Category: Technology

  • Workers in Dublin office claim US company used NDAs to try to stop them talking to Leo Varadkar

    Facebook has been accused of using nondisclosure agreements to try to build a “wall of secrecy” and prevent its moderators from discussing working conditions with Leo Varadkar, the Irish tánaiste (deputy PM).

    The moderators claim that Facebook warned them they could not break a nondisclosure agreement (NDA) they had signed with the company during discussions with Varadkar, and warned them that any discussion of their work outside the office would be treated as a disciplinary offence.

    Continue reading…

    This post was originally published on Human rights | The Guardian.

  • The company is strongly positioning the app as part of India’s self-reliant journey

    This post was originally published on The Asian Age | Home.

  • Amazon is bringing on a set of well-trained union suppression consultants in its high-profile fight to keep its massive warehouse workforce free of organized labor.

    The Seattle-based conglomerate recently retained a consultant named Russell Brown to help thwart the union election that began recently at its fulfillment center in Bessemer, Alabama, new disclosures show.

    Brown was brought on by Amazon on January 25 for a contract to help persuade Amazon’s Alabama employees not to join the Retail, Wholesale and Department Store Union (RWDSU), a union that is affiliated with the United Food and Commercial Workers, also known as the UFCW. He is paid $3,200 per day, plus expenses, for the work.

    Brown is the head of RWP Labor, which touts itself as a specialty firm that assists companies in “maintaining a union free workplace.” The company features a team of consultants that includes a former International Brotherhood of Teamsters trainer who now assists corporations with defeating union campaigns. The firm brags that it has won many previous anti-union drives and specializes in training company leaders, persuading employees, and developing corporate social responsibility plans devised to prevent union interference.

    Amazon did not immediately respond to a request for comment.

    Brown also serves as the president of the Center for Independent Employees, a think tank that has received funding from the billionaire Koch network that routinely lobbies to weaken the political power of labor unions.

    The vote at the Bessemer warehouse could be pivotal. If a majority of the 5,800 workers at the facility, located in the suburbs outside Birmingham, vote to join the union, they will form Amazon’s first unionized facility in the U.S.

    The vote at the Bessemer warehouse could be pivotal.

    The Seattle-based conglomerate has worked furiously to derail the effort. In recent weeks, Amazon has sent mass texts to workers warning them against voting to join the union, set up an anti-union website, and sponsored Facebook ads urging workers to vote “no.”

    The RWDSU union has said that Amazon has also enrolled workers into “classes” in which instructors have attempted to scare workers into the dangers of unionization, with false claims that unionization may decrease wages. According to a report from Wired, when workers challenged these claims, some were “called to the front of the room where their badges were photographed,” in an apparent attempt at intimidation.

    The company also lost a bid to compel the union election to be held in person, a demand viewed widely as an attempt to hold last-minute coercive meetings to discourage union support. Election ballots were mailed to workers last Monday for a process that will continue over the next several weeks.

    Brown, records show, has several decades of anti-union consulting work. He has served similar roles in persuading employees not to join a union on behalf of UPS, General Electric, Krispy Kreme, Kumho Tire, ProPacific Fresh, and the St. Joseph Regional Medical Center hospitals, among other clients.

    Through the Center for Independent Employees, Brown is also active in high-profile labor policy debates. Brown participated in lobby events to oppose the Protecting the Right to Organize Act, the keystone labor rights bill advanced by labor advocates in Congress to help gig industry workers better obtain health care and minimum wage rights. In recent years, he has routinely appeared on coalition letters supporting Republican priorities, including the appointment of Amy Coney Barrett to the Supreme Court.

    The labor movement has fallen short in many of its recent high-profile attempts to organize major employers in the South. A contentious fight in 2014 at Volkswagen’s Chattanooga, Tennessee, plant ended in defeat for the United Auto Workers. Three years later, Boeing workers roundly rejected a labor organizing drive at a 787 aircraft assembly factory in North Charleston, South Carolina.

    But shifting public opinion around the importance of basic rights at work, shaped in part by the coronavirus pandemic and the shift to more online organizing tactics, has created a unique opportunity for Bessemer workers. Organizers have countered Amazon’s anti-union messages on social media, and mobilized testimonials from workers attesting to the unfair working conditions at the fulfillment center. Many workers have complained bitterly about Amazon’s alleged refusal to take concerns around health and safety seriously and have said that the company has pressed them to the breaking point with constant surveillance and productivity demands. 

    The post Amazon Hired Koch-Backed Anti-Union Consultant to Fight Alabama Warehouse Organizing appeared first on The Intercept.

    This post was originally published on The Intercept.

  • The microblogging platform also noted that safety of its employees is a ‘top priority’

    This post was originally published on The Asian Age | Home.

  • Zaka Mohsin, Riyadh,

    The Future Investment Conference in the capital Riyadh discussed about the launch of other industrial projects as well as the ongoing project of the fastest hyper loop.

    Saudi Arabia, is set to become the first country in the world to introduce hyper loop technology, which will enable high-speed travel from Riyadh to Jeddah in just 46 minutes.

    High-speed hyper loop technology will make Riyadh one of the world’s 10 largest urban economies, this is the part of Saudi Crown Prince Mohammed bin Salman vision. Riyadh could easily become a hub for global hyper loop technology, says Josh Giggle, founder and chief technology officer of Hopper Loop and it will creates thousands of jobs for locals.

    Once this technology is successful in the country, then this skill can be exported all over the world. After the completion of Hyper Loop technology, people will be able to travel from Riyadh to Jeddah in just 46 minutes.

    This post was originally published on VOSA.

  • The killing of George Floyd last May sparked renewed scrutiny of data-driven policing. As protests raged around the world, 1,400 researchers signed an open letter calling on their colleagues to stop collaborating with police on algorithms, and cities like Santa Cruz, New Orleans, and Oakland variously banned predictive policing, facial recognition, and voice recognition. But elsewhere, police chiefs worked to deepen partnerships with tech companies, claiming that the answer to systemic bias and racism was simply more data.

    In her new book, “Predict and Surveil: Data, Discretion, and the Future of Policing,” sociologist Sarah Brayne slays that assumption with granular detail. An assistant professor at the University of Texas at Austin, Brayne did months of fieldwork at the Los Angeles Police Department and other law enforcement agencies in the area, tagging along as cops used software from Palantir, PredPol, and other companies. She learned that software vendors routinely show up at the department to peddle their wares, like pharmaceutical representatives visiting doctors’ offices. She noted how police used an automated license plate reader mounted outside an emergency room to build out networks of victims’ associates. A sergeant explained that family or friends would often drop off an injured person and then speed away. With the automated license plate reader, he said, police could use plate numbers to determine who else was connected to the victim, even if there was no other evidence linking them to a crime.

    Riding along in department helicopters, Brayne saw how data was used to justify extreme measures. In order to get a reduction in crime in one division, police concluded that they had to fly helicopters overhead 51 times per week. They often increased that to 80 to 90 flyovers for good measure, meaning that many residents’ days were regularly interrupted by the noise of buzzing choppers. The cops seemed to register the intrusion. They dubbed the copters “ghetto birds.”

    Predict-and-Surveil-jacket

    Image: Courtesy Oxford University Press

    For years, scholars and activists have critiqued the algorithms used in data-driven policing, arguing that they merely techwash bias by making sloppy investigative work seem objective. Leading the charge in Los Angeles is the Stop LAPD Spying Coalition. Through public records requests, the group’s activists have obtained documents on police use of data analytics, and in 2018, they successfully pushed the city’s Office of the Inspector General to audit the department’s use of technology. “Surveillance is basically the tip of the policing knife,” said Hamid Khan, a co-leader of the coalition. “When you look at policing and the history of policing, from our vantage point, it’s not about public safety when it comes to nonwhite folks. It’s about the content to cause harm.” Big data, he added, simply gives police more ways to do that.

    Brayne’s contribution is showing exactly how data is distorted in the hands of police. “Most sociological research on criminal justice has focused on those who are being policed,” she told The Intercept. “I very deliberately wanted to flip the lens to focus on those doing the surveilling — on the police themselves.”

    Andrew Guthrie Ferguson, a law professor at American University and author of “The Rise of Big Data Policing: Surveillance, Race, and the Future of Law Enforcement,” said that Brayne’s work is an unflinching look at what happens when people in power use emerging technologies. “Her book is a completely original inside look at the development of big data surveillance at the height of the first generation of its adoption,” he said. “Sarah has been given access to the reality of big data policing in a way that no one else has — and probably, because of her success, no one else ever will.”

    Los Angeles, CA - October 24: LAPD Captain Elizabeth Morales speaks during an interview about using predictive policing zone maps with the Los Angeles Police Department in the LAPD Foothill Division on Monday, October 24, 2016 in the Pacoima neighborhood of Los Angeles, CA. (Photo by Patrick T. Fallon for The Washington Post via Getty Images)

    LAPD Captain Elizabeth Morales shows a printed map of predicted crime hot spots in the Foothill Division of Los Angeles, Calif., on Monday, October 24, 2016.

    Photo: Patrick T. Fallon for The Washington Post via Getty Images

    Operation LASER

    Brayne first embedded with the department in 2013 as a 27-year-old graduate student. It was a critical moment for policing tech, and the LAPD and other departments were ramping up their use of technology. The LAPD had signed on with Palantir Gotham, which merges data from crime and arrest reports, automated license plate readers, rap sheets, and other sources. The department also had a contract with PredPol, which generates “boxes,” or hot spots, where property crimes like burglaries and auto theft are predicted to occur. A third program, Operation LASER, which stands for Los Angeles’ Strategic Extraction and Restoration program, used a points-based system, called a LASER score, to evaluate the risk that individuals posed.

    In Brayne’s first interview, a captain boasted that the LAPD was at the forefront of technology adoption, detailing how software that had been developed for counterterrorism work was helping the department ward off future crimes. Afterward, Brayne asked to go on a ride-along with an officer. That trip revealed a more complicated picture. Instead of pulling up PredPol’s software on the laptop mounted to his dashboard, the cop worked with a printout of PredPol’s hot spots. He explained that the department’s in-car laptops had trouble loading even standard internet browsers. So much for technological wizardry.

    Brayne and the officer took a break to eat In-N-Out burgers under a highway overpass, where they watched his colleagues bust up a grow operation and drag marijuana plants onto a flatbed truck. Then when they drove to a new location, Brayne noticed that the officer typed in his address manually, rather than let the car’s automatic vehicle tracker register his location. The union opposed officers being tracked, he explained. While predictive policing systems had caught average citizens in an opaque dragnet, police grew squeamish when the technology was turned back on them.

    The notion that better technology can fix policing dates to at least the early 20th century. Back then, police departments were closely tied to city government political machines. Arguing that a data-driven approach would make policing more professional, reformers introduced tactics drawn from military operations, including signal boxes, telephone kiosks, and pin mapping. The militarization of police accelerated during the 1960s and has continued to the present day, to the point where even departments in placid American suburbs now have armored vehicles, night vision viewers, and bayonets.

    “That’s a very visible manifestation of the militarization of policing,” said Brayne. “But something that’s more invisible is this creep of surveillance software into the daily operations of policing.”

    Starting this month, one of the nation's major military contractors is outfitting Los Angeles County Sheriff Dept.'s patrol cars with sophisticated computer systems and hi?tech gadgetry that the company perfected for the battlefield. The installation is taking place at the Sybil Brand Institute. All the vehicles will be outfitted with Panasonic Toughbook laptop computers.  (Photo by Michael Robinson Chavez/Los Angeles Times via Getty Images)

    A Los Angeles County Sheriff’s Department’s patrol car, outfitted with a computer system developed for the battlefield by a military contractor, is seen in Los Angeles on Nov. 16, 2011.

    Photo: Michael Robinson Chavez/Los Angeles Times via Getty Images

    After 9/11, the Department of Homeland Security gave state and local police $35 billion in grants, a portion of which was spent on developing data infrastructure. The infusion of cash created needs where there had been none. Police chiefs realized that the data they collected for Homeland Security could also be used for regular policing. In Los Angeles, some officials came to believe that predictive analytics and big data might also solve the department’s many problems. The LAPD had been racked by a stream of high-profile scandals, most infamously the 1991 beating of Rodney King. In 2001, the Department of Justice imposed a consent decree, a court order mandating that the department conduct regular audits and capture more data on officers and crimes. (A spokesperson for the LAPD declined to comment for this article.)

    A key figure behind the shift toward predictive policing was William Bratton, who brought the data management system COMPSTAT to New York City before becoming the chief of the LAPD in 2002. Bratton oversaw the LAPD’s effort to merge various streams of data.

    One result was Operation LASER, which was funded with nearly a million dollars from the federal Bureau of Justice Assistance. When they came into contact with someone who seemed suspicious, officers filled out a card with the person’s name, address, physical characteristics, vehicle information, gang affiliation, and criminal history. Each new point of contact with police earned a person one additional point. “There are a lot of chickenshit violations you can stop someone for,” a sergeant explained to Brayne during a ride-along. “Yesterday, this individual might have got stopped because he jaywalked. Today, he might have got stopped because he didn’t use his turn signal or whatever the case might be. So that’s two points.” The sergeant went on to argue that even such minor violations could help police predict the next crime because, taken together, they show “who is out on the streets.”

    Such a system means, of course, that individuals in overpoliced neighborhoods can easily get caught up in a vicious cycle where they are, as Brayne writes, “more likely to be stopped, thus increasing their point value, justifying their increased surveillance, and making it more likely that they will be stopped again in the future.” But some of the administrators whom Brayne encountered were apparently less interested in accuracy than they were in amassing more records. The goal, one captain told her, was simply to get people “in the system”: to capture larger and larger amounts of data on seemingly harmless individuals in the hope that the data would help solve a crime later on. Once an officer had a person in the system, they could set an alert to automatically track changes in that person’s profile.

    Brayne watched Los Angeles police fill out cards for Operation LASER and noted that they often listed the people who were with a person when they were stopped. She calls this a “secondary surveillance network.” You don’t actually need to have contact with police to be caught up in the system; you just need to have had contact with someone who did. Similarly, Brayne learned that images captured by automated license plate readers sometimes showed the faces of people who were stopped with a person of interest. Those people too became data. When Brayne raised the issue of possible legal constraints around the rampant collection and sharing of information, an employee in the Los Angeles County Chief Information Office declared bluntly, “Consent is anachronistic.”

    In some cases, even being the subject of a query can boost someone’s suspiciousness. Brayne watched one detective search a national database for a juvenile. He remarked that he could see how many times other users had queried the same name. He claimed that the feature had helped police catch criminals because it told them other officers had suspected the same individual. When Brayne asked why that was useful, he replied, “Just because you haven’t been arrested doesn’t mean you haven’t been caught.”

    Decades of research and years of cellphone videos have shown, of course, that police regularly target people who haven’t committed crimes. On ride-alongs, Brayne watched cops run the plates of law-abiding drivers stopped at traffic lights, just in case the numbers turned up a record. But the anecdote underscores how thoroughly big data reinforces existing police biases. One captain claimed, “It’s just math.”

    A banner displays Palantir Technologies Inc. signage during the company's initial public offering (IPO) in front of the New York Stock Exchange (NYSE) in New York, U.S., on Wednesday, Sept. 30, 2020. Shares of Palantir Technologies, a data mining company co-founded by technology billionaire Peter Thiel, opened trading today on the New York Stock Exchange at $10 after the company sold shares to investors in a direct offering. Photographer: Michael Nagle/Bloomberg via Getty Images

    A banner displays Palantir signage during the company’s initial public offering in front of the New York Stock Exchange on Sept. 30, 2020, in New York.

    Photo: Michael Nagle/Bloomberg via Getty Images

    The World According to Palantir

    In Brayne’s fieldwork, Palantir’s technology came in for special praise. “They catch bad guys during every training class,” one sergeant told her. A captain rhapsodized about the platform’s constant addition of new data sets, marveling at the addition of foreclosure information: “I’m so happy with how big Palantir got.” Another said of Palantir, “We’ve dumped hundreds of thousands [of dollars] into that. They are so responsive and flexible about what we want. They’re great. They’re going to take over the world. I promise you, they’re going to take over the world.”

    But up close, the software was only as good as the people maintaining and using it. To make sense of Palantir Gotham’s data, police often need input from engineers, some of whom are provided by Palantir. At one point in her research, Brayne watched a Palantir engineer search 140 million records for a hypothetical man of average build driving a black four-door sedan. The engineer narrowed those results to 2 million records, then to 160,000, and finally to 13 people, before checking which of those people had arrests on their records. At various points in the search, he made assumptions that could easily throw off the result — that the car was likely made between 2002 and 2005, that the man was heavy-set. Brayne asked what happened if the system served up a false positive. “I don’t know,” the engineer replied.

    There were dissenters. Some of the people tasked with implementing data-driven policing at the LAPD complained to Brayne that the software didn’t work as advertised. One person working in information technology said, “Our command staff is easily distracted by the latest and greatest shiny object.” Data integration was uneven. Some divisions had certain software, while others didn’t. Another employee told Brayne that the detective case management system was “sort of like a pimple,” adding, “they just, like, stuck it on top.”

    When management was out of the room, police were honest about their doubts. “Looks bitching, but it’s worthless,” one sergeant told Brayne of the LAPD’s data analysis infrastructure, which is housed at the department’s Real-Time Analysis and Critical Response Division. One group of officers bought their captain a Ouija board to mock his faith in algorithms. A captain told Brayne that person-based predictive policing was “a civil liberties nightmare” and that he would never adopt it. (His division adopted it after he left.)

    Activists who have fought for years against department use of technology told The Intercept that Brayne’s work is useful — but only to a point. “It was very helpful to uncover and learn about the extensive amounts of stuff that LAPD was doing,” said Jamie Garcia, an organizer with Stop LAPD Spying. “But then what?” In general, she added, she is tired of academics treating surveillance like a problem to observe and evaluate. “The information goes back to the ivory tower, and the ivory tower has this conversation with themselves about what they think about it instead of that information being brought directly to the community.”

    Brayne said that she hopes her work can be useful to a broad variety of people. “Transparency is the first step towards accountability,” she said. “It is impossible to hold an individual or organization accountable if you don’t know what they’re doing.”

    Forrest Stuart, a sociologist at Stanford who studies policing, said that her book is essential at a moment when anti-racism protests have prompted some law enforcement officials to further embrace technology as a means for reducing bias. “Some of the most popular proposed solutions to the over-policing and over-incarceration of black and brown communities have involved new technologies,” he wrote in an email. “There is a sense that if we could just design a good enough computer program, we could deploy police more fairly and reduce, or perhaps even eliminate, unwarranted disparities in criminal justice. Brayne’s book makes us take real pause and recognize the faults in this techno-optimist dream.”

    The LAPD ended its contract with PredPol last April, citing financial constraints brought on by the pandemic. Operation LASER ended in 2019. But a range of other companies, including heavyweights like Amazon and Microsoft, have moved into the space nationally, and a guidebook published by the LAPD last year makes clear that big data will continue to prominently figure in policing in Los Angeles. Palantir, meanwhile, has lately expanded its access to data by moving into coronavirus tracking and vaccine safety analysis. Last year, the company brokered lucrative contracts with the National Institutes of Health and the Food and Drug Administration. It went public in September. Since then, its stock prices have more than tripled.

    The post How the LAPD and Palantir Use Data to Justify Racist Policing appeared first on The Intercept.

    This post was originally published on The Intercept.

  • Our latest report, False Accusation: The Unfounded Claim that Social Media Companies Censor Conservatives, debunks the myth that the political right is suppressed online and recommends that the platforms make their content moderation practices more transparent.

    This post was originally published on Press and Publicity – NYU Stern Center for Business and Human Rights.

  • The company said Airtel 5G is capable of delivering 10x speeds, 10x latency and 100x concurrency when compared to existing technologies

    This post was originally published on The Asian Age | Home.

  • The survey conducted around Whatsapp new proposed policy across the country covering over 17,000 respondents

    This post was originally published on The Asian Age | Home.

  • The move comes as Facebook wrangles with whether Trump’s suspension from the network for ‘fomenting insurrection’ should stand

    This post was originally published on The Asian Age | Home.

  • Apple made the software upgrades available Tuesday, adding a rare note suggesting it was a serious threat

    This post was originally published on The Asian Age | Home.

  • Pacific Media Watch newsdesk

    Reporters Without Borders (RSF) has condemned the arbitrary and opaque experiments that Google is conducting with its search engine in Australia, with the consequence that many national news websites are no longer appearing in the search results seen by some users.

    The Australian, ABC, Australian Financial Review, The Age, The Guardian Australia and The Sydney Morning Herald are among the media outlets that have not appeared in the search results of around 1 percent of Australian users since January 13, the date on which Google admits that it began its “experiments”.

    The experiments are supposedly intended to measure the correlation between media and Google search and are due to end at the start of February.

    Neither the media outlets nor Google search users were notified in advance of the consequences of the experiments, namely that they would be deprived of their usual access to many news sources.

    “The platforms must stop playing sorcerer’s apprentice in a completely opaque manner,” said Iris de Villars, the head of RSF’s Tech Desk.

    “Most Australians use Google to find and access online news, and these experiments confirm the scale of the power that platforms like Google exercise over access to online journalistic content, and their ability to abuse this power to the detriment of the public’s access to information.

    “They have a duty to be transparent and to inform their users, a duty that is all the greater in the light of the impact that the current and future experiments can have on journalistic pluralism.”

    Thousands of tests every year
    Google conducts tens of thousands of tests on its search engine every year.

    The experiments that Google and other platforms carry out usually test design changes, algorithmic modifications or new functionalities on some of their users in order to study how they behave and to guide future changes.

    This is not the first time one of these experiments has impacted on journalistic pluralism.

    Facebook, for example, tested a new functionality called “Explore” in six countries – Bolivia, Cambodia, Guatemala, Serbia, Slovakia and Sri Lanka – from October 2017 to March 2018.

    This experiment, in which independent news content was quarantined in a not-very-accessible secondary location, had a disastrous impact on journalistic pluralism in these countries, with traffic to local media outlets falling dramatically.

    In Cambodia, many citizen-journalists lost a large chunk of their readers, with the result they had to pay to restore traffic to their sites.

    Google’s experiments in Australia have come at a time of tension between the platforms and the Australian government, which has a proposed new law, called the News Media Bargaining Code, under which platforms such as Google and Facebook would have to share advertising money with media companies.

    The two tech giants have reacted to the proposal with hostility. Facebook has said it would prevent Australian media outlets and users from sharing journalistic content on its Facebook and Instagram platforms, while Google has added a pop-up message to its search results warning Australian users that “your search experience will be hurt by new regulation”.

    When asked about the details of these experiments, their purpose and about transparency towards media outlets and users, Google just referred RSF to an existing, general press release.

    Pacific Media Watch collaborates with Reporters Without Borders.

    This post was originally published on Radio Free.

  • Pacific Media Watch newsdesk

    Reporters Without Borders (RSF) has condemned the arbitrary and opaque experiments that Google is conducting with its search engine in Australia, with the consequence that many national news websites are no longer appearing in the search results seen by some users.

    The Australian, ABC, Australian Financial Review, The Age, The Guardian Australia and The Sydney Morning Herald are among the media outlets that have not appeared in the search results of around 1 percent of Australian users since January 13, the date on which Google admits that it began its “experiments”.

    The experiments are supposedly intended to measure the correlation between media and Google search and are due to end at the start of February.

    Neither the media outlets nor Google search users were notified in advance of the consequences of the experiments, namely that they would be deprived of their usual access to many news sources.

    “The platforms must stop playing sorcerer’s apprentice in a completely opaque manner,” said Iris de Villars, the head of RSF’s Tech Desk.

    “Most Australians use Google to find and access online news, and these experiments confirm the scale of the power that platforms like Google exercise over access to online journalistic content, and their ability to abuse this power to the detriment of the public’s access to information.

    “They have a duty to be transparent and to inform their users, a duty that is all the greater in the light of the impact that the current and future experiments can have on journalistic pluralism.”

    Thousands of tests every year
    Google conducts tens of thousands of tests on its search engine every year.

    The experiments that Google and other platforms carry out usually test design changes, algorithmic modifications or new functionalities on some of their users in order to study how they behave and to guide future changes.

    This is not the first time one of these experiments has impacted on journalistic pluralism.

    Facebook, for example, tested a new functionality called “Explore” in six countries – Bolivia, Cambodia, Guatemala, Serbia, Slovakia and Sri Lanka – from October 2017 to March 2018.

    This experiment, in which independent news content was quarantined in a not-very-accessible secondary location, had a disastrous impact on journalistic pluralism in these countries, with traffic to local media outlets falling dramatically.

    In Cambodia, many citizen-journalists lost a large chunk of their readers, with the result they had to pay to restore traffic to their sites.

    Google’s experiments in Australia have come at a time of tension between the platforms and the Australian government, which has a proposed new law, called the News Media Bargaining Code, under which platforms such as Google and Facebook would have to share advertising money with media companies.

    The two tech giants have reacted to the proposal with hostility. Facebook has said it would prevent Australian media outlets and users from sharing journalistic content on its Facebook and Instagram platforms, while Google has added a pop-up message to its search results warning Australian users that “your search experience will be hurt by new regulation”.

    When asked about the details of these experiments, their purpose and about transparency towards media outlets and users, Google just referred RSF to an existing, general press release.

    Pacific Media Watch collaborates with Reporters Without Borders.

    This post was originally published on Asia Pacific Report.

  • The central government told that Indian users were being ‘unilaterally’ subjected to the change in privacy policy by WhatsApp

    This post was originally published on The Asian Age | Home.

  • Preliminary enquiry showed that GSR had created an app, authorised by Facebook to collect specific user datasets for research in 2014

    This post was originally published on The Asian Age | Home.

  • The parasitic seizure of social wealth by the rich has intensified in recent years and promises to increase in 2021. While the stock market soars to artificial new heights, the productive sector of the economy continues to steadily disintegrate, leaving the financial oligarchy with fewer options to maximize profit over time. This in turn is causing the rich to engage in more stock market gambling, private lending, bankruptcies, and restructuring of the state in order to funnel more public funds into private hands (e.g., through more “public-private-partnerships”). As the law of a falling rate of profit invariably intensifies, the nexus between the rich and the state will become more critical to analyze in the months and years ahead. Left unchallenged, state-organized corruption to pay the rich will be strengthened well beyond 2021, leaving society, the economy, and the environment worse off, and making it harder for the New to emerge.

    In the sphere of education, given the increased obsession with technology and screen-based instruction, the rich are more aggressively striving to seize public funds, impose user fees, and maximize profits through a dramatic expansion of “virtual learning,” especially through cyber charter schools, which have consistently low graduation rates and are regarded by many as a scam. The rich are extremely eager to commodify as many students as possible, at home and abroad. To be sure, the charter school phenomenon is reducing more and more students, parents, and teachers to fend-for-yourself consumers entangled in commodity logic, which in turn degrades the integrity of human relationships and lowers the level of education. It is bad news for education, society, the economy, and nation-building. Even the staunchest supporters of screen-based instruction admit that the in-person classroom experience is superior to buffered digital learning where one sits for endless hours behind a screen gradually developing a range of health problems. For nearly a year, students, educators, and parents have complained about how counterproductive, restrictive, and inferior screen-based learning is. Many say that it is isolating, alienating, and a far cry from the rich organic human connections that developed naturally and spontaneously before the “COVID Pandemic.”

    The rich are energetically using the “COVID Pandemic” as a pretext to maximize profit in many ways. To this end, they have maximized the “fear virus” to pressure and compel parents to send their children to cyber charter schools. The intimate connection between fear and thought paralysis is critical to appreciate here because intense fear can stop reason, logic, and coherence instantly, giving rise to major cognitive distortions, which is dangerous for everyone. Today, the critical thinking faculties of many are overwhelmed by fear and paranoia.1  Many parents naturally want what is safest for their children. That is normal. At the same time, one result will be a rude awakening for many parents who send their children to virtual charter schools. Many will experience firsthand the inferior educational experience provided by poor-performing virtual charter schools frequently mired in scandal.

    Pointing to the massive profit potential in “virtual learning,” on December 31, 2020, The Courier carried the following article with the revealing title, “Virtual Schools Market to Receive Overwhelming Hike in Revenues by 2025.” The article highlights the “Global Virtual Schools Market” report and assures major owners of capital that the virtual learning sector “is anticipated to witness significant growth during the forecast period from 2020 to 2025” (emphasis added).

    The expansion of “virtual learning” and cyber charter schools is certainly not driven by grass-roots forces or a desire to raise the level of education so as to serve the general interests of society. The report, which costs $3,500, is geared explicitly toward “stakeholders, investors, product managers, and marketing executives.” It stresses that for-profit Education Management Organizations and non-profit Education Management Organizations (EMOs) are the two main types of virtual schools to profit from. EMOs are private organizations that include cyber charter schools and brick-and-mortar charter schools. Both types of charter schools are governed by unelected individuals, plagued by fraud and corruption, and have a long record of failure and closure. Both kinds of charter schools rest on the ideologies of consumerism, individualism and the “free market,” which contradict the basic premises underlying a modern conception of human rights and social responsibility.

    Commodity logic saturates every page of the “Global Virtual Schools Market” report which makes it clear that major owners of capital need to go global in their efforts to cash in on kids. A main purpose of the business-centric report is to strategically guide major owners of capital in ways that will allow them to best use kids to maximize profits. Owners of capital will learn how to “channelize their efforts and investments to maximize growth and profitability,” says the report.

    The “top players” in the global “virtual learning” market include:

    Aurora College, Beijing Changping School, K12 Inc, Florida Virtual School (FLVS), Pansophic Learning, Illinois Virtual School (IVS), Connections Academy, Charter Schools USA, Mosaica Education, Acklam Grange, N High School, Alaska Virtual School, Lincoln Learning Solutions, Inspire Charter Schools, Basehor-Linwood Virtual School, Virtual High School(VHS), Abbotsford Virtual School & Wey Education Schools Trust.

    The biggest market remains the U.S.

    Many are wondering how the detrimental effects of the lowering of the level of education through “virtual learning” are going to affect the abilities, skills, competencies, and dispositions of future students, not to mention the future of society. Can a modern society based on mass industrial production be built and sustained on the basis of a privatized and commercialized virtual learning system designed to maximize profits as fast as possible for a tiny ruling elite? Can the healthy extended reproduction of society be guaranteed by a generation of screen-based “learners” with little real-life practical in-the-field experience? Major owners of capital are not only unconcerned about this, they are also striving to commercialize everything around and connected to “virtual learning” (e.g., auxiliary services and products). Everything is to be commodified. Everything is to be converted to an exchange-value. The logic of buying and selling is to overwhelm and eliminate a modern theory of human rights and social responsibility.

    Many thought that 2020 was perhaps one of the worst years ever for humanity. In many ways it was. The chaos, anarchy, and violence of an outmoded economic and political system revealed itself extra sharply during the “COVID Pandemic.” Unfortunately, 2021 and beyond is likely to make 2020 look like a trivial speed bump along the way to greater tragedies for people worldwide. More mayhem lies ahead and neoliberals and privatizers are not standing passively on the sidelines. They are moving forward rapidly with self-serving schemes in many spheres, including education, which will lead to further destruction in those spheres.

    But it does not have to be this way. The human spirit is resilient and an alternative to the retrogressive status quo is both possible and necessary. Neoliberal wrecking does not have to be tolerated. People do not have to stand silently on the sidelines as the rich and their entourage destroy the social and natural environment. Much can be accomplished when the weight, organization, and numbers of people are put behind pro-social struggles. The rich are not invincible and do not have full control of life, history, and humanity. They do not always get their way. Many of their retrogressive agendas and policies have been restricted or blocked successfully by humanity in the past. Their pragmatism, megalomania, and convoluted machinations are actually weaknesses that can be exploited.

    Technology can and should play an important role in education and other spheres but only when it is driven by a human-centered aim and outlook, only when it is wielded in the public interest, and only when privileged private interests are deprived of all control of that which concerns the common good. The common good and unlimited greed for private interests have nothing in common. How technology is used and for what end is something that people themselves must decide, without the interference of privileged private interests who seek only to maximize profit with impunity.

    1. According to WebMD, the overall Covid-19 recovery rate is between 97% and 99.75%.

    The post Cyber Charter Schools: Neoliberals Determined to Commodify More Students first appeared on Dissident Voice.

    This post was originally published on Radio Free.

  • The policy change was originally scheduled to come into effect on February 8, the Facebook-owned company said

    This post was originally published on The Asian Age | Home.

  • Pacific Media Watch newsdesk

    In the wake of Twitter’s decision to shut down President Donald Trump’s accounts for good, Reporters Without Borders (RSF) has proposed ways to avoid allowing the tech giants to retain the power to decide whether social media accounts should be closed.

    After overlooking the fake news and hate speech that Trump posted throughout his four years as US president, Twitter unilaterally decided on 8 January 2021 to permanently close his  @realDonaldTrump account and then, a few days later, 70,000 other accounts linked to the pro-Trump QAnon movement.

    Facebook, Instagram and Twitch also suspended the presidential accounts for an unspecified period, while Amazon then suspended the pro-Trump social media Parler.

    All of these decisions were taken by private-sector companies without any democratic or judicial control, reports RSF.

    “We live in a political dystopia,” RSF secretary-general Christophe Deloire said. “The laws of the public arena used to be established by parliaments and enforced by judges, but private-sector corporations are now in charge.

    Their norms are not defined within a democratic framework with checks and balances, they are not transparent and you cannot appeal to any court before they are carried out.

    The organisation of the online public arena should not be left to market forces or individual interests. We must impose democratic obligations on the leading digital players.”

    Concrete proposals
    In Europe, the Digital Services Act unveiled by European Commissioner Thierry Breton in December aims to regulate content posted on platforms and offers notable advances.

    Many other legislative initiatives are also under discussion such as the revision of Section 230 in the United States, the Online Harms Bill in the United Kingdom and the Digital Charter in Canada.

    But, so far, no legislation addresses all of the challenges posed by the digital public arena.

    It was to propose democratic safeguards for the digital arena that RSF launched the information and democracy initiative:

    • The Commission on Information and Democracy, consisting of 25 prominent persons of 18 nationalities, drafted a Declaration establishing general principles for the global online information and communication space – algorithmic transparency, pluralism, platform ideological neutralism, prohibition of conflicts of interest and promotion of reliable news and information.
    • This declaration inspired the Partnership on Information and Democracy, which was launched during the UN General Assembly in 2019 and which 38 governments have so far joined.
    • The Forum on Information and Democracy was created in November 2019 by 11 organisations, research centres and think-tanks based in all continents. In November 2020, it published 250 recommendations on platform transparency, content moderation, the promotion of the reliability of information, and messaging apps when their massive use goes beyond the bounds of private correspondence.
    • RSF was also behind the Journalism Trust Initiative (JTI), which is producing a set of machine-readable standards so that search engine algorithms can give preference to media that adhere to journalistic methods and ethics. These standards, which can also be used by advertisers, are the result of a self-regulatory initiative in which entities from all over the world collaborated under the aegis of the European Committee for Standardisation (CEN).

    Systemic change
    In a news and information arena from which intermediaries have been eliminated, politicians, celebrities, corporations, religious groups and other players are currently able to address their public directly without being held accountable to any ethical standards, while the media have continued to operate according to all of their traditional obligations.

    But now, the suspension of Donald Trump’s social media accounts has spotlighted the crucial issue of the most powerful accounts.

    In an op-ed piece published in the French daily Le Figaro on January 12, RSF secretary-general Christophe Deloire, who also chairs the Forum on Information and Democracy, says social media accounts exceeding certain (direct or indirect) audience thresholds should be subject to procedures and obligations appropriate to their audience and in accordance with general legal principles.

    Private-sector companies should not be allowed to determine the fate of such accounts on their own, acting without control or transparency.

    This post was originally published on Asia Pacific Report.

  • WhatsApp has made a mockery out of our fundamental right to privacy, the petition said

    This post was originally published on The Asian Age | Home.

  • Signal was downloaded by 17.8 million users over the past 7 days, a 62-fold rise from the prior week, according to data from Sensor Tower

    This post was originally published on The Asian Age | Home.

  • Ankara

    In its ongoing war against the US President Donald Trump and his Republican supporters, microblogging website Twitter Tuesday announced the permanent suspension of 70,000 accounts allegedly linked to QAnon’s far-right conspiracy theory since Friday.

    In 2019, the FBI designated QAnon as a domestic terror threat due to its potential to “incite extremist violence.”

    The company described the move as a step taken “to protect the conversation on our service from attempts to incite violence, organize attacks, and share deliberately misleading information about the election outcome,” following the last week’s “horrific events” in Washington, D.C. where hundreds of Trump supporters stormed the Capitol building.

    Many instances of a single individual operating numerous accounts have been detected, Twitter said.

    Following the Jan. 6 breach of the Capitol, Twitter warned in a blog post that “additional violations of the Twitter Rules would potentially result in this very course of action.”

    The social media platform also permanently suspended outgoing US President Donald Trump’s account, @realDonaldTrump, due to the “risk of further incitement of violence” a move followed by Instagram and Facebook.

    Trump is accused by Democrats of inciting supporters to halt Congress from confirming President-elect Joe Biden’s electoral victory.

    On Monday, Secretary of State Mike Pompeo slammed the controversial move by American tech companies and social media platforms.

    “Censorship, wokeness, political correctness it all points in one direction: authoritarianism cloaked as moral righteousness, similar to what we’re seeing in Twitter and Facebook and Apple and on too many university campuses today. It’s not who we are,” Pompeo said at Voice of America.

    This post was originally published on VOSA.

  • The NZ Reserve Bank says it is investigating the breach, which may have exposed “commercially and personally sensitive information”. Image: Alexander Robertson/RNZ

    By RNZ News

    A cyber security expert says attacks like the latest on the Reserve Bank could be due to the type of data systems they are using.

    The Reserve Bank revealed yesterday a third party file sharing service it uses, which contains some sensitive information, had been hacked.

    It is the latest after a string of cyber attacks in the past year targeting several major organisations in New Zealand, including the NZ Stock Exchange – which had its servers knocked out of public view for nearly a week in August.

    Titanium Defence cyber security expert Tony Grasso, who was the cyber lead at the Department of Internal Affairs, told Morning Report file sharing systems could weaken security.

    Grasso said there were still lots of questions about the breach to be answered.

    “The question that will be on my mind, and I’m sure this will be what they’re looking at is, who got in, how did they get in, and more importantly, what information has been taken from this file share, but more interestingly than that, have they got from the file share onto the bank systems internally?”

    However, he said it would be hard to say who could be behind the breach at this stage.

    Foreign intelligence agency?
    “You have to always keep in mind it may be a foreign intelligence national agency whenever something as big as the Reserve Bank … any government department within reason, you always have to have that at the back of your mind,” he said.

    “It would be interesting to find out how they were caught. Our detection systems here are good, if it’s one of those systems that have come from another government agency, a more sensitive government agency, that may indicate it was a foreign actor, or these days criminal gangs are getting together and they’ve become an industry on their own and are really good at getting into organisations.

    “Imagine the ransom you could put on the Reserve Bank if you encrypted all their data, for example.”

    Grasso hoped for a more detailed report from the Reserve Bank on who it could be.

    “The Americans are very good at saying ‘it was definitely a foreign government’ and they normally name them as well. It would be good to know if it was that, if it was a criminal organisation or if was it a just a lone wolf – we have loads of these in our industry.”

    The Reserve Bank said sensitive information “may” have been breached.

    The type of information exposed would depend on who the third party was, Grass said.

    Third party may be IT provider
    “A third party could be just an IT provider and they’re just sharing architecture documents, that would be bad of course. But it could be information around covid for example.

    “If they were working with external agencies about the recovery of the company from covid … it could be papers around how we’re planning for our recovery, I mean who knows.

    “I would hope that sensitive stuff like that isn’t held in a third party file server, I’m fairly sure it wouldn’t be.”

    He said even if its own systems were very secure, having a third party who was insecure connecting to the systems could bring a threat.

    Yesterday, Reserve Bank Governor Adrian Orr said they were investigating the breach with experts and authorities.

    “The nature and extent of information that has been potentially accessed is still being determined, but it may include some commercially and personally sensitive information.

    “It will take time to understand the full implications of this breach, and we are working with system users whose information may have been accessed. Our core functions remain sound and operational.”

    The Reserve Bank declined a request for an interview with Morning Report.

    This article is republished under a community partnership agreement with RNZ.

    Print Friendly, PDF & Email

    This post was originally published on Radio Free.

  • U.S. President Donald Trump uses his cellphone as he holds a roundtable discussion with governors in Washington, D.C., on June 18, 2020.

    Photo: Saul Loeb/AFP/Getty Images

    The swirling of the last dregs of the Trump administration around the drain has given some prominent Americans one last chance to prostrate themselves before the outgoing president. Facebook and Twitter’s decision to place the president in a temporary internet timeout following his incitement of a violent mob that trashed the U.S. Capitol is the perfect capstone to four years of appeasement and corporate cowardice.

    The advertising industry is generally acknowledged as one of the most risk-averse and craven industries on the planet, with decision-making guided largely by attempting to be as inoffensive as possible to as many people as possible, taking a position on an issue only in the weakest, safest, most carefully hedged terms available. Though companies like Facebook and Twitter hold the unfathomable power to control the distribution of information to billions of people around the world and like to think of themselves as helping bring humankind to some next level of consciousness, they are still very much in the advertising business.

    As advertising companies, cowardice runs deep in the souls of Twitter, Facebook, and Google, companies that have spent the past four years looking the other way, equivocating, and contorting themselves into pretzels in an attempt to justify Trump’s unfettered access to the most powerful information distribution system in world history. Despite perennial speculation in the press as to what might psychologically or ideologically explain Mark Zuckerberg and Jack Dorsey’s total unwillingness to meaningfully act, there is just one factor: money. Twitter and Facebook are only worth anything as businesses if they can boast to advertisers of their access to an enormous swath of the American market, across political and ideological lines, and fear of a right-wing backlash has been enough to keep Peter Thiel on Facebook’s board and Trump’s voter suppression dispatches on Twitter’s servers.

    According to a Facebook moderator who spoke to The Intercept on the condition of anonymity for fear of employer retaliation, watching the company drag its feet, yesterday in particular, has been excruciating. According to internal communications reviewed by The Intercept, the Capitol break-in is now considered, for purposes of Facebook’s willy-nilly application of the rules, “a violating event,” and any “praise,” “support,” or even friendly “representation” is banned on the basis of the company’s “Dangerous Organizations” policies, which this moderator explained is typically applied to posts celebrating terrorist attacks, drug cartel murders, and Aryan street gangs. The policy update was relayed to moderators, this source said, around 4:30 p.m. in Washington, by which point the Capitol had already been violently occupied for hours and a woman shot dead. Just today, as the broken glass is being swept up in the Capitol, Facebook blasted out another moderator update, informing them that the company was “internally designating” the entire United States as a “temporary high risk location,” which adds heightened restrictions to posts inciting violence, backdated to yesterday and effective through the end of Thursday.

    Fearful of Trump even on his shameful way out, Facebook did the bare minimum when it was too late to mean much.

    As some Facebook observers have pointed out, had the company cared to look, it could have easily found that its platform was being used to plan an event it would eventually categorize alongside the Lockerbie bombing. Instead, fearful of Trump even on his shameful way out, Facebook did the bare minimum when it was too late to mean much. “Facebook treated this event correctly but Facebook is also complicit in this event,” the moderator said. “It’s all so blatantly obvious.”

    The president’s past half-decade of incitement against the perceived ethnic enemies of his base have been met with nothing more than risible warning labels and worthless “fact checks,” as have his more recent efforts to dupe his already deeply confused supporters about the outcome of the 2020 presidential election. There’s no reason to believe these barely-there penalties did anything at all to chasten Trump or deter his message; their utility existed only to the companies themselves, who could no longer be accused of doing literally nothing. Just as Facebook put off acknowledging its role in the genocide in Myanmar until it was too late to matter, and just as the company built an election interference “war room” and quickly disbanded it after some photo ops, the recent decisions to mildly inconvenience the world’s most powerful living person when he has 13 days left in power is the perfect distillation of Big Tech’s attempt to pantomime principles, halfheartedly pointing to the void where a conscience would be.

    “Slightly more than literally nothing” has been the unifying theme of big tech’s response to years of public concern that Trump would eventually use the platforms to get people killed, and yesterday, as his most rabid supporters puttered around the Capitol aimlessly pushing over chairs and reading House Speaker Nancy Pelosi’s mail, represented the appeasement strategy’s ultimate failure: Four people are dead following a mob that Trump incited and directed. Hours after it would have made any difference, Facebook and Twitter, his two favorite platforms, did what they were previously unwilling to do: risk upsetting the president by temporarily restricting his ability to broadcast.

    In a stirring gesture of corporate bravery, Twitter put Trump in the penalty box for 12 whole hours, suggesting that if perhaps 8 people had been killed in the Capitol melee, or if he’d encouraged the mob to brawl its way into a second federal landmark, he may have gotten a whole day’s suspension. Facebook, also true to form, has banned Trump from posting “indefinitely,” a word that means absolutely nothing and will give the company the freedom to change its mind at any point in the future, in accordance with the shifting tides of governmental power and public opinion.

    This post was originally published on Radio Free.

  • The hacking campaign that infected numerous government agencies and tech companies with malicious SolarWinds software has also infected more than a dozen critical infrastructure companies in the electric, oil, and manufacturing industries who were also running the software, according to a security firm conducting investigations of some of the breaches.

    In addition to these companies, the SolarWinds software also infected three firms that provide managed services to critical infrastructure industries, says Rob Lee, founder and CEO of Dragos, which specializes in industrial control system security for critical infrastructure and whose company discovered some of the infections.

    The managed service providers, known in the industry as original equipment manufacturers or OEMs, sometimes have authorized remote access directly into critical parts of customer networks, as well as privileges that let them make changes to those networks, install new software, or even control critical operations. This means that hackers who breach such a provider can potentially use that provider’s credentials and access to control critical processes on their customers’ networks.

    “If an OEM has access to a network, and it’s bi-directional, it’s usually for more sensitive equipment like turbine control, and you could actually do disruptive actions,” Lee told The Intercept. “But just because you have access doesn’t mean you know what to do or how to do it. It doesn’t mean they can then flip off the lights; they have to do more after that.”

    But compromising an OEM does magnify the potential risks to multiple entities.

    “[I]t’s particularly concerning because … compromising one OEM, depending on where you compromise them, could lead to access to thousands of organizations,” Lee said. “Two of the … OEMs that have been compromised … have access to hundreds of ICS networks around the world.”

    “Compromising one OEM could lead to access to thousands of organizations.”

    He notes that in some cases the OEMs actually infected their customers with the SolarWinds software. Some of the OEMs use the SolarWinds software not just to manage and monitor their own networks, but they also have installed it on customer networks to manage and monitor those. And some of those customers weren’t aware the SolarWinds software was on their network, because it had been installed by their OEM as part of the OEM’s monitoring and maintenance package.

    Lee wouldn’t identify the OEMs and doesn’t know if the SolarWinds hackers took an interest in the providers and further compromised them to gain access to the customer networks they remotely manage.

    The SolarWinds software was compromised back in March; it installed a backdoor to provide an attacker access to the network of anyone who downloaded it in the last eight months. The backdoor, which security researchers at the security firm FireEye have dubbed SUNBURST, gathers information about the infected network then waits about two weeks before sending a beacon to a command-and-control server owned by the hackers, along with information about the infected network, to signal to them that the infected system is open for them to surreptitiously enter. The hackers would have used that network information to pick out high-value targets and determine which ones they wanted to burrow into further. Once inside an infected system and network, the hackers can download more malicious tools to it and steal employee credentials to gain access to more critical parts of the network to either collect valuable information or potentially to alter data or alter processes on those networks. Kevin Mandia, CEO of cybersecurity company FireEye, has said the attackers only entered about 50 of the thousands of entities that were infected with the backdoor.

    Lee said some of the infections in the critical infrastructure sector occurred on the IT networks of the critical infrastructure entities, but others were on the actual industrial control system networks that control critical functions. There is currently no evidence, however, that the hackers used the backdoor in the SolarWinds software to gain access into the 15 electric, oil, gas, and manufacturing entities that were infected with the software. But Lee notes that it may not be possible to uncover such activity if the attackers did access them and burrow further into the industrial control networks, because critical infrastructure entities generally don’t do extensive logging and monitoring of their ICS networks.

    “In these ICS networks, most organizations don’t have the data and visibility to actually look for the breach,” says Lee, a former critical infrastructure threat intelligence analyst for the NSA. “So they might determine if they are compromised, but … almost none of them have network logs to … determine if there is follow-on activity [in their network].”

    He says all of the infected companies are “doing the necessary hunting and [are] assuming they are compromised.” But without logging to catch the initial infection months ago and track the hackers’ movements through the network if they did burrow in further, the companies have to hunt for what looks like malicious behavior. “And this is an adversary that burrows in deep and is very very hard to root out.”

    “Almost none of them have network logs.”

    If the hackers came in through the infected OEM instead, using the OEM’s credentials and privileged access, it could be even more difficult for OEM customers to spot the hackers’ activity since it would look legitimate.

    Dragos notified the three OEMs that they were infected, as well as government officials and officials in President-elect Joe Biden’s incoming administration. An alert published last week by the Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency noted that critical infrastructure entities were compromised by SolarWinds software, but didn’t indicate which industries were affected and didn’t note that this included managed services providers for critical infrastructure.

    Internal computer internet servers are seen at the Telvent GIT SA company headquarters in Madrid on July 19, 2011.

    Photo: Denis Doyle/Bloomberg via Getty Images

    Potential Operations Against a “Pretty Resilient” U.S. Power Grid

    It’s not the first time an OEM in the industrial control system has been hacked. In 2012 hackers believed to be from China breached an OEM called Telvent and stole engineering drawings and accessed files used to program industrial control systems. Telvent is a division of Schneider Electric that is headquartered in Spain, but its software is used in oil and gas pipelines across the U.S. and Canada and in some water control system networks. The breach raised concerns at the time that the hackers could have embedded malicious code in the software to infect customer control systems.

    “When you look at industrial networks many people still believe them to be highly segmented, but that only means segmented from the” corporate enterprise network, Lee said. “While they might be segmented from the enterprise, they have a vast series of connections to OEMs and others who are connected to those networks for maintenance and other [purposes].”

    The SolarWinds hacking campaign came to light earlier this month when FireEye revealed that it had been breached by hackers who took software tools the company uses to find vulnerabilities in customer systems. The company then revealed days later that the intruders had gained access to their network using a backdoor that had been implanted in network monitoring software made by the Austin-based company SolarWinds. The software is used widely across government and industry to manage and monitor networks, and SolarWinds has revealed that up to 18,000 customers could have downloaded the infected code.

    Investigators in the security community have said they have seen nothing to attribute the SolarWinds campaign to a particular known hacking group or nation, but officials in the government have attributed the operation to Russia, though they haven’t indicated what has led them to this conclusion.

    “It’s so many different people in the government [attributing this to Russia], you wouldn’t get this sort of statement if there wasn’t something there,” says James Lewis, a former government official who oversees cybersecurity programs at the Center for Strategic and International Studies. “[T]he forensic guys are looking at what’s left behind [on networks], and that may not be the best way to attribute something. Governments use other methods to look for attribution. So the fact that the forensic people haven’t discovered it isn’t determinative; they don’t have the full picture.”

    Russia has denied responsibility for the hacking operation.

    The scope of the hacking operation is still unknown, but so far reports indicate that the departments of Homeland Security, Commerce, and the Treasury; at least two national laboratories; the Federal Energy Regulatory Commission; and the National Nuclear Safety Agency, which maintains the nation’s stockpile of nuclear weapons, were all infected. Microsoft, Cisco, and Intel are among those in the tech sector that were also infected. A number of the intrusions at government agencies went beyond merely being infected by the SolarWinds malware. Sen. Ron Wyden revealed this week that the hackers were able to read and steal emails of some of the top officials at the Treasury Department.

    Currently, the campaign is being characterized by security professionals and government officials as an espionage operation. But the compromise of critical infrastructure could have put the hackers in a position to do more than simply steal data, if they wanted to do so. Although there is currently no evidence this was or would have been their intention, Russia has a history of engaging in disruptive operations in critical infrastructure.

    In 2015, Russia hacked several Ukrainian power distribution plants and took out power for about 230,000 customers for up to six hours in some cases, in the middle of winter. They repeated their operation again in Ukraine in 2016, taking out power to some customers for about an hour, and also struck the State Administration of Railway Transport, which manages Ukraine’s national railway system. The operations led experts to conclude that the Russians were using Ukraine as a test bed to refine hacking techniques that could be used in other countries, such as the U.S.

    On Sunday, speaking on CNN’s “State of the Union,” Sen. Mitt Romney said, “What Russia has done is put in place a capacity to potentially cripple us in terms of our electricity, our power, our water, our communications.” He continued, “This is the same sort of thing one can do in a wartime setting, and so it’s extraordinarily dangerous, and it’s an outrageous affront on our sovereignty and one that’s going to have to be met with a very strong response.”

    But Suzanne Spaulding, former undersecretary for the Department of Homeland Security who led the division that oversees critical infrastructure security, cautions that the intentions of the SolarWinds adversary are still unknown, and even if they breached networks in the electric, oil, and gas industries, this isn’t the same as having the ability to cause disruption or damage.

    “But you can [still] get a lot of information … that can help you to plan a truly disruptive attack,” she noted. Because the hackers in the SolarWinds campaign were also able to breach FERC, this could have provided them with information on vulnerabilities and security measures in the U.S. grid that they could later leverage for an attack. She points to the 2015 Russian hack of the Ukrainian distribution plants: The hackers were in the plant networks at least six months doing reconnaissance to understand the equipment and how it worked before taking out the power in December that year.

    “You can get a lot of information … that can help you to plan a truly disruptive attack.”

    But even an attack aimed at disrupting the U.S. electric grid would be limited in its effect, she notes.

    “It’s hard to have a really impactful attack, particularly on our electric grid, which is pretty resilient,” she said. “[But] we don’t know that that’s what they’re doing.”

    In the past, when Russian hackers have targeted the oil and gas industry in hacking operations, Spaulding said the U.S. government assessed that they may have just been looking for information that could make their own oil and gas industry more efficient. “So I don’t think that we can know that their objective here is reconnaissance for being in a position to potentially disrupt critical infrastructure,” Spaulding said. “I do think that we should always, for planning purposes, assume that and take measures to reduce the damage that could be done. But we can’t know that [this is their intention]. And there’s a difference between assuming that for planning purposes and for mitigation, and assuming that for a [U.S. government] response to Russia.”

    Spaulding says this doesn’t mean anyone should take the SolarWinds campaign lightly.

    “I don’t think this is just traditional spy vs. spy espionage. This is of a scale and scope that really is beyond traditional espionage,” she said. “Particularly because we have been told that over half the victims were not government, but were private sector. And if it’s critical infrastructure, not just defense-industrial base, that is not traditional kinds of espionage and that’s very serious.”

    Lee cautions that there is no indication yet that the SolarWinds hacking campaign is anything other than espionage at the moment, but just being in critical infrastructure networks gives the adversary potential political power they might not otherwise have. “I’m thinking about president-elect Biden. The last thing I want him to have to worry about is getting into international relation discussions with Putin or others and not knowing if a foreign adversary can turn their access [in these networks] into a foreign operation on key parts of the infrastructure.”

    Although other intruders have been inside the U.S. electric grid before, Lee says this is different. If Iran or China compromises industrial control systems in critical infrastructure, he said, “you assume they could [disrupt operations] but you don’t know [if they have the knowledge and ability]. But Russia has shown an ability to go beyond access to disruption. So when they get access you no longer have the question could they use it? The question is how long would it take them and would they?”

    This post was originally published on Radio Free.

  • The documents feature internal Facebook communications in which managers appear to admit to major flaws in ad targeting capabilities, including that ads reached the intended audience less than half of the time they were shown and that data behind a targeting criterion  was “all crap.” Facebook says the material is presented out of context.

    “More than half the time we’re showing ads to someone other than the advertisers’ intended audience.”

    They emerged from a suit currently seeking class-action certification in federal court. The suit was filed by the owner of Investor Village, a small business that operates a message board on financial topics. Investor Village said in court filings that it decided to buy narrowly targeted Facebook ads because it hoped to reach “highly compensated and educated investors” but “had limited resources to spend on advertising.” But nearly 40 percent of the people who saw Investor Village’s ad either lacked a college degree, did not make $250,000 per year, or both, the company claims. In fact, not a single Facebook user it surveyed met all the targeting criteria it had set for Facebook ads, it says.

    The complaint features Facebook documents indicating that the company knew its advertising capabilities were overhyped and underperformed. A “February 2016 internal memorandum” sent from an unnamed Facebook manager to Andrew Bosworth, a Zuckerberg confidant and powerful company executive who oversaw ad efforts at the time, reads, “[I]nterest precision in the US is only 41%—that means that more than half the time we’re showing ads to someone other than the advertisers’ intended audience. And it is even worse internationally. … We don’t feel we’re meeting advertisers’ interest accuracy expectations today.” The lawsuit goes on to quote unnamed “employees on Facebook’s ad team” discussing their targeting capabilities circa June 2016:

    One engineer celebrated that detailed targeting accounted for “18% of total ads revenue,” and $14.8 million on June 17th alone. Using a smiley emoticon, an engineering manager responded, “Love this chart! Although if the most popular option is to combine interest and behavior, and we know for a fact our behavior is almost all crap, does this mean we are misleading advertiser [sic] a bit? :)” That manager proceeded to suggest further examination of top targeting criteria to “see if we are giving advertiser [sic] false hope.”

    “Interest” and “behavior” are two key facets of the data dossiers Facebook compiles on us for advertisers; according to the company, the former includes things you like, “from organic food to action movies,” while the latter consists of “behaviors such as prior purchases and device usage.”

    The complaint also cites unspecified internal communications in which “[p]rivately, Facebook managers described important targeting data as ‘crap’ and admitted accuracy was ‘abysmal.’”

    Facebook has said in its court filings that these quotes are presented out of context. The company attempted to suppress the internal documents, obtained by the plaintiff through the legal discovery process, on the grounds that they were “confidential” and could be harmful if competitors were to read them — an argument rejected by the court, which in November ordered the filings unsealed with minor redactions. The social network argued further, in its rejected motion to dismiss the suit, that it’s never guaranteed complete accuracy in its targeting, and that any claims of sophisticated targeting the plaintiff cited in its decision to buy Facebook ads were “generalized, promotional statements about Facebook’s advertising on which a reasonable consumer could not rely as guaranteeing a specific accuracy rate.”

    “Facebook’s argument that its ad-targeting regime is good for small businesses is not only self interested — it is plain wrong.”

    The lawsuit comes at an awkward time for Facebook, which has recently taken out full-page ads in several national newspapers claiming new iOS privacy safeguards will strangle American small businesses, which are already struggling with the economic cataclysm of the Covid-19 pandemic. Facebook calls this anti-Apple effort its “Speak Up for Small” campaign. The Investor Village lawsuit suggests that, far from being a pandemic panacea, Facebook’s ballyhooed ad targeting has actually wasted the time and money of small advertisers it now says it’s championing. “Facebook is no friend to small business,” said Steven Molo, an attorney representing the plaintiff. “As detailed in the allegations of our class action suit on behalf of advertisers, Facebook substantially misrepresented its ability to deliver ads accurately, to the dismay of its own employees.”

    Though Facebook would like you to think it’s not, its new spat with Apple is dead simple. Historically, companies like Facebook have been able to monitor the way you use your iPhone (or iPad) in order to attempt to learn the details of your life on a vast scale in order to — as the pitch went to advertisers, at least — show you specific ads that reflect your private hopes, desires, friendships, movements, and so on. But starting in early 2021, Apple says this persistent surveillance will not longer be turned on by default; rather, iPhone owners would have to explicitly opt-in to be stalked by their apps, cutting off this firehose of deeply personal data. This is a major shift in an industry where surveillance is a given, rather than an option.

    According to Dipayan Ghosh — a former Facebook executive and current co-director of the Digital Platforms and Democracy Project at Harvard Kennedy School’s Shorenstein Center on Media, Politics, and Public Policy — both Facebook’s anti-privacy PR blitz and this new lawsuit ironically lead to a similar conclusion: Facebook isn’t anyone’s friend but Facebook’s. “Facebook’s argument that its ad-targeting regime is good for small businesses is not only self interested — it is plain wrong,” Ghosh told The Intercept in an email. “Further, the recent [Investor Village] complaint indicates clearly that, if anything, Facebook advertising is not as effective for its advertising clients as it could be. The lack of transparency coupled with the perceived low bang-for-the-buck of advertising on Facebook has troubled marketers for many years — and it appears as though those perceptions may well be true.”

    Facebook could not be immediately reached for comment.

    This post was originally published on Radio Free.

  • In late March, following an employee walkout at an Amazon warehouse in Staten Island to protest the lack of safety protections amid the new pandemic, Amazon fired the lead organizer, Chris Smalls, with the public rationale that he had violated rules around social distancing. Under pressure, Amazon pledged in early April to ramp up its distribution of personal protective equipment, but a leaked memo from a private meeting revealed company executives had discussed how to smear Smalls and damage any potential union efforts. Smalls is “not smart, or articulate,” argued Amazon’s general counsel David Zapolsky, who urged the company to tell reporters Smalls’s conduct was “immoral, unacceptable, and arguably illegal.”

    Zapolsky’s comments outraged many left-leaning groups, including a group of lawyers and law students affiliated with the American Constitution Society, a self-described progressive legal organization that was created in 2001 to help build the bench of liberal judges and act as a countervailing force to the conservative Federalist Society. More than 100 individuals sent a letter to ACS’s president, Russ Feingold, the former Democratic senator from Wisconsin, and the ACS board of directors protesting the inclusion of a deputy of Zapolsky’s, Andrew DeVore, in its leadership ranks. DeVore, an Amazon vice president and associate general counsel, reports to Zapolsky and manages Amazon’s “labor and employment” issues, among other areas.

    The signatories argued that Amazon’s conduct around Smalls was no isolated incident when it comes to “trampling worker rights” and also blasted the company’s record on privacy, surveillance, tax avoidance, anticompetitive practices, contracts with ICE, and bullying of local governments. “We urge you to ask for Mr. DeVore’s immediate resignation from the Board of Directors,” the letter read. DeVore was appointed in 2017.

    Following the letter, ACS sought to handle the internal uprising in several ways, including organizing a virtual town hall for local chapter leaders with Feingold to discuss their concerns.

    Feingold “expressed ACS’s respect for workers rights, but my feeling was he treated the meeting like a politician as a way to pacify the opposition rather than committing to specific actions,” said Hooman Hedayati, a member of the Washington, D.C., ACS chapter board who attended the town hall. Feingold declined to share with attendees how much money ACS receives from Amazon (it’s listed as a 2020 corporate sponsor on its website) but insisted the amount was negligible.

    Following the town hall, ACS released a public statement reiterating the organization’s support for workers’s rights, and urged “employers to support the right of their employees” to form unions and demand safe working conditions.

    Hedayati noted the statement failed to name-check Amazon specifically. “I think it was very concerning that ACS as a progressive organization won’t make a statement that specifically calls out Amazon and its bad track record,” he told The Intercept. “It makes me question to what degree they’d really be willing to speak up in support of the labor movement.”

    Feingold also made a few personal calls, including to Leo Gertner, a labor lawyer and lead organizer of the letter, to suggest that the problem will basically go away when DeVore’s three-year term expires at the end of the year. “Feingold was very nice, diplomatic, and courteous and told me he was very supportive of our effort, but that the board was not interested in voting to remove Mr. DeVore or change his status in any way,” Gertner said. “But he told me DeVore was up for reappointment soon and his term was going to end this year.”

    Since April, Amazon has continued to face charges of anti-worker activity, most recently this month, when attorneys for the company sought to blunt a union effort at an Alabama warehouse.

    But in response to questioning, ACS confirmed to The Intercept that DeVore’s position on the board was actually renewed this year for another three-year term. David Lyle, ACS’s senior counsel for communications, said in a statement that keeping DeVore on “does not affect ACS programming or other decisions, at the national or chapter levels,” but maintained that leadership found him “to be a very engaged board member” and “valu[ed] representation of a diversity of experiences.”

    Andrew DeVore, vice president and associate general counsel with Amazon, listens during a Senate Commerce Committee hearing on consumer data privacy in Washington, D.C., on Sept. 26, 2018.

    Photo: Andrew Harrer/Bloomberg/Getty Images

    ACS’s ties to Silicon Valley do not end with DeVore. Apple’s in-house counsel, Philippa Scarlett, was appointed to the board of directors in 2017, and now serves on ACS’s board of advisers, though her affiliation with Apple is not actually disclosed in her bio.

    Over the last decade, ACS has taken at least $290,000 from Google, Microsoft, and Facebook, with other corporate sponsorships coming from Verizon and Amazon, according to pages detailing ACS convention donors. The contributions have raised questions among its members about how ACS positions itself on matters of antitrust, bankruptcy, and corporate power — areas where ACS has less clear stances than it does on issues around reproductive and civil rights. Some members say this is because ACS has molded its politics in the image of the corporate-minded Senate that serves as gatekeeper to the judiciary.

    “ACS is an elite-driven organization based in D.C. with a board of directors full of Harvard, Yale, and Stanford alums, where most of those folks cut their teeth in corporate law and advised those megacorporations,” said Gertner. “I think they have an interest in putting themselves out as liberal and progressive because they have genuinely pro-choice views and are mildly anti-war, but the capture of the elite stratum by corporations is pretty much complete.”

    ACS doesn’t shy away from questioning corporate power, though the bulk of its interrogation has been confined to panel discussions. Anti-monopoly advocate Barry Lynn of the Open Markets Institute says ACS could be doing more to offer a progressive vision on these issues, in the way the Federalist Society helps train and educate its conservative members on monopoly and antitrust.

    Following the election of Donald Trump, some antitrust advocates, including Lynn, reached out to ACS to encourage the legal organization to take a firmer stance on these issues. In February 2017, Lynn, his colleague Lina Khan, antitrust attorney Jonathan Kanter, and Andy Green of the Center for American Progress met with Kara Stein, ACS’s vice president of policy and program.

    “We said, ‘Hey, at least do no harm, don’t support people who are hardcore conservative on corporate welfare,’” Lynn said. “We want them to be a counterweight to the Federalist Society. Maybe they won’t take as radical a position as us, but we do think they should be pretty critical and at least work to educate its members about why the right takes the positions it does.” Lynn says the response they received was relative openness — if anti-monopoly advocates could fundraise for the work.

    “They basically told us, ‘Well, if you really want us to engage on these issues around monopoly, then the way to do it would be to give us some money, build up a program.’”

    “They basically told us, ‘Well, if you really want us to engage on these issues around monopoly, then the way to do it would be to give us some money, build up a program,’” Lynn said, adding that Washington, D.C., “is full of these pay-to-play places.” David Lyle, ACS’s senior counsel for communications, didn’t deny Lynn’s characterization of the meeting and said it “was like many ACS holds regularly to explore partnerships and ways to collaborate on topics and issues.”

    ACS has sponsored local and national events that have been critical of corporate power and encouraged stronger antitrust work, including an antitrust conference Khan organized at Yale. Hedayati says his ACS chapter has hosted several antitrust events in recent years — including one last month on political influence around antitrust investigations and a film screening in 2019 where members discussed shortcomings of antitrust law.

    In response to questions, Lyle also pointed to a national panel ACS sponsored on consolidation of wealth and power in 2017, one on the constitutional dilemmas of Big Tech in 2018, and one on tech regulation in July. He also noted ACS has “been pleased” to publish scholars like Khan in ACS’s official law journal, and that the organization is publishing an essay by her this week with policy recommendations for the Biden administration.

    ACS declined to comment on the donations it receives from tech companies or make Feingold available for an interview. “Our work in this field, including the promotion of leading advocates of more strict antitrust enforcement and critics of technology companies speaks for itself,” said Lyle. As a U.S. senator, Feingold was a leading champion on campaign finance reform, pushing major legislation to curb the influence of money in politics. He was also known among his colleagues — and often privately resented — for his strict and obsessive fealty to the spirit of Senate ethics rules.

    Lynn told The Intercept that ACS’s corporate tech donations “can’t help but affect” the organization. “When those sorts of folks are in the room they’re going to affect the policy,” he said.

    Other members argue ACS’s murkiness on corporate power is less a reflection of rank corruption and points more to the reality that ACS’s aim to be a “big-tent” organization for liberals means it effectively becomes more of a networking group, with inevitable vague policy positions palatable to the full Democratic Party. In the absence of drawing clearer lines in the sand and providing a sharper vision for what progressive lawyering means in the realms of corporate power and bankruptcy law, newer organizations like Demand Justice, the People’s Parity Project, and the Law and Political Economy Project will continue to fill what its supporters say is an intellectual and advocacy void for lawyers on the left.

    The Biden administration, for its part, has recently appointed a number of leaders and alumni from big tech companies, though maintains it will continue serious investigations into the practices of these firms. The Trump administration filed a major antitrust suit against Google, which will continue under the Biden administration. The suit is seen as potentially the first of several such clashes with tech titans.

    “I think antitrust and antimonopoly people feel listened to on the substance by the Biden administration,” said Jeff Hauser, the director of the Revolving Door Project, which advocates for progressive executive branch appointments. “But the question is whether there will be people appointed who will be able to slow the move of the government against these companies.”

    This post was originally published on Radio Free.

  • State-sponsored hackers believed to be from Russia have breached the city network of Austin, Texas, The Intercept has learned. The breach, which appears to date from at least mid-October, adds to the stunning array of intrusions attributed to Russia over the past few months.

    The list of reported victims includes the departments of Commerce, Homeland Security, State, and the Treasury; the Pentagon; cybersecurity firm FireEye; IT software company SolarWinds; and assorted airports and local government networks across the United States, among others. The breach in Austin is another apparent victory for Russia’s hackers. By compromising the network of America’s 11th-most populous city, they could theoretically access sensitive information on policing, city governance, and elections, and, with additional effort, burrow inside water, energy, and airport networks. The hacking outfit believed to be behind the Austin breach, Berserk Bear, also appears to have used Austin’s network as infrastructure to stage additional attacks.

    While the attacks on SolarWinds, FireEye, and U.S. government agencies have been linked to a second Russian group — APT29, also known as Cozy Bear — the Austin breach represents another battlefront in a high-stakes cyber standoff between the United States and Russia. Both Berserk Bear and Cozy Bear are known for quietly lurking in networks, often for months, while they spy on their targets. Berserk Bear — which is also known as Energetic Bear, Dragonfly, TEMP.Isotope, Crouching Yeti, and BROMINE, among other names — is believed to be responsible for a series of breaches of critical U.S. infrastructure over the past year.

       

    The Austin breach, which has not been previously reported, was revealed in documents prepared by the Microsoft Threat Intelligence Center, or MSTIC, and obtained by The Intercept, as well as in publicly available malware activity compiled by the site VirusTotal. “While we are aware of this hacking group, we cannot provide information about ongoing law enforcement investigations into criminal activity,” a spokesperson for the city of Austin wrote in response to a list of emailed questions.

    On Sunday, Reuters reported that a state-sponsored hacking group had breached the Treasury and Commerce departments, sparking an emergency weekend meeting of the National Security Council. The Washington Post later attributed the attacks to Cozy Bear, citing anonymous sources, and reported that the group breached the agencies by infecting a software update to Orion, a popular network management product made by SolarWinds, a firm based in Austin. “Fewer than 18,000” users downloaded the malicious software update, which has been available since March, SolarWinds said in a federal securities filing on Monday. The Intercept has seen no evidence that the Austin breach and the SolarWinds hack are related.

    Russia’s dramatic intrusions into U.S. networks come at an awkward moment for Washington. In November, President Donald Trump fired Christopher Krebs, the director of the Cybersecurity and Infrastructure Security Agency, or CISA, for refusing to go along with attempts to overturn the presidential election results, and Trump has generally shied away from criticizing Russian hacking operations.

    Berserk Bear is suspected to be a unit of Russia’s Federal Security Service, or FSB. Cozy Bear, the group behind the attacks on federal government agencies, is affiliated with the Russian Foreign Intelligence Service, or SVR. Both the SVR and the FSB are considered successors to the Soviet-era KGB.

    CISA and the FBI singled out Berserk Bear in an October 22 advisory warning that the hacking group had targeted airports, energy companies, and state, local, and tribal governments around the country, and had “exfiltrated data from at least two victim servers.” The New York Times later reported that FSB hackers had “bored into local networks” in California and Indiana, without specifying which networks had been breached.

    It is now clear that a group of highly sophisticated hackers, likely Berserk Bear, also hit Austin. An IP address belonging to the city appears on a list of indicators of compromise, or technical evidence that organizations can use to determine if they’ve been hacked by this threat actor, compiled by MSTIC. When employees of the city of Austin visit websites from their work computers, this is the IP address that those websites see them coming from.

    VirusTotal, a service owned by Google that allows the public to submit files to be analyzed and scanned by dozens of anti-virus programs, has cataloged 97 malware samples that were observed communicating with the Austin IP address, and 88 of them were submitted to the site since January. When malware runs on a computer, often the first thing it does is receive instructions from the hackers who control it. In these cases, the instructions appear to be coming from Austin’s compromised network.

    The list of indicators of compromise accompanied an alert about Berserk Bear that MSTIC shared with public sector Microsoft customers in mid-November. That document warned that BROMINE, Microsoft’s name for Berserk Bear, had also targeted the telecommunications, aerospace, and defense sectors, hitting entities in the United Kingdom and Turkey as well as the United States.

    Austin’s internet address was the only government IP on the MSTIC list. The other IPs belonged to cloud hosting providers like Amazon, DigitalOcean, Microsoft Azure, and the German company Hetzner, as well as Turkish cellular carrier Turkcell. The next day, MSTIC distributed a copy of the same alert without Austin’s IP address included. It’s possible that Microsoft initially included Austin’s IP address as an indicator of compromise by mistake, but the malware activity from VirusTotal makes that scenario unlikely. And VirusTotal cataloged six malware samples that communicated with this IP and were submitted in November and December, suggesting that Austin’s network remains compromised.

    “It’s not surprising that hackers, when they find an unsecured server that is in the country that they’re targeting, use that as a jumping off point for lots of other things,” said John Scott-Railton, a senior researcher at Citizen Lab at the University of Toronto’s Munk School of Global Affairs and Public Policy, in an interview. “It makes things a lot easier.”

    Voters enter and exit Austin City Hall during the presidential primary in Austin on March 3, 2020.

    Photo: Suzanne Cordeiro/AFP via Getty Images

    The Austin City Council appears to have been aware of the breach since October. CISA and FBI published an initial advisory on October 9 warning of “advanced persistent threat actors,” or APTs, targeting state and local governments, before publishing a follow-up advisory on October 22 in which the agencies attributed the campaign to Berserk Bear. Four days after the initial advisory, on October 13, the City Council went into a closed meeting to discuss “confidential network security information,” according to the posted agenda. The council discussed the topic again two days later during an executive session of its regular meeting, according to that agenda. The portions of the meetings in which the council discussed network security were closed to the public, and the agendas cited an exemption in the state’s rules governing open meetings related to “the vulnerability of a network to criminal activity.” An assistant to Mayor Steve Adler declined to comment, as did three other council members. “Any info council would have received on this would have been in executive session, and as such, any council member would not be able to comment,” a staffer for a fourth council member wrote in an email. The remaining six members did not respond to The Intercept’s questions.

    On December 8, according to a transcript of the City Council meeting, the city authorized a $2.4 million contract for cyber liability insurance — a product that typically covers losses from data breaches and hacks.

    Berserk Bear’s campaign targeted hundreds of organizations across the United States in addition to the city of Austin. A heat map published by CISA, last updated on November 17, lists types of organizations that were compromised, scanned, or targeted with other reconnaissance activity from Berserk Bear’s hacking infrastructure. It includes 75 airports, four airlines, 13 cities, four counties, three states, and dozens of other targets in aviation, defense, information technology, health care, transportation, and other industries. CISA did not name any of the targets in the heat map.

    Berserk Bear’s reputation for lurking fits a pattern that is common for espionage-related attacks, where “adversaries have already been sitting in the network for three months or so before someone realizes that they are there,” said Sami Ruohonen, a researcher with the Finnish cybersecurity firm F-Secure. “This is a technique that is specifically favored by these APT groups, just for the fact that the longer you go unnoticed, the longer you have a foothold in the network.” In a report published last year, F-Secure compared Berserk Bear and similar groups to the IT equivalent of a sleeper agent.

    Yet cybersecurity experts warned that while the Berserk Bear hackers are not known for sabotage, they could rear up at any moment and wreak havoc in the United States, for example, by making cities go dark. “We should be cognizant of the level of information that they have,” said Vikram Thakur, a technical director at Symantec who has tracked the group for years. “Turning on valves or closing valves, things of that sort — they have the expertise to do it.” In 2010, Stuxnet, a digital weapon developed by the United States and Israel, temporarily took out as many as one-fifth of Iran’s centrifuges and infected systems around the world; in 2015, the Russian hacking group Sandworm triggered an extensive power blackout in Ukraine.

    Malware still appears to be communicating with Austin’s network.

    Like their counterparts in the National Security Agency, the Berserk Bear hackers are highly skilled and often narrowly focused on their targets. In 2013, Symantec found that Berserk Bear hit targets throughout the United States and Europe by using so-called watering hole attacks, which involves identifying websites frequented by members of an organization and infecting the sites with malware. The Russian hackers separately compromised software that is used by a small group of businesses in the energy sector. “This was very specific software for people who work in the industrial space,” says Thakur. “They knew who their targets were.”

    Berserk Bear’s breach of Austin’s network may have been extensive. CISA’s October 22 alert said that the hackers exploited a critical vulnerability in Netlogon, Microsoft’s authentication protocol, allowing them access to valid usernames and passwords of all users of the network. In at least one instance, the alert said, they used those credentials to steal information, including documents, related to “sensitive network configurations and passwords” and “printing access badges.” And in at least one case, the hackers used valid credentials to compromise Microsoft Office 365 email accounts. While it is not clear from the CISA alert whether those two instances described Austin, full network access would have allowed the hackers to assume “the privileges of anyone in the network,” said Ruohonen, of F-Secure. “If you think about data that is only available to the CEO, or data that is only available to IT services, they would have all of this data.”

    The breaches tracked by CISA and the FBI were so severe that the agencies recommended drastic measures. The only way an organization can be sure that it has removed the threat, they advised in the October 22 alert, is by systematically rebuilding the network from the ground up, noting that it’s “critical to perform a full password reset on all user and computer accounts,” an incredibly daunting and expensive task.

    “The City follows the measures that the Cybersecurity and Infrastructure Security Agency (CISA) and the FBI recommend for local governments,” the Austin spokesperson said. But the city has apparently not reset all its accounts. One employee was asked to enable multifactor authentication on internal services, but they have not been asked to change any passwords or reset and reconfigure their computer.

    Malware still appears to be communicating with Austin’s network. The most recent malware sample found on VirusTotal that was observed communicating with Austin’s IP address was submitted to the site for analysis on December 15, two days ago.

    This post was originally published on Radio Free.

  • Since signing the Abraham Accords, the UAE and Bahrain have been actively colluding with Israel’s settler movement and military authorities

    The professed rationale for the recent Abraham Accords, so-called “peace deals” signed with Israel by the UAE and Bahrain, was to stymie Israeli efforts to annex swaths of the West Bank.

    The aim was supposedly to neutralise another “peace” plan – one issued early this year by US President Donald Trump’s administration – that approved Israel’s annexation of large areas of the West Bank dominated by illegal Jewish settlements.

    The two Gulf states trumpeted the fact that, in signing the accords in September, they had effectively scotched that move, thereby salvaging hopes of a future Palestinian state. Few observers entirely bought the official story – not least because Israeli Prime Minister Benjamin Netanyahu vowed that annexation had only been put on temporary hold.

    The real purpose of the Abraham Accords appeared less about saving Palestinians than allowing Gulf states to go public with, and expand, their existing ties to Israel. Regional intelligence could now be shared more easily, especially on Iran, and the Gulf would gain access to Israeli hi-tech and US military technology and weapons systems.

    Separately, Sudan was induced to sign the accords after promises it would be removed from Washington’s list of “terror-supporting” states, opening the door to debt relief and aid. And last week, Morocco became the fourth Arab state to initiate formal relations with Israel after the Trump administration agreed to recognise its occupation of Western Sahara.

    Twisting more arms

    Israel, in return, has been able to begin “normalising” with an important bloc of Arab states – all without offering any meaningful concessions on the Palestinian issue.

    Qatar and Saudi Arabia are also reported to have been considering doing their own deals with Israel. Jared Kushner, Trump’s Middle East adviser, visited the region this month in what was widely assumed to be a bid to twist arms.

    Riyadh’s hesitation, however, appears to have increased after Trump lost last month’s US presidential election to Joe Biden.

    Last week, during an online conference held in Bahrain and attended by Israeli Foreign Minister Gabi Ashkenazi, a former senior Saudi government official, Turki al-Faisal al-Saud, launched a blistering verbal attack on Israel, saying it jailed Palestinians in “concentration camps” and had built an “apartheid wall”. It was unclear whether he was speaking in more than a personal capacity.

    While the covert purpose of the Abraham Accords was difficult to obscure, the stated aim – of aiding Palestinians by preventing Israel’s annexation of the West Bank – was still seen as a vital tool for the UAE and Bahrian to sell these agreements back home.

    But in practice, both have quickly jettisoned any pretence that Palestinians will benefit from these deals. Not only that, but already they barely bother to conceal the fact that they are actively and tangibly colluding with Israel to harm Palestinians – by bolstering Israel’s illegal settlements and subsidising its military regime of occupation.

    Trade with settlements

    Bahrain demonstrated this month how indifferent it is to the negative impacts on Palestinians. On a visit to Israel, the country’s trade minister, Zayed bin Rashid al-Zayani, said Bahrain was open to importing products from Israel wherever they were manufactured. “We have no issue with labelling or origin,” he said.

    The comment suggested that Manama was ready to become a gateway for Israel to export settlement products to the rest of the Arab world, helping to bolster the settlements’ legitimacy and economic viability. Bahrain’s trade policy with Israel would then be even laxer than that of the European Union, Israel’s top trade partner. The EU’s feeble guidelines recommend the labelling of settlement products.

    After wide reporting of Zayani’s comments, Bahrain’s state news agency issued a statement shortly afterwards saying he had been “misinterpreted”, and that there would be no import of settlement goods. But it is hard not to interpret the remarks as indicating that behind the scenes, Bahrain is only too willing to collude in Israel’s refusal to distinguish between products from Israel and those made in the settlements.

    That this is the trading basis of the Abraham Accords is further highlighted by reports that the UAE is already welcoming business with Israel’s illegal settlements. An Israeli winery, using grapes grown on the Golan Heights, a large plateau of Syrian territory seized by Israel in 1967 and illegally annexed in 1981, has reportedly started exporting to the UAE, which has liberalised its alcohol laws for non-citizens.

    This is a fruitful turn of events for Israel’s 500,000 settlers in the occupied West Bank. They have lost no time touting for business, with the first delegation arriving in Dubai last month hoping to tap new markets in the Arab world via the UAE. Last week a settler delegation reportedly returned to Dubai to sign an agreement with a UAE company to import settlement goods, including alcohol, honey, olive oil, and sesame paste.

    New low-point

    This marks a new low-point in the shift by Arab states away from their original position that Israel was a colonial implant in the region, sponsored by the West, and that there could be no “normalisation” – or normal relations – with it.

    In 2002, Saudi Arabia launched the Arab Peace Initiative, which offered Israel full diplomatic relations in return for ending the occupation. But Gulf states are now not only normalising with Israel when the occupation is actually intensifying; they are normalising with the occupation itself – as well as its bastard progeny, the settlements.

    Israel has built more than 250 settlements across a vast expanse of occupied Palestinian territory – 62 percent of the West Bank, referred to as Area C under the Oslo Accords. This area was supposed to be gradually transferred to the Palestinian Authority (PA), the government-in-waiting under Mahmoud Abbas, to become the territorial backbone of a Palestinian state.

    Instead, over the past quarter of a century, Israel has used its supposedly temporary control over Area C to rapidly expand the settlements, stealing vital land and resources. These colonies have been highly integrated into Israel, with settler roads criss-crossing the occupied West Bank and tightly limiting Palestinian movement.

    The peace deals with the UAE and Bahrain will help the settlements entrench further, assisting Israel’s longstanding policy of annexing the West Bank in all but name, through the creation of facts on the ground – the very outcome the Abraham Accords were ostensibly meant to prevent.

    Yossi Dagan, head of the West Bank regional council that visited Dubai last month, declared that there was “no contradiction between our demand to impose sovereignty [annex large parts of the West Bank] and the strengthening of commercial and industrial ties” with the Gulf.

    Al-Aqsa dividend

    In other words, settlers see the Abraham Accords as a business opportunity to expand their footprint in the occupied West Bank, not an obstacle. The likely gains for the settlers will include tourism, too, as visitors from the Gulf are expected to flock to al-Aqsa Mosque in occupied East Jerusalem.

    The irony is that, because of Israel’s physical seizure of areas around the Islamic holy site and its control over access, Gulf Arabs will have far greater rights at al-Aqsa than the majority of Palestinians, who cannot reach it.

    Jordan, which has long been the custodian of al-Aqsa, justifiably fears that Saudi Arabia may use a future accord with Israel to muscle its way into taking charge of the Jerusalem holy site, adding it to its guardianship of Mecca and Medina.

    In occupied Jerusalem, Palestinians are deprived of the chance to develop their own housing, let alone infrastructure to cope with the business opportunities provided by the arrival of wealthy Gulf Arabs. That should leave Israel and its settler population – rather than Palestinians – well-placed to reap the dividends from any new tourism ventures.

    In a supreme irony, a member of the Abu Dhabi ruling family has bought a major stake in the Beitar Jerusalem football team, whose supporters are fiercely anti-Arab and back the takeover of East Jerusalem by settlers.

    Palestinian laboratories

    During his visit, Bahrain’s Zayani observed that, as his country geared up for flights to and from Israel next month: “We are fascinated by how integrated IT and the innovation sector in Israel has been embedded in every facet of life.”

    But Israel’s technology sector is “embedded in every facet of life” only because Israel treats the occupied Palestinian territories as a laboratory. Tests are conducted there on how best to surveil Palestinians, physically limit their movement and freedoms, and collect their biometric data.

    The hi-tech firms carrying out these experiments may be formally headquartered inside Israel, but they work and profit from their activities in the occupied territories. They are a vast complex of settlement businesses in their own right.

    This is why Nabil Shaath, an aide to Abbas, observed of the Gulf’s burgeoning ties with Israel that it was “painful to witness Arab cooperation with one of the worst manifestations of aggression against the Palestinian people, which is the Israeli settlements on our land”.

    Settler ally

    How enthusiastically the UAE and Bahrain are getting into the occupation business, and preparing to subsidise its worst features, is highlighted by the Abraham Fund, set up by the US in October. It is a vehicle for Gulf states and Israel to secure billions of dollars in private investment to underpin their new diplomatic relations.

    Again, the official story has glossed over the reality. According to statements from the main parties, the fund is intended to raise at least $3billion to bolster regional economic cooperation and development initiatives.

    The UAE’s minister of state, Ahmed Ali Al Sayegh, has said: “The initiative can be a source of economic and technological strength for the region, while simultaneously improving the lives of those who need the most support.”

    The fund is supposed to help Palestinians, as one of those groups most in need of support. But again, the main parties are not playing straight. Their deception is revealed by the Trump administration’s selection of who is to head the Abraham Fund, one of its last appointments before the handover to Biden.

    According to the Jewish Telegraphic Agency, the fund will be overseen by Aryeh Lightstone, a fervently right-wing rabbi and ally of Israel’s settler community. Lightstone is a senior adviser to David Friedman, the US ambassador to Israel who has his own strong ties to the settlements. Friedman pushed aggressively for the US to move its embassy from Tel Aviv to occupied Jerusalem. Trump finally did so in May 2018, breaking an international consensus against locating diplomatic missions in Jerusalem.

    Checkpoint upgrade

    The political priorities of Lightstone are evident in one of the Abraham Fund’s first declared projects: to “modernise” Israeli checkpoints across the occupied West Bank.

    The checkpoint upgrade is being hailed by US officials as benefiting Palestinians. It will speed up their passage as they try to move around the occupied West Bank, and as those with permits enter Israel or the settlements to work. One senior Trump administration official promised checkpoint delays that currently keep Palestinians waiting for many hours could be dramatically cut: “If I can upgrade that, which doesn’t cost a lot of money, and have it take 30 seconds, I am blowing up [freeing up] 400,000 work hours a day.”

    There are many glaring problems with this approach – not least that under international law, belligerent military occupations such as Israel’s must be temporary in nature. Israel’s occupation has endured for more than five decades already.

    Efforts to make the occupation even more permanent – by improving and refining its infrastructure, such as through upgrades to create airport-style checkpoints – is in clear breach of international law. Now the Gulf will be intimately involved in subsidising these violations.

    Further, the idea that the Abraham Fund’s checkpoint upgrade is assisting Palestinians – “those who most need support” – or developing their economy is patently ridiculous. The fund is exclusively helping Israel, a robust first-world economy, which is supposed to shoulder the costs of its military rule over Palestinians.

    The economic costs of occupation are one of the few tangible pressures on Israel to withdraw from the territories and allow Palestinians sovereignty. If the oil-rich Gulf states help pick up the tab, they will incentivise Israel to stay put and steal yet more Palestinian land and resources.

    Indeed, the hours being freed up, even assuming that is what actually happens, are unlikely to help the Palestinian economy or bring financial benefits to the Palestinian labourers Israel has made dependent on its economy through the lengthy occupation. To develop their own economy, Palestinians need their land and resources stolen by Israel restored to them.

    Herding Palestinians

    Seen another way, the Abraham Fund’s planned checkpoint upgrade is actually a subsidy by the Gulf to the settlements. That is because the very purpose of the checkpoints is to enforce Israeli control over where and when Palestinians can travel in their homeland.

    Israel uses the checkpoints as a way to herd Palestinians into particular areas of the occupied West Bank, especially the third under nominal PA control, while blocking their entry to the rest. That includes a denial of access to the West Bank’s most fertile land and its best water sources. Those areas are exactly where Israel has been building and expanding the settlements.

    Palestinians are in a zero-sum battle against the settlers for control over land in the occupied West Bank and East Jerusalem. Any help Israel receives in restricting their movement through checkpoints is a loss to Palestinians and a victory for the settlers. Modernised checkpoints will simply be far more efficient at herding Palestinians where Israel and the settlers want them to be.

    In partnering with Israel on upgrading checkpoints, the Gulf will be aiding Israel in making its technology of confinement and control of the Palestinian population even more sophisticated, benefiting once again the settlers.

    This is the real story of the Gulf’s Abraham Accords – not simply of turning a blind eye to Israel’s decades-long oppression of Palestinians, but of actively becoming partners with Israel and the settlers in carrying out that oppression.

    • First published in Middle East Eye

    This post was originally published on Radio Free.

  • Ahmed was nervous as he approached the fortified police station, its walls covered with barbed wire and gun-toting cops guarding the entrances. The college student had received a phone call the previous day from Jammu and Kashmir’s cyber police, asking him to report to the station with no reason given. Ahmed, whose name has been changed for fear of retaliation, had never been summoned by the police before.

    Upon his arrival, police immediately took Ahmed to another station nearby; his cellphone was confiscated at the gate. He was brought to a holding room where he noticed four other young people. After exchanging a few nervous glances and hushed whispers, the five youths realized they knew each other — not in person, but through social media.

    They were meeting for the first time at Cargo, a counterinsurgency police complex known for its history as a torture site. Since August, the facility in Srinagar, the capital of Indian-administered Kashmir, has allegedly been used to interrogate and torture young Kashmiri social media users who have been critical of the Indian government’s repressive policies implemented in the region since last year.

    Jammu Kashmir Coalition of Civil Society, a group of human rights organizations, reported in August that police had made complaints against more than 200 users of social media platforms and virtual private networks, deploying surveillance technology to trace and summon them to police stations under anti-terror and detention laws.

    Ahmed and the young people he met at Cargo are among the more than two-dozen men and women, mostly students, who spoke to The Intercept about their experiences in police custody for their social media posts. Some of them had been contacted by the cyber unit and asked to sign a nonbinding agreement at a local police station to refrain from criticizing civil authorities or the armed forces on social media. Others recounted that they were sent to Cargo, where they were thrashed, verbally abused, and threatened with imprisonment or death.

    The recent police crackdown on social media is part of a sharp escalation of censorship efforts under India’s Hindu nationalist Prime Minister Narendra Modi since August 2019, when the government unilaterally decided to revoke Jammu and Kashmir’s semiautonomous status previously guaranteed under the Indian Constitution and divide the state into union territories under its direct control.

    The posts under police scrutiny, mostly shared on Twitter and Facebook, were explicitly political: They questioned India’s actions against Kashmiris leading up to and following the dissolution of the region’s special status, as well as human rights violations perpetrated by Indian security forces and the media’s silence on such abuses. Twitter did not respond to a request for comment.

    The victims said that police confiscated their phones and returned them days later, after officers had used login information extracted during interrogations to access their social media accounts. Since being released from custody, many of the victims said they no longer post political content online or they have deactivated their accounts to avoid being summoned again.

    There have been few reports outside Kashmiri and Indian media about the recent crackdown. After publishing a story on the issue for Indian news site Article 14, Kashmiri journalist Auqib Javeed was summoned in late September to the cyber police headquarters. He later claimed that he had been assaulted and detained at Cargo for five hours — a treatment similar to what the social media users described.

    The intimidation of social media users and journalists is meant to silence criticism, said Gowhar Geelani, a journalist and author who himself has been booked by the cyber police under the Unlawful Activities Prevention Act, a controversial Indian anti-terror law. “It is part of a larger crackdown and criminalizing of opinions.”

    Kashmiri journalists browse the internet on their mobile phones inside the media center set up by government authorities in Srinagar, Indian-controlled Kashmir, on Jan. 30, 2020.

    Photo: Dar Yasin/AP

    Inside the Interrogation Room

    Considered the world’s most heavily militarized zone, Kashmir was put under an unprecedented military lockdown by the Indian government last August. Cellular services and digital communication lines were blocked without any prior notice — resulting in the longest internet shutdown ever recorded in a democracy. The Indian government restored internet access, including to social media sites that were previously banned, in March, but only at slow 2G speed.

    The restrictions on internet access have come in tandem with increased surveillance in the region, said Devdutta Mukhopadhyay, associate counsel at the Internet Freedom Foundation, an internet advocacy group based in India. “Some examples we have seen in the past year are WhatsApp group administrators being made to register with district authorities, ban on VPN services, and additional verification requirements for prepaid mobile internet users,” she said.

    Some Kashmiris, in the spirit of the decadeslong rebellion against Indian rule, have taken to social media to air their frustrations with the government — but not without consequences.

    “They yelled and shouted, ‘Who is giving you money to post all this?’ One officer slapped and kicked me.”

    After spending more than three hours in the holding room, getting fingerprinted and photographed, and handing over his banking information and other personal details, Ahmed was taken to an interrogation room where several officers were waiting for him. “They yelled and shouted, ‘Who is giving you money to post all this?’” he said. “One officer slapped and kicked me.” One of the officers pushed a file toward him containing screenshots of his posts from Twitter.

    “I was asked to unlock my phone and one officer started scanning it,” Ahmed said. “Another officer asked for the passwords of my email and social media accounts.” The officers pulled up Ahmed’s Twitter account on a desktop computer and started questioning him about his more recent tweets. Some of the posts sought accountability from the police and the Indian army for human rights violations, such as extrajudicial killings of civilians in staged gunfights, while others seemed more benign.

    “One officer asked me why I had congratulated Kashmiri photographers who won the Pulitzer Prize this year,” said Ahmed. “They asked me why I quote selective poets and poetry in my tweets.”

    Another college student who spoke to The Intercept also said that a police officer confiscated his phone while he was detained at Cargo and looked through photos of his mother and siblings.

    “He abused them and threatened that they will also be treated like me,” said Bilal, whose name has also been changed for fear of retaliation.

    Bilal and two other victims told The Intercept that officers had proposed they become informants and snitch on other social media users police were monitoring, in exchange for their release. They were told that they would otherwise be jailed or killed in a staged gunfight.

    Bilal was baffled by the offer to become an informant, saying that he never thought his tweets would land him in a situation in which the police would ask him to become a spy.

    “They would leave me alone for hours to decide,” he said. However, he was eventually let go with a warning that next time he would be booked under the Unlawful Activities Prevention Act.

    Track and Trace

    Kashmir’s cyber police force was expanded shortly after the August lockdown last year, with the intention of curbing cybercrimes. Since then, the unit has grown into a sophisticated surveillance operation, equipped with advanced technology for tracking down Kashmiris, including more recent monitoring of those who contracted Covid-19 during the pandemic. Tahir Ashraf Bhatti, the head of Cargo who is also in charge of the cyber force, was awarded a medal from the Indian government on Independence Day for his department’s work.

    Bhatti told The Intercept that the cyber unit opens cases mostly for complaints regarding financial fraud and “cyberbullying” — the latter of which has been used as justification to summon social media users for anti-government posts. He denied that people were being summoned or tortured for expressing their political views online.

    The cyber unit has grown into a sophisticated surveillance operation, equipped with advanced technology for tracking down Kashmiris.

    Bhatti himself has been accused of assaulting at least one social media user in custody. The victim told The Intercept that he was summoned to the cyber police station in August after he had mocked Bhatti on Twitter. He was taken to Cargo where Bhatti used a leather belt to beat him repeatedly for three days on the same part of his body. “If I tell you the spot they hit, they would get to know my identity,” he said. Bhatti denied this incident took place.

    Bhatti declined to go into detail about what kind of surveillance technology the cyber force uses to collect information on Kashmiris who live both in the region and abroad. Multiple people told The Intercept that despite using VPNs to stay anonymous on social media, the police were still able to find out who they were.

    “It takes us half an hour to pinpoint location and details of a user,” Bhatti said. He showed The Intercept a WhatsApp conversation, in which a senior officer had asked him about an individual’s location and address, and if they had a past record. “My team did it in minutes,” he said.

    That team is composed of 40 tech-savvy cops, Bhatti said, while the more challenging cases are outsourced to private companies, which he did not specify.

    Gone Quiet

    While much of the cyber unit’s internal operations remain shrouded in secrecy, its actions have had a noticeable chilling effect on social media activity in Kashmir. Many accounts have vanished, while others have gone silent or no longer post political content.

    Shefali Rafiq, a 22-year-old journalism student who is active on social media, said she has become more cautious about what she posts. “There were some profiles I would eagerly follow,” she said, “but they have either deactivated their accounts or they no longer write critical posts.”

    Three social media users said they have noticed suspicious activity on their accounts since being released from police custody, such as likes or retweets they did not make, or following and unfollowing other accounts.

    Those who had been summoned said they have lived in fear since their encounters with the cyber police. After being called in for interrogation four days in a row, Ahmed said he was finally let go on the condition that he would stop criticizing the Indian government and security forces online, and report to the station whenever he was called in. Since his release, Ahmed said he has experienced panic attacks and a lack of appetite. He has not been able to bring himself to post on social media like he used to.

    “At times I write a long post and at the end, I delete it and cry,” he said. “My phone haunts me.”

    This post was originally published on Radio Free.

  • Former PNG Prime Minister Peter O’Neill … welcomes the chance to defend the case. Image: RNZ

    By RNZ Pacific

    Papua New Guinea’s former Prime Minister, Peter O’Neill, has been committed to stand trial for charges of misappropriation and official corruption

    A Waigani Committal Court magistrate Tracey Ganaii yesterday found there was sufficient evidence on the two charges.

    They relate to the state purchase of two generators from Israel seven years ago when O’Neill was prime minister.

    Police allege that O’Neill directed payments for the purchase without proper procurement and tender processes, or parliamentary approval.

    O’Neill told media outside court that he welcomed the chance to defend the case.

    “There was no personal benefit on my part in this case. But there is a suggestion by some of the witnesses that it was official corruption and misappropriation of unbudgeted items. But we have not presented our evidence in court, which we will do in the National Court.”

    O’Neill previously defended the US$14 million purchase of the generators as being a necessary step to addressing chronic electricity blackouts experienced in PNG’s main cities of Port Moresby and Lae.

    PNG’s parliamentary opposition filed a police complaint about the purchase in early 2014.

    The former prime minister insisted that the decision was approved by his cabinet, the National Executive Council.

    “Largely, this is a NEC-endorsed decision. The purchase was endorsed by NEC.

    “The court thought that there has been differences of timing, and there was sufficiency of that to bring the matter up to the National Court, and we look forward to defending it there.”

    This article is republished by the Pacific Media Centre under a partnership agreement with RNZ.

    Print Friendly, PDF & Email

    This post was originally published on Radio Free.