that the bill could be expedited through parliament and signed into law by President Mokgweetsi Masisi this week. CPJ reviewed a copy of the bill shared by Tefo Phatshwane, the director of the Botswana chapter of the Media Institute of Southern Africa (MISA).

    The bill would grant investigators the power to intercept communications without a warrant for up to 14 days if authorized by the head of an investigatory authority to probe offenses or prevent them from being committed, according to CPJ’s review of the bill. CPJ has documented the arrest and prosecution of journalists in Botswana, and local police’s use of digital forensics tools in 2019 and 2020 to extract thousands of files from journalists’ devices, including communications and contacts, in efforts to identify sources of their reporting.

    Companies that facilitate communication could see their directors imprisoned for up to 10 years if they fail to install hardware or software to enable interception; anyone that does not provide decryption keys so authorities can access encrypted information could be jailed for up to six years.

    “Botswana’s parliament should scrap the controlled investigation bill, which threatens journalists’ ability to communicate privately with sources,” said Angela Quintal, CPJ’s Africa program coordinator. “Authorities should implement laws that protect journalists’ privacy and safety, not expose them to surveillance without oversight.”

    Jovial Rantao, chairperson of regional press association The African Editors Forum, described the bill in a statement as the “worst piece of legislation to have emerged in Botswana, the Southern African region and the rest of the continent in recent history.” The Southern Africa Editors’ Forum expressed similar alarm over the bill.

    Reached by phone and messaging app on Friday, Batlhalefi Leagajang, Masisi’s press secretary, told CPJ the bill was “not under the ambit of the presidency” and the president would allow the parliamentary process to proceed before acting.

    Botswana government spokesperson John-Thomas Dipowe acknowledged CPJ’s emailed questions about the bill on Friday, January 28, but did not respond before publication.

    According to social media posts related to the bill on January 27, Botswana’s minister of defence, justice and security, Kagiso Thomas Mmusi, said there was a need to have a law that could plug legal and security gaps relating to issues of money laundering and financing of terrorism.


    This content originally appeared on Committee to Protect Journalists and was authored by Jennifer Dunham.

    This post was originally published on Radio Free.

  • The Stop LAPD Spying Coalition is a community group rooted in the Skid Row community on Tongva/Gabrielino land, stolen territory known as Los Angeles. Over the past decade, we have been working to build power to abolish LAPD surveillance. This report grew out of that organizing and examines the relationships of policing and surveillance to displacement, gentrification, and real estate development. We study those relationships with a focus on the process that has always bound policing and capitalism together: colonization.

    We often hear that police are an occupying army in our communities. Throughout the history of imperialism and colonization, occupying forces have used surveillance to monitor and contain populations they deem threatening, all for the purpose of maintaining their violent rule.

    The post The Surveillance And Policing Of Looted Land appeared first on PopularResistance.Org.

    This post was originally published on PopularResistance.Org.

  • A prison guard takes a picture of a prisoner with a Guardian RFID hand-held Spartan 3

    Guardian RFID is a virtually unknown, but rapidly growing, company that sells digital technology to jails. It makes ID cards and bracelets that can be scanned by guards when doing head counts, meal distribution and suicide checks.

    Guardian RFID is yet another prison profiteer among the ever-expanding number of companies that operate as what Ruth Wilson Gilmore calls “parasites,” feeding off of the prison-industrial complex. What is most disturbing about Guardian RFID are its plans for super-surveillance in the carceral environment. Guardian RFID was named by Inc. magazine as the 396th fastest-growing private company in 2021, increasing its revenue by 126 percent in three years. Guardian RFID has been around for 20 years selling its products to jails, prisons and juvenile detention centers. The company claims to provide technology for 75,000 correctional officers, who they call “Warriors” protecting “America’s Thin Gray Line.”

    As mass incarceration is adapting to respond to crises of legitimacy, companies like Guardian RFID are always ready to sell new solutions to the problem of how to contain and control people. Emerging technologies present previously unimagined levels of surveillance. This system views humans like numbers, or like bar codes to be scanned and counted, not as individuals with families, histories and a future.

    Weapons of Mass Data Collection

    Guardian RFID sells high-tech tools that enable tight surveillance in jails. Carceral personnel deploy the hand-held Spartan 3 which is basically an Android phone with apps created for basic jail functions. The Spartan scans ID cards and wristbands worn by those incarcerated. The data is then stored on a remote cloud that, according to a Guardian RFID spokesperson, is “F*#@ing Magic.” The company says it builds artificial intelligence systems with “predictive and prescriptive insights” that will give guards “constant surveillance capabilities.”

    Guardian RFID uses slick imagery and hyper-militarized language to sell its products, mostly to sheriffs in rural counties throughout the South, Midwest, and other remote areas of the U.S. where the sheriffs are powerful political figures. As it says on the Guardian RFID website, the Spartan 3 is to work with the speed and precision of a “surgical strike” — like “ISIS strongholds turned to glass.” It is a “weapon of mass data collection.” The goal is achieving “operational dominance,” what is described in further hyperbole, as “a powerful synonym for waterboarding” — a form of torture.

    Guardian RFID is headquartered in Maple Grove, Minnesota, a suburb of Minneapolis. It was founded in 2001 by Ken Dalley, the company’s self-described “Chief Warrior,” a recent finalist for the Ernst & Young Entrepreneur of the Year Heartland Award. Guardian RFID takes pride in being “Warrior led” but it’s not clear whether Dalley was ever a corrections officer. He did not respond to Truthout’s request for an interview. The company aims to track “every inmate” and estimates its technology tracks more than 10 percent of people incarcerated in the United States. Guardian RFID wants to “digitally transform” jails, prisons and juvenile detention centers.

    Guardian RFID won its first contract in 2005 at the Hardin County Jail in Eldora, Iowa, a 107-bed facility. Located 75 miles north of Des Moines, the jail was until recently best known as the largest Immigration and Customs Enforcement (ICE) detention center in Iowa for two decades. There, the Jail Administrator Nick Whitmore touted the Guardian RFID system for protecting his office from a lawsuit. “If there is an investigation on an assault or suicide occurrence,” said Whitmore, “we’re able to document and prove in court that there was one-on-one contact between the individual detainee and jail guard.”

    After the death of Sandra Bland on July 13, 2015, Guardian RFID actively promoted its technology to jails in Texas, attempting to take advantage of reforms made in the wake of national protests. The Sandra Bland Act was passed by legislators in Texas two years after her apparent suicide. Among its requirements was that jails have “automated electronic sensors to ensure accurate and timely cell checks.” Guardian RFID lobbied sheriffs in the counties near where Bland died, winning contracts in Fort Bend County, Bezos County and Wharton County, all suburbs of Houston within an hour of the Waller County Jail where she was found hanging in her cell. Guardian RFID’s system was recently installed at the Bexar County Adult Detention Center in San Antonio, Texas, as part of a $20 million technology modernization effort, in part, to “demonstrate continuous compliance” with the Sandra Bland Act. Dallas, Texas, likely signed a million-dollar deal with Guardian RFID to be in accordance with the new state law. On Guardian RFID’s blog, there’s an entire post about the Sandra Bland Act, instructing jails how to maximize “compliance.”

    Moreover, Guardian RFID will surely get more contracts after high-profile news stories like the Jeffrey Epstein scandal where guards fell asleep on the job. A wealthy financier held on federal charges of sex trafficking, Epstein hung himself with a bedsheet at the Metropolitan Correctional Center in New York City, which has since been temporarily shuttered due to security and infrastructure issues. Guards were supposed to check on Epstein every 30 minutes the night of his death. As was captured on camera, officers Michael Thomas and Tova Noel left Epstein alone for eight hours while they were napping and shopping online. Authorities charged the pair with falsifying the paper log books — but charges were dropped after the guards performed community service. Guardian RFID argues that its digital system is superior to the old paper method and thus prevents “liabilities.”

    One of Guardian RFID’s largest contracts is with Sheriff Marian Brown who runs the Dallas County Jail in Texas, the seventh-largest jail in the U.S. with an average daily population of 6,000 people. The three-year contract, approved on December 15, 2020, was for a total of $1.1 million. The dollar amount for the first year was $477,770, with $391,475 coming from the Coronavirus Aid, Relief, and Economic Security Act (CARES), a $2 trillion stimulus bill passed in March 2020. What carceral surveillance has to do with COVID relief was not articulated in the proposal before the Dallas County Commissioner’s Court. The remainder of the bill — $86,295 — was to be paid from commissions the sheriff makes off the commissary fund, the money that comes from the inflated prices people at the jail pay for personal items like toothpaste, deodorant and socks. The cost was $314,979 for the subsequent two years of the contract. There is big money to be made in selling total surveillance technology.

    Automating Repression

    At the Polk County Jail System in central Florida, Guardian RFID provides the ID tags that are required for everyone in custody who enters through the jail gates. There are nearly 4,000 people incarcerated in three separate jails — Central County Jail, South County Jail and Central Booking. Guardian RFID makes the audacious claim that people “take pride in their ID cards and even feel important having to wear them.” Guardian RFID founder Dalley took a tour of Polk’s modern processing center, what he says is by far the “most impressive and groundbreaking” of its kind. With the help of Guardian RFID technology, Polk’s guards collect 42 million log entries in a year to “automate” compliance with Florida Model Jail Standards, guidelines established by the Florida Sheriff’s Association. But to Guardian RFID, it seems, the thousands of people they tag are not real people. They are just data points.

    The massive data collection project at the Polk County Jail did not prevent the death of Shaun Seaman, who on May 13, 2020, was beaten to death while on suicide watch. The guards were supposed to check the cell every 15 minutes, as was protocol, but failed to physically check on Seaman for four and a half hours after the attack. The family filed a civil lawsuit and is being represented by high-profile civil rights attorney Benjamin Crump.

    The website for the DeSoto County Adult Detention Facility in Mississippi, says Guardian RFID’s technology is approved by the Federal Communications Commission (FCC), radio frequency levels are similar to those in consumer electronics, and the devices are hypoallergenic. Those who refuse to wear the “non-implantable devices” will be “subject to fines and disciplinary action, including prosecution.”

    Guardian RFID has a contract for the Sherburne County Jail, a 732-bed jail, one of the largest jails in the Twin Cities area of St. Paul-Minneapolis, not far from Guardian RFID’s headquarters. Sheriff Joel Brott runs a “forward-thinking” office said Guardian RFID President Dalley. The jail also generates extra revenue by housing 500 people detained by ICE and U.S. Marshals, as well as individuals from local and regional jails. Sheriff Brott used these extra income flows to pay for upgrading the facility — in this case, installing Guardian RFID’s system. Like many sheriffs, Brott further monetizes incarceration to pay for his jail. Some are more imaginative than others, like one sheriff in Kentucky.

    A “Self-Sufficient” Jail

    Jailer Jamie Mosley has developed what he says is the first “self-sufficient” jail. In January 2020, Mosley opened the Laurel County Correctional Center, based in London, Kentucky. The new $24 million jail holds twice the capacity of the previous facility. The new jail came in under budget — due to the unpaid labor of individuals in custody. “The flooring in the hallways, and all of the stone work in the showers was done by the inmates,” Mosley told the local press.

    Due to a contract with the U.S. Marshals Service, the county is reimbursed $54 per day for each person at the Laurel County jail, plus any medical costs. The federal detainees come from the Eastern District of Kentucky, as well as the larger cities of Knoxville, Chattanooga, Greenville and Nashville. Mosley said the jail is self-sufficient and operates on zero tax dollars. With the extra revenue, Mosley contracted with Guardian RFID, which he says, “gives us so much more accountability than we had before.”

    The jail also generated even more revenue for Mosley, who founded his own company called Crossbar to sell bendable e-cigarettes to those in his custody, as well as in other jails. According to a report by Vice, Crossbar sold its e-cigs to 33 jails and in 2018 was expected to make $35 million. Mosley has been unashamed about his exploitation of those he holds under lock and key. “I remind our staff,” he told a local newspaper, “that most of the time our job is to take better care of people than they were taking of themselves.”

    Guardian RFID disguises some of its profiteering through what it promotes as humanitarian work. At the beginning of the COVID-19 pandemic, Guardian RFID formed Warrior Foundation, a nonprofit organization to raise money to purchase masks for guards whose “sacrificial and heroic efforts are unseen.” The Warrior Foundation launched “Operation: Swift Mask” with two other major prison profiteers, Securus Technologies and GTL, that provide phone calls for over-priced rates. They raised money to send 250,000 masks inside to jails and prisons.

    On one level, the overall mission of Guardian RFID is nothing new — making money off of locking people up. But by combining more traditional elements of overcharging for services with a cutting-edge surveillance system inside jails, Guardian RFID is opening a new frontier of tightening the screws on a population that already faces systematic repression and dehumanization.

    This post was originally published on Latest – Truthout.

  • ANALYSIS: By Michael Field in Auckland

    Within a day of the massive volcanic eruption that rocked Tonga and severed the archipelago’s communications with the rest of the world, a handful of countries vying for influence in the region pledged financial aid.

    Hunga Tonga-Hunga Ha’apai, 60 km north of the capital Nuku’alofa, blew up on January 15, sending tsunami waves across the Pacific and shock waves around the world.

    The eruption cut the tiny kingdom’s only fibre-optic cable, to Fiji, 800 km to the west, leaving its 110,000 residents without internet or voice connections to the world.

    A Royal New Zealand Air Force surveillance flight showed that several small islands suffered catastrophic damage, and it has become clear there is extensive damage in Nuku’alofa.

    New Zealand has sent two naval ships equipped with desalination equipment and aid materials to Tonga, which is covid-free and has effectively closed its borders. Only fully vaccinated personnel are allowed to enter the country.

    Within hours of the eruption, New Zealand Prime Minister Jacinda Ardern announced an immediate grant of NZ$100,000 (US$68,000) and mobilised naval and air forces to rush help to Tonga.

    Australia followed, and a day later China pledged $100,000. The US followed shortly thereafter, with all donors making it clear it was the first round of aid.

    Heavy debt to Beijing
    Siaosi Sovaleni, Tonga’s newly elected prime minister, knows his islands have little money and a heavy debt to Beijing. After political riots in 2006 that resulted in the destruction of Nuku’alofa’s central business districts, China was the only country willing to help rebuild, but only through a loan, not aid.

    Tonga still owes $108 million to the Export-Import Bank of China, equivalent to about 25 percent of its gross domestic product and about $1000 per Tongan.

    The debt at times has threatened to bankrupt Tonga, one of the Pacific’s poorest countries, but China repeatedly declines to write it off.

    Suspicion around Beijing’s agenda has grown with the construction of a lavish and large embassy in Nuku’alofa. Surveillance pictures suggest it was undamaged by the tsunami.

    The Chinese Embassy in Tonga
    The Chinese Embassy in Tonga … photographed before the volcano eruption and tsunami. Image: Wikimedia/GNU Free Documentation Licence

    Former Australian Prime Minister Kevin Rudd tweeted that Australia must be first to give Tonga assistance.

    “Failing that,” he said, “China will be there in spades.” He added that large Australian warships should be sent immediately: “It’s why we built them.”

    China’s Global Times, the English language mouthpiece of the Chinese Communist Party, published an editorial saying, “Tonga is in need of emergency aid, and China said it is willing to help.”

    Huawei interests in Pacific
    It noted that the volcano had taken out Tonga’s submarine cable and refers to attempts by Huawei to operate in the South Pacific.

    “It is important to note that in addition to providing necessary supplies, China is capable of helping Pacific island nations with their reconstruction work,” the Global Times said.

    “In fact, in recent years, Chinese companies such as technology giant Huawei have been actively pursuing infrastructure projects in Pacific island nations, of which the construction of submarine fibre optic cables is an important part.”

    Huawei had attempted to be involved in cables in Papua New Guinea and the Solomon Islands, but Australia succeeded in blocking the bids.

    The Global Times said some Western countries, led by the US, are trying to block such cooperation as they see Pacific island nations “as a place for competing for geopolitical influence and publicly claim to counter China’s growing influence in the Pacific”.

    The tabloid added Pacific island nations did not want to be forced to pick sides between China and the US.

    The Nuku’alofa riot occurred on 16 November 2006 when the country was under a royal and noble-dominated regime that essentially ruled out democracy. Following the ascension to the throne of the late King Tupou V, pro-democracy and criminal groups set fire to the capital.

    A P-3K2 Orion surveillance aircraft flies over Nomuka island in the Ha’apai group of the kingdom of Tonga, showing extensive ash damage from the Hunga Tonga-Hunga Ha’apai volcano. Image: NZ Defence Force

    Consequences of ‘soft loan’
    Then Prime Minister Fred Sevele asked China for $100 million in aid but instead received a soft loan of $112 million to fund the rebuilding of Nuku’alofa, repayable over 20 years.

    The consequences of the loan were profound for Tonga, and a subsequent prime minister, the late ‘Akilisi Pohiva, used the matter to win elections.

    In 2013 Pohiva said the kingdom had debts it could never repay: “Our hands and feet have already been tied,” he said.

    “We need a government by the people that can work this out with the Chinese government in a way Tongans now and in the future will not suffer catastrophic consequences.”

    He said he feared the Chinese would take over the running of Tonga.

    “If we fail to meet the requirements and conditions set out in the agreement,” he said, “we have to pay the cost for our failure to meet the conditions.”

    Help less flat-footed
    Jonathan Pryke, director of the Pacific Islands Programme at Australia’s Lowy Institute, said help to Tonga from Australia and New Zealand had been less flat-footed than it was during the recent anti-China riots in the Solomon Islands. Pryke wondered if Tonga was different because of the nature of the crisis.

    “While valuable in its own right, the support Australia and New Zealand provide is not entirely altruistic,” Pryke said. “This support generates a lot of goodwill and ‘soft power’ in the region, and gives Australian and New Zealand defence assets the chance to ‘get into the field.’”

    Pryke said Australia and New Zealand were both eager, now more than ever, in light of the geostrategic competition with China, to show the region that they were its best and most reliable foreign partners.

    “With that said, Tongan officials are much wiser now in what support they will accept from China than in 2006, as repayments on that debt continue to be pushed off but will be monumentally costly for the government when they finally do come due.”

    New Zealand-based security consultant Dr Paul Buchanan of 36th-Parallel.com said he wondered why China was being slow in its reaction. It previously sent a navy hospital ship to Tonga, but not this time.

    He noted the cable had only recently gone into Tonga and that two years ago it was damaged by a ship’s anchor. While coincidental, the latest severing offers an opportunity for China.

    Opportunity for China’s signals fleet
    “Getting involved in the process of repair/replacement of the branch cables linking Suva to Nuku’alofa… allows [China’s] signals fleet to get involved in a way that it has not been able to do before,” Dr Buchanan said.

    Noting Beijing’s unexpectedly large embassy in Tonga, Dr Buchanan said China might act in its own self-interest rather than out of a sense of humanitarianism.

    “Perhaps the kingdom knows this and will try to leverage the PRC’s slow response in favour of more favorable reconstruction terms,” Dr Buchanan said. “But I am not sure that the king and his court play that way.

    “New Zealand and Australia seem to have responded as could be expected, but if my read is correct, [China] seems willing to cede [the] diplomatic initiative to the ‘traditional’ patrons on the issue of immediate humanitarian relief.”

    Michael Field is an independent New Zealand journalist and co-editor of The Pacific Newsroom. This article was first published by Nikkei Asia and is republished with permission.

    This post was originally published on Asia Pacific Report.

  • RNZ Pacific

    A World Health Organisation representative in Tonga says the international airport has been cleared of volcanic ash which will allow humanitarian aid flights to arrive.

    Hundreds of volunteers, workers and Tongan Defence Force personnel have been clearing the debris from the runway by hand.

    WHO liaison officer in Tonga Dr Yutaro Setoya, who is in the capital Nuku’alofa on the main island Tongatapu, said there had been a thick layer of ash on the runway preventing planes from landing.

    “The runway, I understand, was cleared to be able to be used from outside [the country]. I understand humanitarian flights are coming in,” Dr Setoya told RNZ by satellite phone.

    A New Zealand Defence Force C-130 Hercules is on standby and will be able to to take off once the all clear has been given, bringing supplies of water, hygiene kits and other goods.

    Two Australian Air Force Hercules are also ready to depart.

    One of Tonga’s main communications providers, Digicel, said it had restored international calls to Tonga via satellite.

    Undersea communications cable delay
    But until the undersea communications cable is restored its network services will not be fully operational, it said.

    It is expected to take at least a month to complete repairs on the cable that carries the bulk of internet and phone communications to Tonga.

    Digicel Tonga is giving out free sim cards from Thursday morning, with the company saying it knows how desperate family and friends overseas are to connect with relatives.

    Three people are confirmed to have died after Saturday’s massive volcanic eruption and tsunami.

    Houses on the island of Mango in the Ha’apai group were destroyed, and the majority of structures on Atatā on Tongatapu, about 6km north Nuku’alofa, were all but wiped out by the tsunami.

    There has been extensive damage to Fonoifua and Nomuka Islands. Evacuations of residents are underway.

    Western parts of the main island of Tongatapu are also badly hit, with dozens of houses destroyed.

    New Zealand Defence Force ships HMNZS Wellington and HMNZS Aotearoa are due to arrive in Tonga on Friday, carrying water and other immediate supplies, as well as engineers and helicopters.

    ‘Contactless’ aid
    Their first task is to offload desperately needed water, but distributing supplies will be complicated by the need to maintain covid-19 protocols.

    Tonga is free of the virus, and Tongan and New Zealand officials are still working out how foreign assistance can be done in a contactless way.

    A second New Zealand Defence Force P3 Orion surveillance flight was carried out on Wednesday and also included Fiji’s southern Lau Islands, at the request of the government of Fiji.

    The Tongan government has begun a huge cleanup operation in the capital.

    Dr Setoya said Tonga needed access to emergency funding and immediate humanitarian supplies from overseas, but he believed most of the response to the devastating volcanic eruption could be handled domestically.

    He said people affected by the volcanic eruption were resilient and strong and were helping others clean up.

    “Tongan people are strong and very quick to react,” he said.

    “People are cleaning ashes from the ground and the roof … hand in hand, cleaning the houses together. So I think there’s a good energy in Tonga.”

    He said Tonga needed rain to wash away the ash.

    “Because ash is everywhere and has to be washed away before we get clean water [from roofs] … many people depend on rain water in Tonga.”

    This article is republished under a community partnership agreement with RNZ.

    This post was originally published on Asia Pacific Report.

  • RNZ News

    New images appear to show the majority of structures on the Tongan island of Atatā have been wiped out after a volcanic eruption and tsunami last weekend.

    The Tongan government has so far confirmed three deaths from Saturday’s eruption of Hunga Tonga-Hunga Ha’apai, and all houses on the island of Mango were also wiped out.

    The New Zealand Defence Force has described the damage to the island of Atatā as “catastrophic” in its surveillance photo, which was posted online by a resort based there.

    The United Nations Institute for Training and Research (UNITAR) also released an image of Atatā island on January 18, with an assessment that 72 structures had been damaged and the entire island covered in ash.

    Atatā island, Tonga (UNITAR)
    The UN Institute for Training and Research image of Atatā island on January 18, with an assessment that 72 structures had been damaged and the entire island covered in ash. Image: RNZ/UNITAR

    However, it noted it was a preliminary analysis and had not yet been validated on the ground.

    The Royal Sunset Island resort posted on Facebook that all residents had now been evacuated to the mainland.

    The resort was fully submerged by the tsunami and it was not expected there would be much left.

    Other satellite imagery circulating online also appeared to show major damage on the island.

    Meanwhile, the New Zealand government today announced two naval ships with supplies had been approved for arrival in Tonga.

    The ships were sent before an official request for help from the Tongan government, but the statement from Minister of Foreign Affairs Nanaia Mahuta’s office this afternoon confirmed the vessels — expected to arrive by Friday, depending on weather — had been approved.

    The eruption was likely the world’s largest in the past three decades, and support and aid efforts have been stymied by communications outages after the blast.

    US company SubCom expected repairs to the undersea cable, which carries most of Tonga’s communications, would take at least four weeks.

    A mobile network was expected to be established using the University of South Pacific’s satellite dish today, though the connection would likely be limited and patchy.

    Volcanic activity and tsunami risk continues to be monitored.

    This article is republished under a community partnership agreement with RNZ.

    This post was originally published on Asia Pacific Report.

  • RNZ News

    The Tongan government has confirmed that all houses on the island of Mango were wiped out in the tsunami that followed Saturday’s volcanic eruption.

    It confirmed that three people are now known to have died: a 65-year-old woman in Mango and a 49-year-old man in Nomuka, both in the outlying Ha’apai island group; as well as British national Angela Glover in Tongatapu.

    The Tongan navy had deployed with health teams and water, food and tents to the Ha’apai islands.

    One aerial image taken by the New Zealand Defence Force (NZDF) showed Mango and described the damage there as “catastrophic”.

    No houses, but just a few temporary tarpaulin shelters could be seen.

    A view over an area of Tonga that shows the heavy ash fall from the recent volcanic eruption within the Tongan Islands.
    A view over Nomuka in Tonga from a New Zealand Defence Force P-3K2 Orion surveillance flight after the islands were hit by a tsunami triggered by an undersea volcanic eruption. Image: RNZ/NZ Defence Force

    The Tongan government said Mango, Atata, and Fonoifua islands were being evacuated, and that water supplies in Tonga were seriously affected. It said all houses were destroyed on Mango Island, only two houses remained on Fonoifua and extensive damage occurred on Nomuka Island.

    The government also said there were multiple injuries.

    First official Tongan statement
    It is the first official statement the kingdom has made about the disaster to international media.

    The government said parts of the western side of Tongatapu, including Kanokupolu, were being evacuated after dozens of houses were damaged, and that in the central district many houses were damaged in Kolomotu’a and on the island of ‘Eua.

    A diplomat, Tonga’s deputy head of mission in Australia, Curtis Tu’ihalangingie, earlier described the images taken by the NZDF reconnaissance flight as “alarming”, saying they showed numerous buildings missing on Atata island as well.

    “People panic, people run and get injuries,” Tu’ihalangingie told Reuters. “Possibly there will be more deaths and we just pray that is not the case.”

    With communications in the South Pacific island nation cut, the true extent of casualties is still not clear.

    Glover, 50, was the first known death in the tsunami, swept away as she tried to rescue the dogs she cared for at a shelter.

    Australia’s Minister for the Pacific Zed Seselja said conditions on other outer islands were “very tough, we understand, with many houses being destroyed in the tsunami”.

    UN report of distress signal
    The United Nations had earlier reported a distress signal was detected in Ha’apai, where Mango is located.

    The Tongan navy reported the area was hit by waves estimated to be 5m-10m high, said the UN Office for the Co-ordination of Humanitarian Affairs.

    Fonoifua Island in Ha'apai, Tonga, as seen from an NZDF P-3 Orion reconnaisance flight after the eruption of Hunga Tonga-Hunga Ha'apai. The image caption says all but the largest buildings were destroyed or severely damaged.
    Fonoifua Island in Ha’apai, Tonga, as seen from an NZDF P-3 Orion reconnaissance flight after the eruption of Hunga Tonga-Hunga Ha’apai. The image caption says all but the largest buildings were destroyed or severely damaged. Image: RNZ/NZDF

    Atata and Mango are between 50km and 70km from the Hunga Tonga-Hunga Ha’apai volcano, which sent tsunami waves across the Pacific Ocean and was heard some 2300km away in New Zealand when it erupted on Saturday.

    Atata has a population of about 100 people and Mango about 50 people.

    “It is very alarming to see the wave possibly went through Atata from one end to the other,” Tu’ihalangingie said.

    Workers on airport runway
    The NZDF images were posted unofficially on a Facebook site and confirmed by Tu’ihalangingie.

    Fua'amotu International Airport in Tonga as seen from a New Zealand Defence Force P-3 Orion reconnaisance flight, after the eruption of Hunga-Tonga Hunga-Ha'apai. The image caption says workers are using shovels and wheelbarrows to clear volcanic ash from the runway.
    Fua’amotu International Airport in Tonga as seen from a New Zealand Defence Force P-3 Orion reconnaisance flight, after the eruption of Hunga-Tonga Hunga-Ha’apai. The image caption says workers are using shovels and wheelbarrows to clear volcanic ash from the runway. Image: Crown copyright 2022/NZDF/RNZ

    Taken from a P-3K2 Orion plane, they also showed workers on the runway clearing volcanic ash at Fua’amotu International Airport, the country’s main airfield.

    One caption described the runway as “unserviceable” because of the layer of ash on it, meaning aircraft cannot land there.

    It said the clearance operation was being done with shovels and wheelbarrows, and that “no heavy excavation machinery was observed”.

    The Tongan government said wharves were also damaged in the eruption.

    This article is republished under a community partnership agreement with RNZ.

    Nomuka Island in Ha'apai, Tonga, as seen from an NZDF P-3 Orion reconnaisance flight after the eruption of Hunga Tonga-Hunga Ha'apai. The image caption says extensive damage was observed through the village with most coastal buildings destroyed.
    Nomuka Island in Ha’apai, Tonga, as seen from an NZDF P-3 Orion reconnaisance flight after the eruption of Hunga Tonga-Hunga Ha’apai. The image caption says extensive damage was observed through the village with most coastal buildings destroyed. Image: RNZ/NZDF

    This post was originally published on Asia Pacific Report.

  • Asia Pacific Report newsdesk

    An RNZAF P-3K2 Orion aircraft flies over the small Tongan island of Nomuka showing the heavy ash fall from last Saturday’s volcanic eruption on Hunga Tonga-Hunga Ha’apai.

    Five Squadron crew worked on board while flying overhead to gather vital information to send back to New Zealand’s Ministry of Foreign Affairs and Trade (MFAT) and other government agencies.

    Images: Taken on board the Royal New Zealand Air Force Orion on Monday 17 January 2022/Licensed under Creative Commons BY-4.0

    This post was originally published on Asia Pacific Report.

  • RNZ News

    The acting United Nations coordinator in the Pacific understands three people have died following the eruption in Tonga on Saturday.

    The Hunga Tonga-Hunga Haʻapai volcano, which erupted on Saturday, was about 65km north of Tonga’s capital Nuku’alofa.

    There is now a huge clean-up operation in the town, which has been blanketed in thick volcanic dust.

    Serious damage has been reported from the west coast of Tongatapu and a state of emergency has been declared.

    New Zealand’s Ministry of Foreign Affairs and Trade has confirmed two deaths so far, but Fiji-based United Nations Coordinator Jonathan Veitch said there were still areas that had not been contacted.

    Acting High Commissioner for New Zealand in Tonga Peter Lund told Tagata Pasifika he could see rubble, large rocks and damaged buildings, with serious damage along the west coast of Tongatapu.

    “There is a huge clean-up operation underway, the town has been blanketed in a thick blanket of volcanic dust, but look they’re making progress… roads are being cleared,” he said.

    A Briton among fatalities
    Veitch said one of those fatalities was British national Angela Glover, who was reported by her family to have been killed by the tsunami.

    Glover is thought to have died trying to rescue her dogs at the animal charity she ran.

    Veitch told RNZ full information from some islands — such as the Ha’apai group — was not available.

    “We know that the Tonga Navy has gone there and we expect to hear back soon.”

    The communication situation was “absolutely terrible”.

    “I have worked in a lot of emergencies but this is one of the hardest in terms of communicating and trying to get information from there. With the severing of the cable that comes from Fiji they’re just cut off completely,” he said.

    “We’re relying 100 percent on satellite phones.

    ‘Bit of a struggle’
    “We’ve been discussing with New Zealand and Australia and UN colleagues … and we hope to have this [cable] back up and running relatively soon, but it’s been a bit of a struggle.”

    It had been “a lot more difficult” than regular operations, Veitch said.

    One of the biggest concerns in the crisis was clean water, he said.

    “I think one of the first things that can be done is if those aircraft or those ships that both New Zealand and Australia have offered can provide bottled drinking water. That’s a very small, short-term solution.

    “We need to ensure that the desalination plants are functioning well and properly … and we need to send a lot of testing kits and other material over there so people can treat their own water, because as you know, the vast majority of the population in Tonga is reliant on rainwater.

    “And with the ash as it currently is, it has been a bit acidic, so we’re not sure of the quality of the water right now.”

    Access in ‘covid-free nation’
    Another issue was access.

    “Tonga is one of the few lucky countries in the world that hasn’t had covid … so we’ll have to operate rather remotely. So we’ll be supporting the government to do the implementation and then working very much through local organisations.”

    For those in Tonga who were cut off, Veitch said the main message was “everybody is working day and night on this. We are putting our supplies together. We are ready to move.

    “We have teams on the ground. We are coming up with cash and other supply solutions … so help is on its way”.

    On Tuesday afternoon, ministers confirmed two New Zealand naval ships were being sent to Tonga to provide support, carrying fresh water, emergency provisions, and diving teams. The journey is expected to take three days.

    Tonga’s deputy head of mission in Australia, Curtis Tu’ihalangingie, said Tonga was concerned that aid deliveries could spread covid-19 to the covid-free nation.

    “We don’t want to bring in another wave — a tsunami of covid-19,” Tu’ihalangingie told a news agency by telephone, urging the public to wait for a disaster relief fund to donate.

    Aid needs to be quarantined
    Any aid sent to Tonga would need to be quarantined, and it was likely no foreign personnel would be allowed to disembark aircraft, he said.

    Meanwhile, the United Nations reported a distress signal had been detected in an isolated group of islands in the Tonga archipelago following Saturday’s volcanic eruption and tsunami, prompting particular concern for its inhabitants.

    The UN Office for the Coordination of Humanitarian Affairs said there had been no contact from the Ha’apai group of islands and there was “particular concern” about two small low-lying islands — Fonoi and Mango, where an active distress beacon had been detected.

    According to the Tonga government, 36 people live on Mango and 69 on Fonoi.

    Australia’s Minister for the Pacific Zed Seselja said Tongan officials were planning to evacuate people from outer islands where “they’re doing it very tough, we understand, with many houses being destroyed in the tsunami”.

    Royal New Zealand Air Force aircrew monitoring the Tongan volcanic tsunami damage during the 170122 flight
    Royal New Zealand Air Force aircrew in the P-3K2 Orion aircraft monitoring the Tongan tsunami damage on yesterday’s surveillance flight. Image: RNZDF/Licensed under Creative Commons BY 4.0

    The NZ Defence Force reports that following the successful surveillance and reconnaissance flight of and RNZAF Orion yesterday, “imagery and details have been sent to relevant authorities in Tonga by the NZ government” to help decisions about aid needed.

    “Images showed ashfall on Nuku’alofa airport runway that must be cleared before our Hercules aircraft can land,” the Defence Force media release said.

    Royal New Zealand Navy ships HMNZS Wellington and HMNZS Aotearoa are departing New Zealand today so they can respond quickly if called upon by the Tongan government.

    HMNZS Wellington will be carrying hydrographic survey and diving teams and a Seasprite helicopter. HMNZS Aotearoa will carry bulk water supplies and humanitarian and disaster relief stores.

    This article is republished under a community partnership agreement with RNZ. It may include some agency content.

    This post was originally published on Asia Pacific Report.

  • A protester holds a placard reading "Close Guantanamo" and portrait of detainee during an outdoor demonstration.

    It is a sad fact that it requires a major anniversary, two decades on from the arrival of the first prisoners in hoods and orange jumpsuits at Guantánamo Bay’s Camp X-Ray prison, for the media and the U.S. public to pay attention to Guantánamo and the 39 men who remain imprisoned there.

    The 741 men who have been released have been almost entirely forgotten by the public. The truth is that the U.S. has largely washed its hands of those it tortured and imprisoned without charge or trial for years on end, outsourcing its responsibility to support the reentry of these men to other countries, usually in the Global South, in some cases with fatal consequences.

    I work for the only project in the world that is solely dedicated to assisting people formerly imprisoned in Guantánamo to rebuild their lives — a project run by the human rights charity Reprieve. Many of the men we’ve assisted have been dropped by the U.S. into a country they’ve never been to before, where they have no contacts or networks and possibly don’t even speak the language.

    Our research shows that almost one in three detainees who have been resettled in third countries have not been granted legal status documents. And even those who are granted residency find that rather than receive the support they need, they are stigmatized and kept under surveillance.

    Often, host countries don’t allow the family of the former detainee to join him or even visit, after families have already been kept apart for so long. In one of the most heart-breaking cases I’ve worked on, the host country refused visit requests from the former detainee’s mother for five years, and by the time they finally acquiesced, she had died, having not seen her son for more than 20 years.

    Deprived of citizenship or residency rights, people who were previously imprisoned in Guantánamo cannot get a job, access health care (including psychological support), education and other vital services. They may not be able to open a bank account, get a driver’s license, and if living in a country with checkpoints, can’t pass through them. Without this most basic passport to participation in society, they are effectively confined to the shadows.

    The program that I work for, called “Life After Guantánamo,” tries to help survivors of Guantánamo living in these dire circumstances. Founded by Reprieve in 2009, the program has helped 130 men living in 29 countries.

    Reprieve has legally represented more than 80 Guantánamo detainees and helped more people secure release from the prison than any other organization. Through the Life After Guantánamo program, we request that governments give people who were formerly held in the prison the tools needed to rebuild their lives, or, failing that, we seek to do so ourselves. With support, many detainees, whether repatriated to their home countries or resettled in host countries, have been able to start that process.

    Yet even detainees with those comparative “success stories” continue to be haunted by the time they spent in U.S. custody. “It feels like I am still there, I just changed for the big Guantánamo,” one former prisoner told me. “When I close my eyes I am back in Guantánamo, so I can’t sleep,” confided another.

    I visited one detainee after he’d been resettled who wouldn’t leave his new apartment. Although physically he was a free man, mentally he was still imprisoned. Detained in Guantánamo for 15 years since he was only 18 years old, he had become so institutionalized that he couldn’t cope with freedom. With support, he’s now learned the language of his new home country, formed friendships and is undergoing vocational training.

    Many aren’t given that chance. In some cases, men are released from Guantánamo only to be immediately imprisoned again. Twenty-three men were transferred to the United Arab Emirates (UAE), expecting to live as free men, but were detained upon their arrival in horrific conditions when the UAE reneged on assurances given to the U.S. Most of them have been forcibly repatriated to Yemen, despite concerns about their safety. One man, Ravil Mingazov, could be repatriated to Russia where he faces persecution and, as confirmed by the United Nations, a “substantial risk of torture.”

    When Senegal deported two former detainees to Libya, they immediately disappeared into militia-run prisons. Although they have since been found and released, they are at risk of being detained again. Former detainees resettled in Kazakhstan and Mauritania died of medical problems because they could not access health care as they had not been afforded basic rights.

    Most resettlements were negotiated during Barack Obama’s presidency, and once Donald Trump took over, the U.S. appeared to completely disengage from what was happening to them once resettled, giving host countries license to mistreat and abuse them.

    President Joe Biden can end the lottery that determines whether people formerly imprisoned in Guantánamo are given any chance at life. He can ensure that resettlements and repatriations are done safely, without former detainees being put at risk of imprisonment or persecution, that they are afforded citizenship or rights as residents and that their loved ones are able to join them. These demands should be central to the campaign to close Guantánamo, because Guantánamo can continue to imprison, and even kill, after men escape its four walls.

    Disgracefully, the U.S. offers no compensation to these men for the unspeakable horrors they suffered in U.S. custody. The very least the Biden administration can do is ensure that once released from Guantánamo, former prisoners are actually given the opportunity to know freedom.

    This post was originally published on Latest – Truthout.

  • CPJ is concerned that U.S. President Joe Biden has not addressed many of the Obama and Trump-era limitations on press freedom. In ‘Night and Day’, a CPJ special report on the Biden administration’s relationship with the press during its first year in office, former Washington Post executive editor Leonard Downie Jr. found that while some progress has been made, key problems outlined in his reports on the previous two administrations remained. These range from freedom of information requests that remain backlogged, stymieing reporters’ ability to cover matters of public interest; limited access to the southern border; and the use of the Espionage Act against WikiLeaks founder Julian Assange. 

    Based on the report by Downie, who also wrote CPJ reports on The Obama Administration and the Press and The Trump Administration and the Media, CPJ makes the following recommendations to the Biden administration:

    • Embrace good practice and transparency in dealing with the press by speaking to reporters on the record and avoiding overuse of on background briefings and quote approval. Make the president more accessible to reporters.
    • Instruct all government departments to comply with Freedom of Information Act (FOIA) requests in a timely manner without regard to the media organizations or reporters filing those requests. Enforce prompt and less restrictive responses to FOIA requests to facilitate greater transparency. 
    • Implement restrictions that would require the Department of Homeland Security (DHS) and U.S. Customs and Border Protection (CBP) to obtain warrants before searching electronic devices. Require both agencies to release transparency reports about such searches. 
    • Prohibit DHS and CBP agents from intimidating and singling out journalists for questioning and/ or asking journalists about their work . 
    • Codify the new DOJ policy restricting federal prosecutors’ ability to obtain journalists’ phone and email records in government leak investigations. 
    • Prioritize and support passage of legislation – such as Senator Ron Wyden’s PRESS Act – that would protect journalists’ First Amendment rights against government prosecution for using and receiving confidential and classified information. The legislation should expansively define journalists, and shield reporters’ communication records, ensuring that the government cannot compel journalists to disclose sources or unpublished reporting information. 
    • Stop the misuse of the Espionage Act to hinder press freedom: Drop the espionage charges against Julian Assange and cease efforts to extradite him to the U.S. Put into place legislation that would prevent the use of the Espionage Act as a means to halt news gathering activity. 
    • Ensure that U.S. companies or individuals are not contributing to the secret surveillance of journalists abroad, and that foreign companies face targeted sanctions for enabling authoritarian governments to spy on journalists.   
    • Take action against impunity in the murder of journalists: Impose sanctions on Saudi Arabian Crown Prince Mohamed bin Salman, holding the leader to account for his role in the killing of Washington Post columnist Jamal Khashoggi.  
    • Process P-2 visa applications for Afghan journalists as rapidly as possible and be communicative about which cases are being processed; allow P-2 processing for individuals who have reached the U.S.; and provide support and protection to journalists still in Afghanistan or who have escaped to third countries.
    • Support the creation of an emergency visa for journalists at-risk around the world (such as in section 6 of the International Press Freedom Act of 2021) to ensure solutions are in place for future crises like the one in Afghanistan. 


    This content originally appeared on Committee to Protect Journalists and was authored by Committee to Protect Journalists.

    This post was originally published on Radio Free.

  • After talking and writing about it, I finally ditched my smartphone and switched to a flip phone, with the aim of being rid of a cell phone altogether.

    It’s only been a few days, but the psychological and spiritual effect has been uplifting. I had come to view the stupid smartphone as one of the principal portals into our individual and collective imprisonment. Vaccine passports, digital ID’s, constant surveillance and control, all rely on us remaining chained to a gadget less than two decades old.

    So chucking it felt not only necessary but cleansing, a Detox from addiction and dependency, a small step away from the increasingly repressive biosecurity state, which is confident that the masses will never get rid of this particular digital technology because, don’t you know, we simply can’t live without it.

    I totally get the difficulties, though. For millions of people, the smartphone is a vital component to one’s job or education. I’m one of the fortunate ones where this doesn’t apply, and only for the grace have I been able to opt out relatively easy. I only got a cell phone five years ago; and a smartphone two years ago, mainly because of family members who virtually lived on text. I was also traveling a lot, and apps like Google Maps were a God-send.

    But mainly I hated the thing, hated the feeling that I was growing used to it, embracing it even, eyes and ears magnetized to the screen. When the COVID nightmare came along, with its dystopian plans for an AI and QR future, my smartphone mutated into what it perhaps always was: a shackle. An instrument from which the powers-that-be were sneering at me, another fly trapped in their web.

    I knew there existed plenty of warriors working on wresting control of digital technology from the ruling elite, and I fully support those efforts. Personally, however, I hungered for another route. I wanted off the express train, or to at least move towards that goal. Last year, I wrote an article about why I’m often a Luddite wannabe, and one of the questions I posed then was: Is it time to ditch the smartphone? At the time, I had purchased an unlocked Acatel flip phone on Ebay for less than $100, but never got around to doing the switch.

    A week ago, I made the leap. It was surprisingly straight-forward. Here’s how it went down:

    Since I’m a Verizon customer, I went to the dealership where I first set up a cell account a few years ago. Luckily, the workers there weren’t mask crazy, so I kept mine under my nose. It turned out I couldn’t just transfer my phone number because I was changing devices. Fine, I said. My current account still had a few days left, so I would just text the few people I used the phone for and let them know.

    The young clerk at the counter was very nice and supportive. At one point, he told me that a lot of people were changing to flip phones because they were “easier to use.” Privately, I wondered if some of these people were as wary of the COVID bullshit and surveillance as I was.

    I smiled and said, “Slow and simple is a better life style.” He nodded and agreed. I paid the activation fee, tested my new toy, and all was well.

    “Have a happy holiday,” he said as we shook hands.

    “You too,” I said.

    Outside I pumped my fist in the air, as if I had scored a game-winning touchdown. I realized, of course, that this wasn’t some earth-shattering event. Yet it felt good to have moved in the right direction, a small step back to the slow and simple, which, paradoxically, could very well speed up resistance to the COVID agenda.

    The post Ditching the Smartphone first appeared on Dissident Voice.

    This post was originally published on Dissident Voice.

  • The Olympic Winter Games take place in Beijing, China from February 4-20, 2022. Journalists covering the event are likely to face a range of challenges from coronavirus restrictions to digital surveillance.

    The Committee to Protect Journalists has expressed concern about the ability of the press to work freely during the event. China has been the world’s worst jailer of journalists for three years running. Domestic journalists in mainland China face increasing censorship and control while the international media are operating in a hostile environment; the Foreign Correspondents Club of China (FCCC) noted that the international media have been unable to attend press conferences and cover Games preparation, such as the arrival of the Olympic torch, for reasons including a requirement to submit COVID-19 test results within an impossible time frame. In March 2021, the FCCC said 20 international journalists had been expelled in the preceding year, while reporters are frequently followed and interviewees scared to engage. In the past, CPJ documented foreign journalists facing harassment and threats in the lead up to the 2008 Olympics.  

    Zero COVID-19 policy

    China is enforcing strict anti-COVID-19 measures across the country. As of January 11, Chinese officials had reported outbreaks of the omicron variant of the virus and locked down some cities to try and contain it, though the closed loop was unaffected. The situation is fluid, so monitor news reports before departure.

    The Winter Games will take place within a “closed loop” or bubble that has already been put into place. The International Olympic Committee (IOC) has published a playbook for broadcasters and the press with the following guidance:

    • Travel to Beijing will only be possible if you have valid Games accreditation or a visa supported by a Beijing 2022 invitation letter. You must have all the necessary pre-departure testing conducted by a Chinese Embassy-approved provider.  If you have previously contracted COVID-19, you need to complete an additional vetting process at least eight days before departure.
    • You are advised to download the My 2022 smartphone app at least 14 days before traveling to China. (See digital security information below). 
    • Anyone entering the bubble must be fully vaccinated or face a 21-day quarantine. You are not allowed to leave the closed loop. Everyone will be tested daily and must wear face masks at all times.
    • Visitors can only use dedicated Games transportation to enter or move within the closed loop, as well as to exit, which is permitted only to leave the country.
    • As part of your organization’s registration, you will be assigned a COVID-19 Liaison Officer. They are your point of contact for information or if you contract COVID-19 at any stage of travel or within the bubble.
    • If you are confirmed to have a positive test for COVID-19, you will not be able to participate further. If symptomatic, you will be isolated at a designated hospital. If asymptomatic, you will be placed in an isolation facility.

    Digital security

    China and the IOC have promised a free and open internet inside the closed loop, but restrictions are possible in practice. The internet in China is strictly controlled by the government, meaning that services and websites are frequently blocked. People use virtual private networks to bypass censorship though China has technically banned unlicensed VPNs.

    If you are travelling to Beijing, assume your devices and online activity will be monitored. The more you can do in advance of travel to prepare your accounts and devices, the safer your data will be.

    Top digital security tips for journalists at the Beijing Olympics
    • Leave your devices home. Wipe an old phone and laptop or purchase new ones for the trip.
    • In case of restrictions, ask journalists in China which apps and VPNs work for them.
    • Create a new work email specifically for the trip.
    • Assume your hotel room is under surveillance.
    • Keep your devices with you and avoid leaving them unattended.
    • Wipe all devices on your return.

    Risk assessment

    • Conduct a risk assessment before travel; use CPJ’s template if you need one.
    • Staff journalists should ask newsroom IT support or security teams for organizational digital safety guidance.

    Prepare your devices

    Phones and laptops could be contaminated with malware while in China, and you should leave both personal and work devices at home. Use an old phone and laptop or buy new devices for the assignment.

    • Prepare your devices for airport security and border crossings following guidance in CPJ’s Digital Safety Kit.
    • Wipe old devices before you travel. (Back up anything you might need first.)
    • Delete all inessential apps and services.
    • Install or update essential apps and services immediately before travel to make sure you have the latest software.
    • Check your phone and mobile internet service will work in China.

    Data and accounts

    Your online accounts hold a lot of information about you – including your work, your sources, and your family – so plan to use as few as possible on your trip.

    • Understand that all data stored in online services – public and private – could be vulnerable should you log into an account while in China.
    • Limit which social media and messaging platforms you will use to those that are essential for contacting work or family. Consider having a backup way to reach people in case one does not work in practice.
    • Ask journalists already in China to recommend a functioning VPN and try to find a few options in case you encounter internet restrictions. Note that accessing an unlicensed VPN could be used against you if officials are looking for an excuse to penalize you.
    • Avoid installing the Chinese app WeChat on your devices, since it is likely to collect a lot of data, including messages and calls. 
    • Review accounts on the services you have chosen and remove any content that you would not want others to see, such as contact details for sensitive sources, or personal photos and messages.
    • Create a new work email account specifically for China and use it for the duration of your trip. Avoid logging into your regular work services like email completely in case the content is exposed, and prepare colleagues and away messages accordingly.  
    • Secure your accounts following guidance in CPJ’s Digital Safety Kit.
    • Review what information is available about you via your online profiles and remove anything that you are uncomfortable having in the public domain. (See CPJ’s guide to removing personal data from the internet.)
    • Chinese officials may monitor social media and take offense at comments or activities that could be construed as being critical of China.

    COVID-19 App and QR codes

    All journalists accredited to cover the Beijing Winter Olympics are required to download the My 2022 app to monitor health, and to register online for two QR codes. The IOC playbook notes that you will need to log into the Beijing 2022 Health Monitoring System and start inputting the required information 14 days prior to travel. The playbook details how to install and set up the app (page 62); data collected by the app (page 66); and how to log into and use the QR codes (pages 64-65).  

    • Only install the app on the device you have selected specifically for your China trip; keep it off your personal or work phone.  
    • Once the app is installed, avoid using the device or carrying it with you until you are ready to leave.

    While in China

    • Keep your devices on your person and avoid leaving them unattended.
    • Assume that everything you do online will be monitored.
    • Any call made using a hotel landline or cell phone is not encrypted and can be intercepted.
    • Be aware that you may not have Wi-Fi in your hotel room.
    • Any conversation you have in your hotel room may be subject to eavesdropping.
    • Internet access will be provided if you have to isolate because of COVID-19, according to the IOC playbook.

    On your return

    • Staff journalists should debrief with IT or security colleagues and follow their guidance.
    • Remove SIM cards from phones.
    • Wipe or factory reset all phones and computers. This is not guaranteed to erase all malware, so stop using them altogether if you can.
    • Change passwords on all accounts you accessed from China.
    • Monitor accounts and devices for any activity that is out of the ordinary and consult an IT professional if you have concerns.


    This content originally appeared on Committee to Protect Journalists and was authored by Committee to Protect Journalists.

    This post was originally published on Radio Free.